17 resultados para Illinois. Bureau of Employment Security
em QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast
Resumo:
In the struggle to assert and consolidate its power, the Hamas movement of the Palestinian territories has devised several strategies for control. In recognition that control of security remains a key goal for any power-seeker, following its election victory in January 2006, Hamas entered into a fierce and ultimately successful conflict with Fatah for control of the Palestinian Authority Ministry of Interior and Palestinian Security Forces (PSF) in the Gaza Strip. One way in which Hamas was able to achieve this objective was through the creation of its own internal ‘police’ force called the Tanfithya (Executive Force or EF). This article details an anatomy of the EF and the implications of this force in terms of Hamas' confrontation with opponents and its attempts at governance. It also examines the extent to which the EF can be considered to be a model of Islamic policing and its impact on secular rivals in the Gaza Strip.
Resumo:
Links between political violence and children's adjustment problems are well-documented. However, the mechanisms by which political tension and sectarian violence relate to children's well-being and development are little understood. This study longitudinally examined children's emotional security about community violence as a possible regulatory process in relations between community discord and children's adjustment problems. Families were selected from 18 working class neighborhoods in Belfast, Northern Ireland. Participants (695 mothers and children, M=12.17, SD=1.82) were interviewed in their homes over three consecutive years. Findings supported the notion that politically-motivated community violence has distinctive effects on children's externalizing and internalizing problems through the mechanism of increasing children's emotional insecurity about community. Implications are considered for understanding relations between political violence and child adjustment from a social ecological perspective.
Resumo:
In Jivraj v Hashwani, the Supreme Court considered what requirements are necessary for a relationship to be considered as an employment relationship for the purposes of determining the scope of domestic employment discrimination law. The Court held that an element of subordination was necessary for the relationship to be considered employment under a contract personally to do work. This article discusses what the Court in Jivraj meant by this requirement, contrasting two differing views of subordination. It examines some implications of the decision for the relationship between employment law and anti-discrimination law, and for recent debates on the scope of employment law more generally.
Resumo:
This article develops a firm-level analysis of how the quality of employment relations following acquisition by private equity firms (PEFs) is contingent upon the strategic intent of those firms and the post-acquisition organizational choices they make. The efficiency gains that PEFs seek in acquired companies are expected to encourage restructuring towards a minimalist organization. However, the form such an organization takes is seen to depend on whether PEF strategy is oriented primarily towards extracting short-term value from acquired assets rather than towards renewing and developing those assets. Contrasts in the process of restructuring and in organizational form associated with these two strategies will have different implications for the quality of employment relations. The way in which PEFs restructure the companies or units they acquire is the key intervening factor between the strategic intent of PEFs and impact they have on the quality of employment relations. © The Author(s) 2010.
Resumo:
Greater complexity and interconnectivity across systems embracing Smart Grid technologies has meant that cyber-security issues have attracted significant attention. This paper describes pertinent cyber-security requirements, in particular cyber attacks and countermeasures which are critical for reliable Smart Grid operation. Relevant published literature is presented for critical aspects of Smart Grid cyber-security, such as vulnerability, interdependency, simulation, and standards. Furthermore, a preliminary study case is given which demonstrates the impact of a cyber attack which violates the integrity of data on the load management of real power system. Finally, the paper proposes future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues. This paper also provides an overview of Smart Grid cyber-security with reference to related cross-disciplinary research topics.