983 resultados para Chinese identity
Resumo:
In this paper, we follow Jegadeesh and Titman's (1993, Journal of Finance) approach to examine 25 momentum/contrarian trading strategies using monthly stock returns in China for the period from 1994 to 2007. Our results suggest that there is no momentum profitability in any of the 25 strategies. In contrast, there is some evidence of reversal effects where the past winners become losers and past losers become winners afterward. The contrarian profit is statistically significant for the strategies using short formation and holding periods, especially for the formation periods of 1 to 3 months and the holding periods of 1 to 3 months. The contrarian strategies can generate about 12% per annum on average. Moreover, we follow Heston and Sadka (2008, Journal of Financial Economics) to investigate where there is any seasonal pattern in the cross-sectional variation of average stock returns in our momentum/contrarian strategies. There is no evidence of any seasonal pattern, and the results are robust to different formation and holding periods.
Resumo:
OBJECTIVE To examine the psychometric properties of a Chinese version of the Problem Areas In Diabetes (PAID-C) scale. RESEARCH DESIGN AND METHODS The reliability and validity of the PAID-C were evaluated in a convenience sample of 205 outpatients with type 2 diabetes. Confirmatory factor analysis, Bland-Altman analysis, and Spearman's correlations facilitated the psychometric evaluation. RESULTS Confirmatory factor analysis confirmed a one-factor structure of the PAID-C (χ2/df ratio = 1.894, goodness-of-fit index = 0.901, comparative fit index = 0.905, root mean square error of approximation = 0.066). The PAID-C was associated with A1C (rs = 0.15; P < 0.05) and diabetes self-care behaviors in general diet (rs = −0.17; P < 0.05) and exercise (rs = −0.17; P < 0.05). The 4-week test-retest reliability demonstrated satisfactory stability (rs = 0.83; P < 0.01). CONCLUSIONS The PAID-C is a reliable and valid measure to determine diabetes-related emotional distress in Chinese people with type 2 diabetes.
Resumo:
Immediate indefeasibility is the cornerstone of the Torrens system of land registration. However, when combined with the apparent ease in which forged mortgages become registered, the operation of this doctrine can come into question. This article seeks to argue that, rather than question indefeasibility, the focus should be on the verification of identity of parties to land transactions. Whilst no system can ever be infallible, it is suggested that by correctly imposing the responsibility for identity verification on the appropriate individual, the Torrens system can retain immediate indefeasibility as its paramount principle, yet achieve the optimum level of fairness in terms of allocation of responsibility and loss. With the dawn of a new era of electronic conveyancing about to begin, the framework suggested here provides a model for minimising the risks of forged mortgages and appropriately allocating the loss.
Resumo:
This study aims to benchmark Chinese TEFL academics’ research productivities, as a way to identify and, subsequently, address research productivity issues. This study investigated 182 Chinese TEFL academics’ research outputs and perceptions about research across three Chinese higher education institutions using a literature-based survey. ANOVA, t-tests and descriptive statistics were used to analyse data from and between the three institutions. Findings indicated that more than 70% of the TEFL academics had produced no research in 10 of the 12 research output fields during 2004-2008. The English Language and Literature Department in the national university outperformed all other departments at the three institutes for most of the research output categories. While a majority of the participants seemed to hold positive perceptions about research, t-tests and ANOVA indicated that their research perceptions were significantly different across institutes and departments. Developing TEFL research capacity requires tertiary institutions to provide research-learning opportunities.
Resumo:
This study aims to benchmark Chinese TEFL academics’ research productivities to identify and address research productivity issues. Using a literature-based survey, this study examined 182 Chinese TEFL academics’ research outputs, perceptions about research, and personal dispositions for research and workplace context for research across three Chinese higher education institutions. Results indicated that a majority of the TEFL academics produced no research in most research categories over the period 2004-2008. While they were positive about the benefits of research, they did not rate their personal dispositions for research and workplace context for research highly. The findings have implications for enhancing academics’ research capacity in Chinese institutions, TEFL departments, and other similar contexts.
Resumo:
Details of a project which fictionalises the oral history of the life of the author's polio-afflicted grandmother Beth Bevan and her experiences at a home for children with disabilities are presented. The speech and language patterns recognised in the first person narration are described, as also the sense of voice and identity communicated through the oral history.
Resumo:
The purpose of this study is to contribute to the cross-disciplinary body of literature of identity and organisational culture. This study empirically investigated the Hatch and Schultz (2002) Organisational Identity Dynamics (OID) model to look at linkages between identity, image, and organisational culture. This study used processes defined in the OID model as a theoretical frame by which to understand the relationships between actual and espoused identity manifestations across visual identity, corporate identity, and organisational identity. The linking processes of impressing, mirroring, reflecting, and expressing were discussed at three unique levels in the organisation. The overarching research question of How does the organisational identity dynamics process manifest itself in practice at different levels within an organisation? was used as a means of providing empirical understanding to the previously theoretical OID model. Case study analysis was utilised to provide exploratory data across the organisational groups of: Level A - Senior Marketing and Corporate Communications Management, Level B - Marketing and Corporate Communications Staff, and Level C - Non-Marketing Managers and Employees. Data was collected via 15 in-depth interviews with documentary analysis used as a supporting mechanism to provide triangulation in analysis. Data was analysed against the impressing, mirroring, reflecting, and expressing constructs with specific criteria developed from literature to provide a detailed analysis of each process. Conclusions revealed marked differences in the ways in which OID processes occurred across different levels with implications for the ways in which VI, CI, and OI interact to develop holistic identity across organisational levels. Implications for theory detail the need to understand and utilise cultural understanding in identity programs as well as the value in developing identity communications which represent an actual rather than an espoused position.
Resumo:
This paper investigates the research question ‘What is the effect of co-ethnic and non coethnic networking on business performance in Chinese immigrant businesses?’ The research will discuss key themes such as the extent to which Chinese immigrant entrepreneurs are embedded in co-ethnic and non co-ethnic networks and the affect of embeddedness on business performance, such as the entrepreneur’s satisfaction and business growth. Research on immigrant entrepreneurship has emerged as an important new area of inquiry within the field of entrepreneurship. The increased importance of the subject is due in part to major immigrant receiving countries, such as Australia, the United States and Canada, experiencing a high growth rate in their immigrant population. Reflecting on the existing research on immigrant entrepreneurship, it was decided to investigate the role of embeddedness on entrepreneurial business performance. This research seeks to identify the impact of embeddedness in co-ethnic and non co-ethnic networks on business performance of Chinese immigrant entrepreneurs in Australia. Chinese immigrant restaurant entrepreneurs in southeast Queensland, Australia were studied. The result expands on existing research on immigrant entrepreneurship, since the majority of immigrant entrepreneurship studies have been conducted on the United States and Canada immigrant experiences, but few have been conducted in the Australian immigrant entrepreneur context. This thesis also adds empirical testing to a research area with little empirical testing. The results indicated that embeddedness in the co-ethnic network is positively related to business performance measured by both growth and satisfaction. Embeddedness in the non co-ethnic network of the Chinese immigrant entrepreneurs in Australia did not show a similar pattern in accordance with studies conducted in the United States and Canada. This result is interesting and creates the opportunity for future research employing a comparative study.
Resumo:
This article argues that Chinese traditional values do matter in Chinese corporate governance. The object is to report on the preliminary findings of a project supported by the General Research Fund in Hong Kong (HK). Thus far the survey results from HK respondents support the authors’ hypothesis. As such, traditional Chinese values should be on the agenda of the next round of company law reforms in China
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
From a ‘cultural science’ perspective, this paper traces one aspect of a more general shift, from the realist representational regime of modernity to the productive DIY systems of the internet era. It argues that collecting and archiving is transformed by this change. Modern museums – and also broadcast television – were based on determinist or ‘essence’ theory; while internet archives like YouTube (and the internet as an archive) are based on ‘probability’ theory. The paper goes through the differences between modernist ‘essence’ and postmodern ‘probability’; starting from the obvious difference that in a museum each object is selected by experts for its intrinsic properties, while on the internet you don’t know what you will find. The status of individual objects is uncertain, although the productivity of the overall archive is unlimited. The paper links these differences with changes in contemporary culture – from a Newtonian to a quantum universe, progress to risk, institutional structure to evolutionary change, objectivity to uncertainty, identity to performance. Borrowing some of its methodology from science fiction, the paper uses examples from museums and online archives, ranging from the oldest stone tool in the world to the latest tribute vid on the net.
Resumo:
Aim and objective: The primary aim was to examine the prevalence of poststroke depression in Chinese stroke survivors six months after discharge from a rehabilitation hospital. A second aim was to determine whether six-month poststroke depression was associated with psychological, social and physical outcomes and demographic variables.---------- Background: There has been increasing recognition of the influence of depression on poststroke recovery. While some previous studies report associations between depression and social, psychological, physical and clinical outcomes, few studies had sufficient sample sizes for regression analysis thereby limiting the clinical applicability of their findings. ---------- Design: A cross-sectional design was used.---------- Method: Data were collected from 124 male and 86 female stroke survivors (mean age 71Æ7, SD 10Æ2 years). The Geriatric Depression Scale was used to measure depression, the State Self-esteem Scale to measure state self-esteem, the London Handicap Scale to measure participation restriction, the Social Support Questionnaire to measure satisfaction with social support and the Modified Barthel Index to measure functional ability. Results. Forty-two survivors (20Æ5%) reported mild and 33 (16Æ1%) reported severe depression. The presence of depression was associated with low levels of state self-esteem, social support satisfaction and functional ability. Logistic regression analysis revealed that these variables were statistically significant in predicting the probability of having depression (p < 0Æ05). ---------- Conclusions: Analyses in the present study revealed distinct patterns of correlates of depression, and the results were in agreement with prior studies that depression has a consistent positive ssociation with physical disability, living arrangements and social support and no significant association with the different types of brain lesion. Relevance to clinical practice. There is a need, routinely, to assess stroke survivors for depression and, where necessary, to intervene with the aim of enhancing psychological and social well-being.
Resumo:
Confucius was and still is one of the most eminent Chinese philosophers. Such is the importance of Confucius’s teachings; it had influenced all aspects of social life in Chinese societies. In the post-Enron, post-Worldcom, and post-Global Financial Crisis era there are raising doubts in the mantra of the so-called conventional wisdom about law and economic order. Whilst many recent publications offered solutions to those problems like advocating for more laws, rules or reforms in regulatory institutions to enhance the regulation of corporate governance. What Confucius advocated was a non-legal, social mode of regulation based on moral ideals that should be embedded into the minds of every person. Whilst this is an ancient concept from primitive societies, its relevance and merits could be seen in modern Chinese societies like Hong Kong. In essence, Confucian principles of governance build on relational and paternalistic order based on moral ideals.
Resumo:
This document outlines the system submitted by the Speech and Audio Research Laboratory at the Queensland University of Technology (QUT) for the Speaker Identity Verification: Application task of EVALITA 2009. This competitive submission consisted of a score-level fusion of three component systems; a joint-factor analysis GMM system and two SVM systems using GLDS and GMM supervector kernels. Development evaluation and post-submission results are presented in this study, demonstrating the effectiveness of this fused system approach. This study highlights the challenges associated with system calibration from limited development data and that mismatch between training and testing conditions continues to be a major source of error in speaker verification technology.