63 resultados para e-voting
Resumo:
Twitter is a very popular social network website that allows users to publish short posts called tweets. Users in Twitter can follow other users, called followees. A user can see the posts of his followees on his Twitter profile home page. An information overload problem arose, with the increase of the number of followees, related to the number of tweets available in the user page. Twitter, similar to other social network websites, attempts to elevate the tweets the user is expected to be interested in to increase overall user engagement. However, Twitter still uses the chronological order to rank the tweets. The tweets ranking problem was addressed in many current researches. A sub-problem of this problem is to rank the tweets for a single followee. In this paper we represent the tweets using several features and then we propose to use a weighted version of the famous voting system Borda-Count (BC) to combine several ranked lists into one. A gradient descent method and collaborative filtering method are employed to learn the optimal weights. We also employ the Baldwin voting system for blending features (or predictors). Finally we use the greedy feature selection algorithm to select the best combination of features to ensure the best results.
Resumo:
Transfer schemes are an alternative means of acquiring control of a company to making a takeover bid under the provisions in Ch 6 of the Corporations Act 2001 (Cth). The recent decision Re Kumarina Resources Ltd [2013] FCA 549 overturned long-standing practice in relation to a certain type of transfer scheme. If followed, the decision would allow a “bidder” to vote at scheme meetings where the scheme consideration for the acquisition of the target shares are shares in another company, and the scheme results in a merger. But the bidder is not allowed to vote where the scheme consideration is cash. The article points out the difficulties arising from this decision and argues that it should not be followed. In providing a “no objection” statement, the Australian Securities and Investments Commission (ASIC) has created uncertainty as to the approach it will take towards the bidders being allowed to vote at scheme meetings where the scheme consideration for the acquisition of target shares are shares in another company. The article also points out that in providing the no objection statement in Kumarina, ASIC appears to have ignored breaches of s 606(1) of the Corporations Act. There is a pressing need for ASIC to clarify its position and, in particular, whether or not it will provide a no objection statement in respect of future transfer schemes where a bidder (or its parent company) votes at the scheme meeting.
Resumo:
We exploit a voting reform in France to estimate the causal effect of exit poll information on turnout and bandwagon voting. Before the change in legislation, individuals in some French overseas territories voted after the election result had already been made public via exit poll information from mainland France. We estimate that knowing the exit poll information decreases voter turnout by about 11 percentage points. Our study is the first clean empirical design outside of the laboratory to demonstrate the effect of such knowledge on voter turnout. Furthermore, we find that exit poll information significantly increases bandwagon voting; that is, voters who choose to turn out are more likely to vote for the expected winner.
Resumo:
Although tactical voting attracts a great deal of attention, it is very hard to measure as it requires knowledge of both individuals’ voting choices as well as their unobserved preferences. In this article, we present a simple empirical strategy to nonparametrically identify tactical voting patterns directly from balloting results. This approach allows us to study the magnitude and direction of strategic voting as well as to verify which information voters and parties take into account to determine marginal constituencies. We show that tactical voting played a significant role in the 2010 election, mainly for Liberal–Democratic voters supporting Labour. Moreover, our results suggest that voters seem to form their expectations based on a national swing in vote shares rather than newspaper guides published in the main media outlets or previous election outcomes. We also present some evidence that suggests that campaign spending is not driving tactical voting.
Resumo:
We present a clustering-only approach to the problem of speaker diarization to eliminate the need for the commonly employed and computationally expensive Viterbi segmentation and realignment stage. We use multiple linear segmentations of a recording and carry out complete-linkage clustering within each segmentation scenario to obtain a set of clustering decisions for each case. We then collect all clustering decisions, across all cases, to compute a pairwise vote between the segments and conduct complete-linkage clustering to cluster them at a resolution equal to the minimum segment length used in the linear segmentations. We use our proposed cluster-voting approach to carry out speaker diarization and linking across the SAIVT-BNEWS corpus of Australian broadcast news data. We compare our technique to an equivalent baseline system with Viterbi realignment and show that our approach can outperform the baseline technique with respect to the diarization error rate (DER) and attribution error rate (AER).
Resumo:
This chapter examines patterns in social media activity around Australian elections, focusing primarily on the 2013 federal election and supplemented by extended research into social media and Australian politics between 2007 and 2015. The coverage of Australian elections on social media is analysed from three perspectives: the evolution of the use of online platforms during elections; politician and party social media strategies during the 2013 election, focusing on Twitter; and citizen engagement with elections as demonstrated through election day tweeting practices. The specific context of Australian politics, where voting is compulsory, and the popularity of social media platforms like Twitter makes this case notably different from other Western democracies. It also demonstrates the extended mediation of politics through social media, for politicians and citizens alike.
Resumo:
This paper examines the 2013 Australian federal election to test two competing models of vote choice: spatial politics and valence issues. Using data from the 2013 Australian Election Study, the analysis finds that spatial politics (measured by party identification and self-placement on the left-right spectrum) and valence issues both have significant effects on vote choice. However, spatial measures are more important than valence issues in explaining vote choice, in contrast with recent studies from Britain, Canada and the United States. Explanations for these differences are speculative, but may relate to Australia’s stable party and electoral system, including compulsory voting and the frequency of elections. The consequently high information burden faced by Australian voters may lead to a greater reliance on spatial heuristics than is found elsewhere.
Resumo:
This chapter uses data from the 2013 Australian Election Study (AES), conducted by Clive Bean, Ian McAllister, Juliet Pietsch and Rachel Gibson (Bean et al. 2014) to investigate political attitudes and voting behaviour in the election. The study was funded by the Australian Research Council and involved a national survey of political attitudes and behaviour using a self-completion questionnaire mailed to respondents on the day before the 7 September election. The sample was a systematic random sample of enrolled voters throughout Australia, drawn by the Australian Electoral Commission. Respondents were given the option of returning the completed questionnaire by reply-paid mail or completing the survey online. Non-respondents were sent several follow-up mailings and the final sample size was 3955, representing a response rate of 34 per cent. The data were weighted to reflect population parameters for gender, age, state and vote.
Resumo:
Australian Constitutional referendums have been part of the Australian political system since federation. Up to the year 1999 (the time of the last referendum in Australia), constitutional change in Australia does not have a good history of acceptance. Since 1901, there have been 44 proposed constitutional changes with eight gaining the required acceptance according to section 128 of the Australian Constitution. In the modern era since 1967, there have been 20 proposals over seven referendum votes for a total of four changes. Over this same period, there have been 13 federal general elections which have realised change in government just five times. This research examines the electoral behaviour of Australian voters from 1967 to 1999 for each referendum. Party identification has long been a key indicator in general election voting. This research considers whether the dominant theory of voter behaviour in general elections (the Michigan Model) provides a plausible explanation for voting in Australian referendums. In order to explain electoral behaviour in each referendum, this research has utilised available data from the Australian Electoral Commission, the 1996 Australian Bureau of Statistics Census data, and the 1999 Australian Constitutional Referendum Study. This data has provided the necessary variables required to measure the impact of the Michigan Model of voter behaviour. Measurements have been conducted using bivariate and multivariate analyses. Each referendum provides an overview of the events at the time of the referendum as well as the =yes‘ and =no‘ cases at the time each referendum was initiated. Results from this research provide support for the Michigan Model of voter behaviour in Australian referendum voting. This research concludes that party identification, as a key variable of the Michigan Model, shows that voters continue to take their cues for voting from the political party they identify with in Australian referendums. However, the outcome of Australian referendums clearly shows that partisanship is only one of a number of contributory factors in constitutional referendums.
Resumo:
We study an overlapping-generations model in which agents' mortality risks, and consequently impatience, are endogenously determined by private and public investment in health care. Revenues allocated for public health care arc determined by a voting process. We find that the degree of substitutability between public and private health expenditures matters for macroeconomic outcomes of the model. Higher substitutability implies a “crowding-out" effect, which in turn impacts adversely on morality risks and impatience leading to lower public expenditures on health care in the political equilibrium. Consequently, higher substitutability is associated with greater polarization in wealth, and long-run distributions that are bimodal.
Resumo:
In this paper we examine the dynamics of the link between inequality and inflation from a political economy perspective. We consider a simple dynamic general equilibrium model in which agents vote over the desired inflation rate in each period, and inequality is persistent. Inflation in our model is a mechanism of redistribution, and we find that the link between inequality and inflation within any period or over time depends on institutional and preference related parameters. Furthermore, we find that differences in the initial distributions of wealth can yield a diverse set of patterns for the evolution of the inflation and inequality link. Relative to existing literature, our model leads to more precise predictions about the inflation-inequality correlation. To that end, results in the extant empirical literature on the inflation and inequality link need to be interpreted with caution.
Resumo:
Literally, the word compliance suggests conformity in fulfilling official requirements. The thesis presents the results of the analysis and design of a class of protocols called compliant cryptologic protocols (CCP). The thesis presents a notion for compliance in cryptosystems that is conducive as a cryptologic goal. CCP are employed in security systems used by at least two mutually mistrusting sets of entities. The individuals in the sets of entities only trust the design of the security system and any trusted third party the security system may include. Such a security system can be thought of as a broker between the mistrusting sets of entities. In order to provide confidence in operation for the mistrusting sets of entities, CCP must provide compliance verification mechanisms. These mechanisms are employed either by all the entities or a set of authorised entities in the system to verify the compliance of the behaviour of various participating entities with the rules of the system. It is often stated that confidentiality, integrity and authentication are the primary interests of cryptology. It is evident from the literature that authentication mechanisms employ confidentiality and integrity services to achieve their goal. Therefore, the fundamental services that any cryptographic algorithm may provide are confidentiality and integrity only. Since controlling the behaviour of the entities is not a feasible cryptologic goal,the verification of the confidentiality of any data is a futile cryptologic exercise. For example, there exists no cryptologic mechanism that would prevent an entity from willingly or unwillingly exposing its private key corresponding to a certified public key. The confidentiality of the data can only be assumed. Therefore, any verification in cryptologic protocols must take the form of integrity verification mechanisms. Thus, compliance verification must take the form of integrity verification in cryptologic protocols. A definition of compliance that is conducive as a cryptologic goal is presented as a guarantee on the confidentiality and integrity services. The definitions are employed to provide a classification mechanism for various message formats in a cryptologic protocol. The classification assists in the characterisation of protocols, which assists in providing a focus for the goals of the research. The resulting concrete goal of the research is the study of those protocols that employ message formats to provide restricted confidentiality and universal integrity services to selected data. The thesis proposes an informal technique to understand, analyse and synthesise the integrity goals of a protocol system. The thesis contains a study of key recovery,electronic cash, peer-review, electronic auction, and electronic voting protocols. All these protocols contain message format that provide restricted confidentiality and universal integrity services to selected data. The study of key recovery systems aims to achieve robust key recovery relying only on the certification procedure and without the need for tamper-resistant system modules. The result of this study is a new technique for the design of key recovery systems called hybrid key escrow. The thesis identifies a class of compliant cryptologic protocols called secure selection protocols (SSP). The uniqueness of this class of protocols is the similarity in the goals of the member protocols, namely peer-review, electronic auction and electronic voting. The problem statement describing the goals of these protocols contain a tuple,(I, D), where I usually refers to an identity of a participant and D usually refers to the data selected by the participant. SSP are interested in providing confidentiality service to the tuple for hiding the relationship between I and D, and integrity service to the tuple after its formation to prevent the modification of the tuple. The thesis provides a schema to solve the instances of SSP by employing the electronic cash technology. The thesis makes a distinction between electronic cash technology and electronic payment technology. It will treat electronic cash technology to be a certification mechanism that allows the participants to obtain a certificate on their public key, without revealing the certificate or the public key to the certifier. The thesis abstracts the certificate and the public key as the data structure called anonymous token. It proposes design schemes for the peer-review, e-auction and e-voting protocols by employing the schema with the anonymous token abstraction. The thesis concludes by providing a variety of problem statements for future research that would further enrich the literature.
Resumo:
This paper presents early results from a pilot project which aims to investigate the relationship between proprietary structure of small and medium- sized Italian family firms and their owners’ orientation towards a “business evaluation process”. Evidence from many studies point out the importance of family business in a worldwide economic environment: in Italy 93% of the businesses are represented by family firms; 98% of them have less than 50 employees (Italian Association of Family Firms, 2004) so we judged family SMEs as a relevant field of investigation. In this study we assume a broad definition of family business as “a firm whose control (50% of shares or voting rights) is closely held by the members of the same family” (Corbetta,1995). “Business evaluation process” is intended here both as “continuous evaluation process” (which is the expression of a well developed managerial attitude) or as an “immediate valuation” (i.e. in the case of new shareholder’s entrance, share exchange among siblings, etc). We set two hypotheses to be tested in this paper: the first is “quantitative” and aims to verify whether the number of owners (independent variable) in a family firm is positively correlated to the business evaluation process. If a family firm is led by only one subject, it is more likely that personal values, culture and feelings may affect his choices more than “purely economic opportunities”; so there is less concern about monitoring economic performance or about the economic value of the firm. As the shareholders’ number increases, economic aspects in managing the firm grow in importance over the personal values and "value orientation" acquires a central role. The second hypothesis investigates if and to what extent the presence of “non- family members” among the owners affects their orientation to the business evaluation process. The “Cramer’s V” test has been used to test the hypotheses; both were not confirmed from these early results; next steps will lead to make an inferential analysis on a representative sample of the population.
Resumo:
Last week I called the Australian federal campaign the Inception election. As we lurch toward voting day on August 21, reality has tried to kick in, but to little avail. The two leaders, Prime Minister Julia Gillard (Labor) and challenger Tony Abbott (Liberal), both of whom recently toppled their predecessors in party-room coups, are now frantically searching for their own identity. And that’s what the election itself is increasingly about. Even though both have substantial track records as ministers, they are untried as national leaders. The real conundrum of the campaign – for them, if not for voters – is: Who the heck are these people?
Resumo:
This work reviews the rationale and processes for raising revenue and allocating funds to perform information intensive activities that are pertinent to the work of democratic government. ‘Government of the people, by the people, for the people’ expresses an idea that democratic government has no higher authority than the people who agree to be bound by its rules. Democracy depends on continually learning how to develop understandings and agreements that can sustain voting majorities on which democratic law making and collective action depends. The objective expressed in constitutional terms is to deliver ‘peace, order and good government’. Meeting this objective requires a collective intellectual authority that can understand what is possible; and a collective moral authority to understand what ought to happen in practice. Facts of life determine that a society needs to retain its collective competence despite a continual turnover of its membership as people die but life goes on. Retaining this ‘collective competence’ in matters of self-government depends on each new generation: • acquiring a collective knowledge of how to produce goods and services needed to sustain a society and its capacity for self-government; • Learning how to defend society diplomatically and militarily in relation to external forces to prevent overthrow of its self-governing capacity; and • Learning how to defend society against divisive internal forces to preserve the authority of representative legislatures, allow peaceful dispute resolution and maintain social cohesion.