995 resultados para Security constraints
Resumo:
The Finnish legislation requires for a safe and secure learning environment. However, the comprehensive, risk based safety and security management (SSM) and the management commitment in the implementation and development of the SSM are not mentioned in the legislation. Multiple institutions, operators and researchers have studied and developed safety and security in educational institutions over the past decade. Typically the approach has been fragmented and without bringing up the importance of the comprehensive SSM. The development needs of the safety and security operations in universities have been studied. However, in universities of applied sciences (UASs) and in elementary schools (ESs), the performance level, strengths and weaknesses of the comprehensive SSM have not been studied. The objective of this study was to develop the comprehensive, risk based SSM of educational institutions by developing the new Asteri consultative auditing process and study its effects on auditees. Furthermore, the performance level in the comprehensive SSM in UASs and ESs were studied using Asteri and the TUTOR model developed by the Keski-Uusimaa Department for Rescue Services. In addition, strengths, development needs and differences were identified. In total, 76 educational institutions were audited between the years 2011 and 2014. The study is based on logical empiricism, and an observational applied research design was used. Auditing, observation and an electronic survey were used for data collection. Statistical analysis was used to analyze the collected information. In addition, thematic analysis was used to analyze the development areas of the organizations mentioned by the respondents in the survey. As one of the main contributions, this research presents the new Asteri consultative auditing process. Organizations with low performance levels on the audited subject benefit the most from the Asteri consultative auditing process. Asteri may be usable in many different types of audits, not only in SSM audits. As a new result, this study provides new knowledge on attitudes related to auditing. According to the research findings, auditing may generate negative attitudes and the auditor should take them into account when planning and preparing for audits. Negative attitudes can be compensated by producing added value, objectivity and positivity for the audit and, thus, improve the positive effects of auditing on knowledge and skills. Moreover, as the results of this study shows, auditing safety and security issues do not increase feelings of insecurity, but rather increase feelings of safety and security when using the new Asteri consultative auditing process with the TUTOR model. The results showed that the SSM in the audited UASs was statistically significantly more advanced than that in the audited ESs. However, there is still room for improvement in the ESs and the UASs as the approach to the SSM was fragmented. It can be assumed that the majority of Finnish UASs and ESs do not likely meet the basic level of the comprehensive, risk based the SSM.
Resumo:
Bottom of the pyramid (BoP) markets are an underserved market of approximately four billion people living on under $5 a day in four regional areas: Africa, Asia, Eastern Europe and Latin America. According to estimations, the BoP market forms a $5 trillion global consumer market. Despite the potential of BoP markets, companies have traditionally focused on serving the markets of developed countries and ignored the large customer group at the bottom of the pyramid. The BoP approach as first developed by Prahalad and Hart in 2002 has focused on multinational corporations (MNCs), which were thought of as the ones who should take responsibility in serving the customers at the bottom of the pyramid. This study challenges this proposition and gives evidence that also smaller international new ventures – entrepreneurial firms that are international from their birth, can be successful in BoP markets. BoP markets are characterized by a number of deficiencies in the institutional environment such as strong reliance on informal sector, lack of infrastructure and lack of skilled labor. The purpose of this study is to increase the understanding of international entrepreneurship in BoP markets by analyzing how international new ventures overcome institutional constraints in BoP markets and how institutional uncertainty can be exploited by solving institutional problems. The main objective is divided into four sub objectives. • To describe the opportunities and challenges BoP markets present • To analyze the internationalization of INVs to BoP markets • To examine what kinds of strategies international entrepreneurs use to overcome institutional constraints • To explore the opportunities institutional uncertainty offers for INVs Qualitative approach was used to conduct this study and multiple-case study was chosen as a research strategy in order to allow cross-case analysis. The empirical data was collected through four interviews with the companies Fuzu, Mifuko, Palmroth Consulting and Sibesonke. The results indicated that understanding of the wider institutional environment improves the survival prospects of INVs in BoP markets and that it is indeed possible to exploit institutional uncertainty by solving institutional problems. The main findings were that first-hand experience of the markets and grassroots levels of information are the best assets in internationalization to BoP markets. This study highlights that international entrepreneurs with limited resources can improve the lives of people at the BoP with their business operations and act as small-scale institutional entrepreneurs contributing to the development of the institutional environment of BoP markets.
Resumo:
An 1897 receipt from the Security, Loan & Savings Company to the Grand Central Hotel Co. for $15.00
Resumo:
During the 1980's and for much of the 1990's, many countries in the Asia Pacific were renowned for their economic development and prosperity. The Asian tigers were a source of great interest for many economists and international investors. The 1997 Asian financial crisis, however, dramatically altered the growth and the performance of these economies. The crisis sent several ofAsia's best performing economies on a downward spiral from which many have yet to fully recover. The crisis exposed the financial and the political weaknesses ofmany countries in the region. Moreover, the crisis severely affected the wellbeing and the security ofmany ofthe region's citizens. This text will examine the economic crisis in greater detail and explore current debates in the study of international relations theory. More specifically, this paper will examine recent challenges posed to traditional international relations theory and address alternative approaches to this field of study. This paper will examine Critical theory and its role in shifting the referent object of security from the state to the individual. In this context, this paper will also assess Critical theory's role in enabling such issues as gender and human security to find a place on the agendas of international relations scholars and foreign policy makers. The central focus ofthis study will be the financial crisis and its impact on human security in the Southeast Asia. Furthermore, this paper will assess the recovery efforts ofthe domestic governments, international organizations and various Canadian sponsored initiatives in the context ofhuman security.
Resumo:
This is a qualitative study exploring the physical activity patterns of a group of women with physical disabilities through their lifespan. In-depth interviews were done with a group of 6 women aged 1 9 to 3 1 . The data were analyzed via content and demographic strategies. Participants in this study reported that their physical activity patterns and their experiences related to their physical activity participation changed over their lives. They were most physically active in their youth (under 14 years of age) and as they reached high school age (over 14 years of age) and to the present time, they have become less physically active. They also reported both affordances and constraints to their physical activity participation through their lifespan. In their youth, they reported affordances such as their parents' assistance, an abundance of available physical activity opportunities, and independent unassisted mobility, as all playing an important factor in their increased youth physical activity. In adulthood, the participants' reported less time, fewer opportunities for physical activity, and reliance on power mobility as significant constraints to their physical activity. The participants reported fewer constraints to being physically active in their youth when compared to adulthood. Their reasons for participation in physical activity changed from fun and socialization in their youth instead of for maintenance of health, weight, and function in adulthood. These affordances, constraints and reasons for physical activity participation were supported in the literature.
Resumo:
Failed and fragile states that result from intrastate war pose severe threats to the security of both the international system and individual states alike. In the post-Cold War era, the international community has come to recognize the reality of these threats and the difficulty involved in ending violence and building sustainable peace in failed and fragile states. This work focuses upon the development of a comprehensive strategy for sustainable peace-building by incorporating the tenets of the human security doctrine into the peace-building process. Through the use of case studies of The Former Yugoslav Republic of Macedonia and East Timor, the development and refinement of the doctrine of human security will occur, as well as, an understanding of how and where human security fits into the sustainable peace-building equation. The end result of the analysis is the development of a hierarchical pyramid formation that brings together human security and peace-building into one framework that ultimately creates the foundation and structure of sustainable peace-building. With the development of a sustainable peace-building structure based upon the human security doctrine, the role of Canada in the support of sustainable peace-building is analyzed in relation to the form and level of involvement that Canada undertakes and contributes to in the implementation and support of sustainable peace-building initiatives. Following from this, recommendations are provided regarding what role(s) Canada should undertake in the sustainable peace-building process that take into consideration the present and likely future capabilities of Canada to be involved in various aspects of the peace-building process. ii This paper outlines the need for a peace-building strategy that is designed to be sustainable in order that failed and fragile states resulting from intrastate conflict do not regress or collapse back into a condition of civil war, and subsequently designs such a strategy. The linking of peace-building and human security creates the required framework from which sustainable peace-building is derived. Creating sustainable peace is necessary in order to increase the likelihood that both present and future generations existing in failed and fragile states will be spared from the scourge of intrastate war.
Resumo:
The design of a large and reliable DNA codeword library is a key problem in DNA based computing. DNA codes, namely sets of fixed length edit metric codewords over the alphabet {A, C, G, T}, satisfy certain combinatorial constraints with respect to biological and chemical restrictions of DNA strands. The primary constraints that we consider are the reverse--complement constraint and the fixed GC--content constraint, as well as the basic edit distance constraint between codewords. We focus on exploring the theory underlying DNA codes and discuss several approaches to searching for optimal DNA codes. We use Conway's lexicode algorithm and an exhaustive search algorithm to produce provably optimal DNA codes for codes with small parameter values. And a genetic algorithm is proposed to search for some sub--optimal DNA codes with relatively large parameter values, where we can consider their sizes as reasonable lower bounds of DNA codes. Furthermore, we provide tables of bounds on sizes of DNA codes with length from 1 to 9 and minimum distance from 1 to 9.
Resumo:
Please consult the paper edition of this thesis to read. It is available on the 5th Floor of the Library at Call Number: Z 9999 P65 D53 2007
Resumo:
While service-learning is often said to be beneficial for all those involved—students, community members, higher education institutions, and faculty members—there are relatively few studies of the attraction to, and effect of, service-learning on faculty members. Existing studies have tended to use a survey design, and to be based in the United States. There is a lack of information on faculty experiences with service-learning in Ontario or Canada. This qualitative case study of faculty experiences with service-learning was framed through an Appreciative Inquiry social constructionist approach. The data were drawn from interviews with 18 faculty members who belong to a Food Security Research Network (FSRN) at a university in northern Ontario, reports submitted by the network, and personal observation of a selection of network-related events. This dissertation study revealed how involvement with service-learning created opportunities for faculty learning and growth. The focus on food security and a commitment to the sustainability of local food production was found to be an ongoing attraction to service-learning and a means to engage in and integrate research and teaching on matters of personal and professional importance to these faculty members. The dissertation concludes with a discussion of the FSRN’s model and the perceived value of a themed, transdisciplinary approach to service-learning. This study highlights promising practices for involving faculty in service-learning and, in keeping with an Appreciative Inquiry approach, depicts a view of faculty work at its best.
Resumo:
Printed blank of Statement of Security Form naming the bond as Jones County Texas Bonds for the purpose of building a courthouse. It is made out to S.D. Woodruff and dated June 12, 1885. An envelope addressed to Mr. S.D. Woodruff is also included. The postmarks are Kansas, 1885 and St. Catharines, June 13, 1885.
Resumo:
International human rights law, international humanitarian law, international refugee law and international criminal law: each chapter of this corpus stands as a fundamental defense against assaults on our common humanity… The very power of these rules lies in the fact that they protect even the most vulnerable, and bind even the most powerful. No one stands so high as to be above the reach of their authority. No one falls so low as to be below the guard of their protection. Sergio Vieira de Mello, United Nations General Assembly, November 2002.
Resumo:
Paul Latimer, Associate Professor, Department of Business Law and Taxation. Faculty of Business and Economics, Monash University. Présentation dans le cadre du cycle de conférences organisé par le CRDP intitulé « Le droit à la sécurité ... la sécurité par le droit ».
Resumo:
Brian Job, Professor, Department of Political Science, University of British Columbia, Director, Center of International Relations. Présentation dans le cadre du cycle de conférences organisé par le CRDP intitulé « Le droit à la sécurité ... la sécurité par le droit ».
Resumo:
Static oligopoly analysis predicts that if a single firm in Cournot equilibrium were to be constrained to contract its production marginally, its profits would fall. on the other hand, if all the firms were simultaneously constrained to reduce their productino, thus moving the industry towards monopoly output, each firm's profit would rise. We show that these very intuitive results may not hold in a dynamic oligopoly.