986 resultados para swot-analyysi


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Seloste artikkelista: Hokajärvi, R., Hujala, T., Leskinen, L.A. & Tikkanen, J. 2009. Effectiveness of sermon policy instruments: Forest management planning practices applying the Activity Theory approach. Silva Fennica 43 (5) : 889–906.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Lectio praecursoria Lapin yliopistossa 30.10.2010.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since his inauguration, President Barack Obama has emphasized the need for a new cybersecurity policy, pledging to make it a "national security priority". This is a significant change in security discourse after an eight-year war on terror – a term Obama announced to be no longer in use. After several white papers, reports and the release of the so-called 60-day Cybersecurity Review, Obama announced the creation of a "cyber czar" position and a new military cyber command to coordinate American cyber defence and warfare. China, as an alleged cyber rival, has played an important role in the discourse that introduced the need for the new office and the proposals for changes in legislation. Research conducted before this study suggest the dominance of state-centric enemy descriptions paused briefly after 9/11, but returned soon into threat discourse. The focus on China's cyber activities fits this trend. The aim of this study is to analyze the type of modern threat scenarios through a linguistic case study on the reporting on Chinese hackers. The methodology of this threat analysis is based on the systemic functional language theory, and realizes as an analysis of action and being descriptions (verbs) used by the American authorities. The main sources of data include the Cybersecurity Act 2009, Securing Cyberspace for the 44th Presidency, and 2008 Report to Congress of the U.S. - China Economic and Security Review Commission. Contrary to the prevailing and popularized terrorism discourse, the results show the comeback of Cold War rhetoric as well as the establishment of a state-centric threat perception in cyber discourse. Cyber adversaries are referred to with descriptions of capacity, technological superiority and untrustworthiness, whereas the ‘self’ is described as vulnerable and weak. The threat of cyber attacks is compared to physical attacks on critical military and civilian infrastructure. The authorities and the media form a cycle, in which both sides quote each other and foster each other’s distrust and rhetoric. The white papers present China's cyber army as an existential threat. This leads to cyber discourse turning into a school-book example of a securitization process. The need for security demands action descriptions, which makes new rules and regulations acceptable. Cyber discourse has motives and agendas that are separate from real security discourse: the arms race of the 21st century is about unmanned war.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sanaan valta liittyy usein kielteisiä mielleyhtymiä. Vallan sanotaan esimerkiksi turmelevan, alistavan ja pakottavan. Voidaan kuitenkin todeta, että valtaa tarvitaan, jotta ihmiset saadaan toimimaan yhdessä yhteisten tavoitteiden saavuttamiseksi. Valta liittyy keskeisesti organisaatioiden toimintaan. Organisaatioita ei voi ymmärtää ymmärtämättä niiden valtarakenteita.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tutkimukseni kohteena on udmurtin kielen vokaalijärjestelmä ja erityisesti yleiskielen vokaaleiden kuvaaminen akustisen analyysin avulla. Udmurtin kielestä on tehty mittausmenetelmiin perustuvia tutkimuksia vasta vähän, joten tutkielmani täydentää aiempia, enimmäkseen korvakuuloon perustuvia kuvauksia udmurtin vokaalijärjestelmästä. Tutkimusaineistona on yhdentoista udmurttia äidinkielenään puhuvan henkilön lukemia sanoja, jotka olen nauhoittanut Turussa vuosina 2009–2011. Nauhoitteista olen mitannut vokaalien formanttiarvot sekä keston Praat-ohjelman avulla. Tarkastelen vokaaleja sekä painollisessa että painottomassa asemassa. Mittaustulosten perusteella olen piirtänyt kullekin informantille sekä koko ryhmälle akustiset vokaalikartat. Muutaman informantin tuloksissa on havaittavissa erikoisia piirteitä: tiettyjen vokaalien väliset akustiset erot ovat hyvin pienet. Sen sijaan koko ryhmää kuvaavat vokaalikartat vastaavat hyvin udmurtin kielestä aiemmin tehtyjä kuvauksia. Mittaustulosten perusteella voi myös todeta vokaalin kestolla olevan merkittävä asema painon ilmaisemisessa.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of the Thesis was to evaluate the business environment of electrical vehicle charging equipment (EVSE) in USA, find the key issues of entering the US EVSE markets and to form a marketing plan for possible market entry. The external market research analyzed the environment, customers, competitors and demand of EVSEs. In the internal analysis the focus was on resources and capabilities, offering, performance, business relations and US related issues. The research about the business environment was done using already available information from market studies and seminars. In external analysis there were also two semi-structured interviews from market experts used. The internal analysis was done mostly by interviews, but also company’s internal data sources were used. The interviews were semi-constructed and included eight interviewees from each part of EVSE value chain. The research findings were analyzed using SWOT analysis, which was converted to a so called TOWS matrix for extracting strategies. As a result of the Thesis, valuable information about the US markets and their requirements for EVSEs was gained. By matching the strengths of the case company and market requirements, customer segmentation and targeting were done and a marketing plan was constructed for the case company to help their management to evaluate the feasibility of possible market entry and investments to USA.