929 resultados para private security military company


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The regulatory framework for corporate governance, both in Australia and internationally, shifts between rules based regimes and principles based approach. The rules based regimes are typified by legislation that imposes mandated compliance based rules, such as the Sarbanes Oxley Act. Other regimes, such as Australia’s CLERP 9 and the ASX Corporate Governance Council’s principles, have opted for a disclosure approach. This paper examines these approaches in the context of the non-binding vote rule, which arguably combines aspects of both. The study’s methodology empirically considers evidence relating to actual voting patterns as well as case study examples of the non-binding vote’s effectiveness. Significantly, our analyses show that from its inception, the non-binding vote was effective in motivating management to change the remuneration package to one they perceived as more acceptable to shareholders and that the non-binding vote is an effective regime to manage CEO remuneration (and by extension) executive remuneration.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In an ever evolving business landscape, change is an ever present part of any organisation’s lifecycle. This thesis presents communication as a fundamental element of effective change management. Drawing from the existing change communication literature and two case studies, this thesis examines how organisations utilise strategic change communication to manage identity change. As a result this study presents a conceptual model that outlines a process of change communication strategy and implementation. This model is offered as a step toward connecting important scholarship into a more comprehensive portrait of change communication during identity change than so far has been available.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Bitcoin wallet is a set of private keys known to a user and which allow that user to spend any Bitcoin associated with those keys. In a hierarchical deterministic (HD) wallet, child private keys are generated pseudorandomly from a master private key, and the corresponding child public keys can be generated by anyone with knowledge of the master public key. These wallets have several interesting applications including Internet retail, trustless audit, and a treasurer allocating funds among departments. A specification of HD wallets has even been accepted as Bitcoin standard BIP32. Unfortunately, in all existing HD wallets---including BIP32 wallets---an attacker can easily recover the master private key given the master public key and any child private key. This vulnerability precludes use cases such as a combined treasurer-auditor, and some in the Bitcoin community have suspected that this vulnerability cannot be avoided. We propose a new HD wallet that is not subject to this vulnerability. Our HD wallet can tolerate the leakage of up to m private keys with a master public key size of O(m). We prove that breaking our HD wallet is at least as hard as the so-called "one more" discrete logarithm problem.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tensions surrounding social media in the employment relationship are increasingly evident in the media, public rhetoric, and courts and employment tribunals. Yet the underlying causes and dimensions of these tensions have remained largely unexplored. This article firstly reviews the available literature addressing social media and employment, outlining three primary sources of contestation: profiling, disparaging posts and blogs, and private use of social media during work time. In each area, the key dynamics and underlying concerns of the central actors involved are identified. The article then seeks to canvas explanations for these forms of contestation associated with social media at work. It is argued that the architecture of social media disrupts traditional relations in organisational life by driving employer and employee actions that (re)shape and (re)constitute the boundaries between public and private spheres. Although employers and employees are using the same social technologies, their respective concerns about and points of entry to these technologies, in contrast to traditional manifestations of conflict and resistance, are asymmetric. The article concludes with a representational summary of the relative legitimacy of concerns for organisational actors and outlines areas for future research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Staffing rural and remote schools is an important policy issue for the public good. This paper examines the private issues it also poses for teachers with families working in these communities, as they seek to reconcile careers with educational choices for children. The paper first considers historical responses to staffing rural and remote schools in Australia, and the emergence of neoliberal policy encouraging marketisation of the education sector. We report on interviews about considerations motivating household mobility with 11 teachers across regional, rural and remote communities in Queensland. Like other middle-class parents, these teachers prioritised their children’s educational opportunities over career opportunities. The analysis demonstrates how teachers in rural and remote communities constitute a special group of educational consumers with insider knowledge and unique dilemmas around school choice. Their heightened anxieties around school choice under neoliberal policy are shown to contribute to the public issue of staffing rural and remote schools.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present an approach for detecting sensor spoofing attacks on a cyber-physical system. Our approach consists of two steps. In the first step, we construct a safety envelope of the system. Under nominal conditions (that is, when there are no attacks), the system always stays inside its safety envelope. In the second step, we build an attack detector: a monitor that executes synchronously with the system and raises an alarm whenever the system state falls outside the safety envelope. We synthesize safety envelopes using a modified machine learning procedure applied on data collected from the system when it is not under attack. We present experimental results that show effectiveness of our approach, and also validate the several novel features that we introduced in our learning procedure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Pharmacists are considered medication experts but are underutilized and exist mainly at the periphery of the Malaysian primary health care team. Private general practitioners (GPs) in Malaysia are granted rights under the Poison Act 1952 to prescribe and dispense medications at their primary care clinics. As most consumers obtain their medications from their GPs, community pharmacists’ involvement in ensuring safe use of medicines is limited. The integration of a pharmacist into private GP clinics has the potential to contribute to quality use of medicines. This study aims to explore health care consumers’ views on the integration of pharmacists within private GP clinics in Malaysia. Methods A purposive sample of health care consumers in Selangor and Kuala Lumpur, Malaysia, were invited to participate in focus groups and semi-structured interviews. Sessions were audio recorded and transcribed verbatim and thematically analyzed using NVivo 10. Results A total of 24 health care consumers participated in two focus groups and six semi-structured interviews. Four major themes were identified: 1) pharmacists’ role viewed mainly as supplying medications, 2) readiness to accept pharmacists in private GP clinics, 3) willingness to pay for pharmacy services, and 4) concerns about GPs’ resistance to pharmacist integration. Consumers felt that a pharmacist integrated into a private GP clinic could offer potential benefits such as to provide trustworthy information on the use and potential side effects of medications and screening for medication misadventure. The potential increase in costs passed on to consumers and GPs’ reluctance were perceived as barriers to integration. Conclusion This study provides insights into consumers’ perspectives on the roles of pharmacists within private GP clinics in Malaysia. Consumers generally supported pharmacist integration into private primary health care clinics. However, for pharmacists to expand their capacity in providing integrated and collaborative primary care services to consumers, barriers to pharmacist integration need to be addressed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mike Budd and Max H. Kirsch, eds. Rethinking Disney: Private Control, Public Dimensions. Middletown, CT: Wesleyan University Press, 2005. ix + 341pp. $27.95

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research provides additional knowledge on the benefits and costs to society, in particular of road transport procured through Public-Private Partnership (PPP) arrangements. Currently, the public sector comparator (PSC) and cost-benefit analysis (CBA) used to evaluate and measure the benefits and costs of PPP are limited in their capacity to predict and forecast long-term events. PPP is attractive to governments due to the non-upfront payment, perceived value for money, and risk allocation and transfer to the private investor. However, public sector remains the guarantor, and under-writer of the private investor's loan from financial institutions and other voluntary risks which are unlimited to future compensatory claims. The new knowledge from this research is the introduction of a framework capable of evaluating, and measuring the associated PPP benefits, as well as the costs, effects, and impacts to society which are protracted and sporadic by nature.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An increasing number of studies analyze the relationship between natural disaster damage and income levels, but they do not consider the distinction between public and private disaster mitigation. This paper empirically distinguishes these two types of mitigation using Japanese prefectural panel data from 1975 to 2007. Our results show that public mitigation rather than private mitigation has contributed to mitigating the total damage resulting from natural disasters. Our estimation of cost-benefit ratios for each prefecture confirms that the mitigation efforts of urban prefectures are less effective than those of rural prefectures in focusing on both large and frequent/small disasters. Hence, urban prefectures need to reassess their public mitigation measures. Furthermore, to lessen the damage resulting from extreme catastrophes, policy makers are required to invest in improved mitigation infrastructures when faced with a high probability of disasters.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study questions how the categories of security, education and literacy were brought together as related elements of a whole-of-government strategy in the production of civil society. Drawing on an analysis of key political texts, the study argues that the categories of education and literacy have been used in diverse ways in the production of national, social, economic and geopolitical security interests. As dialogue about security has intensified, rationalisations about the national interest have engaged notions of security leading to the legitimation of a diverse set of policy instruments, strategically used to contain the rise of complex social forces and protect homogenous cultural values.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

India’s desire to transform itself into an international military power has brought about a rapid shift in its approach to procuring military hardware. The indigenization of India’s military manufacturing capacity forms an integral part of the strategic objectives of Indian military services, with its realization being a function of significant government investment in strategic technologies. This has a number of ramifications. An indigenous Indian military capacity, particularly in the field of aviation, forms a key part of India’s ambition of achieving regional air superiority, or even supremacy, and being capable of power projection. This is particularly in response to China’s increasing presence in South Asian airspace. A burgeoning Indian military manufacturing machine based on a comparative advantage in skilled technicians and lower-cost labour, together with strategic collaboration with foreign military hardware manufacturers, may also lead to neighbouring countries looking to India as a source of competitively priced military hardware. In short, this chapter seeks to analyse the rationale behind India’s attempt to become militarily self-sufficient in the field of aviation, discuss the technical, economic and political context in which it is achieving this transformation, and assess the potential outlook of success for India’s drive to achieve self-sufficiency in the arena of military aviation. This chapter will do so by using the case of India’s attempt to develop a fifth-generation fighter aircraft.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent research suggests that company secretaries are increasingly involved in governance responsibilities in addition to traditional administrative tasks. Little is known in the literature, however, about company secretaries' changing governance role, and their daily challenges in liaising with boards and other stakeholders. In addition, few studies have been able to gain access to learn firsthand how company secretaries operate. This exploratory study fills this void by gaining access to the opinions of about one hundred company secretaries in the Netherlands who operate in the two-tier board system. Our findings indicate that company secretaries significantly influence an organisation's governance framework, while they face a number of practical challenges with directors, employees and management in fulfilling their diverse roles and responsibilities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

IT consumerization is both a major opportunity and significant challenge for organizations. However, IS research has hardly discussed the implications for IT management so far. In this paper we address this topic by empirically identifying organizational themes for IT consumerization and conceptually exploring the direct and indirect effects on the business value of IT, IT capabilities, and the IT function. More specifically, based on two case studies, we identify eight organizational themes: consumer IT strategy, policy development and responsibilities, consideration of private life of employees, user involvement into IT-related processes, individualization, updated IT infrastructure, end user support, and data and system security. The contributions of this paper are: (1) the identification of organizational themes for IT consumerization; (2) the proposed effects on the business value of IT, IT capabilities and the IT function, and; (3) combining empirical insights into IT consumerization with managerial theories in the IS discipline.