• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • 4
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 18
  • 18
  • 8
  • 7
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Public service integration in Kazakhstan : the case of one stop shop

Janenova, Saltanat January 2010 (has links)
This thesis is an analysis of the public service integration, a New Public Management initiative, in a transitional context such as Kazakhstan. This thesis focuses on three main perspectives – the impact of the service integration policy on those who was involved in the implementation process; the problematic aspects of service integration in a transitional context; and the use of “organisational learning” and “communities of practice” in analysing service integration. By combining New Public Management theory (in particular, the ideas on decentralising management and customer-orientation), service integration theory and organisational learning theories, and rich empirical data, this thesis found that public service integration was implemented in the Kazakhstani context to a limited extent. Through the use of triangulation of methods which incorporated case study, interviews, participant observation, virtual ethnography and documentary analysis, this thesis captured complex, non-linear and diverse power dimensions and relationships between the new single-window centres, traditional service providers and customers. The development of the “communities of practice” among the front-line personnel was analysed within service integration policy context. Promoting service integration is seen as beneficial for both service providers and customers in Kazakhstan, but there are both conceptual and practical challenges. Although significant progress in public service improvement was achieved and noted in the research, this thesis found that the One Stop Shops inherited relations-based, patronage system and corruption from the traditional bureaucracy. It found that the new technologies, while improving access to the public services, were used to extend centralised control across the regions. This thesis also found that organisational learning did take place, however, in the underdeveloped form of adaptive learning, with the lack of critical reflection on the existing ways of working. This thesis concluded that the institutional framework and culture prevailing in the Kazakhstani traditional bureaucracy constrained implementation of the service integration policy to a full extent.
2

Analyse des pratiques de tenue de dossiers cliniques des gestionnaires de cas sous l'angle de la continuité comme attribut essentiel de la qualité des services

Belzile, Louise January 2010 (has links)
Résumé : La qualité des services est considérée de plus en plus comme un paramètre essentiel de la conception des services sociosanitaires (MSSS, 2005). Selon les divers modèles théoriques de la qualité des services (Donabedian, 1980; Kroger, 2007; OMS, 2004), la continuité des services en constitue une composante importante, surtout pour une organisation des services qui se veut de plus en plus intégrée. La continuité est abordée ici en s'appuyant sur la définition tridimensionnelle qu'en donnent Reid, Haggerty & McKendry, (2003). Elle est relationnelle, ce qui implique l'existence de rapports significatifs entre professionnels et usagers. Elle est informationnelle, ce qui suppose de rendre accessibles aux professionnels les informations requises pour l'exercice de leurs fonctions. Enfin, il faut ajouter la dimension d'approche, laquelle renvoie à la cohérence des diverses actions accomplies pour le bien-être et au bénéfice de l'usager. Le dossier clinique se présente comme une fenêtre par laquelle les trois objets que sont la qualité des services, l'intégration des services et la continuité des services peuvent se révéler et s'articuler. Pourtant, peu de recherches ont analysé le dossier clinique spécifiquement sous cet angle, privilégiant plutôt les études portant sur sa conformité à certaines normes (audits) ou l'utilisation des dossiers cliniques dans une optique de triangulation des données. La présente étude aborde le dossier clinique en tant qu'observatoire de la continuité. Cette position s'explique par les contextes social et scientifique actuels, qui considèrent la continuité comme une dimension transversale de la qualité (Kroger et al. 2007) et la voient comme à la fois une condition et un effet de l'intégration des services. Notre étude vise à repérer et à catégoriser des indices de continuité des services tels qu'on les retrouve dans des dossiers cliniques d'usagers inscrits en gestion de cas, et ce, dans le but de contribuer à l'accroissement de la qualité dans les services dispensés aux personnes âgées. En identifiant les façons dont les professionnels inscrivent des traces de continuité dans les dossiers cliniques des usagers et en dégageant les composantes de la continuité qui sont présentes dans les rédactions, la pertinence de l'usage des dossiers cliniques dans l'analyse de la continuité est précisée et quelques pistes méthodologiques d'analyse de la continuité des services peuvent être esquissées. Nous avons procédé à l'analyse de 16 dossiers cliniques de personnes âgées de 75 ans et plus, qui vivent dans deux territoires où existent des réseaux intégrés de services et qui sont inscrites en gestion de cas depuis au moins six mois. L'information contenue dans les dossiers cliniques des usagers a été extraite à l'aide d'outils conçus à cette fin spécialement pour notre étude. L'approche qualitative que nous mettons à contribution opère un double mouvement analytique de déduction et d'induction des formes de continuité que l'on retrouve dans les dossiers cliniques. Précisons que cette étude s'inscrit dans le cadre d'une plus grande recherche portant sur la fragilité (IRSC team onfrailty) que dirigent François Béland et André Tourigny. Nos résultats indiquent que les dossiers cliniques se révèlent un excellent observatoire de la continuité, bien que ce soit avec une pertinence variable selon la dimension retenue. Ainsi, le principal obstacle à la continuité informationnelle réside dans la difficulté à maintenir à jour les documents standardisés (OÉMC et PIAS, notamment). De même, la continuité relationnelle a pu être appréhendée en termes de permanence de la présence des intervenants dans le dossier clinique de l'usager, même si la qualité de la relation entre le professionnel et l'usager n'y est pas explicite. Enfin, s'agissant de la continuité d'approche, la fragmentation du dossier clinique et l'absence de description des processus de prise de décision clinique rendent son évaluation plus problématique. Une bonne partie du caractère incomplet du dossier clinique pourrait être facilement comblée, ce qui aurait pour effet de placer les pratiques de rédaction utilisées par les professionnels en phase avec les changements qui surviennent dans la conception de la qualité et dans l'organisation des services||Abstract : The quality of services is more and more often viewed as a parameter which plays a crucial role in the conception of socio-sanitary services. According to the diverse theoretical models that seek to define the concept of quality of care (Donabedian, 1980; Kröger, 2007; OMS, 2004), continuity of services represents an important dimension of the quality of care, specifically for a services organization that sees itself as a structure that is more and more integrated. Our point of view on continuity is based essentially on the tridimensional definition of continuity given by Reid, Haggerty & McKendry, (2002). Firstly, relational continuity implies the existence of significant relationships that take place between professionals and services users. Secondly, informational continuity supposes that the professionals involved have access to the information they need in order to accomplish their tasks. Thirdly, management continuity refers to the coherence between the various actions that are undertaken by diverse professionals for the benefit and well-being of services users. The clinical record can be likened to a window through which three objects, the quality of services, the integration of services, and the continuity of services, can appear and form a structure. However, very few researches tried to understand the clinical record in that specific perspective, preferring to focus their attention on the study of audits and on utilization of clinical records in a perspective of data triangulation. Our study considers the clinical record as an observatory of the continuity. The adoption of this specific point of view is best explained by the existing social context and scientific context, which consider the continuity as a cross-sectional dimension of the quality as well as both a cause and an effect of the services integration. Our study aims to identify and categorize the continuity indicators that appear in the clinical records of the services users that were admitted in case management, with the objective of increasing the quality of services provided to the elderly population. In identifying the different ways by which some professionals leave their marks of continuity in the clinical records and recognizing the elements that define continuity and that those professionals take into account when writing their observation notes, the relevance of using clinical records in order to understand the concept of continuity of services is duly confirmed, and some methodological tracks to enhance the study of the continuity of services can be made. We analysed the clinical records of 16 older people aged 75 and more who are living in a territory where there is an integrated services network and who were admitted in case management since at least six months. Data that were contained in the users' clinical records were extracted using instruments that were specialty created for our study. With its double analytic process of deduction and induction, the qualitative approach we utilize seeks to understand the dimensions of the continuity that are present in the clinical records. Our study is part of a bigger research on frailty, namely the CIHR Team in Frailty and Aging, which is led by François Béland and André Tourigny. Our results show that the clinical records represent a very good observatory of continuity, but with more or less relevance depending of the dimension of the continuity that is involved. Thus, the most important obstacle to informational continuity lies in the fact that it is difficult to keep the standardized documents up to date. Similarly, the relational continuity was evaluated taking into account the permanency of the professionals' presence in the clinical records, but the quality of the relationship between professionals and users is not explicit. Finally, concerning the management continuity, the fragmentation which characterizes the clinical record and the absence of description of the decision-making process render the estimation of management continuity much more hazardous. A good part of the sketchy nature of the clinical record could easily be taken care of and completed, which would have the effect of putting the professionals' recording habits in phase with the changes that take place in the conception of the quality and in the services organization.
3

Utvärdering av moderniseringsmetoder för användargränssnittet i ROS

Lundberg, Anders January 2008 (has links)
<p>ROS är ett produktnära system som stödjer planering och återrapportering i stålverket. Sandvik vill undersöka möjligheterna att modernisera användargränssnittet på detta system som idag är terminalbaserat till ett modernt grafiskt interface. Två metoder analyseras, den ena innebär att använda en kommersiell produkt för screen scraping och den andra metoden är Web Services Integration Toolkit som är freeware. Resultatet från analysen visar att Web Services Integration Toolkit klarar av att uppfylla de mål som är satta. En testkörning av Web Services Integration Toolkit görs också på ROS och resultat visar att metoden fungerar även fungerar i praktiken.</p>
4

Utvärdering av moderniseringsmetoder för användargränssnittet i ROS

Lundberg, Anders January 2008 (has links)
ROS är ett produktnära system som stödjer planering och återrapportering i stålverket. Sandvik vill undersöka möjligheterna att modernisera användargränssnittet på detta system som idag är terminalbaserat till ett modernt grafiskt interface. Två metoder analyseras, den ena innebär att använda en kommersiell produkt för screen scraping och den andra metoden är Web Services Integration Toolkit som är freeware. Resultatet från analysen visar att Web Services Integration Toolkit klarar av att uppfylla de mål som är satta. En testkörning av Web Services Integration Toolkit görs också på ROS och resultat visar att metoden fungerar även fungerar i praktiken.
5

Une nouvelle histoire du féminisme aux Etats-Unis : du Women’s Armed Services Integration Act de 1948 au Civil Rights Act de 1964 / A new history of feminism in the United-States of America : from the Women's Armed Services Integration Act - 1948 to the Civil Rights Act - 1964

Fauvrelle, Marie 20 February 2013 (has links)
En 1948 le Président Harry S Truman signe le "Women’s Armed Services Integration Act". Cette loi est en fait le fait d’armes de Margaret Chase Smith, sénatrice et représentante de l’état du Maine. En 1948, à travers le" Women’s Armed Services Integration Act" Madame Smith met en avant ces milliers de femmes qui, après l’enrôlement obligatoire pour cause de deuxième guerre mondiale, voient en l’armée une nouvelle carrière qui s’ouvre à elles. Seule femme ayant été élue, sous la bannière républicaine, à la Chambre des représentants et au Sénat de son propre chef, Margaret Chase Smith rencontre le sénateur Joseph McCarthy, « grand ordonnateur » des audiences du HUAC dans les années 50, lors d’un dîner informel. Les Américaines s’organisent aussi pour leurs droits, sur le plan syndical les années 50 peuvent bien être la “missing wave” clamée par l’historienne Dorothy Sue Cobble. Cette thèse, ayant pour toile de fond l’étude de cas de deux cents femmes interrogées par le HUAC de McCarthy, met en lumière, de façon significative, les individus et les militantes, femmes réelles qui sont les principales protagonistes des changements historiques, notamment une égalité à travers le Civil Rights Act de 1964. Comme la « micro histoire » de l’école italienne dont les chercheurs étudient ces nouveaux acteurs de l’Histoire, appelés de manière suggestive « les gens ordinaires », ce présent travail sur le maccarthysme se penche sur des individus représentatifs de leur genre, de leur race et de leur combat. Ainsi, cette démarche s’inscrit dans la perspective de la Nouvelle Histoire que le Professeur Paul-Marie Veyne définit comme représentative des « dimensions collectives de l’individu. » Les audiences du HUAC et de McCarthy, tenues de 1950 à 1954, dévoilent les histoires de divers citoyens, plus précisément de citoyennes obligées de se démener pour améliorer leur condition de vie. Mille trois cent cinquante-deux livres, trois cent douze articles de Presse et une centaine d’articles universitaires portant sur le maccarthysme peuvent être répertoriés de nos jours, mais rares, sinon aucune de ces analyses ne mettent en avant le rôle des femmes appelées devant le HUAC et les Commissions d’enquête sur le communisme dans les années McCarthy... / In 1948 President Harry S Truman signed the "Women's Armed Services Integration Act". This law is in fact an exploit of Senator Margaret Chase Smith, representing the state of Maine. In 1948, through the "Women's Armed Services Integration Act", Mrs Smith proposed a career to those thousands of women who saw in the army a new horizon. Only woman having been elected under the Republican banner, in the House of Representatives and the Senate, Margaret Chase Smith met Senator Joseph McCarthy, at the head of the HUAC in the Fifties. While servicewomen benefited from the" Women's Armed Services Integration Act", the other american women organized for their rights, especially through trade unions. Feminine activism was alive in the Fifties which can be seen as the “missing wave” coined by historian Dorothy Sue Cobble. This thesis, having as background the case study of some 200 women, sheds light on individuals, real women who were the main characters of historical change, namely an equality achieved through the Civil Rights Act. As the “micro histoire” of the Italian school whose researchers study these new actors of history, called “ordinary people”, this present work on McCarthyism leans on individuals representative of their gender, their race and their fight. Thus, this approach falls under the prospect for New History which Professor Paul-Marie Veyne defines as representative of “collective dimensions of the individual.” The investigations of HUAC presided by McCarthy, in the Fifties, reveal the stories of various citizens, especially women always in a struggle to lead a better life. One thousand three hundred and fifty-two books, three hundred and twelve newspaper articles and a hundred university articles concerning McCarthyism can be listed, but scarcely, if not none, of deal with the role of women called before the HUAC and the Committees of inquiry on Communism in the McCarthy years...
6

Analýza a porovnání BI nástrojů společností Microsoft a Oracle / Analysis and comparison of BI tools from Microsoft and Oracle

Srnský, Martin January 2010 (has links)
The aim of this thesis is to analyze the global market with Business Intelligence, recognize the most significant companies running a business in this area and try to estimate the future trends and development of the market and then to analyze BI tools of two important companies on the market, Microsoft and Oracle. Analysis and comparison of these tools will be done according to specified metrics, which will focus on both technological and business features of the tools. The main contribution should be complex comparison of quality of tools from two big competitors on the market.
7

Proposta e implementação de uma Camada de Integração de Serviços de Segurança (CISS) em SoC e multiplataforma. / Proposal and Implementation of an Security Services Integration Layer (ISSL) in SoC and multiplatform.

Pereira, Fábio Dacêncio 09 November 2009 (has links)
As redes de computadores são ambientes cada vez mais complexos e dotados de novos serviços, usuários e infra-estruturas. A segurança e a privacidade de informações tornam-se fundamentais para a evolução destes ambientes. O anonimato, a fragilidade e outros fatores muitas vezes estimulam indivíduos mal intencionados a criar ferramentas e técnicas de ataques a informações e a sistemas computacionais. Isto pode gerar desde pequenas inconveniências até prejuízos financeiros e morais. Nesse sentido, a detecção de intrusão aliada a outras ferramentas de segurança pode proteger e evitar ataques maliciosos e anomalias em sistemas computacionais. Porém, considerada a complexidade e robustez de tais sistemas, os serviços de segurança muitas vezes não são capazes de analisar e auditar todo o fluxo de informações, gerando pontos falhos de segurança que podem ser descobertos e explorados. Neste contexto, esta tese de doutorado propõe, projeta, implementa e analisa o desempenho de uma camada de integração de serviços de segurança (CISS). Na CISS foram implementados e integrados serviços de segurança como Firewall, IDS, Antivírus, ferramentas de autenticação, ferramentas proprietárias e serviços de criptografia. Além disso, a CISS possui como característica principal a criação de uma estrutura comum para armazenar informações sobre incidentes ocorridos em um sistema computacional. Estas informações são consideradas como a fonte de conhecimento para que o sistema de detecção de anomalias, inserido na CISS, possa atuar com eficiência na prevenção e proteção de sistemas computacionais detectando e classificando prematuramente situações anômalas. Para isso, foram criados modelos comportamentais com base nos conceitos de Modelo Oculto de Markov (HMM) e modelos de análise de seqüências anômalas. A CISS foi implementada em três versões: (i) System-on-Chip (SoC), (ii) software JCISS em Java e (iii) simulador. Resultados como desempenho temporal, taxas de ocupação, o impacto na detecção de anomalias e detalhes de implementação são apresentados, comparados e analisados nesta tese. A CISS obteve resultados expressivos em relação às taxas de detecção de anomalias utilizando o modelo MHMM, onde se destacam: para ataques conhecidos obteve taxas acima de 96%; para ataques parciais por tempo, taxas acima de 80%; para ataques parciais por seqüência, taxas acima de 96% e para ataques desconhecidos, taxas acima de 54%. As principais contribuições da CISS são a criação de uma estrutura de integração de serviços de segurança e a relação e análise de ocorrências anômalas para a diminuição de falsos positivos, detecção e classificação prematura de anormalidades e prevenção de sistemas computacionais. Contudo, soluções foram criadas para melhorar a detecção como o modelo seqüencial e recursos como o subMHMM, para o aprendizado em tempo real. Por fim, as implementações em SoC e Java permitiram a avaliação e utilização da CISS em ambientes reais. / Computer networks are increasingly complex environments and equipped with new services, users and infrastructure. The information safety and privacy become fundamental to the evolution of these environments. The anonymity, the weakness and other factors often encourage people to create malicious tools and techniques of attacks to information and computer systems. It can generate small inconveniences or even moral and financial damage. Thus, the detection of intrusion combined with other security tools can protect and prevent malicious attacks and anomalies in computer systems. Yet, considering the complexity and robustness of these systems, the security services are not always able to examine and audit the entire information flow, creating points of security failures that can be discovered and explored. Therefore, this PhD thesis proposes, designs, implements and analyzes the performance of an Integrated Security Services Layer (ISSL). So several security services were implemented and integrated to the ISSL such as Firewall, IDS, Antivirus, authentication tools, proprietary tools and cryptography services. Furthermore, the main feature of our ISSL is the creation of a common structure for storing information about incidents in a computer system. This information is considered to be the source of knowledge so that the system of anomaly detection, inserted in the ISSL, can act effectively in the prevention and protection of computer systems by detecting and classifying early anomalous situations. In this sense, behavioral models were created based on the concepts of the Hidden Markov Model (MHMM) and models for analysis of anomalous sequences. The ISSL was implemented in three versions: (i) System-on-Chip (SoC), (ii) JCISS software in Java and (iii) one simulator. Results such as the time performance, occupancy rates, the impact on the detection of anomalies and details of implementation are presented, compared and analyzed in this thesis. The ISSL obtained significant results regarding the detection rates of anomalies using the model MHMM, which are: for known attacks, rates of over 96% were obtained; for partial attacks by a time, rates above 80%, for partial attacks by a sequence, rates were over 96% and for unknown attacks, rates were over 54%. The main contributions of ISSL are the creation of a structure for the security services integration and the relationship and analysis of anomalous occurrences to reduce false positives, early detection and classification of abnormalities and prevention of computer systems. Furthermore, solutions were figured out in order to improve the detection as the sequential model, and features such as subMHMM for learning at real time. Finally, the SoC and Java implementations allowed the evaluation and use of the ISSL in real environments.
8

Proposta e implementação de uma Camada de Integração de Serviços de Segurança (CISS) em SoC e multiplataforma. / Proposal and Implementation of an Security Services Integration Layer (ISSL) in SoC and multiplatform.

Fábio Dacêncio Pereira 09 November 2009 (has links)
As redes de computadores são ambientes cada vez mais complexos e dotados de novos serviços, usuários e infra-estruturas. A segurança e a privacidade de informações tornam-se fundamentais para a evolução destes ambientes. O anonimato, a fragilidade e outros fatores muitas vezes estimulam indivíduos mal intencionados a criar ferramentas e técnicas de ataques a informações e a sistemas computacionais. Isto pode gerar desde pequenas inconveniências até prejuízos financeiros e morais. Nesse sentido, a detecção de intrusão aliada a outras ferramentas de segurança pode proteger e evitar ataques maliciosos e anomalias em sistemas computacionais. Porém, considerada a complexidade e robustez de tais sistemas, os serviços de segurança muitas vezes não são capazes de analisar e auditar todo o fluxo de informações, gerando pontos falhos de segurança que podem ser descobertos e explorados. Neste contexto, esta tese de doutorado propõe, projeta, implementa e analisa o desempenho de uma camada de integração de serviços de segurança (CISS). Na CISS foram implementados e integrados serviços de segurança como Firewall, IDS, Antivírus, ferramentas de autenticação, ferramentas proprietárias e serviços de criptografia. Além disso, a CISS possui como característica principal a criação de uma estrutura comum para armazenar informações sobre incidentes ocorridos em um sistema computacional. Estas informações são consideradas como a fonte de conhecimento para que o sistema de detecção de anomalias, inserido na CISS, possa atuar com eficiência na prevenção e proteção de sistemas computacionais detectando e classificando prematuramente situações anômalas. Para isso, foram criados modelos comportamentais com base nos conceitos de Modelo Oculto de Markov (HMM) e modelos de análise de seqüências anômalas. A CISS foi implementada em três versões: (i) System-on-Chip (SoC), (ii) software JCISS em Java e (iii) simulador. Resultados como desempenho temporal, taxas de ocupação, o impacto na detecção de anomalias e detalhes de implementação são apresentados, comparados e analisados nesta tese. A CISS obteve resultados expressivos em relação às taxas de detecção de anomalias utilizando o modelo MHMM, onde se destacam: para ataques conhecidos obteve taxas acima de 96%; para ataques parciais por tempo, taxas acima de 80%; para ataques parciais por seqüência, taxas acima de 96% e para ataques desconhecidos, taxas acima de 54%. As principais contribuições da CISS são a criação de uma estrutura de integração de serviços de segurança e a relação e análise de ocorrências anômalas para a diminuição de falsos positivos, detecção e classificação prematura de anormalidades e prevenção de sistemas computacionais. Contudo, soluções foram criadas para melhorar a detecção como o modelo seqüencial e recursos como o subMHMM, para o aprendizado em tempo real. Por fim, as implementações em SoC e Java permitiram a avaliação e utilização da CISS em ambientes reais. / Computer networks are increasingly complex environments and equipped with new services, users and infrastructure. The information safety and privacy become fundamental to the evolution of these environments. The anonymity, the weakness and other factors often encourage people to create malicious tools and techniques of attacks to information and computer systems. It can generate small inconveniences or even moral and financial damage. Thus, the detection of intrusion combined with other security tools can protect and prevent malicious attacks and anomalies in computer systems. Yet, considering the complexity and robustness of these systems, the security services are not always able to examine and audit the entire information flow, creating points of security failures that can be discovered and explored. Therefore, this PhD thesis proposes, designs, implements and analyzes the performance of an Integrated Security Services Layer (ISSL). So several security services were implemented and integrated to the ISSL such as Firewall, IDS, Antivirus, authentication tools, proprietary tools and cryptography services. Furthermore, the main feature of our ISSL is the creation of a common structure for storing information about incidents in a computer system. This information is considered to be the source of knowledge so that the system of anomaly detection, inserted in the ISSL, can act effectively in the prevention and protection of computer systems by detecting and classifying early anomalous situations. In this sense, behavioral models were created based on the concepts of the Hidden Markov Model (MHMM) and models for analysis of anomalous sequences. The ISSL was implemented in three versions: (i) System-on-Chip (SoC), (ii) JCISS software in Java and (iii) one simulator. Results such as the time performance, occupancy rates, the impact on the detection of anomalies and details of implementation are presented, compared and analyzed in this thesis. The ISSL obtained significant results regarding the detection rates of anomalies using the model MHMM, which are: for known attacks, rates of over 96% were obtained; for partial attacks by a time, rates above 80%, for partial attacks by a sequence, rates were over 96% and for unknown attacks, rates were over 54%. The main contributions of ISSL are the creation of a structure for the security services integration and the relationship and analysis of anomalous occurrences to reduce false positives, early detection and classification of abnormalities and prevention of computer systems. Furthermore, solutions were figured out in order to improve the detection as the sequential model, and features such as subMHMM for learning at real time. Finally, the SoC and Java implementations allowed the evaluation and use of the ISSL in real environments.
9

Integrace softwarových aplikací / Software Integration

Strouhal, Jaroslav January 2011 (has links)
The aim of this master's thesis: processing problem of intregration software resolution and propose the integration such the resolution using in real company, implemented into local information system with using existing  data formats and interface. Proposal integration must implement and evaluate resolution of work.
10

A (re)construção do SUS no município de São Paulo (SP): uma avaliação sobre a incorporação da integralidade na política municipal de saúde / The reconstruction of the SUS into the County of São Paul (SP): an appraisal above the embodies from integralidade on policy municipal of health

Pinto, Nicanor Rodrigues da Silva 17 March 2009 (has links)
Antecedentes. Alguns princípios e diretrizes organizativas do Sistema Único de Saúde (SUS) têm sido mais freqüentemente avaliados como a descentralização da gestão, a participação e controle sociais e a extensão de cobertura. A integralidade da atenção à saúde se destaca como um de seus princípios pouco estudado, particularmente no que se refere à sua dimensão sistêmica como a incorporação desse princípio na política e na gestão da saúde no âmbito municipal. Objetivo. Esta pesquisa foi desenvolvida com o objetivo de avaliar se e como a integralidade na assistência à saúde foi incorporada nas políticas de saúde priorizadas e implementadas no processo de (re)construção do SUS no Município de São Paulo (SP), no período de 2001 a 2008. Métodos. A estratégia metodológica utilizada foi a do estudo de caso, utilizando-se como dados e informações coletadas junto a distintas fontes de evidência: (a) atores sociais privilegiados, envolvidos no processo de gestão (informantes-chaves), por meio de entrevistas; (b) documentos de gestão (leis, decretos, portarias, normas técnicas, relatórios de gestão, atas de reunião); e (c) observação participante, desenvolvida em espaços institucionais e instâncias político-administrativas do SUS no município. A análise da incorporação da integralidade da assistência à saúde foi realizada prioritariamente nas dimensões da política de saúde e da gestão do sistema de saúde. Resultados. São apresentados três artigos formatados com recortes temáticos dos resultados da pesquisa e que pudessem ter consistência e densidade suficientes para serem submetidos a periódicos do campo da Saúde Pública/Coletiva. Os artigos elaborados são: (1) Política de saúde e gestão no processo de (re)construção do SUS em município de grande porte: um estudo de caso de São Paulo, Brasil. Cadernos de Saúde Pública, Rio de Janeiro, v.25, 2009 (No prelo); (2) O desafio da direção única no Sistema Único de Saúde (SUS) em município de grande porte: o caso de São Paulo, Brasil. Saúde e Sociedade, São Paulo (encaminhado não avaliado); e (3) AMA (assistência médica ambulatorial): uma inovação assistencial ou uma estratégia para limpar filas de portas de prontos-socorros? (formatado visando a revista Physis ainda não encaminhado). Considerações finais. Espera-se que os resultados e sua divulgação possam contribuir para a análise crítica do SUS no Município de São Paulo e outros município de grande porte, bem como com a identificação de elementos de reflexão, de temas para novas pesquisas, ou fornecer subsídios para a (re)formulação teórico-conceituais sobre política e gestão de sistemas de saúde e o fortalecimento do SUS. / Background. Some principles and organizational guidelines of the Brazilian National Health System (SUS) have been evaluated more frequently such as decentralization of management, the participation and social control and the span of coverage. The integrality of attention to health is one of the issues less analyzed, especially in terms of systemic dimension as the incorporation of such principle in the policy and management in the city scope. Objective. This research was carried out aiming at evaluating if and how the global approach of health care was incorporated in prioritized health policies and executed in the process of (re)construction of the SUS in the City of São Paulo (SP), between 2001 and 2008. Methods. The research was performed by utilizing the methodological strategy of case study derived from the following different sources of evidence: (a) social and institutional actors as privileged performers involved in management process (key-informers) by means of interviews; (b) management documents and papers (laws, decrees, plans, technical specifications, management reports, minutes of meetings); (c) active observation, developed in health services and political administrative areas of the SUS in the city. The analysis of the incorporation of the global approach of health care was made mainly under the aspects of health policy and health system management. Results. Three articles comprising theme excerpts of the research results which can have enough reliability and concentration to be submitted to journals in the field of Public Health. The articles written are: (1) Health policy and management in the (re)construction process of the Brazilian National Health System (SUS) in a large municipality: a case study of São Paulo city, Brazil. Cadernos de Saúde Pública, Rio de Janeiro, v.25, 2009 (in priting); (2) The challenge of the unified health services management in the Brazilian National Health System (SUS) in a large municipality: the case of São Paulo, Brazil. Saúde e Sociedade, São Paulo (submitted not evaluated); (3) AMA (ambulatorial health care): an innovation in health care or a strategy to empty lines at hospital gates? (written for the magazine Physis not submitted). Final Considerations. It is expected that these results and their presentation may contribute to a significant analysis of SUS in the São Paulo city and other large municipalities, as well as identifying the elements of consideration, of subjects for new researches or provide subsidies for the theoretical and conceptual (re)organization on the policy and management of health systems and the strengthening of SUS.

Page generated in 0.1521 seconds