Academic literature on the topic 'Policy management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Policy management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Policy management"

1

Stangl J, Mandl. "Contemporary Health Policy and Management: Challenges Remaining." Journal of Quality in Health Care & Economics 5, S1 (2022): 1–6. http://dx.doi.org/10.23880/jqhe-16000s1-004.

Full text
Abstract:
The essay explores the broad outlines of the main barriers/enablers to health policy and management in the prevailing biomedical model from the late 19th century to the present. Based on this analysis, it proposes the modernisation of political leadership and multisectoral integration as key determinants of a resilient, holistic and equitable health system for the 21st century. The methodological process was based on the review and critical analysis of the relevant literature on the topic and the author's experience. We conclude with a call for reflection on the need for a clear understanding of these elements for a new vision of health policy and management.
APA, Harvard, Vancouver, ISO, and other styles
2

Naga, Bilal S. H. Badr, and Majd T. Mrayyan. "Chemotherapy Spill Management Policy : Policy Analysis." Middle East Journal of Nursing 7, no. 2 (April 2012): 9–21. http://dx.doi.org/10.5742/mejn.2013.72224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pedersen, Anne B. "SCIENCE POLICY MANAGEMENT." Prometheus 6, no. 1 (June 1988): 134–41. http://dx.doi.org/10.1080/08109028808631844.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nicholson, R. "Tree management policy." Arboricultural Journal 34, no. 1 (March 2012): 17–28. http://dx.doi.org/10.1080/03071375.2012.691668.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xia, Yuanyuan, Dongxu Qu, Nataliya Stoyanets, and Hejun Zhao. "Policy evolution of personnel management in Chinese educational institutions: A comprehensive policy circle analysis." Problems and Perspectives in Management 20, no. 4 (December 23, 2022): 544–59. http://dx.doi.org/10.21511/ppm.20(4).2022.41.

Full text
Abstract:
The reform of education personnel management policies has been carried out progressively to ensure the achievement of educational goals. A systematic analysis of the personnel management policy circle, including policy design, content, and implementation, is crucial to improving the accuracy and effectiveness of such policies. Through a comprehensive review of policy evolution, this study aims to systematize the design and content of policies on personnel management in educational institutions in China. It was determined that personnel management is increasingly concerned with the efficiency and effectiveness of goal achievement, policy design, system reform, and mixed-used management methods. A questionnaire survey was conducted among 420 respondents in 25 preschool institutions in five cities of Henan province in China. A total of 362 questionnaires were deemed valid out of 397 retrieved, including 24 from principals and 338 from teachers. The statistical analysis results identified the problems in policy implementation, including the laxly enforced teacher qualification system, inadequate teacher professional development, poorly implemented training policies, unattractive salaries and benefits, and the undesirable assessment system. For example, 5.89% of the respondents still need teaching qualification certificates. Only 1.1% of the respondents had senior titles. 2.76% of the respondents are still paid less than the minimum standard. In response to the situation, this study suggests effective countermeasures for educational administrative authorities and institutions. The findings could provide a reference for further optimization and development of personnel management policies. AcknowledgmentsThis study is supported by Sumy National Agrarian University in Ukraine and the Talent Special Support Program for Doctoral Studies of Henan Institute of Science and Technology in China.
APA, Harvard, Vancouver, ISO, and other styles
6

Ben Zaied, Younes, Nidhaleddine Ben Cheikh, Pascal Nguyen, and Mohamed Badrane Mahjoub. "Waste management policy and employment: the case of France." Environmental Economics 9, no. 1 (April 13, 2018): 38–46. http://dx.doi.org/10.21511/ee.09(1).2018.03.

Full text
Abstract:
This paper examines whether a causal relationship exists between waste tonnage and employment when the waste collection is entrusted to a private operator in France (i.e. waste management policy by delegation of service). The empirical investigation is based on weekly data for four waste streams for the period from January 2015 to June 2017. Using nonstationary time series techniques including cointegration, VECM (Vector Error Correction Model) and long-run causality test of Toda and Yamamoto (1995) within a bivariate framework, the results demonstrate potential causal negative relationship between waste tonnage and employment. For three waste streams (i.e. household waste, outdoor garbage waste and miscellaneous waste), the results suggest that waste management practices that aim at entrusting the collection and treatment to a private operator (i.e. waste management by delegation of service) are not economically beneficial to society, because this policy does not favor environmental jobs creation. The paper calls for the adoption of other waste management practices to preserve employment in the waste collection sector.
APA, Harvard, Vancouver, ISO, and other styles
7

Walls, Matthew, and W. Keith Moser. "Management and Policy Implications." Journal of Forestry 110, no. 6 (September 1, 2012): 297. http://dx.doi.org/10.5849/jof.12-915.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Alomi, Yousef Ahmed, Amal Hassan Al-Najjar, Maha Hussein Almadany, and Abeer Hussin Almasoudi. "Research Quality Management Policy." International Journal of Pharmacology and Clinical Sciences 11, no. 2 (June 12, 2022): 56–60. http://dx.doi.org/10.5530/ijpcs.2022.11.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jakupova, Dinara. "YOUTH POLICY PROGRAM MANAGEMENT." Public Administration and Civil Service, no. 1-76 (March 31, 2021): 19–31. http://dx.doi.org/10.52123/1994-2370-2021-76-1-58.

Full text
Abstract:
The article presents a brief overview of management effectiveness assessments by foreign and Russian researchers; the methodology of SIA (Social Impact Assessment) – assessment of social consequences in the implementation of development, methods of evaluating projects and programs (Global Youth Development Index and Global Youth Welfare Index). The experience of Kazakhstan (YDI and YWI indicators) is described; the experience of foreign countries and the EAEU countries is analyzed. It is proved that the existing problem in the field of public administration of youth policy programs is the lack of certain criteria and performance indicators that are not properly regulated and not fixed at the legislative level in Kazakhstan and other CIS/EAEU countries. In this regard, it is recommended to identify specific indicators for the effectiveness of the implementation of the state youth policy in the Republic of Kazakhstan; to test them based on the results of the activities of a particular region of the Republic of Kazakhstan to develop recommendations for improving the manageability of youth programs.
APA, Harvard, Vancouver, ISO, and other styles
10

Piasecki, Ryszard, and Erico Wulf Betancourt. "Chile Fiscal Policy Management." Comparative Economic Research. Central and Eastern Europe 16, no. 2 (August 17, 2013): 45–62. http://dx.doi.org/10.2478/cer-2013-0011.

Full text
Abstract:
A budget surplus arises in a country when the total revenue earnings surpass expenditures in a particular financial year. Having a budget surplus is very important in the sense that it brings about a decrease in the net public debt, while the public debt is increased in the event of a budget deficit. Both budget deficits and budget surpluses also exert indirect influences on taxpayers. Normally, it is not essential on the part of the government to maintain a budget surplus, though it needs to be very careful when running a budget deficit to have the proper buffer.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Policy management"

1

Wetzel, Paul A. "Network policy management." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA376856.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, September 1999.
"September 1999". Thesis advisor(s): Geoffrey Xie, Gilbert Lundy. Includes bibliographical references (p. 215-224). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
2

Leach, Barbara Clare. "From policy process to policy impact : policy instruments for sustainable waste management." Thesis, University of Birmingham, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.368993.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Brennan, Mark Emmanuel. "Social policy and operations management." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/129047.

Full text
Abstract:
Thesis: Ph. D. in Policy, Operations, and Management, Massachusetts Institute of Technology, Department of Urban Studies and Planning, September, 2020
Cataloged from student-submitted PDF of thesis.
Includes bibliographical references.
This dissertation strengthens planning and policy analysis by using concepts from operations management to examine production and distribution of goods and services for disadvantaged groups. Building on the introduction, chapter two tells a cautionary tale, investigating how scholars and decision makers used operations management methods to consider operations in planning and policy analysis in the 1970s in ways that further marginalized already vulnerable residents. The tools and concepts of operations management, however, if sufficiently framed by concerns about equity and advocacy, are powerful instruments in solving production and distribution problems with social consequences. Chapter three explores how these concepts can be used to descriptively identify disparities in access to goods and services by socio-economic status, examining the distribution of irrigation equipment in Senegal. The core question is about the allocation of risk and inventory across levels of a supply chain that extends far into Senegal's farming regions. Chapter four identifies how these concepts can be used to causally explain disparities, tracing policies and plans that aggregative or ameliorate them. It focuses on the main program that subsidizes affordable housing construction in the United States, a durable necessity that is unevenly available and exposed to environment risks across space. The core question is about patterns over space and time in building affordable housing stocks, relative to where and when disasters occur. Chapter five shows how these concepts can be used to prescriptively remedy disparities. It investigates quality risks in the US international food assistance supply chain in Eastern Africa. The core question is about what levers can be pulled in supply chain design to improve food aid quality. Chapter six concludes.
by Mark Emmanuel Brennan.
Ph. D. in Policy, Operations, and Management
Ph.D.inPolicy,Operations,andManagement Massachusetts Institute of Technology, Department of Urban Studies and Planning
APA, Harvard, Vancouver, ISO, and other styles
4

Tapdiya, Ashish. "Firewall policy optimization and management." Winston-Salem, NC : Wake Forest University, 2008. http://dspace.zsr.wfu.edu/jspui/handle/10339/37458.

Full text
Abstract:
Thesis (M.S.)--Wake Forest University. Dept. of Computer Science, 2008.
Title from electronic thesis title page. Thesis advisor: Errin W. Fulp. Vita. Includes bibliographical references (p. 53-54).
APA, Harvard, Vancouver, ISO, and other styles
5

Oscroft, Natalie. "Policy networks and management in the implementation of regeneration policy." Thesis, University of York, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.516642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bhatia, Nupur. "Policy Management in Context-Aware Networks." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92015.

Full text
Abstract:
The Ambient Network (AN) Project is part of the European Commission’s 6th Framework Programme and aims to enable cooperation between heterogeneous networks, using current and future wireless technologies, minimising the effort of mobile users to gain access to the services that they are interested in - irrespective of their location or the network they are currently using. Because of the highly mobile nature of users and a demand for instant and dynamic access to services, these networks have to be composed ‘on the fly’ without any pre-configurations. The use of context information in AN can remove the need for pre-configuration of networks, hence making them autonomic. However, a concern exists that the free and uncontrolled dissemination of context information could breech the privacy of the participants. It is extremely important to address these privacy issues in order to control who has access to what context information. This control can be achieved through the use of well defined policies. This creates a requirement for a framework in the ContextWare architecture for protecting context information. This masters thesis project is part of an effort to create a policy based infrastructure for authorisation of access to network context information within the AN. The thesis investigates, models, and designs an architecture for a policy management system based on OASIS XACML, that creates an extension to the architecture for management of context information in the AN. In addition to a policy management architecture within an AN, a policy management architecture for composing ANs is also created. To facilitate the transfer of requests and policies, the thesis creates a Policy Management Protocol. The designed architecture was then implemented to create a proof of concept. The designed architecture and protocol were evaluated by running tests on the prototype. The measurements from the tests are analysed and presented in this thesis. The analysis of the experimental data indicates that a policy management system is both feasible and practical. The results show that the delay overhead caused by introducing policy management in a distributed context provisioning system, ranges from 1.7% in a system without load to 6% in a worst case scenario. The throughput of the policy management system is 15 requests per second under load.
Ambient Network är ett EU-finansierat project inom det 6:e ramprogrammet.Projektets mål är att möjliggöra samarbete mellan heterogena nätverk, som använderbåde dagens men även framtidens trådlösa teknologier, för att minimeraslutanvändarens insats för att nå den tjänst de är intresserade av – oberoende av platseller vilket nätverk de använder. På grund av den stora delen av mobila användaresom kräver omedelbar och dynamisk tillgång till tjänster måste dessa nätverk gåsamman ’on the fly’ utan tidigare konfigurering.Användningen av context information i Ambient Networks kan elmininera behovet avförkonfigurering av nätverk, följaktligen blir de då autonoma. Dock, ett problem somuppkommer med detta är att den fria och okontrollerade spridningen av contextinformation bryter integriteten för deltagarna. Det är väldigt viktigt att ta itu med dettaproblem för att kunna kontrollera vilka som har tillgång till vilken contextinformation. Den här kontrollen kan uppnås genom väldefinierade policies. Dettaskapar ett behov av ett ramverk inom ContextWare arkitekturen för att skydda dentillgängliga context informationen. Den här uppsatsen är en del i ansträngningen att skapa en policy baserad infrastrukturför attestering av tillgång till context information inom Ambient Networks. Uppsatsenundersöker och designar en arkitektur för ett policy handhavande system som ärbaserat på OASIS XACML, den bygger vidare på arkitekturen för handhavande avcontext information i Ambient Networks. Utöver policy hantering inom ett ambientnetwork skapas också policy hantering mellan ambient networks när de förenas. Denframtagna arkitekturen är därefter implementerad för att visa på konceptets hållbarhet. En sammanslagning av två policy handhavande system när två nätverk slås ihop ärbehandlat endast i teorin, det är inte implementerat. Designen utvärderas genom att köra test på den implementerade versionen ochdärefter analysera och visa resultaten i rapporten. Dessa test innehåller mätningar avfördröjningen av en enda begäran samt flera, responstiden i ett system med policyhanteringjämfört med utan samt prestandan i ett policy-hanteringssystem med en litenmängd policies jämfört med en större mängd policies.
APA, Harvard, Vancouver, ISO, and other styles
7

Dini, Manuela-Ionelia. "Temporal-oriented policy-driven network management." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33392.

Full text
Abstract:
Systems management represents the set of activities necessary to ensure that information systems function according to user requirements and objectives. Chapter 1 summarizes the management challenges in today's networks and distributed systems. Policy-driven network management is the new management paradigm. Its implementation needs a new information and decision model, appropriate protocols and new hosting and access mechanisms. IETF policy framework and architecture create the support for the deployment of this new paradigm.
Consideration of temporal aspects to allow run-time policy conflict detection and error-handling has not yet been developed. After assessing the existing policy-oriented achievements in terms of tools and IETF drafts, and after presenting existing temporal mechanisms, we concluded that only policy definition temporal issues are partially referred to. We considered complementary temporal issues focusing on "policy execution" and coping with the notions of time zones, policy dependency across multiple time zones and actions translation among many time zones. Finally, we showed how our input can be used for extending the current IETF Policy CIM proposal.
We intend to have an IETF draft on these issues. Specifically, our proposal can be added as a new building block to any existing policy-enabled management tool. We identified important directions in handling policy conflicts at run-time.
APA, Harvard, Vancouver, ISO, and other styles
8

Godinho, de Matos Miguel. "Essays in Telecommunications Policy and Management." Research Showcase @ CMU, 2013. http://repository.cmu.edu/dissertations/276.

Full text
Abstract:
This work comprises three independent essays in Telecommunications Policyand Management. In the first study we focus on the deployment of green field next generationaccess network infrastructures when the national regulatory authority has thepower to define geographical markets at sub-national level for which it can applydifferentiated regulatory remedies - Geographically Segmented Regulation(GSR). Using a game theory model that we developed, we confirm the asymmetricbusiness case for the geographic development of these new infrastructures:highly populated areas are likely to develop into competitive telecommunicationmarkets while regions with low household density will only see limited investmentand little or no competition. We show that supply side interdependenciesamong markets make the implementation of GSR non-trivial, namely, we showthat changes in the wholesale access price in one market can have undesirableconsequences in the competitive conditions of interrelated regions wherewholesale prices are unchanged. In the second study we focus on how individual purchase decisions are influenced by the behavior of others in their social circle. We study the case ofthe diffusion of the iPhone 3G across a number of communities sampled froma dataset provided by a major mobile carrier in one country. We find thatthe propensity of adoption increases with the proportion of each indivudal'sadopter friends. We estimate that 14% of iPhone 3G adoptions in this carrierwere due to peer influence. We provide results from several policy experimentsthat show that with this level of effect from peer influence the carrier wouldhardly be able to significantly increase sales by selectively targeting consumersto benefit from viral marketing. Finally, in the third study, we perform a randomized field experiment todetermine the role that likes play on the sales of movies in Video-on-Demand(VoD). We use the VoD system of a large telecommunications provider duringhalf a year in 2012. The system suggests movies to consumers ordered by thenumber of consumer likes they obtained in previous weeks. We manipulatedsuch natural order by randomly swapping likes across movies. We found thatmovies promoted (demoted) increased (decreased) sales, but the amount of informationpublicly available about movies affected the result. Better knownmovies were less sensitive to manipulations. Finally a movie promoted (demoted)to a fake slot sold 15.9% less (27.7% more) than a true movie placed atthat slot, on average across all manipulations. A movie promoted (demoted)to a fake slot received 33.1% fewer (30.1% more) likes than a true movie atthat slot. Hence manipulated movies tended to move back to their true slotsover time. This means that self-fulfilling prophecies widely discussed in theliterature on the effect of ratings on sales are hard to sustain in markets withcostly goods that are sufficiently well-known.
APA, Harvard, Vancouver, ISO, and other styles
9

Marin, Luis Franco. "SELinux policy management framework for HIS." Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/26358/1/Luis_Franco_Thesis.pdf.

Full text
Abstract:
Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of healthcare services by making healthcare information available at the point of care (Goldstein, Groen, Ponkshe, and Wine, 2007). The increasing availability of healthcare data presents security and privacy issues which have not yet been fully addressed (Liu, Caelli, May, and Croll, 2008a). Healthcare organisations have to comply with the security and privacy requirements stated in laws, regulations and ethical standards, while managing healthcare information. Protecting the security and privacy of healthcare information is a very complex task (Liu, May, Caelli and Croll, 2008b). In order to simplify the complexity of providing security and privacy in HIS, appropriate information security services and mechanisms have to be implemented. Solutions at the application layer have already been implemented in HIS such as those existing in healthcare web services (Weaver et al., 2003). In addition, Discretionary Access Control (DAC) is the most commonly implemented access control model to restrict access to resources at the OS layer (Liu, Caelli, May, Croll and Henricksen, 2007a). Nevertheless, the combination of application security mechanisms and DAC at the OS layer has been stated to be insufficient in satisfying security requirements in computer systems (Loscocco et al., 1998). This thesis investigates the feasibility of implementing Security Enhanced Linux (SELinux) to enforce a Role-Based Access Control (RBAC) policy to help protect resources at the Operating System (OS) layer. SELinux provides Mandatory Access Control (MAC) mechanisms at the OS layer. These mechanisms can contain the damage from compromised applications and restrict access to resources according to the security policy implemented. The main contribution of this research is to provide a modern framework to implement and manage SELinux in HIS. The proposed framework introduces SELinux Profiles to restrict access permissions over the system resources to authorised users. The feasibility of using SELinux profiles in HIS was demonstrated through the creation of a prototype, which was submitted to various attack scenarios. The prototype was also subjected to testing during emergency scenarios, where changes to the security policies had to be made on the spot. Attack scenarios were based on vulnerabilities common at the application layer. SELinux demonstrated that it could effectively contain attacks at the application layer and provide adequate flexibility during emergency situations. However, even with the use of current tools, the development of SELinux policies can be very complex. Further research has to be made in order to simplify the management of SELinux policies and access permissions. In addition, SELinux related technologies, such as the Policy Management Server by Tresys Technologies, need to be researched in order to provide solutions at different layers of protection.
APA, Harvard, Vancouver, ISO, and other styles
10

Marin, Luis Franco. "SELinux policy management framework for HIS." Queensland University of Technology, 2008. http://eprints.qut.edu.au/26358/.

Full text
Abstract:
Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of healthcare services by making healthcare information available at the point of care (Goldstein, Groen, Ponkshe, and Wine, 2007). The increasing availability of healthcare data presents security and privacy issues which have not yet been fully addressed (Liu, Caelli, May, and Croll, 2008a). Healthcare organisations have to comply with the security and privacy requirements stated in laws, regulations and ethical standards, while managing healthcare information. Protecting the security and privacy of healthcare information is a very complex task (Liu, May, Caelli and Croll, 2008b). In order to simplify the complexity of providing security and privacy in HIS, appropriate information security services and mechanisms have to be implemented. Solutions at the application layer have already been implemented in HIS such as those existing in healthcare web services (Weaver et al., 2003). In addition, Discretionary Access Control (DAC) is the most commonly implemented access control model to restrict access to resources at the OS layer (Liu, Caelli, May, Croll and Henricksen, 2007a). Nevertheless, the combination of application security mechanisms and DAC at the OS layer has been stated to be insufficient in satisfying security requirements in computer systems (Loscocco et al., 1998). This thesis investigates the feasibility of implementing Security Enhanced Linux (SELinux) to enforce a Role-Based Access Control (RBAC) policy to help protect resources at the Operating System (OS) layer. SELinux provides Mandatory Access Control (MAC) mechanisms at the OS layer. These mechanisms can contain the damage from compromised applications and restrict access to resources according to the security policy implemented. The main contribution of this research is to provide a modern framework to implement and manage SELinux in HIS. The proposed framework introduces SELinux Profiles to restrict access permissions over the system resources to authorised users. The feasibility of using SELinux profiles in HIS was demonstrated through the creation of a prototype, which was submitted to various attack scenarios. The prototype was also subjected to testing during emergency scenarios, where changes to the security policies had to be made on the spot. Attack scenarios were based on vulnerabilities common at the application layer. SELinux demonstrated that it could effectively contain attacks at the application layer and provide adequate flexibility during emergency situations. However, even with the use of current tools, the development of SELinux policies can be very complex. Further research has to be made in order to simplify the management of SELinux policies and access permissions. In addition, SELinux related technologies, such as the Policy Management Server by Tresys Technologies, need to be researched in order to provide solutions at different layers of protection.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Policy management"

1

Leeds Library and Information Services. Stock management policy. Leeds: Leeds Library and Information Services, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Council, Kampala (Uganda) City. Land management policy. [Kampala]: The Council, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Namibia. Research management policy. Windhoek, Republic of Namibia: Directorate: Policy, Planning, and HRD, Division: Planning, Subdivision: Management Information and Research, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United States. Bureau of Land Management. Wyoming State Office. Access management policy. [Cheyenne, Wyo.]: The Office, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wetzel, Paul A. Network policy management. Monterey, Calif: Naval Postgraduate School, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Office, United States Bureau of Land Management Wyoming State. Access management policy. [Cheyenne, Wyo.]: The Office, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zambia. National disaster management policy. Lusaka: Disaster Management and Mitigation Unit, Office of the Vice President, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Horne, James C. Van. Financial Management and Policy. 9th ed. Scarborough, Ont: Prentice-Hall, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Canada, Canada Environment. Toxic substances management policy. [Ottawa]: Environment Canada, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zambia. National disaster management policy. Lusaka: Disaster Management and Mitigation Unit, Office of the Vice President, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Policy management"

1

Blount, Sumner. "Policy Management." In Under Control, 25–34. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-1593-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kieras, Tim, Junaid Farooq, and Quanyan Zhu. "Policy Management." In IoT Supply Chain Security Risk Analysis and Mitigation, 57–106. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08480-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bertagnolli, Frank. "Policy Deployment." In Lean Management, 319–26. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-36087-0_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hoye, Russell, Katie Misener, Michael L. Naraine, and Catherine Ordway. "Sport policy." In Sport Management, 14–39. 6th ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003217947-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pettinger, Richard. "Strategy, policy and direction." In Management, 199–217. London: Macmillan Education UK, 2012. http://dx.doi.org/10.1007/978-1-137-03028-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jain, P. K., Shveta Singh, and Surendra Singh Yadav. "Dividend Policy." In Financial Management Practices, 159–75. India: Springer India, 2013. http://dx.doi.org/10.1007/978-81-322-0990-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Malaval, Philippe, Christophe Bénaroya, and Jonathan Aflalo. "Communication Policy." In Management for Professionals, 363–86. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-01354-1_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Malaval, Philippe, Christophe Bénaroya, and Jonathan Aflalo. "Pricing Policy." In Management for Professionals, 275–307. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-01354-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Malaval, Philippe, and Christophe Bénaroya. "Communication Policy." In Aerospace Marketing Management, 327–45. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1065-9_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Malaval, Philippe, and Christophe Bénaroya. "Pricing Policy." In Aerospace Marketing Management, 245–76. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1065-9_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Policy management"

1

Vanchukhina, Lyubov, Tatyana Leybert, Yulia Rudneva, Nelli Galeeva, Anastasia Rogacheva, Elvira Khalikova, and Giedrius Ciras. "INTEGRATED ASSESSMENT OF THE CREDIT POLICY EFFICIENCY." In Business and Management 2018. VGTU Technika, 2018. http://dx.doi.org/10.3846/bm.2018.50.

Full text
Abstract:
The credit policy is a basis of receivables management. The competent combination of its parameters allows to increase a greater effect of commercial crediting applying by the company. The purpose of this study is to develop a methodology for assessing the effectiveness of various credit policy types: conservative, moderate and aggressive. The comparative analysis of three methods of assessment of the credit policy efficiency is carried out in the article: The NPV analysis, the valuation model based on the average daily margin and the model for assessing the impact of changes in the company’s credit policy. As a result, the technique of the full and quick estimate methods of the credit policy ef-ficiency, including calculation of individual, intermediate and integrated indicators are offered. The method is based on three groups of the indicators, reflecting the company credit policy efficiency in the following directions: quality receivables management, receivables costs maintenance and influ-ence on a company financial condition. The influence of each of the indicator and indicators groups when using different credit policy’s types were proved in the article and that allowed to transform them to a general integrated indicator. This technique allows to estimate in a complex and objectively efficiency of the credit policy operating in the company.
APA, Harvard, Vancouver, ISO, and other styles
2

Beigi, M. S., S. Calo, and D. Verma. "Policy transformation techniques in policy-based systems management." In Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004. IEEE, 2004. http://dx.doi.org/10.1109/policy.2004.1309146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Beznosov, Konstantin. "Session details: Policy management." In CCS '10: 17th ACM Conference on Computer and Communications Security 2010. New York, NY, USA: ACM, 2010. http://dx.doi.org/10.1145/3252066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Volkmar, S. "Session details: Policy management." In SACMAT07: 12th ACM Symposium on Access Control Models and Technologies. New York, NY, USA: ACM, 2007. http://dx.doi.org/10.1145/3259019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chadha, Ritu, and Cho-Yu Jason Chiang. "DRAMA: Distributed Policy Management for MANETs." In 2008 IEEE Workshop on Policies for Distributed Systems and Networks - POLICY. IEEE, 2008. http://dx.doi.org/10.1109/policy.2008.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Feeney, K. C., D. Lewis, and V. P. Wade. "Policy based management for Internet communities." In Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004. IEEE, 2004. http://dx.doi.org/10.1109/policy.2004.1309147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mansor, Abdehamid Abdelhadi, Wan Mohd Nasir Wan Kadir, and Ahmed Mohammed Elsawi. "Policy Overlap Analysis to Avoid Policy Conflict in Policy-Based Management Systems." In Third International Conference on Advanced Information Technologies & Applications. Academy & Industry Research Collaboration Center (AIRCC), 2014. http://dx.doi.org/10.5121/csit.2014.41124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lohmuller, Simon, Andreas Eisenblatter, Christoph Frenzel, Dario Gotz, Soren Hahn, Thomas Kurner, Remco Litjens, et al. "Policy-Based SON Management Demonstrator." In 2015 IEEE 81st Vehicular Technology Conference (VTC Spring). IEEE, 2015. http://dx.doi.org/10.1109/vtcspring.2015.7146020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"SESSION ONE - Policy-Based Management." In 2004 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2004. http://dx.doi.org/10.1109/noms.2004.1317635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bahati, Raphael M., and Michael A. Bauer. "Towards adaptive policy-based management." In 2010 IEEE Network Operations and Management Symposium - NOMS 2010. IEEE, 2010. http://dx.doi.org/10.1109/noms.2010.5488472.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Policy management"

1

Waldbusser, S., J. Saperia, and T. Hongal. Policy Based Management MIB. RFC Editor, March 2005. http://dx.doi.org/10.17487/rfc4011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Westerinen, A., J. Schnizlein, J. Strassner, M. Scherling, B. Quinn, S. Herzog, A. Huynh, M. Carlson, J. Perry, and S. Waldbusser. Terminology for Policy-Based Management. RFC Editor, November 2001. http://dx.doi.org/10.17487/rfc3198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fittipaldi, John J., and John W. Wuichet. Army Ecosystem Management Policy Study. Fort Belvoir, VA: Defense Technical Information Center, March 1997. http://dx.doi.org/10.21236/ada596817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stewart, William Charles. Policy, Strategy on Management of DSRS. Office of Scientific and Technical Information (OSTI), December 2017. http://dx.doi.org/10.2172/1412922.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bianchi, Javier, and Saki Bigio. Banks, Liquidity Management and Monetary Policy. Cambridge, MA: National Bureau of Economic Research, September 2014. http://dx.doi.org/10.3386/w20490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barnes, R., M. Thomson, J. Winterbottom, and H. Tschofenig. Location Configuration Extensions for Policy Management. RFC Editor, April 2014. http://dx.doi.org/10.17487/rfc7199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fittipaldi, John, and John Wuichet. Department of Defense Ecosystem Management Policy Evaluation. Fort Belvoir, VA: Defense Technical Information Center, August 2002. http://dx.doi.org/10.21236/ada597063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, W., C. Xie, J. Strassner, G. Karagiannis, M. Klyus, J. Bi, Y. Cheng, and D. Zhang. Policy-Based Management Framework for the Simplified Use of Policy Abstractions (SUPA). RFC Editor, March 2018. http://dx.doi.org/10.17487/rfc8328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Van Eeckhout, E., D. Roberts, R. Oakes, A. Shieh, W. Hardie, and P. Pope. Environmental management policy analysis using complex system simulation. Office of Scientific and Technical Information (OSTI), April 1999. http://dx.doi.org/10.2172/334233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lusk, Steve, David Lawrence, and Prakash Suvana. Cyber-intrusion Auto-response and Policy Management System (CAPMS). Office of Scientific and Technical Information (OSTI), November 2015. http://dx.doi.org/10.2172/1329008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography