65 resultados para Business Administration, Entrepreneurship|Business Administration, Management|Political Science, International Law and Relations|Gender Studies


Relevância:

100.00% 100.00%

Publicador:

Resumo:

After the end of the Cold War, democratization and good governance became the organizing concepts for activities of the United Nations, regional organizations and states in the fields of peace, development and security. How can this increasing interest in democratization and its connection with international security be explained? This dissertation applies the theoretical tools developed by Michel Foucault in his discussions of disciplinarity and government to the analysis of the United Nations debate on democracy in the 1990s, and of two United Nations pro-democracy peacekeeping operations and their aftermath: the United Nations interventions in Haiti and Croatia. It probes “how” certain techniques of power came into being and describes their effects, using as data the texts that elaborate the United Nations understanding of democracy and the texts that constitute peacekeeping. ^ In the face of the proliferation of unpredictable threats in the last decades of the twentieth century a new form of international power emerged. Order in the international arena increasingly was maintained through activities aimed at reducing risk and increasing predictability through the normalization of “rogue” states. The dissertation shows that in the context of these activities, which included but were not limited to UN peacekeeping, normality was identified with democracy, non-democratic regimes with international threats, and democratization with international security. “Good governance” doctrines translated the political debate on democracy into the technical language of functioning state institutions. International organizations adopted good governance as the framework that made democratization a universal task within the reach of their expertise. In Haiti, the United Nations engaged in efforts to transform punishment institutions (the judiciary, police and the prison) into disciplined and disciplinary machines. In Croatia, agreements signed in the context of peacekeeping established in detail the rules of functioning of administrations and the monitoring mechanisms for their implementation. However, in Haiti, the institutions promoted were not sustainable. And in Croatia reforms are stalled by lack of consensus. ^ This dissertation puts efforts to bring about democracy through peacekeeping in the context of a specific modality of power and suggests caution in engaging in universal normalizing endeavors. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In a post-Cold War, post-9/11 world, the advent of US global supremacy resulted in the installation, perpetuation, and dissemination of an Absolutist Security Agenda (hereinafter, ASA). The US ASA explicitly and aggressively articulates and equates US national security interests with the security of all states in the international system, and replaced the bipolar, Cold War framework that defined international affairs from 1945-1992. Since the collapse of the USSR and the 11 September 2001 terrorist attacks, the US has unilaterally defined, implemented, and managed systemic security policy. The US ASA is indicative of a systemic category of knowledge (security) anchored in variegated conceptual and material components, such as morality, philosophy, and political rubrics. The US ASA is based on a logic that involves the following security components: (1) hyper militarization, (2) intimidation,(3) coercion, (4) criminalization, (5) panoptic surveillance, (6) plenary security measures, and (7) unabashed US interference in the domestic affairs of select states. Such interference has produced destabilizing tensions and conflicts that have, in turn, produced resistance, revolutions, proliferation, cults of personality, and militarization. This is the case because the US ASA rests on the notion that the international system of states is an extension, instrument of US power, rather than a system and/or society of states comprised of functionally sovereign entities. To analyze the US ASA, this study utilizes: (1) official government statements, legal doctrines, treaties, and policies pertaining to US foreign policy; (2) militarization rationales, budgets, and expenditures; and (3) case studies of rogue states. The data used in this study are drawn from information that is publicly available (academic journals, think-tank publications, government publications, and information provided by international organizations). The data supports the contention that global security is effectuated via a discrete set of hegemonic/imperialistic US values and interests, finding empirical expression in legal acts (USA Patriot ACT 2001) and the concept of rogue states. Rogue states, therefore, provide test cases to clarify the breadth, depth, and consequentialness of the US ASA in world affairs vis-à-vis the relationship between US security and global security.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This dissertation addresses the following research question: in a particular policy area, why do countries that display unanimity in their international policy behavior diverge from each other in their domestic policy actions? I address this question in the context of the divergent domestic competition policy actions undertaken by developing countries during the period 1996-2007, after these countries had quite conspicuously displayed near-unanimity in opposing this policy measure at the World Trade Organization (WTO). This divergence is puzzling because (a) it does not align with their near-unanimous behavior at the WTO over competition policy and (b) it is at variance with the objectives of their international opposition to this policy at the WTO. Using an interdisciplinary approach, this dissertation examines the factors responsible for this divergence in the domestic competition policy actions of developing countries. ^ The theoretical structure employed in this study is the classic second-image-reversed framework in international relations theory that focuses on the domestic developments in various countries following an international development. Methodologically, I employ both quantitative and qualitative methods of analysis to ascertain the nature of the relationship between the dependent variable and the eight explanatory variables that were identified from existing literature. The data on some of the key variables used in this dissertation was uniquely created over a multi-year period through extensive online research and represents the most comprehensive and updated dataset currently available. ^ The quantitative results obtained from logistic regression using data on 131 countries point toward the significant role played by international organizations in engineering change in this policy area in developing countries. The qualitative analysis consisting of three country case studies illuminate the channels of influence of the explanatory variables and highlight the role of domestic-level factors in these three carefully selected countries. After integrating the findings from the quantitative and qualitative analyses, I conclude that a mix of international- and domestic-level variables explains the divergence in domestic competition policy actions among developing countries. My findings also confirm the argument of the second-image-reversed framework that, given an international development or situation, the policy choices that states make can differ from each other and are mediated by domestic-level factors. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The object of this dissertation is to record and analyze the foreign policy of the Sultanate of Oman from the early twentieth century until 2004. It challenges the central assumption of the contemporary scholarship on the subject that Muscat's modern foreign policy begins in 1970. It is often presumed that the pre-1970 era does not merit a thorough investigation to understand Muscat's modus operandi today. This study argues that for a comprehensive understanding of Muscat's foreign policy since 1970, the frontier of the historical analysis of Oman's regional and international involvement should be pushed back to the 1930's, when the young Sultan Said assumed power over the country divided by the "Treaty" or the "Agreement" of Sib. Indeed, the thrust of this research lies at once in repudiating the conventional wisdom regarding both the persona of Sultan Said and the customary political/historical narrative of Said's reign. The critical analysis of this period is utilized to rebut the pervasive and largely inaccurate historical narrative of the events prior to 1970, to recount an original interpretation of the period, and to use the narrative as a preamble for subsequent foreign policy directions and initiatives. Furthermore, this dissertation covers the gaps in the literature resulting from the absence of any materials that either record or analyze Muscat's foreign policy from 1996 until 2004. In addition, his study provides new information and a fresh analysis of the international relations of the region, including great power rivalry, especially the competition between the United States and Great Britain, and the attitudes of major regional actors, such as Iran, Saudi Arabia, and Iraq. ^ The use of a thorough historical inquiry is vital to support the central claim of this dissertation; therefore, a large section of this dissertation is based almost exclusively on archival materials collected from the British Public Records Office, the University of Oxford and the Library of Congress. This project represents the most comprehensive use of archival materials on the subject matter to date. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study has explored the potential for implementing a merit-based public personnel system in The Bahamas, a former British colony in The Commonwealth Caribbean. Specifically, the study evaluated the use of merit-based public personnel management practices in areas of recruitment, selection, promotion, training and employee development and performance evaluation. Driving forces and barriers which impact merit system successes and failures as well as strategies for institutionalizing merit system practices are identified. Finally the study attempted to apply the developmental model created by Klingner (1996) to describe the stage of public personnel management in The Bahamas. The data for the study was collected through in-depth interviews with expert observers. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Private nonprofit human service organizations provide a spectrum of services that aim to resolve societal problems. Their failure may leave needed and desired services unprovided or not provided sufficiently to meet public demand. However, the concept of organizational failure has not been examined for the nonprofit organization. This research addresses the deficiency in the literatures of organization failure and nonprofit organizations.^ An eight category typology, developed from a review of the current literature and findings from expert interviews, is initially presented to define nonprofit organization failure. A multiple case study design is used to test the typology in four nonprofit human service delivery agencies. The case analysis reduces the typology to five types salient to nonprofit organization failure: input failure, legitimacy failure, adaptive failure, management failure and leadership failure.^ The resulting five category typology is useful to both theory builders and nonprofit practitioners. For theory development, the interaction of the failure types extends the literature and lays a foundation for a theory of nonprofit organization failure that diffuses management and leadership across all of the failure types, highlights management and leadership failure as collective functions shared by paid staff and the volunteer board of directors, and emphasizes the importance of organization legitimacy.^ From a practical perspective, the typology provides a tool for diagnosing failure in the nonprofit organization. Using the management indicators developed for the typology, a checklist of the warning signals of potential failure, emphasizing the key types of management and leadership, offers nonprofit decision makers a priori examination of an organization's propensity for failure. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The dissertation takes a multivariate approach to answer the question of how applicant age, after controlling for other variables, affects employment success in a public organization. In addition to applicant age, there are five other categories of variables examined: organization/applicant variables describing the relationship of the applicant to the organization; organization/position variables describing the target position as it relates to the organization; episodic variables such as applicant age relative to the ages of competing applicants; economic variables relating to the salary needs of older applicants; and cognitive variables that may affect the decision maker's evaluation of the applicant. ^ An exploratory phase of research employs archival data from approximately 500 decisions made in the past three years to hire or promote applicants for positions in one public health administration organization. A logit regression model is employed to examine the probability that the variables modify the effect of applicant age on employment success. A confirmatory phase of the dissertation is a controlled experiment in which hiring decision makers from the same public organization perform a simulated hiring decision exercise to evaluate hypothetical applicants of similar qualifications but of different ages. The responses of the decision makers to a series of bipolar adjective scales add support to the cognitive component of the theoretical model of the hiring decision. A final section contains information gathered from interviews with key informants. ^ Applicant age has tended to have a curvilinear relationship with employment success. For some positions, the mean age of the applicants most likely to succeed varies with the values of the five groups of moderating variables. The research contributes not only to the practice of public personnel administration, but is useful in examining larger public policy issues associated with an aging workforce. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In his study - File Control: The Heart Of Business Computer Management - William G. O'Brien, Assistant Professor, The School of Hospitality Management at Florida International University, initially informs you: “Even though computers are an everyday part of the hospitality industry, many managers lack the knowledge and experience to control and protect the files in these systems. The author offers guidelines which can minimize or prevent damage to the business as a whole.” Our author initially opens this study with some anecdotal instances illustrating the failure of hospitality managers to exercise due caution with regard to computer supported information systems inside their restaurants and hotels. “Of the three components that make up any business computer system (data files, programs, and hard-ware), it is files that are most important, perhaps irreplaceable, to the business,” O’Brien informs you. O’Brien breaks down the noun, files, into two distinct categories. They are, the files of extrinsic value, and its counterpart the files of intrinsic value. An example of extrinsic value files would be a restaurant’s wine inventory. “As sales are made and new shipments are received, the computer updates the file,” says O’Brien. “This information might come directly from a point-of-sale terminal or might be entered manually by an employee,” he further explains. On the intrinsic side of the equation, O’Brien wants you to know that the information itself is the valuable part of this type of file. Its value is over and above the file’s informational purpose as a pragmatic business tool, as it is in inventory control. “The information is money in the legal sense For instance, figures moved about in banking system computers do not represent dollars; they are dollars,” O’Brien explains. “If the record of a dollar amount is erased from all computer files, then that money ceases to exist,” he warns. This type of information can also be bought and sold, such as it is in customer lists to advertisers. Files must be protected O’Brien stresses. “File security requires a systematic approach,” he discloses. O’Brien goes on to explain important elements to consider when evaluating file information. File back-up is also an important factor to think about, along with file storage/safety concerns. “Sooner or later, every property will have its fire, flood, careless mistake, or disgruntled employee,” O’Brien closes. “…good file control can minimize or prevent damage to the business as a whole.”

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis examines two research questions: (1) Why do Multinational Enterprises (MNEs) try to influence trade negotiations in the Latin American context? and (2) How do MNEs influence the trade negotiation process in Latin America? The results show that the MNE's main reasons for participation are: (1) to gain market access and, specifically, to reduce tariff and non-tariff barriers; (2) to create a beneficial regulatory environment for the MNE; and (3) to set the rules of the game by influencing the business environment in which its industry or its specific company is required to operate. The main approaches reported by the interviewees as to how MNEs participate are: (1) the MNE directly lobbies domestic government officials, principally the United States Trade Representative office; (2) a business, trade or industry association lobbies domestic government officials on the MNE's behalf; and (3) the MNE lobbies Congress.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

While most studies take a dyadic view when examining the environmental difference between the home country of a multinational enterprise (MNE) and a particular foreign country, they ignore that an MNE is managing a network of subsidiaries embedded in diverse environments. Additionally, neither the impacts of global environments on top executives nor the effects of top executives’ capabilities to handle institutional complexity are fully explored. Thus, using a three-essay format, this dissertation tried to fill these gaps by addressing the effects of institutional complexity and top management characteristics on top executive compensation and firm performance. ^ Essay 1 investigated the impact of an MNE’s institutional complexity, or the diversity of national institutions facing an MNE’s network of subsidiaries, on the top management team (TMT) compensation. This essay proposed that greater political and cultural complexity leads to not only greater TMT total compensation but also to a greater portion of TMT compensation linked with long-term performance. The arguments are supported in this essay by using an unbalanced panel dataset including 296 U.S. firms with 1,340 observations. ^ Essay 2 explored TMT social capital and its moderating role on value creation and appropriation by the chief executive officer (CEO). Using a sample with 548 U.S. firms and 2,010 observations, it found that greater TMT social capital does facilitate the effects of CEO intellectual capital and social capital on firm growth. Finally, essay 3 examined the performance implications for the fit between managerial information-processing capabilities and institutional complexity. It proposed that institutional complexity is associated with the needs of information-processing. On the other hand, smaller TMT turnover and larger TMT size reflect larger managerial information-processing capabilities. Consequently, superior performance is achieved by the match among institutional complexity, TMT turnover, and TMT size. All hypotheses in essay 3 are supported in a sample of 301 U.S. firms and 1,404 observations. ^ To conclude, this dissertation advances and extends our knowledge on the roles of institutional environments and top executives on firm performance and top executive compensation.^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This dissertation examines the consequences of Electronic Data Interchange (EDI) use on interorganizational relations (IR) in the retail industry. EDI is a type of interorganizational information system that facilitates the exchange of business documents in structured, machine processable form. The research model links EDI use and three IR dimensions--structural, behavioral, and outcome. Based on relevant literature from organizational theory and marketing channels, fourteen hypotheses were proposed for the relationships among EDI use and the three IR dimensions.^ Data were collected through self-administered questionnaires from key informants in 97 retail companies (19% response rate). The hypotheses were tested using multiple regression analysis. The analysis supports the following hypothesis: (a) EDI use is positively related to information intensity and formalization, (b) formalization is positively related to cooperation, (c) information intensity is positively related to cooperation, (d) conflict is negatively related to performance and satisfaction, (e) cooperation is positively related to performance, and (f) performance is positively related to satisfaction. The results support the general premise of the model that the relationship between EDI use and satisfaction among channel members has to be viewed within an interorganizational context.^ Research on EDI is still in a nascent stage. By identifying and testing relevant interorganizational variables, this study offers insights for practitioners managing boundary-spanning activities in organizations using or planning to use EDI. Further, the thesis provides avenues for future research aimed at understanding the consequences of this interorganizational information technology. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Today, many organizations are turning to new approaches to building and maintaining information systems (I/S) to cope with a highly competitive business environment. Current anecdotal evidence indicates that the approaches being used improve the effectiveness of software development by encouraging active user participation throughout the development process. Unfortunately, very little is known about how the use of such approaches enhances the ability of team members to develop I/S that are responsive to changing business conditions.^ Drawing from predominant theories of organizational conflict, this study develops and tests a model of conflict among members of a development team. The model proposes that development approaches provide the relevant context conditioning the management and resolution of conflict in software development which, in turn, are crucial for the success of the development process.^ Empirical testing of the model was conducted using data collected through a combination of interviews with I/S executives and surveys of team members and business users at nine organizations. Results of path analysis provide support for the model's main prediction that integrative conflict management and distributive conflict management can contribute to I/S success by influencing differently the manifestation and resolution of conflict in software development. Further, analyses of variance indicate that object-oriented development, when compared to rapid and structured development, appears to produce the lowest levels of conflict management, conflict resolution, and I/S success.^ The proposed model and findings suggest academic implications for understanding the effects of different conflict management behaviors on software development outcomes, and practical implications for better managing the software development process, especially in user-oriented development environments. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Database design is a difficult problem for non-expert designers. It is desirable to assist such designers during the problem solving process by means of a knowledge based (KB) system. A number of prototype KB systems have been proposed, however there are many shortcomings. Few have incorporated sufficient expertise in modeling relationships, particularly higher order relationships. There has been no empirical study that experimentally tested the effectiveness of any of these KB tools. Problem solving behavior of non-experts, whom the systems were intended to assist, has not been one of the bases for system design. In this project a consulting system for conceptual database design that addresses the above short comings was developed and empirically validated.^ The system incorporates (a) findings on why non-experts commit errors and (b) heuristics for modeling relationships. Two approaches to knowledge base implementation--system restrictiveness and decisional guidance--were used and compared in this project. The Restrictive approach is proscriptive and limits the designer's choices at various design phases by forcing him/her to follow a specific design path. The Guidance system approach which is less restrictive, provides context specific, informative and suggestive guidance throughout the design process. The main objectives of the study are to evaluate (1) whether the knowledge-based system is more effective than a system without the knowledge-base and (2) which knowledge implementation--restrictive or guidance--strategy is more effective. To evaluate the effectiveness of the knowledge base itself, the two systems were compared with a system that does not incorporate the expertise (Control).^ The experimental procedure involved the student subjects solving a task without using the system (pre-treatment task) and another task using one of the three systems (experimental task). The experimental task scores of those subjects who performed satisfactorily in the pre-treatment task were analyzed. Results are (1) The knowledge based approach to database design support lead to more accurate solutions than the control system; (2) No significant difference between the two KB approaches; (3) Guidance approach led to best performance; and (4) The subjects perceived the Restrictive system easier to use than the Guidance system. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Research on the adoption of innovations by individuals has been criticized for focusing on various factors that lead to the adoption or rejection of an innovation while ignoring important aspects of the dynamic process that takes place. Theoretical process-based models hypothesize that individuals go through consecutive stages of information gathering and decision making but do not clearly explain the mechanisms that cause an individual to leave one stage and enter the next one. Research on the dynamics of the adoption process have lacked a structurally formal and quantitative description of the process. ^ This dissertation addresses the adoption process of technological innovations from a Systems Theory perspective and assumes that individuals roam through different, not necessarily consecutive, states, determined by the levels of quantifiable state variables. It is proposed that different levels of these state variables determine the state in which potential adopters are. Various events that alter the levels of these variables can cause individuals to migrate into different states. ^ It was believed that Systems Theory could provide the required infrastructure to model the innovation adoption process, particularly applied to information technologies, in a formal, structured fashion. This dissertation assumed that an individual progressing through an adoption process could be considered a system, where the occurrence of different events affect the system's overall behavior and ultimately the adoption outcome. The research effort aimed at identifying the various states of such system and the significant events that could lead the system from one state to another. By mapping these attributes onto an “innovation adoption state space” the adoption process could be fully modeled and used to assess the status, history, and possible outcomes of a specific adoption process. ^ A group of Executive MBA students were observed as they adopted Internet-based technological innovations. The data collected were used to identify clusters in the values of the state variables and consequently define significant system states. Additionally, events were identified across the student sample that systematically moved the system from one state to another. The compilation of identified states and change-related events enabled the definition of an innovation adoption state-space model. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In recent years, a surprising new phenomenon has emerged in which globally-distributed online communities collaborate to create useful and sophisticated computer software. These open source software groups are comprised of generally unaffiliated individuals and organizations who work in a seemingly chaotic fashion and who participate on a voluntary basis without direct financial incentive. ^ The purpose of this research is to investigate the relationship between the social network structure of these intriguing groups and their level of output and activity, where social network structure is defined as (1) closure or connectedness within the group, (2) bridging ties which extend outside of the group, and (3) leader centrality within the group. Based on well-tested theories of social capital and centrality in teams, propositions were formulated which suggest that social network structures associated with successful open source software project communities will exhibit high levels of bridging and moderate levels of closure and leader centrality. ^ The research setting was the SourceForge hosting organization and a study population of 143 project communities was identified. Independent variables included measures of closure and leader centrality defined over conversational ties, along with measures of bridging defined over membership ties. Dependent variables included source code commits and software releases for community output, and software downloads and project site page views for community activity. A cross-sectional study design was used and archival data were extracted and aggregated for the two-year period following the first release of project software. The resulting compiled variables were analyzed using multiple linear and quadratic regressions, controlling for group size and conversational volume. ^ Contrary to theory-based expectations, the surprising results showed that successful project groups exhibited low levels of closure and that the levels of bridging and leader centrality were not important factors of success. These findings suggest that the creation and use of open source software may represent a fundamentally new socio-technical development process which disrupts the team paradigm and which triggers the need for building new theories of collaborative development. These new theories could point towards the broader application of open source methods for the creation of knowledge-based products other than software. ^