103 resultados para Democratic Party (Ill.)
Resumo:
Preservice teachers consistently report that managing student behaviour is one of their major concerns prior to and during practicum (Capel, 1997; Kyriacou & Stephens, 1999). Not surprisingly, preservice teachers are keen to gain knowledge and understanding of effective classroom management approaches that facilitate the development of positive learning environments in which students are engaged in learning. Establishing democratic teaching practices that allow student choice, communicating in a positive, helpful manner, ensuring the right to teach and the right to learn without disruptions is upheld, and promoting self-discipline are important steps in preventing misbehavior and developing a democratic community of learners.
Resumo:
This article argues that a semantic shift in the crowd in Vietnam over the last decade has allowed public space to become a site through which transgressive ideologies and desires may have an outlet. At a time of accelerating social change, the state has effectively delimited public criticism yet a fragile but assertive form of Vietnamese democratic practice has arisen in public space, at the margins of official society, in sites previously equated with state control. Official state functions attract only small audiences, and rather than celebrating the dominance of the party, reveal the disengagement of the populace in the party's activities. Where crowds were always a component of state (stage)-managed events, now public spaces are attracting large numbers of people for supposedly non-political activities which may become transgressive acts condemned by the regime. In support of the notion that crowding is an opening up of the possibility of more subversive political actions, the paper presents an analysis of recent crowd formations and the state's reaction to them. The analysis reveals the modalities through which popular culture has provided the public with the means to transcend the constraints of official, authorized, and legitimate codes of behaviour in public space. Changes in the use of public space, it is argued, map the sets of relations between the public and the state, making these transforming relationships visible, although fraught with contradictions and anomalies.
Resumo:
This article considers recent cases on guarantees of business loans to identify the lending practices that led the court to set aside the guarantee as against the creditor on the basis that the creditor had engaged in unconscionable conduct. It also explores the role of industry codes of practice in preventing unconscionable conduct, including whether there is a correlation between commitment to an industry code and higher standards of lending practices; whether compliance with an industry code would have produced different outcomes in the cases considered; and whether lenders need to do more than comply with an industry code to ensure their practices are fair and reasonable.
Resumo:
In our exploration of the methodological possibilities and challenges of evaluation practice that foregrounds a democratic approach, we argue that having sensitivity to participants’ different positions, ideological perspectives, and values, and an understanding of the existing power relationships are paramount for the evaluators if the evaluation is to achieve its goals. This chapter draws on our experiences as evaluators in Australia, where school leaders and teachers are currently experiencing significant curriculum and assessment changes, and now work in a context of heightened accountability. Our evaluation practices with schools are used to illustrate how democratic practices can be incorporated into evaluation in ways that provide opportunities and support for school self-evaluation. It is paramount to recognise that evaluation is a political and ideological practice, and therefore is not a neutral process. Our argument is that it remains the responsibility of evaluators to design spaces that build sustainable relationships with participants and the targets of the programmes being evaluated; ensure that dialogue and deliberation are valued between all stakeholders; represent a range of interests; and give a service back to the evaluated communities by offering understandings and promoting reflective practice and informed decision-making throughout programme implementation.
Resumo:
Poor complaint management may result in organizations losing customers and revenue. Consumers exhibit negative emotional responses when dissatisfied and this may lead to a complaint to a third-party organization. Since little information is available on the role of emotion in the consumer complaint process or how to manage complaints effectively, we offer an emotions perspective by applying Affective Events Theory (AET) to complaint behavior. This study presents the first application of AET in a consumption context and advances a theoretical framework supported by qualitative research for emotional responses to complaints. In contrast to commonly held views on gender and emotion, men as well as women use emotion-focused coping to complain.
Resumo:
Paul Keating recently noted that what the Rudd Government lacked was an overall narrative or story. I would like to argue that Paul Keating is correct and suggest a narrative: that of retrieving and defending aspects of our social democratic heritage from some of the damaging effects wrought by neo-liberalism. Moreover I want to argue that criminal justice policy needs to be seen as a part of this broader narrative, which requires it being prised from its current site, where it is wedged firmly in the narrative of law and order.
Resumo:
Background: Tradition has led us to believe that a heavily sedated patient is a comfortable, settled, compliant patient for whom sedation will improve outcome. The current move witnessed in clinical practice today of limiting sedation has led health care in recent years to question the benefit and necessity of routine, continuous sedation for all patients requiring mechanical ventilation. However, as a result there has been a rise in the amount of agitation being reported as being experienced by patients with the daily withdrawal of sedation. Aims: The purpose of this paper is to review current arguments for and against perserving with agitation versus re-sedating, when it presents during the daily sedation breaks. Findings: Of the literature reviewed, the question to re-sedate the mechanically ventilated agitated patient during sedation breaks remains an issue of contention. Although there is evidence focusing on the psychological effects of long-term sedation and sedation breaks specifically, the complex nature of critical illness in some cases means that individualized care is of paramount importance and in-depth assessment is crucial when deciding to re-sedate in the face of undetermined agitation. Agitation has been closely linked with several incidents that can be detrimental to patient safety, such as removal of lines and unplanned self-extubation. Conclusion: The recommendations of this review are that nurses should re-commence sedation if the patient becomes agitated following a sedation break. Aims: The purpose of this paper is to review current arguments for and against perserving with agitation versus re-sedating, when it presents during the daily sedation breaks. Findings: Of the literature reviewed, the question to re-sedate the mechanically ventilated agitated patient during sedation breaks remains an issue of contention. Although there is evidence focusing on the psychological effects of long-term sedation and sedation breaks specifically, the complex nature of critical illness in some cases means that individualized care is of paramount importance and in-depth assessment is crucial when deciding to re-sedate in the face of undetermined agitation. Agitation has been closely linked with several incidents that can be detrimental to patient safety, such as removal of lines and unplanned self-extubation. Conclusion: The recommendations of this review are that nurses should re-commence sedation if the patient becomes agitated following a sedation break.
Resumo:
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive adversary indicate that every n-variate function can be computed by n participants, such that no set of size t < n/2 participants learns any additional information other than what they could derive from their private inputs and the output of the protocol. We study unconditionally secure MPC protocols in the presence of a passive adversary in the trusted setup (‘semi-ideal’) model, in which the participants are supplied with some auxiliary information (which is random and independent from the participant inputs) ahead of the protocol execution (such information can be purchased as a “commodity” well before a run of the protocol). We present a new MPC protocol in the trusted setup model, which allows the adversary to corrupt an arbitrary number t < n of participants. Our protocol makes use of a novel subprotocol for converting an additive secret sharing over a field to a multiplicative secret sharing, and can be used to securely evaluate any n-variate polynomial G over a field F, with inputs restricted to non-zero elements of F. The communication complexity of our protocol is O(ℓ · n 2) field elements, where ℓ is the number of non-linear monomials in G. Previous protocols in the trusted setup model require communication proportional to the number of multiplications in an arithmetic circuit for G; thus, our protocol may offer savings over previous protocols for functions with a small number of monomials but a large number of multiplications.
Resumo:
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P 1, ..., P n , each with their own private input x i , to compute a function Y = F(x 1, ..., x n ), such that at the end of the protocol, all participants learn the correct value of Y, while secrecy of the private inputs is maintained. Classical results in the unconditionally secure MPC indicate that in the presence of an active adversary, every function can be computed if and only if the number of corrupted participants, t a , is smaller than n/3. Relaxing the requirement of perfect secrecy and utilizing broadcast channels, one can improve this bound to t a < n/2. All existing MPC protocols assume that uncorrupted participants are truly honest, i.e., they are not even curious in learning other participant secret inputs. Based on this assumption, some MPC protocols are designed in such a way that after elimination of all misbehaving participants, the remaining ones learn all information in the system. This is not consistent with maintaining privacy of the participant inputs. Furthermore, an improvement of the classical results given by Fitzi, Hirt, and Maurer indicates that in addition to t a actively corrupted participants, the adversary may simultaneously corrupt some participants passively. This is in contrast to the assumption that participants who are not corrupted by an active adversary are truly honest. This paper examines the privacy of MPC protocols, and introduces the notion of an omnipresent adversary, which cannot be eliminated from the protocol. The omnipresent adversary can be either a passive, an active or a mixed one. We assume that up to a minority of participants who are not corrupted by an active adversary can be corrupted passively, with the restriction that at any time, the number of corrupted participants does not exceed a predetermined threshold. We will also show that the existence of a t-resilient protocol for a group of n participants, implies the existence of a t’-private protocol for a group of n′ participants. That is, the elimination of misbehaving participants from a t-resilient protocol leads to the decomposition of the protocol. Our adversary model stipulates that a MPC protocol never operates with a set of truly honest participants (which is a more realistic scenario). Therefore, privacy of all participants who properly follow the protocol will be maintained. We present a novel disqualification protocol to avoid a loss of privacy of participants who properly follow the protocol.
Resumo:
The Internet Corporation for Assigned Names and Numbers (ICANN) is an institution besieged. It has endeavored to be democratic but its attempts to do so have been disastrous. The typical explanation for this is that the problem is with ICANN: it fails to meet its democratic obligations. My view is that the problem is with our understanding of "democracy." Democracy is an empty concept that fails to describe few, if any, of our genuine political commitments. In the real world, the failings inherent in "democracy" have been papered over by some unusual characteristics of the physical political process. However, in online trans-national institutions like ICANN, democracy is exposed as a poor substitute for a number of other conceptions of our political commitments. This Article seeks to articulate these political commitments and to explain why democracy and ICANN are such a poor mix. It begins by charting the rise of ICANN and its attempts to be democratic. It then explains why democracy is an empty shell of a concept. It then explores some features of democracy and ICANN, explaining why the online world exposes limitations in implications of democracy such as the nature of the demos, the idea of constituencies, direct democracy, voting, and the like. It concludes that ICANN's example demonstrates that democracy is in fact anything but a coherent general theory of political action. We need to consider, then, whether we should continue to berate ICANN for its undemocratic actions.
Resumo:
In ASIC v Atlantic 3 Financial (Aust) Pty Ltd [2006] QCA 540 the Queensland Court of Appeal dismissed an appeal from the decision of Mullins J at first instance in ASIC v Atlantic 3 Financial (Aust) Pty LTd [2006] QSC 152, the majority concluding that the client agreement in issue was not inconsistent with s48 of the Queensland Law Society Act 1952.
Resumo:
In Kimtran Pty Ltd v Downie [2003] QDC 043 the court allowed in part an appeal from the refusal by the Queensland Building Tribunal to order the respondent liquidators pay the appellants' costs of proceedings in the Tribunal. The decision involved an examination of authorities which have considered the circumstances in which it is in the interests of justice to make an order for costs against a non-party.
Resumo:
The decision in Hook v Boreham & QBE Insurance (Australia) Limited [2006] QDC 304 considered whether the court should go further than order that costs be assessed on the indemnity basis, but should also specify the basis by which those indemnity costs should be determined. The decision makes it clear that under r704(3) of the Uniform Civil Procedure Rules, questions of that nature are ordinarily preserved to the discretion of the Registrar.
Resumo:
Objective: To examine the effects of personal and community characteristics, specifically race and rurality, on lengths of state psychiatric hospital and community stays using maximum likelihood survival analysis with a special emphasis on change over a ten year period of time. Data Sources: We used the administrative data of the Virginia Department of Mental Health, Mental Retardation, and Substance Abuse Services (DMHMRSAS) from 1982-1991 and the Area Resources File (ARF). Given these two sources, we constructed a history file for each individual who entered the state psychiatric system over the ten year period. Histories included demographic, treatment, and community characteristics. Study Design: We used a longitudinal, population-based design with maximum likelihood estimation of survival models. We presented a random effects model with unobserved heterogeneity that was independent of observed covariates. The key dependent variables were lengths of inpatient stay and subsequent length of community stay. Explanatory variables measured personal, diagnostic, and community characteristics, as well as controls for calendar time. Data Collection: This study used secondary, administrative, and health planning data. Principal Findings: African-American clients leave the community more quickly than whites. After controlling for other characteristics, however, race does not affect hospital length of stay. Rurality does not affect length of community stays once other personal and community characteristics are controlled for. However, people from rural areas have longer hospital stays even after controlling for personal and community characteristics. The effects of time are significantly smaller than expected. Diagnostic composition effects and a decrease in the rate of first inpatient admissions explain part of this reduced impact of time. We also find strong evidence for the existence of unobserved heterogeneity in both types of stays and adjust for this in our final models. Conclusions: Our results show that information on client characteristics available from inpatient stay records is useful in predicting not only the length of inpatient stay but also the length of the subsequent community stay. This information can be used to target increased discharge planning for those at risk of more rapid readmission to inpatient care. Correlation across observed and unobserved factors affecting length of stay has significant effects on the measurement of relationships between individual factors and lengths of stay. Thus, it is important to control for both observed and unobserved factors in estimation.
Resumo:
Digital signature is a breakthrough of modern cryptographic systems. A (t, n) threshold digital signature allows every set of cardinality t or more (out-of n) co-signers to authenticate a message. In almost all existing threshold digital signatures the threshold parameter t is fixed. There are applications, however, in which the threshold parameter needs to be changed from time to time. This paper considers such a scenario, in order to discuss relevant problems, and proposes a model that solves the related problems.