917 resultados para Private security sector
Resumo:
Objective: Partnerships in mental health care, particularly between public and private psychiatric services, are being increasingly recognized as important for optimizing patient management and the efficient organization of services. However, public sector mental health services and private psychiatrists do not always work well together and there seem to be a number of barriers to effective collaboration. This study set out to investigate the extent of collaborative 'shared care' arrangements between a public mental health service and private psychiatrists practising nearby. It also examined possible barriers to collaboration and some possible solutions to the identified problems. Method: A questionnaire examining the above factors was sent to all public sector mental health clinicians and all private psychiatrists in the area. Results: One hundred and five of the 154 (68.2%) public sector clinicians and 103 of the 194 (53.1%) private psychiatrists returned surveys. The main barriers to successful collaboration identified by members of both sectors were: 'Difficulty communicating' endorsed by 71.4% of public clinicians and 72% of private psychiatrists, 'Confusion of roles and responsibilities' endorsed by 62.9% and 66%, respectively, and 'Different treatment approach' by 47.6% and 45.6%, respectively. Over 60% of private psychiatrists identified problems with access to the public system as a barrier to successful shared care arrangements. It also emerged, as hypothesized, that the public and private systems tend to manage different patient populations and that public clinicians in particular are not fully aware of the private psychiatrists' range of expertise. This would result in fewer referrals for shared care across the sectors. Conclusions: A number of barriers to public sector clinicians and private psychiatrists collaborating in shared care arrangements were identified. The two groups surveyed identified similar barriers. Some of these can potentially be addressed by changes to service systems. Others require cultural shifts in both sectors. Improved communications including more opportunities for formal and informal meetings between people working in the two sectors would be likely to improve the understanding of the complementary sector's perspective and practice. Further changes would be expected to require careful work between the sectors on training, employment and practice protocols and initiatives, to allow better use of the existing services and resources.
Resumo:
New public management theory proposes that public sector organisations should be managed more like private sector organisations. It is therefore expected that public sector managers will have preferences for an organisational culture that will reflect the culture of private sector organisations, with an external rather than internal orientation. The current research investigated the idea that managers' perceptions of ideal organisational culture would be different to the bureaucratic model of culture (internally oriented), which has traditionally been associated with public sector organisations. Responses to a competing values culture inventory were received from 925 public sector employees. Results indicated that the bureaucratic model is still pervasive; however, managers prefer a culture that is more external, and less control focussed, as expected. Lower level employees expressed a desire for a culture that emphasised human relations values.
Resumo:
Professional computing employment in Australia, as in most advanced economies, is highly sex segregated, reflecting well-rehearsed ideas about the masculinity of technology and computing culture. In this paper we are concerned with the processes of work organisation that sustain and reproduce this gendered occupational distribution, focusing in particular on differences and similarities in working-time arrangements between public and private sectors in the Australian context. While information technology companies are often highly competitive workplaces with individualised working arrangements, computing professionals work in a wide range of organisations with different regulatory histories and practices. Our goal is to investigate the implications of these variations for gender equity outcomes, using the public/private divide as indicative of different regulatory frameworks. We draw on Australian census data and a series of organisational case studies to compare working-time arrangements in professional computing employment across sectors, and to examine the various ways employees adapt and respond. Our analysis identifies a stronger ‘long hours culture’ in the private sector, but also underlines the rarity of part-time work in both sectors, and suggests that men and women tend to respond in different ways to these constraints. Although the findings highlight the importance of regulatory frameworks, the organisation of working time across sectors appears to be sustaining rather than challenging gender inequalities in computing employment.
Resumo:
A vantagem competitiva e o desempenho organizacional são conceitos administrativos estreitamente ligados à competitividade das empresas e sua permanência no mercado a longo prazo. Para que alcancem tal objetivo, de acordo com os fundamentos da RBV, as capacidades organizacionais dessas empresas devem ser dinâmicas, o que significa estar à frente das mudanças ambientais, mantendo, criando e desenvolvendo novas capacidades. Um dos caminhos para que isso se realize é a aposta na sua capitalização, que pode ocorrer com a captação de recursos de terceiros ou recursos próprios, com maior ou menor grau de risco. A captação de recursos com capital de terceiros acontece, principalmente, via instituições financeiras e factorings. A captação por meio de capital próprio pode ocorrer por retenção de lucros ou pelo underwriting. A emissão feita via mercado primário configura a oferta pública inicial de ações ou Initial Public Offering (IPO). No Brasil, a escolha dos fundos de Private Equity e Venture Capital, segmentos do mercado financeiro que consistem fundamentalmente em aporte temporário de capital, vem crescendo consideravelmente nos últimos anos. Contudo, existem poucas pesquisas a respeito da utilização e do desempenho financeiro que esses fundos trazem para as empresas. O presente estudo procura averiguar se as empresas que estavam listadas na BOVESPA no período de 2002 a 2008 e que receberam recursos via Private Equity e Venture Capital com IPO desenvolveram desempenho financeiro superior às que receberam ou não outros tipos de financiamento no mesmo período. Foram selecionados dados secundários como: balanços patrimoniais, demonstração de resultados e valores das ações, utilizando-se da base de dados da Economática. Tomando o logaritmo do Q de Tobin como variável dependente e log_Ativo, Debt to Equity, ROA, crescimento de vendas, crescimento de investimentos, crescimento investimento Fama e CrescInv_endividamento como variáveis de controle, foram aplicados testes estatísticos, comparando a média dos índices, seguidos de análise por setor econômico, subsetor e segmento. Os resultados encontrados apontam que as empresas que receberam recursos via Private Equity e Venture Capital com IPO, tornaram-se diferentes das demais empresas que estavam listadas na BOVESPA naquele período. O presente trabalho busca, dessa forma, contribuir para o enriquecimento de conhecimento acadêmico acerca do tema.(AU)
Resumo:
Este trabalho discorre sobre o processo de implantação da TV digital interativa no Brasil, tendo como estudo de caso o estado do Maranhão e foca as possibilidades de inclusão social e digital em regiões com fragilidades de prestação de serviços públicos como Previdência Social, atendimento médico, bancário e de ensino a distância. Para tanto, aborda políticas públicas que conduziram ao SBTVD Sistema Brasileiro de Televisão Digital no país. O estudo apresenta as discussões na esfera pública e privada com a participação de organizações reconhecidamente qualificadas dentro e fora do país. Mostra também o complexo processo de articulação governamental com entidades da indústria eletroeletrônica e de grupos de telecomunicações privados instalados no Brasil, bem como a resistência de radiodifusores do setor privado em adotar o modelo proposto pelo Decreto 5.820/06 que prevê distribuição e acesso gratuito da população a serviços públicos essenciais por meio da televisão aberta. As consequências refletidas na permanência do atraso e baixo desenvolvimento do estado do Maranhão abrem possibilidades de superação com os novos programas disponibilizados pela Secretaria de Inclusão Digital (SID), do Ministério das Comunicações para responder à enorme demanda que priva regiões do Brasil como o Maranhão de desenvolvimento social e inclusão digital.
Resumo:
Security and reliability of LDPC based public-key cryptosystems are discussed and analysed. We study attacks on the cryptosystem when partial knowledge of one or more of the private key components and/or of the plaintext have been acquired.
Resumo:
This study compares human resource management (HRM) practices in Indian public- and private-sector organizations. The investigation is based on a questionnaire survey of 137 large manufacturing firms (public sector = 81: private sector = 56). The key areas of analysis include the structure of human resource (HR) department, the role of HR function in corporate change, recruitment and selection, pay and benefits, training and development, employee relations and emphasis on key HRM strategies. Internal labour markets (ILMs) are used to make the comparative analysis. The statistical results show a number of similarities and differences in the HRM systems of Indian public-and private-sector organizations. Against the established notion, the results of this study reveal that the gap between Indian private- and public-sector HRM practices is not very significant. Moreover, in a few HR functional areas (for example, compensation and training and development), Indian private-sector firms have adopted a more rational approach than their public-sector counterparts. © 2004 Taylor and Francis Ltd.
Resumo:
This thesis examines the external activities of the European Union conducted in the wider Europe against the backdrop of eastern enlargement. It focuses on the technical aspects of EU diplomacy, using qualitative research methodology to study the programmes and initiatives launched since the year 2000 in the countries lying along the Union’s new border to the east. Drawing on evidence from Ukraine, it hypothesises that the EU is an agent of transformation in the eastern neighbourhood and that this transformation has important implications for the regional order in the post-Soviet space. The thesis constitutes an investigation into the transformational activities engaged by the EU in Ukraine conducted with an eye to their strategic implications. It documents and analyses three instances of EU intervention in Ukraine’s internal processes that relate to management of cross-border traffic in the Ukrainian-Russian borderland, restructuring of the country’s energy sector, and conduct of its contentious presidential election in 2004. It is argued that while these interventions have explicitly sought to advance the Union’s security with respect to certain twenty-first century transnational threats, they have at the same time served to confer important strategic advantages on the EU that include giving the bloc greater knowledge and control over developments in Ukraine and that contribute to the dismantling of infrastructural, institutional and other ties between Kiev and the other Soviet successor states, notably Russia. The effect of the European Union’s actions in the region, whether intended or not, has thus been to undermine any competing regional initiatives that cut across its own functions, and thereby to assert itself as the primary integration project in Europe. By showing how technical interventions in the politics, economics and administration of Ukraine can yield important geopolitical dividends, this thesis demonstrates that, in the context of EU external relations, high and low politics are interlinked.
Resumo:
The advent of personal communication systems within the last decade has depended upon the utilization of advanced digital schemes for source and channel coding and for modulation. The inherent digital nature of the communications processing has allowed the convenient incorporation of cryptographic techniques to implement security in these communications systems. There are various security requirements, of both the service provider and the mobile subscriber, which may be provided for in a personal communications system. Such security provisions include the privacy of user data, the authentication of communicating parties, the provision for data integrity, and the provision for both location confidentiality and party anonymity. This thesis is concerned with an investigation of the private-key and public-key cryptographic techniques pertinent to the security requirements of personal communication systems and an analysis of the security provisions of Second-Generation personal communication systems is presented. Particular attention has been paid to the properties of the cryptographic protocols which have been employed in current Second-Generation systems. It has been found that certain security-related protocols implemented in the Second-Generation systems have specific weaknesses. A theoretical evaluation of these protocols has been performed using formal analysis techniques and certain assumptions made during the development of the systems are shown to contribute to the security weaknesses. Various attack scenarios which exploit these protocol weaknesses are presented. The Fiat-Sharmir zero-knowledge cryptosystem is presented as an example of how asymmetric algorithm cryptography may be employed as part of an improved security solution. Various modifications to this cryptosystem have been evaluated and their critical parameters are shown to be capable of being optimized to suit a particular applications. The implementation of such a system using current smart card technology has been evaluated.
Resumo:
We have recently proposed the framework of independent blind source separation as an advantageous approach to steganography. Amongst the several characteristics noted was a sensitivity to message reconstruction due to small perturbations in the sources. This characteristic is not common in most other approaches to steganography. In this paper we discuss how this sensitivity relates the joint diagonalisation inside the independent component approach, and reliance on exact knowledge of secret information, and how it can be used as an additional and inherent security mechanism against malicious attack to discovery of the hidden messages. The paper therefore provides an enhanced mechanism that can be used for e-document forensic analysis and can be applied to different dimensionality digital data media. In this paper we use a low dimensional example of biomedical time series as might occur in the electronic patient health record, where protection of the private patient information is paramount.
Resumo:
A method is proposed to offer privacy in computer communications, using symmetric product block ciphers. The security protocol involved a cipher negotiation stage, in which two communicating parties select privately a cipher from a public cipher space. The cipher negotiation process includes an on-line cipher evaluation stage, in which the cryptographic strength of the proposed cipher is estimated. The cryptographic strength of the ciphers is measured by confusion and diffusion. A method is proposed to describe quantitatively these two properties. For the calculation of confusion and diffusion a number of parameters are defined, such as the confusion and diffusion matrices and the marginal diffusion. These parameters involve computationally intensive calculations that are performed off-line, before any communication takes place. Once they are calculated, they are used to obtain estimation equations, which are used for on-line, fast evaluation of the confusion and diffusion of the negotiated cipher. A technique proposed in this thesis describes how to calculate the parameters and how to use the results for fast estimation of confusion and diffusion for any cipher instance within the defined cipher space.
Resumo:
The aim of this research is to assess the acquisition and absorption technology capabilities of the public sector in developing countries, with specific focus on the State of Kuwait. The assessment process of these two capabilities was conducted using a model originally designed for the private sector. In addition, the research aims to propose a framework to enhance the technological capability of developing countries, as well as the performance of the public sector. To achieve these aims, an investigation of the technology process to three public ministries in Kuwait was conducted. The prime interest of this investigation was to evaluate the role of the transferred technology in enhancing the indigenous technological capability of the public sector. The research is based on a case study approach, comprising a main case study (Ministry of Electricity and Water) and three minor case studies. Based on the outcomes from an extensive literature review and the preliminary sectoral visits, the research question and four hypotheses were formulated. These hypotheses were then tested using interview-based survey and documentation. The findings of the research revealed the weakness of the acquisition and absorption technological capabilities of the public sector. Consequently, the public sector relies extensively on foreign contractors and expatriates to compensate for this weakness. Also, it was found that Kuwait Government has not taken the necessary measures to develop its technological capability. This research has proposed a framework which could lead, if properly managed, to the enhancement of indigenous capability. It has also proposed how to improve performance and productivity in the public sector. Finally, the findings suggest that the assessment model, with minor adjustment, is applicable to the public sector.
Resumo:
Increasingly managers in the public sector are being required to manage change, but many of the models of change which are available to them have been developed from private sector experience. There is a need to understand more about how the change process unfolds in the public sector. A case study of change in one local authority over the period 1974-87 is provided. The events surrounding housing decentralisation and the introduction of community development are considered in detail. To understand these events a twofold model of change is proposed: a short wave model which explains a change project or event; and a long wave model which considers how these projects or events might be linked together to provide a picture of an organisation over a longer period. The short wave model identifies multiple triggers of change and signals the importance of mediators in recognising these triggers. The extent to which new ideas are implemented and the pace of their adoption is influenced by the balance of power within the organisation and the political tactics which are used. Broad phases in the change process can be identified, but there is not a simple linear passage through these. The long wave model considers the way in which continuity and change feed off one another. It suggests that periods of relative stability may be interspersed with more radical transformations as the dominant paradigm guiding the organisation shifts. However, such paradigmatic shifts in local government may be less obvious than in the private sector due to the diverse nature of the former.
Resumo:
While much has been discussed about the relationship between ownership and financial performance of banks in emerging markets, literature about cross-ownership differences in credit market behaviour of banks in emerging economies is sparse. Using a portfolio choice model and bank-level data from India for 9 years (1995–96 to 2003–04), we examine banks’ behaviour in the context of credit markets of an emerging market economy. Our results indicate that, in India, the data for the domestic banks fit well the aforementioned portfolio-choice model, especially for private banks, but the model cannot explain the behaviour of foreign banks. In general, allocation of assets between risk-free government securities and risky credit is affected by past allocation patterns, stock exchange listing (for private banks), risk averseness of banks, regulations regarding treatment of NPA, and ability of banks to recover doubtful credit. It is also evident that banks deal with changing levels of systematic risk by altering the ratio of securitized to non-securitized credit.
Resumo:
Private ownership of firms is often argued to lead to better firm performance than public ownership. However, the theoretical literature and the empirical evidence indicate that agency problems may affect the performance of privately owned firms. At the same time, competition and hard budget constraints can induce state-owned firms to operate efficiently. In India, banking sector reforms and deregulation were initiated in 1992, encouraging entry and establishing a level playing field for all banks. Data for the financial years 1995–1996 through 2000–2001 suggest that, by 1999–2000, ownership was no longer a significant determinant of performance. Rather, competition induced public-sector banks to eliminate the performance gap that existed between them and both domestic and foreign private-sector banks.