784 resultados para e-government strategy analysis
Resumo:
Over the past decade, scholarly interest concerning the use of limitations to constrain government spending and taxing has noticeably increased. The call for constitutional restrictions can be credited, in part, to Washington's apparent inability to legislate any significant reductions in government expenditures or in the size of the national debt. At the present time, the federal government is far from instituting any constitutional limitations on spending or borrowing; however, the states have incorporated many controls on revenues and expenditures, the oldest being strictures on full faith and credit borrowing. This dissertations examines the efficacy of these restrictions on borrowing across the states (excluding Alaska) for the period dating from 1961 to 1990 and also studies the limitations on taxing and spending synonymous with the Tax Revolt.
We include socio-economic information in our calculations to control for factors other than the institutional variables that affect state borrowing levels. Our results show that certain constitutional restrictions (in particular, the referendum requirement and the dollar debt limit) are more effective than others. The apparent ineffectiveness of other limitations, such as the flexible debt limit, seem related to the bindingness of the limitations in at least half of the cases. Other variables, such as crime rates, number of schoolage children, and state personal income do affect the levels of full faith and credit debt, but not as strongly as the limitations. While some degree of circumvention can be detected (the amount of full faith and credit debt does inversely affect the levels of nonguaranteed debt), it is so small when compared to the effectiveness of the constitutional restrictions that it is almost negligible. The examination of the tax revolt era limitations yielded quite similar conclusions, with the additional fact that constitutional restrictions appear more binding than statutory ones. Our research demonstrates that constitutional limitations on borrowing can be applied effectively to constrain excessive borrowing, but caution must be used. The efficacy of these restrictions decrease dramatically as the number of loopholes increase.
Resumo:
International communication strategy followed by Ikea analysis of campaigns in different countries, features and possible justifications of the differerences.
Resumo:
Traditional Chinese medicines (TCMs), due to their long time clinic test and reliable therapeutic efficacy, are attracting increased global attention served as excellent pools of bioactive compounds for the discovery of new drugs. However, hundreds or even thousands of components are usually contained in traditional Chinese medicines and only a few compounds are responsible for the pharmaceutical and/or toxic effects. The large numbers of other components in traditional Chinese medicines make the screening and analysis of the bioactive components extremely difficult. By the way, the combination effect of bioactive components on the pharmacological activity makes it very difficult to clear the therapeutic mechanism of TCMs. Therefore, some strategies have to design for screening of bioactive compounds in traditional Chinese medicines, which further leads to disclose the therapeutic mechanism of TCMs in molecular level. The review will summarize the present state of the art of screening strategy for active compounds in traditional Chinese medicines, and the chromatography methods for screening and analysis of bioactive compounds in traditional Chinese medicines will be emphasized. (C) 2004 Elsevier B.V. All rights reserved.
Resumo:
Morgan, R.; Strong, C.; and McGuinness, T. (2003). Product-market positioning and prospector strategy: An analysis of strategic patterns from the resource-based perspective. European Journal of Marketing. 37(10), pp.1409-1439 RAE2008
Resumo:
In this paper the claim for the market for a new business management to ensure the presence of women in decision -making to respond to new social needs addressed. Thus, this paper analyzes the influence of gender diversity of the directors on the profitability and the level of debt for a sample of 5,199 Spanish cooperatives. Unlike capitalist societies, these organizations have a number of peculiarities in their government, and that the partners are themselves major time, agents and customers. The study focuses on the Spanish context, where there is an open debate on the importance of women's business management, as in other countries, driven by the proliferation of legislation on gender equality, being, in addition, Spain, the pioneer in having specific legislation on Social Economy. The results show that cooperatives with greater female representation in theirs Boards have higher profitability. On the other hand, those Boards with a higher percentage of women show a lower level of indebtedness.
Resumo:
This article explores an opportunity for mutual learning between the fields of human rights law and economic analysis. Specifically it considers how economic techniques might be used to appraise public expenditure in line with international obligations arising from the International Covenant on Economic, Social and Cultural Rights 1966 (ICESCR). Our argument is that such tools do have the potential to contribute to this aim, but that embedding them within government budget processes through “human rights mainstreaming” may prove problematic in practice. We therefore suggest, as part of a broader strategy which includes judicial enforcement, that mainstreaming initiatives and budget analysis can be useful as complementary tools for the full realisation of all human rights.
Resumo:
Security devices are vulnerable to Differential Power Analysis (DPA) that reveals the key by monitoring the power consumption of the circuits. In this paper, we present the first DPA attack against an FPGA implementation of the Camellia encryption algorithm with all key sizes and evaluate the DPA resistance of the algorithm. The Camellia cryptographic algorithm involves several different key-dependent intermediate operations including S-Box operations. In previous research, it was believed that the Camellia is stronger than AES due to the additional Whitening phase protecting the S-Box operation. However, we propose an attack that bypasses the Whitening phase and targets the S-Box. In this paper, we also discuss a lowcost countermeasure strategy to protect the Pre-whitening / Post-whitening and FL function of Camellia using Dual-rail Precharged Logic and to protect against attacks of the S-Box using Random Delay Insertion. © 2009 IEEE.