988 resultados para Security Markets Act
Resumo:
The United States has gone further than any country in the "privatization of security". Other countries may find the economic or financial logic in the use of contractors persuasive. The US experience with contracting out security, particularly in Iraq, was problematic, and can serve as a cautionary tale in order that other countries might learn how to avoid the pitfalls.
Resumo:
1 – Summary of the decision taken by the Portuguese Constitutional Court, of January 13, 2011; 2 – Complete text of the decision of the Portuguese Constitutional Court, of January 13, 2011, Judge Maria João ANTUNES (Reporter), Judge Carlos Pamplona de OLIVEIRA, Judge José Borges SOEIRO, Judge Gil GALVÃO, Judge Rui Manuel Moura RAMOS (President) –in terms of the tribunalconstitucional.pt, August 1, 2011; 3 – Brief annotation to the problem of the “medical act”; 3.1 – Plus some conclusions on the brief annotation to the problem of the “medical act”; 3.2 – Brief annotation to the problem of “consent”– continuation of the previous comments; 4 – Conclusions. It must never be forgotten that “consent” does not stand as the only cause of exclusion of unlawfulness.
Resumo:
One hundred and twenty subjects with Chagas' cardiopathy and 120 non-infected subjects were randomly selected from first time claimants of sickness benefits in the National Institute of Social Security (INPS) in Goiás. Cases of Chagas' cardiopathy were defined based on serological test, history of residence in an endemic area and, clinical and/or electrocardiogram (ECG) alterations suggestive of Chagas' cardiomyopathy. Controls were defined as subjects with at least two negative serological tests. Case and controls were compared in the analysis for age, sex, place of birth, migration history, socio-economic level, occupation, physical exertion at work, age at affiliation and years of contribution to the social security scheme, clinical course of their disease and ECG abnormalities. Chagas' disease patients were younger than other subjects and predominantly of rural origin. Non-infected subjects presented a better socio-economic level, were performing more skilled activities and had less changes of job than cases. No important difference was observed in relation to age at affiliation to INPS. About 60% of cases have claimed for benefits within the first four years of contribution while among controls this proportion was 38.5%. Cases were involved, proportionally more than controls, in "heavy" activities. A risk of 2.3 (95%CL 1.5 - 4.6) and 1.8 (95%CL 1.2- 3.5) was obtained comparing respectively "heavy" and "moderate" physical activity against "light". A relative risk of 8.5 (95%CL 4.9 - 14.8) associated with the presence of cardiopathy was estimated comparing the initial sample of seropositive subjects and controls. A high relative risk was observed in relation to right bundle branch block (RR = 37.1 95%CL = 8.8 - 155.6) and left anterior hemiblock (RR = 4.4, 95%CL = 2.1 - 9.1).
Resumo:
A família de especificações WS-* define um modelo de segurança para web services, baseado nos conceitos de claim, security token e Security Token Service (STS). Neste modelo, a informação de segurança dos originadores de mensagens (identidade, privilégios, etc.) é representada através de conjuntos de claims, contidos dentro de security tokens. A emissão e obtenção destes security tokens, por parte dos originadores de mensagens, são realizadas através de protocolos legados ou através de serviços especiais, designados de Security Token Services, usando as operações e os protocolos definidos na especificação WS-Trust. O conceito de Security Token Service não é usado apenas no contexto dos web services. Propostas como o modelo dos Information Cards, aplicável no contexto de aplicações web, também utilizam este conceito. Os Security Token Services desempenham vários papéis, dependendo da informação presente no token emitido. São exemplos o papel de Identity Provider, quando os tokens emitidos contêm informação de identidade, ou o papel de Policy Decision Point, quando os tokens emitidos definem autorizações. Este documento descreve o projecto duma biblioteca software para a realização de Security Token Services, tal como definidos na norma WS-Trust, destinada à plataforma .NET 3.5. Propõem-se uma arquitectura flexível e extensível, de forma a suportar novas versões das normas e as diversas variantes que os Security Token Services possuem, nomeadamente: o tipo dos security token emitidos e das claims neles contidas, a inferência das claims e os métodos de autenticação das entidades requerentes. Apresentam-se aspectos de implementação desta arquitectura, nomeadamente a integração com a plataforma WCF, a sua extensibilidade e o suporte a modelos e sistemas externos à norma. Finalmente, descrevem-se as plataformas de teste implementadas para a validação da biblioteca realizada e os módulos de extensão da biblioteca para: suporte do modelo associado aos Information Cards, do modelo OpenID e para a integração com o Authorization Manager.
Resumo:
This paper describes a multi-agent based simulation (MABS) framework to construct an artificial electric power market populated with learning agents. The artificial market, named TEMMAS (The Electricity Market Multi-Agent Simulator), explores the integration of two design constructs: (i) the specification of the environmental physical market properties and (ii) the specification of the decision-making (deliberative) and reactive agents. TEMMAS is materialized in an experimental setup involving distinct power generator companies that operate in the market and search for the trading strategies that best exploit their generating units' resources. The experimental results show a coherent market behavior that emerges from the overall simulated environment.
Resumo:
One of the major problems that prevents the spread of elections with the possibility of remote voting over electronic networks, also called Internet Voting, is the use of unreliable client platforms, such as the voter's computer and the Internet infrastructure connecting it to the election server. A computer connected to the Internet is exposed to viruses, worms, Trojans, spyware, malware and other threats that can compromise the election's integrity. For instance, it is possible to write a virus that changes the voter's vote to a predetermined vote on election's day. Another possible attack is the creation of a fake election web site where the voter uses a malicious vote program on the web site that manipulates the voter's vote (phishing/pharming attack). Such attacks may not disturb the election protocol, therefore can remain undetected in the eyes of the election auditors. We propose the use of Code Voting to overcome insecurity of the client platform. Code Voting consists in creating a secure communication channel to communicate the voter's vote between the voter and a trusted component attached to the voter's computer. Consequently, no one controlling the voter's computer can change the his/her's vote. The trusted component can then process the vote according to a cryptographic voting protocol to enable cryptographic verification at the server's side.
Resumo:
INTRODUCTION: Cheese should be produced from ingredients of good quality and processed under hygienic conditions. Further, cheese should be transported, stored and sold in an appropriate manner in order to avoid, among other things, the incorporation of extraneous materials (filth) of biological origin or otherwise, in contravention of the relevant food legislation. The aim of the study was to evaluate the hygienic conditions of "prato", "mussarela", and "mineiro" cheeses sold at the street food markets in the city of S. Paulo, Brazil. MATERIALS AND METHOD: Forty-seven samples of each of the three types of cheese were collected during the period from March, 1993 to February, 1994. The Latin square was used as a statistical model for sampling and random selection of the street markets from which to collect the cheese samples. The samples were analysed for the presence of extraneous matters outside for which purpose the samples were washed and filtered and inside, for which the methodology of enzymathic digestion of the sample with pancreatine, followed by filtering,was used. RESULTS AND CONCLUSION: Of the 141 samples analysed, 75.9% exhibited at least one sort of extraneous matters. For the "prato" and "mussarela" cheeses, the high number of contaminated samples was due mainly to extraneous matters present inside the cheese, whereas in the "mineiro" cheese, besides the internal filth, 100% of the samples had external filth.
Resumo:
The purpose of this investigation is to explore and understand the justifications given by students to the existence of dishonest behavior and understanding the extent to which the justifications given might influence denouncing and cheating behavior. 1277 undergraduate students of two Portuguese Public Universities were surveyed about their own cheating behavior, their propensity to denounce and the ―neutralizing attitudes‖. As predicted, ―neutralizing attitudes‖ was negatively correlated with self cheating behavior and positively correlated with reporting. The likelihood of copying is greater when the purpose is ―helping a friend‖, ―when the courses are more difficult‖, ―to get higher marks/grades‖, and because ―peers accept and tend to see copying practices as normal‖. Results support the notion that context emerges as a very important influence in the decision to cheating. The environment-peer pressure and the normalized attitudes towards academic dishonesty are the main influences on the propensity to cheating.
Resumo:
This paper studies a portfolio choice problem such that the pricing rule may incorporate transaction costs and the risk measure is coherent and expectation bounded. We will prove the necessity of dealing with pricing rules such that there exists an essentially bounded stochastic discount factor, which must be also bounded from below by a strictly positive value. Otherwise good deals will be available to traders, i.e., depending on the selected risk measure, investors can build portfolios whose (risk, return) will be as close as desired to (−infinity, infinity) or (0, infinity). This pathologic property still holds for vector risk measures (i.e., if we minimize a vector valued function whose components are risk measures). It is worthwhile to point out that essentially bounded stochastic discount factors are not usual in financial literature. In particular, the most famous frictionless, complete and arbitrage free pricing models imply the existence of good deals for every coherent and expectation bounded (scalar or vector) measure of risk, and the incorporation of transaction costs will not guarantee the solution of this caveat.
Resumo:
The relative contribution of European Union Allowances (EUAs) and Certified Emission Reductions (CERs) to the price discovery of their common true value has been empirically studied using daily data with inconclusive results. In this paper, we study the short-run and long-run price dynamics between EUAs and CERs future contracts using intraday data. We report a bidirectional feedback causality relationship both in the short-run and in the long-run, with the EUA's market being the leader.
Resumo:
Nos últimos anos verificou-se uma alteração das condições e modo de funcionamento de empresas e instituições, privadas e públicas, muitas delas através da introdução de novas ferramentas de gestão. De entre elas, podemos destacar o outsourcing, que apesar de não ser um fenómeno actual, é ainda em Portugal uma ferramenta recente e pouco explorada, que pode contribuir de forma decisiva para a modernização, flexibilidade e competitividade das empresas. O presente estudo pretende abordar a contratação de serviços externos nos serviços de saúde públicos, também conhecido como outsourcing, mediante uma análise prática da realidade de uma instituição hospitalar com sete serviços em regime de outsourcing, com recolha dos dados durante o triénio 2008-2010. No Serviço de Urgência durante 2010 o principal prestador recebeu mais 104,28% acima do valor referência/hora, no Serviço de Oftalmologia no ano de 2010 o prestador recebeu um valor superior em 24,91%, no Serviço de Limpeza, Higiene e Conforto é pago ao prestador durante o ano de 2010 um valor superior em 13,85%, no Serviço de Vigilância e Segurança o prestador recebeu durante o ano de 2010 um valor superior em 27,5%, caso a instituição hospitalar optasse por contratar, para os serviços atrás referidos, profissionais para o quadro de pessoal. Ainda em relação ao Serviço de Urgência foi pago mais 21,38% acima do valor de referência publicado por Despacho governamental. Em relação aos Serviços de Lavandaria e de Tratamento de Resíduos Sólidos, não foi possível recolher os dados necessários que pudessem levar a uma conclusão válida sobre os custos pagos pela instituição hospitalar. Pode-se concluir que a contratação de prestadores externos, para os serviços de saúde, essenciais e não essenciais, em regime de outsourcing, revela-se na maioria dos casos analisados a opção menos económica, com custos bastantes elevados.
Resumo:
Dissertação para obtenção do Grau de Mestre em Contabilidade e Finanças Orientador: Professor Dr. António da Costa Oliveira