• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 32
  • 7
  • 3
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 53
  • 53
  • 14
  • 13
  • 12
  • 7
  • 6
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Exército brasileiro: estrutura militar e ordenamento político 1984-2007 / The Brazilian Army: military structure and policy planning 1984 - 2007

Paulo Roberto Loyolla Kuhlmann 10 December 2007 (has links)
Ocorreram amplas transformações nos sistemas militares de diversos países no período pós- Guerra Fria. No Brasil, o Exército replanejou sua força militar terrestre após a guerra das Malvinas mediante a implantação de um sistema de planejamento estruturado. Atualizações constantes foram feitas, mas as suas linhas principais podem ainda serem encontradas na remodelagem das unidades, missões e estrutura. Mesmo com a criação do Ministério da Defesa, o elemento político de direção nacional pouco interferiu. Essa reestruturação não tem correspondência direta com o modelo do pós-modernismo militar estruturado por Charles Moskos e que sugeria a transformação de grandes exércitos de conscritos em pequenos exércitos tecnologizados, cumprindo missões diferentes das tradicionais guerras inter-estatais. O desafio dos estruturadores da força terrestre foi de administrar poucos recursos com muita criatividade, especializando número crescente de profissionais de guerra terrestre, alargando o escopo das missões sem abrir mão das tradicionais, tornando algumas organizações militares mais operacionais, produzindo um salto de qualidade, ainda que tudo isso se desse sem interesse e sem direcionamento político. A ausência de clara direção política das forças armadas produz imprecisões na formulação de estratégias e de missões criando, por exemplo, sobreposição de missões auto-atribuídas com as de outros órgãos de segurança do Estado. / Broad transformations occurred in the military systems of many countries after the Cold War period. In Brazil , the Army re-dimensioned its military land forces after the Malvinas War when a planning system was structured and implemented. Despite of the continual changes the main lines can be found in the units remodeling, missions and structures. Even with the creation of the Ministry of Defense, the political elements interfered minimally. This restructuring has no direct connection with the post-modernist military model structured by Charles Moskos, which indicates the transformation of the big armies of recruited into the small technological armies with missions different from the traditional inter-state wars. The challenge for those involved in structuring the land forces was to creatively administrate the scarce resources to specialize land warfare professionals, broaden the number of missions without abandoning traditional missions and make military organizational even more operational attaining one leap of quality regardless of any political interest or guidance. The absence of clear political guidance of the armed forces can produce failures in the strategies and missions designs and this can produce, for example, overlaps of their own missions with those of other security organs of the State.
52

Security of electronic personal health information in a public hospital in South Africa

Chuma, Kabelo Given 01 1900 (has links)
The adoption of digital health technologies has dramatically changed the healthcare sector landscape and thus generates new opportunities to collect, capture, store, access and retrieve electronic personal health information (ePHI). With the introduction of digital health technologies and the digitisation of health data, an increasing number of hospitals and peripheral health facilities across the globe are transitioning from a paper-based environment to an electronic or paper-light environment. However, the growing use of digital health technologies within healthcare facilities has caused ePHI to be exposed to a variety of threats such as cyber security threats, human-related threats, technological threats and environmental threats. These threats have the potential to cause harm to hospital systems and severely compromise the integrity and confidentiality of ePHI. Because of the growing number of security threats, many hospitals, both private and public, are struggling to secure ePHI due to a lack of robust data security plans, systems and security control measures. The purpose of this study was to explore the security of electronic personal health information in a public hospital in South Africa. The study was underpinned by the interpretivism paradigm with qualitative data collected through semi-structured interviews with purposively selected IT technicians, network controllers’, administrative clerks and records management clerks, and triangulated with document and system analysis. Audio-recorded interviews were transcribed verbatim. Data was coded and analysed using ATLAS.ti, version 8 software, to generate themes and codes within the data, from which findings were derived. The key results revealed that the public hospital is witnessing a deluge of sophisticated cyber threats such as worm viruses, Trojan horses and shortcut viruses. This is compounded by technological threats such as power and system failure, network connection failure, obsolete computers and operating systems, and outdated hospital systems. However, defensive security measures such as data encryption, windows firewall, antivirus software and security audit log system exist in the public hospital for securing and protecting ePHI against threats and breaches. The study recommended the need to implement Intrusion Protection System (IPS), and constantly update the Windows firewall and antivirus program to protect hospital computers and networks against newly released viruses and other malicious codes. In addition to the use of password and username to control access to ePHI in the public hospital, the study recommends that the hospital should put in place authentication mechanisms such as biometric system and Radio Frequency Identification (RFID) system restrict access to ePHI, as well as to upgrade hospital computers and the Patient Administration and Billing (PAAB) System. In the absence of security policy, there is a need for the hospital to put in place a clear written security policy aimed at protecting ePHI. The study concluded that healthcare organisations should upgrade the security of their information systems to protect ePHI stored in databases against unauthorised access, malicious codes and other cyber-attacks. / Information Science / M. Inf. (Information Security)
53

The challenges facing private security companies in retaining clients : a case study in Gauteng shopping malls

Banda, Teboho Elliot 06 1900 (has links)
The private security industry is tasked with protecting lives and property against an evolving array of personal and property threats. Rendering such services comes with many market related challenges for private security providers. These services are rendered to various types of clients like government departments, hospitals, universities and shopping malls amongst others. These clients have unique and different needs and expectations, therefore shopping malls as clients of the private security industry were selected for the purpose of this research. The qualitative research approach was used for this study wherein a questionnaire was used to obtain information from private security and shopping mall personnel working in shopping malls in Gauteng. The findings of this study reveals that there are indeed client retention challenges that are facing private security companies providing services to shopping malls. Based on the findings, recommendations for the private security providers and further research in shopping mall security management are made. / Security Risk Management / M.Tech. (Security Management)

Page generated in 0.0372 seconds