852 resultados para Technology policy


Relevância:

40.00% 40.00%

Publicador:

Resumo:

Bibliography: leaf [9].

Relevância:

40.00% 40.00%

Publicador:

Resumo:

"OTA-CIT-147"--P. 4 of cover.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

State-owned enterprises in China have been given greater autonomy and responsibility, have freer access to foreign technology, and are being encouraged to form groups to gain from rationalization and integration. This article uses case studies to identify the key strategic issues that affect the commercial viability of foreign technology acquisition by state-owned enterprises within the context of enterprise reforms. All the case study enterprises used technology transfer to develop new or improved products. Technologies acquired as parts of subcontracting arrangements and well-established technologies to produce end-use products are easier to manage and operate profitably. However, the latter type of technology has been imported by numerous enterprises and has led to fierce competition and industy restructuring. Importing capital-intensive and complex technology to produce major components for products, such as cars, is more difficult and requires closer coordination with customers and suppliers.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The introduction of a micro-electronic based technology to the workplace has had a far reaching and widespread effect on the numbers and content of jobs. The importance of the implications of new technology were recognised by the trade unions, leading to a plethora of advice and literature in the late 70s and early 80s, notably the TUC 'Technology and Employment ' report. However, studies into the union response have consistently found an overall lack of influence by unions in the introduction of technology. Whilst the advent of new technology has coincided with an industrial relations climate of unprecedented hostility to union activity in the post-war period, there are structural weaknesses in unions in coming to terms with the process of technological change. In particular was the identification of a lack of suitable technological expertise. Addressing itself to this perceived weakness of the union response, this thesis is the outcome of a collaborative project between a national union and an academic institution. The thesis is based on detailed case studies concerning technology bargaining in the Civil Service and the response of the Civil and Public Services Associations (CPSA), the union that represents lower grade white collar civil servants. It is demonstrated that the application of expertise to union negotiators is insufficient on its own to extend union influence and that for unions to effectively come to terms with technology and influence its development requires a re-assessment across all spheres of union activity. It is suggested that this has repercussions for not only the internal organisation and quality of union policy formation and the extent, form and nature of collective bargaining with employer representatives, but also in the relationship with consumer and interest groups outside the traditional collective bargaining forum. Three policy options are developed in the thesis with the 'adversarial' and 'co~operative' options representing the more traditional reactive and passive forms of involvement. These are contrasted with an 'independent participative' form of involvement which was a 'pro-active' policy option and utilised the expertise of the Author in the CPSA's response to technological change.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The purpose of this study is to investigate empirically the role of innovation activity in Central and Eastern Europea (CEE). We also identified those internal and external factors, which might cause improvements in innovation performance of CEE companies. Our main focus was on technology-based innovations within the healthcare industry. We applied qualitative research methods. Our findings demonstrate that CEE companies within the healthcare industry have significant contribution to European Union’s innovation performance. We found that key success factors of these organizations are based on four elements: knowledge management, access to financial resources, managing formal and informal networks, as well as achieving synergies between technological and non-technological innovations.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Technology imbued m-marketing systems influence the consumptive lives of citizens, by facilitating anytime, anywhere business-to-consumer interactions. Business pundits’ enthusiasm towards mobile services (m-services) has been driven by the promise of a marketspace context involving seamless, business-to-consumer interactions that can be simultaneously impulse-driven, highly entertaining and omnipresent. Arguably, gambling too is impulse-driven, exciting and easily accessible. An important question that needs to be addressed is: how the convergence of mobile technology and gambling will impact the millennial consumer. The authors address this question by examining the contextually bounded interactions between internal and external factors that make mobile phone users potentially vulnerable during m-gambling interactions. By examining key themes that describe the convergence of m-technology and gambling, we clarify the experiential nature of m-gambling and its relationship to consumer vulnerability.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of healthcare services by making healthcare information available at the point of care (Goldstein, Groen, Ponkshe, and Wine, 2007). The increasing availability of healthcare data presents security and privacy issues which have not yet been fully addressed (Liu, Caelli, May, and Croll, 2008a). Healthcare organisations have to comply with the security and privacy requirements stated in laws, regulations and ethical standards, while managing healthcare information. Protecting the security and privacy of healthcare information is a very complex task (Liu, May, Caelli and Croll, 2008b). In order to simplify the complexity of providing security and privacy in HIS, appropriate information security services and mechanisms have to be implemented. Solutions at the application layer have already been implemented in HIS such as those existing in healthcare web services (Weaver et al., 2003). In addition, Discretionary Access Control (DAC) is the most commonly implemented access control model to restrict access to resources at the OS layer (Liu, Caelli, May, Croll and Henricksen, 2007a). Nevertheless, the combination of application security mechanisms and DAC at the OS layer has been stated to be insufficient in satisfying security requirements in computer systems (Loscocco et al., 1998). This thesis investigates the feasibility of implementing Security Enhanced Linux (SELinux) to enforce a Role-Based Access Control (RBAC) policy to help protect resources at the Operating System (OS) layer. SELinux provides Mandatory Access Control (MAC) mechanisms at the OS layer. These mechanisms can contain the damage from compromised applications and restrict access to resources according to the security policy implemented. The main contribution of this research is to provide a modern framework to implement and manage SELinux in HIS. The proposed framework introduces SELinux Profiles to restrict access permissions over the system resources to authorised users. The feasibility of using SELinux profiles in HIS was demonstrated through the creation of a prototype, which was submitted to various attack scenarios. The prototype was also subjected to testing during emergency scenarios, where changes to the security policies had to be made on the spot. Attack scenarios were based on vulnerabilities common at the application layer. SELinux demonstrated that it could effectively contain attacks at the application layer and provide adequate flexibility during emergency situations. However, even with the use of current tools, the development of SELinux policies can be very complex. Further research has to be made in order to simplify the management of SELinux policies and access permissions. In addition, SELinux related technologies, such as the Policy Management Server by Tresys Technologies, need to be researched in order to provide solutions at different layers of protection.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cultural policy settings attempting to foster the growth and development of the Australian feature film industry in era of globalisation are coming under increasing pressure. Global forces and emerging production and distribution models are challenging the “narrowness” of cultural policy – mandating a particular film culture, circumscribing certain notions of value and limiting the variety of films produced through cultural policy driven subvention models. Australian horror film production is an important case study. Horror films are a production strategy well suited to the financial limitations of the Australian film industry with competitive advantages for producers against international competitors. However, emerging within a “national” cinema driven by public subsidy and social/cultural objectives, horror films – internationally oriented with a low-culture status – have been severely marginalised within public funding environments. This paper introduces Australian horror film production, and examines the limitations of cultural policy, and the impacts of these questions for the Producer Offset.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This chapter reports on Australian and Swedish experiences in the iterative design, development, and ongoing use of interactive educational systems we call ‘Media Maps.’ Like maps in general, Media Maps are usefully understood as complex cultural technologies; that is, they are not only physical objects, tools and artefacts, but also information creation and distribution technologies, the use and development of which are embedded in systems of knowledge and social meaning. Drawing upon Australian and Swedish experiences with one Media Map technology, this paper illustrates this three-layered approach to the development of media mapping. It shows how media mapping is being used to create authentic learning experiences for students preparing for work in the rapidly evolving media and communication industries. We also contextualise media mapping as a response to various challenges for curriculum and learning design in Media and Communication Studies that arise from shifts in tertiary education policy in a global knowledge economy.