853 resultados para General Systems Theory


Relevância:

80.00% 80.00%

Publicador:

Resumo:

The information constitutes one of the most valuable strategic assets for the organization. However, the organizational environment in which it is inserted is very complex and heterogeneous, making emerging issues relevant to the Governance of information technology (IT) and Information Security. Academic Studies and market surveys indicate that the origin of most accidents with the information assets is the behavior of people organization itself rather than external attacks. Taking as a basis the promotion of a culture of safety among users and ensuring the protection of information in their properties of confidentiality, integrity and availability, organizations must establish its Information Security Policy (PSI). This policy is to formalise the guidelines in relation to the security of corporate information resources, in order to avoid that the asset vulnerabilities are exploited by threats and can bring negative consequences to the business. But, for the PSI being effective, it is required that the user have readiness to accept and follow the procedures and safety standards. In the light of this context, the present study aims to investigate what are the motivators extrinsic and intrinsic that affect the willingness of the user to be in accordance with the organization's security policies. The theoretical framework addresses issues related to IT Governance, Information Security, Theory of deterrence, Motivation and Behavior Pro-social. It was created a theoretical model based on the studies of Herath and Rao (2009) and D'Arcy, Hovav and Galletta (2009) that are based on General Deterrence Theory and propose the following influencing factors in compliance with the Policy: Severity of Punishment, Certainty of Detection, Peer Behaviour, Normative Beliefs, Perceived Effectiveness and Moral Commitment. The research used a quantitative approach, descriptive. The data were collected through a questionnaire with 18 variables with a Likert scale of five points representing the influencing factors proposed by the theory. The sample was composed of 391 students entering the courses from the Center for Applied Social Sciences of the Universidade Federal do Rio Grande do Norte. For the data analysis, were adopted the techniques of Exploratory Factor Analysis, Analysis of Cluster hierarchical and nonhierarchical, Logistic Regression and Multiple Linear Regression. As main results, it is noteworthy that the factor severity of punishment is what contributes the most to the theoretical model and also influences the division of the sample between users more predisposed and less prone. As practical implication, the research model applied allows organizations to provide users less prone and, with them, to carry out actions of awareness and training directed and write Security Policies more effective.

Relevância:

80.00% 80.00%

Publicador:

Relevância:

80.00% 80.00%

Publicador:

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The concept of ontological security has a remarkable echo in the current sociology to describe emotional status of men of late modernity. However, the concept created by Giddens in the eighties has been little used in empirical research covering various sources of risk or uncertainty. In this paper, a scale for ontological security is proposed. To do this, we start from the results of a research focused on the relationship between risk, uncertainty and vulnerability in the context of the economic crisis in Spain. These results were produced through nine focus groups and a telephone survey with standardized questionnaire applied to a national sample of 2,408 individuals over 18 years. This work is divided into three main sections. In the fi rst, a scale has been built from the results of the application of different items present in the questionnaire used. The second part explores the relationships of the scale obtained with the variables further approximate the emotional dimensions of individuals. The third part observes the variables that contribute to changes in the scale: These variables show the structural feature of the ontological security.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Exponemos los resultados de una observación exploratoria en la que se analizan los impactos funcionales en el sistema administrativo como consecuencia de la construcción de la Central Hidroeléctrica de Belo Monte (CHB) en el municipio de Altamira (Amazonia oriental brasileña). En la perspectiva teórico-conceptual de la teoría de sistemas sociales de Niklas Luhmann, realizamos una observación del sistema administrativo local sobre sus operaciones y funciones, en base a cuatro códigos preestablecidos: toma de decisiones, contingencia, significación simbólica del proyecto y planificación. Las conclusiones permiten entrever en un aplano conceptual la utilidad de los conceptos sistémicos de Luhmann, y en el empírico, una planificación y administración pública municipal reactivas.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Cette thèse est une réflexion originale sur le droit international dans la crise, car elle aborde le droit international grâce à une théorie peu connue en droit, celle des systèmes dynamiques complexes. L’étude du cas particulier de la gestion normative de la crise par le Conseil de sécurité illustre les intérêts de l’utilisation d’une théorie novatrice en droit. La théorie des systèmes dynamiques complexes offre les outils d’une réflexion sur le droit, fondée sur les interactions du droit avec le contexte particulier dans lequel il intervient, la crise, et ses acteurs. La mise en lumière de ces interactions favorise une lecture critique du droit international dans la crise et permet de renouveler l’ontologie de ce droit. Les dynamiques complexes appréhendées et définies par cette théorie sont utiles lorsqu’il s’agit d’expliquer les atouts et les limites de l’action normative du Conseil. Par ailleurs en renouvellant l’ontologie du droit, la théorie des systèmes dynamiques complexes facilite une lecture prospective de l’action normative du Conseil et insiste sur le rôle institutionnel du droit.

Relevância:

80.00% 80.00%

Publicador:

Relevância:

80.00% 80.00%

Publicador:

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Thesis (Ph.D.)--University of Washington, 2016-08

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A history of specialties in economics since the late 1950s is constructed on the basis of a large corpus of documents from economics journals. The production of this history relies on a combination of algorithmic methods that avoid subjective assessments of the boundaries of specialties: bibliographic coupling, automated community detection in dynamic networks, and text mining. These methods uncover a structuring of economics around recognizable specialties with some significant changes over the period covered (1956–2014). Among our results, especially noteworthy are (1) the clear-cut existence of ten families of specialties, (2) the disappearance in the late 1970s of a specialty focused on general economic theory, (3) the dispersal of the econometrics-centered specialty in the early 1990s and the ensuing importance of specific econometric methods for the identity of many specialties since the 1990s, and (4) the low level of specialization of individual economists throughout the period in contrast to physicists as early as the late 1960s.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This interactive symposium will focus on the use of different technologies in developing innovative practice in teacher education at one university in England. Technology Enhanced Learning (TEL) is a field of educational policy and practice that has the power to ignite diametrically opposing views and reactions amongst teachers and teacher educators, ranging across a spectrum from immense enthusiasm to untold terror. In a field where the skills and experience of individuals vary from those of digital natives (Prensky 2001) to lags and lurkers in digital spaces, the challenges of harnessing the potential of TEL are complex. The challenges include developing the IT skills of trainees and educators and the creative application of these skills to pedagogy in all areas of the curriculum. The symposium draws on examples from primary, secondary and post-compulsory teacher education to discuss issues and approaches to developing research capacity and innovative practice using different etools, many of which are freely available. The first paper offers theoretical and policy perspectives on finding spaces in busy professional lives to engage in research and develop research-informed practice. It draws on notions of teachers as researchers, practitioner research and evidenc-ebased practice to argue that engagement in research is integral to teacher education and an empowering source of creative professional learning for teachers and teacher educators. Whilst acknowledging the challenges of this stance, examples from our own research practice illustrate how e-tools can assist us in building the capacity and confidence of staff and students in researching and enhancing teaching, learning and assessment practice. The second paper discusses IT skills development through the TEL pathway for trainee teachers in secondary education across different curriculum subjects. The lead tutor for the TEL pathway will use examples of activities developed with trainee teachers and university subject tutors to enhance their skills in using e-tools, such as QR codes, Kahoot, Padlet, Pinterest and cloud based learning. The paper will also focus on how these skills and tools can be used for action Discussant - the wider use of technologies in a university centre for teacher education; course management, recruitment and mentor training. research, evaluation and feedback and for marking and administrative tasks. The discussion will finish with thoughts on widening trainee teachers’ horizons into the future direction of educational technology. The third paper considers institutional policies and strategies for promoting and embedding TEL, including an initiative called ‘The Learning Conversation’, which aims ‘to share, highlight, celebrate, discuss, problematise, find things out...’ about TEL through an online space. The lead for ‘The Learning Conversation’ will offer reflections on this and other initiatives across the institution involving trainee teachers, university subject tutors, librarians and staff in student support services who are using TEL to engage, enthuse and support students on campus and during placements in schools. The fourth paper reflects on the use of TEL to engage with trainee teachers in post-compulsory education. This sector of education and training is more fragmented than primary and secondary schools sectors and so the challenges of building a community of practice that can support the development of innovative practice are greater.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The article published in the Times Educational Supplement (TES) features research by Professor Dhillon from the University of Worcester.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The workshop will invite participants to engage in a discussion of the characteristics of outstanding leadership by taking part in an interactive activity which we have developed and used in different types of schools and colleges in England. The activity uses Q-methodology to develop and refine characteristics of outstanding leaders and outstanding leadership in education from a range of stakeholder perspectives. Q-methodology is a research method which originates from psychology and is used to study people's subjective viewpoints. We are applying the methodology to the study of enacted leadership practice in different educational contexts. Our sample of stakeholders consists of school and college leaders, governors, middle leaders, teachers, teacher educators, researchers and scholars in educational leadership and management research and practice. The range of contexts in which they work represents different age phases of education; primary, secondary and further education colleges, urban and rural schools and colleges and selective and non-selective schools. In the workshop participants will be invited to take part in the Q-sort activity we have used with in our research, using statements from leadership theory and practice. The Q-sort will be followed by discussion and reflection on the statements in relation to participants’ own experiences of leadership, management and governance in different contexts.