System Trust


Book Description

Frequently enabled by digitalization, great transformations are taking place in socio-technical systems such as energy, telecommunications, and mobility. These transformations indicate widespread shifts in societal infrastructure systems, rearranging relations between governments, industries, NGOs, and consumers. In this context, the question of trust in systems – as introduced by sociologists Luhmann, Coleman and Giddens – acquires new urgency, as yet uncommented upon in trust research, or socio-technical systems debates. Focusing on the energy sector, Patrick Sumpf analyzes the meanings of system and trust to develop a framework for both theoretical and empirical research, which is synthesized into an “Architecture of Trust” in systems.




Trust in Computer Systems and the Cloud


Book Description

Learn to analyze and measure risk by exploring the nature of trust and its application to cybersecurity Trust in Computer Systems and the Cloud delivers an insightful and practical new take on what it means to trust in the context of computer and network security and the impact on the emerging field of Confidential Computing. Author Mike Bursell’s experience, ranging from Chief Security Architect at Red Hat to CEO at a Confidential Computing start-up grounds the reader in fundamental concepts of trust and related ideas before discussing the more sophisticated applications of these concepts to various areas in computing. The book demonstrates in the importance of understanding and quantifying risk and draws on the social and computer sciences to explain hardware and software security, complex systems, and open source communities. It takes a detailed look at the impact of Confidential Computing on security, trust and risk and also describes the emerging concept of trust domains, which provide an alternative to standard layered security. Foundational definitions of trust from sociology and other social sciences, how they evolved, and what modern concepts of trust mean to computer professionals A comprehensive examination of the importance of systems, from open-source communities to HSMs, TPMs, and Confidential Computing with TEEs. A thorough exploration of trust domains, including explorations of communities of practice, the centralization of control and policies, and monitoring Perfect for security architects at the CISSP level or higher, Trust in Computer Systems and the Cloud is also an indispensable addition to the libraries of system architects, security system engineers, and master’s students in software architecture and security.




System Trust


Book Description

Frequently enabled by digitalization, great transformations are taking place in socio-technical systems such as energy, telecommunications, and mobility. These transformations indicate widespread shifts in societal infrastructure systems, rearranging relations between governments, industries, NGOs, and consumers. In this context, the question of trust in systems – as introduced by sociologists Luhmann, Coleman and Giddens – acquires new urgency, as yet uncommented upon in trust research, or socio-technical systems debates. Focusing on the energy sector, Patrick Sumpf analyzes the meanings of system and trust to develop a framework for both theoretical and empirical research, which is synthesized into an “Architecture of Trust” in systems.




Trust, Accountability and Capacity in Education System Reform


Book Description

This global collection brings a new perspective to the field of comparative education by presenting trust, capacity and accountability as the three building blocks of education systems and education system reform. In exploring how these three factors relate to student learning outcomes across different international contexts, this book provides a powerful framework for a more equal system. Drawing upon research and case studies from scholars, policymakers and experts from international agencies across five continents, this book shows how trust, capacity and accountability interact in ways and with consequences that vary among countries, pointing readers towards understanding potential leverage points for system change. Trust, Accountability, and Capacity in Education System Reform illuminates how these three concepts are embedded in an institutional context temporally, socially and institutionally and offers an analysis that will be of use to researchers, policymakers and agencies working in comparative education and towards education system reform. Chapter 11 of this book is freely available as a downloadable Open Access PDF under a Creative Commons Attribution 2.0 Generic license available at http://www.taylorfrancis.com/books/e/9780429344855




What Is Public Trust in the Health System?


Book Description

EPDF and EPUB available Open Access under CC-BY-ND licence. This book explores the concept of public trust in health systems. In the context of recent events, including public response to interventions to tackle the COVID-19 pandemic, vaccination uptake and the use of health data and digital health, this important book uses empirical evidence to address why public trust is vital to a well-functioning health system. In doing so, it provides a comprehensive contemporary explanation of public trust, how it affects health systems and how it can be nurtured and maintained as an integral component of health system governance.







Corporate Behavior and Sustainability


Book Description

Companies can no longer expect to engage in dubious or unethical corporate behaviour without risking their reputation and damaging, perhaps irrevocably, their market position. Irresponsible corporate behavior not only deprives shareholders of long-term returns but also ultimately imposes a cost on society as a whole. Sustainable business is about ensuring that entities contribute toward positive social, environmental, and economic outcomes. Bad business behaviour is costly for stakeholders, for markets, for society, and the economy alike. To ensure that a company behaves well, the buy-in of the leadership team is crucial. The full commitment of the board of directors, in conjunction with the senior managers of the organization, is required if an organization is to be socially responsible. In this sense, leadership does not reside with an individual (the CEO) within the organization but with all of those at the apex of corporate power and control. Effective change management requires enlightened and capable leadership to instigate and drive the process of embedding a sustainable and socially responsible corporate philosophy and culture that supports good business decision-making. A profound understanding of the requirements of such a leadership process will help corporate managers become highly effective change agents. Governance will be the main driver of this change. For the economy and financial markets to become sustainable and resilient, radical changes in corporate leadership need to take place. Integrated reporting, government regulation, and international standards will all be important factors in bringing about this change. As well as understanding the effects of corporate behavior on financial markets, such an understanding is also now imperative in relation to the social and environmental contexts.




Bootstrapping Trust in Modern Computers


Book Description

Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security.




Governance and Governmentality for Projects


Book Description

This research-based book takes an organization-wide perspective to describe the governance and governmentality for projects in organizations. Governance of projects defines and directs the ways managers of projects, programs, and project portfolios carry out their work. Governmentality is the way the managers of these managers present themselves to those they lead. Governance and Governmentality for Projects starts with introducing existing theories, models and paradigms for governance and governmentality. It then develops a chronological framework of the ways governance and governmentality for projects is enabled in organizations, how it subsequently unfolds in organizations of different types and sectors, and the consequences of different governance approaches for project results, trust, control, and ethical issues in projects. Special emphasis is given to the link between corporate governance and the governance of project, programs and project portfolios. Three real-life case studies exemplify the research findings described in the book. Through its structure this book describes the development of governance and governmentality in the realm of projects from its organizational origins, via observable practices, to expected consequences of different implementations. Aimed at academics, post-graduate students in business and management, reflective practitioners, standards or policy developers, those in governance roles and others in need of a detailed knowledge of the spectrum of project related governance in organizations, this book will help develop a comprehensive understanding of the theoretical and practical underpinnings of the subject, their interaction, and implications for implementation. This allows for understanding and developing of both generic and idiosyncratic governance structures, such as those needed in project-based organizations.




IBM XIV Storage System Architecture and Implementation


Book Description

Not a new version - included warning for self signed X509 certificates - see section 5.2 This IBM® Redbooks® publication describes the concepts, architecture, and implementation of the IBM XIV® Storage System. The XIV Storage System is a scalable enterprise storage system that is based on a grid array of hardware components. It can attach to both Fibre Channel Protocol (FCP) and IP network Small Computer System Interface (iSCSI) capable hosts. This system is a good fit for clients who want to be able to grow capacity without managing multiple tiers of storage. The XIV Storage System is suited for mixed or random access workloads, including online transaction processing, video streamings, images, email, and emerging workload areas, such as Web 2.0 and cloud storage. The focus of this edition is on the XIV Gen3 running Version 11.5.x of the XIV system software, which brings enhanced value for the XIV Storage System in cloud environments. It offers multitenancy support, VMware vCloud Suite integration, more discrete performance classes, and RESTful API enhancements that expand cloud automation integration. Version 11.5 introduces support for three-site mirroring to provide high availability and disaster recovery. It also enables capacity planning through the Hyper-Scale Manager, mobile push notifications for real-time alerts, and enhanced security. Version 11.5.1 supports 6TB drives and VMware vSphere Virtual Volumes (VVOL). In the first few chapters of this book, we describe many of the unique and powerful concepts that form the basis of the XIV Storage System logical and physical architecture. We explain how the system eliminates direct dependencies between the hardware elements and the software that governs the system. In subsequent chapters, we explain the planning and preparation tasks that are required to deploy the system in your environment by using the intuitive yet powerful XIV Storage Manager GUI or the XIV command-line interface. We also describe the performance characteristics of the XIV Storage System and present options for alerting and monitoring, including enhanced secure remote support. This book is for IT professionals who want an understanding of the XIV Storage System. It is also for readers who need detailed advice on how to configure and use the system.