706 resultados para Breach of trust
Resumo:
The decision of Greppo v Jam-Cal Bundaberg Pty Ltd [2015] QCA 131 illustrates a defect in s 128 of the Property Law Act 1974(Qld) which gives a right to a lessee to apply for relief against forfeiture against loss of a right to exercise an option to renew. The defect arises because the legislation does not adequately deal with breaches that occur after the exercise of the option but before the expiry of the lease. Most commercial leases of all kinds have a standard provisions, as the lease in this case, as a conditions of the exercise of the option to renew that the lessee will have given notice of exercise within the time specified to the lessor and will have up to the date of expiry of the lease paid all rent and observed all lessee’s covenants. The difficulties occur because invariably an option must be exercised before the expiry of the lease when a lessee may not be in breach of the lease but may later prior to the expiry of the lease fall into breach. As this decision indicates,at least in Queensland, that the lessee who desires to challenge the lessor’s right to enforce those conditions can neither seek relief under s 128 against forfeiture of the right to exercise the option ,or indeed, under s 124 of the Property Law Act 1974 to preserve the agreement for lease brought about by the otherwise regular exercise of the option to renew. The decision cries out for legislative reform along the lines of s 133E of the Conveyancing Act 1919(NSW) which was amended in 2001 to meet this contingency.
Resumo:
Purpose In the mainstream relationship management literature, critical appraisal of the relationship paradigm in an international setting is virtually non-existent. The extant literature reveals a gap in terms of linking relationship management theories with international management. Furthermore, little research attention has been paid to synthesise the existing theories in a cohesive manner towards developing a theoretical paradigm in the interface of the importer-supplier relationship dyad. Thus, the purpose of this paper is to strengthen the theoretical grounds of relationship marketing in an international setting in an importer-exporter relationship context. Design/methodology/approach The paper follows a comprehensive review approach and applies the fundamental theory of trust and commitment to identify the relational factors. More precisely, the paper identifies and applies other relevant theories such as internationalisation process theory, resource-based theory of the firm, dependence theory and transaction cost theory in developing an innovative theoretical paradigm. Findings Based on the integration of extant theories, this paper proposes a new direction in the theoretical realm of the trust and commitment building process within an importer and supplier relationship management paradigm. The research concludes that trust and commitment are the focal factors within the international relational paradigm. Research limitations/implications The proposed research direction suggests an emerging framework integrating mainstream theoretical variables of trust and commitment in importer and foreign-supplier context. This novel framework has the potential for use in further research. Originality/value This paper advances a grounded theoretical exploration within an international management domain in the context of importers and foreign-suppliers.
Resumo:
In a medical negligence context, and under the causation provisions enacted pursuant to Civil Liability Legislation in most Australian jurisdictions, the normative concept of “scope of liability” requires a consideration of whether or not and why a medical practitioner should be responsible for a patient’s harm. As such, it places a limit on the extent to which practitioners are deemed liable for a breach of the duty of care owed by them, in circumstances where a legal factual connection between that breach and the causation of a patient’s harm has already been shown. It has been said that a determination of causation requires ‘the identification and articulation of an evaluative judgement by reference to “the purposes and policy of the relevant part of the law”’: Wallace v Kam (2013) 297 ALR 383, 388. Accordingly, one of the normative factors falling within scope of liability is an examination of the content and purpose of the rule or duty of care violated – that is, its underlying policy and whether this supports an attribution of legal responsibility upon a practitioner. In this context, and with reference to recent jurisprudence, this paper considers: the policy relevant to a practitioner’s duty of care in each of the areas of diagnosis, treatment and advice; how this has been used to determine an appropriate scope of liability for the purpose of the causation inquiry in medical negligence claims; and whether such an approach is problematic for medical standards or decision-making.
Resumo:
Online grocery shopping has enjoyed strong growth and it is predicted this channel will continue to grow exponentially in the coming years. While online shopping has attracted an abundance of research interest, examinations of online grocery shopping behaviour are only now emerging. Shopping online for groceries differs considerably from general online shopping due to the perishability and variability of the product, and frequency of the shopping activity. Two salient gaps underpin this research into online grocery shopping. This study responds to calls to investigate the online shoppers’ experience in the context of online purchasing frequency. Second, this study examines the mediating effect of perceived risk between trust and online repurchase intention of groceries. An online survey was employed to collect data from shoppers who were recruited from a multi-channel grocery e-retailer’s database. The online survey, comprising 16 reflective validated scale items, was sent to 555 frequent and infrequent online grocery shoppers. Results find that while customer satisfaction predicts trust for both infrequent and frequent online grocery shoppers, perceived risk fully mediates the effect of trust on repurchase intentions for infrequent online grocery shoppers. Furthermore path analysis reveals that the developed behavioural model is variant across both groups of shoppers. Theoretically, we provide a deeper understanding of the online customer experience, while gaining insight into two shopper segments identified as being important to grocery e-retailers. For managers, this study tests an online customer behavioural model with actual purchasing behaviour and identifies the continued presence of perceived risk in grocery e-retailing regardless of purchase frequency or experience.
Resumo:
This paper reports on a study of the key determinants of public trust in charitable organisations, using survey data commissioned by the Australian Charities and Not-for-profits Commission. Data analysis used partial least squares structural equation modelling to examine both antecedents of trust and the influence of trust on charitable donative intentions. We found that people tend to trust charities with which they are familiar, and which are transparent in their reporting. Organisational size, importance, reputation and national significant were also antecedents of trust. People are more likely to volunteer or donate to charities they trust. The practical implications of this are that charities seeking to enhance their volunteer and donation base should pay attention to their marketing, reputation and disclosure activities, as well as to doing good work on an ongoing basis in the community. Theoretically, the implications are that transparency and reputation do not result directly in donations and volunteering, but they do create trust, and it is trust which then leads to donations and volunteering.
Resumo:
This paper investigates the association between global community concerns about bribery activities and anti-bribery disclosure practices by two Chinese telecommunication companies operating internationally, namely China Mobile and ZTE. Based on content analysis of annual reports and global news media articles over a period of 16 years from 1995-2010, the findings suggest that the changes in the level of disclosures by the two major Chinese telecommunications companies were closely associated with the level of international concerns over bribery practices within the Chinese telecommunications industry. This finding indicates that the companies adopt anti-bribery disclosure practices in order to minimise the gap of trust (Social capital) between companies themselves and global stakeholders. In this paper we argue that, for domestic companies in China, culturally constructed social capital, such as guanxi, creates a level of trust between managers and their stakeholders, which obviates the need for managers to disclose anti-bribery performance information. However, for companies operating internationally, as social capital is inadequate to bridge the gap of trust between managers and global stakeholders, managers use disclosures of anti-bribery performance information as a way to minimise such a gap.
Resumo:
Content delivery networks (CDNs) are an essential component of modern website infrastructures: edge servers located closer to users cache content, increasing robustness and capacity while decreasing latency. However, this situation becomes complicated for HTTPS content that is to be delivered using the Transport Layer Security (TLS) protocol: the edge server must be able to carry out TLS handshakes for the cached domain. Most commercial CDNs require that the domain owner give their certificate's private key to the CDN's edge server or abandon caching of HTTPS content entirely. We examine the security and performance of a recently commercialized delegation technique in which the domain owner retains possession of their private key and splits the TLS state machine geographically with the edge server using a private key proxy service. This allows the domain owner to limit the amount of trust given to the edge server while maintaining the benefits of CDN caching. On the performance front, we find that latency is slightly worse compared to the insecure approach, but still significantly better than the domain owner serving the content directly. On the security front, we enumerate the security goals for TLS handshake proxying and identify a subtle difference between the security of RSA key transport and signed-Diffie--Hellman in TLS handshake proxying; we also discuss timing side channel resistance of the key server and the effect of TLS session resumption.
Resumo:
The emphasis on collegiality and collaboration in the literature on teachers' work and school reform has tended to underplay the significance of teacher autonomy. This thesis explores the dynamics of teachers' understandings and experiences of individual teacher autonomy (as contrasted with collective autonomy) in an independent school in Queensland which promoted itself as a 'teachers' school' with a strong commitment to individual teacher autonomy. The research was a case study which drew on methodological signposts from critical, feminist and traditional ethnography. Intensive fieldwork in the school over five months incorporated the ethnographic techniques of observation, interviews and document analysis. Teachers at Thornton College understood their experience of individual autonomy at three interrelated levels--in terms of their work in the classroom, their working life in the school, and their voice in the decision-making processes of the school. They felt that they experienced a great deal of individual autonomy at each of these three levels. These understandings and experiences of autonomy were encumbered or enabled by a range of internal and external stakeholder groups. There were also a number of structural influences (community perceptions, market forces, school size, time and bureaucracy) emerging from the economic, social and political structures in Australian society which influenced the experience of autonomy by teachers. The experience of individual teacher autonomy was constantly shifting, but there were some emergent patterns. Consensus on educational goals and vision, and strong expressions of trust and respect between teachers and stakeholders in the school, characterised the contexts in which teachers felt they experienced high levels of autonomy in their work. The demand for accountability and desire for relatedness motivated stakeholders and structural forces to influence teacher autonomy. Some significant gaps emerged between the rhetoric of a commitment to individual teacher autonomy and decision-making practices in the school, that gave ultimate power to the co-principals. Despite the rhetoric and promotion of non-hierarchical structures and collaborative decision-making processes, many teachers perceived that their experience of individual autonomy remained subject to the exercise of 'partial democracy' by school leaders.
Resumo:
The aim of this paper is to present the evolution of the Francovich doctrine within the European legal order. The first part deals with the gradual development of the ECJ's case law on State liability in damages for breach of EC law. Starting from the seminal Francovich and Brasserie du Pêcheur, the clarification of the criteria set by the Court is attempted with reference to subsequent case law, whereas issues concerning the extent and form of the compensation owned are also mentioned. The second part concerns one of the more recent developments in the field, namely State liability for breaches of Community law attributed to national judiciary. The Court's ruling in Köbler is examined in connection with two other recent judgments, namely Commission v. Italy of 2003 and Kühne & Heitz, as an attempt of the ECJ to reframe its relationships with national supreme courts and appropriate for itself the position of the Supreme Court in the European legal order. The implications on State liability claims by the ruling in Commission v. France of 1997 constitute the theme of the third part, where it is submitted that Member States can also be held liable for disregard of Community law by private individuals within their respected territories. To this extent, Schmidberger is viewed as a manifestation of this opinion, with fundamental rights acquiring a new dimension, being invoked by the States, contra the individuals as a shield to liability claims. Finally, the third part examines the relationship between the Francovich doctrine and the principle of legal certainty and concludes that the solutions employed by the ECJ have been both predictable and acceptable by the national legal orders. Keywords: State liability, damages, Francovich, Köbler, Schmidberger
Resumo:
Since 2007, close collaboration between the Learning and Teaching Unit’s Academic Quality and Standards team and the Department of Reporting and Analysis’ Business Objects team resulted in a generational approach to reporting where QUT established a place of trust. This place of trust is where data owners are confident in date storage, data integrity, reported and shared. While the role of the Department of Reporting and Analysis focused on the data warehouse, data security and publication of reports, the Academic Quality and Standards team focused on the application of learning analytics to solve academic research questions and improve student learning. Addressing questions such as: • Are all students who leave course ABC academically challenged? • Do the students who leave course XYZ stay within the faculty, university or leave? • When students withdraw from a unit do they stay enrolled on full or part load or leave? • If students enter through a particular pathway, what is their experience in comparison to other pathways? • With five years historic reporting, can a two-year predictive forecast provide any insight? In answering these questions, the Academic Quality and Standards team then developed prototype data visualisation through curriculum conversations with academic staff. Where these enquiries were applicable more broadly this information would be brought into the standardised reporting for the benefit of the whole institution. At QUT an annual report to the executive committees allows all stakeholders to record the performance and outcomes of all courses in a snapshot in time or use this live report at any point during the year. This approach to learning analytics was awarded the Awarded 2014 ATEM/Campus Review Best Practice Awards in Tertiary Education Management for The Unipromo Award for Excellence in Information Technology Management.
Resumo:
This dissertation considers the problem of trust in the context of food consumption. The research perspectives refer to institutional conditions for consumer trust, personal practices of food consumption, and strategies consumers employ for controlling the safety of their food. The main concern of the study is to investigate consumer trust as an adequate response to food risks, i.e. a strategy helping the consumer to make safe choices in an uncertain food situation. "Risky" perspective serves as a frame of reference for understanding and explaining trust relations. The original aim of the study was to reveal the meanings applied to the concepts of trust, safety and risks in the perspective of market choices, the assessments of food risks and the ways of handling them. Supplementary research tasks presumed descriptions of institutional conditions for consumer trust, including descriptions of the food market, and the presentation of food consumption patterns in St. Petersburg. The main empirical material is based on qualitative interviews with consumers and interviews and group discussions with professional experts (market actors, representatives of inspection bodies and consumer organizations). Secondary material is used for describing institutional conditions for consumer trust and the market situation. The results suggest that the idea of consumer trust is associated with the reputation of suppliers, stable quality and taste of their products, and reliable food information. Being a subjectively constructed state connected to the act of acceptance, consumer trust results in positive buying decisions and stable preferences in the food market. The consumers' strategies that aim at safe food choices refer to repetitive interactions with reliable market actors that free them from constant consideration in the marketplace. Trust in food is highly mediated by trust in institutions involved in the food system. The analysis reveals a clear pattern of disbelief in the efficiency of institutional food control. The study analyses this as a reflection of "total distrust" that appears to be a dominant mood in many contexts of modern Russia. However, the interviewees emphasize the state's decisive role in suppressing risks in the food market. Also, the findings are discussed with reference to the consumers' possibilities of personal control over food risks. Three main responses to a risky food situation are identified: the reflexive approach, the traditional approach, and the fatalistic approach.
Resumo:
"Trust and Collectives" is a compilation of articles: (I) "On Rational Trust" (in Meggle, G. (ed.) Social Facts & Collective Intentionality, Dr. Hänsel-Hohenhausen AG (currently Ontos), 2002), (II) "Simulating Rational Social Normative Trust, Predictive Trust, and Predictive Reliance Between Agents" (M.Tuomela and S. Hofmann, Ethics and Information Technology 5, 2003), (III) "A Collective's Trust in a Collective's action" (Protosociology, 18-19, 2003), and (IV) "Cooperation and Trust in Group Contexts" (R. Tuomela and M.Tuomela, Mind and Society 4/1, 2005 ). The articles are tied together by an introduction that dwells deeply on the topic of trust. (I) presents a somewhat general version of (RSNTR) and some basic arguments. (II) offers an application of (RSNTR) for a computer simulation of trust.(III) applies (RSNTR) to Raimo Tuomela's "we-mode"collectives (i.e. The Philosophy of Social Practices, Cambridge University Press, 2002). (IV) analyzes cooperation and trust in the context of acting as a member of a collective. Thus, (IV) elaborates on the topic of collective agency in (III) and puts the trust account (RSNTR) to work in a framework of cooperation. The central aim of this work is to construct a well-argued conceptual and theoretical account of rational trust, viz. a person's subjectively rational trust in another person vis-à-vis his performance of an action, seen from a first-person point of view. The main method is conceptual and theoretical analysis understood along the lines of reflective equilibrium. The account of rational social normative trust (RSNTR), which is argued and defended against other views, is the result of the quest. The introduction stands on its own legs as an argued presentation of an analysis of the concept of rational trust and an analysis of trust itself (RSNTR). It is claimed that (RSNTR) is "genuine" trust and embedded in a relationship of mutual respect for the rights of the other party. This relationship is the growing site for trust, a causal and conceptual ground, but it is not taken as a reason for trusting (viz. predictive "trust"). Relevant themes such as risk, decision, rationality, control, and cooperation are discussed and the topics of the articles are briefly presented. In this work it is argued that genuine trust is to be kept apart from predictive "trust." When we trust a person vis-à-vis his future action that concerns ourselves on the basis of his personal traits and/or features of the specific situation we have a prediction-like attitude. Genuine trust develops in a relationship of mutual respect for the mutual rights of the other party. Such a relationship is formed through interaction where the parties gradually find harmony concerning "the rules of the game." The trust account stands as a contribution to philosophical research on central social notions and it could be used as a theoretical model in social psychology, economical and political science where interaction between persons and groups are in focus. The analysis could also serve as a model for a trust component in computer simulation of human action. In the context of everyday life the account clarifies the difference between predictive "trust" and genuine trust. There are no fast shortcuts to trust. Experiences of mutual respect for mutual rights cannot be had unless there is respect.
Resumo:
In this study, it is argued that the view on alliance creation presented in the current academic literature is limited, and that using a learning approach helps to explain the dynamic nature of alliance creation. The cases in this study suggest that a wealth of inefficiency elements can be found in alliance creation. These elements can further be divided into categories, which help explain the dynamics of alliance creation. The categories –combined with two models brought forward by the study– suggest that inefficiency can be avoided through learning during the creation process. Some elements are especially central to this argumentation. First, the elements related to the clarity and acceptance of the strategy of the company, the potential lack of an alliance strategy and the elements related to changes in the strategic context. Second, the elements related to the length of the alliance creation processes and the problems a long process entails. It is further suggested that the different inefficiency elements may create a situation, where the alliance creation process is –sequentially and successfully– followed to the end, but where the different inefficiencies create a situation where the results are not aligned with the strategic intent. The proposed solution is to monitor and assess the risk for inefficiency elements during the alliance creation process. The learning, which occurs during the alliance creation process as a result of the monitoring, can then lead to realignments in the process. This study proposes a model to mitigate the risk related to the inefficiencies. The model emphasizes creating an understanding of the other alliance partner’s business, creating a shared vision, using pilot cooperation and building trust within the process. An analytical approach to assessing the benefits of trust is also central in this view. The alliance creation approach suggested by this study, which emphasizes trust and pilot cooperation, is further critically reviewed against contracting as a way to create alliances.
Resumo:
It is suggested that the ability and practices of how the multinational corporation (MNC) manages knowledge transfer among its geographically dispersed subsidiary units are crucial for the building and development of firm competitive advantage. However, cross-border transfer of valuable organizational knowledge is likely to be problematic and laborious, especially within diversified and differentiated MNCs. Using data collected from 164 western multinational companies’ subsidiary units located in China and Finland, this study aims to investigate cross-border knowledge transfer within the MNC. It explores a number of factors that influence the transfer of knowledge among units in the differentiated MNC. The study consists of five individual papers. Paper 1 investigates a range of organizational mechanisms that may positively influence a subsidiary’s propensity to undertake knowledge transfers to other parts of the corporation. Paper 2 explores the impact of subsidiary location on the motivational dispositions of knowledge receiving units to value and accept knowledge from subsidiaries located in economically less advanced countries. Paper 3 examines the influence of social capital variables on knowledge transfer in dyadic relationships between foreign-owned subsidiaries and their sister and patent units. Paper 4 provides some initial insights into potentially different effects of trust and shared vision in intra-organizational vs. inter-organizational relationships. Using a case study setting, Paper 5 explores means and mechanisms used in transferring human resource management practices to Western MNCs’ business units in China from a cultural perspective. The results of the study show that MNC management through choices regarding organizational controls can encourage and enhance corporate-internal knowledge transfer. It also finds evidence that more knowledge is transferred from subsidiaries located in an industrialized country (e.g., Finland) than subsidiaries located in a developing country (e.g., China). While the study has highlighted the importance of social capital in promoting knowledge transfer, it has also uncovered some new findings that the effect of trust and shared vision may be contingent upon different contexts. Finally, in Paper 5, a number of mechanisms used in transferring selected HRM practices and competences to the Chinese business units have been identified. The findings suggest that cultural differences should be taken into consideration in the choice and use of different transfer mechanisms.
Resumo:
Mobile ad hoc networks (MANETs) is one of the successful wireless network paradigms which offers unrestricted mobility without depending on any underlying infrastructure. MANETs have become an exciting and im- portant technology in recent years because of the rapid proliferation of variety of wireless devices, and increased use of ad hoc networks in various applications. Like any other networks, MANETs are also prone to variety of attacks majorly in routing side, most of the proposed secured routing solutions based on cryptography and authentication methods have greater overhead, which results in latency problems and resource crunch problems, especially in energy side. The successful working of these mechanisms also depends on secured key management involving a trusted third authority, which is generally difficult to implement in MANET environ-ment due to volatile topology. Designing a secured routing algorithm for MANETs which incorporates the notion of trust without maintaining any trusted third entity is an interesting research problem in recent years. This paper propose a new trust model based on cognitive reasoning,which associates the notion of trust with all the member nodes of MANETs using a novel Behaviors-Observations- Beliefs(BOB) model. These trust values are used for detec- tion and prevention of malicious and dishonest nodes while routing the data. The proposed trust model works with the DTM-DSR protocol, which involves computation of direct trust between any two nodes using cognitive knowledge. We have taken care of trust fading over time, rewards, and penalties while computing the trustworthiness of a node and also route. A simulator is developed for testing the proposed algorithm, the results of experiments shows incorporation of cognitive reasoning for computation of trust in routing effectively detects intrusions in MANET environment, and generates more reliable routes for secured routing of data.