32 resultados para Libel and slander--Pennsylvania
em Queensland University of Technology - ePrints Archive
Resumo:
Examines the effects of national surveillance and local right-wing intimidation on the literary works of author Eleanor Dark during the 1940s and 1950s in Australia. Reason Dark was subjected to national surveillance and right-wing intimidation; Relationship of Dark with local and national security forces; Accusations against the Dark family; Censorship faced by writers.
Resumo:
In the globalizing world, knowledge and information (and the social and technological settings for their production and communication) are now seen as keys to economic prosperity. The economy of a knowledge city creates value-added products using research, technology, and brainpower. The social benefit of knowledge-based urban development (KBUD); however, extends beyond aggregate economic growth.
Resumo:
Many governments world wide are attempting to increase accountability, transparency, and the quality of services by adopting information and communications technologies (ICTs) to modernize and change the way their administrations work. Meanwhile e-government is becoming a significant decision-making and service tool at local, regional and national government levels. The vast majority of users of these government online services see significant benefits from being able to access services online. The rapid pace of technological development has created increasingly more powerful ICTs that are capable of radically transforming public institutions and private organizations alike. These technologies have proven to be extraordinarily useful instruments in enabling governments to enhance the quality, speed of delivery and reliability of services to citizens and to business (VanderMeer & VanWinden, 2003). However, just because the technology is available does not mean it is accessible to all. The term digital divide has been used since the 1990s to describe patterns of unequal access to ICTs—primarily computers and the Internet—based on income, ethnicity, geography, age, and other factors. Over time it has evolved to more broadly define disparities in technology usage, resulting from a lack of access, skills, or interest in using technology. This article provides an overview of recent literature on e-government and the digital divide, and includes a discussion on the potential of e-government in addressing the digital divide.
Resumo:
In an empirical test and extension of Klein Conn and Sorra’s model of innovation implementation effectiveness, we apply structural equation modelling to identify the generalizability of their data-modified model in comparison with their theorised model. We examined the implementation of various types of innovations in a sample of 135 organizations. We found that the data supported the original model rather than the data-modified model, such that implementation climate mediated polices and practices and implementation effectiveness, while implementation effectiveness partially mediated the relationship between implementation climate and innovation effectiveness. Furthermore, we extend their model to suggest that non-financial resources availability plays a critical role in implementation policies and practices.
Resumo:
Others, like the prominent humanist and anti-Medicean agitator Francesco Filelfo, would soon join the first wave of exiles.4 Bruni was not only linked to such men by ties of patronage and friendship; he had also for many years acted as the chief ideologue of the preMedicean oligarchy.5 One might logically expect that he too would become a victim of Medici vengeance in 1434, or soon thereafter. Other scholars have stressed that Bruni-despite the occasional flamboyance of his civic rhetoric-was always an advocate of restricted government.8 While the power struggle between the Medici and their adversaries was real enough, the system Cosimo and his associates introduced after 1434 differed from its predecessor only in the consistency with which it was applied.
Resumo:
The technological environment in which contemporary small- and medium-sized enterprises (SMEs) operate can only be described as dynamic. The exponential rate of technological change, characterised by perceived increases in the benefits associated with various technologies, shortening product life cycles and changing standards, provides for the SME a complex and challenging operational context. The primary aim of this research was to identify the needs of SMEs in regional areas for mobile data technologies (MDT). In this study a distinction was drawn between those respondents who were full-adopters of technology, those who were partial-adopters, and those who were non-adopters and these three segments articulated different needs and requirements for MDT. Overall, the needs of regional SMEs for MDT can be conceptualised into three areas where the technology will assist business practices; communication, e-commerce and security
Resumo:
Structural health is a vital aspect of infrastructure sustainability. As a part of a vital infrastructure and transportation network, bridge structures must function safely at all times. However, due to heavier and faster moving vehicular loads and function adjustment, such as Busway accommodation, many bridges are now operating at an overload beyond their design capacity. Additionally, the huge renovation and replacement costs are a difficult burden for infrastructure owners. The structural health monitoring (SHM) systems proposed recently are incorporated with vibration-based damage detection techniques, statistical methods and signal processing techniques and have been regarded as efficient and economical ways to assess bridge condition and foresee probable costly failures. In this chapter, the recent developments in damage detection and condition assessment techniques based on vibration-based damage detection and statistical methods are reviewed. The vibration-based damage detection methods based on changes in natural frequencies, curvature or strain modes, modal strain energy, dynamic flexibility, artificial neural networks, before and after damage, and other signal processing methods such as Wavelet techniques, empirical mode decomposition and Hilbert spectrum methods are discussed in this chapter.