509 research outputs found

    Inspectorate Supervision in Applying Competitive Principles in Managing Procurement of Goods / Services in Government of North Sulawesi Province

    Full text link
    This paper examines the supervision of the Inspectorate on the application of the principle of competitiveness in the management of government goods/services procurement. This research was conducted at the North Sulawesi Provincial Government. The essence of this paper aims to find out whether the Inspectorate has supervised the application of the principle of competitiveness in the management of procurement of goods/services to the North Sulawesi Provincial Government. The methodology used in this study is qualitative. The techniques and procedures for collecting data through in-depth interviews with a number of informants related to the application of the principle of competitiveness in the management of procurement of goods/services. Activities in the analysis include data reduction, data display, and conclusion drawing/verification. The results of this study indicate that the Inspectorate has been maximal enough to carry out supervision of the application of the principle of competitiveness in the procurement of goods/services in North Sulawesi Province

    Consolidated List of Requirements

    Get PDF
    This document is a consolidated catalogue of requirements for the Electronic Health Care Record (EHCR) and Electronic Health Care Record Architecture (EHCRA), gleaned largely from work done in the EU Framework III and IV programmes and CEN, but also including input from other sources including world-wide standardisation initiatives. The document brings together the relevant work done into a classified inventory of requirements to inform the on-going standardisation process as well as act as a guide to future implementation of EHCRA-based systems. It is meant as a contribution both to understanding of the standard and to the work that is being considered to improve the standard. Major features include the classification into issues affecting the Health Care Record, the EHCR, EHCR processing, EHCR interchange and the sharing of health care information and EHCR systems. The principal information sources are described briefly. It is offered as documentation that is complementary to the four documents of the ENV 13606 Parts I-IV produced by CEN Pts 26,27,28,29. The requirements identified and classified in this deliverable are referenced in other deliverables

    Evaluation of Systems and Procedures for Affixing Paid Stamp Duty Markings with Printing Technology in 2020 (Case Study at the Kantor Pelayanan Pajak Wajib Pajak Besar Empat)

    Get PDF
    The system and procedure for affixing the Paid Stamp Duty mark using printing technology has so far been less effective. From the reporting method, it is not possible to know with certainty the number of banking documents that have been printed and affixed with the sign of Paid Stamp Duty by the printing company. This is due to the absence of a system that bridges the reporting of the issuance of banking documents printing permits. The tax account code and Deposit Type Code (KAP-KJS) 41161-100 for the deposit of Stamp Duty contain all Stamp Duty payments, both using printing technology and computerized systems, including companies that are not banking institutions. This study aims to evaluate the system and procedure for affixing the stamp duty mark in full with printing technology at the Kantor Pelayanan Pajak Wajib Pajak Besar Empat, the obstacles faced and the efforts made. This research approach uses descriptive qualitative with the type of case study research. Data collection techniques were carried out through in-depth interviews with 10 informants. The results of the study show: 1) Evaluation of the system and procedure for affixing the stamp duty sign in full has been carried out by the Kantor Pelayanan Pajak Wajib Pajak Besar Empat in accordance with the stages that must be passed and the criteria determined by still being guided by the applicable provisions and regulations, 2) Constraints actually exist when implementing systems and procedures that are currently still being carried out which are still manual and require a long and complicated process and make it difficult to supervise, 3) The efforts made are more to provide suggestions so that the results of the evaluation of the system and procedures for affixing customs duties the stamp duty can be taken into consideration in making decisions or policies in order to improve and perfect the systems and procedures that have been implemented so fa

    The role of the College Council of Public FET Colleges in Gauteng

    Get PDF
    M.Comm.Public Further Education and Training (FET) Colleges are governed by a College Council, which need to perform actions in order to govern the Public FET College. (RSA, 2006:9). In order to discuss the governance role of the Public Further Education and Training Council, a historical perspective of Public Further Education and Training Colleges was firstly discussed. Extensive literature reviews of Public FET Colleges and Businesses were undertaken in order to provide a solid foundation for further quantitative research. An existing questionnaire developed to measure good corporate governance was used as a measuring instrument for the research. The questionnaire was designed within the framework of corporate governance applicable to Public FET Colleges and can be used for future research studies. The approach adopted for this study is of a quantitative nature, where data was obtained in the form of scores, which were tabulated, analysed and displayed in a graphical format. The primary objective of the research was to investigate the role of the College Council of Public FET Colleges in Gauteng. The secondary objective of the research was to investigate the following research questions: · determining if members of the College Council at Public FET Colleges are fully aware about their roles and responsibilities; · making meaningful recommendations on how to improve the perceptions of members of the College Council at Public FET Colleges, based on literature and empirical results obtained from this study and · make meaningful recommendations to the provincial government on capacitating Public FET College Councils in their roles and responsibilities. The results of the study indicated that members of Public FET College Councils in Gauteng are not fully aware of their roles and responsibilities and as a result thereof govern and manage Public FET Colleges ineffectively. The recommendation is that members of Public FET College Councils in Gauteng need to be capacitated in their roles and responsibilities and orientated properly in order to apply good corporate governance and add value to the College. There is a need for a follow-up study to be conducted on members of Public FET College Councils in South Africa to determine the perceptions of the role and responsibilities of College Councils and the conflicting roles of a College Council member and the Principal, should both be employed by the state. The clarification of roles will add to good corporate governance. The need to do research on the accountability of the members of College Councils and the consequences in the event that mismanagement occurs is further identified. Research is also needed to determine if an Activity Based Costing (ABC) method could be used effectively at Public FET Colleges in order to manage costs

    Cryptographic timestamping through Sequential Work

    Get PDF
    We present a definition of an ideal timestamping functionality that maintains a timestamped record of bitstrings. The functionality can be queried to certify the record and the age of each entry at the current time. An adversary can corrupt the timestamping functionality, in which case the adversary can output its own certifications of the record and age of entries under strict limitations. Most importantly, the adversary initially cannot falsify any part of the record, but the maximum age of entries the adversary can falsify grows linearly over time. We introduce a single-prover non-interactive cryptographic timestamping protocol based on proofs of sequential work. The protocol securely implements the timestamping functionality in the random-oracle model and universal-composability framework against an adversary that can compute proofs of sequential work faster by a certain factor. Because of the computational effort required, such adversaries have the same strict limitations under which they can falsify the record as under the ideal functionality. This protocol trivially extends to a multi-prover protocol where the adversary can only generate malicious proofs when it has corrupted at least half of all provers. As an attractive feature, we show how any party can efficiently borrow proofs by interacting with the protocol and generate its own certification of records and their ages with only a constant loss in age. The security guarantees of our timestamping protocol only depend on how long ago the adversary corrupted parties and on how fast honest parties can compute proofs of sequential work relative to an adversary, in particular these guarantees are not affected by how many proofs of sequential work honest or adversarial parties run in parallel

    Credit Where It’s Due: The Law and Norms of Attribution

    Get PDF
    The reputation we develop by receiving credit for the work we do proves to the world the nature of our human capital. If professional reputation were property, it would be the most valuable property that most people own because much human capital is difficult to measure. Although attribution is ubiquitous and important, it is largely unregulated by law. In the absence of law, economic sectors that value attribution have devised non-property regimes founded on social norms to acknowledge and reward employee effort and to attribute responsibility for the success or failure of products and projects. Extant contract-based and norms-based attribution regimes fail optimally to protect attribution interests. This article proposes a new approach to employment contracts designed to shore up the desirable characteristics of existing norms-based attribution systems while allowing legal intervention in cases of market failure. The right to public attribution would be waivable upon proof of a procedurally fair negotiation. The right to attribution necessary to build human capital, however, would be inalienable. Unlike an intellectual property right, attribution rights would not be enforced by restricting access to the misattributed work itself; the only remedy would be for the lost value of human capital. The variation in attribution norms that currently exists in different workplace cultures can and should be preserved through the proposed contract approach. The proposal strikes an appropriate balance between expansive and narrow legal protections for workplace knowledge and, in that respect, addresses one of the most vexing current debates at the intersection of intellectual property and employment law

    Publicly Verifiable Proofs of Sequential Work

    Get PDF
    We construct a publicly verifiable protocol for proving computational work based on collision-resistant hash functions and a new plausible complexity assumption regarding the existence of inherently sequential hash functions. Our protocol is based on a novel construction of time-lock puzzles. Given a sampled puzzle PDnP \gets D_n, where nn is the security parameter and DnD_n is the distribution of the puzzles, a corresponding solution can be generated using NN evaluations of the sequential hash function, where N>nN>n is another parameter, while any feasible adversarial strategy for generating valid solutions must take at least as much time as Ω(N)\Omega(N) *sequential* evaluations of the hash function after receiving PP. Thus, valid solutions constitute a proof that Ω(N)\Omega(N) parallel time elapsed since PP was received. Solutions can be publicly and efficiently verified in time \poly(n) \cdot \polylog(N). Applications of these time-lock puzzles include noninteractive timestamping of documents (when the distribution over the possible documents corresponds to the puzzle distribution DnD_n) and universally verifiable CPU benchmarks. Our construction is secure in the standard model under complexity assumptions (collision-resistant hash functions and inherently sequential hash functions), and makes black-box use of the underlying primitives. Consequently, the corresponding construction in the random oracle model is secure unconditionally. Moreover, as it is a public-coin protocol, it can be made non-interactive in the random oracle model using the Fiat-Shamir Heuristic. Our construction makes a novel use of ``depth-robust\u27\u27 directed acyclic graphs---ones whose depth remains large even after removing a constant fraction of vertices---which were previously studied for the purpose of complexity lower bounds. The construction bypasses a recent negative result of Mahmoody, Moran, and Vadhan (CRYPTO `11) for time-lock puzzles in the random oracle model, which showed that it is impossible to have time-lock puzzles like ours in the random oracle model if the puzzle generator also computes a solution together with the puzzle

    Power, politics, and performance: community participation in South African public works programs

    Get PDF
    "...Through a study of seven public works programs implemented in Western Cape province, this report examines the benefits and challenges of pursuing community participation, together with the effects of participation on meeting the other objectives of the programs. Although aspects of South Africa's experience are unique to its political economy, the study's findings reveal insights, dilemmas, and possibilities of considerable relevance in the wider context of participatory or “community-driven” development programs, which have increasingly become integral to the development agenda throughout the world.and were not trained...Politics, conflicts of interest, struggles over resources, and processes of consultation and consensus-building are part of the landscape of community-driven development. If participatory development is to remain on South Africa's development agenda, all actors must commit to realizing this objective, including generating sufficient resources, creativity, and patience to see the process through." from Authors' SummaryPublic works South Africa, Community development South Africa, Community participation South Africa, Development programs Evaluation, Civil society, Government policy,

    Financing Digital Public Infrastructure Approaches to Sustain Digital Transformation

    Get PDF
    Digital public infrastructure (DPI) can support better people-centered outcomes, but for the emerging field to live up to its promise, there must be a clear path to sustainable financing. Mounting evidence shows that DPI systems can transform the delivery of services across the public and private sectors by enabling identity verification, digital payments, data sharing, and other essential, society-wide functions. Global leaders across many sectors are assessing how to pursue DPI collaboratively, safely, and effectively, given the long-term implications for the health and vibrancy of societies. This report maps existing DPI funding models and examines the challenges underlying sustainable financing approaches. It concludes with recommendations for improved collaboration across the ecosystem to develop and scale open DPI. Most importantly, financing architecture that aligns the resources and incentives of key governmental, private-sector, philanthropic, and multilateral organizations can be a driving force for inclusive digital transformation
    corecore