13 resultados para security sector reform

em Aston University Research Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose – Seeks to examine how far Michael Lipsky's theory of discretion as it relates to public sector professionals as “street-level bureaucrats” is still applicable in the light of public sector reform and in particular the introduction of increased managerial control over professionals. Design/methodology/approach – The main thesis in Lipsky's work, Street-Level Bureaucracy, that street-level bureaucrats devise their own rules and procedures to deal with the dilemmas of policy implementation is linked to public sector reform over the past 25 years or so. The article differentiates between three forms of discretion, rule, task and value and assesses the extent to which these different forms of discretion have been compromised by reform. Examples are drawn principally from the literature on school teachers and social workers Findings – The findings suggest that the rule-making (hence bureaucratic) capacity of professionals at street-level is much less influential than before although it is questionable whether or not the greater accountability of professionals to management and clarity of the targets and objectives of organisations delivering public policy has liberated them from the dilemmas of street-level bureaucracy. Research limitations/implications – The work has focussed on the UK and in particular on two professions. However, it may be applied to any country which has undergone public sector reform and in particular where “new public management” processes and procedures have been implemented. There is scope for in-depth studies of a range of occupations, professional and otherwise in the UK and elsewhere. Practical implications – Policy makers and managers should consider how far the positive aspects of facilitating discretion in the workplace by reducing the need for “rule-making” to cope with dilemmas have been outweighed by increased levels of bureaucracy and the “de-skilling” of professionals. Originality/value – Lipsky's much cited and influential work is evaluated in the light of public sector reform some 25 years since it was published. The three forms of discretion identified offer the scope for their systematic application to the workplace.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Selection of a power market structure from the available alternatives is an important activity within an overall power sector reform programme. The evaluation criteria for selection are both subjective as well as objective in nature and the selection of alternatives is characterised by their conflicting nature. This study demonstrates a methodology for power market structure selection using the analytic hierarchy process (AHP), a multiple attribute decision-making technique, to model the selection methodology with the active participation of relevant stakeholders in a workshop environment. The methodology is applied to a hypothetical case of a State Electricity Board reform in India.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

It is generally believed that the structural reforms that were introduced in India following the macro-economic crisis of 1991 ushered in competition and forced companies to become more efficient. However, whether the post-1991 growth is an outcome of more efficient use of resources or greater use of factor inputs remains an open empirical question. In this paper, we use plant-level data from 1989–1990 and 2000–2001 to address this question. Our results indicate that while there was an increase in the productivity of factor inputs during the 1990s, most of the growth in value added is explained by growth in the use of factor inputs. We also find that median technical efficiency declined in all but one of the industries between 1989–1990 and 2000–2001, and that change in technical efficiency explains a very small proportion of the change in gross value added.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The protection of cyberspace has become one of the highest security priorities of governments worldwide. The EU is not an exception in this context, given its rapidly developing cyber security policy. Since the 1990s, we could observe the creation of three broad areas of policy interest: cyber-crime, critical information infrastructures and cyber-defence. One of the main trends transversal to these areas is the importance that the private sector has come to assume within them. In particular in the area of critical information infrastructure protection, the private sector is seen as a key stakeholder, given that it currently operates most infrastructures in this area. As a result of this operative capacity, the private sector has come to be understood as the expert in network and information systems security, whose knowledge is crucial for the regulation of the field. Adopting a Regulatory Capitalism framework, complemented by insights from Network Governance, we can identify the shifting role of the private sector in this field from one of a victim in need of protection in the first phase, to a commercial actor bearing responsibility for ensuring network resilience in the second, to an active policy shaper in the third, participating in the regulation of NIS by providing technical expertise. By drawing insights from the above-mentioned frameworks, we can better understand how private actors are involved in shaping regulatory responses, as well as why they have been incorporated into these regulatory networks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the UK, the government continues its project to reform public services. Earlier projects have focused on the modernization of public sector organizations; in the latest round of reform, New Labour has focused on widening choice and the personalization of services. To this end, the government has been working with Third Sector (TS) organizations to expand their role in shaping, commissioning and delivering public services. The government's vision is predicated on a normative assertion, that, unlike traditional public sector organizations, TS bodies create public value by being more innovative, are inspired by altruistic aims and values, and have greater commitment to their clients. This paper reviews recent policy and questions whether the government's policy is flawed, contradictory and risks damaging the attributes of the TS admired by New Labour. © 2007 The Author. Journal compilation © 2007 Blackwell Publishing Ltd.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper will seek to explicate the changes in the New Zealand health sector informed by the concepts of problematization, inscription and the construction of networks (Callon, 1986; Latour, 1987, 1993). This will involve applying a framework of interpretation based on the concepts of Latour's sociology of translation. Material on problematization and inscription will be incorporated into the paper in order to provide an explanatory frame of reference which will enable us to make sense of the processes of change in the New Zealand health sector. The sociology of translation will be used to explain the processes which underlie the changes and will be used to capture effects, such as changes in policy and structure, producing new networks within which 'allies' could be enrolled in support of the health reforms.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis examines the external activities of the European Union conducted in the wider Europe against the backdrop of eastern enlargement. It focuses on the technical aspects of EU diplomacy, using qualitative research methodology to study the programmes and initiatives launched since the year 2000 in the countries lying along the Union’s new border to the east. Drawing on evidence from Ukraine, it hypothesises that the EU is an agent of transformation in the eastern neighbourhood and that this transformation has important implications for the regional order in the post-Soviet space. The thesis constitutes an investigation into the transformational activities engaged by the EU in Ukraine conducted with an eye to their strategic implications. It documents and analyses three instances of EU intervention in Ukraine’s internal processes that relate to management of cross-border traffic in the Ukrainian-Russian borderland, restructuring of the country’s energy sector, and conduct of its contentious presidential election in 2004. It is argued that while these interventions have explicitly sought to advance the Union’s security with respect to certain twenty-first century transnational threats, they have at the same time served to confer important strategic advantages on the EU that include giving the bloc greater knowledge and control over developments in Ukraine and that contribute to the dismantling of infrastructural, institutional and other ties between Kiev and the other Soviet successor states, notably Russia. The effect of the European Union’s actions in the region, whether intended or not, has thus been to undermine any competing regional initiatives that cut across its own functions, and thereby to assert itself as the primary integration project in Europe. By showing how technical interventions in the politics, economics and administration of Ukraine can yield important geopolitical dividends, this thesis demonstrates that, in the context of EU external relations, high and low politics are interlinked.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent years, the European Union has come to view cyber security, and in particular, cyber crime as one of the most relevant challenges to the completion of its Area of Freedom, Security and Justice. Given European societies’ increased reliance on borderless and decentralized information technologies, this sector of activity has been identified as an easy target for actors such as organised criminals, hacktivists or terrorist networks. Such analysis has been accompanied by EU calls to step up the fight against unlawful online activities, namely through increased cooperation among law enforcement authorities (both national and extra- communitarian), the approximation of legislations, and public- private partnerships. Although EU initiatives in this field have, so far, been characterized by a lack of interconnection and an integrated strategy, there has been, since the mid- 2000s, an attempt to develop a more cohesive and coordinated policy. An important part of this policy is connected to the activities of Europol, which have come to assume a central role in the coordination of intelligence gathering and analysis of cyber crime. The European Cybercrime Center (EC3), which will become operational within Europol in January 2013, is regarded, in particular, as a focal point of the EU’s fight against this phenomenon. Bearing this background in mind, the present article wishes to understand the role of Europol in the development of a European policy to counter the illegal use of the internet. The article proposes to reach this objective by analyzing, through the theoretical lenses of experimental governance, the evolution of this agency’s activities in the area of cyber crime and cyber security, its positioning as an expert in the field, and the consequences for the way this policy is currently developing and is expected to develop in the near future.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis reports on a four-year field study conducted at the Saskatchewan regional office of the Department of Indian Affairs and Northern Development, a large department of the Government of Canada. Over the course of the study, a sweeping government-wide accounting reform took place entitled the Financial Information Strategy. An ethnographic study was conducted that documented the management accounting processes in place at the regional office prior to the Financial Information Strategy reform, the organization’s adoption of the new accounting system associated with this initiative, and the state of the organization’s management accounting system once the implementation was complete. This research, therefore, captures in detail a management accounting change process in a public sector organization. This study employs an interpretive perspective and draws on institution theory as a theoretical framework. The concept of loose coupling and insights from the literature on professions were also employed in the explanation-building process for the case. This research contributes to institution theory and the study of management accounting change by recognizing conflicting institutional forces at the organizational level. An existing Old Institutional Economics-based conceptual framework for management accounting change is advanced and improved upon through the development of a new conceptual framework that incorporates the influence of wider institutional forces, the concepts of open and closed organizational systems and loose coupling, and the recognition of varying rates of change and institutionalization of organizational activity sets. Our understanding of loose coupling is enhanced by the interpretation of institutional influences developed in this study as is the role of professionalization as a normative influence in public sector organizations.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Our research examines a key aspect of the extensive bureaucratic reform program that was applied to the Indonesian public sector following the Asian Economic crisis. The organisation we focus on is the Indonesian Directorate of Tax. The reforms moved the case organisation towards more bureaucratic organisational arrangements. The most notable elements of the reforms related to the organisational efficiency and changes in administrative style and culture. An ethnographic approach was adopted, in which the researcher was immersed in the life of the selected case organisation over an extended period of time. This research extends a thin literature on the topic of management control and culture in the Indonesian context. Also, this paper fills a gap in the theoretic approaches for studying bureaucracy, which is dominated by western conceptualisations. This paper provides a reminder to policy makers (including organisation such as the World Bank and the International Monetary Fund) of the consequences of neglecting cultural influences when conducting bureaucratic reform.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Over the past two decades, the Democratic People's Republic of Korea has allegedly developed nuclear energy while suffering near collapse caused by catastrophic economic policies. This article presents an evaluation of North Korea's contemporary energy policies and suggests that despite retaining communist ideals and "Chu'che" policies, North Korea has slowly started to modernise its energy sector and recognises the necessity to start engaging with the international community. While it is argued that Pyongyang's newfound concerns for sustainable development, equity and the environment are a welcomed departure from its usual belligerent rhetoric and present a number of exciting engagement opportunities, the regime has not abandoned its nuclear energy programme.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The aim of this special issue is to widen the existing debates on security privatization by looking at how and why an increasing number of private actors beyond private military and/or security companies (PMSCs) have come to perform various security related functions. While PMSCs produce security for profit, most other private sector actors make profit by selling goods and services that were originally not connected with security in the traditional understanding of the term. However, due to the continuous introduction of new legal and technical regulations by public authorities, many non- security related private businesses nowadays have to perform at least some security functions. Little research, however, has been done thus far, both in terms of security practices of non- security related private businesses and their impact on security governance. This introduction explains how this special issue contributes to closing this glaring gap by 1) extending the conceptual and theoretical arguments in the existing body of literature; and 2) offering a range of original case studies on the specific roles of non- security related private companies of all sizes, areas of businesses, and geographic origin.