965 resultados para key management personnel


Relevância:

80.00% 80.00%

Publicador:

Resumo:

We suspect that the array of silly names used to refer to temporary staff worldwide may be indicative of the extent to which these nurses have been relegated to, and we would argue, remain in, a type of underclass – relatively unsupported by employers in terms of professional practice and ipso facto excluded from contributing professionally to team work, practice development, clinical governance and evidence based practice. This may be acceptable to some but in a climate of risk averseness and in the interests of strategic planning we would suggest it is an accident waiting to happen. The recent UK Royal College of Nursing (RCN) (Ball & Pike, 2006) survey of bank and agency nurses brings a welcome focus on a group of nurses that make a significant contribution to the smooth running of health services in many countries.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Mismanagement of large-scale, complex projects has resulted in spectacular failures, cost overruns, time blowouts, and stakeholder dissatisfaction. We focus discussion on the interaction of key management and leadership attributes which facilitate leaders’ adaptive behaviors. These behaviors should in turn influence adaptive team member behavior, stakeholder engagement and successful project outcomes, outputs and impacts. An understanding of this type of management will benefit from a perspective based in managerial and organizational cognition. The research question we explore is whether successful leaders of large-scale complex projects have an internal process leading to a display of administrative, adaptive, and enabling behaviors that foster adaptive processes and enabling behaviors within their teams and with external stakeholders. At the core of the model we propose interactions of key attributes, namely cognitive flexibility, affect, and emotional intelligence. The result of these cognitive-affective attribute interactions is leadership leading to enhanced likelihood of complex project success.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Crisis holds the potential for profound change in organizations and industries. The past 50 years of crisis management highlight key shifts in crisis practice, creating opportunities for multiple theories and research tracks. Defining crises such as Tylenol, Exxon Valdez, and September 11 terrorist attacks have influenced or challenged the principles of best practice of crisis communication in public relations. This study traces the development of crisis process and practice by identifying shifts in crisis research and models and mapping these against key management theories and practices. The findings define three crisis domains: crisis planning, building and testing predictive models, and mapping and measuring external environmental influences. These crisis domains mirror but lag the evolution of management theory, suggesting challenges for researchers to reshape the research agenda to close the gap and lead the next stage of development in the field of crisis communication for effective organizational outcomes.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A Delay Tolerant Network (DTN) is one where nodes can be highly mobile, with long message delay times forming dynamic and fragmented networks. Traditional centralised network security is difficult to implement in such a network, therefore distributed security solutions are more desirable in DTN implementations. Establishing effective trust in distributed systems with no centralised Public Key Infrastructure (PKI) such as the Pretty Good Privacy (PGP) scheme usually requires human intervention. Our aim is to build and compare different de- centralised trust systems for implementation in autonomous DTN systems. In this paper, we utilise a key distribution model based on the Web of Trust principle, and employ a simple leverage of common friends trust system to establish initial trust in autonomous DTN’s. We compare this system with two other methods of autonomously establishing initial trust by introducing a malicious node and measuring the distribution of malicious and fake keys. Our results show that the new trust system not only mitigates the distribution of fake malicious keys by 40% at the end of the simulation, but it also improved key distribution between nodes. This paper contributes a comparison of three de-centralised trust systems that can be employed in autonomous DTN systems.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We consider the problem of how to maximize secure connectivity of multi-hop wireless ad hoc networks after deployment. Two approaches, based on graph augmentation problems with nonlinear edge costs, are formulated. The first one is based on establishing a secret key using only the links that are already secured by secret keys. This problem is in NP-hard and does not accept polynomial time approximation scheme PTAS since minimum cutsets to be augmented do not admit constant costs. The second one is based of increasing the power level between a pair of nodes that has a secret key to enable them physically connect. This problem can be formulated as the optimal key establishment problem with interference constraints with bi-objectives: (i) maximizing the concurrent key establishment flow, (ii) minimizing the cost. We show that both problems are NP-hard and MAX-SNP (i.e., it is NP-hard to approximate them within a factor of 1 + e for e > 0 ) with a reduction to MAX3SAT problem. Thus, we design and implement a fully distributed algorithm for authenticated key establishment in wireless sensor networks where each sensor knows only its one- hop neighborhood. Our witness based approaches find witnesses in multi-hop neighborhood to authenticate the key establishment between two sensor nodes which do not share a key and which are not connected through a secure path.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This report presents the final deliverable from the project titled Conceptual and statistical framework for a water quality component of an integrated report card’ funded by the Marine and Tropical Sciences Research Facility (MTSRF; Project 3.7.7). The key management driver of this, and a number of other MTSRF projects concerned with indicator development, is the requirement for state and federal government authorities and other stakeholders to provide robust assessments of the present ‘state’ or ‘health’ of regional ecosystems in the Great Barrier Reef (GBR) catchments and adjacent marine waters. An integrated report card format, that encompasses both biophysical and socioeconomic factors, is an appropriate framework through which to deliver these assessments and meet a variety of reporting requirements. It is now well recognised that a ‘report card’ format for environmental reporting is very effective for community and stakeholder communication and engagement, and can be a key driver in galvanising community and political commitment and action. Although a report card it needs to be understandable by all levels of the community, it also needs to be underpinned by sound, quality-assured science. In this regard this project was to develop approaches to address the statistical issues that arise from amalgamation or integration of sets of discrete indicators into a final score or assessment of the state of the system. In brief, the two main issues are (1) selecting, measuring and interpreting specific indicators that vary both in space and time, and (2) integrating a range of indicators in such a way as to provide a succinct but robust overview of the state of the system. Although there is considerable research and knowledge of the use of indicators to inform the management of ecological, social and economic systems, methods on how to best to integrate multiple disparate indicators remain poorly developed. Therefore the objective of this project was to (i) focus on statistical approaches aimed at ensuring that estimates of individual indicators are as robust as possible, and (ii) present methods that can be used to report on the overall state of the system by integrating estimates of individual indicators. It was agreed at the outset, that this project was to focus on developing methods for a water quality report card. This was driven largely by the requirements of Reef Water Quality Protection Plan (RWQPP) and led to strong partner engagement with the Reef Water Quality Partnership.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This position paper will: 1. Provide an update on relevant current developments in the education, training and positioning of clinician nurse scientists; 2. Provide and promote a rational argument for the development of the clinician nurse scientist role, and; 3. Discuss issues related to capacity building in clinical research in neuroscience nursing, with specific reference to and support for the cerebrovascular (stroke) specialty nursing area.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Diseases of Fruit Crops in Australia is the new standard reference in applied plant pathology in Australia covering important diseases affecting the broad range of fruit and nut crops grown throughout Australia. It is an essential tool for growers, horticulturists, crop consultants, research scientists, plant pathologists, quarantine officers, agribusiness representatives, pest management personnel, educators and students. The book is generously illustrated with high quality colour images to help diagnose diseases. It explains how to identify and manage each disease, describing the symptoms, its importance, the source of infection and spread, and control measures. Based on the highly regarded 1993 edition of Diseases of Fruit Crops, this new work updates management practices that have evolved since then. Importantly, it contains the latest information on diseases that have recently emerged in Australia as well as exotic diseases that are biosecurity threats to Australian fruit and nut production.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Beef cattle grazing is the dominant land use in the extensive tropical and sub-tropical rangelands of northern Australia. Despite the considerable knowledge on land and herd management gained from both research and practical experience, the adoption of improved management is limited by an inability to predict how changes in practices and combinations of practices will affect cattle production, economic returns and resource condition. To address these issues, past Australian and international research relating to four management factors that affect productivity and resource condition was reviewed in order to identify key management principles. The four management factors considered were stocking rates, pasture resting, prescribed fire, and fencing and water point development for managing grazing distribution. Four management principles for sound grazing management in northern Australia were formulated as follows: (1) manage stocking rates to meet goals for livestock production and land condition; (2) rest pastures to maintain them in good condition or to restore them from poor condition to increase pasture productivity; (3) devise and apply fire regimes that enhance the condition of grazing land and livestock productivity while minimising undesirable impacts; and (4) use fencing and water points to manipulate grazing distribution. Each principle is supported by several more specific guidelines. These principles and guidelines, and the supporting research on which they are based, are presented.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Semi-natural grasslands are the most important agricultural areas for biodiversity. The present study investigates the effects of traditional livestock grazing and mowing on plant species richness, the main emphasis being on cattle grazing in mesic semi-natural grasslands. The two reviews provide a thorough assessment of the multifaceted impacts and importance of grazing and mowing management to plant species richness. It is emphasized that livestock grazing and mowing have partially compensated the suppression of major natural disturbances by humans and mitigated the negative effects of eutrophication. This hypothesis has important consequences for nature conservation: A large proportion of European species originally adapted to natural disturbances may be at present dependent on livestock grazing and / or mowing. Furthermore, grazing and mowing are key management methods to mitigate effects of nutrient-enrichment. The species composition and richness in old (continuously grazed), new (grazing restarting 3-8 years ago) and abandoned (over 10 years) pastures differed consistently across a range of spatial scales, and was intermediate in new pastures compared to old and abandoned pastures. In mesic grasslands most plant species were shown to benefit from cattle grazing. Indicator species of biologically valuable grasslands and rare species were more abundant in grazed than in abandoned grasslands. Steep S-SW-facing slopes are the most suitable sites for many grassland plants and should be prioritized in grassland restoration. The proportion of species trait groups benefiting from grazing was higher in mesic semi-natural grasslands than in dry and wet grasslands. Consequently, species trait responses to grazing and the effectiveness of the natural factors limiting plant growth may be intimately linked High plant species richness of traditionally mowed and grazed areas is explained by numerous factors which operate on different spatial scales. Particularly important for maintaining large scale plant species richness are evolutionary and mitigation factors. Grazing and mowing cause a shift towards the conditions that have occurred during the evolutionary history of European plant species by modifying key ecological factors (nutrients, pH and light). The results of this Dissertation suggest that restoration of semi-natural grasslands by private farmers is potentially a useful method to manage biodiversity in the agricultural landscape. However, the quality of management is commonly improper, particularly due to financial constraints. For enhanced success of restoration, management regulations in the agri-environment scheme need to be defined more explicitly and the scheme should be revised to encourage management of biodiversity.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A Delay Tolerant Network (DTN) is a dynamic, fragmented, and ephemeral network formed by a large number of highly mobile nodes. DTNs are ephemeral networks with highly mobile autonomous nodes. This requires distributed and self-organised approaches to trust management. Revocation and replacement of security credentials under adversarial influence by preserving the trust on the entity is still an open problem. Existing methods are mostly limited to detection and removal of malicious nodes. This paper makes use of the mobility property to provide a distributed, self-organising, and scalable revocation and replacement scheme. The proposed scheme effectively utilises the Leverage of Common Friends (LCF) trust system concepts to revoke compromised security credentials, replace them with new ones, whilst preserving the trust on them. The level of achieved entity confidence is thereby preserved. Security and performance of the proposed scheme is evaluated using an experimental data set in comparison with other schemes based around the LCF concept. Our extensive experimental results show that the proposed scheme distributes replacement credentials up to 35% faster and spreads spoofed credentials of strong collaborating adversaries up to 50% slower without causing any significant increase on the communication and storage overheads, when compared to other LCF based schemes.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Mobile ad hoc networks (MANETs) is one of the successful wireless network paradigms which offers unrestricted mobility without depending on any underlying infrastructure. MANETs have become an exciting and im- portant technology in recent years because of the rapid proliferation of variety of wireless devices, and increased use of ad hoc networks in various applications. Like any other networks, MANETs are also prone to variety of attacks majorly in routing side, most of the proposed secured routing solutions based on cryptography and authentication methods have greater overhead, which results in latency problems and resource crunch problems, especially in energy side. The successful working of these mechanisms also depends on secured key management involving a trusted third authority, which is generally difficult to implement in MANET environ-ment due to volatile topology. Designing a secured routing algorithm for MANETs which incorporates the notion of trust without maintaining any trusted third entity is an interesting research problem in recent years. This paper propose a new trust model based on cognitive reasoning,which associates the notion of trust with all the member nodes of MANETs using a novel Behaviors-Observations- Beliefs(BOB) model. These trust values are used for detec- tion and prevention of malicious and dishonest nodes while routing the data. The proposed trust model works with the DTM-DSR protocol, which involves computation of direct trust between any two nodes using cognitive knowledge. We have taken care of trust fading over time, rewards, and penalties while computing the trustworthiness of a node and also route. A simulator is developed for testing the proposed algorithm, the results of experiments shows incorporation of cognitive reasoning for computation of trust in routing effectively detects intrusions in MANET environment, and generates more reliable routes for secured routing of data.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The commercial bottom trawl fishery for Pacific ocean shrimp, Pandalus jordani, or pink shrimp, operates mostly off the west coast of the contiguous United States. The California portion of the fishery has not been thoroughly documented or reviewed since the 1991 fishing season, despite its fluctuating more during the last 16 years (1992–2007) than at any other period in its 56-year history. We used fishery-dependent data, California Department of Fish and Game commercial landing receipts and logbook data, to analyze trends and review the California pink shrimp trawl fishery from 1992 to 2007. In particular, we focus on the most recent years of the fishery (2001–07) to highlight the gear developments and key management measures implemented in the fishery. The fishery is primarily driven by market conditions and is highly regulated by both state and Federal management agencies. Several key regulatory measures implemented during this decade have had significant effects on the fishery. For example, the requirement of a Bycatch Reduction Device on trawl nets targeting pink shrimp was approved in 2001 and has greatly reduced levels of finfish bycatch. Fishery production has declined, particularly in recent years, and may be attributed to decreased market prices, followed by reduced fishermen participation; both of which are related to changes in the processing sector and demand for the product.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The National Oceanic and Atmospheric Administration (NOAA), in cooperation with the New Jersey Marine Sciences Consortium (NJMSC), hosted a workshop at Rutgers University on 19-21 September 2005 to explore ways to link the U.S. Integrated Ocean Observing System (IOOS) to the emerging infrastructure of the National Water Quality Monitoring Network (NWQMN). Participating partners included the Mid-Atlantic Coastal Ocean Observing Regional Association, U.S. Geological Survey, Rutgers University Coastal Ocean Observing Laboratory, and the New Jersey Sea Grant College. The workshop was designed to highlight the importance of ecological and human health linkages in the movement of materials, nutrients, organisms and contaminants along the Delaware Bay watershed-estuary-coastal waters gradient (hereinafter, the “Delaware Bay Ecosystem [DBE]”), and to address specific water quality issues in the mid-Atlantic region, especially the area comprising the Delaware River drainage and near-shore waters. Attendees included federal, state and municipal officials, coastal managers, members of academic and research institutions, and industry representatives. The primary goal of the effort was to identify key management issues and related scientific questions that could be addressed by a comprehensive IOOS-NWQMN infrastructure (US Commission on Ocean Policy 2004; U.S. Ocean Action Plan 2004). At a minimum, cooperative efforts among the three federal agencies (NOAA, USGS and EPA) involved in water quality monitoring were required. Further and recommended by the U.S. Commission on Ocean Policy, outreach to states, regional organizations, and tribes was necessary to develop an efficient system of data gathering, quality assurance and quality control protocols, product development, and information dissemination.