974 resultados para Security service
Resumo:
Security issues in telecommunication networks have become more important due to the development of the industry. The number of network elements and services has increased in the radio network as in the core network side, which has increased the number of security related issues. Ericsson has developed an OSS-RC product for operation and maintenance porpoises into the telecommunication networks. OSS-RC is used in a number of telecommunications operators, which have Ericsson's products used in their telecommunication networks. Ericsson provides product installation and maintenance support and guidance, but despite this, the product may have security related issues, either due to lack of following the instructions, human error or defect in the product itself or in a third party products attached. Ericsson’s Operation and Maintenance Security Service for OSS-RC networks aims to provide tools for checking the security level of the O&M product so that it meets all requirements and Ericsson’s own security related rules. Each customer has a unique telecommunications network structure and services, and so the security service has to be to create individually depending on the customer. The purpose of this thesis is to define the basic instructions for creating the security service for different customers.
Resumo:
The purpose of this thesis is to examine how services can be developed and how the voice of the customer can be incorporated to the strategic planning of services. Furthermore, the objective is to investigate the methods of customer need analysis and service bundling. The data is collected from secondary and primary sources by reviewing the existing academic literature and by conducting in-depth interviews and surveys. The main findings of this research indicate that the service development in personal security service industry should be conducted through a formalized process and the process should begin with setting the strategic objectives. Moreover, the voice of the customer should be incorporated into all stages of the development process, especially into the front-end of the process. Furthermore, the information on customer needs should be gathered in a manner tailored for the purposes of service development.
Resumo:
Dissertação de natureza científica realizada para obtenção do grau de Mestre em Engenharia de Redes de Computadores e Multimédia
Resumo:
Introduction: Emergency services (ES) are often faced with agitated,confused or aggressive patients. Such situations may require physicalrestraint. The prevalence of these measures is poorly documented,concerning 1 to 10% of patients admitted in the ES. The indications forrestraint, the context and the related complications are poorly studied.The emergency service and the security service of our hospital havedocumented physical restraint for several years, using specific protocolsintegrated into the medical records. The study evaluated the magnitudeof the problem, the patient characteristics, and degree of adherence tothe restraint protocol.Methods: Retrospective study of physical restraint used on adultpatients in the ES in 2009. The study included analysis of medical anddemographic characteristics, indications justifying restraint and qualityof restraint documentation. Patients were identified from computerizedES and security service records. The data were supplemented byexamination of patients' medical records.Results: In 2009, according to the security service, 390 patients (1%)were physically restrained in the ES. The ES computerized systemidentified only 196 patients. Most patients were male (62%). The medianage was 40 years (15-98 years; P90 = 80 years). 63 % of the situationsoccurred between 18h00 and 6h00, and most frequently on Saturday(19%). Substance or alcohol abuse was present in 48.7% of cases andacute psychiatric crisis was mentioned in 16.7%. In most cases,restraint was motivated by extreme agitation or auto / hetero-aggressiveviolence. Most patients (68 %) were restrained with upper limb andabdominal restraints. More than three anatomic restraints werenecessary in 52 % of the patients. Intervention of security guards wasrequired in 77% of the cases. 61 restraint protocols (31 %) were missingand 57% of the records were incomplete. In many cases, the protocolsdid not include the signature of the physician (22%) or of the nurse(43.8%). Medical records analysis did not allow reliable estimation ofthe number of restraint-induced complications.Conclusions: Physical restraint is most often motivated by majoragitation and/or secondary to substance abuse. Caregivers regularlycall security guards for help. Restraint documentation is often missing orincomplete, requiring major improvement in education and prescription.
Resumo:
Introduction: Emergency services (ES) are often faced with agitated,confused or aggressive patients. Such situations may require physicalrestraint. The prevalence of these measures is poorly documented,concerning 1 to 10% of patients admitted in the ES. The indications forrestraint, the context and the related complications are poorly studied.The emergency service and the security service of our hospital havedocumented physical restraint for several years, using specific protocolsintegrated into the medical records. The study evaluated the magnitudeof the problem, the patient characteristics, and degree of adherence tothe restraint protocol.Methods: Retrospective study of physical restraint used on adultpatients in the ES in 2009. The study included analysis of medical anddemographic characteristics, indications justifying restraint and qualityof restraint documentation. Patients were identified from computerizedES and security service records. The data were supplemented byexamination of patients' medical records.Results: In 2009, according to the security service, 390 patients (1%)were physically restrained in the ES. The ES computerized systemidentified only 196 patients. Most patients were male (62%). The medianage was 40 years (15-98 years; P90 = 80 years). 63 % of the situationsoccurred between 18h00 and 6h00, and most frequently on Saturday(19%). Substance or alcohol abuse was present in 48.7% of cases andacute psychiatric crisis was mentioned in 16.7%. In most cases,restraint was motivated by extreme agitation or auto / hetero-aggressiveviolence. Most patients (68 %) were restrained with upper limb andabdominal restraints. More than three anatomic restraints werenecessary in 52 % of the patients. Intervention of security guards wasrequired in 77% of the cases. 61 restraint protocols (31 %) were missingand 57% of the records were incomplete. In many cases, the protocolsdid not include the signature of the physician (22%) or of the nurse(43.8%). Medical records analysis did not allow reliable estimation ofthe number of restraint-induced complications.Conclusions: Physical restraint is most often motivated by majoragitation and/or secondary to substance abuse. Caregivers regularlycall security guards for help. Restraint documentation is often missing orincomplete, requiring major improvement in education and prescription.
Resumo:
Facility management (FM), from a service oriented approach, addresses the functions and requirements of different services such as energy management, space planning and security service. Different service requires different information to meet the needs arising from the service. Object-based Building Information Modelling (BIM) is limited to support FM services; though this technology is able to generate 3D models that semantically represent facility’s information dynamically over the lifecycle of a building. This paper presents a semiotics-inspired framework to extend BIM from a service-oriented perspective. The extended BIM, which specifies FM services and required information, will be able to express building service information in the right format for the right purposes. The service oriented approach concerns pragmatic aspect of building’s information beyond semantic level. The pragmatics defines and provides context for utilisation of building’s information. Semiotics theory adopted in this paper is to address pragmatic issues of utilisation of BIM for FM services.
Resumo:
Nos últimos anos verificou-se uma alteração das condições e modo de funcionamento de empresas e instituições, privadas e públicas, muitas delas através da introdução de novas ferramentas de gestão. De entre elas, podemos destacar o outsourcing, que apesar de não ser um fenómeno actual, é ainda em Portugal uma ferramenta recente e pouco explorada, que pode contribuir de forma decisiva para a modernização, flexibilidade e competitividade das empresas. O presente estudo pretende abordar a contratação de serviços externos nos serviços de saúde públicos, também conhecido como outsourcing, mediante uma análise prática da realidade de uma instituição hospitalar com sete serviços em regime de outsourcing, com recolha dos dados durante o triénio 2008-2010. No Serviço de Urgência durante 2010 o principal prestador recebeu mais 104,28% acima do valor referência/hora, no Serviço de Oftalmologia no ano de 2010 o prestador recebeu um valor superior em 24,91%, no Serviço de Limpeza, Higiene e Conforto é pago ao prestador durante o ano de 2010 um valor superior em 13,85%, no Serviço de Vigilância e Segurança o prestador recebeu durante o ano de 2010 um valor superior em 27,5%, caso a instituição hospitalar optasse por contratar, para os serviços atrás referidos, profissionais para o quadro de pessoal. Ainda em relação ao Serviço de Urgência foi pago mais 21,38% acima do valor de referência publicado por Despacho governamental. Em relação aos Serviços de Lavandaria e de Tratamento de Resíduos Sólidos, não foi possível recolher os dados necessários que pudessem levar a uma conclusão válida sobre os custos pagos pela instituição hospitalar. Pode-se concluir que a contratação de prestadores externos, para os serviços de saúde, essenciais e não essenciais, em regime de outsourcing, revela-se na maioria dos casos analisados a opção menos económica, com custos bastantes elevados.
Resumo:
Työn tavoitteena oli laatiavuonna 2008 valmistuvaan Vuosaaren satamaan palon-, öljyn- ja vaarallisten aineiden torjuntasuunnitelmat. Suunnitelmat perustuvat eri lain-säädännön sekä sataman ympäristöluvan vaatimuksiin. Ne otetaan käyttöön jo sata-man rakentamisen yhteydessä. Suunnitelmissa on Vuosaaren satamassa työskentelevälle henkilöstölle toimintaohjei-ta erilaisten onnettomuuksien varalle. Suunnitelmat täyttävät viranomaisten niille asettamat vaatimukset. Liitteillä on tarkentavia piirroksia ja toimintaohjeita, joita voi tarvittaessa hyödyntää työpisteissä tai torjuntakonteissa. Suunnitelmien laadinnassa ovat olleet mukana Helsingin Sataman ao. toiminnasta vastaavat henkilöt sekä eri viranomaiset (ympäristö- ja pelastusviranomaiset). Varsinainen diplomityö on kuvaus ja tiivistelmä eri suunnitelmista ja siitä, miten ne ovat syntyneet.
Resumo:
Unified Threat Management or UTM-devices have created a new way to implement security solutions for different customer needs and segments. Customer and business traffic is more and more Web and application based when security is needed to that level as well. Thesis focuses to explore what opportunities UTM-devices provides for operator acting as a managed security service provider and how to succeed better in the markets. Markets are explored both in the customer interface what customers are expecting form the managed service provides and from technology provider interface what kind of products and services they have for different implementations. Theoretical background is taken from product strategy, networking and product development. These are taken into account when developed and explored opportunities an operator has in managed security business with UTM-devices. In the thesis four main recognized technology vendors and their product and services are compared against operator managed security services needs. Based on the explorations of theory, customer needs and technology a product strategy is proposed for operator acting as a managed security provider.
Resumo:
El objetivo de la presente monografía de grado es analizar la relación entre la identidad dentro de Rusia y la política exterior de dicho Estado hacia la región de Abjasia. Se analiza y explica la manera en que los referentes identitarios dentro de Rusia en el periodo 2000-2008 influyen en las decisiones de política exterior que Rusia tomó hacia Abjasia en el campo militar y político. Se efectúa una revisión de textos (transcripciones de intervenciones y textos escritos) del Presidente y Primer Ministro de la Federación Rusa entre 2000 y 2008 para encontrar los referentes identitarios que determinan el comportamiento de Rusia hacia otros Estados y la forma en que influenciaron sus acciones con respecto a Abjasia.
Resumo:
La optimización de sistemas y modelos se ha convertido en uno de los factores más importantes a la hora de buscar la mayor eficiencia de un proceso. Este concepto no es ajeno al transporte escolar, ambiente que cambia constantemente al ritmo de las necesidades de sus clientes, y que responde ante una fuerte responsabilidad frente a sus usuarios, los niños que hacen uso del servicio, en cuanto al cumplimiento de tiempos y seguridad, mientras busca constantemente la reducción de costos. Este proyecto expone las problemáticas presentadas en The English School en esta área y propone un modelo de optimización simple que permitirá notables mejoras en términos de tiempos y costos, de tal forma que genere beneficios para la institución en términos financieros y de satisfacción al cliente. Por medio de la implementación de este modelo será posible identificar errores comunes del proceso, se identificarán soluciones prácticas de fácil aplicación en el manejo del transporte y se presentarán los resultados obtenidos en la muestra utilizada para desarrollar el proyecto.
Resumo:
The Nyasaland Emergency in 1959 proved a decisive turning point in the history of the Federation of Rhodesia and Nyasaland, which from 1953 to 1963 brought together the territories of Northern Rhodesia (Zambia), Southern Rhodesia (Zambia) and Nyasaland (Malawi) under a settler-dominated federal government. The British and Nyasaland governments defended the emergency by claiming to have gathered intelligence which showed that the Nyasaland African Congress was preparing a campaign of sabotage and murder. The Devlin Commission, appointed to investigate the emergency, dismissed the evidence of a ‘murder plot’, criticised the Nyasaland government's handling of the Emergency and, notoriously, described Nyasaland as a ‘police state’. This article has two principal aims. First, using the recently declassified papers of the Intelligence and Security Department (ISD) of the Colonial Office, it seeks to provide the first detailed account of what the British government knew of the intelligence relating to the ‘murder plot’ and how they assessed it, prior to the outbreak of the emergency. It demonstrates that officials in the ISD and members of the Security Service adopted a far more cautious attitude towards the intelligence than did Conservative ministers, and had greater qualms about allowing it into the public domain to justify government policy. Second, the article examines the implications of Devlin's use of the phrase ‘police state’ for Nyasaland and for the late colonial state in general. It contrasts Devlin's use of the term with that of security experts in the ISD, who routinely applied it to policing systems that diverged from their own preferred model. Hence, whereas Devlin compared policing in Nyasaland unfavourably with that in Southern Rhodesia, implying, ironically, that Nyasaland was ‘under-policed’ (because there were fewer police per head of population in Nyasaland than in Southern Rhodesia), the ISD regarded the intensive system of policing operated by the British South Africa Police in Southern Rhodesia as characteristic of a ‘police state’. The article suggests that the frequent use of the term ‘police state’ was indicative of broader anxieties about what Britain's legacy would be for the post-independence African state.
Resumo:
As American leadership has narrowly focused on fighting global terror in Iraq and Afghanistan, the modern version of the KGB, now known as the FSB, has been conducting continuous clandestine warfare operations against the United States. These warfare operations include strategic economic and political partnerships with anti-American entities worldwide and direct embedding of double agents in the US intelligence community. This paper investigates the role of Russia's cultural history leading to the merger of the Russian Federal Security Service (FSB) and Russian Organized Crime (ROC). This paper concludes that the FSB is the most pervasive security threat to the United States and that employing Russian native and heritage speakers of Russian in the US intelligence community compromises US national security.
Resumo:
Since the Party of Regions took power in Ukraine, the process of strengthening the executive branch of government at the expense of the others, together with the instrumental use of the law, has been progressing steadily. By seeking to restrict criticism of the government, the ruling party is aiming at marginalisation of opposition groups and establishing informal control over the main media (largely by exerting pressure on their owners). The role of the Security Service of Ukraine (SBU) is growing, as it is used increasingly frequently to put pressure on Western-oriented NGOs. The government’s control over the judiciary is expanding. These trends had existed before the Party of Regions’ ascension to power, but they were much weaker, as the previous governments did not enjoy such a strong position or the ability to achieve their ends so efficiently. The Party of Regions is planning to take another step towards total power during the local elections scheduled for October 2010. The party is determined to establish control over the local self-governments; to this end, it has amended the legislation in a way which now undermines local civil initiatives. These changes not only illustrate the interests and political standpoint of the ruling elite; they also result from systemic reasons, and these are deeply rooted in the Soviet past. The present Ukrainian state has evolved through the evolutionary transformation of the Ukrainian Soviet Socialist Republic. As a result, the main features of the previous system have been sustained, including the weakness of the representative bodies and the instrumental use of the law. Twenty years into its independent development, Ukraine has developed a merely formal democracy, which is distant from EU standards.
Resumo:
Over the last year, the situation in Russia’s North Caucasus has become further destabilised. Attacks and armed clashes happen daily, and destabilisation is spreading to an increasingly large area. The extent of violence in the region is so great that it can already be stated that a de facto civil war is taking place, the warring parties being the Islamic armed underground movement which operates under the banner of the so-called Emirate of the North Caucasus, and the secular governments of the individual republics, who are supported by local and federal branches of the Russian Federation’s Interior Ministry and Federal Security Service. Moscow has no idea how to successfully tackle the Caucasus rebellion. Force has proved to be costly and unproductive, while the attempts made since early 2010 to integrate the region with the rest of Russia by implementing development programmes have not brought the desired results, because of widespread corruption and faint interest from businessmen who are afraid to invest in such an unsafe region. A growing problem for Moscow, particularly for the prestige of the state, is attacks by militants on areas near Sochi, where the 2014 Winter Olympics is to take place. It must be assumed that over the next 3 years before the Olympics, Moscow’s priority in the region will be to ensure the safety of Olympic preparations, and then the games themselves. It cannot be ruled out that the North Caucasus Federal District with its ‘troubled republics’ will be surrounded by a kind of cordon sanitaire (Sochi is situated in the neighbouring Southern Federal District). This could in turn strengthen these republics’ isolation, maintain the state of permanent instability, and postpone the prospects of solving the region’s acute economic and social problems.