The issues on control objects identification in different economic systems has been researched. The objects of internal business, national governmental and undemational control have been determined. ; Досліджено питання ідентифікації об'єктів контролю в різних господарських системах. Визначено об'єкти внутрішньогосподарського, національного державного та наднаціонального контролю.
The article is about the features of the socio-economic control as a form of social control. The author reveals specific methods of socio-economic control, which applicable to different control objects. Particular attention is paid to methods of solving problems arising in the implementation of socio-economic control.
In: Aktualʹni pytannja suspilʹnych nauk ta istorii͏̈ medycyny: spilʹnyj ukrai͏̈nsʹko-rumunsʹkyj naukovyj žurnal = Current issues of social studies and history of medicine : joint Ukrainian-Romanian scientific journal = Aktualʹnye voprosy obščestvennych nauk i istorii mediciny = Enjeux actuels de sciences sociales et de l'histoire de la medecine, Band 0, Heft 1, S. 57-61
Environmental problems aggravation on a background of intensifying production processes requires a review of approaches to manage processes in waste production and consumption. The purpose of this article is to review the classification of waste and identify its using in the enterprises waste management and to improve the monitoring system at a waste treatment operations. The waste classification and it's species have been theoretically grounded and identified. The classification using have been determined for identification waste facilities in accounting and control. Conclusions determined that the proposed waste classification allows the government policy implementation and economical founding of the local level waste management actions (separate collection, recycling), as well analyzing overtime losses due to waste, for determine the types of waste, whose using or disposing requires additional costs and potentially brings economic benefits to the enterprise. ; Загострення екологічних проблем на фоні інтенсифікації виробничих процесів вимагає перегляду підходів для управління процесами у сфері поводження з відходами виробництва та споживання. Метою даної статті є огляд класифікації відходів та визначення напрямів її використання для управління сферою поводження з відходами діяльності підприємств, а також для вдосконалення системи облікового відображення на підприємстві щодо операцій поводження з відходами. Теоретично обґрунтовано ознаки класифікації відходів та виділено їх види. Визначено використання класифікації для ідентифікації відходів як об'єктів бухгалтерського обліку та контролю. У висновках визначено, що запропонована класифікація відходів дозволяє реалізовувати державну політику та економічно обґрунтовувати заходи у сфері поводження з відходами на рівні підприємства (роздільне збирання, повторне використання), а також аналізувати рівень втрат через понаднормові відходи, визначати види відходів, використання або утилізація яких потребує додаткових витрат та потенційно несе економічні вигоди підприємству.
Abstract. This article provides an overview of the three main approaches to raising‐to‐object sentences likeCindy believes Marcia to be a genius. The article describes the strengths and challenges faced by these accounts, reaching a number of conclusions. First, the covert ''LF'' raising account, though successful at accounting for certain interpretational facts about the construction, does not provide an analysis of the word‐order facts. Second, the overt raising account, which can account for the word order facts, still faces two main challenges; there remain important open questions about verb placement, and though none of the current approaches to extraction can easily explain it, extraction and raising‐to‐object interact in complex ways that are still not well understood. Third, the movement theory of control, which treats object control in a way parallel to overt raising‐to‐object, faces not only the challenges to the overt raising account, but several others particular to object control. Finally, the article describes the HPSG analysis of raising‐to‐object, which can account straightforwardly for the word order facts, and with the appropriate constraints can be extended to account for the extraction facts discussed.
In: Organization studies: an international multidisciplinary journal devoted to the study of organizations, organizing, and the organized in and between societies, Band 33, Heft 8, S. 1071-1090
Drawing on the literature on active objects and combining it with an ethnographic study of engineering work, this paper offers an alternative and complementary understanding of the problem of control in knowledge-intensive work. This problem largely concerns the question of how creative processes of knowing are enabled on behalf of the organization. The dominant response to this question revolves around the idea that when work becomes complex, managers attempt to control the norms and identifications of employees, rather than their behaviours. Through the concept of object-control, the idea is introduced that organizational objects participate on behalf of the organization in processes of knowledge control by interpellating organizational members; that is, organizational members are invited to interact with the objects and to creatively develop knowledge in order to solve organizational problems. The study covers ground that the established notions of normative control and identity regulation have neglected, and suggests new ways of advancing the scholarship of organizational control by taking the active participation of organizational objects into account.
Objects based systems are presents everywhere in our life. When such a system presents vulnerabilities, confidentiality and integrity are thus widely compromised. For example, Java is an object language authorizing many cyber-attacks between 2012 and 2013 leading the US department of homeland security to recommend its abandon. This thesis proposes to limit the relations between the objects thanks to a mandatory access control. First, a general model of objects supporting objects and prototypes languages is defined. Second, the elementary relations are formalized in order to control them. Those relations include the reference, interaction and three types of flow (activity, information and data). Automata authorize a logic that enables to compute the required mandatory policy. At the same time, the computation of the MAC policy and the efficiency are solved since the policy is reduced. Experimentations use the JAAS security objectives existing in the Java language. Thus, one year of Java vulnerabilities is prevented thanks to the Metasploit framework. ; Les systèmes à objets sont présents partout dans notre quotidien. Ainsi, une vulnérabilité dans ces systèmes compromet amplement la confidentialité ou l'intégrité. Par exemple, Java est un système à objets basé sur les classes qui a été la cible de nombreuses cyber-attaques entre 2012 et 2013 au point que le département de la sécurité intérieure des Etats-Unis recommande son abandon. Dans cette thèse nous proposons de limiter les relations entre objets au moyen d'un contrôle d'accès obligatoire. Pour cela nous définissons un modèle général de système à objets supportant notamment les langages objets et à prototypes. Puis nous formalisons les relations élémentaires que nous pouvons observer et donc contrôler. Celles-ci sont la référence, l'interaction et trois types de flux (d'activité, d'information, de données). Nous proposons également une logique basée sur des automates qui permet de calculer les privilèges de chaque objet. Ainsi, nous calculons dynamiquement la politique obligatoire nécessaire pour satisfaire les objectifs de sécurité exigés. Par là même, nous résolvons d'un seul coup le calcul des politiques obligatoires et le problème d'efficacité puisque la politique obligatoire se trouve réduite. L'expérimentation propose une application aux objectifs de sécurité JAAS existants dans Java. De fait, nous avons été capables d'empêcher les malwares Java correspondant à une année de vulnérabilités au moyen de l'outil d'exploitation Metasploit.
The article is aimed at developing a systematic understanding of trust as an object of management when waging cognitive wars. The study is based on the hypothesis that with the growing complexity of identifying the truth of information against the backdrop of exponential growth in its volume, as well as the complexity of information technology, the most adequate countermeasure may be the trust of subjects of information interaction. The presence of such a hypothesis dictates the need to consider the phenomenon of trust as an object of management, as well as existing and promising mechanisms of influence on trust. The article structures the main factors influencing the formation of social trust and systematizes the idea of the types of objects of influence when waging a hybrid war. Based on the analysis of the results of research into the phenomenon of trust and the factors influencing it, a structural diagram of information management of trust is presented, where social trust is shown as the object of management, and informational and cultural aspects of the formation of trust are selected as regulating elements. The article also identifies groups of goals, objects and groups of indicators of negative information impact on trust factors, and proposes approaches to identifying the presence of such impact. The example shows that modern information technologies are an effective tool for influencing the level of trust between people, due to the intensive impact on the cognitive sphere of a person.
Throughout this paper, we contend that the 'gang' has been appropriated by the state as an ideological device that drives the hypercriminalisation of black, mixed, Asian, and other minority ethnic (BAME) communities. Drawing upon two research studies, we demonstrate how the gang is evoked to explain an array of contemporary 'crime' problems, which in turn (re)produces racialised objects to be policed. With particular reference to collective punishments, we suggest that "gang-branding" is critical to the development of guilt-producing associations that facilitate the arrest, charging, and prosecution of countless numbers of BAME people for offences they did not commit. As such, there is now an urgent need to 'take seriously' the criminalising intents of a dangerous criminology of the Other, which legitimises intrusive racist policing and surveillance, and justifies the imposition of deliberate harms upon racialised communities.