![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 6 of 6 matches in All Departments
How do policy makers and managers square the circle of increasing demand and expectations for the delivery and quality of services against a backdrop of reduced public funding from government and philanthropists? Leaders, executives and managers are increasingly focusing on service operations improvement. In terms of research, public services are immature within the discipline of operations management, and existing knowledge is limited to government departments and large bureaucratic institutions. Drawing on a range of theory and frameworks, this book develops the research agenda, and knowledge and understanding in public service operations management, addressing the most pressing dilemmas faced by leaders, executives and operations managers in the public services environment. It offers a new empirical analysis of the impact of contextual factors, including the migration of planning systems founded on MRP/ERP and the adoption of industrial based improvement practices such as TQM, lean thinking and Six Sigma. This will be of interest to researchers, educators and advanced students in public management, service operations management, health service management and public policy studies.
Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that ultimately protects an organization from attacks. Peter Trim and David Upton believe that the speed and complexity of cyber-attacks demand a different approach to security management, including scenario-based planning and training, to supplement security policies and technical protection systems. The authors provide in-depth understanding of how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines. They provide information to help managers form policy to prevent cyber intrusions, to put robust security systems and procedures in place and to arrange appropriate training interventions such as table top exercises. Guidance embracing current and future threats and addressing issues such as social engineering is included. Although the work is embedded in a theoretical framework, non-technical staff will find the book of practical use because it renders highly technical subjects accessible and links firmly with areas beyond ICT, such as human resource management - in relation to bridging the education/training divide and allowing organizational learning to be embraced. This book will interest Government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science.
Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that ultimately protects an organization from attacks. Peter Trim and David Upton believe that the speed and complexity of cyber-attacks demand a different approach to security management, including scenario-based planning and training, to supplement security policies and technical protection systems. The authors provide in-depth understanding of how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines. They provide information to help managers form policy to prevent cyber intrusions, to put robust security systems and procedures in place and to arrange appropriate training interventions such as table top exercises. Guidance embracing current and future threats and addressing issues such as social engineering is included. Although the work is embedded in a theoretical framework, non-technical staff will find the book of practical use because it renders highly technical subjects accessible and links firmly with areas beyond ICT, such as human resource management - in relation to bridging the education/training divide and allowing organizational learning to be embraced. This book will interest Government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science.
The burial societies of the Romans were, essentially, private group insurance programs. So were the protection funds of medieval guilds. Largely through the efforts of labor unions, by 1968 more than two-thirds of the labor force in U.S. industry was covered by group life and health insurance plans mostly provided (as fringe benefits) by employers. Today the proportion is even higher, and the establishment of national health insurance, to be sponsored by government, is being debated in the halls of Congress. Complete medical care for the citizenry, with health professionals partly or wholly salaried by a government agency, is now standard in many coun tries, including those of eastern Europe, most of the British commonwealth (including Australia, Canada, and New Zealand), several Latin American countries, Greece, Turkey, Sweden, and of course China, the USSR, and eastern Europe. The major alternative scheme, in which the government provides reimbursement for private care, is employed by several other West ern nations, including Norway, Denmark, Austria, West Germany, and Spain. Both of these methods of government coverage exist for certain groups in the United States: the former for military personnel, service-connected or impecunious veterans, and the indigent mentally ill; the latter for those cov ered under the 1965 amendment to the Social Security Act. However, most health insurance in the United States is private, much of it operating on a group basis."
How do policy makers and managers square the circle of increasing demand and expectations for the delivery and quality of services against a backdrop of reduced public funding from government and philanthropists? Leaders, executives and managers are increasingly focusing on service operations improvement. In terms of research, public services are immature within the discipline of operations management, and existing knowledge is limited to government departments and large bureaucratic institutions. Drawing on a range of theory and frameworks, this book develops the research agenda, and knowledge and understanding in public service operations management, addressing the most pressing dilemmas faced by leaders, executives and operations managers in the public services environment. It offers a new empirical analysis of the impact of contextual factors, including the migration of planning systems founded on MRP/ERP and the adoption of industrial based improvement practices such as TQM, lean thinking and Six Sigma. This will be of interest to researchers, educators and advanced students in public management, service operations management, health service management and public policy studies.
|
You may like...
Rethinking American Grand Strategy
Elizabeth Borgwardt, Christopher McKnight Nichols, …
Hardcover
R2,460
Discovery Miles 24 600
PUNK! Las Americas Edition
Olga Rodriguez-Ulloa, Rodrigo Quijano, …
Paperback
R927
Discovery Miles 9 270
Teaching Shakespeare and Early Modern…
A. Hiscock, L. Hopkins
Hardcover
R2,658
Discovery Miles 26 580
Outside In - The Transnational Circuitry…
Andrew Preston, Doug Rossinow
Hardcover
R3,755
Discovery Miles 37 550
Shakespeare and Philosophy - Lust, Love…
Raymond Angelo Belliotti
Paperback
R1,177
Discovery Miles 11 770
|