While many IT security incidents result in relatively minor operational disruptions or minimal recovery costs, occasionally high-impact security breaches can have catastrophic effects on the firm. Unfortunately, measuring security risk and planning for countermeasures or mitigation is a difficult task. Past research has suggested risk metrics which may be beneficial in understanding and planning for security incidents, but most of these metrics are aimed at identifying expected overall loss and do not directly address the identification of, or planning for, sparse events which might result in high-impact loss. The use of an upper percentile value or some other worst-case measure has been widely discussed in the literature as a means of stochastic optimization, but has not been applied to this decision domain. A key requirement in security planning for any threat scenario, expected or otherwise, is the ability to choose countermeasures optimally with regard to tradeoffs between countermeasure cost and remaining risk. Most of the planning models in the literature are qualitative, and none that we are aware of allow for the optimal determination of these tradeoffs. Therefore, we develop a model for optimally choosing countermeasures to block or mitigate security attacks in the presence of a given threat level profile. We utilize this model to examine scenarios under both expected threat levels and worst-case levels, and develop budget-dependent risk curves. These curves demonstrate the tradeoffs which occur if decision makers divert budgets away from planning for ordinary risk in an effort to mitigate the effects of potential high-impact outcomes. 相似文献
Identifying codes in the Cartesian product of a complete graph and a path are considered. After proving a set of sufficient conditions for a set in such a graph to be an identifying code, we then construct minimum identifying codes when the complete graph is of order three or at least five, and when the path is of order at least three. 相似文献
In this paper, we present a generalization of power indices which includes the preferences of the voters. Using a Multilinear Extension perspective (Owen in Manage Sci 18:p64–p72, 1972a) we measure the probability of the players’ voting “yes” for a particular political issue. Further, we randomize the issues and show the influence that the Agenda Setter can have on a player’s power. We demonstrate these results using data from the European Union to show how the power distribution may shift after enlargement and under the new Constitutional Treaty. 相似文献
Drawing on Judith Butler's conception of 'performativity', we would argue that the notion has important implications for contemporary debates in international social welfare over agency, subjection and 'resistance'. Professional social workers embedded in discursive institutions function according to particular expectations around performativity. In addition, this organisational context is complex with multiple demands. In light of technologies of surveillance and control in contemporary social work, performativity offers a response to the pressing need to expand notions of worker opposition beyond traditional forms of organised dissent towards the production of subjective space. 相似文献
Objective: To pilot test the feasibility of implementing an elder abuse (EA) screening tool (DETECT) designed for medics.
Methods: Testing occurred between September 17th, 2015 and October 26th, 2015. MedStar Mobile Healthcare medics completed the DETECT tool when responding to calls for community-dwelling patients 65 years of age or older.
Results: The DETECT tool was used 1,248 times by 97% of medics responding to an eligible 911 call. Medics responded affirmatively to at least one screening item on 209 of the completed screenings (16.8%). Immediately following the introduction of the DETECT tool, there was an increase of 5.4 (226% above baseline) reports per month (p = 0.0056).
Conclusions: The DETECT tool was easily incorporated into medic’s field-based practice and resulted in an increase in medic generated reports of EA to APS. Future research designed to evaluate the tool’s validity and reliability are warranted. 相似文献
Based on prior literature, this article offers a reconciliation of the core roles of nonprofit boards and aligns these role‐sets with organizational theories. A survey instrument was developed and validated to measure each of four role‐sets (monitoring, supporting, partnering, and representing) to assess whether emphasis on specific roles affects board members’ perception of performance. Our study of nonprofit boards in a midsized midwestern city found that balance across the role‐sets was associated with effective organizational performance. Furthermore, when board members describe any of the four role‐sets as deficient, they perceive the organization as less effective. The results of the study provide practitioners with a validated survey tool that provides nonprofit boards with a method to identify which roles their board emphasizes. 相似文献
A gap exists between empirical evidence demonstrating the risks posed by domestic violence (DV) and the weight that evidence is given by custody evaluators. This gap may result from common beliefs about DV that diminish or deny its seriousness, which include that mothers often make false allegations to gain advantage and that DV and high conflict are synonymous and do not require differential approaches. Using a multiple segment factorial vignette design, we systematically assessed how these beliefs influenced custody evaluators' (N = 603) recommendations and judgments of the believability of allegations. Mother's demeanor (i.e., hostile vs. pleasant) was the most consistent predictor of evaluators' recommendations and judgments of credibility. Findings have implications for providing research-based education and training for evaluators. 相似文献