787 resultados para Goal setting in personnel management


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Based on an online image archive documenting the construction and history of an early computing company, the fictional story of "Co-Operative Explanatory Capabilities in Organizational Design and Personnel Management” follows the development of an experimental approach to worker productivity into a religious cult. The project investigates the place of creativity in efficiency management and the operation of bureaucratic systems in a post-industrial work environment. The project has spawned a series of collages, featured on the Economic Thought Projects 7" collaboration with Gelbart, The Eleventh Voyage, as well as the film of Co-Operative Explanatory Capabilities in Organizational Design and Personnel Management, which has also been published as a short story in Vertigo of the Modern and on Sacrifice Press.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Limited data are available on the clinical impact of varicella in the ambulatory setting. Our goal was to determine real-life data on the clinical outcomes, medical management, and resource utilization in patients with varicella in Switzerland, a country without a universal immunization program against varicella. A total of 236 patients (222 = 94% primarily healthy individuals) with a clinical diagnosis of varicella were recruited by pediatricians and general practitioners. Age range of patients was 0-47 years with a median of 5 years. The great majority of patients (179 = 76%) were ingle cases and in the remaining 102 patients a total of 112 further cases of varicella occurred in their households. Of these, 17 (15%) were primary cases, 18 (16%) were co-primary cases, 75 (67%) were secondary cases, and 2 cases (2%) were not directly linked to the index case. A total of 29 complications were observed in 26 (11%) of 236 patients, none of them with a known underlying disease and all subsided without apparent sequelae. All complications occurred in children under 12 years of age. In conclusion, this study describes the spectrum of varicella in an out-patient setting with a sizeable rate of complications and raises the question of the value of prophylactic immunization.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Published also as v. 38, no. 1 (Summer 1989) of Library trends.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A joint project of the Chief Financial Officers Council and the Joint Financial Management Improvement Program.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study has explored the potential for implementing a merit-based public personnel system in The Bahamas, a former British colony in The Commonwealth Caribbean. Specifically, the study evaluated the use of merit-based public personnel management practices in areas of recruitment, selection, promotion, training and employee development and performance evaluation. Driving forces and barriers which impact merit system successes and failures as well as strategies for institutionalizing merit system practices are identified. Finally the study attempted to apply the developmental model created by Klingner (1996) to describe the stage of public personnel management in The Bahamas. The data for the study was collected through in-depth interviews with expert observers. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Chemical and physical restraints are frequently used in the intensive care unit (ICU) to control agitated patients and to prevent self-harm and unplanned extubations. Published work relating to the numerous issues of the care and treatment strategies for these patients remains conflicting and unclear. Literature regarding sedation and chemical restraint reveals a trend towards management with lighter sedation, use of sedation assessment tools and sedation protocols. It remains unclear which treatment is best for agitated and delirious patients, and the evidence on the effect of sedation is conflicting. A large portion of the literature on the use of physical restraint is from general hospital wards and residential homes, and not from the ICU environment. The purpose of this paper is to provide a summary of the existing literature on the use of physical and chemical restraints in the ICU setting. In Part 1 of this two-part paper, the evidence on chemical and physical restraints is explored with specific focus on definition of terms, unplanned

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An important goal of the care for the mechanically ventilated patient is to minimize patient discomfort and anxiety. This is partly achieved by frequent use of chemical and physical restraints. The majority of patients in intensive care will receive some form of sedation. The goal and use of sedation has changed considerably over the past few decades with literature evidencing trends toward overall lighter sedation levels and daily interruption of sedation. Conversely, the use of physical restraint for the ventilated patient in ICU differs considerably between nations and continents. A large portion of the literature on the use of physical restraint is from general hospital wards and residential homes, and not from the ICU environment. Recent literature suggests minimal use of physical restraint in the ICU, and that reduction programmes have been initiated. However, very few papers illuminate the patient's experience of physical and chemical restraints as a treatment strategy. In Part 1 of this two-part review, the evidence on chemical and physical restraints was explored with specific focus on definitions of terms, unplanned extubation, agitation, delirium as well as the impact of nurse–patient ratios in the ICU on these issues. This paper, Part 2, examines the evidence related to chemical and physical restraints from the mechanically ventilated patient's perspective.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Articles > Journals > Health journals > Nutrition & Dietetics: The Journal of the Dieticians Association of Australia articles > March 2003 Article: An assessment of the potential of Family Day Care as a nutrition promotion setting in South Australia. (Original Research). Article from:Nutrition & Dietetics: The Journal of the Dieticians Association of Australia Article date:March 1, 2003 Author:Daniels, Lynne A.; Franco, Bunny; McWhinnie, Julie-Anne CopyrightCOPYRIGHT 2006 Dietitians Association of Australia. This material is published under license from the publisher through the Gale Group, Farmington Hills, Michigan. All inquiries regarding rights or concerns about this content should be directed to customer service. (Hide copyright information) Related articles Ads by Google TAFE Child Care Courses Government accredited courses. Study anytime, anywhere. www.seeklearning.com.au Get Work in Child Care Certificate III Children's Services 4 Day Course + Take Home Assessment HBAconsult.com.au Abstract Objective: To assess the potential role of Family Day Care in nutrition promotion for preschool children. Design and setting: A questionnaire to examine nutrition-related issues and practices was mailed to care providers registered in the southern region of Adelaide, South Australia. Care providers also supplied a descriptive, qualitative recall of the food provided by parents or themselves to each child less than five years of age in their care on the day closest to completion of the questionnaire. Subjects: 255 care providers. The response rate was 63% and covered 643 preschool children, mean 4.6 (SD 2.8) children per carer. Results: There was clear agreement that nutrition promotion was a relevant issue for Family Day Care providers. Nutrition and food hygiene knowledge was good but only 54% of respondents felt confident to address food quality issues with parents. Sixty-five percent of respondents reported non-neutral approaches to food refusal and dawdling (reward, punishment, cajoling) that overrode the child's control of the amount eaten. The food recalls indicated that most children (> 75%) were offered fruit at least once. Depending on the hours in care, (0 to 4, 5 to 8, greater than 8 hours), 20%, 32% and 55%, respectively, of children were offered milk and 65%, 82% and 87%, respectively, of children were offered high fat and sugar foods. Conclusions: Questionnaire responses suggest that many care providers are committed to and proactive in a range of nutrition promotion activities. There is scope for strengthening skills in the management of common problems, such as food refusal and dawdling, consistent with the current evidence for approaches to early feeding management that promote the development of healthy food preferences and eating patterns. Legitimising and empowering care providers in their nutrition promotion role requires clear policies, guide lines, adequate pre- and in-service training, suitable parent materials, and monitoring.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.