854 resultados para Duty to accommodate
Resumo:
This paper extends existing understandings of how actors' constructions of ambiguity shape the emergent process of strategic action. We theoretically elaborate the role of rhetoric in exploiting strategic ambiguity, based on analysis of a longitudinal case study of an internationalization strategy within a business school. Our data show that actors use rhetoric to construct three types of strategic ambiguity: protective ambiguity that appeals to common values in order to protect particular interests, invitational ambiguity that appeals to common values in order to invite participation in particular actions, and adaptive ambiguity that enables the temporary adoption of specific values in order to appeal to a particular audience at one point in time. These rhetorical constructions of ambiguity follow a processual pattern that shapes the emergent process of strategic action. Our findings show that (1) the strategic actions that emerge are shaped by the way actors construct and exploit ambiguity, (2) the ambiguity intrinsic to the action is analytically distinct from ambiguity that is constructed and exploited by actors, and (3) ambiguity construction shifts over time to accommodate the emerging pattern of actions.
Resumo:
Purpose – The purpose of this paper is to demonstrate how the conceptual lens of corporate social responsibility (CSR), business and civil society can be used to explore “less popular causes” (in this case, a community-based public sector empirical study of initiatives with offenders) and, in particular, respond to the question used by Walzer “In which society can lives be best led?” Design/methodology/approach – This is a formative and summative evaluation study of a National Offender Management “community payback” offender scheme based in the UK using a mixed method, predominantly qualitative approach that integrates theory and practice. Findings – The paper finds that citizenship actions of front-line public sector employees, working in partnership with other agencies in the community, embody the essence of Walzer's notion of CSR and civil society by going beyond the call of duty to provide additional training and moral support for the community offenders. Originality/value – The paper contributes towards an understanding of how CSR and civil society debates can inform wider aspects of public policy and business through its application to areas of society that are perceived to be “challenging” and “undeserving”.
Direct measurement of coherency limits for strain relaxation in heteroepitaxial core/shell nanowires
Resumo:
The growth of heteroepitaxially strained semiconductors at the nanoscale enables tailoring of material properties for enhanced device performance. For core/shell nanowires (NWs), theoretical predictions of the coherency limits and the implications they carry remain uncertain without proper identification of the mechanisms by which strains relax. We present here for the Ge/Si core/shell NW system the first experimental measurement of critical shell thickness for strain relaxation in a semiconductor NW heterostructure and the identification of the relaxation mechanisms. Axial and tangential strain relief is initiated by the formation of periodic a/2 〈110〉 perfect dislocations via nucleation and glide on {111} slip-planes. Glide of dislocation segments is directly confirmed by real-time in situ transmission electron microscope observations and by dislocation dynamics simulations. Further shell growth leads to roughening and grain formation which provides additional strain relief. As a consequence of core/shell strain sharing in NWs, a 16 nm radius Ge NW with a 3 nm Si shell is shown to accommodate 3% coherent strain at equilibrium, a factor of 3 increase over the 1 nm equilibrium critical thickness for planar Si/Ge heteroepitaxial growth. © 2012 American Chemical Society.
Resumo:
Organizations today face intense competitive and economic pressures leading to large scale transformation of existing business operations and transactions. In addition, organizations have adopted automated business processes to deal with partners and customers. E-business diffusion is a multi-phase process, moving from initiation through to routinisation and an insight into the adoption processes helps organizations to adopt e-business more effectively. It is imperative that organizations effectively manage the e-business environment, and all associated changes to accommodate the changing relationships with customers and business partners and more importantly, to improve performance. This chapter discusses the process of e-business implementation, usage and diffusion (routinisation stage) on business performance. © 2010, IGI Global.
Resumo:
This article explains the impact of substate nationalism on the political dynamic surrounding ethnic kin migration through a case study of Sri Lankan Tamil refugees in the southern Indian State of Tamil Nadu. Examples drawn from the migration studies literature identify ethnic kinship between refugees and host as an indicator of favorable reception and assistance. While this expectation is borne out to an extent in the Tamil Nadu case, it is tempered by a period of hostility following the 1991 assassination of former Indian Prime Minister Rajiv Gandhi by an LTTE suicide bomber, when the refugees were figured as a disruptive and dangerous presence by Tamil Nadu's political elites. A version of the "triadic nexus" model of kin state relations, reconfigured to accommodate the larger political unit within which the substate nationalism is incorporated, is proposed as a framework of analysis for these events. This can better account for Tamil Nadu's substate ethnonationalist elite's movement between expressions of coethnic solidarity with the refugees and the more hostile, security-focused response postassassination. © Taylor & Francis Group, LLC.
Resumo:
By evolving brands and building on the importance of self-expression, Aaker (1997) developed the brand personality framework as a means to understand brand-consumer relationships. The brand personality framework captures the core values and characteristics described in human personality research in an attempt to humanize brands. Although influential across many streams of brand personality research, the current conceptualization of brand personality only offers a positively-framed approach. To date, no research, both conceptually and empirically, has thoroughly incorporated factors reflective of Negative Brand Personality, despite the fact that almost all researchers in personality are in agreement that factors akin to Extraversion (positive) and Neuroticism (negative) should be in a comprehensive personality scale to accommodate consumers’ expressions. As a result, the study of brand personality is only half complete since the current research trend is to position brand personality under brand image. However, with the brand personality concept being confused with brand identity at the empirical stage, factors reflective of Negative Brand Personality have been neglected. Accordingly, this thesis extends the current conceptualization of brand personality by demarcating the existing typologies of desirable brand personality and incorporating the characteristics reflective of consumers’ discrepant self-meaning to provide a more complete understanding of brand personality. However, it is not enough to interpret negative factors as the absence of positive factors. Negative factors reflect consumers’ anxious and frustrated feelings. Therefore, this thesis contributes to the current conceptualization of brand personality by, firstly, presenting a conceptual definition of Negative Brand Personality in order to provide a theoretical basis for the development of a Negative Brand Personality scale, then, secondly, identifying what constitutes Negative Brand Personality and to what extent consumers’ cognitive dissonance explains the nature of Negative Brand Personality, and, thirdly, ascertaining the impact Negative Brand Personality has on attitudinal constructs, namely: Negative Attitude, Detachment, Brand Loyalty and Satisfaction, which have proven to predict behaviors such as choice and (re-)purchasing. In order to deliver on the three main contributions, two comprehensive studies were conducted to a) develop a valid, parsimonious, yet relatively short measure of Negative Brand Personality, and b) ascertain how the Negative Brand Personality measure behaves within a network of related constructs. The mixed methods approach, grounded in theoretical and empirical development, provides evidence to suggest that there are four factors to Negative Brand Personality and, tested through use of a structural equation modeling technique, that these are influenced by Brand Confusion, Price Unfairness, Self- Incongruence and Corporate Hypocrisy. Negative Brand Personality factors mainly determined Consumers Negative Attitudes and Brand Detachment. The research contributes to the literature on brand personality by improving the consumer-brand relationship by means of engaging in a brandconsumer conversation in order to reduce consumers’ cognitive strain. The study concludes with a discussion on the theoretical and practical implications of the findings, its limitations, and potential directions for future research.
Resumo:
While most of the research in Knowledge Management (KM) has focused on business communities, there is a breadth of potential applications of KM theory and practice to wider society. This paper explores the potential of KM for rural communities, specifically for those that want to preserve their social history and collective memories (what we call heritage) to enrich the lives of others. In KM terms, this is a task of accumulating and recording knowledge (using KM techniques such as story-telling and communities of practice) to enable its retention for future use (by interested people perhaps through KM systems). We report a case study of Cardrona, a valley of approximately 120 people in New Zealand's South Island. Realising that time would erode knowledge of their community a small, motivated group of residents initiated a KM programme to create a legacy for a wider community including younger generations, tourists and scholars. This paper applies KM principles to rural communities that want to harness their collective knowledge for wider societal gain, and develops a community-based framework to inform such initiatives. As a result, we call for a wider conceptualisation of KM to include motives for managing knowledge beyond business performance to accommodate community (cKM). © 2010 Operational Research Society.
Resumo:
Welcome to the latest issue of Contact Lens and Anterior Eye. In this issue, Kuldeep Razaida provides a fascinating look at fitting prosthetic lenses to patients in India. I had the good fortune of visiting his clinic in August 2006 at the LV Prasad Eye Institute in Hyderabad, India and was humbled by the vast expertise within the one building. The institute started in 1987 and is the brainchild of the infamous Professor Rao. I think there are few such places in the world where the clinicians work so passionately in treating such interesting patients (for details regarding the LV Prasad Eye Institute see www.lvpei.org). I was in Hyderabad courtesy of IACLE (see issue 29:5 for an editorial by Judith Morris and Sonja Cronje about IACLE) and was able to share ideas with contact lens educators from across the world (for more information on IACLE see www.iacle.org). The issue contains some regular contact lens type papers too; with our aging population readers will be particularly interested in a paper by Mike Freeman and Neil Charman looking at modified monovision with diffractive bifocal lenses. There is an article looking at visual problems with video display terminal use and a study looking at the effects of surface treatment of silicone hydrogel contact lenses. There is an interesting piece from Dr Aisling Mann of Aston University looking at tear protein analysis; this article contains one CET point too for readers who complete the attached multiple choice questions before the relevant deadline. Also, congratulations to the BCLA members who successfully undertook the Fellowship of the BCLA at this year's BCLA conference in Manchester. If you are interested in undertaking the Fellowship please look at the details on the BCLA web page (http://www.bcla.org.uk/fellowship.asp). Amongst the case reports in this issue of CLAE you will notice one from Andrew Elder-Smith, this particular case report was presented as part of his successful Fellowship submission in 2006 and was thought to be of particular good quality by the examiners who asked Andrew to kindly submit it for publication to Contact Lens and Anterior Eye as an example for potential candidates. Finally, it is my sad duty to report the death of Howard Gee earlier this year, a past council member of the BCLA. Our thoughts and prayers are with his family and friends.
Resumo:
Duties owed in banker customer relationships, with reference to Greenwood duty, duty to inform customers of new accounts and services, duty of confidentiality, drawing cheques on insufficient funds and restricting lender's discretion.
Reduced thermal conductivity by nanoscale intergrowths in perovskite like layered structure La2Ti2O7
Resumo:
The effect of substitution and oxidation-reduction on the thermal conductivity of perovskite-like layered structure (PLS) ceramics was investigated in relation to mass contrast and non-stoichiometry. Sr (acceptor) was substituted on the A site, while Ta (donor) was substituted on the B site of La2Ti2O7. Substitution in PLS materials creates atomic scale disorders to accommodate the non-stoichiometry. High resolution transmission electron microscopy and X ray diffraction revealed that acceptor substitution in La2Ti2O7 produced nanoscale intergrowths of n = 5 layered phase, while donor substitution produced nanoscale intergrowths of n = 3 layered phase. As a result of these nanoscale intergrowths, the thermal conductivity value reduced by as much as ∼20%. Pure La2Ti2O7 has a thermal conductivity value of ∼1.3 W/m K which dropped to a value of ∼1.12 W/m K for Sr doped La2Ti2O7 and ∼0.93 W/m K for Ta doped La2Ti2O7 at 573 K.
Resumo:
Refraction simulators used for undergraduate training at Aston University did not realistically reflect variations in the relationship between vision and ametropia. This was because they used an algorithm, taken from the research literature, that strictly only applied to myopes or older hyperopes and did not factor in age and pupil diameter. The aim of this study was to generate new algorithms that overcame these limitations. Clinical data were collected from the healthy right eyes of 873 white subjects aged between 20 and 70 years. Vision and refractive error were recorded along with age and pupil diameter. Re-examination of 34 subjects enabled the calculation of coefficients of repeatability. The study population was slightly biased towards females and included many contact lens wearers. Sex and contact lens wear were, therefore, recorded in order to determine whether these might influence the findings. In addition, iris colour and cylinder axis orientation were recorded as these might also be influential. A novel Blur Sensitivity Ratio (BSR) was derived by dividing vision (expressed as minimum angle of resolution) by refractive error (expressed as a scalar vector, U). Alteration of the scalar vector, to account for additional vision reduction due to oblique cylinder axes, was not found to be useful. Decision tree analysis showed that sex, contact lens wear, iris colour and cylinder axis orientation did not influence the BSR. The following algorithms arose from two stepwise multiple linear regressions: BSR (myopes) = 1.13 + (0.24 x pupil diameter) + (0.14 x U) BSR (hyperopes) = (0.11 x pupil diameter) + (0.03 x age) - 0.22 These algorithms together accounted for 84% of the observed variance. They showed that pupil diameter influenced vision in both forms of ametropia. They also showed the age-related decline in the ability to accommodate in order to overcome reduced vision in hyperopia.
Resumo:
This article is concerned with the availability of “proprietary restitution” in cases of mistaken payments. It is argued that the mistake of the claimant is an insufficient justification for proprietary restitution, however a close analysis of the case law demonstrates that the presence of additional factors can justify the availability of proprietary restitution in specific circumstances. The basis of proprietary restitution is to be found in the breach of a duty which arises separately from the claim for unjust enrichment. The significant contribution of this article is the analysis that knowledge merely creates a duty to maintain the fund until restitution is made, and that knowledge cannot establish the breach of this duty. Importantly, breach of this duty is established by a second condition which is demonstrated by the wilful misconduct of the recipient. It is this conduct which justifies the imposition of the constructive trust. By adopting this analysis, the proprietary claim in the context of mistaken transfers can be classified as forming part of the law of wrongs, rather than the law of unjust enrichment.
Resumo:
Purpose – This paper aims to investigate the manner in which technological innovation in the European electrical-grid sector has developed by focusing, in particular, on the effect of public policy on innovation. To achieve this aim, this paper highlights how technological innovation and development progressed from the 1960s to the 1980s, and contrasts this period with the deregulated/privatization environment. Design/methodology/approach – The paper is based on a series of in-depth multiple company case studies of grid companies, some of their suppliers and other actors in their broader business network. Empirical data were collected through 55 interviews. Findings – The authors find that a phase of mutual collaboration was encouraged in the first period, which led to strong technological innovation with a focus on product quality and the development of functionality. Buyers played a pivotal role in the development of products and posed technical requirements. In contrast, the current role of the buyer has transformed principally into one of evaluating competing bids for specific projects. Today, buyers face increasing pressure to substantially lower CO2 emissions and transform the energy grid system. These goals are difficult to achieve without a new way of thinking about innovation. Research limitations/implications – Models to achieve innovation must not only focus on individual research projects; instead, the innovation should be factored into normal business dealings in the supply chain. Practical implications – We propose that policymakers and regulators need to: accommodate for innovation and address the collaborative elements of innovation when developing policies and regulations. Furthermore, regulators have the option of either developing a strategic vision for the electrical-grid network or incorporating sustainability into the evaluation of electrical grids and, thus, consumers’ willingness to pay. Originality/value – This paper makes a distinctive contribution in the area of innovation for electrical grids. Our paper shows how innovation and the development of new technology for electrical grids changed over time. Furthermore, this paper describes the energy sector in terms of a business network comprising the different actors involved in innovation and development and, thus, their role in the energy supply chain.
Resumo:
The subject of dropout prevention/reduction is deservedly receiving attention as a problem that, if not resolved, could threaten our national future.^ This study investigates a small segment of the overall dropout problem, which has apparently unique features of program design and population selection. The evidence presented here should add to the knowledge bank of this complicated problem.^ Project Trio was one of a number of dropout prevention programs and activities which were conducted in Dade County school years 1984-85 and 1985-86, and it is here investigated longitudinally through the end of the 1987-88 school year. It involved 17 junior and senior high schools, and 27 programs, 10 the first year and 17 the second, with over 1,000 total students, who had been selected by the schools from a list of the "at risk" students provided by the district, and were divided approximately evenly into the classical research design of an experimental group and the control group, which following standard procedure was to take the regular school curriculum. No school had more than 25 students in either group.^ Each school modified the basic design of the project to accommodate the individual school characteristics and the perceived needs of their students; however all schools projects were to include some form of academic enhancement, counseling and career awareness study.^ The conclusion of this study was that the control group had a significantly lower dropout rate than the experimental group. Though impossible to make a certain determination of the reasons for this unexpected result, it appears from evidence presented that one cause may have been inadequate administration at the local level.^ This study was also a longitudinal investigation of the "at risk" population as a whole for the three and four year period, to determine if academic factors were present in records may be used to identify dropout proneness.^ A significant correlation was found between dropping out and various measures including scores on the Quality of School Life Instrument, attendance, grade point averages, mathematics grades, and overage in grade, important identifiers in selection for dropout prevention programs. ^
Resumo:
If we classify variables in a program into various security levels, then a secure information flow analysis aims to verify statically that information in a program can flow only in ways consistent with the specified security levels. One well-studied approach is to formulate the rules of the secure information flow analysis as a type system. A major trend of recent research focuses on how to accommodate various sophisticated modern language features. However, this approach often leads to overly complicated and restrictive type systems, making them unfit for practical use. Also, problems essential to practical use, such as type inference and error reporting, have received little attention. This dissertation identified and solved major theoretical and practical hurdles to the application of secure information flow. ^ We adopted a minimalist approach to designing our language to ensure a simple lenient type system. We started out with a small simple imperative language and only added features that we deemed most important for practical use. One language feature we addressed is arrays. Due to the various leaking channels associated with array operations, arrays have received complicated and restrictive typing rules in other secure languages. We presented a novel approach for lenient array operations, which lead to simple and lenient typing of arrays. ^ Type inference is necessary because usually a user is only concerned with the security types for input/output variables of a program and would like to have all types for auxiliary variables inferred automatically. We presented a type inference algorithm B and proved its soundness and completeness. Moreover, algorithm B stays close to the program and the type system and therefore facilitates informative error reporting that is generated in a cascading fashion. Algorithm B and error reporting have been implemented and tested. ^ Lastly, we presented a novel framework for developing applications that ensure user information privacy. In this framework, core computations are defined as code modules that involve input/output data from multiple parties. Incrementally, secure flow policies are refined based on feedback from the type checking/inference. Core computations only interact with code modules from involved parties through well-defined interfaces. All code modules are digitally signed to ensure their authenticity and integrity. ^