31 resultados para Private security sector


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The advent of personal communication systems within the last decade has depended upon the utilization of advanced digital schemes for source and channel coding and for modulation. The inherent digital nature of the communications processing has allowed the convenient incorporation of cryptographic techniques to implement security in these communications systems. There are various security requirements, of both the service provider and the mobile subscriber, which may be provided for in a personal communications system. Such security provisions include the privacy of user data, the authentication of communicating parties, the provision for data integrity, and the provision for both location confidentiality and party anonymity. This thesis is concerned with an investigation of the private-key and public-key cryptographic techniques pertinent to the security requirements of personal communication systems and an analysis of the security provisions of Second-Generation personal communication systems is presented. Particular attention has been paid to the properties of the cryptographic protocols which have been employed in current Second-Generation systems. It has been found that certain security-related protocols implemented in the Second-Generation systems have specific weaknesses. A theoretical evaluation of these protocols has been performed using formal analysis techniques and certain assumptions made during the development of the systems are shown to contribute to the security weaknesses. Various attack scenarios which exploit these protocol weaknesses are presented. The Fiat-Sharmir zero-knowledge cryptosystem is presented as an example of how asymmetric algorithm cryptography may be employed as part of an improved security solution. Various modifications to this cryptosystem have been evaluated and their critical parameters are shown to be capable of being optimized to suit a particular applications. The implementation of such a system using current smart card technology has been evaluated.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We have recently proposed the framework of independent blind source separation as an advantageous approach to steganography. Amongst the several characteristics noted was a sensitivity to message reconstruction due to small perturbations in the sources. This characteristic is not common in most other approaches to steganography. In this paper we discuss how this sensitivity relates the joint diagonalisation inside the independent component approach, and reliance on exact knowledge of secret information, and how it can be used as an additional and inherent security mechanism against malicious attack to discovery of the hidden messages. The paper therefore provides an enhanced mechanism that can be used for e-document forensic analysis and can be applied to different dimensionality digital data media. In this paper we use a low dimensional example of biomedical time series as might occur in the electronic patient health record, where protection of the private patient information is paramount.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A method is proposed to offer privacy in computer communications, using symmetric product block ciphers. The security protocol involved a cipher negotiation stage, in which two communicating parties select privately a cipher from a public cipher space. The cipher negotiation process includes an on-line cipher evaluation stage, in which the cryptographic strength of the proposed cipher is estimated. The cryptographic strength of the ciphers is measured by confusion and diffusion. A method is proposed to describe quantitatively these two properties. For the calculation of confusion and diffusion a number of parameters are defined, such as the confusion and diffusion matrices and the marginal diffusion. These parameters involve computationally intensive calculations that are performed off-line, before any communication takes place. Once they are calculated, they are used to obtain estimation equations, which are used for on-line, fast evaluation of the confusion and diffusion of the negotiated cipher. A technique proposed in this thesis describes how to calculate the parameters and how to use the results for fast estimation of confusion and diffusion for any cipher instance within the defined cipher space.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The aim of this research is to assess the acquisition and absorption technology capabilities of the public sector in developing countries, with specific focus on the State of Kuwait. The assessment process of these two capabilities was conducted using a model originally designed for the private sector. In addition, the research aims to propose a framework to enhance the technological capability of developing countries, as well as the performance of the public sector. To achieve these aims, an investigation of the technology process to three public ministries in Kuwait was conducted. The prime interest of this investigation was to evaluate the role of the transferred technology in enhancing the indigenous technological capability of the public sector. The research is based on a case study approach, comprising a main case study (Ministry of Electricity and Water) and three minor case studies. Based on the outcomes from an extensive literature review and the preliminary sectoral visits, the research question and four hypotheses were formulated. These hypotheses were then tested using interview-based survey and documentation. The findings of the research revealed the weakness of the acquisition and absorption technological capabilities of the public sector. Consequently, the public sector relies extensively on foreign contractors and expatriates to compensate for this weakness. Also, it was found that Kuwait Government has not taken the necessary measures to develop its technological capability. This research has proposed a framework which could lead, if properly managed, to the enhancement of indigenous capability. It has also proposed how to improve performance and productivity in the public sector. Finally, the findings suggest that the assessment model, with minor adjustment, is applicable to the public sector.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Increasingly managers in the public sector are being required to manage change, but many of the models of change which are available to them have been developed from private sector experience. There is a need to understand more about how the change process unfolds in the public sector. A case study of change in one local authority over the period 1974-87 is provided. The events surrounding housing decentralisation and the introduction of community development are considered in detail. To understand these events a twofold model of change is proposed: a short wave model which explains a change project or event; and a long wave model which considers how these projects or events might be linked together to provide a picture of an organisation over a longer period. The short wave model identifies multiple triggers of change and signals the importance of mediators in recognising these triggers. The extent to which new ideas are implemented and the pace of their adoption is influenced by the balance of power within the organisation and the political tactics which are used. Broad phases in the change process can be identified, but there is not a simple linear passage through these. The long wave model considers the way in which continuity and change feed off one another. It suggests that periods of relative stability may be interspersed with more radical transformations as the dominant paradigm guiding the organisation shifts. However, such paradigmatic shifts in local government may be less obvious than in the private sector due to the diverse nature of the former.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

While much has been discussed about the relationship between ownership and financial performance of banks in emerging markets, literature about cross-ownership differences in credit market behaviour of banks in emerging economies is sparse. Using a portfolio choice model and bank-level data from India for 9 years (1995–96 to 2003–04), we examine banks’ behaviour in the context of credit markets of an emerging market economy. Our results indicate that, in India, the data for the domestic banks fit well the aforementioned portfolio-choice model, especially for private banks, but the model cannot explain the behaviour of foreign banks. In general, allocation of assets between risk-free government securities and risky credit is affected by past allocation patterns, stock exchange listing (for private banks), risk averseness of banks, regulations regarding treatment of NPA, and ability of banks to recover doubtful credit. It is also evident that banks deal with changing levels of systematic risk by altering the ratio of securitized to non-securitized credit.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Private ownership of firms is often argued to lead to better firm performance than public ownership. However, the theoretical literature and the empirical evidence indicate that agency problems may affect the performance of privately owned firms. At the same time, competition and hard budget constraints can induce state-owned firms to operate efficiently. In India, banking sector reforms and deregulation were initiated in 1992, encouraging entry and establishing a level playing field for all banks. Data for the financial years 1995–1996 through 2000–2001 suggest that, by 1999–2000, ownership was no longer a significant determinant of performance. Rather, competition induced public-sector banks to eliminate the performance gap that existed between them and both domestic and foreign private-sector banks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis addresses the question of how business schoolsestablished as public privatepartnerships (PPPs) within a regional university in the English-speaking Caribbean survived for over twenty-one years and achieved legitimacy in their environment. The aim of the study was to examine how public and private sector actors contributed to the evolution of the PPPs. A social network perspective provided a broad relational focus from which to explore the phenomenon and engage disciplinary and middle-rangetheories to develop explanations. Legitimacy theory provided an appropriate performance dimension from which to assess PPP success. An embedded multiple-case research design, with three case sites analysed at three levels including the country and university environment, the PPP as a firm and the subgroup level constituted the methodological framing of the research process. The analysis techniques included four methods but relied primarily on discourse and social network analysis of interview data from 40 respondents across the three sites. A staged analysis of the evolution of the firm provided the ‘time and effects’ antecedents which formed the basis for sense-making to arrive at explanations of the public-private relationship-influenced change. A conceptual model guided the study and explanations from the cross-case analysis were used to refine the process model and develop a dynamic framework and set of theoretical propositions that would underpin explanations of PPP success and legitimacy in matched contexts through analytical generalisation. The study found that PPP success was based on different models of collaboration and partner resource contribution that arose from a confluence of variables including the development of shared purpose, private voluntary control in corporate governance mechanisms and boundary spanning leadership. The study contributes a contextual theory that explains how PPPs work and a research agenda of ‘corporate governance as inspiration’ from a sociological perspective of ‘liquid modernity’. Recommendations for policy and management practice were developed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Guest editorial Ali Emrouznejad is a Senior Lecturer at the Aston Business School in Birmingham, UK. His areas of research interest include performance measurement and management, efficiency and productivity analysis as well as data mining. He has published widely in various international journals. He is an Associate Editor of IMA Journal of Management Mathematics and Guest Editor to several special issues of journals including Journal of Operational Research Society, Annals of Operations Research, Journal of Medical Systems, and International Journal of Energy Management Sector. He is in the editorial board of several international journals and co-founder of Performance Improvement Management Software. William Ho is a Senior Lecturer at the Aston University Business School. Before joining Aston in 2005, he had worked as a Research Associate in the Department of Industrial and Systems Engineering at the Hong Kong Polytechnic University. His research interests include supply chain management, production and operations management, and operations research. He has published extensively in various international journals like Computers & Operations Research, Engineering Applications of Artificial Intelligence, European Journal of Operational Research, Expert Systems with Applications, International Journal of Production Economics, International Journal of Production Research, Supply Chain Management: An International Journal, and so on. His first authored book was published in 2006. He is an Editorial Board member of the International Journal of Advanced Manufacturing Technology and an Associate Editor of the OR Insight Journal. Currently, he is a Scholar of the Advanced Institute of Management Research. Uses of frontier efficiency methodologies and multi-criteria decision making for performance measurement in the energy sector This special issue aims to focus on holistic, applied research on performance measurement in energy sector management and for publication of relevant applied research to bridge the gap between industry and academia. After a rigorous refereeing process, seven papers were included in this special issue. The volume opens with five data envelopment analysis (DEA)-based papers. Wu et al. apply the DEA-based Malmquist index to evaluate the changes in relative efficiency and the total factor productivity of coal-fired electricity generation of 30 Chinese administrative regions from 1999 to 2007. Factors considered in the model include fuel consumption, labor, capital, sulphur dioxide emissions, and electricity generated. The authors reveal that the east provinces were relatively and technically more efficient, whereas the west provinces had the highest growth rate in the period studied. Ioannis E. Tsolas applies the DEA approach to assess the performance of Greek fossil fuel-fired power stations taking undesirable outputs into consideration, such as carbon dioxide and sulphur dioxide emissions. In addition, the bootstrapping approach is deployed to address the uncertainty surrounding DEA point estimates, and provide bias-corrected estimations and confidence intervals for the point estimates. The author revealed from the sample that the non-lignite-fired stations are on an average more efficient than the lignite-fired stations. Maethee Mekaroonreung and Andrew L. Johnson compare the relative performance of three DEA-based measures, which estimate production frontiers and evaluate the relative efficiency of 113 US petroleum refineries while considering undesirable outputs. Three inputs (capital, energy consumption, and crude oil consumption), two desirable outputs (gasoline and distillate generation), and an undesirable output (toxic release) are considered in the DEA models. The authors discover that refineries in the Rocky Mountain region performed the best, and about 60 percent of oil refineries in the sample could improve their efficiencies further. H. Omrani, A. Azadeh, S. F. Ghaderi, and S. Abdollahzadeh presented an integrated approach, combining DEA, corrected ordinary least squares (COLS), and principal component analysis (PCA) methods, to calculate the relative efficiency scores of 26 Iranian electricity distribution units from 2003 to 2006. Specifically, both DEA and COLS are used to check three internal consistency conditions, whereas PCA is used to verify and validate the final ranking results of either DEA (consistency) or DEA-COLS (non-consistency). Three inputs (network length, transformer capacity, and number of employees) and two outputs (number of customers and total electricity sales) are considered in the model. Virendra Ajodhia applied three DEA-based models to evaluate the relative performance of 20 electricity distribution firms from the UK and the Netherlands. The first model is a traditional DEA model for analyzing cost-only efficiency. The second model includes (inverse) quality by modelling total customer minutes lost as an input data. The third model is based on the idea of using total social costs, including the firm’s private costs and the interruption costs incurred by consumers, as an input. Both energy-delivered and number of consumers are treated as the outputs in the models. After five DEA papers, Stelios Grafakos, Alexandros Flamos, Vlasis Oikonomou, and D. Zevgolis presented a multiple criteria analysis weighting approach to evaluate the energy and climate policy. The proposed approach is akin to the analytic hierarchy process, which consists of pairwise comparisons, consistency verification, and criteria prioritization. In the approach, stakeholders and experts in the energy policy field are incorporated in the evaluation process by providing an interactive mean with verbal, numerical, and visual representation of their preferences. A total of 14 evaluation criteria were considered and classified into four objectives, such as climate change mitigation, energy effectiveness, socioeconomic, and competitiveness and technology. Finally, Borge Hess applied the stochastic frontier analysis approach to analyze the impact of various business strategies, including acquisition, holding structures, and joint ventures, on a firm’s efficiency within a sample of 47 natural gas transmission pipelines in the USA from 1996 to 2005. The author finds that there were no significant changes in the firm’s efficiency by an acquisition, and there is a weak evidence for efficiency improvements caused by the new shareholder. Besides, the author discovers that parent companies appear not to influence a subsidiary’s efficiency positively. In addition, the analysis shows a negative impact of a joint venture on technical efficiency of the pipeline company. To conclude, we are grateful to all the authors for their contribution, and all the reviewers for their constructive comments, which made this special issue possible. We hope that this issue would contribute significantly to performance improvement of the energy sector.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis is about the discretionary role of the line manager in inspiring the work engagement of staff and their resulting innovative behaviour examined through the lens of Social Exchange Theory (Blau, 1964) and the Job Demands-Resources theory (Bakker, Demerouti, Nachreiner & Schaufeli, 2001). The study is focused on a large British Public Sector organisation undergoing a major organisational shift in the way in which they operate as part of the public sector. It is often claimed that people do not leave organisations; they leave line managers (Kozlowski & Doherty, 1989). Regardless of the knowledge in the literature concerning the importance of the line manager in organisations (Purcell, 2003), the engagement literature in particular is lacking in the consideration of such a fundamental figure in organisational life. Further, the understanding of the black box of managerial discretion and its relationship to employee and organisation related outcomes would benefit from greater exploration (Purcell, 2003; Gerhart, 2005; Scott, et al, 2009). The purpose of this research is to address these gaps with relation to the innovative behaviour of employees in the public sector – an area that is not typically associated with the public sector (Bhatta, 2003; McGuire, Stoner & Mylona, 2008; Hughes, Moore & Kataria, 2011). The study is a CASE Award PhD thesis, requiring academic and practical elements to the research. The study is of one case organisation, focusing on one service characterised by a high level of adoption of Strategic Human Resource Management activities and operating in a rather unique manner for the public sector, having private sector competition for work. The study involved a mixed methods approach to data collection. Preliminary focus groups with 45 participants were conducted, followed by an ethnographic period of five months embedded into the service conducting interviews and observations. This culminated in a quantitative survey delivered within the wider directorate to approximately 500 staff members. The study used aspects of the Grounded Theory (Glaser & Strauss, 1967) approach to analyse the data and developed results that highlight the importance of the line manager in an area characterised by SHRM and organisational change for engaging employees and encouraging innovative behaviour. This survey was completed on behalf of the organisation and the findings of this are presented in appendix 1, in order to keep the focus of the PhD on theory development. Implications for theory and practice are discussed alongside the core finding. Line managers’ discretion surrounding the provision of job resources (in particular trust, autonomy and implementation and interpretation of combined bundles of SHRM policies and procedures) influenced the exchange process by which employees responded with work engagement and innovative behaviour. Limitations to the research are the limitations commonly attributed to cross-sectional data collection methods and those surrounding generalisability of the qualitative findings outside of the contextual factors characterising the service area. Suggestions for future research involve addressing these limitations and further exploration of the discretionary role with regards to extending our understanding of line manager discretion.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Completing projects faster than the normal duration is always a challenge to the management of any project, as it often demands many paradigm shifts. Opportunities of globalization, competition from private sectors and multinationals force the management of public sector organizations in the Indian petroleum sector to take various aggressive strategies to maintain their profitability. Constructing infrastructure for handling petroleum products is one of them. Moreover, these projects are required to be completed in faster duration compared to normal schedules to remain competitive, to get faster return on investment, and to give longer project life. However, using conventional tools and techniques of project management, it is impossible to handle the problem of reducing the project duration from a normal period. This study proposes the use of concurrent engineering in managing projects for radically reducing project duration. The phases of the project are accomplished concurrently/simultaneously instead of in a series. The complexities that arise in managing projects are tackled through restructuring project organization, improving management commitment, strengthening project-planning activities, ensuring project quality, managing project risk objectively and integrating project activities through management information systems. These would not only ensure completion of projects in fast track, but also improve project effectiveness in terms of quality, cost effectiveness, team building, etc. and in turn overall productivity of the project organization would improve.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this article we evaluate the most widely used spread decomposition models using Exchange Traded Funds (ETFs). These funds are an example of a basket security and allow the diversification of private information causing these securities to have lower adverse selection costs than individual securities. We use this feature as a criterion for evaluating spread decomposition models. Comparisons of adverse selection costs for ETF's and control securities obtained from spread decomposition models show that only the Glosten-Harris (1988) and the Madhavan-Richardson-Roomans (1997) models provide estimates of the spread that are consistent with the diversification of private information in a basket security. Our results are robust even after controlling for the stock exchange. © 2011 Copyright Taylor and Francis Group, LLC.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper is motivated by the recent debate on the existence and scale of China's 'Guo Jin Min Tui' phenomenon, which is often translated as 'the state sector advances and the private sector retreats'. We argue that the profound implication of an advancing state sector is not the size expansion of the state ownership in the economy per se, but the likely retardation of the development of the already financially constrained private sector and the issues around the sustainability of the already weakening Chinese economy growth. Drawing on recent methodological advances, we provide a critical analysis of the contributions of the state and non-state sectors in the aggregate Total Factor Productivity and its growth over the period of 1998-2007 to verify the existence of GJMT and its possible impacts on Chinese economic growth. Overall, we find strong and consistent evidence of a systematic and worsening resource misallocation within the state sector and/or between the state sectors and private sectors over time. This suggests that non-market forces allow resources to be driven away from their competitive market allocation and towards the inefficient state sector. Crown Copyright © 2014.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Entrepreneurs in emerging market economies operate in weak institutional contexts, which can imply different types of government. In some countries (e.g., Russia), the government is predatory, and the main risk faced by (successful) entrepreneurs relates to expropriation. In other countries (like China) this kind of risk is lower; nevertheless the government is intrusive, and the rules of the game remain fluid. The implication of the latter for entrepreneurs is that they are more likely to spend time and resources on influence (rent seeking) activities rather than on productive activities.We illustrate this type of government by focusing on the distribution of subsidies in China.We present a simple formalmodel that explores not only the direct effects of rent seeking for a company but also externalities under a situation of policy-generated uncertainty in the distribution of subsidies.We explore how these effects differ for the entrepreneurial sector (young, private and small companies) compared with other sectors. We posit that while the performance of private companies is more affected than the performance of state firms, the impact of government-induced uncertainty on young and small companies is actually less pronounced. Our empirical analysis, based on a unique large dataset of 2.4 million observations on Chinese companies, takes advantage of the regional and sectoral heterogeneity of China for empirical tests.