839 resultados para New institutional theory
Resumo:
Assertion is a speech act that stands at the intersection of the philosophy of language and social epistemology. It is a phenomenon that bears on such wide-ranging topics as testimony, truth, meaning, knowledge and trust. It is thus no surprise that analytic philosophers have devoted innumerable pages to assertion, trying to give the norms that govern it, its role in the transmission of knowledge, and most importantly, what assertion is, or how assertion is to be defined. In this thesis I attempt to show that all previous answers to the question “What is assertion?” are flawed. There are four major traditions in the literature: constitutive norm theories of assertion, accounts that treat assertion as the expression of speaker attitudes, accounts that treat assertion as a proposal to add some proposition to the common ground, and accounts that treat assertion as the taking of responsibility for some claim. Each tradition is explored here, the leading theories within the tradition developed, and then placed under scrutiny to demonstrate flaws within the positions surveyed. I follow the work of G.E. Moore and William P. Alston, whilst drawing on the work of Robert Brandom in order to give a new bipartite theory of assertion. I argue that assertion consists in the explicit presentation of a proposition, along with a taking of responsibility for that proposition. Taking Alston's explicit presentation condition and repairing it in order to deal with problems it faces, whilst combining it with Brandom's responsibility condition, provides, I believe, the best account of assertion.
Resumo:
El artículo plantea una contribución al debate académico sobre el surgimiento del Gobierno Abierto y los requerimientos de transformación de las Administraciones Públicas para afrontar a los retos que plantea. El texto, en base a la aportación de reflexiones y evidencias, se centra en el ámbito de los profesionales del sector público y la generación de competencias digitales. El marco analítico se combina con la presentación de evidencias basadas en dos estudios de caso de innovación en gestión de recursos humanos. Los resultados obtenidos permiten ilustrar las sinergias que se dan entre el Gobierno Abierto y el desarrollo de las competencias digitales, y cómo con ello se puede orientar la mejora las capacidades institucionales de las Administraciones públicas.
Resumo:
Titel: Faktorer som kan påverka företags val mellan K2 och K3 Författare: Angelica Höglund och Julia Wiman Handledare: Klas Sundberg Bakgrund och problem: Det nya K-regelverket som infördes 1 januari 2014 innebär att mindre onoterade företag idag har valmöjligheten att välja mellan regelverken K2 och K3. För dessa mindre företag är valet av regelverk viktigt då det kommer att påverka företagets räkenskaper. Syfte: Syftet med studien är att studera fördelningen av K2 och K3 för mindre onoterade företag inom två olika branscher, dessa är byggbranschen och juridik,- ekonomi- och konsultbranschen, samt vilka faktorer som kan påverka valet av regelverk. Teori: Studien bygger på två teorier, dessa är positive accounting theory och institutionell teori. Metod: I studien används en kvantitativ forskningsmetod där årsredovisningar har granskats och sammanställts, samt en kvalitativ metod som bygger på fyra semistrukturerade intervjuer där de identifierade faktorerna analyserats utifrån en analysmodell. Resultat och slutsats: Utifrån det empiriska materialet identifierades sju faktorer, dessa var leasing, företagets storlek, rättvisande bild, revisorns påverkan, komponentavskrivning, kostnad/nytta och koncernredovisning. Ovanstående faktorer har kategoriserats och analyserats utifrån PAT och institutionell teori. Förslag till vidare forskning: Ett förslag vore att forska vidare på de identifierade faktorerna för att undersöka i hur stor utsträckning de påverkar företagens beslut. En intressant studie hade även varit att genomföra en fallstudie som utgår från att upprätta en årsredovisning utifrån både K2 och K3 för att studera de skillnader som kan uppkomma.
Resumo:
Abstract We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new 'Danger Theory' (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.
Resumo:
Abstract We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new 'Danger Theory' (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.
Resumo:
We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new ‘Danger Theory’ (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of ‘grounding’ the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.
Resumo:
While succession intentions have received increasing scholarly attention in recent years, there is a lack of knowledge about country-level antecedents and differences. Our paper aims to close this gap by investigating succession intentions of 6,360 students with family business background from 26 countries. More specifically, we blend theory of planned behavior with institutional theory and find that institutional variables such as individualism, uncertainty avoidance, and the level of corruption explain the formation of succession intentions over and above traditional theory of planned behavior elements. In addition, we reveal a U-shaped relationship between a nation's level of economic development and the strength of succession intentions. This indicates the existence of two types of succession intentions: necessity and opportunity succession. These findings add valuable insights to literature on family businesses, succession, theory of planned behavior, and practice.
Resumo:
This study aims to analyse the extent of online social responsibility (SR) information disclosure by Portuguese municipalities and to identify related determinant factors, based on Institutional Theory and Legitimacy Theories. A content analysis was performed on webpages from 60 sampled municipalities, and an information disclosure index was created.Descriptive statistics obtained indicate the Total Disclosure Index (TDI) value was 0.46. The Economic Information sub-category exhibits the highest value (0.66), followed by the Social and Environmental Information categories (0.61 and 0.36, respectively). The multivariate analysis results indicate that LA21 implementation the existence of tax burdens, the characterisation of a municipality as urban and environmental/SR certification application positively influence SR information disclosure. TDI is negatively affected by the existence of an inactive population (i.e. by the percentage of individuals ≤19 and ≥65 years of age).
Resumo:
Es una revisión e interpretación profunda de la Teoría Institucional de Arte cuya reflexión se extiende hasta la Curaduría Creativa, un fenómeno del arte contemporáneo, del que podría predicarse un estatus de obra de arte. El objetivo principal pretende defender las condiciones bajo las cuales la curaduría puede considerarse una obra de arte.
Resumo:
Nariño y Cauca son dos de los departamentos de Colombia más afectados por la violencia. La reciente firma de un acuerdo de un cese bilateral de hostilidades con las Fuerzas Armadas Revolucionarias de Colombia (FARC) y los diálogos de La Habana son apenas el comienzo de la Construcción de Paz (CP) que implica el esfuerzo continuo de diferentes actores (gubernamentales, sector privado, sociedad civil y organismos multilaterales) para lograr no solo una paz negativa sino una paz positiva. El apoyo al emprendimiento es una estrategia implementada por el Gobierno y por los stakeholders que participan en el proceso del posconflicto, que tiene como finalidad respaldar el proceso de integración económica de las víctimas y desmovilizados. El presente documento es un estudio exploratorio elaborado por medio de una investigación cualitativa en la temática de emprendimiento, instituciones y CP en los departamentos de Nariño y Cauca. Se utilizó una estrategia metodológica denominada Matrices de Stakeholders para representar gráficamente la influencia institucional sobre la toma decisiones e implementación de los stakeholders sobre las reformas o políticas de emprendimiento y CP en estos dos departamentos. En esta investigación se encontró que i) en general, las instituciones del gobierno de los de Nariño y Cauca son extractivas y limitan la participación de la sociedad; ii) los stakeholders de la sociedad civil a pesar de tener cierta organización y voz no están en capacidad de generar influencia más que a nivel local o comunitario; iii) los vacíos dejados por las instituciones extractivas del gobierno tienden a ser llenados por instituciones inclusivas de stakeholders del sector privado y de organismos multilaterales.
Resumo:
El presente estudio tiene como objetivo mostrar los factores de éxito del programa de Responsabilidad Social de la Fundación Cardioinfantil, teniendo en cuenta que esta institución se ha convertido en un referente de compromiso social y sostenibilidad en el sector salud y en las instituciones de cuarto nivel de complejidad. Para alcanzar este objetivo se realizaron visitas y se aplicó un instrumento en la Fundación Cardioinfantil y en cuatro instituciones más del mismo nivel de atención en las ciudades de Bogotá, Cali y Medellín, donde generosamente aportaron información acerca del desarrollo de sus programas de Responsabilidad Social y de la aplicación de los tópicos contenidos en la ISO 26000 dentro de sus instituciones. Así mismo dentro de la Fundación Cardioinfantil se realizó una entrevista con la persona encargada de desarrollar el programa, quien manifestó los detalles del funcionamiento de este y los esfuerzos realizados para lograr la diferenciación en el sector salud. A través de este recorrido por las diferentes instituciones de salud consultadas y de la investigación realizada en la fundación Cardioinfantil se realizó una matriz DOFA que nos reveló la falta de comunicación en las mejoras realizadas en las diferentes organizaciones de salud, una vez han detectado las fallas en inherentes a su actuación con los grupos de interés. La adopción de estándares internacionales para la gobernanza y aplicación de los programas de RSE aún es incipiente en el sector salud en general. También es posible resaltar el hecho de que programas de RSE desarrollados a nivel de la fundación Cardioinfantil evolucionan hacia la innovación en la calidad de la atención y la trasformación de sus organizaciones hacia la mejora continua.
Resumo:
El trabajo de investigación es un estudio de caso que pretende analizar la forma en que factores del contexto institucional y la capacidad de influencia de ciertos actores se reflejan en la discusión y aprobación de la Ley 975 de 2005. Factores del contexto institucional y la capacidad de influencia sobre las posiciones asumidas por los actores políticos y sociales en las diferentes etapas del proceso legislativo y sobre las decisiones que se tomaron para la aprobación de la Ley, en torno a dos elementos fundamentales de ésta que son el delito político y la rebaja de penas. Para ello, se tiene en cuenta el enfoque neo-institucional y el concepto de agencia.
Resumo:
In February 2018, four years after the President of the Commission Jean Claude Juncker explicitly deprioritised the enlargement dossier, the European Commission relaunched the enlargement strategy to the region of the Western Balkans. This occurred despite the persistent polarisation around the topic among the EU Member States and the still-present struggles, when not outright regression, of some of the countries in pursuing the demanded reforms. This thesis carries out a multilevel foreign policy analysis of EU foreign policy toward the region of the Western Balkans during the period of the Juncker Commission, through the cases of Bosnia Herzegovina and Serbia. Drawing from Actorness theory (Bretherton and Vogler 2006), combined with perspectives from new institutional leadership (Smeets and Beach 2020), and new intergovernmentalism (Moravcsik 2018; Bickerton et al. 2015), this study seeks to explain the relaunch of enlargement by examining three dimensions: the international context and the role of non-EU actors such as China, Russia, and Turkey; the EU context, through the interaction of the significant EU Member States and Institutions; finally, the local context, through the analysis of the changes in the local perception of the EU and the considered non-EU actors. This study posits two interconnected points: first, that the changes in the international context, specifically the increased presence of non-EU actors such as China, Russia, and Turkey in the region, acted as triggering factors for the relaunch of the strategy. In addition, it argues that this relaunch was successful due to the peculiar combination of Germany’s interests and leadership within the Council, coupled with the Commission’s priorities.
Resumo:
The State Reform processes combined with the emergence and use of Information and Communication Technology (ICT) originated electronic government policies and initiatives in Brazil. This paper dwells on Brazilian e-government by investigating the institutional design it assumed in the state's public sphere, and how it contributed to outcomes related to e-gov possibilities. The analyses were carried out under an interpretativist perspective by making use of Institutional Theory. From the analyses of interviews with relevant actors in the public sphere, such as state secretaries and presidents of public ICT companies, conclusions point towards low institutionalization of e-gov policies. The institutional design of Brazilian e-gov limits the use of ICT to provide integrated public services, to amplify participation and transparency, and to improve public policies management.
Resumo:
Tropical countries face special specific problems in implementing sustainable forest management (SFM). In many countries, questions are raised on whether tropical forests should be publicly, commonly or privately owned and managed in order to enhance sustainability. Other debates also focus on whether small-scale enterprises are better positioned than large-scale industrial concessions to reduce poverty and attain sustainable management. In countries where large tracts of forest are state-owned, concessions are viewed as a means of delivering services of public and collective interest through an association of private investment and public regulation. However, the success of an industrial concession model in countries with large forest resource endowment to achieve multiple goals such as sustainable forest management and local/regional development depends on two critical assumptions. First, forest functions and services should be managed and maintained as public goods. In many cases, additional uses - and corresponding rights - can take place alongside logging activities. Industrial concessions can be more efficient than other tenure models (such as community-based forest management and small-scale enterprises) in achieving SFM, add value to raw material and comply with growing environmental norms. This is especially the case in market-remote areas with low population density and poor infrastructure. Secondly, to achieve these different outcomes, any concession system needs to be monitored and regulated, especially in contexts dominated by asymmetrical information between regulating authorities and concessionaires. New institutional responses have recently been put forward in several countries, providing valuable materials to design a renewed policy mix which associates public and private incentives. This paper provides a survey of the experience of forest concessions in several Central African and South American countries. The concession system is examined in order to clarify the issues involved, the problems encountered, and what can be learned from the shared experience of these countries in the last decade. This paper argues that despite a sometimes patchy record, concessions can help promote SFM so long as they are packaged with a certain number of specific measures. (C) 2008 Elsevier B.V. All rights reserved.