To see the other types of publications on this topic, follow the link: Private defense.

Dissertations / Theses on the topic 'Private defense'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Private defense.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Dunar, Charles J. Mitchell Jared L. Robbins Donald L. "Private military industry analysis private and public companies /." Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FDunar%5FMBA.pdf.

Full text
Abstract:
"Submitted in partial fulfillment of the requirements for the degree of Master of Business Administration from the Naval Postgraduate School, December 2007."
Advisor(s): Dew, Nicholas ; Hudgens, Bryan J. "December 2007." "MBA professional report"--Cover. Description based on title screen as viewed on January 10, 2008. Includes bibliographical references (p. 87-127). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
2

Richardson, Robert R. "Defense co-production : collaborative national defense /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FRichardson.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jaksec, Gregory M. "Public-private-defense partnering in critical infrastructure protection." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FJaksec.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2006.
Thesis Advisor(s): Ted Lewis. "March 2006." Includes bibliographical references (p.41-45). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
4

Low, Kuan Hong. "Public-private partnerships in defense acquisition programs-defensible?" Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FLow_Kuan.pdf.

Full text
Abstract:
Thesis (M.S. in Business Administration)--Naval Postgraduate School, December 2009.
Thesis Advisor(s): Summers, Don ; San Miguel, Joseph. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: PPP, public-private partnership, defense contracting, defense contracting, finance, Singapore, U.S., UK, Australia, off-balance sheet Includes bibliographical references (p. 53-61). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
5

Olds, David A. "Food defense management practices in private country clubs." Diss., Kansas State University, 2010. http://hdl.handle.net/2097/6651.

Full text
Abstract:
Doctor of Philosophy
Department of Hospitality Management and Dietetics
Carol W. Shanklin
The purpose of this study was to survey country club professionals’ importance perceptions of food defense and the frequency with which preventive practices were implemented in their clubs to prevent bioterrorism. Gaps between importance perceptions and practice frequency were compared with concern of food terrorism and practice frequency implementation. Perceived self-efficacy measures and perceived barriers were compared with motivations to develop a food defense management plan and practice frequency implementation. Importance perceptions and practice frequencies were studied to ascertain if there were differences among operational factors. Club professionals with smaller gaps implemented preventive practices more frequently. Club professionals with higher self-efficacy levels were more motivated to develop food defense management plans and implemented preventive practices more frequently. Club professionals with higher barriers were less motivated to develop food defense management plans and implemented preventive practices less frequently. The field study component investigated food security practices in private country clubs. Club manager interviews and observations of operational practices were conducted. Most club managers stated that they did not think their clubs were at risk of a bioterrorist attack. Cost and lack of need were identified as barriers towards implementing a food defense management plan. Club employees were perceived to be more likely to initiate a bioterrorism attack than non-employees. Background checks and good employment practices were perceived as effective in increasing food security in clubs. Most clubs did not monitor arrivals and over half did not secure their chemicals. Based on the results of the field study, the researcher recommended several actions that could improve food security in country clubs including installing video surveillance and developing disaster management plans that include food defense. Recommendations for future research included continued examination of club managers’ self-efficacy perceptions towards biosecurity and identifying barriers to food defense implementation in other retail foodservice segments.
APA, Harvard, Vancouver, ISO, and other styles
6

Stallworth, Rachel. "Private Sector Defense Contractor Management Strategies for Contract Fulfillment." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5420.

Full text
Abstract:
Private sector U.S. defense contractors failing to meet contract objectives experience lower profitability, pay costly penalties, and risk survivability. Using the theory of contracts, the purpose of this multiple case study was to the explore strategies that some leaders of U.S. defense contracting businesses use to meet all the contract terms with the U.S. Department of Defense. Data were collected from 5 leaders of private sector defense contracting companies in northwest Florida through face-to-face, semistructured interviews and through a review of operations manuals, quality assurance policy manuals, and archived U.S. Department of Defense contracts. During data analysis using Yin's 5-step process of compiling, disassembling, reassembling, interpreting, and concluding the data, 4 themes on strategies emerged: (a) communication strategy for successful completion of contracts, (b) technology strategy to monitor contract compliance, (c) training strategy for program managers, and (d) subcontractor selection strategy. The findings indicated that communication among all contract parties was an essential component of each of the 4 themes. Computerizing the contracting workflow to monitor compliance efforts, training program managers for effective oversight of contract compliance, and selecting subcontractors were vital elements of the strategies private sector defense contractors used to meet all the terms and conditions of U.S. Department of Defense contracts. The implications for positive social change include the potential for private sector defense contractors to improve the strength of the defense of the northwest Florida community, lower unemployment, and provide a safer environment for humanity.
APA, Harvard, Vancouver, ISO, and other styles
7

Snyder, Elizabeth A. "Public or private : the outsourcing dilemma within the Department of Defense /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA295657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pitts, Bobby. "DLA/FedEx premium service effects on defense distribution inventories and shipments." Thesis, Monterey, California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/2882.

Full text
Abstract:
This research reviews and evaluates the FedExâ s Premium Service Program currently being used by DLA customers. The research will examine some of the benefits and costs of this co-locating of DOD warehousing and shipping operation managed by a commercial express transportation carrier. The research will view the possible benefits gained through commercial inventory and transportation practices by partnering a third party logistics service with the Defense Transportation System. DLA and FedEx have formed a partnership called DLA Premium Service. Premium Service is the only DoD warehousing operation that is co-located with and managed by a commercial express transportation carrier at FedEx main transportation hub. Premium Service System allows users to position materials in the Memphis facility for expedited delivery to the required destinations worldwide. All items are guaranteed, under contract, to be delivered to their continental U.S. (CONUS) destination within 24 hours and within 48 hours to outside of CONUS (OCONUS) to the major airports serviced by FedEx. Items will be delivered to the OCONUS final destination 24 hours of release from customs holding area at the airport. The service provides advance notification to streamline customs requirements of all OCONUS shipments.
APA, Harvard, Vancouver, ISO, and other styles
9

Paquette, Richard A. "Comparison of environmental remediation contracting approaches between the Department of Defense and the Private sector." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA401548.

Full text
Abstract:
Thesis (M.S. in Management) Naval Postgraduate School, Dec. 2001.
Thesis advisor(s): Matthews, David F.; Simon, Cary. "December 2001." Includes bibliographical references (p. 71-74). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
10

Turner, Robert B. "Implementation of electronic data interchange in the Department of Defense: lessons learned from private industry." Thesis, Monterey, California. Naval Postgraduate School, 1993. http://hdl.handle.net/10945/44440.

Full text
Abstract:
Approved for public release, distribution is unlimited
The Department of Defense (DoD) has emphasized Electronic Data Interchange (EDI) since 1988 when the Deputy Secretary of Defense issued a policy directive that EDI was to become 'the way of doing business' for DoD in the future. The focus of this research is on how private industry is implementing EDI, and specifically how EDI is being used in the procurement and acquisitions environment. The results from a survey of private industry showed that (1) EDI use will continue to grow in the procurement environment and that most impediments to EDI will be resolved with time and experience; (2) EDI must be adopted by the critical mass before the full benefits and savings will be recognized by DoD and industry; (3) top level management support and a detailed, well thought out strategic EDI plan are mandatory for successful implementation of EDI; and (4) the transaction sets currently being used by private industry for procurements and acquisitions limit DoD EDI opportunities for large purchases. Recognizing these conclusions, recommendations to DoD are then presented.
APA, Harvard, Vancouver, ISO, and other styles
11

Avdellas, Nicholas John. "The Public-Private Dilemma: A Strategic Improvement Agenda for U.S. Department of Defense Depot Maintenance." Diss., Virginia Tech, 2005. http://hdl.handle.net/10919/26847.

Full text
Abstract:
Since the end of the Cold War, the Department of Defense (DoD) has been challenged to formulate and make strategic decisions, especially in areas related to the Departmentâ s â business operations.â Strategic decisions are those that focus on setting long-term organizational direction. This has proven difficult because a rather simplistic (and somewhat comforting) DoD organizational orientation toward an â either/orâ or â us versus themâ decision-making mindset that was once ubiquitous and appropriate, given the nature of political and military threats, has been hard to shake. This study reviews a particular manifestation of this dilemma: the decision-making arrangements associated with the provision of military depot maintenance services. An historical review of this topic shows a mixture of problems, progress, and promise. A strategic decision-making approach that draws upon Sabatier and Jenkins-Smithâ s Advocacy Coalition Framework (ACF) is proposed to improve the situation. It addresses key problems identified in the analysis and rests upon an approach to strategic decision making that is politically rational in nature. This approach, called a Strategic Improvement Agenda, is offered as a potential foil to the â us versus themâ orientation.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
12

Silva, Diego Fróes e. Coelho da. "Parcerias público-privadas : alternativa viável para os projetos estratégicos de defesa?" reponame:Repositório Institucional do FGV, 2018. http://hdl.handle.net/10438/25672.

Full text
Abstract:
Submitted by Diego Fróes e Coelho da Silva (difroes@yahoo.com.br) on 2018-10-19T17:15:55Z No. of bitstreams: 1 Dissertação MFEE 2018 - Diego Fróes v.final.pdf: 30379795 bytes, checksum: d885dd4fca28761cf6411a4c9620103f (MD5)
Approved for entry into archive by GILSON ROCHA MIRANDA (gilson.miranda@fgv.br) on 2018-10-25T19:39:39Z (GMT) No. of bitstreams: 1 Dissertação MFEE 2018 - Diego Fróes v.final.pdf: 30379795 bytes, checksum: d885dd4fca28761cf6411a4c9620103f (MD5)
Made available in DSpace on 2018-10-29T18:09:50Z (GMT). No. of bitstreams: 1 Dissertação MFEE 2018 - Diego Fróes v.final.pdf: 30379795 bytes, checksum: d885dd4fca28761cf6411a4c9620103f (MD5) Previous issue date: 2018-10-02
O objetivo deste estudo é examinar se as parcerias público-privadas (PPP) podem constituir uma ferramenta viável para a implementação dos Projetos Estratégicos de Defesa no Brasil. As PPP são um instrumento para a cooperação da iniciativa privada na realização de investimentos de interesse público e são capazes de aperfeiçoar os processos de desestatização, em busca de ampliar o alcance das externalidades positivas que tais processos podem gerar. Há experiências semelhantes em países como Reino Unido, Estados Unidos da América (EUA) e Austrália, nas quais se verificou aumento da qualidade dos serviços e diminuição dos prazos de entrega em comparação aos métodos tradicionais de contratação. Por meio de um estudo de caso, amparado em uma pesquisa documental e bibliográfica e apoiando-se nas bem-sucedidas experiências internacionais, é possível investigar se as PPP podem contribuir para o fomento da Base Industrial de Defesa (BID), fundamentais ao aprimoramento das Forças Armadas e ao desenvolvimento do País.
APA, Harvard, Vancouver, ISO, and other styles
13

Scott, Linda J. "Hurricane Katrina utilization of private, non-governmental health professionals time for new strategies /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FScott.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2006.
Thesis Advisor(s): Kathleen Toomey. "September 2006." Includes bibliographical references (p. 71-75). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
14

Donohue, Sean, and Lina M. Downing. "Capital budgeting: do private sector methods of budgeting for capital assets have applicability to the Department of Defense." Monterey, California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/9975.

Full text
Abstract:
MBA Professional Report
The purpose of this MBA Project is to identify the capital budgeting methods of both the private sector and the Department of Defense. Additionally, the purpose is to evaluate the strengths and weaknesses of each capital budgeting method and conduct a comparison. The intent is to identify those capital budgeting practices that are used in the private sector, some of which have been implemented in other public sector organizations, which may have merit for implementation in the Federal sector and possibly the Department of Defense. Finally, a set of conclusions and recommendations on how to implement best practices of capital budgeting for the Federal Sector will be presented.
APA, Harvard, Vancouver, ISO, and other styles
15

Latta, Jason E. "Analysis of the distribution of vaccine using Department of Defense assets versus contracts with private-sector delivery companies." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FLatta.pdf.

Full text
Abstract:
Thesis (M.S. in Management)--Naval Postgraduate School, December 2009.
Thesis Advisor(s): Apte, Aruna. Second Reader: Ferrer, Geraldo. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Pandemic Influenza, Vaccine Distribution, Vaccine Distribution with DoD Assets, DoD Pandemic Influenza Response Plan. Includes bibliographical references (p. 63-64). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
16

Davis, Albert L. "Implementation of Electronic Funds Transfer (EFT)/Financial Electronic Data Interchange (FEDI) in the Department of Defense : lessons learned from private industry /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA316495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Azeredo, Priscilla Guerreiro de. "Vantagens e desvantagens da estrutura de holding na administração pública: um estudo de caso do Ministério da Defesa." reponame:Repositório Institucional do FGV, 2012. http://hdl.handle.net/10438/9977.

Full text
Abstract:
Submitted by Priscilla Guerreiro de Azeredo (priscillaguerreiro@gmail.com) on 2012-08-30T17:52:27Z No. of bitstreams: 1 Dissertação_Priscilla Guerreiro de Azeredo_Para EntregaFINAL.docx: 1892449 bytes, checksum: 0ce592c925dc8cc83280eb7578a18c50 (MD5)
Rejected by ÁUREA CORRÊA DA FONSECA CORRÊA DA FONSECA (aurea.fonseca@fgv.br), reason: Prezada aluna Priscilla, A submissão está sendo rejeitada porque o arquivo não está em PDF. Favor submeter novamente em PDF. Att. ÁUREA SRA on 2012-08-30T19:36:20Z (GMT)
Submitted by Priscilla Guerreiro de Azeredo (priscillaguerreiro@gmail.com) on 2012-08-31T02:28:36Z No. of bitstreams: 1 Dissertação_Priscilla Guerreiro de Azeredo_Para Entrega__.pdf: 1416307 bytes, checksum: b3148e5824cb44ea689aac8a867abe6a (MD5)
Approved for entry into archive by ÁUREA CORRÊA DA FONSECA CORRÊA DA FONSECA (aurea.fonseca@fgv.br) on 2012-08-31T16:16:31Z (GMT) No. of bitstreams: 1 Dissertação_Priscilla Guerreiro de Azeredo_Para Entrega__.pdf: 1416307 bytes, checksum: b3148e5824cb44ea689aac8a867abe6a (MD5)
Approved for entry into archive by Marcia Bacha (marcia.bacha@fgv.br) on 2012-09-03T19:21:19Z (GMT) No. of bitstreams: 1 Dissertação_Priscilla Guerreiro de Azeredo_Para Entrega__.pdf: 1416307 bytes, checksum: b3148e5824cb44ea689aac8a867abe6a (MD5)
Made available in DSpace on 2012-09-03T19:21:36Z (GMT). No. of bitstreams: 1 Dissertação_Priscilla Guerreiro de Azeredo_Para Entrega__.pdf: 1416307 bytes, checksum: b3148e5824cb44ea689aac8a867abe6a (MD5) Previous issue date: 2012-07-30
This study sought to identify advantages and disadvantages of holding structure in Public Administration from the Department of Defense. We conducted a case study and we use the theoretical frameworks that allow us to understand the structure of holding company and subsidiaries, private management, the public management and the difference between them. Twelve interviews were conducted in two stages. The first comprised those who acted and possessed considerable knowledge about holding, at the second, people who possess knowledge of the Department of Defense and Armed Forces. The responses from the interviews were analyzed drawing on what was presented in Theoretical Framework. Overall, respondents said the following advantages of the holding in the public administration: to facilitate greater integration and dialogue between the parties; to centralize power guiding the direction of the organization, to facilitate the performance and strategic vision, to foster governance, strengthen dialogue, thought together and systemic action, identifying greater bargaining power and political representation, generating greater efficiency because of the understanding between the parties and best use of resources, allow the translation of goals into policies, increasing the possibility of reducing inequalities when they think only in profit, and seek public benefit. Disadvantages cited were increasing problems in sharing between units, the increased possibility of clashes of different cultures, the possibility of each manager to come back to his unit when resources are limited, the largest evacuation in the discussion of important issues in subsidiary, opening for the occurrence of rework; possibility of delays in delivery of purchases, which are now centralized, greater exposure to politicization and political influence, inadequate mechanisms of control performance, limitations and management decisions for what is established by law ; existence of forces acting and negotiating policies, lack of civilian careers in certain areas by increasing their exposure, lack of policy and political interference shielding, training and structuring unsatisfactory.
Esse estudo buscou identificar vantagens e desvantagens da estrutura de holding na Administração Pública a partir da análise da constituição e organização do Ministério da Defesa. Realizamos um estudo de caso e, para a preparação do mesmo, partimos de referenciais teóricos que nos permitissem entender a estrutura de holding e controladas, a administração privada, a pública e a diferença entre elas. Foram realizadas doze entrevistas em duas etapas. A primeira abrangeu consultas a especialistas sobre holdings, e a segunda, pessoas com conhecimento sobre o Ministério da Defesa e Forças Armadas. As respostas das entrevistas foram analisadas tomando como base o que foi apresentado no Referencial Teórico. De forma geral, os entrevistados apresentaram como vantagens de uma holding na administração pública: facilitar maior integração e diálogo entre as partes; centralizar o poder norteando o rumo da organização; facilitar o desempenho estratégico e a visão; fomentar a governança; intensificar o diálogo, pensamento conjunto e atuação sistêmica; identificar maior poder de barganha e representatividade política; gerar maior eficácia por conta do entendimento entre as partes e melhor aproveitamento dos recursos; permitir a tradução de objetivos em diretrizes; aumentar a possibilidade de reduzir as desigualdades quando não pensa só no lucro; e buscar o benefício público. Como desvantagens foram citados o aumento de problemas no compartilhamento entre as controladas; a intensificação da possibilidade de choques de culturas diferentes; a possibilidade de cada gestor se voltar mais para sua organização quando os recursos são limitados; o maior esvaziamento da discussão de assuntos importantes na controlada; brecha para a ocorrência de retrabalho; possibilidade de atrasos na entrega das compras, que agora são centralizadas; maior exposição à politização e influência política; insuficiência de mecanismos de controle de desempenho; limitação das decisões e da gestão pelo que é estabelecido pela lei; existência de Forças políticas atuando e negociando; inexistência de carreiras civis em certas áreas aumentando essa exposição; falta de blindagem política e ingerência política; capacitação e estruturação não satisfatórios.
APA, Harvard, Vancouver, ISO, and other styles
18

Bulbul, Asli. "Civil Law Claims On The Enforcement Of Competition Rules: A Comparative Study Of Us, Eu And Turkish Laws." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12608035/index.pdf.

Full text
Abstract:
Private enforcement, which primarily represents individuals&rsquo
right to claim damage arisen from violations of competition law, supplements public enforcement and ensures indemnification of individual loss. However, private enforcement of competition law has fallen behind public law enforcement in laws presented in this study, other than those enforced in the USA. Realizing this fact, European Commission, has recently focused on the enhancement and facilitation of private enforcement in the Community competition law. The lagging behind of private enforcement mainly sources from the cultural and traditional differences in the understanding of liability law between Anglo Saxon Law and Continental Law. Anglo Saxon law tradition is inclined to leave the matter to individual action, whereas Continental Law is in more favor of strengthening regulatory mechanisms. More specific obstacles to the improvement of private enforcement are, yet not exhaustively, indefiniteness of legal basis of claims, involvement of complex economic analysis while stating the case, courts&rsquo
lack of technical knowledge, indefinite relationship between judiciary and competition authorities, problems in proving damage and causality, absence of facilitating procedural mechanisms such as class actions, treble damage and discovery rights. In the Community law context it is also highly probable to encounter peculiar problems arisen from co-existence of different national laws. Additionally, implementation of the Community competition law by national authorities may also lead to the weakening of the Single Market objective. Through this study, we will present probable solutions by depicting all these problems.
APA, Harvard, Vancouver, ISO, and other styles
19

Frausto, Victor A. "An analysis of the U.S. Navy's military housing privatization initiative and the application of transaction cost economics as a component of the decision framework for the establishment of future partnerships between the Department of Defense and private sector industry." Monterey, Calif. : Naval Postgraduate School, 2004. http://handle.dtic.mil/100.2/ADA429312.

Full text
Abstract:
"Submitted in partial fulfillment of the requirements for the degree of Master of Business Administration from the Naval Postgraduate School, December 2004."
"MBA professional report"--Cover. Includes bibliographical references (p. 87-89). Also issued in paper format.
APA, Harvard, Vancouver, ISO, and other styles
20

Antunes, António José Luís. "Industria de defesa pública ou privada? O caso da OGMA." Master's thesis, Instituto Superior de Economia e Gestão, 2013. http://hdl.handle.net/10400.5/11234.

Full text
Abstract:
Mestrado em Economia e Políticas Públicas
O presente trabalho procura investigar qual o melhor modo de governação para a indústria de defesa, o privado ou o público, através da análise circunscrita a um período temporal bem definido, no qual o desenrolar da história da OGMA ? Indústria Aeronáutica de Portugal, S.A., é o fio condutor por ter experimentado as duas situações. O modo de governo público em que se encontrava a OGMA antes de 2004, fosse como estabelecimento fabril das forças armadas ou como empresa do sector empresarial do Estado, traduzia a tendência que vinha sendo seguida no âmbito das indústrias de defesa, mantendo um elevado nível de protecionismo e centralização, comum a todas as atividades relacionadas com a soberania. No entanto, o longo período de paz iniciado com o fim das guerras em África e consolidado com o fim da Guerra Fria, veio relegar para segundo plano as necessidades no âmbito da defesa fazendo, em contrapartida, emergir as necessidades de índole social. As novas prioridades, e os constantes prejuízos resultantes da contração do mercado interno que sustentava a OGMA passam a ter difícil justificação e levam à procura de soluções. A solução escolhida (e que contribui decisivamente para uma melhoria de vários indicadores de gestão da OGMA) consiste na privatização de parte do capital social da empresa, com salvaguarda de alguns aspetos de interesse nacional, e consequente associação a empresas de referência mundial que assegurem estratégias de longo prazo sustentadas e que consigam abarcar as especificidades deste tipo de mercado.
This paper intends to investigate which is the best model of governance for the defence industry, the private or the public one, through the analysis to a well-defined time period in which the story unfolds OGMA - Indústria Aeronáutica de Portugal, SA, is the thread to have experienced both situations. The form of government that was public OGMA before 2004, were as manufacturing establishment of the military or as a company business sector of the state, reflected the trend that was being followed within the defence industries while maintaining a high level of protectionism and centralization, common to all activities related to sovereignty. However, the long period of peace began with the end of wars in Africa and consolidated with the end of the Cold War comes overshadow the needs within the defence doing but, however, it emerges the needs of social kind. In response to this new order of priorities, the constant losses resulting from the contraction of the internal market that supported this type of industry become difficult to justify and lead to the search for solutions. The solution comes with the privatization of part of the company's capital, defending some aspects of national interest, and consequent association with leading companies worldwide to ensure sustained long-term strategies that are able to cover the specifics of this type of market.
APA, Harvard, Vancouver, ISO, and other styles
21

Jorge, Aimite. "The change of position defence in comparative perspective." Doctoral thesis, University of Cape Town, 2009. http://hdl.handle.net/11427/12521.

Full text
Abstract:
Includes abstract.
This work examines the change-of-position (loss of enrichment) defence comparatively in five jurisdictions, namely South Africa, Brazil, England Canada and USA. It advances a three-part argument which contends, first, that when a legal system opts for a general enrichment principle, it must equally limit it with defences. Secondly, that once the limiting mechanisms are chosen, the system must demarcate their contours and establish the inevitable exceptions. Thirdly, that legal system, as a consequence, must also decide whether to require a symmetric ‘gain-loss’ situation, i.e., whether to insist that the measure of recovery be limited by the plaintiff’s loss. If it chooses a symmetry ‘gainloss’, that system might face difficulties avoiding a passing on defence, as the reverse face of change-of-position on the plaintiff’s side, thereby potentially undermining indirectly the principle of legality. If it departs from that symmetry, the passing on defence may ‘normatively’ be ignored, unless for policy reasons it opts to have it. The study concludes that South Africa is bound to adopt explicitly a general principle of unjustified enrichment with change of position as the general defence applicable to all unjustified enrichment claims, save to claims arising from failed bilateral agreements. The study recommends that South Africa may give limited recognition to the passing on defence in its private law of unjustified enrichment where policy considerations do not militate against its application.
APA, Harvard, Vancouver, ISO, and other styles
22

Pham, Tuan-Anh T., Victor Frausto, Trihnh H. Hoang, and Richard Obregon. "An analysis of the U.S. Navy's military housing privatization initiative and the application of transaction cost economics as a component of the decision framework for the establishment of future partnerships between the Department of Defense and private sector industry." Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/9897.

Full text
Abstract:
MBA Professional Report
The Department of Defense (DoD) has struggled with the issue of inadequate military family housing for decades. Furthermore, Congress has made numerous attempts to resolve this problem culminating in the passage of the 1996 National Defense Authorization Act. This Act allowed DoD to implement as many as twelve different authorities to meet this housing challenge, including the ability to form joint ventures with private corporations. The Navy's innovative use of the joint venture authority has facilitated the renovation and creation of military family housing at an unprecedented scale and pace. This study provides an overview of the Navy's use of the joint venture authority. Additionally, the concept of Transaction Cost Economics is explained and applied to the Navy's contracting template for analysis. The research concludes that the twelve authorities, especially joint ventures, have provided effective means to resolve DoD's military housing dilemma. Additionally, the application of Transaction Cost Economics has proven beneficial to minimizing opportunistic behavior on the part of private partners and/or subcontracted entities.
APA, Harvard, Vancouver, ISO, and other styles
23

Frot, Olivier. "Etat régalien et externalisation : l’exemple du Ministère de la défense." Thesis, Bordeaux 4, 2012. http://www.theses.fr/2012BOR40023.

Full text
Abstract:
Peut-on confier au secteur privé des activités relevant du coeur del’Etat, autrement dit « régaliennes » ? Le ministère de la défense,ainsi que ceux de la justice et de l’intérieur, pratiquent déjàl’externalisation de certaines fonctions auparavant dévolues à desfonctionnaires ou des militaires. Or, la défense nationale est un« service public constitutionnel », et de ce fait ne peut être déléguée àune personne privée. Toutefois, le Conseil Constitutionnel a autoriséd’en concéder, par contrat, des fonctions « détachables ». Cecontexte implique de déterminer le périmètre externalisable, end’autres termes le « coeur de métier régalien », qui n’est définidans aucun texte législatif ou réglementaire. En dehors de certainscas particuliers jugés, la décision reste à l’appréciation du ministre,dans le cadre de l’objectif recherché : économies budgétaires,meilleure efficacité de l’outil. Ce processus d’externalisationprocède d’une vision nouvelle de l’action de l’Etat, qui conserve lacapacité de décision dans ses domaines régaliens mais peut enconfier la mise en oeuvre à des opérateurs privés, procédant d’unevision libérale de l’action de l’Etat.Après avoir étudié les fondements de la politique d’externalisation(Partie I), en abordant en premier lieu le besoin et le contexte(Titre I), puis la détermination du périmètre externalisable (TitreII) et ses possibilités d’extension (Titre III), nous aborderons lapréparation et la conduite de l’externalisation (Partie II), quiconcerne avant tout la préparation matérielle de l’externalisation(Titre I), puis la conduite du projet d’externalisation (Titre II), enabordant le volet social de la démarche (Titre III)
How can private sector manage activitiesusually recognized as part of the State’s heart, in other words3“kingly”? The Ministry of defense, as well as the Ministries forJustice and of Interior, already outsources several functions,previously dedicated to Civil servants or militaries. Nevertheless,national defense is a constitutional public service, which shouldnot be delegated to any private person. However, theConstitutional Supreme Court admitted to delegate, by contract,“detachable” functions. Thus, the “outsourcable” perimeter, the“kingly core business” should be determined, as no legaldocument defines it. Except some already judged specific cases,the minister is liable to decide alone, thanks to his objectives:budget sparing, better efficiency. The outsourcing process showsout a new vision of State’s action, which keeps decision capacitybut may delegate action to private operators, in a liberal point ofview of the State’s public activities.After having studied the outsourcing policy’s foundation (part I),we’ll first examine the requirement and the context (title I), thenthe outsourcable perimeter’s determination (title II) and itsextension possibilities (title III), we’ll then take care ofoutsourcing’s preparation and conduct (part II), which firstconcerns physical preparation (title I), then outsourcing project’sconduct (title II), approaching the process’ social part (title III)
APA, Harvard, Vancouver, ISO, and other styles
24

Gaugain, Lucie. "Le château et la ville d'Amboise à la fin du Moyen Age et au début de la Renaissance (1421-1525) : architecture et société." Thesis, Tours, 2011. http://www.theses.fr/2011TOUR2030/document.

Full text
Abstract:
La thèse propose une approche pluridisciplinaire, mêlant l’analyse de la topographie et la lecture minutieuse du bâti, avec relevés à l’appui, à l’exploitation de nombreuses comptabilités et des sources iconographiques. Les ensembles architecturaux profondément modifiés d’Amboise − et de ce fait très complexes à appréhender − ont en effet demandé une analyse conjointe du château et de la ville.D’une ampleur jamais encore égalée, le chantier de construction royal, initié par Louis XI en 1463, eut des répercussions immédiates sur l’économie et l’urbanisme de cette petite « ville-Pont » de 300 à 400 feux. En 1498, les chantiers étaient lancés et Amboise avait tous les atouts pour devenir une cité d’importance mais à cette date, la mort accidentelle de Charles VIII en arrêta l’essor. Toutefois, le dynamisme du chantier d’Amboise sur une quarantaine d’années constitua le laboratoire de nouvelles solutions architecturales qui influencèrent les chantiers princiers du début de la Renaissance
This thesis presents a multidisciplinary approach, it consists in the study of topography, of buildings, thanks to layouts, and of the existing accounts and iconography. Because the architecture has changed a lot it has required analyzing both the castle and the town. From 1463, Louis XI’s huge magnificent project had repercussions on the economy and the development of this small “bridge-Town”. In 1498, the building sites were set up and the town was to become a city but Charles VIII’s unexpected death stopped its expansion. However, this dynamic building period, over 40 years, has to be considered as an experiment of new architectural forms which would impact princely buildings in the early Renaissance
APA, Harvard, Vancouver, ISO, and other styles
25

Zhang, Ruide. "Hardware-Aided Privacy Protection and Cyber Defense for IoT." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/98791.

Full text
Abstract:
With recent advances in electronics and communication technologies, our daily lives are immersed in an environment of Internet-connected smart things. Despite the great convenience brought by the development of these technologies, privacy concerns and security issues are two topics that deserve more attention. On one hand, as smart things continue to grow in their abilities to sense the physical world and capabilities to send information out through the Internet, they have the potential to be used for surveillance of any individuals secretly. Nevertheless, people tend to adopt wearable devices without fully understanding what private information can be inferred and leaked through sensor data. On the other hand, security issues become even more serious and lethal with the world embracing the Internet of Things (IoT). Failures in computing systems are common, however, a failure now in IoT may harm people's lives. As demonstrated in both academic research and industrial practice, a software vulnerability hidden in a smart vehicle may lead to a remote attack that subverts a driver's control of the vehicle. Our approach to the aforementioned challenges starts by understanding privacy leakage in the IoT era and follows with adding defense layers to the IoT system with attackers gaining increasing capabilities. The first question we ask ourselves is "what new privacy concerns do IoT bring". We focus on discovering information leakage beyond people's common sense from even seemingly benign signals. We explore how much private information we can extract by designing information extraction systems. Through our research, we argue for stricter access control on newly coming sensors. After noticing the importance of data collected by IoT, we trace where sensitive data goes. In the IoT era, edge nodes are used to process sensitive data. However, a capable attacker may compromise edge nodes. Our second research focuses on applying trusted hardware to build trust in large-scale networks under this circumstance. The application of trusted hardware protects sensitive data from compromised edge nodes. Nonetheless, if an attacker becomes more powerful and embeds malicious logic into code for trusted hardware during the development phase, he still can secretly steal private data. In our third research, we design a static analyzer for detecting malicious logic hidden inside code for trusted hardware. Other than the privacy concern of data collected, another important aspect of IoT is that it affects the physical world. Our last piece of research work enables a user to verify the continuous execution state of an unmanned vehicle. This way, people can trust the integrity of the past and present state of the unmanned vehicle.
Doctor of Philosophy
The past few years have witnessed a rising in computing and networking technologies. Such advances enable the new paradigm, IoT, which brings great convenience to people's life. Large technology companies like Google, Apple, Amazon are creating smart devices such as smartwatch, smart home, drones, etc. Compared to the traditional internet, IoT can provide services beyond digital information by interacting with the physical world by its sensors and actuators. While the deployment of IoT brings value in various aspects of our society, the lucrative reward from cyber-crimes also increases in the upcoming IoT era. Two unique privacy and security concerns are emerging for IoT. On one hand, IoT brings a large volume of new sensors that are deployed ubiquitously and collect data 24/7. User's privacy is a big concern in this circumstance because collected sensor data may be used to infer a user's private activities. On the other hand, cyber-attacks now harm not only cyberspace but also the physical world. A failure in IoT devices could result in loss of human life. For example, a remotely hacked vehicle could shut down its engine on the highway regardless of the driver's operation. Our approach to emerging privacy and security concerns consists of two directions. The first direction targets at privacy protection. We first look at the privacy impact of upcoming ubiquitous sensing and argue for stricter access control on smart devices. Then, we follow the data flow of private data and propose solutions to protect private data from the networking and cloud computing infrastructure. The other direction aims at protecting the physical world. We propose an innovative method to verify the cyber state of IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
26

Hay, M. A. "The criminal law of private defence in England, Scotland and France." Thesis, University of Edinburgh, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.234104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ekström, Thomas. "Public Private Business Models for Defence Acquisition : A Multiple Case Study of Defence Acquisition Projects in the UK." Licentiate thesis, Division of Engineering Logistics, Department of Industrial Management and Logistics, Lund University, Lund, Sweden, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-9061.

Full text
Abstract:
Since the ending of the Cold War, the defence sector, particularly the areas of military logistics and defence acquisition, has been undergoing a comprehensive transformation. There are several factors that explain this transformation: changes in defence and security policies for nations and organisations; reductions in defence expenditure; participation in Peace Support Operations; Lessons Learned from these operations, especially in the area of logistics; revolutionary development in the area of Information and Communication Technology; emergence of novel Commercial Best Practises in the areas of business and business logistics; and changes in the legislation regarding the conduct of public procurement in Europe. In military logistics, the relatively easily described static supply and support chains of the Cold War Era, designed for military units that stood in preparedness, Just-in-Case, of full-scale military conflicts in Europe, are now being substituted for flexible, dynamic operational supply and support chains, designed for military units that are deployed on Peace Support Operations around the globe. Hence, new types of missions have to be provided for. As a consequence, new military concepts have to be considered; new technology is being implemented; and new Commercial Best Practises are being evaluated, adapted and adopted; in order to enhance performance and ensure Value-for-Money. In defence acquisition, the single Business Model of the Cold War Era, i.e. procurement of equipment, is being replaced by a spectrum of emerging Business Models, ranging from the traditional procurement of equipment, via acquisition of equipment and support, to acquisition of availability and capability, i.e. acquisition of performance. Consequently, new Commercial Best Practises are being evaluated, adapted and adopted; Commercial and Military-Off-The-Shelf products and services are being utilised; and Public Private Participation, Cooperation, and Partnerships are being investigated and initiated; in order to enhance performance and ensure Value-for-Money, while simultaneously mitigating operational risk in the supply and support chains. This licentiate thesis reports on a research project that was commissioned by FMV, the Swedish Defence Materiel Administration, and conducted in order to "study, analyse, and evaluate Business Models regarding how they can handle the new supply concept that a new logistical interface brings about, with a particular emphasis on the risk taking that is part of the business concept". This research purpose was used to formulate three Research Questions: • Research Question 1: How can a generic Business Model for a non-profit, governmental, Defence Procurement Agency be described? • Research Question 2: Which strengths and weaknesses do different Business Models have in the context of defence acquisition? • Research Question 3: Which risks are associated with different Business Models in the context of defence acquisition? Using constructs from: Business Model theory, Public Private Participation theory, defence acquisition theory and practise, and military logistics theory and practise; a generic Public Private Business Model for defence acquisition was developed. The generic model consists of numerous variables, which enables an array of possible configurations. The model was used in a multiple case study to describe and analyse four defence acquisition projects in the UK. The multiple case study demonstrated that the generic Public Private Business Model is useful in order to describe defence acquisition projects. The model has also demonstrated that it is useful in order to analyse acquisition projects, including performance and risk. The Public Private Business Model has demonstrated its usefulness by discovering internal and external misalignments. The internal misalignments are Business Model configurations where the different building blocks are working against each other. The research has revealed examples where the mitigation of operational risk in the supply and support chains creates new risks in other building blocks. An external misalignment occurs when a Business Model configuration works against the deal for which it was designed, or the strategy that it is intended to realise. The research has revealed examples where there is a risk that the Business Model configuration is detrimental to the overarching strategy, e.g. transferring risk to the private sector or incentivising industry to enhance performance. Hence, the Public Private Business Model ought to be useful to identify and eradicate negative patterns and to identify and reinforce positive patterns. The research has revealed three potential generic problems for Performance Based Contracts: a "definition problem" (i.e. what to measure); a "measurement problem" (i.e. when, where and how to measure); and a "comparison problem" (i.e. with what to compare). The research results demonstrate that it must be made explicit which dimensions of performance; e.g. speed, quality, cost, flexibility and dependability; that should be measured, and why others should be omitted. The research suggests that performance must be explicitly specified for any Performance Based Contract in order to avoid any unnecessary problems with interpretations. Furthermore, the research indicates that performance metrics must be explicitly described. In addition, the results emphasise the importance of having an established baseline, against which to compare the measurements of Key Performance Indicators.
APA, Harvard, Vancouver, ISO, and other styles
28

Ansari, I. A. "Evaluating the financial robustness of special purpose vehicles involved in the delivery of defence private finance initiatives." Thesis, Cranfield University, 2014. http://dspace.lib.cranfield.ac.uk/handle/1826/8782.

Full text
Abstract:
Public sectors in the developed and emerging economies have been witnessing a period of intense change over the past three decades as a result of the development of free-market economy across the globe. In the UK, the public sector in 1970s (that comprised of nationalised industries) was severely criticised for being wasteful, and subject to political intervention, thereby making them inefficient systems for delivering public services. To put matters right, successive governments from the late 1970s embarked on public sector reforms. These reforms centred on increasing the role of private sector in delivering public services. Privatisation, the implementation of accruals-based accounting and application of compulsory competitive tendering in the public sector were some of these reforms. Public-private partnerships, including private finance initiatives (PFIs), introduced in the 1990s, were a continuation of these reforms. In the defence sector, various reforms carried out prior to 1990s failed to completely remove cost and time overruns in defence projects. PFIs were introduced to further rectify the failures of previous reforms in the defence sector because they were purported to provide better value for money. Defence PFIs are long-term agreements whereby the Ministry of Defence, MoD, contracts to purchase quality services on a long-term basis from the private sector (through the special purpose vehicle, SPV) in which the private sector provides all the finance required in constructing the asset that is used to provide the services. Value for money of PFIs is about economy, efficiency and effectiveness. The question, though is whether, Defence PFIs provide value for money as claimed by the MoD? The purpose of this thesis is to evaluate the effectiveness of three categories: 1) accommodation, 2) equipment and 3) training of Defence PFIs by assessing the financial robustness (over a six-year period) of the SPVs engaged in their delivery. This research employs a multi-method methodological approach to gather data. Qualitative research methods were employed in exploring and understanding customer-supplier relationships and included, PPPs, PFIs in general (and Defence PFIs in particular), the public sector reforms that brought about private sector integration, 4 defence reforms, and Defence PFI policies. Quantitative research was used to collect and evaluate financial data on SPVs (used in Defence PFIs). Research analysis provided mixed results regarding the financial robustness of SPVs employed in the delivery of Defence PFIs. The profit margins of SPVs involved in the delivery of Defence PFIs relating to the category of accommodation were the highest. This is followed by SPVs in the category of Defence equipment and then by SPVs in the category of Defence training. Interestingly, the majority of SPVs involved in the delivery of Defence PFIs relating to accommodation have sound financial health. On the other hand, most SPVs relating to the other two categories have serious financial problems and therefore show cause for concern. Based on research findings of this study, a number of important policy recommendations are advanced to raise the effectiveness of PFIs in the defence sector and the wider public sector.
APA, Harvard, Vancouver, ISO, and other styles
29

Datta, Amit. "Fairness and Privacy Violations in Black-Box Personalization Systems: Detection and Defenses." Research Showcase @ CMU, 2018. http://repository.cmu.edu/dissertations/1137.

Full text
Abstract:
Black box personalization systems have become ubiquitous in our daily lives. They utilize collected data about us to make critical decisions such as those related to credit approval and insurance premiums. This leads to concerns about whether these systems respect expectations of fairness and privacy. Given the black box nature of these systems, it is challenging to test whether they satisfy certain fundamental fairness and privacy properties. For the same reason, while many black box privacy enhancing technologies offer consumers the ability to defend themselves from data collection, it is unclear how effective they are. In this doctoral thesis, we demonstrate that carefully designed methods and tools that soundly and scalably discover causal effects in black box software systems are useful in evaluating personalization systems and privacy enhancing technologies to understand how well they protect fairness and privacy. As an additional defense against discrimination, this thesis also explores legal liability for ad platforms in serving discriminatory ads. To formally study fairness and privacy properties in black box personalization systems, we translate these properties into information flow instances and develop methods to detect information flow. First, we establish a formal connection between information flow and causal effects. As a consequence, we can use randomized controlled experiments, traditionally used to detect causal effects, to detect information flow through black box systems. We develop AdFisher as a general framework to perform information flow experiments scalably on web systems and use it to evaluate discrimination, transparency, and choice on Google’s advertising ecosystem. We find evidence of gender-based discrimination in employment-related ads and a lack of transparency in Google’s transparency tool when serving ads for rehabilitation centers after visits to websites about substance abuse. Given the presence of discrimination and the use of sensitive attributes in personalization systems, we explore possible defenses for consumers. First, we evaluate the effectiveness of publicly available privacy enhancing technologies in protecting consumers from data collection by online trackers. Specifically, we use a combination of experimental and observational approaches to examine how well the technologies protect consumers against fingerprinting, an advanced form of tracking. Next, we explore legal liability for an advertising platform like Google for delivering employment and housing ads in a discriminatory manner under Title VII and the Fair Housing Act respectively. We find that an ad platform is unlikely to incur liability under Title VII due to its limited coverage. However, we argue that housing ads violating the Fair Housing Act could create liability if the ad platform targets ads toward or away from protected classes without explicit instructions from the advertiser.
APA, Harvard, Vancouver, ISO, and other styles
30

Nyer, Damien. "Jurisdictional fairness and freezing measures : an analysis in Canadian private international law." Thesis, McGill University, 2004. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=81243.

Full text
Abstract:
Over the last decade the law of judicial jurisdiction has undergone profound changes in Canada. Chief among the factors that prompted evolution is the recognition of fairness as a guiding principle in the elaboration of jurisdictional rules. This thesis presents the consequences such recognition has already had and should have on the granting of freezing measures, those specific provisional measures aimed at freezing a defendant's assets pending litigation.
Having reviewed the freezing measures that can be obtained from Canadian courts, this thesis shows how concerns of fairness to the parties have questioned traditional grounds of jurisdiction and how it has affected the very availability of freezing measures. However, out of concerns of fairness to the plaintiff, Canadian courts with no jurisdiction to hear the merits of a dispute should be ready to assert jurisdiction for the limited purpose of freezing assets.
Finally, turning to the scope of those measures, this thesis deals with the issue of extraterritoriality. It is argued that out of concerns of fairness to innocent third parties courts should be extremely cautious in granting extraterritorial measures.
APA, Harvard, Vancouver, ISO, and other styles
31

Goulart, Junior Joselino. "Mercado de educação superior privado brasileiro : uma abordagem a partir da atuação estatal por meio da autoridade antitruste e da regulação em estruturação." reponame:Repositório Institucional da UnB, 2015. http://dx.doi.org/10.26512/2015.06.D.19464.

Full text
Abstract:
Dissertação (mestrado)—Universidade de Brasília, Departamento de Economia, Mestrado Profissionalizante em Economia do Setor Público, 2015.
Submitted by Fernanda Percia França (fernandafranca@bce.unb.br) on 2015-11-26T16:26:24Z No. of bitstreams: 1 2015_JoselinoGoulartJunior.pdf: 1605427 bytes, checksum: 26b7d96b513f57b348265139e58e96ab (MD5)
Approved for entry into archive by Raquel Viana(raquelviana@bce.unb.br) on 2016-02-05T20:05:26Z (GMT) No. of bitstreams: 1 2015_JoselinoGoulartJunior.pdf: 1605427 bytes, checksum: 26b7d96b513f57b348265139e58e96ab (MD5)
Made available in DSpace on 2016-02-05T20:05:27Z (GMT). No. of bitstreams: 1 2015_JoselinoGoulartJunior.pdf: 1605427 bytes, checksum: 26b7d96b513f57b348265139e58e96ab (MD5)
O faturamento do setor privado de educação superior está entre os maiores da economia nacional, atingindo a cifra anual de 32 bilhões de reais em 2013 apenas na graduação. A consolidação de grandes grupos neste setor é um processo constatado pelo número de atos de concentração submetidos ao Conselho Administrativo de Defesa Econômica (CADE). O grau de complexidade destes atos também se intensificou nos últimos anos. Este estudo tem por objetivo analisar os atos de concentração submetidos à autoridade antitruste brasileira e a regulação existente no mercado de educação superior privado.
The turnover of the private higher education sector is among the largest of the national economy, reaching an annual figure of 32 billion reais in 2013. The consolidation of large groups in this sector is a process evidenced by the number of mergers submitted to the Administrative Council for Economic Defense (CADE). The degree of complexity of these acts also intensified in recent years. This study aims to analyze mergers submitted to the Brazilian antitrust authority and existing regulation in the private higher education market.
APA, Harvard, Vancouver, ISO, and other styles
32

Gouveia, Maria Helena Santos. "Estratégias e políticas de desenvolvimento para a diversificação da economia Angola: a pomoção do investimento privado." Master's thesis, Instituto Superior de Ciências Sociais e Políticas, 2016. http://hdl.handle.net/10400.5/12781.

Full text
Abstract:
Dissertação de Mestrado em Estratégia
A proposta do presente trabalho de Mestrado em Estratégia, do Instituto Superior de Ciências Sociais e Políticas, consiste em estudar as Estratégias e Políticas de Desenvolvimento para a Diversificação da Economia Angolana: A Promoção do Investimento Privado. Neste quadro, pretendemos analisar o Investimento Direto Estrangeiro e os desafios que este apresenta para o desenvolvimento económico nacional do Estado angolano. Nesta dinâmica e de acordo com diversos autores, o IDE tem tido um papel cada vez mais importante, impulsionando o desenvolvimento económico e social de diversos países. O presente estudo procurou averiguar a evolução das estruturas produtivas angolanas, compreender as estratégias de negócio do interesse dos agentes em operação no mercado, a tipologia da intervenção do Estado na economia e a necessidade de se passar de um modelo de especialização primária para um modelo alternativo de desenvolvimento económico. Este estudo visou ainda responder a seguinte questão de partida: Qual a estratégia de desenvolvimento económico a implementar pelo Estado angolano, tendo em vista o adequado aproveitamento dos recursos existentes e a satisfação das necessidades da população em geral? Concluímos que a diversificação é uma preocupação das economias e a economia angolana não constitui exceção. As transformações para que tal aconteça exigem infraestruturas de recursos humanos e de capital e políticas consistentes e, na verdade, Angola continua, ainda, muito dependente da receita petrolífera, o que dificulta tal processo. Por fim concluímos que Angola tem sido o destino de uma boa parte do IDE orientado para África, sendo o setor petrolífero o que mais tem beneficiado desta evolução, pelo que entendemos que o país precisa de fazer mais para diversificar a atividade económica, melhorando o ambiente de negócios a fim de atrair mais investimentos para os diversos setores, implementando-se, um modelo de substituição de importações, o qual é para alguns autores, o mais adequado para economias em transição.
The purpose of this Master's work Strategy, presented in the Institute of Social and Political Sciences, is to study the strategies and development policies for the diversification of the Angolan Economy: Promotion of Private Investment. In this context, we intend to analyze the Foreign Direct Investment and the challenges it poses to the national economic development of the Angolan State. In this dynamic, according to several authors, FDI has played an increasingly important role in boosting economic and social development of many countries. This study aimed to investigate the evolution of the Angolan production structures, understand the business strategies in the interest of agents operating in the market, the type of state intervention in the economy and the need to move from a primary specialization model to an alternative economic development model. This study aimed to further answer the question of departure: What is the economic development strategy to be implemented by the Angolan State, in view of the proper use of existing resources and meeting the needs of the general population? We conclude that diversification is a concern of economies and the Angolan economy is no exception. The changes for this to happen require infrastructure of human resources and capital and consistent policies and, in fact, Angola has been the target of much-oriented FDI to Africa, with the oil sector that has benefited most from this trend, so we understand that the country needs to do more to diversify economic activity, improving the environment business in order to attract more investment to the various sectors, by implementing a replacement model imports, which is for some authors the most appropriate for economies in transition.
N/A
APA, Harvard, Vancouver, ISO, and other styles
33

Dunlop, Matthew William. "Achieving Security and Privacy in the Internet Protocol Version 6 Through the Use of Dynamically Obscured Addresses." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/77333.

Full text
Abstract:
Society's increased use of network applications, such as email, social networking, and web browsing, creates a massive amount of information floating around in cyber space. An attacker can collect this information to build a profile of where people go, what their interests are, and even what they are saying to each other. For certain government and corporate entities, the exposure of this information could risk national security or loss of capital. This work identifies vulnerabilities in the way the Internet Protocol version 6 (IPv6) forms addresses. These vulnerabilities provide attackers with the ability to track a node's physical location, correlate network traffic with specific users, and even launch attacks against users' systems. A Moving Target IPv6 Defense (MT6D) that rotates through dynamically obscured network addresses while maintaining existing connections was developed to prevent these addressing vulnerabilities.MT6D is resistant to the IPv6 addressing vulnerabilities since addresses are not tied to host identities and continuously change. MT6D leverages the immense address space of IPv6 to provide an environment that is infeasible to search efficiently. Address obscuration in MT6D occurs throughout ongoing sessions to provide continued anonymity, confidentiality, and security to communicating hosts. Rotating addresses mid-session prevents an attacker from determining that the same two hosts are communicating. The dynamic addresses also force an attacker to repeatedly reacquire the target node before he or she can launch a successful attack. A proof of concept was developed that demonstrates the feasibility of MT6D and its ability to seamlessly bind new IPv6 addresses. Also demonstrated is MT6D's ability to rotate addresses mid-session without dropping or renegotiating sessions.This work makes three contributions to the state-of-the-art IPv6 research. First, it fully explores the security vulnerabilities associated with IPv6 address formation and demonstrates them on a production IPv6 network. Second, it provides a method for dynamically rotating network addresses that defeats these vulnerabilities. Finally, a functioning prototype is presented that proves how network addresses can be dynamically rotated without losing established network connections. If IPv6 is to be globally deployed, it must not provide additional attack vectors that expose user information.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
34

Bui, Ngoc Quang H. "Dworkinian Liberalism & Gay Rights: A Defense of Same-Sex Relations." Digital Archive @ GSU, 2010. http://digitalarchive.gsu.edu/philosophy_theses/71.

Full text
Abstract:
Recent changes in the politics of gay rights have led to a gay rights demand for liberal governments: i) decriminalization of sodomy and ii) full governmental recognition of civil, same-sex marriages. Challengers to liberalism argue that a neutral liberalism cannot satisfy the gay rights demand. I argue that the liberal political framework put forth by Ronald Dworkin can adequately fulfill the gay rights demand. Dworkinian liberalism, which is neutral with respect to the ethical life, need not be neutral with respect to moral and non-ethical values. I argue for the more modest claim that Dworkinian liberalism has the conceptual tools and principles for satisfying the gay rights demand. In arguing for my claim, I discuss the internal criticisms of Carlos Ball and Michael Sandel and the external criticism of John Finnis. I argue that these concerns are surmountable. Dworkinian liberalism is capable of offering a robust defense of same-sex relations.
APA, Harvard, Vancouver, ISO, and other styles
35

Morrell, Christopher Frank. "Improving the Security, Privacy, and Anonymity of a Client-Server Network through the Application of a Moving Target Defense." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/79791.

Full text
Abstract:
The amount of data that is shared on the Internet is growing at an alarming rate. Current estimates state that approximately 2.5 exabytes of data were generated every day in 2012. This rate is only growing as people continue to increase their on-line presence. As the amount of data grows, so too do the number of people who are attempting to gain access to the data. Attackers try many methods to gain access to information, including a number of attacks that occur at the network layer. A network-based moving target defense is a technique that obfuscates the location of a machine on the Internet by arbitrarily changing its IP address periodically. MT6D is one of these techniques that leverages the size of the IPv6 address space to make it statistically impossible for an attacker to find a specific target machine. MT6D was designed with a number of limitations that include manually generated static configurations and support for only peer to peer networks. This work presents extensions to MT6D that provide dynamically generated configurations, a secure and dynamic means of exchanging configurations, and with these new features, an ability to function as a server supporting a large number of clients. This work makes three primary contributions to the field of network-based moving target defense systems. First, it provides a means to exchange arbitrary information in a way that provides network anonymity, authentication, and security. Second, it demonstrates a technique that gives MT6D the capability to exchange configuration information by only sharing public keys. Finally, it introduces a session establishment protocol that clients can use to establish concurrent connections with an MT6D server.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
36

Montoya, Hernández Pedro Isaías. "La defensa jurídica del estado: Situación de indefensión frente a la inversión privada." Master's thesis, Universidad Nacional Mayor de San Marcos, 2015. https://hdl.handle.net/20.500.12672/9284.

Full text
Abstract:
El documento digital no refiere asesor
Publicación a texto completo no autorizada por el autor
Propone alternativas al Estado que coadyuven a su superación, con un sistema de defensa jurídica de sus intereses y de sus derechos en beneficio del cumplimiento de sus objetivos principales frente a la sociedad, manteniendo latente el propósito de desarrollo a través de las grandes inversiones, y respetando el ordenamiento legal vigente sobre el particular. Para la presente investigación se han empleado como técnicas de recopilación de datos la encuesta, la entrevista y el análisis de contenido con el fin de conocer la practicas, las técnicas, las estructuras, los procesos y las temáticas existentes en el sistema de defensa jurídica del Estado en materia de inversión privada en los contratos de Infraestructura vial, celebrados por el MTC en representación del Estado peruano. La investigación es de carácter explicativo y constituye un esfuerzo para obtener una radiografía del Estado en los procesos arbitrales frente a la inversión privada, que implica un primer acercamiento que debe ser extendido y profundizado. Este reporte de investigación tiene como uno de sus objetivos esenciales propiciar el análisis, la discusión y la reflexión profunda respecto del sistema de defensa jurídica del Estado.
Tesis
APA, Harvard, Vancouver, ISO, and other styles
37

Ravichandran, Pravin Karthick, and Santhosh Keerthi Balmuri. "Evaluation of different Cloud Environments and Services related to large scale organizations(Swedish Armed forces)." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20556.

Full text
Abstract:
Cloud Computing (CC) is one of the fast growing computer network technologies and many companies offer their services through cloud network. Cloud Computing has many properties with respect to the existing traditional service provisions like scalability, availability, fault tolerance, capability and so on which are supported by many IT companies like Google, Amazon, Salesforce.com. These IT companies have more chances to adapt their services into a new environment, known as Cloud computing systems. There are many cloud computing services which are being provided by many IT companies.The purpose of this thesis is to investigate which cloud environment (public, private and hybrid) and services (Infrastructure as a Service, Software as a Service, and Platform as a Service) are suitable for Swedish Armed Forces (SWAF) with respect to performance, security, cost, flexibility and functionality. SWAF is using private (internal) cloud for communications where both sensitive and non-sensitive information are located in the internal cloud. There are problems like maintenance of hardware, cost issues and secure communication while maintaining the private cloud. In order to overcome those problems we have suggested a hybrid and community cloud environment and SaaS, IaaS, PaaS services for SWAF.For suggesting these cloud environments and cloud services we have performed a literature study and two empirical studies (survey and interviews) with different organizations.A new cloud model is designed based on the suggested cloud environment, separate storage spaces for sensitive and non-sensitive information, suitable services and an effective infrastructure for sharing the internal information for SWAF.
APA, Harvard, Vancouver, ISO, and other styles
38

Novak, Kneilan K. "Ringing the bell; sounding the alarm a proposal for the simultaneous advancement of security and privacy." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FNovak.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2006.
Thesis Advisor(s): Robert Bach. "March 2006." Includes bibliographical references (p. 83-86). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
39

Rainger, Michele Barbara, and n/a. "An examination of the achievements of In-House Options within the Defence Commercial Support Program." University of Canberra. Business and Government, 2006. http://erl.canberra.edu.au./public/adt-AUC20070719.122229.

Full text
Abstract:
The public sector in Australia, as in other western countries, has been accused in recent times of being too costly, too rigid, inefficient and ineffective. What is apparently needed is a public sector that is smaller, less costly, more efficient and more effective. The search for alternative and better ways to organise and undertake work to meet these reform objectives is at the heart of the rapid expansion of Competitive Tendering and Contracting (CTC) within the public sector in the last two decades. But increased reliance on government contracting does not always lead to outsourcing. Some government agencies allow, indeed encourage, their current employees to also bid for the work on offer by including an In-House Option (IHO) within their CTC processes. In a number of cases these IHOs have been selected ahead of their commercial competitors. IHOs are effectively internal tenders that, if selected, must be implemented by work areas within the confines of the policies and practices of their parent organisation. The reasons commonly expressed in support of IHOs are to do with addressing the potentially problematic aspects of organisational review and possible outsourcing, and to assist the parent organisation achieve its reform intentions in the most effective and least disruptive manner possible. This research examined the achievements of six IHOs within the Australian Defence Organisation. It also asked what can be learned from their experiences? The findings show that IHOs can contribute to reform and enhance the effectiveness of CTC processes but that these achievements come at a price�borne primarily by the staff who work within selected IHOs. IHOs add to the competition of CTC exercises. They also act as an insurance policy against being caught with no reasonable bids and offer a benchmark against which to assess unknown bids. But competition can also focus bidders on doing what is necessary to win rather than what is best for an organisation or its staff. Having IHOs increases the uncertainty for staff about their future employment while at the same times raising expectations that if they can be successful they will be able to make changes and improve their work areas. This research has shown that this does not always occur and staff can find the whole experience frustrating and demoralising. Organisations that include IHOs within their CTC methodologies need to assist them if they are to have the best opportunity to propose new and innovative ways of working. And they must be prepared for the possibility that their IHOs could win. Selected IHOs need support to successfully implement changes, and as the IHOs examined here have shown, they can make significant improvements in work practices and more efficient use of resources if given the chance.
APA, Harvard, Vancouver, ISO, and other styles
40

Berglund, Sara, and Olivia Nilsson. "Integrated Solutions and the Needed Capabilities: A Supplier and Customer Perspective : A Case Study of a Public-Private Business Relationship within the Defence and Security Sector." Thesis, Karlstads universitet, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-78615.

Full text
Abstract:
The manufacturing industry has experienced a change in the business environment during the last decade and has started to explore the possibilities of integrating products and services into new bundled offerings. A great deal has been published about this new phenomenon and it is often referred to as integrated solutions. When implementing an integrated solution it requires changes in the organizational structure, resulting in a need to develop further capabilities. Capabilities are explained as complex bundles of skills and accumulated knowledge possessed by organizations that enables them to coordinate their activities and make use of their assets. Previous literature has focused on the capabilities needed for suppliers that develop integrated solutions, leaving uncertainties regarding the needed capabilities for the customer. This research intends to investigate the capabilities needed from both the supplier’s and customer’s perspective and how they affect the development of integrated solutions. To investigate this, a thorough literature review was conducted to create a foundation of knowledge regarding the research area and resulted in a theoretical framework. The research follows a qualitative case study approach where empirical data was collected primarily through interviews but also by analyzing documents that resulted in needed capabilities for both actors. Furthermore, economic models were developed to provide a holistic view of the integrated solution and enable comparison with the current trading situation. The research resulted in five dimensions including capabilities needed for the supplier and four dimensions including capabilities needed for the customer when developing the integrated solution. The dimensions are: Control capability, Economic capability, Organizational capability, Production capability, and Relational capability. In this specific case study, the production capability dimension was considered unique for the supplier and did not iterate from the perspective of the customer. Apart from this, the dimensions were considered important for both actors. The findings indicate that the capabilities possessed by both the supplier and the customer affect the integrated solution and that it is important to investigate the needed capabilities form the perspective of both actors before developing the integrated solution. However, there were differences since some capabilities were required by only one actor and some were considered more or less essential depending on the actor. Furthermore, the findings imply that the uniqueness of the business relationship and the industry may affect the needed capabilities.
Under det senaste årtiondet har det skett en förändring i tillverkningsindustrin då flera företag har börjat undersöka möjligheterna att integrera produkter och tjänster till kombinerade erbjudanden. Denna förändring har förekommit frekvent i litteraturen och benämns ofta som integrerade lösningar. När man implementerar en integrerad lösning krävs förändringar i den organisatoriska strukturen vilket har resulterat i ett behov av att utveckla ytterligare förmågor. Förmågor definieras som komplexa kombinationer av kompetenser och den kunskap som finns hos organisationen som möjliggör att kunna koordinera sina möjligheter och utnyttja sina tillgångar optimalt. Tidigare litteratur har fokuserat på de förmågor som leverantörer behöver för att utveckla integrerade lösningar vilket skapar en osäkerhet gällande de förmågor som krävs av kunden. Studien avser att undersöka de förmågor som krävs både ur ett leverantörs- och kundperspektiv när man utvecklar integrerade lösningar. En noggrann litteraturundersökning gjordes för att skapa en grund av kunskap gällande forskningsområdet och resulterade i ett teoretiskt ramverk. En kvalitativ fallstudie utfördes där empirisk data samlades in genom huvudsakligen intervjuer men också genom att analysera dokument. Således resulterade fallstudien i de förmågor som krävdes av båda aktörerna för att utveckla den integrerade lösningen. För att skapa en helhetssyn över den integrerade lösningen utvecklades en ekonomisk modell vilket möjliggjorde för en jämförelse av den nuvarande handelssituationen. Undersökningen resulterade i fem dimensioner innehållande förmågor för leverantören respektive fyra dimensioner innehållande förmågor för kunden vid utveckling av den integrerade lösningen. Följande dimensioner identifierades: kontrollförmåga, ekonomisk förmåga, organisatorisk förmåga, produktionsförmåga och relationsförmåga. I denna specifika fallstudie ansågs produktionsförmågorna endast beröra leverantören och därav itererade dem inte ur ett kundperspektiv. Utöver denna förmåga ansågs alla dimensioner viktiga för båda aktörerna. Resultatet indikerar att det är viktigt att undersöka vilka förmågor som behövs både för leverantören och kunden vid utvecklingen av en integrerad lösning. Trots att många av de förmågor som identifierades i studien ansågs viktiga för båda aktörerna fanns det olikheter då vissa förmågor endast behövdes för en av aktörerna och vissa ansågs mer eller mindre viktiga beroende på aktör. Resultatet indikerar även att den unika affärsrelationen och den specifika industrin kan ha en påverkan på vilka förmågor som anses viktiga för aktörerna.
APA, Harvard, Vancouver, ISO, and other styles
41

Bjornberg, Karin. "Rethinking human security : taking into consideration gender based violence." Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/71706.

Full text
Abstract:
Includes bibliography
ENGLISH ABSTRACT: The human security concept challenges the traditional view of state security. The very essence of human security means to respect human rights. The Commission on Human Security did not focus on women as a special area of concern in the 1994 Human Development Report. The report does not recognise that being subject to gender hierarchies increases women’s insecurity and that women experience human security differently from men and shows that the human security concept does not include gender based violence (GBV) because there is no specific attention paid to issues that predominantly pertain to women. This study is conducted from a feminist perspective. It is reflexive research and based on standpoint theory. The data is gathered through analysis of secondary data and primary data, collected through interviews. GBV in South Africa tends to be continuous and the perpetrator is most likely to be a spouse or partner. Studies show that women are seen as being dependent on and weaker than men. Many men view women’s rights legislation as a challenge to the legitimacy of men’s authority over women. Women who try to be more independent in their relationships are regarded as threats and violence against them becomes a way for men to show control. The criminal justice system in South Africa has made progress in protecting women from GBV but myths, stereotypes and social conventions still prevent women from receiving justice. Traditionally, the state regards what happens in the private sphere as outside its responsibility. The public/private dichotomy challenges state regulations and norms which is evident in the case of domestic violence. It is often argued that GBV has remained imperceptible because it takes place in the private sphere. However, this research indicates that due to the socio-economic situation in South Africa, the abuse is often publicly known by those in the immediate environment as people live in informal housing. This research shows that a human security framework that targets GBV has to be developed for those who bear its consequences. When women are not viewed as subjects, issues that mainly affect them remain invisible. It is necessary that analysis of human insecurity starts from the conditions of women’s lives. Many women in South Africa live highly traumatic lives. Fighting GBV requires that we know the victims of GBV and let them decide what they need to feel secure. Creating human security requires that other threats which contribute to GBV, such as poverty, gender stereotypes and prejudice are also addressed. GBV has become an epidemic in South Africa and is a permanent constraint in women’s lives and impacts society as a whole. The security of the state rest on the security of women and as long as the state fails to treat GBV as a serious crime and protect women the state is more likely to use violence on a larger scale against its citizens.
AFRIKAANSE OPSOMMING: Die Menslike Veiligheidskonsept daag die tradisionele siening van staatsveiligheid uit: die kerbetekenis van Menslike Veiligheid is om menseregte te respekteer. Die Kommissie op Menslike Veiligheid het nie op vroue as ‘n spesiale area van kommer gefokus in die Menslike Ontwikkelingsverslag van 1994 nie. Die verslag het daarin gefaal om te erken dat die realiteit van geslags-hiërargieë vroue se insekuriteit verhoog, en dat die ervaring van menslike sekuriteit van mans en vroue verskil. Hierdie navorsing sal toon dat die menslike veiligheidsbegrip nie in staat is om geslags-gebaseerde geweld (GGG) in ag te neem nie, aangesien daar geen spesifieke aandag verleen is aan vraagstukke wat hoofsaaklik op vroue betrekking het nie. Hierdie studie is vanuit 'n feministiese perspektief gedoen. Die navorsing is reflektief en op standpunt-teorie gebaseer. Die data is deur die analise van sekondêre data, asook die gebruik van primêre data i deur middel van onderhoude ingesamel . GGG in Suid-Afrika is geneig om oor ‘n uitgerekte tydperk plaas te vind en die mees waarskynlike oortreders is ‘n eggenoot of lewensmaat. Navorsing toon dat gemeenskappe geneig is om vroue as swakker en afhanlik van mans te sien. Wetgewing op die regte van vroue word deur vele mans as ‘n uidaging van hul legitieme superioriteit, ten op sigte van vroue, gesien. Vroue wat dus onafhanklikheid in hul verhoudings probeer uitoefen, word as bedreigings gesien en geweld word gebruik om hulle “in hul plek te hou”. Die Suid-Afrikaanse kriminele regstelsel het al vordering gemaak in terme van die beskerming van vroue teen GGG, maar mites, stereotipes en sosiale konvensies belemmer steeds die volle gang van die gereg. Die staat het in die verlede die private sfeer as buite sy jurisdiksie gesien. Die openbare/private sfeer digotomie bied uitdagings vir staatsregulering en vir die implementering van regulasies , en dit word veral duidelik in die geval van huishoudelike geweld. Daar word aangevoer dat aangesien GGG in die private sfeer plaasvind, dit onsigbaar bly. Hierdie navorsing het egter bevind dat GGG in die Suid-Afrikaanse konteks dikwels in die openbare gemeenskapsfeer (deur diegene in die onmiddelike omgewing) opgemerk word, omdat baie mense in Suid-Afrika informele nedersettings woon.Hierdie navorsing het verder bevind dat ‘n GGG raamwerk vir menslike veiligheid ontwikkel moet word wat diegene wat die gevolge van GGG dra insluit. Indien vroue nie spesifiek as navorsingssubjekte geag word nie, bly faktore wat hulle spesifiek beïnvloed onsigbaar. Dit is belangrik dat analise van menslike insekuriteit begin om die omstandighede van vrouens se lewens in ag te neem. Vroue in Suid-Afrika leef in hoogs traumatiese omstandighede. In die bestryding van GGG is dit belangrik dat die slagoffers van GGG in ag geneem word en dat dit hulle toelaat om dit duidelik te maak wat hulle onveilig laat voel. Die skep van menslike veiligheid vereis dat bedreigings wat bydra tot GGG, naamlik armoede, geslagstereotipes en vooroordeel , ook aangespreek word. GGG in Suid-Afrika het ‘n epidemie geword, en plaas ‘n permanente beperking op vroue se lewens. Dit het ook ‘n blywende impak op die samelewing as ‘n geheel. Die veiligheid van die staat rus op die veiligheid van vroue. Solank as wat die staat versuim om GGG te bekamp en as ‘n ernstigge misdaad te erken, en vroue nie die beskerming van die staat geniet nie, is daar ‘n hoër moontlikheid vir die gebruik van geweld deur die staat teen sy eie burgers op ‘n groter skaal.
APA, Harvard, Vancouver, ISO, and other styles
42

Duarte, Clotildes Fagundes. "A qualidade dos serviços educacionais e a proteção do código de defesa do consumidor /." Franca : [s.n.], 2001. http://hdl.handle.net/11449/89899.

Full text
Abstract:
Orientador: Carlos Aurélio Mota de Souza
Banca: Ruy Geraldo Camargo Vianna.
Banca: Celso Antonio Pacheco Fiorillo
Resumo: A qualidade dos Serviços Educacionais e a proteção do Código do Consumidor é o objeto de estudo nesta pesquisa. O binômio lucratividade X qualidade na educação nacional tem emergido como uma fonte de preocupação pelos órgãos normatizadores e fiscalizadores deste setor, bem como por toda sociedade civil. Face a esta constatação, pretende a presente pesquisa demonstrar que, o ensino privado, além de submeter-se à todas normativas da educação nacional e da autorização e avaliação da qualidade pelo Poder Público, como um imperativo constitucional e infra-constitucional, deve atender ainda aos princípios da ordem econômica e do Código de Defesa do Consumidor, posto que serviço remunerado. Considerando a extensa subjetividade do conceito "qualidade", a presente pesquisa busca nos indicadores Legais e Institucionais, a moderna concepção de "Qualidade de Ensino". Nesta esteira, o estudo apresenta suporte teórico para afirmar a possibilidade jurídica da aplicabilidade do Direito do Consumidor às relações de consumo do Ensino, não apenas no que se refere aos custos, preços e propaganda enganosa, mas sobretudo em relação à qualidade do Ensino ministrado, coibindo os excessos de lucratividade advindos da falta do comprometimento com o caráter social inerente à Educação. Desta forma, está o prestador de Ensino, a exemplo dos demais prestadores de serviços no mercado, obrigado a oferecer "serviços adequados para os fins que razoavelmente deles se esperam, bem como serviços que atendam as normas regulamentares de prestabilidade", sob pena da competente ação de responsabilidade pelos vícios de qualidade, conforme permissivo contido no Código de Defesa do Consumidor.
Abstract: The providing Education Services under The protection of the Consumer Rights Actwith the emphasis on responsibility for the imperfections of the Quality of education services is the objective of this research. The question of profit versus quality in the National Education System has emerged as a source of worry of the Education Agencies responsible for the regulation and control of this sector, as well as for society as a whole. Considering these facts is the intention of this research. We intend to demonstrate that the private educational system not only complies with all the regulations of the Official Educational System, but also with the authorization and evaluation of quality by the public Administration. Within the role of that body at a constitutional and sub-constitutional level as well as adhering to economic principles and Consumer Rights, as a paid service. Taking into consideration the subjective nature of the concept "quality", this research aims to present, using both legal and institutional indicators, a modern concept of "Teaching Quality". In this way, the study presents theoretical support to ratify the judicial possibility of the applicability of consumer rights in relation to the consumption of Education and Teaching. Not only related to costs, princes and deceptive advertising, but especially in relation to the quality of teaching administered. Restraining excessive profits that occur as a consequence of the lack of compromise with the social character inherent to Education. In this way the "education" service is, as much as any other service on the market, compelled to offer "appropriate services for the objectives within reasonably expected standards, as well as services that comply with the principles of services rendered regulations" by using competent action of responsibility in providing quality without viciousness in quality, according to directives included in the Consumer Rights Code.
Mestre
APA, Harvard, Vancouver, ISO, and other styles
43

Duarte, Clotildes Fagundes [UNESP]. "A qualidade dos serviços educacionais e a proteção do código de defesa do consumidor." Universidade Estadual Paulista (UNESP), 2001. http://hdl.handle.net/11449/89899.

Full text
Abstract:
Made available in DSpace on 2014-06-11T19:24:14Z (GMT). No. of bitstreams: 0 Previous issue date: 2001-11-09Bitstream added on 2014-06-13T20:12:15Z : No. of bitstreams: 1 duarte_cf_me_fran.pdf: 692038 bytes, checksum: 2eaaef363b8195d483d5800af99b871d (MD5)
A qualidade dos Serviços Educacionais e a proteção do Código do Consumidor é o objeto de estudo nesta pesquisa. O binômio lucratividade X qualidade na educação nacional tem emergido como uma fonte de preocupação pelos órgãos normatizadores e fiscalizadores deste setor, bem como por toda sociedade civil. Face a esta constatação, pretende a presente pesquisa demonstrar que, o ensino privado, além de submeter-se à todas normativas da educação nacional e da autorização e avaliação da qualidade pelo Poder Público, como um imperativo constitucional e infra-constitucional, deve atender ainda aos princípios da ordem econômica e do Código de Defesa do Consumidor, posto que serviço remunerado. Considerando a extensa subjetividade do conceito qualidade, a presente pesquisa busca nos indicadores Legais e Institucionais, a moderna concepção de Qualidade de Ensino. Nesta esteira, o estudo apresenta suporte teórico para afirmar a possibilidade jurídica da aplicabilidade do Direito do Consumidor às relações de consumo do Ensino, não apenas no que se refere aos custos, preços e propaganda enganosa, mas sobretudo em relação à qualidade do Ensino ministrado, coibindo os excessos de lucratividade advindos da falta do comprometimento com o caráter social inerente à Educação. Desta forma, está o prestador de Ensino, a exemplo dos demais prestadores de serviços no mercado, obrigado a oferecer serviços adequados para os fins que razoavelmente deles se esperam, bem como serviços que atendam as normas regulamentares de prestabilidade, sob pena da competente ação de responsabilidade pelos vícios de qualidade, conforme permissivo contido no Código de Defesa do Consumidor.
The providing Education Services under The protection of the Consumer Rights Actwith the emphasis on responsibility for the imperfections of the Quality of education services is the objective of this research. The question of profit versus quality in the National Education System has emerged as a source of worry of the Education Agencies responsible for the regulation and control of this sector, as well as for society as a whole. Considering these facts is the intention of this research. We intend to demonstrate that the private educational system not only complies with all the regulations of the Official Educational System, but also with the authorization and evaluation of quality by the public Administration. Within the role of that body at a constitutional and sub-constitutional level as well as adhering to economic principles and Consumer Rights, as a paid service. Taking into consideration the subjective nature of the concept quality, this research aims to present, using both legal and institutional indicators, a modern concept of Teaching Quality. In this way, the study presents theoretical support to ratify the judicial possibility of the applicability of consumer rights in relation to the consumption of Education and Teaching. Not only related to costs, princes and deceptive advertising, but especially in relation to the quality of teaching administered. Restraining excessive profits that occur as a consequence of the lack of compromise with the social character inherent to Education. In this way the education service is, as much as any other service on the market, compelled to offer appropriate services for the objectives within reasonably expected standards, as well as services that comply with the principles of services rendered regulations by using competent action of responsibility in providing quality without viciousness in quality, according to directives included in the Consumer Rights Code.
APA, Harvard, Vancouver, ISO, and other styles
44

Mieželytė, Renata. "Asmens neturtinių teisių apsaugos plėtimąsi lemiantys veiksniai ir problematika." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2008~D_20090122_134828-35518.

Full text
Abstract:
Šiandien Europos valstybių teismų praktikoje pastebima tendencija plėsti asmens neturtinių teisių apsaugos lygį. Kai kuriose Europos valstybėse – Vokietijoje, Austrijoje, Nyderlanduose – atsisakoma tradicinių teisinio reguliavimo modelių, ribojančių galimybes taikyti tam tikrus civilinių teisių gynimo būdus asmens neturtinių teisių pažeidimo atveju. Plečiasi neturtinės žalos atlyginimo, kaip civilinių teisių gynimo būdo, taikymo sritis. Europos Žmogaus Teisių Teismo, nacionalinių teismų praktikos ir įstatymų leidžiamosios valdžios pagalba Europos valstybėse plečiamas teisės saugomų neturtinių vertybių sąrašas. Ypatingas dėmesys skiriamas asmens neturtinėms teisėms, susijusioms ne su fiziniais, o su vidiniais, psichologiniais individo parametrais. Plečiantis asmens neturtinių teisių spektrui kyla asmens neturtinių teisių tarpusavio konkuravimo problema: kaip turi būti derinamos lygiavertės, tarptautiniu ir konstituciniu lygmeniu įtvirtintos asmens neturtinės teisės, kad būtų garantuota veiksminga šių teisių apsauga? Tyrimo tikslas – išskirti ir plačiau aptarti pagrindinius veiksnius, lemiančius asmens neturtinių teisių apsaugos plėtimosi dinamiką ir mastą bei akcentuoti aktualiausias asmens neturtinių teisių apsaugos problemas. Pirmoje magistro baigiamojo darbo dalyje nagrinėjama asmens neturtinių teisių apsaugos samprata, aptariamos valstybės saugomos neturtinės vertybės, jų gynimo ir teisės pažeidimų prevencijos galimybės. Antroji dalis skirta išskirti ir aptarti veiksnius... [toliau žr. visą tekstą]
Nowadays, it is a tendency in European countries to widen the scope of protection of personality rights. In some countries, such as Germany, Austria, Netherlands, the traditional models of legal regulations, which restrict a possibility to invoke certain means of civil protection regarding the cases of infringement of personality rights are repudiated. The scope of application of non-pecuniary damage as a means of civil defense is being developed. European Court of Human Rights case-law, national court case-law and legislative authority – all have a great influence on developing a list of personality rights which is closely related not to physical, but to interior and psychological parameters of individual. The widening scope of protection of personality rights the main problem rise in competing in between with the rights themselves – how to find a fair balance between the equivalent rights which are ordained on the constitutional and international level in order to guarantee the effective protection of the personality rights. The aim of the analysis is to characterize and analyze the main factors in more detail, which determine the scope and dynamics in the protection of personality rights, and to emphasize the problems of the protection of personality rights. In the first part of the master thesis the author analyses the conception of personality rights, discusses the main state protected values, and the means of how to defense them as well as the possibility to prevent... [to full text]
APA, Harvard, Vancouver, ISO, and other styles
45

Kartal, Umit. "Public Space Must be Defended: Hannah Arendt's Conception of Politics and The Public Space: Its Promises and Limits." OpenSIUC, 2011. https://opensiuc.lib.siu.edu/theses/745.

Full text
Abstract:
AN ABSTRACT OF THE THESIS OF UMIT KARTAL, for the Master of Arts degree in PHILOSOPHY, presented on September 29, 2011, at Southern Illinois University Carbondale. TITLE: PUBLIC SPACE MUST BE DEFENDED. HANNAH ARENDT'S CONCEPTION OF POLITICS AND THE PUBLIC SPACE: ITS PROMISES AND LIMITS MAJOR PROFESSOR: Dr. Kenneth Stikkers This thesis is an examination of Hannah Arendt's reconsideration of the meaning of politics and her systematic search for the recovery of the public spaces. Her scrutiny of the meaning of politics is determined by the disastrous outcomes of totalitarian experiences from both ends of the political spectrum, namely, Nazism and Stalinism. For Arendt, the phenomenon of totalitarianism deserted the human world and brought new issues forth, such as statelessness, rightlessness, homelessness, and worldlessness. These phenomena, Arendt holds, run parallel to the collapse of the essential articulations of the human condition, which can be distinguished in sheer thoughtlessness, speechlessness, and lack of judgment. It is due to these unprecedented and unanticipated issues, which cannot be addressed by traditional political categories, Arendt invites us to grapple with the meaning of politics anew. The basic definition of politics, for Arendt, is human plurality, namely, our coexistence in a common world which enables differences and diversities of perspectives to appear. The question what politics means, for Arendt, is inextricably tied to what its distinctive locus is, namely, the public space or space of appearances. The emergence of the social resulted in blurring the distinctive line between the public realm and the private realm. Then, the recovery of the public space is of a central place in Arendt's political theory. Through Arendt's reconsideration of the meaning of politics and the recovery of the public space we are provided a comprehensive framework to think about a more inclusive and democratic politics. Nevertheless, we are challenged by a set of problems: a very sharp distinction between the public realm and the private realm, a contrast between the social and political, and a lack of systematic interest in democracy. First, I concentrate on Arendt's insightful analysis of politics and the public space in turn. Then I focus on the problematic aspects of her political theory. Finally, I argue that these problematic aspects can be complemented by a comparative reading of Arendt with John Dewey. I conclude that Dewey offers us a more dynamic criterion to decide the line between the private realm and the public realm. Instead of opposing the social to political, Dewey extends the scope of politics by taking every aspects of social life into consideration. The recovery of the public, for him, depends essentially on democracy, which is identified to the experience of local community.
APA, Harvard, Vancouver, ISO, and other styles
46

Nunes, Eliana Volcato. "Habeas data: instrumento de defesa do direito a vida privada, pela supressão de dados sensiveis." reponame:Repositório Institucional da UFSC, 1995. https://repositorio.ufsc.br/handle/123456789/106403.

Full text
Abstract:
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro de Ciencias Juridicas
Made available in DSpace on 2013-12-05T20:23:16Z (GMT). No. of bitstreams: 0 Previous issue date: 1995Bitstream added on 2016-01-08T19:51:12Z : No. of bitstreams: 1 102704.pdf: 4740297 bytes, checksum: 5bcb19e0937120547fbb75d378e0b3ea (MD5)
Análise do Instituto Habeas Data, visto como instrumento processual capaz de garantir a defesa do direito à vida privada. Estuda os efeitos da informatização sobre a sociedade. Propõe ampliação interpretativa da norma constitucional que criou o habeas data, para permitir a supressão de dados que ameacem a vida privada, direito tutelado pela ação constitucional.
APA, Harvard, Vancouver, ISO, and other styles
47

Bricet, des Vallons Georges-Henri. "L’entreprise de guerre au XXIe siècle : Les sociétés militaires privées dans la politique étrangère et la stratégie militaire des Etats-Unis." Thesis, Paris 5, 2012. http://www.theses.fr/2012PA05D001.

Full text
Abstract:
Les guerres d’Irak et d’Afghanistan ont vu la réapparition massive de sociétés de mercenariat d’un nouveau genre.Le mercenariat occidental est ainsi passé en moins de vingt ans de structures artisanales, arrimées à la politiquepost-coloniale des grandes puissances, à un stade professionnel et industriel tendant à une transnationalisationcroissante de ses activités. Des bavures de la célèbre Blackwater à l’implication d’employés de CACI dans lescandale de la torture au sein de la prison d’Abu Grahib, en passant par les activités de la tentaculaire Aegis, lessociétés militaires privées, omniprésentes sur le champ de bataille, ont rythmé et marqué le récit de ces guerresmajeures du début du XXIe siècle. Fait crucial : c’est la première fois dans l’histoire des opérations militairesaméricaines qu’on assiste à un basculement de la démographie des forces en faveur du secteur privé. Produit del’économie de guerre permanente et ramifications expéditionnaires du complexe militaro-industriel, ces sociétésreprésentent un changement d’expression de la puissance militaire étatsunienne sans précédent. Cettemercenarisation de l’american way of war est désormais une tendance structurelle de la politique étrangère del’Empire et pourrait bien révolutionner à terme le visage même de la guerre. Cette thèse trace le récit historique deces armées privées, décrit les conditions politiques qui ont permis à ce nouveau marché de la guerre d’émerger etse propose d’analyser la portée sociopolitique de ce phénomène de mondialisation de la violence privée quant à laquestion de l’Etat. Cette question du retour du mercenariat à grande échelle dans la politique étrangère des Etats-Unis permet non seulement de former une hypothèse aiguë sur le déclin de la puissance militaire américaine maisaussi sur les évolutions de l’identité sociohistorique du monopole de la violence étatique
Iraq and Afghanistan Wars have seen a massive return of mercenary companies of a new genre. The Westernmercenaries have transformed in less than twenty years from craft structures, linked to the post-colonial politics ofgreat powers, to a professional and industrial stage that tends to a growing transnationalization of their activities.From the blunders of the famous Blackwater to the involvement of CACI’s employees in the torture scandal inAbu Ghraib prison, through the activities of the sprawling Aegis, private military companies, everywhere on thebattlefield, have marked and labeled the story of these major wars of the early twenty-first Century. Crucial fact:this is the first time in the history of U.S. military operations that we are witnessing a shift in the demographics offorces in favor of the private sector. Product of the permanent war economy and overseas branches of themilitary-industrial complex, these companies represent an unprecedented change in expression of U.S. militarypower. This mercenarization of the American way of war is now a structural trend of the foreign policy of theEmpire and could eventually revolutionize the face of the war. This thesis traces the history of these privatearmies, described the political conditions that led to the birth of this new market of war, and analyzes the scope ofthis sociopolitical phenomenon of globalization of private violence. This return of mercenaries on a large scale inthe foreign policy of the United States not only help to form a decisive hypothesis on the decline of Americanmilitary power but also on the socio-historical changes of the identity of the State monopoly of violence
APA, Harvard, Vancouver, ISO, and other styles
48

Hubert, Olivier. "Aspects procéduraux de la contrefaçon de brevet d'invention." Thesis, Lyon 3, 2015. http://www.theses.fr/2015LYO30057.

Full text
Abstract:
Le droit procédural de l’action en contrefaçon de brevet d’invention n’est pas un droit autonome. En effet, si l’action en contrefaçon de brevet dépend majoritairement de règles procédurales qui lui sont propres, elle repose également sur une multitude de règles appartenant à des systèmes normatifs plus généraux, tels que, notamment, le droit judiciaire privé, le droit des biens, le droit des contrats, ou encore les droits fondamentaux. L’instance en contrefaçon de brevet, qui relève pour sa part essentiellement du droit judiciaire privé général, intègre un certain nombre de règles spécifiques qui lui confèrent ainsi une physionomie originale. Seule l’étude des rapports existant entre ces différents systèmes normatifs, à chaque étape de l’action et de l’instance, permet de clarifier les aspects procéduraux de l’action en contrefaçon de brevet d’invention et de sécuriser les justiciables dans l’exercice de leurs droits
The procedural law of patent infringement action is not an autonomous law. Indeed, if patent infringement action largely depends on its own procedural rules, it also relies on a multitude of rules belonging to more general normative systems, such as, in particular, the private judicial law, property law, contract law, or human rights. The patent infringement proceedings, which fundamentaly depends on private judicial law, integrates some specific rules, which thus give it a unique legal physionomy. Only the study of the relationship between these different normative systems at each stage of both the action and the proceedings, clarifies the procedural aspects of the action of patent infringement and secure as well as protecting litigants while exercizing their rights
APA, Harvard, Vancouver, ISO, and other styles
49

Pereira, Paulo Marcos Ribeiro. "Os fundos de investimento em private equity e a nova regulamentação antitruste no Brasil." reponame:Repositório Institucional do FGV, 2013. http://hdl.handle.net/10438/11399.

Full text
Abstract:
Submitted by Paulo Marcos Ribeiro Pereira (pauloefei@gmail.com) on 2014-01-14T12:01:56Z No. of bitstreams: 1 finanças-paulo-pereira v9 protocolada.pdf: 1427082 bytes, checksum: 9477e58b7717a06f15189fa3d87dcaa4 (MD5)
Approved for entry into archive by Vera Lúcia Mourão (vera.mourao@fgv.br) on 2014-01-14T12:11:05Z (GMT) No. of bitstreams: 1 finanças-paulo-pereira v9 protocolada.pdf: 1427082 bytes, checksum: 9477e58b7717a06f15189fa3d87dcaa4 (MD5)
Made available in DSpace on 2014-01-14T12:13:20Z (GMT). No. of bitstreams: 1 finanças-paulo-pereira v9 protocolada.pdf: 1427082 bytes, checksum: 9477e58b7717a06f15189fa3d87dcaa4 (MD5) Previous issue date: 12-12-13
Considerando que a indústria de Private Equity (PE) nasceu no início do século passado nos EUA, foi apenas há algumas décadas que este segmento da indústria financeira tomou proporções gigantescas no mundo e voltou seus olhos para o Brasil, onde vem crescendo substancialmente nos últimos anos. É neste contexto de expressividade e de oportunidade de ganhos anormais, além de sua relevância para a economia dos países em que está presente, que este estudo buscou analisar as perspectivas e desafios desta indústria levando em conta a nova lei antitruste no Brasil. O controle concorrencial dos atos dos fundos de investimento impõe uma série de desafios às autoridades de defesa da concorrência brasileiras e estrangeiras porque as operações desses fundos podem, potencialmente, ser equiparadas a atos de concentração. Dessa forma, o objetivo deste estudo é entender a visão do CADE com relação à aquisição de participações minoritárias pelos fundos de PE e como os gestores destes fundos percebem a nova regulamentação antitruste. Para tal, realizaremos uma pesquisa buscando o histórico das decisões do CADE no que tange os atos de concentração dos anos (2011 / 2012 / 2013) para compreendermos se existe alteração de interpretação por parte dos conselheiros no momento anterior e posterior a nova lei 12.529. Com relação à percepção dos fundos da nova lei, será conduzido um estudo com indivíduos ativos na indústria Private Equity do país, na qual a coleta de dados será realizada por meio de entrevistas com questionários abertos no período de março de 2013 a julho de 2013. Espera-se dessa forma, descobrir como os fundos encaram a nova legislação antitruste e as perspectivas e desafios para esta indústria neste novo cenário do mercado brasileiro.
APA, Harvard, Vancouver, ISO, and other styles
50

Abdallah, Farid. "The legality and extent of self-defence by states in response to attacks by foreign private actors : with specific reference to the July 2006 war between Israel and Lebanon." Thesis, University of Newcastle upon Tyne, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.548014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography