Current Search: Infrastructure (x)
View All Items
- Title
- EQUITABLE DECISION-MAKING: INTEGRATING ENVIRONMENTAL RISK AND SOCIAL VULNERABILITY IN FLOOD MITIGATION PROJECT SELECTION.
- Creator
- Daniel, Aneisha, Behara, Ravi, Florida Atlantic University, Department of Information Technology and Operations Management, College of Business
- Abstract/Description
-
This empirical study examines decision-making in project selection in the face of overwhelming flood infrastructure needs and inadequate resources, particularly in vulnerable communities. The motivation for this study is to explore the interconnectedness between socioeconomic dimensions and environmental risks in the decision-making process for selecting projects. The study evaluates the Palm Beach County project selection framework and the impact of multi-criteria decision-making on project...
Show moreThis empirical study examines decision-making in project selection in the face of overwhelming flood infrastructure needs and inadequate resources, particularly in vulnerable communities. The motivation for this study is to explore the interconnectedness between socioeconomic dimensions and environmental risks in the decision-making process for selecting projects. The study evaluates the Palm Beach County project selection framework and the impact of multi-criteria decision-making on project selection by proposing a new framework. The new project selection framework emphasizes the integration of flood risk and social vulnerability index criteria to evaluate the relationship between the new criteria in the decision-making framework and project selection. The analysis is comprised of 24 models grouped into three distinct groups and compared using paired t-tests. The analysis reveals that of the three groups, the group which incorporates both flood risks and social vulnerability criteria consistently outperforms the others, demonstrating its effectiveness in providing a more equitable investment for vulnerable communities that are more susceptible to floods. The findings provide valuable insights and recommendations for practitioners and scholars, emphasizing the need for a theoretical framework with objectivity to guide optimal infrastructure investments for decision makers.
Show less - Date Issued
- 2024
- PURL
- http://purl.flvc.org/fau/fd/FA00014399
- Subject Headings
- Floods, Decision making, Environmental management, Infrastructure (Economics)
- Format
- Document (PDF)
- Title
- EVALUATION OF CHARGING STATION LOCATIONS: INFRASTRUCTURE FOR FULLY ELECTRIC SEMI-TRUCKS IN THE U.S.
- Creator
- Ahmed, Nihat, Menachof, David, Florida Atlantic University, Department of Information Technology and Operations Management, College of Business
- Abstract/Description
-
The world is ever-changing with technological advancement. National economies and private organizations are shifting their infrastructure to adapt to innovation and technology. We are seeing a major shift in our transportation ecosystem as well. Automotive manufacturers are launching fully electric semi-truck (EST) on the road for freight transportation. Electric trucks will have a long-term effect on many industries and the national economy in the United States. Compared to conventional...
Show moreThe world is ever-changing with technological advancement. National economies and private organizations are shifting their infrastructure to adapt to innovation and technology. We are seeing a major shift in our transportation ecosystem as well. Automotive manufacturers are launching fully electric semi-truck (EST) on the road for freight transportation. Electric trucks will have a long-term effect on many industries and the national economy in the United States. Compared to conventional automobiles, the limited range of electric vehicles is a major obstacle. To adapt electric vehicles (EVs) to our transportation system, the U.S. needs a proper charging infrastructure in our grid. Though we have been adapting the passenger EVs, the EST needs larger charging infrastructure capabilities to charge the large batteries of these trucks to complete the journey. The most important aspect is the geographical locations of these mega charging stations along U.S. highways. To analyze the optimal locations of these charging infrastructures, we use the framework from Csiszár et al. (2020), an origin-destination (O-D) data model. OD is classified as the original location of the freight to the end destination. We also use the flow-refueling location model (FRLM) from He et al. (2019). This framework showcases the optimal locations in each route in order to complete the OD pairs. We use data from the U.S. department of energy for the locations of charging stations. Furthermore, we use U.S. department of transportation highway & transportation data to procure the major O-Ds of freight transportation.
Show less - Date Issued
- 2023
- PURL
- http://purl.flvc.org/fau/fd/FA00014120
- Subject Headings
- Electric trucks, Infrastructure, Battery charging stations (Electric vehicles)
- Format
- Document (PDF)
- Title
- NETWORK FEATURE ENGINEERING AND DATA SCIENCE ANALYTICS FOR CYBER THREAT INTELLIGENCE.
- Creator
- Wheelus, Charles, Zhu, Xingquan, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
While it is evident that network services continue to play an ever-increasing role in our daily lives, it is less evident that our information infrastructure requires a concerted, well-conceived, and fastidiously executed strategy to remain viable. Government agencies, Non-Governmental Organizations (\NGOs"), and private organizations are all targets for malicious online activity. Security has deservedly become a serious focus for organizations that seek to assume a more proactive posture; in...
Show moreWhile it is evident that network services continue to play an ever-increasing role in our daily lives, it is less evident that our information infrastructure requires a concerted, well-conceived, and fastidiously executed strategy to remain viable. Government agencies, Non-Governmental Organizations (\NGOs"), and private organizations are all targets for malicious online activity. Security has deservedly become a serious focus for organizations that seek to assume a more proactive posture; in order to deal with the many facets of securing their infrastructure. At the same time, the discipline of data science has rapidly grown into a prominent role, as once purely theoretical machine learning algorithms have become practical for implementation. This is especially noteworthy, as principles that now fall neatly into the field of data science has been contemplated for quite some time, and as much as over two hundred years ago. Visionaries like Thomas Bayes [18], Andrey Andreyevich Markov [65], Frank Rosenblatt [88], and so many others made incredible contributions to the field long before the impact of Moore's law [92] would make such theoretical work commonplace for practical use; giving rise to what has come to be known as "Data Science".
Show less - Date Issued
- 2020
- PURL
- http://purl.flvc.org/fau/fd/FA00013620
- Subject Headings
- Cyber security, Computer security, Information infrastructure, Predictive analytics
- Format
- Document (PDF)
- Title
- Improving Privacy With Intelligent Cooperative Caching In Vehicular Ad Hoc Networks.
- Creator
- Glass, Stephen C., Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With the issuance of the Notice of Proposed Rule Making (NPRM) for Vehicle to Vehicle (V2V) communications by the United States National Highway Tra c Safety Administration (NHTSA), the goal of the widespread deployment of vehicular networking has taken a signi cant step towards becoming a reality. In order for consumers to accept the technology, it is expected that reasonable mechanisms will be in place to protect their privacy. Cooperative Caching has been proposed as an approach that can...
Show moreWith the issuance of the Notice of Proposed Rule Making (NPRM) for Vehicle to Vehicle (V2V) communications by the United States National Highway Tra c Safety Administration (NHTSA), the goal of the widespread deployment of vehicular networking has taken a signi cant step towards becoming a reality. In order for consumers to accept the technology, it is expected that reasonable mechanisms will be in place to protect their privacy. Cooperative Caching has been proposed as an approach that can be used to improve privacy by distributing data items throughout the mobile network as they are requested. With this approach, vehicles rst attempt to retrieve data items from the mobile network, alleviating the need to send all requests to a centralized location that may be vulnerable to an attack. However, with this approach, a requesting vehicle may expose itself to many unknown vehicles as part of the cache discovery process. In this work we present a Public Key Infrastructure (PKI) based Cooperative Caching system that utilizes a genetic algorithm to selectively choose members of the mobile network to query for data items with a focus on improving overall privacy. The privacy improvement is achieved by avoiding those members that present a greater risk of exposing information related to the request and choosing members that have a greater potential of having the needed data item. An Agent Based Model is utilized to baseline the privacy concerns when using a broadcast based approach to cache discovery. In addition, an epidemiology inspired mathematical model is presented to illustrate the impact of reducing the number of vehicles queried during cache discovery. Periodic reports from neighboring vehicles are used by the genetic algorithm to identify which neighbors should be queried during cache discovery. In order for the system to be realistic, vehicles must trust the information in these reports. A PKI based approach used to evaluate the trustworthiness of each vehicle in the system is also detailed. We have conducted an in-depth performance study of our system that demonstrates a signi cant reduction in the overall risk of exposure when compared to broadcasting the request to all neighbors.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004975, http://purl.flvc.org/fau/fd/FA00004965
- Subject Headings
- Dissertations, Academic -- Florida Atlantic University, Public key infrastructure (Computer security), Privacy., Cache memory., Public key infrastructure (Computer security).
- Format
- Document (PDF)
- Title
- Design and analysis of key establishment protocols.
- Creator
- Neupane, Kashi., Charles E. Schmidt College of Science, Department of Mathematical Sciences
- Abstract/Description
-
Consider a scenario where a server S shares a symmetric key kU with each user U. Building on a 2-party solution of Bohli et al., we describe an authenticated 3-party key establishment which remains secure if a computational Bilinear Diffie Hellman problem is hard or the server is uncorrupted. If the BDH assumption holds during a protocol execution, but is invalidated later, entity authentication and integrity of the protocol are still guaranteed. Key establishment protocols based on hardness...
Show moreConsider a scenario where a server S shares a symmetric key kU with each user U. Building on a 2-party solution of Bohli et al., we describe an authenticated 3-party key establishment which remains secure if a computational Bilinear Diffie Hellman problem is hard or the server is uncorrupted. If the BDH assumption holds during a protocol execution, but is invalidated later, entity authentication and integrity of the protocol are still guaranteed. Key establishment protocols based on hardness assumptions, such as discrete logarithm problem (DLP) and integer factorization problem (IFP) are vulnerable to quantum computer attacks, whereas the protocols based on other hardness assumptions, such as conjugacy search problem and decomposition search problem can resist such attacks. The existing protocols based on the hardness assumptions which can resist quantum computer attacks are only passively secure. Compilers are used to convert a passively secure protocol to an actively secure protoc ol. Compilers involve some tools such as, signature scheme and a collision-resistant hash function. If there are only passively secure protocols but not a signature scheme based on same assumption then the application of existing compilers requires the use of such tools based on different assumptions. But the introduction of new tools, based on different assumptions, makes the new actively secure protocol rely on more than one hardness assumptions. We offer an approach to derive an actively secure two-party protocol from a passively secure two-party protocol without introducing further hardness assumptions. This serves as a useful formal tool to transform any basic algebric method of public key cryptography to the real world applicaticable cryptographic scheme. In a recent preprint, Vivek et al. propose a compiler to transform a passively secure 3-party key establishment to a passively secure group key establishment. To achieve active security, they apply this compiler to Joux's, protoc ol and apply a construction by Katz and Yung, resulting in a 3-round group key establishment. In this reserach, we show how Joux's protocol can be extended to an actively secure group key establishment with two rounds. The resulting solution is in the standard model, builds on a bilinear Diffie-Hellman assumption and offers forward security as well as strong entity authentication. If strong entity authentication is not required, then one half of the participants does not have to send any message in the second round, which may be of interest for scenarios where communication efficiency is a main concern.
Show less - Date Issued
- 2012
- PURL
- http://purl.flvc.org/FAU/3342239
- Subject Headings
- Computer networks, Security measures, Computer network protocols, Data encryption (Computer science), Public key infrastructure (Computer security)
- Format
- Document (PDF)
- Title
- Message authentication in an identity-based encryption scheme: 1-Key-Encrypt-Then-MAC.
- Creator
- Amento, Brittanney Jaclyn, Charles E. Schmidt College of Science, Department of Mathematical Sciences
- Abstract/Description
-
We present an Identity-Based Encryption scheme, 1-Key-Encrypt-Then-MAC, in which we are able to verify the authenticity of messages using a MAC. We accomplish this authentication by combining an Identity-Based Encryption scheme given by Boneh and Franklin, with an Identity-Based Non-Interactive Key Distribution given by Paterson and Srinivasan, and attaching a MAC. We prove the scheme is chosen plaintext secure and chosen ciphertext secure, and the MAC is existentially unforgeable.
- Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/2796050
- Subject Headings
- Data encryption (Computer science), Public key cryptopgraphy, Public key infrastructure (Computer security)
- Format
- Document (PDF)
- Title
- SPATIAL NETWORK BIG DATABASE APPROACH TO RESOURCE ALLOCATION PROBLEMS.
- Creator
- Qutbuddin, Ahmad, Yang, KwangSoo, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Resource allocation for Spatial Network Big Database is challenging due to the large size of spatial networks, variety of types of spatial data, a fast update rate of spatial and temporal elements. It is challenging to learn, manage and process the collected data and produce meaningful information in a limited time. Produced information must be concise and easy to understand. At the same time, the information must be very descriptive and useful. My research aims to address these challenges...
Show moreResource allocation for Spatial Network Big Database is challenging due to the large size of spatial networks, variety of types of spatial data, a fast update rate of spatial and temporal elements. It is challenging to learn, manage and process the collected data and produce meaningful information in a limited time. Produced information must be concise and easy to understand. At the same time, the information must be very descriptive and useful. My research aims to address these challenges through the development of fundamental data processing components for advanced spatial network queries that clearly and briefly deliver critical information. This thesis proposal studied two challenging Spatial Network Big Database problems: (1) Multiple Resource Network Voronoi Diagram and (2) Node-attributed Spatial Graph Partitioning. To address the challenge of query processing for multiple resource allocation in preparing for or after a disaster, we investigated the problem of the Multiple Resource Network Voronoi Diagram (MRNVD). Given a spatial network and a set of service centers from k different resource types, a Multiple Resource Network Voronoi Diagram (MRNVD) partitions the spatial network into a set of Service Areas that can minimize the total cycle-distances of graph-nodes to allotted k service centers with different resource types. The MRNVD problem is important for critical societal applications such as assigning essential survival supplies (e.g., food, water, gas, and medical assistance) to residents impacted by man-made or natural disasters. The MRNVD problem is NP-hard; it is computationally challenging due to the large size of the transportation network. Previous work proposed the Distance bounded Pruning (DP) approach to produce an optimal solution for MRNVD. However, we found that DP can be generalized to reduce the computational cost for the minimum cycle-distance. We extend our prior work and propose a novel approach that reduces the computational cost. Experiments using real-world datasets from five different regions demonstrate that the proposed approach creates MRNVD and significantly reduces the computational cost.
Show less - Date Issued
- 2021
- PURL
- http://purl.flvc.org/fau/fd/FA00013854
- Subject Headings
- Spatial data infrastructures, Big data--Data processing, Resource allocation, Voronoi polygons
- Format
- Document (PDF)
- Title
- Public asset management: empirical evidence from the state governments in the United States.
- Creator
- Lu, Yaotai, College for Design and Social Inquiry, School of Public Administration
- Abstract/Description
-
Public asset management is a critical component of the financial integrity of government. However, in practice, problems exist in the field of public asset management at different levels of government in the United States. This research explores the management of public fixed assets owned, controlled and used by state governments in America. It attempts to answer two major questions: (1) What are the characteristics of a modern public asset management system based on the available literature?...
Show morePublic asset management is a critical component of the financial integrity of government. However, in practice, problems exist in the field of public asset management at different levels of government in the United States. This research explores the management of public fixed assets owned, controlled and used by state governments in America. It attempts to answer two major questions: (1) What are the characteristics of a modern public asset management system based on the available literature? and (2) How do public asset management practices at the U.S. state government compare to the system standard described in the first question? Based on systems theory and current research on public asset management and public procurement systems, this research develops an intellectual framework of a public fixed asset management system. This system is composed of six interdependent cornerstones, including legal and regulatory requirements, organization structure, management process throughout th e life cycle of assets, human capital strategies, information and technology resources, and monitoring, integrity, and transparency. Each cornerstone consists of a number of components that reveal the underlying working principles of the relevant cornerstone and together determine the standards of fixed asset management in the relevant area. Survey results demonstrate that state governments fundamentally satisfy the standards identified in the fixed asset management system. However, certain problems obviously exist in the area of each cornerstone. In addition, survey results reveal that the six cornerstones of fixed asset management system are interrelated with one another. In most states, when a management element in the area of one cornerstone is widely implemented, the relevant management elements in areas of other cornerstones are employed and vice versa., A major contribution of this research is the development of a fixed asset management system. State and federal governments may compare their fixed asset management to the standards identified in this system. Local governments may find appropriate management components to adapt to their characteristics from this system.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3171677
- Subject Headings
- Finance, Public, Infrastructure (Economics), Finance, Organizational behavior, Government policy
- Format
- Document (PDF)
- Title
- Public-private partnerships and questions in public procurement.
- Creator
- Williams, Adam, Miller, Hugh T., Florida Atlantic University, College for Design and Social Inquiry, School of Public Administration
- Abstract/Description
-
This study explores the connections of public procurement official perceptions of public-private partnerships and their contracting decisions for public infrastructure projects. Detailed discussion of previous scholarship and its focus on policymaking and project evaluation of public-private partnerships leaves a gap in the public policy process – implementation. Procurement officials are presented in the role of policy implementers rather than agents in a principalagent approach. This...
Show moreThis study explores the connections of public procurement official perceptions of public-private partnerships and their contracting decisions for public infrastructure projects. Detailed discussion of previous scholarship and its focus on policymaking and project evaluation of public-private partnerships leaves a gap in the public policy process – implementation. Procurement officials are presented in the role of policy implementers rather than agents in a principalagent approach. This attempts to address a shortcoming of the description that these officials do nothing more than purchase. Arguments are put forth that these officials are given additional levels of discretion when faced with contracting decisions. Specifically, procurement officials observe that public-private partnerships provide sets of project consequences. A survey instrument is designed to explore the differences in perceptions that procurement officials have with respect to public-private partnerships and traditional contracting out. Survey failures result in findings only being able to attempt a more general view of public-private partnerships. Results allow perceptions to be placed in a decision-making model based on a project phase approach that develops on the assumption that tasks contracted to private vendors produce project consequences. Furthermore, analysis of significant consequence perceptions indicate that those perceptions do not provide a rationale for a procurement official’s decision-making on whether to contract using a public-private partnership for public infrastructure projects. Independent sample t-tests, controlled correlations, multiple ANOVA and linear regression analyses show that perceptions of consequences, the perceptions of differences of those consequences across project phases, relationships of consequences to perceptions of efficiency and effectiveness proxies and a bounded rationalitybased model of decision-making for procurement officials are all inconclusive. Discussion focuses on the development of consequences and phases as defining and clarifying public-private partnerships. Further discussions are presented for procurement officials with respect to their decision-making and possible role as policy implementers. Conclusions fail to uncover any inferential results. The research finds its primary contribution in the conceptual discourse of public procurement official roles and public-private partnership definitions.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004236, http://purl.flvc.org/fau/fd/FA00004236
- Subject Headings
- Infrastructure (Economics) -- Finance, Public private sector cooperation -- Finance, Public private sector cooperation, Public works -- Finance, Risk management
- Format
- Document (PDF)
- Title
- More social capital please!: a study of a Brazilian immigrant community.
- Creator
- Esteves, Jessica., Harriet L. Wilkes Honors College
- Abstract/Description
-
Researchers who study Brazilian immigrants in the United States have noted a lack of camaraderie and social networks among Brazilians. Based on recent research conducted in Broward County, Florida, Manuel Vâasquez argues that while there are clear structural impediments to community formation among Brazilian immigrants, Brazilians do form social networks. This thesis examines the survey and ethnographic data from Vâasquez's sample to test a series of hypotheses about which factors impact...
Show moreResearchers who study Brazilian immigrants in the United States have noted a lack of camaraderie and social networks among Brazilians. Based on recent research conducted in Broward County, Florida, Manuel Vâasquez argues that while there are clear structural impediments to community formation among Brazilian immigrants, Brazilians do form social networks. This thesis examines the survey and ethnographic data from Vâasquez's sample to test a series of hypotheses about which factors impact levels of social capital and the potential for network creation and mobilization among Brazilian immigrants. Analysis of the data suggests that religious participation and levels of perceived discrimination are correlated with higher levels of social capital in this sample. For a group of immigrants characterized by a lack of collective solidarity and facing an increasingly hostile economic and social climate, religious organizations may be essential locales for achieving sufficient social capital for social, economic, and political integration.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/3335017
- Subject Headings
- Social capital (Sociology), Infrastructure (Economics), Social networks, Brazilian Americans, Social conditions, Brazilian Americans, Cultural assimilation, Brazilian Americans, Ethnic identity, Emigration and immigration
- Format
- Document (PDF)
- Title
- Local Government Decisions in a Time of Economic Decline: A Study of County Government Budget Policy During the Great Recession.
- Creator
- Wilson, Darrin Hugh, McCue, Clifford P., Florida Atlantic University, College for Design and Social Inquiry, School of Public Administration
- Abstract/Description
-
This dissertation examined the literature of cutback management in the context of the Great Recession. Specifically, it studied the relationship between cutback management policies used by county governments during the recession and revenue changes. The purpose of this dissertation was to test whether or not the percent change in revenue had an impact on the probability that cutback management policies were used in the recession. According to the cutback management literature developed in the...
Show moreThis dissertation examined the literature of cutback management in the context of the Great Recession. Specifically, it studied the relationship between cutback management policies used by county governments during the recession and revenue changes. The purpose of this dissertation was to test whether or not the percent change in revenue had an impact on the probability that cutback management policies were used in the recession. According to the cutback management literature developed in the 1970s and 1980s, there should be a relationship. The theoretical framework used for this study was the rational-approach framework, which proposes that every expenditure reducing and revenue increasing policy is enacted based on the percent decrease in revenue the government faces. This suggests that the cutback management policies are a proportional response to revenue decline. The framework was operationalized by using a binary logistic regression that used policy en actment as the dependent variable and the percent change in revenue as the independent variable. Eighty-six counties were sampled and 7 years of each county's budget book were examined for policies and financial data. The research found that eleven expenditure policies and three revenue policies had a statistically significant relationship with the percent change in revenues. This resulted in the conclusion that the framework and, therefore, the cutback management literature were useful in explaining primarily expenditure policies.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00004556, http://purl.flvc.org/fau/fd/FA00004556
- Subject Headings
- Financial crises -- United States -- 21st century, Global Financial Crisis, 2008-2009, Infrastructure (Economics) -- United States -- 21st century, Local budgets -- United States, Municipal budgets -- United States, United States -- Economic conditions -- 2009-
- Format
- Document (PDF)
- Title
- Privatization as an administrative reform: The case of Bangladesh.
- Creator
- Islam, Md. Rafiqul, Florida Atlantic University, Farazmand, Ali
- Abstract/Description
-
Privatization has been a major policy and administrative reform all over the world for the last twenty-five years. Public bureaucracy is one of the first institutions of government to be affected by privatization as a reform. The major purpose of this dissertation was to examine the perception of the civil servants of Bangladesh towards privatization with respect to national development. In order to examine the perception of Bangladeshi civil servants, this dissertation has examined the...
Show morePrivatization has been a major policy and administrative reform all over the world for the last twenty-five years. Public bureaucracy is one of the first institutions of government to be affected by privatization as a reform. The major purpose of this dissertation was to examine the perception of the civil servants of Bangladesh towards privatization with respect to national development. In order to examine the perception of Bangladeshi civil servants, this dissertation has examined the answers to the question: "What are the perceptions of civil servants in Bangladesh towards privatization with respect to national development?" It has also examined the differences in the perceptions of different levels of civil servants with respect to national development. To examine the perceptions of the civil servants data were collected from 120 civil servants of six ministries in Bangladesh through a survey instrument and personal interviews. The methodologies used in this dissertation were interviews and case studies. The 120 civil servants were randomly selected from six ministries and/or attached departments or subordinate offices; they were interviewed to collect data for examining their perceptions towards privatization with respect to national development. Using government documents and examining some cases, this study also examined the earlier success and failure of privatization programs in Bangladesh with respect to national development as a means to explain the perception of civil servants of Bangladesh. This dissertation has developed propositions about the perception of civil servants of Bangladesh towards privatization with respect to national development. Analysis of data reveals that the civil servants of Bangladesh have positive perceptions towards privatization with respect to national development. The study also reveals that there is no significant difference in the perceptions of different levels of civil servants of Bangladesh towards privatization with respect to national development. The dissertation study reveals that the majority of the civil servants in Bangladesh believe that privatization programs will positively affect economic, social, political and administrative development in Bangladesh. Findings of the study also reveal that the civil servants of Bangladesh believe that privatization program will increase accountability, skills, service delivery and performance of employees, which help promote national development. The study, moreover, shows that although the civil servants of Bangladesh have positive perception towards privatization with respect to national development, many of them are also doubtful about the implementation of privatization programs in Bangladesh. However, the case studies indicate that privatization programs in Bangladesh have mixed results. Findings of this dissertation study will enrich the literature on privatization, bureaucracy and development. Contribution to the theory of bureaucracy and reform is also significant in that bureaucracy tends to survive no matter what reform takes place, as long as there is a need to implement, oversee, and follow up on reforms. This study has significant implications for understanding the perceptions of civil servants towards privatization with respect to national development of not only third world countries, but also of developed nations. Privatization is viewed as a form of change, which is embraced as a positive reform effort toward national development. Students, academics and practitioners of economics, public administration and business studies as well as business entrepreneurs will also benefit from the findings of the study in understanding the perceptions of civil servants of third world countries towards the effects of privatization in development. This study has significant contribution not only to literature on administrative change, but also to literature on bureaucracy and development. It rejects the conventional negative perception about the role of bureaucracy in privatization. The study shows that civil servants or civil bureaucrats in Bangladesh are generally not inimical to privatization but they are in favor of privatization for national development as they believe that privatization of public enterprises positively affects national development-economically, socially, politically and administratively. Finally, this dissertation study will enhance knowledge in the area of privatization, bureaucracy and national development as the findings of the study provide new knowledge for explaining the changing perception of bureaucracy toward privatization with respect to national development. In spite of these important findings, one limitation of the study must also be noted, and that is, it only focused on 120 civil servants of the bureaucracy, and that it did not include employees of public enterprises subject to privatization. This shortcoming of the study could serve as a subject for future research.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/12198
- Subject Headings
- Privatization--Developing countries, Bangladesh--Economic policy--21st century, Industrial policy--Developing countries, Infrastructure (Economics)--Bangladesh, Developing countries--Economic conditions, Administrative agencies--Bangladish--Reorganization
- Format
- Document (PDF)