85 resultados para GESTÃO DE SISTEMAS DE SEGURANÇA

em Universidade Federal do Rio Grande do Norte(UFRN)


Relevância:

90.00% 90.00%

Publicador:

Resumo:

The present work was carried through in the Grossos city - RN and had as main objectives the elaboration of an physicist-ambient, socioeconomic survey and execution a multisecular evaluation of 11 years, between 1986 and 1996, using remote sensing products, to evaluate the modifications of the land use, aiming at the generation of an information database to implementation a geographical information system (GIS) to management the this city. For they had been in such a way raised given referring the two Demographic Censuses carried through by the IBGE (1991 and 2000) and compared, of this form was possible to the accomplishment of an evaluation on the demographic aspects (degree of urbanization, etária structure, educational level) and economic (income, habitation, vulnerability, human development). For the ambient physical survey the maps of the natural resources had been confectioned (simplified geology, hydrography, geomorphologi, veget covering, ground association, use and occupation), based in comments of field and orbital products of remote sensoriamento (images Spot-HRVIR, Landsat 5-TM and IKONOS - II), using itself of techniques of digital picture processing. The survey of these data and important in the identification of the potentialities and fragilities of found ecosystems, therefore allows an adequate planning of the partner-economic development by means of an efficient management. The project was part of a partnership between the Grossos city hall the municipal City hall of Grossos - RN and the Geoscience post-graduate program of the UFRN, more specifically the Geomatica laboratory LAGEOMA

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Este estudo aborda a utilização da tecnologia da informação de forma competitiva em um Arranjo Produtivo Local APL. Realizou-se no APL da carcinicultura no Estado do Rio Grande do Norte e teve por objetivo buscar a compreensão de como o uso da tecnologia da informação (TI) contribui para o aumento da competitividade na atividade do APL citado. APL pode ser conceituado como uma aliança entre organizações que possuem um projeto coletivo, para elevar a sua competitividade e participação no mercado. Para atingir este objetivo, foi realizada uma pesquisa descritiva, através da utilização de múltiplos casos selecionados dentre as empresas que compõem o APL da carcinicultura no RN. Os dados coletados foram analisados qualitativamente. Os resultados da pesquisa indicaram que as empresas percebem a importância do uso da TI, mas que, na prática, a sua utilização é limitada, principalmente em se tratando de Sistemas Integrados de Gestão e Comércio Eletrônico. Outro resultado encontrado foi que as empresas, embora façam parte do APL, ainda não colaboram entre si, seja através da troca de informações, ou através de Sistemas de Informação Interorganizacional. As principais recomendações diante destes resultados é que as empresas atuem ativamente para o fortalecimento do APL. No que se refere ao uso da TI faz-se necessário que elas invistam na aquisição de sistemas integrados de gestão e sistemas de informação interorganizacional para o melhor gerenciamento das informações ao longo da cadeia

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Este estudo aborda a utilização da tecnologia da informação de forma competitiva em um Arranjo Produtivo Local (APL). Realizou-se no APL da carcinicultura no Estado do Rio Grande do Norte e teve por objetivo buscar a compreensão de como o uso da tecnologia da informação (TI) contribui para o aumento da competitividade na atividade do APL citado. APL pode ser conceituado como uma aliança entre organizações que possuem um projeto coletivo, para elevar a sua competitividade e participação no mercado. Para atingir este objetivo, foi realizada uma pesquisa descritiva, através da utilização de múltiplos casos selecionados dentre as empresas que compõem o APL da carcinicultura no RN. Os dados coletados foram analisados qualitativamente. Os resultados da pesquisa indicaram que as empresas percebem a importância do uso da TI, mas que, na prática, a sua utilização é limitada, principalmente em se tratando de Sistemas Integrados de Gestão e Comércio Eletrônico. Outro resultado encontrado foi que as empresas, embora façam parte do APL, ainda não colaboram entre si, seja através da troca de informações, ou através de Sistemas de Informação Interorganizacional. As principais recomendações diante destes resultados é que as empresas atuem ativamente para o fortalecimento do APL. No que se refere ao uso da TI faz-se necessário que elas invistam na aquisição de sistemas integrados de gestão e sistemas de informação interorganizacional para o melhor gerenciamento das informações ao longo da cadeia

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This work provides great contribution to the documental study of the Work Safety courses offered by CEFETs in Brazil, under the perspective of safety management and occupational health, using as a referential the specification OHSAS 18001 (BSI, 1999), as well as directions provided by OIT (ILO, 2001). The theoretical research compares technical and managing competences of the projects of Work Safety courses at CEFETs with the international legislation mentioned above. For field research, questionnaires containing open and close questions were answered by teachers and students aiming at identifying the importance of technical and managing competences for the formation of Work Safety technicians, besides trying to identify which level of minimal formal knowledge should be required to perform managing activities in the area of Work Safety Management Systems and Occupational Health (SGSSO, in Portuguese). The results of the theoretical research point out differences between the projects of the Work Safety technical courses at CEFETs under the perspective of SGSSO. The field research shows that students and teachers opinions converge about most technical and managing competences. In relation to academic formation, the research suggests divergences to the criterion stated by the norm ISO 19011(ABNT, 2002)

Relevância:

40.00% 40.00%

Publicador:

Resumo:

RAMOS, A. S. M.; OLIVEIRA, M. A. Fatores de sucesso na implementação de sistemas integrados de gestão empresarial (ERP): estudo de caso em uma média empresa. In: ENCONTRO NACIONAL DE ENGENHARIA DE PRODUÇÂO, 22., 2002, Curitiba-PR. Anais... Porto Alegre-RS: ABEPRO, 2002. v. 1.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The IT capability is a organizational ability to perform activities of this role more effectively and an important mechanism in creating value. Its building process (stages of creation and development) occurs through management initiatives for improvement in the performance of their activities, using human resources and IT assets complementary responsible for the evolution of their organizational routines. This research deals with the IT capabilities related to SIG (integrated institutional management systems), built and deployed in UFRN (Universidade Federal do Rio Grande do Norte) to realization and control of administrative, academic and human resources activities. Since 2009, through cooperative agreements with federal and educational institutions of direct administration, UFRN has supported the implementation of these systems, currently involving more than 30 institutions. The present study aims to understand how IT capabilities, relevant in the design, implementation and dissemination of SIG, were built over time. This is a single case study of qualitative and longitudinal nature, performed by capturing, coding and analysis from secondary data and from semi-structured interviews conducted primarily with members of Superintenência de Informática, organizational unit responsible for SIG systems in UFRN. As a result, the technical, of internal relationship and external cooperation capabilities were identified as relevant in the successful trajectory of SIG systems, which have evolved in different ways. The technical capacity, initiated in 2004, toured the stages of creation and development until it reached the stage of stability in 2013, due to technological limits. Regarding the internal relationship capability, begun in 2006, it toured the stages of creation and development, having extended its scope of activities in 2009, being in development since then. Unlike the standard life cycle observed in the literature, the external cooperation capability was initiated by an intensity of initiatives and developments in the routines in 2009, which were decreasing to cease in 2013 in order to stabilize the technological infrastructure already created for cooperative institutions. It was still identified the start of cooperation in 2009 as an important event selection, responsible for changing or creating trajectories of evolution in all three capacities. The most frequent improvements initiatives were of organizational nature and the internal planning activity has been transformed over the routines of the three capabilities. Important resources and complementary assets have been identified as important for the realization of initiatives, such as human resources technical knowledge to the technical capabilities and external cooperation, and business knowledge, for all of them, as well as IT assets: the iproject application for control of development processes, and the document repository wiki. All these resources and complementary assets grew along the capacities, demonstrating its strategic value to SINFO/UFRN

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This study examines the factors that influence public managers in the adoption of advanced practices related to Information Security Management. This research used, as the basis of assertions, Security Standard ISO 27001:2005 and theoretical model based on TAM (Technology Acceptance Model) from Venkatesh and Davis (2000). The method adopted was field research of national scope with participation of eighty public administrators from states of Brazil, all of them managers and planners of state governments. The approach was quantitative and research methods were descriptive statistics, factor analysis and multiple linear regression for data analysis. The survey results showed correlation between the constructs of the TAM model (ease of use, perceptions of value, attitude and intention to use) and agreement with the assertions made in accordance with ISO 27001, showing that these factors influence the managers in adoption of such practices. On the other independent variables of the model (organizational profile, demographic profile and managers behavior) no significant correlation was identified with the assertions of the same standard, witch means the need for expansion researches using such constructs. It is hoped that this study may contribute positively to the progress on discussions about Information Security Management, Adoption of Safety Standards and Technology Acceptance Model

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The research aimed to understand the challenges for the implementation of the proposed integration between the Civil Police and the Military Police in Rio Grande do Norte to the proposals of the SUSP. This study aimed to explore the gap with regard to the deepening of the possible causes that may hinder the implementation of integrated working between the police in public security, through a specific analysis on the state of Rio Grande do Norte. Was based on a theoretical framework that includes policies: general concepts, the steps of a public policy, the implementation stage , public security : conceptual definitions, policies on security in Brazil, the structure of public security in Brazil and systems police, Military Police x Civil Police: Roles and conflicts , integrating public security: the challenges to be overcome, the Unified public Safety (SUSP) and the main difficulties in the integration of the police. Being classified as to the purposes as an exploratory research on how to approach ranks as qualitative. The research unit was the Center for Integrated Operations Public Safety (CIOSP) through three subjects who were the chief CIOSP, the representative of the military police acting with the CIOSP, and representative civil police also active with the CIOSP. These subjects were chosen because of the understanding that individuals occupying senior positions would have more ability to respond to questions that guide the research problem. Data were collected through a set of interviews, qualitative data analysis was performed based content analysis, based on the definition of categories of analysis, gated time cross. With the results, it was revealed that the main problems of integration between the state police are treatment protocols, lack of political will and lack of infrastructure. The relationship between the Military Police and Civil Police in Rio Grande do Norte has differing cultural aspect, but can be considered as good value, professionalism and integrated operations. The implementation of CIOSP-RN followed the characteristics of the top-down model, the main difficulties in implementing the proposals of the SUSP, lack of own resources, the lack of standardization in public safety and the lack of professional training of public safety. It was concluded that with respect to the challenges to the implementation of the proposed integration between the Civil Police and the Military Police in Rio Grande do Norte to the proposals of the SUSP, the actions follow the characteristics of the top-down model, with no autonomy of administrators public to say in decisions, which restricts the view of the public safety of the state

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The commitment assumed by Brazil to ILO in order to pursue actions toward the ILO/OSH-2001 adoption in the country poses the issue of modeling the institutional arrangement the set roles and relationship between government, standards organizations, health and safety organizations, professionals and other institutions to deploy the ILO/OSH-2001. This Thesis develop institutional arrangement models based on the current model and also in the ISO 9000 scheme and others. It is studied the US case with OSHA and VPP, the OHSAS 18001 and ANSI/AIHA Z-10, in addition to actual context of the regulating norms NR s. The scenarios developed are put to evaluation on feasibility, potential changes and effects on current MTE auditors work scheme. The main results are five scenarios developed and that the MTE auditors tend to be reactive to the change toward the ILO/OSH-2001.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This Master s Thesis deals with an analysis of the Regulatory Standards NR-9 e NR-13 on the perspective of occupational health and safety management systems (OHSMS) such as ILO deployed ILO/OSH-2001. Since the revamped OHSAS 18001:2007 complies with the ILO/OSH-2001 model it is used as benchmark to compare against the NR-9 and NR-13. The analysis suggests that the NR-9 has some important features present on the OHSAS 18001:2007 but lacks important others. The NR-13 turns out to be far from a modern model of OHSMS such as OHSAS 18001:2007 and a deep reformulation should be done in order to achieve the Brazil commitment with ILO to adopt OHSMS. Also, a small survey with companies with ISO 9000 certificates suggests that a NR-13 revised toward OHSMS would be welcome, but also that some more advanced issues present in ILO/OSH-2001 should be imposed by law in order to be achieved

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Information is one of the most valuable organization s assets, mainly on a global and highly competitive world. On this scenery there are two antagonists forces: on one side, organizations struggle for keeping protected its information, specially those considered as strategic, on the other side, the invaders, leaded by innumerous reasons - such as hobby, challenge or one single protest with the intention of capturing and corrupting the information of other organizations. This thesis presents the descriptive results of one research that had as its main objective to identify which variables influence the Executives´ and CIOs´ perceptions toward Information Security. In addition, the research also identified the profile of Rio Grande do Norte s organizations and its Executives/CIOs concerning Information Security, computed the level of agreement of the respondents according to NBR ISO/IEC 17799 (Information technology Code of practice for information security management) on its dimension Access Control. The research was based on a model, which took into account the following variables: origin of the organization s capital, sector of production, number of PCs networked, number of employees with rights to network, number of attacks suffered by the organizations, respondent´s positions, education level, literacy on Information Technology and specific training on network. In the goal´s point of view, the research was classified as exploratory and descriptive, and, in relation of the approach, quantitative. One questionnaire was applied on 33 Executives and CIOs of the 50 Rio Grande do Norte s organizations that collected the highest taxes of ICMS - Imposto sobre Circulação de Mercadorias on 2000. After the data collecting, cluster analysis and chi-square statistical tools were used for data analysis. The research made clear that the Executives and CIOs of Rio Grande do Norte s organizations have low level of agreement concerning the rules of the NBR ISO/IEC 17799. It also made evident that the Executives and CIOs have its perception toward Information Security influenced by the number of PCs networked and by the number of attacks suffered by the organizations

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The importance of the airport sector in the development of a country refers to the need for studies on management of airports, to aid the process of decision making. In Brazil, growth in passenger demand is why investments in order to balance the capacity of an airport with air demand. Thus, the study aims to develop a model for Dynamic Systems able to assist airport management in Brazilian sizing subsystems an airport (Passenger Terminal, Runway and Patio). The methodology of this work consists in the steps of defining the problem, formulating the hypothesis dynamic building simulation model, and validation experiments. Finally, we examined the status of each subsystem in thirteen Brazilian airports in scenarios current, most likely and optimistic for air passenger demand

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This thesis aims at analyzing from the perspective of the manager the importance of the use of quality management tools and concepts in Federal Universities. It was motivated by the following research problem: do Federal University managers consider it to be relevant the quality management in their institution? Therefore, we sought to gather evidence for a satisfactory approach that addresses the complexity of the topic researched: quality, higher education and quality management systems. We chose to adopt an applied study, the exploratory-descriptive research as to the objective and the quantitative and qualitative research as to the approach to the problem. The object of study is composed by the Planning Provosts of Federal Universities listed in the University Ranking Sheet - (RUF) in 2013. We chose to restrict the sample listing only the provosts of the 20 best-placed universities in the ranking of the Federal Universities. The research instrument was composed of 26 questions, of which 6 questions were designed to identify the profile of the manager, 16 questions of perception (manifested variables) on the importance of quality management in the University, where the managers assigned values (answers) to the affirmatives (that address the main topic of this thesis) based on a Likert scale of 5 points, and 4 open and optional questions, in order to identify general management practices used. It was used for statistical analysis (data analysis) descriptive and factorial statistics. The responses collected through the questionnaire portray the managers´ perception regarding the importance of quality management in their institutions. Sixteen variables were addressed, the results of factor analysis of importance were "Important" and "Very Important", where the variable (V2) was "Important" and all others "Very important." With this information, it is possible to prioritize some areas that deserve immediate action. As it was observed that some variables are "Very important" for the vast majority of managers, others did not show the same result as example (V2, V10, V11). It is concluded that the manager´s perception of quality management in his or her institution is relevant, but the same importance is not given to quality programs implemented in other segments of the economy, and that, despite the advancements offered by SINAES, the model does not evaluate the institution in a global way. Thus, with the results, it is expected to contribute to the advancement of the subject, trying to arouse interest from the managers of Federal Universities in the subject, emphasizing the importance of quality management systems as a necessary tool to raise the institutional quality

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Attacks to devices connected to networks are one of the main problems related to the confidentiality of sensitive data and the correct functioning of computer systems. In spite of the availability of tools and procedures that harden or prevent the occurrence of security incidents, network devices are successfully attacked using strategies applied in previous events. The lack of knowledge about scenarios in which these attacks occurred effectively contributes to the success of new attacks. The development of a tool that makes this kind of information available is, therefore, of great relevance. This work presents a support system to the management of corporate security for the storage, retrieval and help in constructing attack scenarios and related information. If an incident occurs in a corporation, an expert must access the system to store the specific attack scenario. This scenario, made available through controlled access, must be analyzed so that effective decisions or actions can be taken for similar cases. Besides the strategy used by the attacker, attack scenarios also exacerbate vulnerabilities in devices. The access to this kind of information contributes to an increased security level of a corporation's network devices and a decreased response time to occurring incidents

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The academic community and software industry have shown, in recent years, substantial interest in approaches and technologies related to the area of model-driven development (MDD). At the same time, continues the relentless pursuit of industry for technologies to raise productivity and quality in the development of software products. This work aims to explore those two statements, through an experiment carried by using MDD technology and evaluation of its use on solving an actual problem under the security context of enterprise systems. By building and using a tool, a visual DSL denominated CALV3, inspired by the software factory approach: a synergy between software product line, domainspecific languages and MDD, we evaluate the gains in abstraction and productivity through a systematic case study conducted in a development team. The results and lessons learned from the evaluation of this tool within industry are the main contributions of this work