968 resultados para Standard Insurance Company.


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This guide gives important information about how to receive unemployment benefits. Topics include: Privacy Act, Equal Opportunity Statement, Income and Eligibility Verification Notice, Unemployment Insurance Benefits, Eligibility requirements, Unemployment Compensation for Federal Employees, Employment Compensation for Ex-Servicemembers,School Worker Claims, Pension Reduction, Official Court Appearances and Benefit eligibility, Benefits are Based on Wages Paid, Initial Determination, Benefit Year, Waiting Period, Maximum Weekly Benefit Amount, To Establish a Weekly Benefit Amount, Disqualification, Fraudulent claims, Requests for Reconsideration, Appeal Provisions, Standard and Alternate Base Period Explained, Partial Employment,Self-Employment, Students, Interstate Benefits, Benefits Will Be Taxable, Individual Benefits, Filing Your Weekly Claim, Filing Your Weekly Claim Online,Filing Your Weekly Claim by TelClaim and New Hires.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective: To examine the impact on dental utilisation following the introduction of a participating provider scheme (Regional and Rural Oral Health Program {RROHP)). In this model dentists receive higher third party payments from a private health insurance fund for delivering an agreed range of preventive and diagnostic benefits at no out-ofpocket cost to insured patients. Data source/Study setting: Hospitals Contribution Fund of Australia (HCF) dental claims for all members resident in New South Wales over the six financial years from l99811999 to 200312004. Study design: This cohort study involves before and after analyses of dental claims experience over a six year period for approximately 81,000 individuals in the intervention group (HCF members resident in regional and rural New South Wales, Australia) and 267,000 in the control group (HCF members resident in the Sydney area). Only claims for individuals who were members of HCF at 31 December 1997 were included. The analysis groups claims into the three years prior to the establishment of the RROHP and the three years subsequent to implementation. Data collection/Extraction methods: The analysis is based on all claims submitted by users of services for visits between 1 July 1988 and 30 June 2004. In these data approximately 1,000,000 services were provided to the intervention group and approximately 4,900,000 in the control group. Principal findings: Using Statistical Process Control (SPC) charts, special cause variation was identified in total utilisation rate of private dental services in the intervention group post implementation. No such variation was present in the control group. On average in the three years after implementation of the program the utilisation rate of dental services by regional and rural residents of New South Wales who where members of HCF grew by 12.6%, over eight times the growth rate of 1.5% observed in the control group (HCF members who were Sydney residents). The differences were even more pronounced in the areas of service that were the focus of the program: diagnostic and preventive services. Conclusion: The implementation of a benefit design change, a participating provider scheme, that involved the removal of CO-payments on a defined range of preventive and diagnostic dental services combined with the establishment and promotion of a network of dentists, appears to have had a marked impact on HCF members' utilisation of dental services in regional and rural New South Wales, Australia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Risks and uncertainties are inevitable in engineering projects and infrastructure investments. Decisions about investment in infrastructure such as for maintenance, rehabilitation and construction works can pose risks, and may generate significant impacts on social, cultural, environmental and other related issues. This report presents the results of a literature review of current practice in identifying, quantifying and managing risks and predicting impacts as part of the planning and assessment process for infrastructure investment proposals. In assessing proposals for investment in infrastructure, it is necessary to consider social, cultural and environmental risks and impacts to the overall community, as well as financial risks to the investor. The report defines and explains the concept of risk and uncertainty, and describes the three main methodology approaches to the analysis of risk and uncertainty in investment planning for infrastructure, viz examining a range of scenarios or options, sensitivity analysis, and a statistical probability approach, listed here in order of increasing merit and complexity. Forecasts of costs, benefits and community impacts of infrastructure are recognised as central aspects of developing and assessing investment proposals. Increasingly complex modelling techniques are being used for investment evaluation. The literature review identified forecasting errors as the major cause of risk. The report contains a summary of the broad nature of decision-making tools used by governments and other organisations in Australia, New Zealand, Europe and North America, and shows their overall approach to risk assessment in assessing public infrastructure proposals. While there are established techniques to quantify financial and economic risks, quantification is far less developed for political, social and environmental risks and impacts. The report contains a summary of the broad nature of decision-making tools used by governments and other organisations in Australia, New Zealand, Europe and North America, and shows their overall approach to risk assessment in assessing public infrastructure proposals. While there are established techniques to quantify financial and economic risks, quantification is far less developed for political, social and environmental risks and impacts. For risks that cannot be readily quantified, assessment techniques commonly include classification or rating systems for likelihood and consequence. The report outlines the system used by the Australian Defence Organisation and in the Australian Standard on risk management. After each risk is identified and quantified or rated, consideration can be given to reducing the risk, and managing any remaining risk as part of the scope of the project. The literature review identified use of risk mapping techniques by a North American chemical company and by the Australian Defence Organisation. This literature review has enabled a risk assessment strategy to be developed, and will underpin an examination of the feasibility of developing a risk assessment capability using a probability approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The benefits and growing need for international transparency in engineering qualifications, simple cross-credit processes, international dual awards and mechanisms to encourage student mobility, are receiving much attention around the world at present. In response, there are a number of global initiatives now looking at how these issues may be addressed, particularly in Europe, North America and Australia. CDIO has adopted 12 Standards as guiding principles for program reform and evaluation. The 12 CDIO Standards address program philosophy curriculum development, design-build experiences and workspaces, new methods of teaching and learning, faculty/academic development, and assessment and evaluation. However, none of the Standards address international qualifications nor student mobility. This discussion paper presents the underpinning case for introducing the 13th CDIO Standard, Internationalization and Mobility.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Entrepreneurial marketing has gained popularity in both the entrepreneurship and marketing disciplines in recent times. The success of ventures that have pursued what are considered non-traditional marketing approaches has been attributed to entrepreneurial marketing practices. Despite the multitude of marketing concepts and models, there are prominent venture successes that do not conform to these and have thus been put in the ''entrepreneurial'' box. One only has to look to the ''Virgin'' model to put this in context. Branson has proven for example that not ''sticking to the knitting'' can work with the ways the Virgin portfolio has been diversified. Consequently, an entrepreneurial orientation is considered a desirable philosophy and has become prominent in such industries as airlines and information technology. Miles and Arnold (1991) found that entrepreneurial orientation is positively correlated to marketing orientation. They propose that entrepreneurial orientation is a strategic response by firms to turbulence in the environment. While many marketing successes are analysed in hindsight using traditional marketing concepts and strategies, there are those that challenge standard marketing textbook recommendations. Marketing strategy is often viewed as a process of targeting, segmenting and positioning (STP). Academics and consultants advocate this approach along with the marketing and business plans. The reality however is that a number of businesses do not practice these and pursue alternative approaches. Other schools of thought and business models have been developing to explain differences in orientation such as branding (Keller 2001), the service-dominant logic (Vargo and Lusch 2004) and effectuation logic (Sarasvathy 2001). This indicates that scholars are now looking to cognate fields to explain a given phenomenon beyond their own disciplines. Bucking this trend is a growing number of researchers working at the interface between entrepreneurship and marketing. There is now an emerging body of work dedicated to this interface, hence the development of entrepreneurial marketing as an alternative to the traditional approaches. Hills and Hultman (2008:3) define entrepreneurial marketing as ''a spirit, an orientation as well as a process of passionately pursuing opportunities and launching and growing ventures that create perceived customer value through relationships by employing innovativeness, creativity, selling, market immersion, networking and flexibility.'' Although it started as a special interest group, entrepreneurial marketing is now gaining recognition in mainstream entrepreneurship and marketing literature. For example new marketing textbooks now incorporate an entrepreneurial marketing focus (Grewal and Levy 2008). The purpose of this paper is to explore what entrepreneurial approaches are used by entrepreneurs and their impact on the success of marketing activities. Methodology/Key Propositions In order to investigate this, we employ two cases: 42Below, vodka producers from New Zealand and Penderyn Distillery, whisky distillers from Wales. The cases were chosen based on the following criteria. Firstly, both companies originate from small economies. Secondly, both make products (spirits) from locations that are not traditionally regarded as producers of their flagship products and thirdly, the two companies are different from each other in terms of their age. Penderyn is an old company established in 1882, whereas 42Below was founded only in 1999. Vodka has never been associated with New Zealand. By the same token, whisky has always been associated with Scotland and Ireland but never been with Wales. Both companies defied traditional stereotypes in marketing their flagship products and found international success. Using a comparative a case study approach, we use Covin and Slevin's (1989) set of items that purport to measure entrepreneurial orientation and apply a qualitative lens on the approaches of both companies. These are: 1. cultural emphases on innovation and R&D 2. high rate of new product introduction 3. bold, innovative product development 4. initiator proactive posture 5. first to introduce new technologies and products 6. competitive posture toward competitor 7. strong prolictivity for high risk, high return projects 8. environment requires boldness to achieve objectives 9. when faced with risk, adopts aggressive, bold posture. Results and Implications We find that both companies have employed entrepreneurial marketing approaches but with different intensities. While acknowledging that they are different from the norm, the specifics of their individual approaches are dissimilar. Both companies have positioned their products at the premium end of their product categories and have emphasised quality and awards in their communication strategies. 42Below has carved an image of irreverence and being non-conformist. They have unashamedly utilised viral marketing and entered international markets by training bartenders and hosting unconventional events. They use edgy language such as vodka university, vodka professors and vodka ambassadors. Penderyn Distillery has taken a more traditional approach to marketing its products and portraying romantic images of age-old tradition of distilling as key to their positioning. Both companies enjoy success as evidenced by industry awards and international acclaim.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The innovation diffusion and knowledge management literature strongly supports the importance of communities of practice (COP) for enabling knowledge about how to use and adopt innovation initiatives. One of the most powerful tools for innovation diffusion is word-of-mouth wisdom from committed individuals who mentor and support each other. Close proximity for face-to-face interaction is highly effective, however, many organisations are geographically dispersed with projects being virtual linked sub-organisations using ICT to communicate. ICT has also introduced a useful facilitating technology for developing knowledge networks. This paper presents findings from a research program concentrating on ICT innovation diffusion in the Australian construction industry. One way in which ICT diffusion is taking place was found to be through within-company communities of practice. We undertook in-depth unstructured interviews with three of the major 10 to 15 contractors in Australia to discuss their ICT diffusion strategies. We discovered that in all three cases,within company networked communities of practice was a central strategy. Further, effective diffusion of ICT groupware tools can be critical in developing COP where they are geographically dispersed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As businesses and organisations move online, many question how to use Internet communication tools effectively, such as Web sites and electronic mail (Porter, 2001). Where and how should they invest their time and money in technology? This research explores a small part of this broad question, online complaining and electronic customer service. This paper extends prior US-based research of consumer complaints by email (Strauss and Hill, 2001) in several ways. First, it replicates their research in an Australian setting. Second, this research addresses several future research issues that Strauss and Hill (2001) raised. And third, this paper uses diffusion of innovation (Rogers, 1995) to explain some of the results. The results partially support the findings of Strauss and Hill (2001), take a small step towards further investigation of effective email responses and provide practical suggestions for better email customer service.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.