664 resultados para Corporate networks
Resumo:
Reflects on the challenges facing China's efforts to reform its corporate governance framework, and the extent to which the modernisation can be reconciled with the country's cultural traditions. Examines the development of China's legal and economic reforms since 1978, the debate which these have generated ad the shortcomings of the current corporate governance regime. Discusses how Confucian principles might be applied to issues of director's duties and corporate governance, and explains the benefits of such an approach.
Resumo:
Examines the political and ideological influences on China's economic reforms since the early 1980s. Discusses the influence of the Chinese Communist Party and Confucianism on economic progress and assesses the effect of reforms. Outlines the requirement for new corporate governance laws to meet the needs of expanding private businesses and considers China's use and adaptation of some Western models of corporate governance. Comments on whether these fit easily with China's business culture. Criticises the shortcomings of China's corporate laws. Looks in particular at the telecommunications industry and at the Company Law 2006.
Resumo:
Economic reforms have transformed China into a modern economy - this requires greater emphasis on regulating markets and governing corporations to ensure economic growth continues. Yet, legal reforms are not as straightforward as transplanting Western models; more modification to suit Chinese political land cultural considerations needs to be incorporated. Likewise privatisation of the telecommuications sector does not mean that government influence in the new corporations cease. This is not necessarily negative as long as safeguards are in place. Plainly further reforms to the law and governance will be needed. Given that Confucian philosophy continues to play a central role in Chinese society and values, developing laws and governance practices from Confucian principles will arguably be appropriate for modern China.
Resumo:
Hong Kong is a thriving cosmopolitan business capital in Asia where much of its values are shaped by both pragmatism and its Chinese heritage. Against this backdrop, Hong Kong's corporate law and governance principles are mostly British, much of which remains quite alien to the local business community. Like may other countries, Hong Kong is obligated by international markets to embrace these requirements. Yet many business operators lack even the understanding of basic company law and governance expectations, partly because the provisions are incompatible with their values and corporate cultures. The paper will argue that Confucian philosophies should be the basis for developing a corporate governance framework for Hong Kong, given that Confucius; doctrines are already entrenched in the island's traditions and identity.
Resumo:
On the surface the subjects of Corporate Social Responsibility (CSR) and Critical Management Studies (CMS) seem to be closely related. Both are concerned with reflecting on the impact of management and organisation on employees, the wider community and the environment. Both suggest that there may be a need for organisations to take responsibility for and account of people other than shareholders and both have used the concept of accountability to suggest that organisations may need to do more than just comply with the legal framework.
Resumo:
In the wake of recent corporate collapses, 'corporate governance' has received unprecedented levels of attention. It can be narrowly defined as how a company is directed and steered. The responsibility of steering a company is entrusted with the board of directors, who become the focus of governance mechanisms.Yet this is not as straightforward as it appears - Australia has experienced massive shifts in business regulations over the past two decades. One innovation in Australian business regulation is 'enforced self-regulation' which combines the benefits of voluntary self-regulation with the coercive power of the State, implemented via a compliance program. A possible hazard of compliance system is that management might treat this responsibility as a 'box ticking' exercise. Therefore effective governance and compliance entails more than setting up internal and regulatory mechanisms; the willingness of various stakeholders to collaborate is crucial. This suggests that managing relationships between stakeholders of an organization is the key to averting corporate collapses.
Resumo:
Poly(L-lactide-co-succinic anhydride) networks were synthesised via the carbodiimide-mediated coupling of poly(L-lactide) (PLLA) star polymers. When 4-(dimethylamino)pyridine (DMAP) alone was used as the catalyst gelation did not occur. However, when 4-(dimethylamino)pyridinium p-toluenesulfonate (DPTS), the salt of DMAP and p-toluenesulfonic acid (PTSA), was the catalyst, the networks obtained had gel fractions comparable to those which were reported for networks synthesised by conventional methods. Greater gel fractions and conversion of the prepolymer terminal hydroxyl groups were observed when the hydroxyl-terminated star prepolymers reacted with succinic anhydride in a one-pot procedure than when the hydroxyl-terminated star prepolymers reacted with presynthesised succinic-terminated star prepolymers. The thermal properties of the networks, glass transition temperature (Tg), melting temperature (Tm) and crystallinity (Xc) were all strongly influenced by the average molecular weights between the crosslinks ((M_c). The network with the smallest (M_c )(1400 g/mol) was amorphous and had a Tg of 59 °C while the network with the largest (M_c ) (7800 g/mol) was 15 % crystalline and had a Tg of 56 °C.
Resumo:
We investigate the roles of finn and country level agency conflicts in determining corporate payout policics. Based on a large sample of 29,610 firms in 42 countries from 2001 to 2006, we show there is a form of "pecking order" in investors' ability to extract cash (whether as dividends only or share repurchases) from firms. Although investors are able to use their legal powers to extract cash from firms in high protection countries, their ability to do so can be substantially hindered when agency costs at the firm level are high. In poor protection countries, investors seem to take whatever cash they can get, even though the amount may be small, and with scant regard for investment opportunities and firm level agency conflicts. Finally, compared to repurchases, we find dividends are more likely to be the sole method of payout in high protection countries and in non insider-dominated firms.
Resumo:
We present algorithms, systems, and experimental results for underwater data muling. In data muling a mobile agent interacts with static agents to upload, download, or transport data to a different physical location. We consider a system comprising an Autonomous Underwater Vehicle (AUV) and many static Underwater Sensor Nodes (USN) networked together optically and acoustically. The AUV can locate the static nodes using vision and hover above the static nodes for data upload. We describe the hardware and software architecture of this underwater system, as well as experimental data. © 2006 IEEE.
Resumo:
While sensor networks have now become very popular on land, the underwater environment still poses some difficult problems. Communication is one of the difficult challenges under water. There are two options: optical and acoustic. We have designed an optical communication board that allows the Fleck’s to communicate optically. We have tested the resulting underwater sensor nodes in two different applications.
Resumo:
In this paper, the authors propose a new structure for the decoupling of circulant symmetric arrays of more than four elements. In this case, network element values are again obtained through a process of repeated eigenmode decoupling, here by solving sets of nonlinear equations. However, the resulting circuit is much simpler and can be implemented on a single layer. The corresponding circuit topology for the 6-element array is displayed in figure diagrams. The procedure will be illustrated by considering different examples.
Resumo:
Ecological networks are often represented as utopian webs of green meandering through cities, across states, through regions and even across a country (Erickson, 2006, p.28; Fabos, 2004, p.326; Walmsley, 2006). While this may be an inspiring goal for some in developed countries, the reality may be somewhat different in developing countries. China, in its shift to urbanisation and suburbanisation, is also being persuaded to adjust its planning schemes according to these aspirational representations of green spaces (Yu et al, 2006, p.237; Zhang and Wang, 2006, p.455). The failure of other countries to achieve regional goals of natural and cultural heritage protection on the ground in this way (Peterson et al, 2007; Ryan et al, 2006; von Haaren and Reich, 2006) suggests that there may be flaws in the underpinning concepts that are widely circulated in North American and Western European literature (Jongman et al, 2004; Walmsley, 2006). In China, regional open space networks, regional green infrastructure or regional ecological corridors as we know them in the West, are also likely to be problematic, at least in the foreseeable future. Reasons supporting this view can be drawn from lessons learned from project experience in landscape planning and related fields of study in China and overseas. Implementation of valuable regional green space networks is problematic because: • the concept of region as a spatial unit for planning green space networks is ambiguous and undefinable for practical purposes; • regional green space networks traditionally require top down inter-governmental cooperation and coordination which are generally hampered by inequalities of influence between and within government agencies; • no coordinating body with funding powers exists for regional green space development and infrastructure authorities are still in transition from engineering authorities; • like other infrastructure projects, green space is likely to become a competitive rather than a complementary resource for city governments; • stable long-term management, maintenance and uses of green space networks must fit into a ‘family’ social structure rather than a ‘public good’ social structure, particularly as rural and urban property rights are being re-negotiated with city governments; and • green space provision is a performance indicator of urban improvement in cities within the city hierarchy and remains quantitatively-based (land area, tree number and per capita share) rather than qualitatively-based with local people as the focus.
Resumo:
Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.
Resumo:
The ad hoc networks are vulnerable to attacks due to distributed nature and lack of infrastructure. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. The clustering protocols can be taken as an additional advantage in these processing constrained networks to collaboratively detect intrusions with less power usage and minimal overhead. Existing clustering protocols are not suitable for intrusion detection purposes, because they are linked with the routes. The route establishment and route renewal affects the clusters and as a consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore a trusted monitoring node should be available to detect and respond against intrusions in time. This can be achieved only if the clusters are stable for a long period of time. If the clusters are regularly changed due to routes, the intrusion detection will not prove to be effective. Therefore, a generalized clustering algorithm has been proposed that can run on top of any routing protocol and can monitor the intrusions constantly irrespective of the routes. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes in the network. Clustering is also useful to detect intrusions collaboratively since an individual node can neither detect the malicious node alone nor it can take action against that node on its own.
Resumo:
Mobile ad-hoc networks (MANETs) are temporary wireless networks useful in emergency rescue services, battlefields operations, mobile conferencing and a variety of other useful applications. Due to dynamic nature and lack of centralized monitoring points, these networks are highly vulnerable to attacks. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. We take benefit of the clustering concept in MANETs for the effective communication between nodes, where each cluster involves a number of member nodes and is managed by a cluster-head. It can be taken as an advantage in these battery and memory constrained networks for the purpose of intrusion detection, by separating tasks for the head and member nodes, at the same time providing opportunity for launching collaborative detection approach. The clustering schemes are generally used for the routing purposes to enhance the route efficiency. However, the effect of change of a cluster tends to change the route; thus degrades the performance. This paper presents a low overhead clustering algorithm for the benefit of detecting intrusion rather than efficient routing. It also discusses the intrusion detection techniques with the help of this simplified clustering scheme.