955 resultados para private security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A importância económica, social e política do setor do turismo é uma realidade inquestionável. A sua expressão e capacidade de induzir o desenvolvimento económico em termos de outros setores, é cada vez mais importante. Apesar da dinâmica demonstrada, o setor do turismo enfrenta uma série de problemas estruturais que devem ser resolvidos. Nos últimos anos, o turismo em Portugal tem vindo a crescer em quantidade, mas às vezes sem muita qualidade. O desempenho económico do setor deve ser devidamente analisado, desde a análise do número de entradas de visitantes até questões como o volume de receitas obtido. Para além disso, é possível observar a existência de casos de concentração espacial excessiva em certas áreas do território. A política de turismo precisa de dimensão, de ser forte, bem estruturada e orientada. "Esta política deve promover sinergias entre redes de diferentes atores para criar uma base sólida de segurança e confiança para o investimento privado." (Costa, 2000) É importante avaliar o investimento e o sistema de financiamento no setor do turismo, para entender a filosofia e os objetivos que norteiam todo o sistema (política estratégica) e as dinâmicas territoriais e setoriais das empresas do turismo.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Componente de Apoio à Família surge como resposta à necessidade daquelas famílias cujo horário de trabalho não é compatível com o tempo letivo diário disponibilizado pelos jardins-de-infância públicos aos seus filhos. O Jardim-de-infância situa-se num contexto organizacional diversificado, uma vez que estabelece relações com o agrupamento de escolas a que pertence, com a autarquia, com os pais, com as associações de pais, com as instituições particulares de solidariedade social, com a comunidade e com outros parceiros educativos. Este estudo visa analisar a participação de diferentes prestadores de serviços: autarquias, associações de pais e instituições particulares de solidariedade social na organização, funcionamento e gestão da Componente de Apoio à Família. Neste contexto, pretendemos identificar os princípios e as estratégias que sustentam os diferentes prestadores de serviços e o modo como lidam com as questões da Componente de Apoio à Família, isto é, as lógicas de ação inerentes a cada prestador de serviços. Partindo de uma matriz metodológica qualitativa, recorremos ao estudo de caso, desenvolvendo o trabalho empírico em três concelhos da zona centro denominados Concelhos do Mar, da Ria e da Praia. Privilegia-se a realização de entrevistas, nomeadamente a educadores de infância, representantes dos agrupamentos de escolas, presidentes de associações de pais, diretoras/coordenadoras das instituições particulares de solidariedade social, animadores da componente de apoio à família e representantes das autarquias, num total de 56 entrevistas. Como principais resultados, verificamos que nos concelhos em estudo a resposta da Componente de Apoio à Família prestada por diferentes organizações apresentam lógicas de ação distintas: no Concelho do Mar a predominância vai para as lógicas de ação de poder local e de associativismo; no Concelho da Ria predominam lógicas de ação de natureza empresarial/mercado e de poder local; no Concelho da Praia salientamos as lógicas de ação burocrática e de poder local.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although security plays an important role in the development of multiagent systems, a careful analysis of software development processes shows that the definition of security requirements is, usually, considered after the design of the system. One of the reasons is the fact that agent oriented software engineering methodologies have not integrated security concerns throughout their developing stages. The integration of security concerns during the whole range of the development stages can help towards the development of more secure multiagent systems. In this paper we introduce extensions to the Tropos methodology to enable it to model security concerns throughout the whole development process. A description of the new concepts and modelling activities is given along with a discussion on how these concepts and modelling activities are integrated to the current stages of Tropos. A real life case study from the health and social care sector is used to illustrate the approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A computer system's security can be compromised in many ways—a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdropper can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack. What all these scenarios have in common is that the adversary is an untrusted entity that attacks a system from the outside—we assume that the computers under attack are operated by benign and trusted users. But if we remove this assumption, if we allow anyone operating a computer system—from system administrators down to ordinary users—to compromise that system's security, we find ourselves in a scenario that has received comparatively little attention.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

More and more software projects today are security-related in one way or the other. Requirements engineers often fail to recognise indicators for security problems which is a major source of security problems in practice. Identifying security-relevant requirements is labour-intensive and errorprone. In order to facilitate the security requirements elicitation process, we present an approach supporting organisational learning on security requirements by establishing company-wide experience resources, and a socio-technical network to benefit from them. The approach is based on modelling the flow of requirements and related experiences. Based on those models, we enable people to exchange experiences about security-requirements while they write and discuss project requirements. At the same time, the approach enables participating stakeholders to learn while they write requirements. This can increase security awareness and facilitate learning on both individual and organisational levels. As a basis for our approach, we introduce heuristic assistant tools which support reuse of existing security-related experiences. In particular, they include Bayesian classifiers which issue a warning automatically when new requirements seem to be security-relevant. Our results indicate that this is feasible, in particular if the classifier is trained with domain specific data and documents from previous projects. We show how the ability to identify security-relevant requirements can be improved using this approach. We illustrate our approach by providing a step-by-step example of how we improved the security requirements engineering process at the European Telecommunications Standards Institute (ETSI) and report on experiences made in this application.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Building secure systems is difficult for many reasons. This paper deals with two of the main challenges: (i) the lack of security expertise in development teams, and (ii) the inadequacy of existing methodologies to support developers who are not security experts. The security standard ISO 14508 (Common Criteria) together with secure design techniques such as UMLsec can provide the security expertise, knowledge, and guidelines that are needed. However, security expertise and guidelines are not stated explicitly in the Common Criteria. They are rather phrased in security domain terminology and difficult to understand for developers. This means that some general security and secure design expertise are required to fully take advantage of the Common Criteria and UMLsec. In addition, there is the problem of tracing security requirements and objectives into solution design,which is needed for proof of requirements fulfilment. This paper describes a security requirements engineering methodology called SecReq. SecReq combines three techniques: the Common Criteria, the heuristic requirements editorHeRA, andUMLsec. SecReqmakes systematic use of the security engineering knowledge contained in the Common Criteria and UMLsec, as well as security-related heuristics in the HeRA tool. The integrated SecReq method supports early detection of security-related issues (HeRA), their systematic refinement guided by the Common Criteria, and the ability to trace security requirements into UML design models. A feedback loop helps reusing experiencewithin SecReq and turns the approach into an iterative process for the secure system life-cycle, also in the presence of system evolution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper investigates the paradoxes inherent in Thai and Vietnamese drug policies. The two countries have much in common. Both are ultra-prohibitionist states which employ repressive policies to contain drug markets. Their policies have, however, diverged in two key areas: opium suppression and harm reduction. Thailand implemented an effective intervention to suppress opium farming centred upon alternative development, whereas Vietnam suppressed opium production through coercive negotiation with nominal alternative development. Vietnam has embraced elements of harm reduction, whereas Thailand has been slow to implement harm reduction policies. This paper hypothesises that these two differences are largely a product of their perceived relationship to security. The two cases demonstrate how once an issue is securitized the ultra-prohibitionist rules of the game can be broken to allow for more humane and pragmatic policies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aim There is growing interest in the contribution of public-private partnerships (PPPs) bridging the shortage of financial resources and management expertise in developing public healthcare infrastructure. However, few studies have evidenced PPPs’ ability in increasing efficiency in public procurement of primary healthcare infrastructure. The aim of this study was to assess to what extent PPPs would increase efficiency in public procurement of primary healthcare facilities. Subject and Methods A qualitative analysis, adopting a realistic research evaluation method, used data collected from a purposive sample of public (n=23) and private sector staff (n=2) directly involved in the UK National Health Service Local Improvement Finance Trust (LIFT). Results We find a positive association of LIFT helping to bridge public sector capital shortages for developing primary care surgeries. LIFT is negatively associated with inefficient procurement because it borrows finance from private banks, leaving public agencies paying high interest rates. The study shows that some contextual factors and mechanisms in LIFT play a major part in obstructing public staff from increasing procurement efficiency. Conclusion PPP’s ability to increase efficiency may be determined by contextual factors and mechanisms that restrict discretion over critical decisions by frontline public sector staff. Developing their capacity in monitoring PPP activities may make partnerships more efficient.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the number of pensioners in Europe rises relative to the number of people in employment, the gap between the contributions and the benefit levels increases, and consequently ensuring adequate pensions on a sustainable basis has become a major challenge. This study aims to explore the potential of using the Data Envelopment Analysis (DEA) technique in order to access the efficiency of the income protection in old age, one of the most important branches of Social Security. To this effect, we collected data from the 27 European Union Member States regarding this branch. Our results show important differences among the Member States and stress the importance of identifying best practices to achieve more adequate, sustainable and modernised pension systems. Our results also highlight the importance of using DEA as a decision support tool for policy makers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is a due date card for the book titled The Private Life of Helen of Troy with stamped dates from 1939-1941.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Spending on security in an SME usually has to compete with demands for hardware, infrastructure, and strategic applications. In this paper, the authors seek to explore the reasons why smaller SMEs in particular have consistently failed to see securing information as strategic year-on-year spending, and just regard as part of an overall tight IT budget. The authors scrutinise the typical SMEs reasoning for choosing to see non-spending on security as an acceptable strategic risk. They look particularly at possible reasons why SMEs tend not to take much notice of "scare stories" in the media based on research showing they are increasingly at risk, whilst larger businesses are taking greater precautions and become more difficult to penetrate. The results and their analysis provide useful pointers towards broader business environment changes that would cause SMEs to be more risk-averse and ethical in their approach to securing their own and their clients’ information.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper explores the prospects and challenges of achieving human security through United Nations (UN) human rights law. The paper does not aim to pronounce definitively on the achievement of human security by way of UN human rights law that is, to assess the achievement of human security per se 'as a future end state'. Rather the focus of the paper is firmly placed on the capacity of UN human rights law to achieve human security. The paper departs from the premise that if human rights define human security, international human rights law and UN human rights law in particular should have something to say about the achievement of human security.