915 resultados para Misconduct in office


Relevância:

40.00% 40.00%

Publicador:

Resumo:

General note: Title and date provided by Bettye Lane.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

General note: Title and date provided by Bettye Lane.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

General note: Title and date provided by Bettye Lane.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Inscription: Verso: Florence Fanbaum, left, paralegal, hands work to Catherine Raymond, lawyer, at right. New York.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

General note: Title and date provided by Bettye Lane.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

General note: Title and date provided by Bettye Lane.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

General note: Title and date provided by Bettye Lane.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

General note: Title and date provided by Bettye Lane.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

There is a national debate on how universities should respond to sexual assault, specifically the advantages and shortcomings of the campus adjudication Process. One major critique of university adjudication is that it does not provide the necessary due process rights to the accused and is therefore not fundamentally fair. This study seeks to assess this validity of this critique by seeing if sexual misconduct policies lack due process and if so, to what extent. This investigation is a comparative case study of 14 private higher education institutions, belonging to the Ivy Plus Society, analyzing their policy and procedure documents for indicators of due process. Findings show that schools are complying between 45% and 85% of due process indicators with an average of 65%. Colleges do lack due process rights and need to revise their policies and procedures to clearly present these rights. Key recommendations include guaranteeing a hearing procedure with impartial decision-makers and the opportunity to submit evidence and witnesses.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

How can a "servant of Parliament" be held in check if it disregards the constitutional conventions of responsible government and takes a place in its own right in the representative institutions? the paper presents a history of the modernization of the legislative audit in the federal Parliament. It considers the evolution of the powers and practices of the Office of the Auditor General, how its role has become intertwined with that of Treasury Board Secretariat, and the eclipse of the House of Commons' Standing Committee on Public Accounts. The paper is an abridged version of a paper prepared for a conference in Saskatoon in November, 2001. It is to be published in a UBC Press volume edited by David Smith, John Courtney and Duff Spafford of the Department of Political Science at the University of Saskatchewan. The Press will hold copyright. See also "Biggest Scandal in Canadian History," School of Policy Studies Working Paper Number 23.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The Private Finance Initiative (PFI) has become one of the UK’s most contentious public policies. Despite New Labour’s advocacy of PFI as a means of achieving better value for money, criticisms of PFI have centred on key issues such as a lack of cost effectiveness, exaggerated pricing of risk transfers, excessive private sector profits, inflexibility and cumbersome administrative arrangements. Nevertheless, PFI has persisted as a key
infrastructure procurement method in the UK and has been supported as such by successive governments, as well as influencing policy in the Republic of Ireland and other European Nations. This paper explores this paradoxical outcome in relation to the role played in the UK by the National Audit Office (NAO). Under pressure to justify its support for PFI, the Blair government sought support for its policies by encouraging the NAO to investigate issues relating to PFI as well as specific PFI projects. It would have been expected that in fulfilling its role as independent auditor, the NAO would have examined whether PFI projects could have been delivered more efficiently, effectively or economically through other means. Yet, in line with earlier research, we find evidence that the NAO failed to comprehensively assess
key issues such as the value for money of PFI projects, and in so doing effectively acted as a legitimator of PFI policy. Using concepts relating to legitimacy theory and the idea of framing, our paper looks into 67 NAO private finance reports published between 1997 and 2011, with the goal of identifying the preferences, values and ideology underpinning the
NAO’s view on PFI during this period. Our analysis suggests that the NAO sought to legitimise existing PFI practices via a selective framing of problems and questions. Utilising a longitudinal approach, our analysis further suggests that this patterns of selective framing persisted over an extended time period during which fundamental parameters of the policy (such as contract length, to name one of the most important issues) were rarely addressed.
Overall the NAO’ supportive stance toward PFI seems to have relied on 1) a focused on positive aspects of PFI, such as on time delivery or lessons learned, and 2) positive comments on aspects of PFI that were criticised elsewhere, such as the lack of flexibility of underlying contractual arrangements. Our paper highlights the possibility that, rather than providing for a critical assessment of existing policies, national auditing bodies can
contribute to the creation of legitimatory environments. In terms of accounting research we would suggests that the objectivity and independence of accounting watchdogs should not be taken for granted, and that instead a critical investigation of the biases which can characterise these bodies can contribute to a deeper understanding of the nature of lobbying networks in the modern state.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

La Banque mondiale propose la bonne gouvernance comme la stratégie visant à corriger les maux de la mauvaise gouvernance et de faciliter le développement dans les pays en développement (Carayannis, Pirzadeh, Popescu & 2012; & Hilyard Wilks 1998; Leftwich 1993; Banque mondiale, 1989). Dans cette perspective, la réforme institutionnelle et une arène de la politique publique plus inclusive sont deux stratégies critiques qui visent à établir la bonne gouvernance, selon la Banque et d’autres institutions de Bretton Woods. Le problème, c’est que beaucoup de ces pays en voie de développement ne possèdent pas l’architecture institutionnelle préalable à ces nouvelles mesures. Cette thèse étudie et explique comment un état en voie de développement, le Commonwealth de la Dominique, s’est lancé dans un projet de loi visant l’intégrité dans la fonction publique. Cette loi, la Loi sur l’intégrité dans la fonction publique (IPO) a été adoptée en 2003 et mis en œuvre en 2008. Cette thèse analyse les relations de pouvoir entre les acteurs dominants autour de évolution de la loi et donc, elle emploie une combinaison de technique de l’analyse des réseaux sociaux et de la recherche qualitative pour répondre à la question principale: Pourquoi l’État a-t-il développé et mis en œuvre la conception actuelle de la IPO (2003)? Cette question est d’autant plus significative quand nous considérons que contrairement à la recherche existante sur le sujet, l’IPO dominiquaise diverge considérablement dans la structure du l’IPO type idéal. Nous affirmons que les acteurs "rationnels," conscients de leur position structurelle dans un réseau d’acteurs, ont utilisé leurs ressources de pouvoir pour façonner l’institution afin qu’elle serve leurs intérêts et ceux et leurs alliés. De plus, nous émettons l’hypothèse que: d’abord, le choix d’une agence spécialisée contre la corruption et la conception ultérieure de cette institution reflètent les préférences des acteurs dominants qui ont participé à la création de ladite institution et la seconde, notre hypothèse rivale, les caractéristiques des modèles alternatifs d’institutions de l’intégrité publique sont celles des acteurs non dominants. Nos résultats sont mitigés. Le jeu de pouvoir a été limité à un petit groupe d’acteurs dominants qui ont cherché à utiliser la création de la loi pour assurer leur légitimité et la survie politique. Sans surprise, aucun acteur n’a avancé un modèle alternatif. Nous avons conclu donc que la loi est la conséquence d’un jeu de pouvoir partisan. Cette recherche répond à la pénurie de recherche sur la conception des institutions de l’intégrité publique, qui semblent privilégier en grande partie un biais organisationnel et structurel. De plus, en étudiant le sujet du point de vue des relations de pouvoir (le pouvoir, lui-même, vu sous l’angle actanciel et structurel), la thèse apporte de la rigueur conceptuelle, méthodologique, et analytique au discours sur la création de ces institutions par l’étude de leur genèse des perspectives tant actancielles que structurelles. En outre, les résultats renforcent notre capacité de prédire quand et avec quelle intensité un acteur déploierait ses ressources de pouvoir.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Iowa law requires that a copy of the Notice of an Involuntary Discharge action given to residents of nursing facilities or residential care facilities also be given to the Office of the State Long-Term Care Ombudsman. In addition, the law requires that a copy of the Notice of an Involuntary Transfer/Eviction action given to tenants of an elder group home or assisted living program also be given to the Office of the State Long-Term Care Ombudsman.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This thesis presents security issues and vulnerabilities in home and small office local area networks that can be used in cyber-attacks. There is previous research done on single vulnerabilities and attack vectors, but not many papers present full scale attack examples towards LAN. First this thesis categorizes different security threads and later in the paper methods to launch the attacks are shown by example. Offensive security and penetration testing is used as research methods in this thesis. As a result of this thesis an attack is conducted using vulnerabilities in WLAN, ARP protocol, browser as well as methods of social engineering. In the end reverse shell access is gained to the target machine. Ready-made tools are used in the attack and their inner workings are described. Prevention methods are presented towards the attacks in the end of the thesis.