14 resultados para security practices
em Universidade do Minho
Resumo:
A single supply chain management (SCM) practice will have a certain impact on organizational performance(OP). However, since it is placed in a system that many other practices are conducted simultaneously, the practice itself will interact with other ones and have a greater impact on OP. This mechanism is named the "resonant" influence. The technique of Structural equation modelling (SEM) was used to test the above mechanism with data collected from Vietnamese garment enterprises. The tcst results showed that the model without mutual interaction among SCM practices could explain 42.8%, 26.3% and 34% variance of operational performance, customer satisfaction and financial performance. While the one containing this interaction is capable to explain 69.5%, 33.1% and 57.3%, respectively.
Resumo:
BACKGROUND: Machinery safety issues are a challenge facing manufacturers who are supposed to create and provide products in a better and faster way. In spite of their construction and technological advance, they still contribute to many potential hazards for operators and those nearby. OBJECTIVE: The aim of this study is to investigate safety aspects of metal machinery offered for sale on Internet market according to compliance with minimum and fundamental requirements. METHODS: The study was carried out with the application of a checklist prepared on the basis of Directive 2006/42/EC and Directive 2009/104/EC and regulations enforcing them into Polish law. RESULTS: On the basis of the study it was possible to reveal the safety aspects that were not met in practice. It appeared that in the case of minimum requirements the most relevant problems concerned information, signal and control elements, technology and machinery operations, whereas as far as fundamental aspects are concerned it was hard to assure safe work process. CONCLUSIONS: In spite of the fact that more and more legal acts binding in the Member Countries of the European Union are being introduced to alleviate the phenomenon, these regulations are often not fulfilled.
Resumo:
Despite improvements over the years, accidents continue to be a scourge in the construction sector, leading to an increase in the number of journal articles addressing the issue, in an attempt to help construction industry to increase safety performance [1]. This paper aims to, helping construction industry and particulary tunneling community, describe the Portuguese approach to most typical health and safety problems in underground excavations performed with the Sequential Excavation Method (SEM). The article will address various topics, from safety management and organizational practices, to collective and personal protection equipment, to emergency planning. nt problems in safety and health matters are similar to several other countries, the paper will expose a compilation of Portuguese best practices used to solve that problems. This enunciation of best practices describes experience from most important and recognized Project Owners and Contractors in Portugal. In a second phase it will be analysed Portuguese weaknesses, identifying preventive measures, and their comparative importance, that should be adopted in Portugal in order to reduce accidents and health diseases.
Resumo:
Considering that vernacular architecture may bear important lessons on hazard mitigation, this chapter focuses on the European Mediterranean countries and studies traditional seismic-resistant architectural elements and techniques that local populations developed to prevent or repair earthquake damage. This area was selected as a case study because, as a highly seismic region, it has suffered the effect of many earthquakes along the history and, thus, regions within this area are prone to have developed a Local Seismic Culture. After reviewing seismic resistant construction concepts, a wide range of traditional construction solutions that, in many cases, have shown to improve the seismic performance of vernacular constructions of these regions is presented, as a contribution to the general overview of retrofitting building systems provided in this book. The main motivation is that most of these techniques can be successfully applied to preserve and to retrofit surviving examples without prejudice for their identity.
Resumo:
Security risk management is by definition, a subjective and complex exercise and it takes time to perform properly. Human resources are fundamental assets for any organization, and as any other asset, they have inherent vulnerabilities that need to be handled, i.e. managed and assessed. However, the nature that characterize the human behavior and the organizational environment where they develop their work turn these task extremely difficult, hard to accomplish and prone to errors. Assuming security as a cost, organizations are usually focused on the efficiency of the security mechanisms implemented that enable them to protect against external attacks, disregarding the insider risks, which are much more difficult to assess. All these demands an interdisciplinary approach in order to combine technical solutions with psychology approaches in order to understand the organizational staff and detect any changes in their behaviors and characteristics. This paper intends to discuss some methodological challenges to evaluate the insider threats and its impacts, and integrate them in a security risk framework, that was defined according to the security standard ISO/IEC_JTC1, to support the security risk management process.
Resumo:
Information security is concerned with the protection of information, which can be stored, processed or transmitted within critical information systems of the organizations, against loss of confidentiality, integrity or availability. Protection measures to prevent these problems result through the implementation of controls at several dimensions: technical, administrative or physical. A vital objective for military organizations is to ensure superiority in contexts of information warfare and competitive intelligence. Therefore, the problem of information security in military organizations has been a topic of intensive work at both national and transnational levels, and extensive conceptual and standardization work is being produced. A current effort is therefore to develop automated decision support systems to assist military decision makers, at different levels in the command chain, to provide suitable control measures that can effectively deal with potential attacks and, at the same time, prevent, detect and contain vulnerabilities targeted at their information systems. The concept and processes of the Case-Based Reasoning (CBR) methodology outstandingly resembles classical military processes and doctrine, in particular the analysis of “lessons learned” and definition of “modes of action”. Therefore, the present paper addresses the modeling and design of a CBR system with two key objectives: to support an effective response in context of information security for military organizations; to allow for scenario planning and analysis for training and auditing processes.
Resumo:
[Extrat] The answer to the social and economic challenges that it is assumed literacy (or its lack) puts to developed countries deeply concerns public policies of governments namely those of the OECD area. In the last decades, these concerns gave origin to several and diverse monitoring devices, initiatives and programmes for reading (mainly) development, putting a strong stress on education. UNESCO (2006, p. 6), for instance, assumes that the literacy challenge can only be met raising the quality of primary and secondary education and intensifying programmes explicitly oriented towards youth and adult literacy. (...)
Resumo:
Open Display Networks have the potential to allow many content creators to publish their media to an open-ended set of screen displays. However, this raises the issue of how to match that content to the right displays. In this study, we aim to understand how the perceived utility of particular media sharing scenarios is affected by three independent variables, more specifically: (a) the locativeness of the content being shared; (b) how personal that content is and (c) the scope in which it is being shared. To assess these effects, we composed a set of 24 media sharing scenarios embedded with different treatments of our three independent variables. We then asked 100 participants to express their perception of the relevance of those scenarios. The results suggest a clear preference for scenarios where content is both local and directly related to the person that is publishing it. This is in stark contrast to the types of content that are commonly found in public displays, and confirms the opportunity that open displays networks may represent a new media for self-expression. This novel understanding may inform the design of new publication paradigms that will enable people to share media across the display networks.
Resumo:
Adolescents’ perceptions of parenting and family relationships are important variables for identifying mechanisms involved in how children acquire values and how these values are transmitted through families. In a sample of 515 adolescents, we investigated whether perceptions of the quality of parental practices would predict adolescents’ collectivist and individualist values. We hypothesized that perceived quality of family relations would mediate the relationship between the quality of parental practices and collectivist values but not of individualist values. The results of structural equation modeling suggested that perception of the quality of parental practices predicted adolescents’ both collectivist and individualist values. The predicted mediation effect was found for collectivist values, but not for individualist values. The results point to different functions of parenting and family relations on value acquisition. Implications for practice, such as the development and implementation of interventions to improve the formation of adolescents’ values by enhancing the quality of parenting and family relationships are discussed.
Resumo:
Dissertação de mestrado em Engenharia e Gestão da Qualidade
Resumo:
Dissertação de mestrado em Administração da Justiça
Resumo:
The links between gender, sex and sexuality and their relevance are theoretically and politically problematic (Richardson, 2007). One of the difficulties in understanding their interconnections is that these terms are often used differently and ambiguously by different authors (and even by the same authors). This article reports the results of an analysis of the articles published in open access communication journals with known impact factor, edited in Portugal and published between 2005 and 2012. The diverse conceptualisations of those three basic concepts and of their (inter)relationships within communication research are identified. The complexity and the intricate (and often implicit) nature of both the meanings of these categories and their relationships underlie and justify our attention and further research. What the findings suggest about the current communication research into gender issues published in the two journals surveyed is that the ‘Gender differences discourse’ (Sunderland, 2004) is the most pervasive discourse (also) in academic practice. Additionally, they show that gender and sex are mainly taken for a fact, not a question that is worth being studied. The editors of these journals, as well as the scholars submitting manuscripts, need to be more aware of the traditional nature of the theoretical and methodological choices that they make regarding gender- and sex-related issues, as well as of the relative lack of attention to sexuality as a research subject.
Resumo:
"Published online: 29 March 2016"
Resumo:
Dissertação de mestrado em Educação da Infância (área de especialização em Supervisão e Pedagogia da Infância)