دانلود و نمایش مقالات مرتبط با Accountability::صفحه 7
بلافاصله پس از پرداخت دانلود کنید
نتیجه جستجو - Accountability

تعداد مقالات یافته شده: 104
ردیف عنوان نوع
61 پیاده سازی "اهداف توسعه پایدار": در راستای رسیدگی به سه چالش اصلی حاکمیتی- اقدام مشترک، توافق ها و پاسخگویی
سال انتشار: 2017 - تعداد صفحات فایل pdf انگلیسی: 7 - تعداد صفحات فایل doc فارسی: 16
تحقق آرزوهای "اهداف توسعه پایدار" (SDGs) برای کاهش نابرابری، کاهش آسیب زیست محیطی، و تامین معیشت انعطاف پذیر، یک چالش بزرگ برای علم پایداری، جامعه مدنی و دولت است. ما سه چالش اصلی حاکمیتی را برای اجرای SDG ها شناسایی می کنیم: (i) ترویج اقدام مشترک با ایجاد فضاهای تصمیم گیری فراگیر برای تعامل متقابل بین بخش ها و معیار های مختلف؛ (ii) ایجاد توافقات سخت، تمرکز بر برابری، عدالت و انصاف؛ و (iii) اطمینان از مکانیزم های موجود برای انجام فعالان اجتماعی برای تصمیم گیری، سرمایه گذاری، اقدامات و نتایج. این مقاله هر یک از این سه چالش حاکمیتی را توضیح می دهد و راه های ممکن برای رسیدگی به آنها را مشخص کرده و اهمیت ارتباط بین این سه چالش را برجسته می نماید.
مقاله ترجمه شده
62 Subversive questions for classroom turn-taking traffic management
پرسش خرابکارانه برای گرفتن وقت کلاس مدیریت ترافیک-2017
This paper uses conversation analysis to document countering actions taken by a teacher for turn-taking traffic management in the classroom institutional settings. Adopting the notions of ‘‘parallel activity’’ and ‘‘subversion,’’ I introduce a particular teachers accounting practice that was used to curtail potentially disruptive activity among students. The data for the study come from 20 h of video recordings collected from a Japanese public junior high school classroom. Analysis of the videotaped classroom interactions revealed the use of a specific interactional practice, viz., the teachers use of subversive questions to put an end to parallel activity among students without forcefully asking them to desist. Since subversive questions are designed to reflect the sequential environment of the central activity and take different forms depending on it, students who can answer teachers subversive questions thereby evidence their previous participation in the central activity, and hence the teacher closes the sequence with positive feedback. In contrast, students who are not able to answer the subversive questions evidence their lack of participation in the central activity and receive reprimand. These findings contribute to the literature on classroom interaction from the turn-taking traffic management point of view.
Keywords: Conversation analysis | Classroom interaction | Central activity | Parallel activity | Subversive question | Accountability
مقاله انگلیسی
63 The role of information security learning and individual factors in disclosing patients health information
نقش یادگیری امنیت اطلاعات و عوامل فردی در افشای اطلاعات سلامت بیماران-2017
One of the most vulnerable stakeholders that may violate health information privacy pre scribed in HIPAA (Health Insurance Portability and Accountability Act) are nursing students who have some limited access to EMR systems to retrieve health records while freely com municating with patients and relevant stakeholders. However, limited attention has been given to nursing students’ deviant behaviors. To fill this gap, this study develops a re search model of a nursing student’s behavior of disclosing health information by identifying the deterrent effects of health information security awareness (HISA) nurtured by nursing schools and personal values such as personal norms and self-control. Our study empirically tests the model and found that three learning components ((1) general information security awareness, (2) health information security regulation aware ness, and (3) punishment severity awareness) are significantly important to develop HISA. We find that HISA significantly affects personal norms and self-control which play as de terrence against the intention to disclose patients’ health information. As the importance of complying with HIPAA regulations and information security poli cies by employees who work in health care industry increases, our findings shed new light on the role of HISA and personal values in nursing education and the health care indus try’s efforts to protect patients’ health information.
Keywords: Health information security | awareness | Intention to disclose patients’ | health information | HIPAA | Nursing education | Health information privacy
مقاله انگلیسی
64 Workplace road safety risk management: An investigation into Australian practices
مدیریت ریسک ایمنی جاده در محل کار: تحقیق در مورد اقدامات استرالیا-2017
In Australia, more than 30% of the traffic volume can be attributed to work-related vehicles. Although work-related driver safety has been given increasing attention in the scientific literature, it is uncertain how well this knowledge has been translated into practice in industry. It is also unclear how current practice in industry can inform scientific knowledge. The aim of the research was to use a benchmarking tool developed by the National Road Safety Partnership Program to assess industry maturity in relation to risk management practices. A total of 83 managers from a range of small, medium and large organisa tions were recruited through the Victorian Work Authority. Semi-structured interviews aimed at eliciting information on current organisational practices, as well as policy and procedures around work-related driving were conducted and the data mapped onto the benchmarking tool. Overall, the results demon strated varying levels of maturity of risk management practices across organisations, highlighting the need to build accountability within organisations, improve communication practices, improve journey management, reduce vehicle-related risk, improve driver competency through an effective workplace road safety management program and review organisational incident and infringement management. The findings of the study have important implications for industry and highlight the need to review current risk management practices.
Keywords: Work-related drivers | Benchmarking | Driver risk management | Driver safety | Fleet management | Risk management practices
مقاله انگلیسی
65 Applications of social network analysis in behavioural information security research: Concepts and empirical analysis
برنامه های تجزیه و تحلیل شبکه های اجتماعی در تحقیقات امنیتی اطلاعات رفتاری: مفاهیم و تحلیل تجربی-2017
The rapid digital transformation and technological disruption in modern organisations demand the development of people-centric security workplaces, whereby the employees can build up their security awareness and accountability for their actions via participation in the organisation’s social networks. The social network analysis approach offers a wide array of analytical capabilities to examine in-depth the interactions and relations within an organisation, which assists the development of such security workplaces. This paper pro poses the novel and practical adoption of social network analysis methods in behavioural information security field. To this end, we discuss the core features of the social network analysis approach and describe their empirical applications in a real case study of a large organisation in Vietnam, which utilised these methods to improve employees’ informa tion security awareness. Towards the end of the paper, a framework detailing the strategies for conducting social network analysis in the behavioural information security field is de veloped and presented.
Keywords: Information security behaviour | Information security compliance | Information security management | Information security governance | Social network analysis
مقاله انگلیسی
66 Applications of social network analysis in behavioural information security research: Concepts and empirical analysis
برنامه های تجزیه و تحلیل شبکه های اجتماعی در تحقیقات امنیتی اطلاعات رفتاری: مفاهیم و تحلیل تجربی-2017
The rapid digital transformation and technological disruption in modern organisations demand the development of people-centric security workplaces, whereby the employees can build up their security awareness and accountability for their actions via participation in the organisation’s social networks. The social network analysis approach offers a wide array of analytical capabilities to examine in-depth the interactions and relations within an organisation, which assists the development of such security workplaces. This paper pro poses the novel and practical adoption of social network analysis methods in behavioural information security field. To this end, we discuss the core features of the social network analysis approach and describe their empirical applications in a real case study of a large organisation in Vietnam, which utilised these methods to improve employees’ informa tion security awareness. Towards the end of the paper, a framework detailing the strategies for conducting social network analysis in the behavioural information security field is de veloped and presented.
Keywords: Information security behaviour | Information security compliance | Information security management | Information security governance | Social etwork analysis
مقاله انگلیسی
67 Big Data and security policies: Towards a framework for regulating the phases of analytics and use of Big Data
سیاست های داده های بزرگ و امنیت: به چارچوبی برای تنظیم مراحل تجزیه و تحلیل و استفاده از داده های بزرگ-2017
computer law & s e c u r i t y review 33 ( 2 0 1 7 ) 309–323 http://dx.doi.org/10.1016/j.clsr.2017.03.002 Available online at www.sciencedirect.com www.compseconline.com/publications/prodclaw.htm A B S T R A C T Big Data analytics in national security, law enforcement and the fight against fraud have the potential to reap great benefits for states, citizens and society but require extra safeguards to protect citizens’ fundamental rights. This involves a crucial shift in emphasis from regulating Big Data collection to regulating the phases of analysis and use. In order to benefit from the use of Big Data analytics in the field of security, a framework has to be developed that adds new layers of protection for fundamental rights and safeguards against erroneous and malicious use. Additional regulation is needed at the levels of analysis and use, and the oversight regime is in need of strengthening. At the level of analysis – the algorithmic heart of Big Data processes – a duty of care should be introduced that is part of an internal audit and external review procedure. Big Data projects should also be subject to a sunset clause. At the level of use, profiles and (semi-) automated decision-making should be regulated more tightly. Moreover, the responsibility of the data processing party for accuracy of analysis – and decisions taken on its basis – should be anchored in legislation. The general and security-specific oversight functions should be strengthened in terms of technological expertise, access and resources. The possibilities for judicial review should be expanded to stimulate the development of case law. © 2017 Dennis Broeders, Erik Schrijvers, Bart van der Sloot, Rosamunde van Brakel, Josta de Hoog & Ernst Hirsch Ballin. Published by Elsevier Ltd. All rights reserved.
Keywords:Big Data | Security | Data protection | Privacy | Regulation | Fraud | Policing | Surveillance | Algorithmic accountability | the Netherlands
مقاله انگلیسی
68 Accountability for social impact: A bricolage perspective on impact measurement in social enterprises
مسئولیت پذیری برای تأثیر اجتماعی: یک دید کلی در مورد اندازه گیری تاثیر در شرکت های اجتماعی-2017
To fulfill external accountability expectations social impact measurement has become an im portant practice for social enterprises. Yet, the ambiguity around social impact and its measure ment leads to a friction among stakeholders involved in a social enterprise. Based on interviews with small-to-medium-sized social enterprises, this paper investigates how social entrepre neurs handle the increasing pressure to measure social impact with formal methodologies through a bricolage lens. The findings show how social enterprises combine material and ide ational bricolage as well as seek to delegitimize formal methodologies to increase the legitima cy of their bricolaged approaches for social impact measurement.
Keywords: Social entrepreneurs | Social impact measurement | Bricolage | Accountability
مقاله انگلیسی
69 اندازه گیری امنیت سرویس های وب در عصر اینترنت اشیا
سال انتشار: 2017 - تعداد صفحات فایل pdf انگلیسی: 11 - تعداد صفحات فایل doc فارسی: 22
فناوری هایی مانند اینترنت اشیا به دستگاه های کوچک اجازه می دهد در محیط های باز و پویا و در ابعاد بزرگ به ارائه ی سرویس های وب بپردازند. کاربران و مصرف کنندگان سرویس ها باید بین سرویس های موجود انتخاب کنند و از آنجا که امنیت یکی از کلید های این تصمیم گیری است در این مقاله یک مجموعه ی آزمون زبانی ارائه شده است . از آن رو که مجموعه های فازی دیگر برای بررسی ارزش امنیتی کلی بکار می روند. این مقاله تا جایی که ما اطلاع داریم اولین راه حل عملی برای ایجاد مقایسه های مستقیم و رتبه بندی بخش های مختلف امنیتی مانند حریم خصوصی , در دسترس بودن و قابلیت اعتماد است. ما 4 پلتفرم بر پایه ی ابر را برای توصیف راهکار خود مورد استفاده قرار داریم.
کلمات کلیدی: خدمات وب | اندازه گیری و ارزیابی امنیت | امنیت خدمات کمی | توافقنامه سطح خدمات | ارزیابی زبانی | تصمیم گیری چند شاخصه
مقاله ترجمه شده
70 اصلاحات بخش دولتی و شرکت های بخش خصوصی: مرور و دستور کار پژوهش
سال انتشار: 2017 - تعداد صفحات فایل pdf انگلیسی: 7 - تعداد صفحات فایل doc فارسی: 19
هدف این سر مقاله معرفی یک موضوع خاص و به تصویر کشیدن تم های اصلی اش است. این مسئله خاص در انجمن حسابداری با هدف شبیه سازی تحقیقات بین رشته ای و حیاتی در زمینه اصلاحات بخش دولتی ، بخصوص در زمینه شرکت های دولتی-خصوصی و دیگر سازمان های بخش دولتی انجام شده است. این سرمقاله همچنین به دنبال فراهم کردن یک برنامه تحقیقاتی و ارائه مسیر های جدید در این زمینه ، با در نظر گرفتن ابهامات این فرم ها سازمانی های ترکیبی و پیچیدگی های انجام اصلاحات در زمینه حسابداری و حسابدهی است.
کلمات کلیدی: مشارکت خصوصی-دولتی | سازمان های ترکیبی | اصلاحات حسابداری و حسابدهی
مقاله ترجمه شده
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 4517 :::::::: بازدید دیروز: 10523 :::::::: بازدید کل: 15040 :::::::: افراد آنلاین: 2