Auditing War
نویسندگان
چکیده
I made a mistake few months ago. It was the sort of have repeatedly and yet one always reflect upon with same measure surprise. started when colleagues in Bosnia alerted me to fact that Kosovo, unlike other neighbouring countries former Yugoslavia, were be excluded from new relaxing EU visa requirements. Indignant overflowing hypothetical rationales as why Kosovo might excluded, presumed been contrived obscure ‘real reasons’, colleague went onto internet find an explanation (which tacitly understood would only justification, ‘real’ reasons left un-enunciated). We eventually read question had failed meet variety requirements—we can already call them indicators—that signal their readiness enjoy regime. My error resided precisely presumption these alleged ‘failures’ on parts states involved, concealed some more pertinent truth. In fact, everything do visibility transparency nothing hidden beneath exercise accountability ‘readiness’. That is, entire dilemma what Marilyn Strathern poignantly referred ‘what conceals’ (2000: 310).
منابع مشابه
Auditing overhead, auditing adaptation, and benchmark evaluation in Linux
Logging is a critical component of Linux auditing. However, our experiments indicate that the logging overhead can be significant. The paper aims to leverage the performance overhead introduced by Linux audit framework under various usage patterns. The study on the problem leads to an adaptive audit-logging mechanism. Many security incidents or other important events are often accompanied with ...
متن کاملAuditing Business Process Compliance
Compliance issues impose significant management and reporting requirements upon organizations.We present an approach to enhance business process modeling notations with the capability to detect and resolve many broad compliance related issues. We provide a semantic characterization of a minimal revision strategy that helps us obtain compliant process models from models that might be initially n...
متن کاملSpreadsheet Auditing Software
It is now widely accepted that errors in spreadsheets are both common and potentially dangerous. Further research has taken place to investigate how frequently these errors occur, what impact they have, how the risk of spreadsheet errors can be reduced by following spreadsheet design guidelines and methodologies, and how effective auditing of a spreadsheet is in the detection of these errors. H...
متن کاملAuditing with Signals
This paper is a first step in the analysis of the use of signals of taxpayer’s incomes by tax audit authorities. In a very simple model, we consider the design of the audit strategy when the tax authority can commit to it and has free access to a signal correlated with the taxpayer’s true income. We discuss the optimal enforcement policy and compare it with the optimal one when only self-report...
متن کاملAuditing with Incomplete Logs
The protection of sensitive information is of utmost importance for organizations. The complexity and dynamism of modern businesses are forcing a re-think of traditional protection mechanisms. In particular, a priori policy enforcement mechanisms are often complemented with auditing mechanisms that rely on an a posteriori analysis of logs recording users’ activities to prove conformity to polic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Suomen antropologi
سال: 2023
ISSN: ['0355-3930', '1799-8972']
DOI: https://doi.org/10.30676/jfas.127474