281 resultados para Islamist parties
Resumo:
The complex supply chain relations of the construction industry, coupled with the substantial amount of information to be shared on a regular basis between the parties involved, make the traditional paper-based data interchange methods inefficient, error prone and expensive. The successful information technology (IT) applications that enable seamless data interchange, such as the Electronic Data Interchange (EDI) systems, have generally failed to be successfully implemented in the construction industry. An alternative emerging technology, Extensible Markup Language (XML), and its applicability to streamline business processes and to improve data interchange methods within the construction industry are analysed, as is the EDI technology to identify the strategic advantages that XML technology provides to overcome the barriers to implementation. In addition, the successful implementation of XML-based automated data interchange platforms for a large organization, and the proposed benefits thereof, are presented as a case study.
Resumo:
Dispute resolution in strata schemes in Peninsular Malaysia should focus on more than just "settlement." The quality of the outcome, its sustainability and its relevance in supporting the basic principles of a good neighbourhood and self-governance in a strata scheme are also fundamental. Based on the comprehensive law movement, this thesis develops a theoretical framework for strata scheme disputes within the parameters of therapeutic jurisprudence, preventive law, alternative dispute resolution (ADR) and problem-solving courts. The therapeutic orientation of this model offers approaches that promote positive communication between disputing parties, preserve neighbour relations and optimise people's psychological and emotional well-being.
Resumo:
In this paper, we explore the use of Twitter as a political tool in the 2013 Australian Federal Election. We employ a ‘big data’ approach that combines qualitative and quantitative methods of analysis. By tracking the accounts of politicians and parties, and the tweeting activity to and around these accounts, as well as conversations on particular hashtagged topics, we gain a comprehensive insight into the ways in which Twitter is employed in the campaigning strategies of different parties. We compare and contrast the use of Twitter by political actors with its adoption by citizens as a tool for political conversation and participation. Our study provides an important longitudinal counterpoint, and opportunity for comparison, to the use of Twitter in previous Australian federal and state elections. Furthermore, we offer innovative methodologies for data gathering and evaluation that can contribute to the comparative study of the political uses of Twitter across diverse national media and political systems.
Resumo:
Suppose two parties, holding vectors A = (a 1,a 2,...,a n ) and B = (b 1,b 2,...,b n ) respectively, wish to know whether a i > b i for all i, without disclosing any private input. This problem is called the vector dominance problem, and is closely related to the well-studied problem for securely comparing two numbers (Yao’s millionaires problem). In this paper, we propose several protocols for this problem, which improve upon existing protocols on round complexity or communication/computation complexity.
Resumo:
In Elders Rural Services Australia Ltd v Gooden [2014] QDC 22 Reid DCJ considered the interaction of the procedures under the Uniform Civil Procedure Rules 1999 (Qld)relating to disclosure by parties to a proceeding and the subpoena process, in the context of a proceeding commenced by originating application.
Resumo:
Since Queensland Wire Industries Pty Ltd v Broken Hill Pty Co Ltd (1989) 167 CLR 177 it has been recognised that corporations with substantial market power are subject to special responsibilities and restraints that corporations without market power are not. In NT Power Generation Pty Ltd v Power and Water Authority (2004) 219 CLR 90 McHugh A-CJ, Gummow, Callinan and Heydon JJ in their joint reasons stated (at [76]), that s 46 of the Competition and Consumer Act 2010 (Cth) (CCA) can operate not only to prevent firms with substantial market power from doing prohibited things, but also compel them positively to do things they do not want to do. Their Honours also stated (at [126]) that the proposition that a private property owner who declines to permit competitors to use the property is immune from s 46 is “intrinsically unsound”. However, the circumstances in which a firm with substantial power must accommodate competitors, and private property rights give way to the public interest are uncertain. The purpose of this Note is to consider recent developments in two areas of the CCA where the law requires private property rights to give way to the public interest. The first part of the Note considers two recent cases which clarify the circumstances in which s 46 of the CCA can be used to compel a firm with substantial market power to accommodate a competitor and allow the competitor to make use of private property rights in the public interest. Secondly, on 12 February 2014 the Minister for Small Business, the Hon Bruce Billson,released the Productivity Commission’s Final Report, on the National Access Regime in Pt IIIA of the CCA (National Access Regime, Inquiry Report No 66, Canberra). Pt IIIA provides for the processes by which third parties may obtain access to infrastructure owned by others in the public interest. The Report recommends that Pt IIIA be retained but makes a number of suggestions for its reform, some of which will be briefly considered.
Resumo:
In this paper, we explore how BIM functionalities together with novel management concepts and methods have been utilized in thirteen hospital projects in the United States and the United Kingdom. Secondary data collection and analysis were used as the method. Initial findings indicate that the utilization of BIM enables a holistic view of project delivery and helps to integrate project parties into a collaborative process. The initiative to implement BIM must come from the top down to enable early involvement of all key stakeholders. It seems that it is rather resistance from people to adapt to the new way of working and thinking than immaturity of technology that hinders the utilization of BIM.
Resumo:
If there is a silver lining to the adversarial, dispute-prone nature of the building and construction industry, it can be found in the concomitant rise of innovative dispute resolution mechanisms. Time, cost and relationship concerns have meant that the formal adversarial system holds little appeal for disputing parties. As these alternative forms of dispute avoidance/resolution have matured in Australia over the last 20 years, attention has turned to the key characteristics of each process and their suitability to the building and construction industry. This article considers the role of dispute review boards (DRBs) and mediation as two alternative methods for avoiding/resolving disputes in the construction industry. Criteria are established for evaluating the efficacy of these procedures and their sensitivity to the needs of construction industry disputants. The ultimate conclusion reached is that DRBs represent a powerful, yet underutilised dispute resolution tool in Australia, and possess many industry-specific advantages that more traditional forms of alternative dispute resolution (particularly mediation) do not provide.
Resumo:
The Bay Area’s Center for Tactical Magic has been performing ‘‘magical’’ art interventions since 2000. The Center’s work augments traditional activist techniques by offering new conceptions of what art and activism can entail in a contemporary urban context. This article explores how Jacques Rancie`re’s reconfigured relationship between art and politics can be applied to the Center’s work, providing new distributions of the sensible for participants.
Resumo:
The Uniform Civil Procedure Rules have brought significant changes to the rules of pleading. The rules place a heavy emphasis on 'truth in pleading', and early identification of the true issues between the parties. There are now a number of pleading rules dealing with specific issues. The changes in the rules are most significant with respect to the level of particulars required for pleading damages, and the facts that must be pleaded in defences. In this article the rules of pleading are examined and contrasted with the rules applicable before the commencement of the UCPR.
Resumo:
In this paper we make progress towards solving an open problem posed by Katz and Yung at CRYPTO 2003. We propose the first protocol for key exchange among n ≥2k+1 parties which simultaneously achieves all of the following properties: 1. Key Privacy (including forward security) against active attacks by group outsiders, 2. Non-malleability — meaning in particular that no subset of up to k corrupted group insiders can ‘fix’ the agreed key to a desired value, and 3. Robustness against denial of service attacks by up to k corrupted group insiders. Our insider security properties above are achieved assuming the availability of a reliable broadcast channel.
Resumo:
The business value of information technology (IT) is increasingly being cocreated by multiple parties, opening opportunities for new research initiatives. Previous studies on IT value cocreation mainly focus on analyzing sources of cocreated IT value, yet inadequately accommodating the influence of competition relationships in IT value cocreation activities. To fill the gap, this in-progress paper suggests an agent-based modeling (also simulation) approach to investigating potential influences of the dynamic interplay between cooperation and competition relationships in IT value cocreation settings. In particular, the research proposes a high-level conceptual framework to position general IT value cocreation processes. A relational network view is offered, aiming at decomposing and systemizing several typical cooperation and competition scenarios in practical IT value cocreation settings. The application of a simulation approach to analytical insights and to theory building is illustrated.
Resumo:
Enterprise Systems purport to bring innovation to organizations. Yet, no past studies, neither from innovation nor from ES disciplines have merged their knowledge to understand how ES could facilitate lifecycle-wide innovation. Therefore, this study forms conceptual bridge between the two disciplines. In this research, we seek to understand how ES could facilitate innovation across its lifecycle phases. We associate classifications of innovation such as radical vs. incremental, administrative vs. technical innovation with the three phases of ES lifecycle. We introduce Continuous Restrained Innovation (CRI) as a new type of innovation specific to ES, considering restraints of technology, business processes and organization. Our empirical data collection at the implementation phase, using data from both the client and implementation partner, shows preliminary evidence of CRI. In addition, we state that both parties consider the implementation of ES as a radical innovation yet, are less interest in seeking further innovations through the system.
Resumo:
This book analyses the principles underlying the construction and application of a number of boilerplate and other clauses commonly included in commercial contracts. The first Part of the work deals with general principles of interpretation. It then considers clauses which allocate commercial risk; clauses relating to performance; clauses introducing new parties by way of assignment, novation or nomination; clauses such as guarantees and indemnities which create liabilities in third parties; and dispute resolution clauses including governing law. The authors highlight common issues surrounding the application of these clauses in practice and, where appropriate, make drafting recommendations based on their analysis of case law and the operation of relevant statutes. This is a very accessible resource for all commercial practitioners.
Resumo:
As part of the effort to protect children from significant abuse and neglect, each state and territory in Australia has enacted legislation commonly known as "mandatory reporting laws". There is much confusion about the nature and effects of these laws, both generally and within each jurisdiction. Accordingly, the main aim of this chapter is to review and explain the legislative principles across Australia. In doing so, the chapter will identify differences between the state and territory laws and will situate the laws as part of a system of responses to the whole spectrum of child abuse and neglect. We will also highlight the need for effective reporter training and public awareness, especially given the tension between the widely perceived need for a community response to child abuse and neglect and the simultaneous concern to avoid unnecessary reporting of innocuous events and situations.