979 resultados para Internal organization


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Digital image

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Certain software products employing digital techniques for encryption of data are subject to export controls in the EU Member States pursuant to Community law and relevant laws in the Member States. These controls are agreed globally in the framework of the so-called Wassenaar Arrangement. Wassenaar is an informal non-proliferation regime aimed at promoting international stability and responsibility in transfers of strategic (dual-use) products and technology. This thesis covers provisions of Wassenaar, Community export control laws and export control laws of Finland, Sweden, Germany, France and United Kingdom. This thesis consists of five chapters. The first chapter discusses the ratio of export control laws and the impact they have on global trade. The ratio is originally defence-related - in general to prevent potential adversaries of participating States from having the same tools, and in particular in the case of cryptographic software to enable signals intelligence efforts. Increasingly as the use of cryptography in a civilian context has mushroomed, export restrictions can have negative effects on civilian trade. Information security solutions may also be took weak because of export restrictions on cryptography. The second chapter covers the OECD's Cryptography Policy, which had a significant effect on its member nations' national cryptography policies and legislation. The OECD is a significant organization,because it acts as a meeting forum for most important industrialized nations. The third chapter covers the Wassenaar Arrangement. The Arrangement is covered from the viewpoint of international law and politics. The Wassenaar control list provisions affecting cryptographic software transfers are also covered in detail. Control lists in the EU and in Member States are usually directly copied from Wassenaar control lists. Controls agreed in its framework set only a minimum level for participating States. However, Wassenaar countries can adopt stricter controls. The fourth chapter covers Community export control law. Export controls are viewed in Community law as falling within the domain of Common Commercial Policy pursuant to Article 133 of the EC Treaty. Therefore the Community has exclusive competence in export matters, save where a national measure is authorized by the Community or falls under foreign or security policy derogations established in Community law. The Member States still have a considerable amount of power in the domain of Common Foreign and Security Policy. They are able to maintain national export controls because export control laws are not fully harmonized. This can also have possible detrimental effects on the functioning of internal market and common export policies. In 1995 the EU adopted Dual-Use Regulation 3381/94/EC, which sets common rules for exports in Member States. Provisions of this regulation receive detailed coverage in this chapter. The fifth chapter covers national legislation and export authorization practices in five different Member States - in Finland, Sweden, Germany, France and in United Kingdom. Export control laws of those Member States are covered when the national laws differ from the uniform approach of the Community's acquis communautaire. Keywords: export control, encryption, software, dual-use, license, foreign trade, e-commerce, Internet

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Digital image

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Corporate governance mandates and listing rules identify internal audit functions (IAF) as a central internal control mechanism. External audits are expected to assess the quality of IAF before placing reliance on its work. We provide evidence on the effect of IAF quality and IAF contribution to external audit on audit fees. Using data from a matched survey of both external and internal audits, we extend prior research which is based mainly on internal audits' assessment and conducted predominantly in highly developed markets. We find a positive relationship between IAF quality and audit fees as well as a reduction in audit fees as a result of external auditors' reliance on IAF. The interaction between IAF quality and IAF contribution to external audit suggests that high quality IAF induces greater external auditor reliance on internal auditors' work and thus result in lower external audit fees.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Transition protein 1 (TP1) and TP2 replace histones during midspermiogenesis (stages 12-15) and are finally replaced by protamines. TPs play a predominant role in DNA condensation and chromatin remodeling during mammalian spermiogenesis. TP2 is a zinc metalloprotein with two novel zinc finger modules that condenses DNA in vitro in a GC-preference manner. TP2 also localizes to the nucleolus in transfected HeLa and Cos-7 cells, suggesting a GC-rich preference, even in vivo. We have now studied the localization pattern of TP2 in the rat spermatid nucleus. Colocalization studies using GC-selective DNA-binding dyes chromomycin A3 and 7-amino actinomycin D and an AT-selective dye, 4',6-diamidino-2-phenylindole, indicate that TP2 is preferentially localized to GC-rich sequences. Interestingly, as spermatids mature, TP2 and GC-rich DNA moves toward the nuclear periphery, and in the late stages of spermatid maturation, TP2 is predominantly localized at the nuclear periphery. Another interesting observation is the mutually exclusive localization of GC- and AT-rich DNA in the elongating and elongated spermatids. A combined immunofluorescence experiment with anti-TP2 and anti-TP1 antibodies revealed several foci of overlapping localization, indicating that TP1 and TP2 may have concerted functional roles during chromatin remodeling in mammalian spermiogenesis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study explores the decline of terrorism by conducting source-based case studies on two left-wing terrorist campaigns in the 1970s, those of the Rode Jeugd in the Netherlands and the Symbionese Liberation Army in the United States. The purpose of the case studies is to bring more light into the interplay of different external and internal factors in the development of terrorist campaigns. This is done by presenting the history of the two chosen campaigns as narratives from the participants’ points of view, based on interviews with participants and extensive archival material. Organizational resources and dynamics clearly influenced the course of the two campaigns, but in different ways. This divergence derives at least partly from dissimilarities in organizational design and the incentive structure. Comparison of even these two cases shows that organizations using terrorism as a strategy can differ significantly, even when they share ideological orientation, are of the same size and operate in the same time period. Theories on the dynamics of terrorist campaigns would benefit from being more sensitive to this. The study also highlights that the demise of a terrorist organization does not necessarily lead to the decline of the terrorist campaign. Therefore, research should look at the development of terrorist activity beyond the lifespan of a single organization. The collective ideological beliefs and goals functioned primarily as a sustaining force, a lens through which the participants interpreted all developments. On the other hand, it appears that the role of ideology should not be overstated. Namely, not all participants in the campaigns under study fully internalized the radical ideology. Rather, their participation was mainly based on their friendship with other participants. Instead of ideology per se, it is more instructive to look at how those involved described their organization, themselves and their role in the revolutionary struggle. In both cases under study, the choice of the terrorist strategy was not merely a result of a cost-benefit calculation, but an important part of the participants’ self-image. Indeed, the way the groups portrayed themselves corresponded closely with the forms of action that they got involved in. Countermeasures and the lack of support were major reasons for the decline of the campaigns. However, what is noteworthy is that the countermeasures would not have had the same kind of impact had it not been for certain weaknesses of the groups themselves. Moreover, besides the direct impact the countermeasures had on the campaign, equally important was how they affected the attitudes of the larger left-wing community and the public in general. In this context, both the attitudes towards the terrorist campaign and the authorities were relevant to the outcome of the campaigns.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Knowledge-sharing in a teamwork The study examines the link between knowledge-sharing that takes place in a team and the dimensions and objectives of the team s activities. The question the study poses is: How does knowledge-sharing in a team relate to the team s activities? The exchange of knowledge is examined using knowledge-sharing networks and the conversion model, which describes the process of knowledge formation. The answer to the question is sought through four empirical articles describing the activities of a team from the viewpoint of quality, fairness, power related to knowledge management, and performance. One of the articles used in the study describes the role of networks in work life more generally. It attempts to shed light on the manner in which team-related networks operate as part of a more extensive structure of organizational networks. Finland is one of the most eager users of teamwork, if numbers are used as a yardstick. About half of all Finnish wage earners worked in teams in 2009, and comparisons show that the use of teams in Finland is above the EU average. This study focuses on so-called semi-autonomous teams, which carry out permanent work tasks. In such teams, tasks are interdependent, and teams are jointly responsible for ensuring that the work is done. Team members may also, at least to some extent, agree between themselves on how the tasks are carried out and are able to take part in the decision-making process. Such teamwork makes knowledge-sharing an important element for the team s activities. Knowledge and knowledge-sharing have become a major resource, allowing organizations to operate and even compete in today s increasingly competitive markets. A single team or a single organization cannot, however, possess all the knowledge required for carrying out the tasks assigned to it. Although it is difficult to copy the knowledge generated in an organization, it is important to share the knowledge within and between organizations. External links supply teams and organizations with important knowledge that allows them to keep their operations up-to-date and their structures well-functioning. In fact, knowledge provides teams and organizations with an intangible resource that improves their capacity to interact with their environment and to adjust to it. For this reason, it is important to examine both the internal and external knowledge-sharing taking place in a team. The findings of the study show that in terms of quality, fairness, performance and the knowledge management issues concerning a team, its social network structure is both internally and externally connected with its activities. A team structure that is internally coherent and at the same time open to external contacts, is, with certain restrictions, connected with the quality, fairness, and performance of the team. The restrictions concern differences between procedural and interactional justice, public and private sectors, and the team leaders and ordinary team members. The role of the team leader is closely connected with the management of networks that are considered valuable. The results of the study indicate that teamwork is supervisor-dominated. Thus, teamwork does not substantially strengthen the influence of individual employees as players in knowledge-transfer networks. However, ordinary team members possess important peer contacts inside the organization. Teamwork clearly allows employees to interact in a democratic manner, and here the transfer of tacit knowledge plays an important role. Keywords: teamwork, knowledge-sharing, social networks, organization

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we discuss results of a field study focused on understanding the ways money and financial issues are handled within family settings. Families develop ‘systems’ or methods through which they coordinate and manage their everyday financial activities. Through an analysis of our fieldwork data collected from fifteen families, we provide several examples of such systems, highlighting their qualities and illustrating how such systems come to support the handling of financial activities in the home. Our results show that these systems are developed with a careful consideration of familial values, relationships and routines; and incorporate the use of physical and digital tools. Consequently, we suggest that design should consider the use and non-use of technology when supporting household financial management, taking into account the richness of families’ existing organically formed practices surrounding financial systems. Finally, our findings point to the fact that financial management in the domestic setting is socially organized and is closely connected to supporting everyday household activities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The solution for a line source of oscillatory strength kept at the origin in a wall bounding a semi-infinite viscous imcompressible stratified fluid is presented in an integral form. The behaviour of the flow at far field and near field is studied by an asymptotic expansion procedure. The streamlines for different parameters are drawn and discussed. The real characteristic straight lines present in the inviscid problem are modified by the viscosity and the solutions obtained are valid even at the resonance frequency.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Eukaryotic cells are characterized by having a subset of internal membrane compartments, each one with a specifi c identity, structure and function. Proteins destined to be targeted to the exterior of the cell need to enter and progress through the secretory pathway. Transport of secretory proteins from the endoplasmic reticulum (ER) to the Golgi takes place by the selective packaging of proteins into COPII-coated vesicles at the ER membrane. Taking advantage of the extensive genetic tools available for S. cerevisiae we found that Hsp150, a yeast secretory glycoprotein, selectively exited the ER in the absence of any of the three Sec24p family members. Sec24p has been thought to be an essential component of the COPII coat and thus indispensable for exocytic membrane traffic. Next we analyzed the ability of Hsp150 to be secreted in mutants, where post-Golgi transport is temperature sensitive. We found that Hsp150 could be selectively secreted under conditions where the exocyst component Sec15p is defective. Analysis of the secretory vesicles revealed that Hsp150 was packaged into a subset of known secretory vesicles as well as in a novel pool of secretory vesicles at the level of the Golgi. Secretion of Hsp150 in the absence of Sec15p function was dependent of Mso1p, a protein capable of interacting with vesicles intended to fuse with the plasma membrane, with the SNARE machinery and with Sec1p. This work demonstrated that Hsp150 is capable of using alternative secretory pathways in ER-to-Golgi and Golgi-to-plasma membrane traffi c. The sorting signals, used at both stages of the secretory pathway, for secretion of Hsp150 were different, revealing the highly dynamic nature and spatial organization of the secretory pathway. Foreign proteins usually misfold in the yeast ER. We used Hsp150 as a carrier to assist folding and transport of heterologous proteins though the secretory pathway to the culture medium in both S. cerevisiae and P. pastoris. Using this technique we expressed Hsp150Δ-HRP and developed a staining procedure, which allowed the visualization of the organelles of the secretory pathway of S. cerevisiae.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Jacalin [Artocarpus integrifolia (jack fruit) agglutinin] is made up of two types of chains, heavy and light, with M(r) values of 16,200 +/- 1200 and 2090 +/- 300 respectively (on the basis of gel-permeation chromatography under denaturing conditions). Its complete amino acid sequence was determined by manual degradation using a 4-dimethylaminoazobenzene 4'-isothiocyanate double-coupling method. Peptide fragments for sequence analysis were obtained by chemical cleavages of the heavy chain with CNBr, hydroxylamine hydrochloride and iodosobenzoic acid and enzymic cleavage with Staphylococcus aureus proteinase. The peptides were purified by a combination gel-permeation and reverse-phase chromatography. The light chains, being only 20 residues long, could be sequenced without fragmentation. Amino acid analyses and carboxypeptidase-Y-digestion C-terminal analyses of the subunits provided supportive evidence for their sequence. Computer-assisted alignment of the jacalin heavy-chain sequence failed to show sequence similarity to that of any lectin for which the complete sequence is known. Analyses of the sequence showed the presence of an internal repeat spanning residues 7-64 and 76-130. The internal repeat was found to be statistically significant.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this thesis three icosahedral lipid-containing double-stranded (ds) deoxyribonucleic acid (DNA) bacteriophages have been studied: PRD1, Bam35 and P23-77. The work focuses on the entry, exit and structure of the viruses. PRD1 is the type member of the Tectiviridae family, infecting a variety of Gram-negative bacteria. The PRD1 receptor binding complex, consisting of the penton protein P31, the spike protein P5 and the receptor binding protein P2 recognizes a specific receptor on the host surface. In this study we found that the transmembrane protein P16 has an important stabilization function as the fourth member of the receptor binding complex and protein P16 may have a role in the formation of a tubular membrane structure, which is needed in the ejection of the genome into the cell. Phage Bam35 (Tectiviridae), which infects Gram-positive hosts, has been earlier found to resemble PRD1 in morphology and genome organization The uncharacterized early and late events in the Bam35 life cycle were studied by electrochemical methods. Physiological changes in the beginning of the infection were found to be similar in both lysogenic and nonlysogenic cell lines, Bam35 inducing a temporal decrease of membrane voltage and K+ efflux. At the end of the infection cycle physiological changes were observed only in the nonlysogenic cell line. The strong K+ efflux 40 min after infection and the induced premature cell lysis propose that Bam35 has a similar holin-endolysin lysis system to that of PRD1. Thermophilic icosahedral dsDNA Thermus phages P23-65H, P23-72 and P23-77 have been proposed to belong to the Tectiviridae family. In this study these phages were compared to each other. Analysis of structural protein patterns and stability revealed these phages to be very similar but not identical. The most stable of the studied viruses, P23-77, was further analyzed in more detail. Cryo-electron microscopy and three-dimensional image reconstruction was used to determine the structure of virus to 14 Å resolution. Results of thin layer chromatography for neutral lipids together with analysis of the three dimensional reconstruction of P23-77 virus particle revealed the presence of an internal lipid membrane. The overall capsid architecture of P23-77 is similar to PRD1 and Bam35, but most closely it resembles the structure of the capsid of archaeal virus SH1. This complicates the classification of dsDNA, internal lipid-containing icosahedral viruses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Theoretical studies have been carried out to examine internal flow choking in the inert simulators of a dual-thrust motor. Using a two-dimensional k-omega turbulence model, detailed parametric studies have been carried out to examine aerodynamic choking and the existence of a fluid throat at the transition region during the startup transient of dual-thrust motors. This code solves standard k-omega turbulence equations with shear flow corrections using a coupled second-order-implicit unsteady formulation. In the numerical study, a fully implicit finite volume scheme of the compressible, Reynolds-averaged, Navier-Stokes equations is employed. It was observed that, at the subsonic inflow conditions, there is a possibility of the occurrence of internal flow choking in dual-thrust motors due to the formation of a fluid throat at the beginning of the transition region induced by area blockage caused by boundary-layer-displacement thickness. It has been observed that a 55% increase in the upstream port area of the dual-thrust motor contributes to a 25% reduction in blockage factor at the transition region, which could negate the internal How choking and supplement with an early choking of the dual-thrust motor nozzle. If the height of the upstream port relative to the motor length is too small, the developing boundary layers from either side of the port can interact, leading to a choked,flow. On the other hand, if the developing boundary layers are far enough apart, then choking does not occur. The blockage factor is greater in magnitude for the choked case than for the unchoked case. More tangible explanations are presented in this paper for the boundary-layer blockage and the internal flow choking in dual-thrust motors, which hitherto has been unexplored.