965 resultados para key management personnel


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

- The leader looks at: 1. The leadership dilemma, by Warren H. Schmidt; 2. Authority and hierarchy, by David S. Brown; 3. Group effectiveness, by Gordon L. Lippitt and Edith Seashore; 4. Self-development, by Malcom S. Knowles; 5. Process of change, by Thomas R. Bennett II; 6. Decision-making, by David S. Brown; 7. Communication, by Leslie E. This; 8. Individual motivation, by Paul C. Buchanan; 9. Creativity, by Irving R. Weschler; 10. The consultative process, by Richard Beckhard; 11. Staff-line relations, by Ross Pollock; 12. The appraisal of personnel, by Michael G. Blansfield. - Training film index.; 13. The leader looks at the learning climate, by Malcolm S.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Despite having been described by the then (2003) Chief Pharmaceutical Officer for England as ·probably the biggest untapped resource for health improvement", the development of the public health function of community pharmacists has been limited. However, devolution of healthcare budgets has led 10 differential rates of development of the public health function in each administration of the UK (England, Scotland, Wales and Northern Ireland). This is measured and reflected upon in this thesis. Two large-scale surveys were conducted, one of key strategic personnel (Directors of Public Health and Chief Pharmacists) in Primary Care Organisations (PCOs) and one of practicing community pharmacists. This research highlights the fact that community pharmacists have developed an individualistic, service-based approach to their engagement with public health that is contrary to the more collective approach adopted by the wider public health movement. The study measures the scope and level of health-improving services through community pharmacy across the UK and shows that the nature of the pharmacy contractor (independent, multiple etc.) may impact on the range and nature of services provided. Survey data also suggest that attitudes towards pharmacy involvement in the public health agenda vary markedly between Directors of Public Health, PCO Chief Pharmacists, and community pharmacists. Furthermore, within the community pharmacist population, attitudes are affected by a wide range of factors including the nature of employment (owner, employee, self-employed) and the type of employing pharmacy (independent, multiple etc.). Implications for policy and areas for further research aimed at maximising the public health function of community pharmacists are suggested.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The rapid growth of emerging markets’ multinational companies (MNCs) is a recent phenomenon and, as such, their nature and structure of key management processes, functions, and roles need further examination. While an abundance of low-cost labor is often the starting point of competitive advantage for many of the emerging markets’ MNCs, it is the optimum configuration of people, processes, and technology that defines how they leverage their intangible resources. Based on case studies of four Indian IT services MNCs, involving 51 in-depth interviews of business and human resource (HR) leaders at the corporate and subsidiary levels, we identify five key HR roles—namely, strategic business partner, guardian of culture, builder of global workforce and capabilities, champion of processes, and facilitator of employee development. The analysis also highlights that the HR function in Indian IT service MNCs faces several challenges in consolidating the early gains of internationalization, such as lack of decentralized decision making, developing a global mind-set, localization of the workforce, and developing a global leadership pipeline. Based on our exploratory findings, we propose a framework outlining the global HR roles pursued by emerging IT services MNCs, the factors influencing them, and the challenges facing their HR function for future research.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Tropical coastal marine ecosystems including mangroves, seagrass beds and coral reef communities are undergoing intense degradation in response to natural and human disturbances, therefore, understanding the causes and mechanisms present challenges for scientist and managers. In order to protect our marine resources, determining the effects of nutrient loads on these coastal systems has become a key management goal. Data from monitoring programs were used to detect trends of macroalgae abundances and develop correlations with nutrient availability, as well as forecast potential responses of the communities monitored. Using eight years of data (1996–2003) from complementary but independent monitoring programs in seagrass beds and water quality of the Florida Keys National Marine Sanctuary (FKNMS), we: (1) described the distribution and abundance of macroalgae groups; (2) analyzed the status and spatiotemporal trends of macroalgae groups; and (3) explored the connection between water quality and the macroalgae distribution in the FKNMS. In the seagrass beds of the FKNMS calcareous green algae were the dominant macroalgae group followed by the red group; brown and calcareous red algae were present but in lower abundance. Spatiotemporal patterns of the macroalgae groups were analyzed with a non-linear regression model of the abundance data. For the period of record, all macroalgae groups increased in abundance (Abi) at most sites, with calcareous green algae increasing the most. Calcareous green algae and red algae exhibited seasonal pattern with peak abundances (Φi) mainly in summer for calcareous green and mainly in winter for red. Macroalgae Abi and long-term trend (mi) were correlated in a distinctive way with water quality parameters. Both the Abi and mi of calcareous green algae had positive correlations with NO3−, NO2−, total nitrogen (TN) and total organic carbon (TOC). Red algae Abi had a positive correlation with NO2−, TN, total phosphorus and TOC, and the mi in red algae was positively correlated with N:P. In contrast brown and calcareous red algae Abi had negative correlations with N:P. These results suggest that calcareous green algae and red algae are responding mainly to increases in N availability, a process that is happening in inshore sites. A combination of spatially variable factors such as local current patterns, nutrient sources, and habitat characteristics result in a complex array of the macroalgae community in the seagrass beds of the FKNMS.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Studying the job satisfaction of financial management personnel in the club industry may offer additional information to management of clubs to better work with and retain their associates. It is also hoped that the results of this study will provide hospitality students aspiring to become financial management personnel in the club industry with a glimpse of the job satisfaction level of financial executives in the club industry

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Résumé: Cette recherche s'est réalisée dans une institution chinoise de formation des adultes. Il existe très peu d'études présentant la pratique de l'enseignement et de l'apprentissage en Chine. Aussi, il semble que cette étude de cas puisse être utile. Elle porte sur le personnel de formation en administration économique dans un centre de formation de Tianjin. Le but premier de cette recherche est de décrire ce qui se fait à cet institut de formation des adultes. Les aspects couverts vont de la sélection du contenu de formation et des modalités d'enseignement jusqu'à la compréhension de l'enseignement et de l'apprentissage. À partir de l'expérience des professeurs de ce centre de Tianjin, cette étude cherche précisément à décrire leurs perceptions et leurs attitudes en regard d'un enseignement centré sur l'apprentissage et développé selon un mode de collaboration. Les fondements théoriques retenus s'inspirent des conceptions andragogiques de Knowles, de celles de Brookfield qui ont trait aux rôles des formateurs et formatrices d'adultes et de Conti qui présente une conception de l'enseignement qui se développe selon un mode de collaboration. Les données sont été retenues à la suite d'interviews et de questionnaires. Ce dernier instrument a été administré à 70 professeurs de formation aux adultes. Les résultats obtenus sont décrits et analysés. Les principaux éléments indiquent que la pratique actuelle de formation des adultes à ce centre de Tianjin ne tient pas compte des principes de l'éducation des adultes présenté selon un mode de collaboration. La formation est centrée sur l'enseignement. Il est à souhaiter que cette recherche contribuera à développer une meilleure compréhension de l'enseignement et de l'apprentissage en Chine tel que perçus par les formateurs et formatrices. Quelques suggestions de recherche complémentaires sont proposées à la fin.||Abstract: The present study grew out of one Chinese adult institute. Relatively few works are available that present a view of what actually happens in Chinese adult teaching and learning practice. Accordingly, it is believed that a case study on Tianjin Institute of Training Economic Management Personnel (TITEMP) which has been working for years in varions forms of adult programs, will be very useful addition to the knowledge of Chinese adult teaching and learning. The primary purpose of the present study is to serve as an introduction to one Chinese adult institute (TITEMP) in terms of characteristics of teaching, including selecting teaching content and teaching pattern, and to expand the understanding of Chinese adult teaching and learning. Based on the experiences of teachers at TITEMP, the study seeks to investigate the issues of teacher's perceptions and attitudes of teaching and learning to obtain implications toward learning-centred and collaborative mode. The theoretical foundations include andragogical conceptions (Knowles), roles of adult teachers (Brookfield), and conceptions of collaborative teaching and learning mode (Conti). The main sources of data are: the interviews and results of the questionnaire. Questionnaire responses from 70 teachers with knowledge of adult teaching and learning are described and interpreted. The general findings of the study are that the existing adult teaching practice at TITEMP does not adequately account for the principles of adult learning in a collaborative mode with adult students. Adult learning is teaching-centred. Some suggestions for further research are offered. It is hoped and believed that this research will contribute to a better understanding of Chinese adult teaching and learning in general, more particularly to the empirical study of the teachers from teaching and learning perspective in a Chinese adult higher learning setting. The research findings will be used as basis for the exploration of Chinese adult teaching.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Dissertação (mestrado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2016.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Radio Frequency Identification (RFID) is an emerging wireless object identification technology with many potential applications such as supply chain management, personnel tracking and healthcare. However, security vulnerabilities of the RFID system have been a serious concern for its wide adoption in many applications. Although much work has been done to provide privacy and anonymity, little focus has been given to ensure RFID data confidentiality, integrity and to address the tampered data recovery problem. To this end, we propose a lightweight stenographic-based approach to ensure RFID data confidentiality and integrity as well as the recovery of tampered RFID data. © 2013 Springer-Verlag Berlin Heidelberg.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Protecting essential habitats through the implementation of area closures has been recognized as a useful management tool for rebuilding overfished populations and minimizing habitat degradation. School shark (Galeorhinus galeus) have suffered significant stock declines in Australia; however, recent stock assessments suggest the population may have stabilized and the protection of closed nursery areas has been identified as a key management strategy to rebuilding their numbers. Young-of-The-year (YOY) and juvenile G. galeus were acoustically tagged and monitored to determine ontogenetic differences in residency and seasonal use of an important protected nursery area (Shark Refuge Area or SRA) in southeastern Tasmania. BothYOYand juvenile G. galeus showed a distinct seasonal pattern of occurrence in the SRAwith most departing the area during winter and only a small proportion of YOY (33%) and no juveniles returning the following spring, suggesting areas outside the SRA may also be important during these early life-history stages. While these behaviors confirm SRAs continue to function as essential habitat during G. galeus early life history, evidence of YOY and juveniles emigrating from these areas within their first 1-2 years and the fact that few YOY return suggest that these areas may only afford protection for a more limited amount of time than previously thought. Determining the importance of neighbouring coastal waters and maintaining the use of traditional fisheries management tools are therefore required to ensure effective conservation of G. galeus during early life history.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The demand for data storage and processing is increasing at a rapid speed in the big data era. The management of such tremendous volume of data is a critical challenge to the data storage systems. Firstly, since 60% of the stored data is claimed to be redundant, data deduplication technology becomes an attractive solution to save storage space and traffic in a big data environment. Secondly, the security issues, such as confidentiality, integrity and privacy of the big data should also be considered for big data storage. To address these problems, convergent encryption is widely used to secure data deduplication for big data storage. Nonetheless, there still exist some other security issues, such as proof of ownership, key management and so on. In this chapter, we first introduce some major cyber attacks for big data storage. Then, we describe the existing fundamental security techniques, whose integration is essential for preventing data from existing and future security attacks. By discussing some interesting open problems, we finally expect to trigger more research efforts in this new research field.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Access control is an indispensable security component of cloud computing, and hierarchical access control is of particular interest since in practice one is entitled to different access privileges. This paper presents a hierarchical key assignment scheme based on linear-geometry as the solution of flexible and fine-grained hierarchical access control in cloud computing. In our scheme, the encryption key of each class in the hierarchy is associated with a private vector and a public vector, and the inner product of the private vector of an ancestor class and the public vector of its descendant class can be used to derive the encryption key of that descendant class. The proposed scheme belongs to direct access schemes on hierarchical access control, namely each class at a higher level in the hierarchy can directly derive the encryption key of its descendant class without the need of iterative computation. In addition to this basic hierarchical key derivation, we also give a dynamic key management mechanism to efficiently address potential changes in the hierarchy. Our scheme only needs light computations over finite field and provides strong key indistinguishability under the assumption of pseudorandom functions. Furthermore, the simulation shows that our scheme has an optimized trade-off between computation consumption and storage space.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Effective information and knowledge management (IKM) is critical to corporate success; yet, its actual establishment and management is not yet fully understood. We identify ten organizational elements that need to be addressed to ensure the effective implementation and maintenance of information and knowledge management within organizations. We define these elements and provide key characterizations. We then discuss a case study that describes the implementation of an information system (designed to support IKM) in a medical supplies organization. We apply the framework of organizational elements in our analysis to uncover the enablers and barriers in this systems implementation project. Our analysis suggests that taking the ten organizational elements into consideration when implementing information systems will assist practitioners in managing information and knowledge processes more effectively and efficiently. We discuss implications for future research.