ردیف | عنوان | نوع |
---|---|---|
61 |
پیاده سازی "اهداف توسعه پایدار": در راستای رسیدگی به سه چالش اصلی حاکمیتی- اقدام مشترک، توافق ها و پاسخگویی
سال انتشار: 2017 - تعداد صفحات فایل pdf انگلیسی: 7 - تعداد صفحات فایل doc فارسی: 16 تحقق آرزوهای "اهداف توسعه پایدار" (SDGs) برای کاهش نابرابری، کاهش آسیب زیست محیطی،
و تامین معیشت انعطاف پذیر، یک چالش بزرگ برای علم پایداری، جامعه مدنی و دولت است. ما سه چالش اصلی حاکمیتی را برای اجرای SDG ها شناسایی می کنیم: (i) ترویج اقدام مشترک با ایجاد فضاهای تصمیم گیری فراگیر برای تعامل متقابل بین بخش ها و معیار های مختلف؛ (ii) ایجاد توافقات سخت، تمرکز بر برابری، عدالت و انصاف؛ و (iii) اطمینان از مکانیزم های موجود برای انجام فعالان اجتماعی برای تصمیم گیری، سرمایه گذاری، اقدامات و نتایج. این مقاله هر یک از این سه چالش حاکمیتی را توضیح می دهد و راه های ممکن برای رسیدگی به آنها را مشخص کرده و اهمیت ارتباط بین این سه چالش را برجسته می نماید.
|
مقاله ترجمه شده |
62 |
Subversive questions for classroom turn-taking traffic management
پرسش خرابکارانه برای گرفتن وقت کلاس مدیریت ترافیک-2017 This paper uses conversation analysis to document countering actions taken by a teacher for turn-taking traffic management in the
classroom institutional settings. Adopting the notions of ‘‘parallel activity’’ and ‘‘subversion,’’ I introduce a particular teachers accounting
practice that was used to curtail potentially disruptive activity among students. The data for the study come from 20 h of video recordings
collected from a Japanese public junior high school classroom. Analysis of the videotaped classroom interactions revealed the use of a
specific interactional practice, viz., the teachers use of subversive questions to put an end to parallel activity among students without
forcefully asking them to desist. Since subversive questions are designed to reflect the sequential environment of the central activity and
take different forms depending on it, students who can answer teachers subversive questions thereby evidence their previous
participation in the central activity, and hence the teacher closes the sequence with positive feedback. In contrast, students who
are not able to answer the subversive questions evidence their lack of participation in the central activity and receive reprimand. These
findings contribute to the literature on classroom interaction from the turn-taking traffic management point of view.
Keywords: Conversation analysis | Classroom interaction | Central activity | Parallel activity | Subversive question | Accountability |
مقاله انگلیسی |
63 |
The role of information security learning and individual factors in disclosing patients health information
نقش یادگیری امنیت اطلاعات و عوامل فردی در افشای اطلاعات سلامت بیماران-2017 One of the most vulnerable stakeholders that may violate health information privacy pre
scribed in HIPAA (Health Insurance Portability and Accountability Act) are nursing students
who have some limited access to EMR systems to retrieve health records while freely com
municating with patients and relevant stakeholders. However, limited attention has been
given to nursing students’ deviant behaviors. To fill this gap, this study develops a re
search model of a nursing student’s behavior of disclosing health information by identifying
the deterrent effects of health information security awareness (HISA) nurtured by nursing
schools and personal values such as personal norms and self-control.
Our study empirically tests the model and found that three learning components ((1)
general information security awareness, (2) health information security regulation aware
ness, and (3) punishment severity awareness) are significantly important to develop HISA.
We find that HISA significantly affects personal norms and self-control which play as de
terrence against the intention to disclose patients’ health information.
As the importance of complying with HIPAA regulations and information security poli
cies by employees who work in health care industry increases, our findings shed new light
on the role of HISA and personal values in nursing education and the health care indus
try’s efforts to protect patients’ health information.
Keywords: Health information security | awareness | Intention to disclose patients’ | health information | HIPAA | Nursing education | Health information privacy |
مقاله انگلیسی |
64 |
Workplace road safety risk management: An investigation into Australian practices
مدیریت ریسک ایمنی جاده در محل کار: تحقیق در مورد اقدامات استرالیا-2017 In Australia, more than 30% of the traffic volume can be attributed to work-related vehicles. Although
work-related driver safety has been given increasing attention in the scientific literature, it is uncertain
how well this knowledge has been translated into practice in industry. It is also unclear how current
practice in industry can inform scientific knowledge. The aim of the research was to use a benchmarking
tool developed by the National Road Safety Partnership Program to assess industry maturity in relation
to risk management practices. A total of 83 managers from a range of small, medium and large organisa
tions were recruited through the Victorian Work Authority. Semi-structured interviews aimed at eliciting
information on current organisational practices, as well as policy and procedures around work-related
driving were conducted and the data mapped onto the benchmarking tool. Overall, the results demon
strated varying levels of maturity of risk management practices across organisations, highlighting the
need to build accountability within organisations, improve communication practices, improve journey
management, reduce vehicle-related risk, improve driver competency through an effective workplace
road safety management program and review organisational incident and infringement management.
The findings of the study have important implications for industry and highlight the need to review
current risk management practices.
Keywords: Work-related drivers | Benchmarking | Driver risk management | Driver safety | Fleet management | Risk management practices |
مقاله انگلیسی |
65 |
Applications of social network analysis in behavioural information security research: Concepts and empirical analysis
برنامه های تجزیه و تحلیل شبکه های اجتماعی در تحقیقات امنیتی اطلاعات رفتاری: مفاهیم و تحلیل تجربی-2017 The rapid digital transformation and technological disruption in modern organisations demand
the development of people-centric security workplaces, whereby the employees can build
up their security awareness and accountability for their actions via participation in the
organisation’s social networks. The social network analysis approach offers a wide array
of analytical capabilities to examine in-depth the interactions and relations within an
organisation, which assists the development of such security workplaces. This paper pro
poses the novel and practical adoption of social network analysis methods in behavioural
information security field. To this end, we discuss the core features of the social network
analysis approach and describe their empirical applications in a real case study of a large
organisation in Vietnam, which utilised these methods to improve employees’ informa
tion security awareness. Towards the end of the paper, a framework detailing the strategies
for conducting social network analysis in the behavioural information security field is de
veloped and presented.
Keywords: Information security behaviour | Information security compliance | Information security management | Information security governance | Social network analysis |
مقاله انگلیسی |
66 |
Applications of social network analysis in behavioural information security research: Concepts and empirical analysis
برنامه های تجزیه و تحلیل شبکه های اجتماعی در تحقیقات امنیتی اطلاعات رفتاری: مفاهیم و تحلیل تجربی-2017 The rapid digital transformation and technological disruption in modern organisations demand
the development of people-centric security workplaces, whereby the employees can build
up their security awareness and accountability for their actions via participation in the
organisation’s social networks. The social network analysis approach offers a wide array
of analytical capabilities to examine in-depth the interactions and relations within an
organisation, which assists the development of such security workplaces. This paper pro
poses the novel and practical adoption of social network analysis methods in behavioural
information security field. To this end, we discuss the core features of the social network
analysis approach and describe their empirical applications in a real case study of a large
organisation in Vietnam, which utilised these methods to improve employees’ informa
tion security awareness. Towards the end of the paper, a framework detailing the strategies
for conducting social network analysis in the behavioural information security field is de
veloped and presented.
Keywords: Information security behaviour | Information security compliance | Information security management | Information security governance | Social etwork analysis |
مقاله انگلیسی |
67 |
Big Data and security policies: Towards a framework for regulating the phases of analytics and use of Big Data
سیاست های داده های بزرگ و امنیت: به چارچوبی برای تنظیم مراحل تجزیه و تحلیل و استفاده از داده های بزرگ-2017 computer law & s e c u r i t y review 33 ( 2 0 1 7 ) 309–323 http://dx.doi.org/10.1016/j.clsr.2017.03.002 Available online at www.sciencedirect.com www.compseconline.com/publications/prodclaw.htm A B S T R A C T Big Data analytics in national security, law enforcement and the fight against fraud have the potential to reap great benefits for states, citizens and society but require extra safeguards to protect citizens’ fundamental rights. This involves a crucial shift in emphasis from regulating Big Data collection to regulating the phases of analysis and use. In order to benefit from the use of Big Data analytics in the field of security, a framework has to be developed that adds new layers of protection for fundamental rights and safeguards against erroneous and malicious use. Additional regulation is needed at the levels of analysis and use, and the oversight regime is in need of strengthening. At the level of analysis – the algorithmic heart of Big Data processes – a duty of care should be introduced that is part of an internal audit and external review procedure. Big Data projects should also be subject to a sunset clause. At the level of use, profiles and (semi-) automated decision-making should be regulated more tightly. Moreover, the responsibility of the data processing party for accuracy of analysis – and decisions taken on its basis – should be anchored in legislation. The general and security-specific oversight functions should be strengthened in terms of technological expertise, access and resources. The possibilities for judicial review should be expanded to stimulate the development of case law. © 2017 Dennis Broeders, Erik Schrijvers, Bart van der Sloot, Rosamunde van Brakel, Josta de Hoog & Ernst Hirsch Ballin. Published by Elsevier Ltd. All rights reserved. Keywords:Big Data | Security | Data protection | Privacy | Regulation | Fraud | Policing | Surveillance | Algorithmic accountability | the Netherlands |
مقاله انگلیسی |
68 |
Accountability for social impact: A bricolage perspective on impact measurement in social enterprises
مسئولیت پذیری برای تأثیر اجتماعی: یک دید کلی در مورد اندازه گیری تاثیر در شرکت های اجتماعی-2017 To fulfill external accountability expectations social impact measurement has become an im
portant practice for social enterprises. Yet, the ambiguity around social impact and its measure
ment leads to a friction among stakeholders involved in a social enterprise. Based on interviews
with small-to-medium-sized social enterprises, this paper investigates how social entrepre
neurs handle the increasing pressure to measure social impact with formal methodologies
through a bricolage lens. The findings show how social enterprises combine material and ide
ational bricolage as well as seek to delegitimize formal methodologies to increase the legitima
cy of their bricolaged approaches for social impact measurement.
Keywords: Social entrepreneurs | Social impact measurement | Bricolage | Accountability |
مقاله انگلیسی |
69 |
اندازه گیری امنیت سرویس های وب در عصر اینترنت اشیا
سال انتشار: 2017 - تعداد صفحات فایل pdf انگلیسی: 11 - تعداد صفحات فایل doc فارسی: 22 فناوری هایی مانند اینترنت اشیا به دستگاه های کوچک اجازه می دهد در محیط های باز و پویا و در ابعاد بزرگ به ارائه ی سرویس های وب بپردازند. کاربران و مصرف کنندگان سرویس ها باید بین سرویس های موجود انتخاب کنند و از آنجا که امنیت یکی از کلید های این تصمیم گیری است در این مقاله یک مجموعه ی آزمون زبانی ارائه شده است . از آن رو که مجموعه های فازی دیگر برای بررسی ارزش امنیتی کلی بکار می روند. این مقاله تا جایی که ما اطلاع داریم اولین راه حل عملی برای ایجاد مقایسه های مستقیم و رتبه بندی بخش های مختلف امنیتی مانند حریم خصوصی , در دسترس بودن و قابلیت اعتماد است. ما 4 پلتفرم بر پایه ی ابر را برای توصیف راهکار خود مورد استفاده قرار داریم.
کلمات کلیدی: خدمات وب | اندازه گیری و ارزیابی امنیت | امنیت خدمات کمی | توافقنامه سطح خدمات | ارزیابی زبانی | تصمیم گیری چند شاخصه |
مقاله ترجمه شده |
70 |
اصلاحات بخش دولتی و شرکت های بخش خصوصی: مرور و دستور کار پژوهش
سال انتشار: 2017 - تعداد صفحات فایل pdf انگلیسی: 7 - تعداد صفحات فایل doc فارسی: 19 هدف این سر مقاله معرفی یک موضوع خاص و به تصویر کشیدن تم های اصلی اش است. این مسئله خاص در انجمن حسابداری با هدف شبیه سازی تحقیقات بین رشته ای و حیاتی در زمینه اصلاحات بخش دولتی ، بخصوص در زمینه شرکت های دولتی-خصوصی و دیگر سازمان های بخش دولتی انجام شده است. این سرمقاله همچنین به دنبال فراهم کردن یک برنامه تحقیقاتی و ارائه مسیر های جدید در این زمینه ، با در نظر گرفتن ابهامات این فرم ها سازمانی های ترکیبی و پیچیدگی های انجام اصلاحات در زمینه حسابداری و حسابدهی است.
کلمات کلیدی: مشارکت خصوصی-دولتی | سازمان های ترکیبی | اصلاحات حسابداری و حسابدهی |
مقاله ترجمه شده |