858 resultados para Weak economies
Resumo:
In this study, we investigate whether organisations in developing markets legitimise their use of societal resources. We concur that organisations’ existence in developing markets is also part of a social contract. Within this implied contract, organisations are to leverage resources in an equitable manner, allowing fair distribution of benefits to society and themselves. In this setting, we propose that the level of profit is the best indicator of the outcome of use of resources, and is subject to numerous societal emotions in developing economies. We also propose that readability of narratives relating to a level of profit is the best measure of organisations’ immediate legitimacy activities. Five-year data on profitability and readability of sections of corporate annual reports from 30 organisations reveals that organisations with higher profits present more readable narrative disclosures in their annual reports. This relationship is more evident in larger companies and with the public enterprises. These outcomes imply that organisations communicate their profit-related information in ways to manage an appropriate impression and legitimize a level of profit. The study’s outcomes also imply that authorities need to monitor organisations rights to protected existence continuously, as their legitimacy efforts suggest that higher levels of profit may be an outcome of potential misuse of resources.
Resumo:
The microstructure of an artificial grain boundary in an YBa2Cu3O7-δ (YBCO) thin film grown on a (100)(110), [001]-tilt yttria-stabilized-zirconia (YSZ) bicrystal substrate has been studied using transmission electron microscopy (TEM). The orientation relationship between the YBCO film and the YSZ substrate was [001]YBCO∥[001]YSZ and [110]YBCO∥[100]YSZ for each half of the bicrystal film. However, the exact boundary geometry of the bicrystal substrate was not transferred to the film. The substrate boundary was straight while the film boundary was wavy. In several cases there was bending of the lattice confined within a distance of a few basal-plane lattice spacings from the boundary plane and microfaceting. No intergranular secondary phase was observed but about 25% of the boundary was covered by c-axis-tilted YBCO grains and a-axis-oriented grains, both of which were typically adjacent to CuO grains or surrounded by a thin Cu-rich amorphous layer.
Resumo:
Weak links were fabricated by pulsed laser deposition of YBa 2Cu3Ox thin films on Y-ZrO2 bicrystal substrates. They were formed by transferring the bicrystal boundary into the epitaxial film during the film growth. Their properties were determined by the misorientation angle ( theta ) between the two halves of the bicrystal. The transport properties of the weak links were studied as a function of theta and an exponential dependence of the weak link critical current density was observed for angles up to 45 degrees . Clear Josephson effects with good microwave and magnetic field response were observed.
Resumo:
We have studied weak links and dc-SQUIDs made from pulsed laser deposited YBa2Cu3O7-δ thin films on Y-ZrO 2 bicrystal substrates. The transport properties of the weak links were studied as a function of the misorientation angle (θ) between the two halves of the bicrystal and an exponential dependence of the weak link critical current density was observed for angles up to 40°at 77 K. Josephson effects with clear microwave and magnetic field responses were observed. An optimum dc-SQUID performance at 77 K was obtained for θ=32°. At this temperature, we achieved a periodic magnetic field response with a modulation depth of 12 μV.
Resumo:
A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/1 cipher due to this loading process; these weak key-IV pairs may generate one, two or three registers containing all-zero values, which may lead in turn to weak keystream sequences. In the case where two or three registers contain only zeros, we describe a distinguisher which leads to a complete decryption of the affected messages.
Resumo:
Distributed-password public-key cryptography (DPwPKC) allows the members of a group of people, each one holding a small secret password only, to help a leader to perform the private operation, associated to a public-key cryptosystem. Abdalla et al. recently defined this tool [1], with a practical construction. Unfortunately, the latter applied to the ElGamal decryption only, and relied on the DDH assumption, excluding any recent pairing-based cryptosystems. In this paper, we extend their techniques to support, and exploit, pairing-based properties: we take advantage of pairing-friendly groups to obtain efficient (simulation-sound) zero-knowledge proofs, whose security relies on the Decisional Linear assumption. As a consequence, we provide efficient protocols, secure in the standard model, for ElGamal decryption as in [1], but also for Linear decryption, as well as extraction of several identity-based cryptosystems [6,4]. Furthermore, we strenghten their security model by suppressing the useless testPwd queries in the functionality.
Resumo:
We introduce the notion of distributed password-based public-key cryptography, where a virtual high-entropy private key is implicitly defined as a concatenation of low-entropy passwords held in separate locations. The users can jointly perform private-key operations by exchanging messages over an arbitrary channel, based on their respective passwords, without ever sharing their passwords or reconstituting the key. Focusing on the case of ElGamal encryption as an example, we start by formally defining ideal functionalities for distributed public-key generation and virtual private-key computation in the UC model. We then construct efficient protocols that securely realize them in either the RO model (for efficiency) or the CRS model (for elegance). We conclude by showing that our distributed protocols generalize to a broad class of “discrete-log”-based public-key cryptosystems, which notably includes identity-based encryption. This opens the door to a powerful extension of IBE with a virtual PKG made of a group of people, each one memorizing a small portion of the master key.
Resumo:
IT resources are indispensable in the management of Public Sector Organizations (PSOs) around the world. We investigate the factors that could leverage the IT resources in PSOs in developing economies. While research on ways to leverage IT resources in private sector organizations of developed countries is substantial, our understanding on ways to leverage the IT resources in the public sector in developing countries is limited. The current study aspires to address this gap in the literature by seeking to determine the key factors required to create process value from public sector IT investments in developing countries. We draw on the resource-centric theories to imply the nature of factors that could leverage the IT resources in the public sector. Employing an interpretive design, we identified three factors necessary for IT process value generation in the public sector. We discuss these factors and state their implications to theory and practice.
Resumo:
Process models specify behavioral aspects by describing ordering constraints between tasks which must be accomplished to achieve envisioned goals. Tasks usually exchange information by means of data objects, i.e., by writing information to and reading information from data objects. A data object can be characterized by its states and allowed state transitions. In this paper, we propose a notion which checks conformance of a process model with respect to data objects that its tasks access. This new notion can be used to tell whether in every execution of a process model each time a task needs to access a data object in a particular state, it is ensured that the data object is in the expected state or can reach the expected state and, hence, the process model can achieve its goals.
Resumo:
Debates about user-generated content (UGC) often depend on a contrast with its normative opposite, the professionally produced content that is supported and sustained by commercial media businesses or public organisations. UGC is seen to appear within or in opposition to professional media, often as a disruptive, creative, change-making force. Our suggestion is to position UGC not in opposition to professional or "producer media", or in hybridised forms of subjective combination with it (the so-called "pro-sumer" or "pro-am" system), but in relation to different criteria, namely the formal and informal elements in media industries. In this article, we set out a framework for the comparative and historical analysis of UGC systems and their relations with other formal and informal media activity, illustrated with examples ranging from games to talkback radio. We also consider the policy implications that emerge from a historicised reading of UGC as a recurring dynamic within media industries, rather than a manifestation of consumer agency specific to digital cultures.
Resumo:
The detection of line-like features in images finds many applications in microanalysis. Actin fibers, microtubules, neurites, pilis, DNA, and other biological structures all come up as tenuous curved lines in microscopy images. A reliable tracing method that preserves the integrity and details of these structures is particularly important for quantitative analyses. We have developed a new image transform called the "Coalescing Shortest Path Image Transform" with very encouraging properties. Our scheme efficiently combines information from an extensive collection of shortest paths in the image to delineate even very weak linear features. © Copyright Microscopy Society of America 2011.
Resumo:
This study evaluated the complexity of calcium ion exchange with sodium exchanged weak acid cation resin (DOW MAC-3). Exchange equilibria recorded for a range of different solution normalities revealed profiles which were represented by conventional “L” or “H” type isotherms at low values of equilibrium concentration (Ce) of calcium ions, plus a superimposed region of increasing calcium uptake was observed at high Ce values. The loading of calcium ions was determined to be ca. 53.5 to 58.7 g/kg of resin when modelling only the sorption curve created at low Ce values,which exhibited a well-defined plateau. The calculated calcium ion loading capacity for DOWMAC-3 resin appeared to correlate with the manufacturer's recommendation. The phenomenon of super equivalent ion exchange (SEIX) was observed when the “driving force” for the exchange process was increased in excess of 2.25 mmol calcium ions per gram of resin in the starting solution. This latter event was explained in terms of displacement of sodium ions from sodium hydroxide solution which remained in the resin bead following the initial conversion of the as supplied “H+” exchanged resin sites to the “Na+” version required for softening studies. Evidence for hydrolysis of a small fraction of the sites on the sodium exchanged resin surface was noted. The importance of carefully choosing experimental parameters was discussed especially in relation to application of the Langmuir–Vageler expression. This latter model which compared the ratio of the initial calcium ion concentration in solution to resin mass, versus final equilibrium loading of the calcium ions on the resin; was discovered to be an excellent means of identifying the progress of the calcium–sodium ion exchange process. Moreover, the Langmuir–Vageler model facilitated standardization of various calcium–sodium ion exchange experiments which allowed systematic experimental design.