964 resultados para Edward Snowden


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter will introduce Australia’s Dennis family – a case of ‘incremental entrepreneurship’ in the business transition from the first to the second generation. Following the second generation’s formal involvement and ownership in the business, Dennis Family Corporation (DFC) undertook a major professionalization process to formalize the family business and ensure its continued success. The members of the second generation have successfully sustained the entrepreneurial spirit of their family business (albeit in a different style), adding value to the firm in an ‘incremental’ manner. Throughout the chapter there will be a strong emphasis on the family element of DFC and the roles that each family member has played. Bert Dennis, as the founder and incumbent leader of the firm, has witnessed major changes to the business he built from the ground up. His children, in particular his son Grant Dennis as the primary next generation issue champion, have seen the changes from another perspective – ensuring the business remains within the family into the second generation and beyond. The professionalization process was sparked by a commitment from the second generation to continue to ‘make a real go’ of the family business rather than simply liquidating and distributing the assets. The dedication of all the family members to this objective has ensured the success of this process, and ultimately, the longevity of the firm. Although DFC has become more ‘professional’, it has not lost its entrepreneurial character; rather, it has improved the ways in which entrepreneurialism is fostered and pursued in the company. In essence, this case outlines how the implementation of appropriate governance and management practices has allowed the Dennis family to overcome the challenges and maximize the opportunities associated with owning and operating a multigenerational family fi rm. From a theoretical perspective, this case uses the concepts of entrepreneurial orientation (EO) (Lumpkin and Dess 1996) and the resource- based view (RBV) (Habbershon and Williams 1999; Barney 1991; Wernerfelt 1984) to demonstrate how the fi rm has leveraged its familiness to foster an enduring spirit of entrepreneurship and to maintain a sustained competitive advantage.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Player experience of spatiality in first-person, single-player games is informed by the maps and navigational aids provided by the game. This project uses textual analysis to examine the way these maps and navigational aids inform the experience of spatiality in Fallout 3, BioShock and BioShock 2. Spatiality is understood as trialectic, incorporating perceived, conceived and lived space, drawing on the work of Henri Lefebvre and Edward Soja. The most prominent elements of the games’ maps and navigational aids are analysed in terms of how they inform players’ experience of the games’ spaces. In particular this project examines the in-game maps these games incorporate, the waypoint navigation and fast-travel systems in Fallout 3, and the guide arrow and environmental cues in the BioShock games.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper provides fundamental understanding for the use of cumulative plots for travel time estimation on signalized urban networks. Analytical modeling is performed to generate cumulative plots based on the availability of data: a) Case-D, for detector data only; b) Case-DS, for detector data and signal timings; and c) Case-DSS, for detector data, signal timings and saturation flow rate. The empirical study and sensitivity analysis based on simulation experiments have observed the consistency in performance for Case-DS and Case-DSS, whereas, for Case-D the performance is inconsistent. Case-D is sensitive to detection interval and signal timings within the interval. When detection interval is integral multiple of signal cycle then it has low accuracy and low reliability. Whereas, for detection interval around 1.5 times signal cycle both accuracy and reliability are high.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Throughout the twentieth century the economics of the Middle East rose and fell many times in response to the external environment, including European de-colonization and the US and former USSR competing to provide military and economic aid after World War II. Throughout these upheavals the Middle East has remained internationally significant politically and economically not least for the region's large reserves of oil and gas, as discussed in the Introduction to this volume. In recent decades, Western nations have moved to invest into the Middle East in the rapidly developing technology, tourism and education industries that have proliferated. For its part, Iran has been the world's fourth largest provider of petroleum and second largest provider of natural gas and, despite years of political unrest, has made rapid expansion into information technology and telecommunications. Increased involvement in the global economy has meant that Iran has invested heavily in education and training and moved to modernize its management practices. Hitherto there has been little academic research into management in either Western or local organizations in Iran. This chapter seeks to address that gap in knowledge by exploring business leadership in Iran, with particular reference to cultural and institutional impacts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Evaluating the safety of different traffic facilities is a complex and crucial task. Microscopic simulation models have been widely used for traffic management but have been largely neglected in traffic safety studies. Micro simulation to study safety is more ethical and accessible than the traditional safety studies, which only assess historical crash data. However, current microscopic models are unable to mimic unsafe driver behavior, as they are based on presumptions of safe driver behavior. This highlights the need for a critical examination of the current microscopic models to determine which components and parameters have an effect on safety indicator reproduction. The question then arises whether these safety indicators are valid indicators of traffic safety. The safety indicators were therefore selected and tested for straight motorway segments in Brisbane, Australia. This test examined the capability of a micro-simulation model and presents a better understanding of micro-simulation models and how such models, in particular car following models can be enriched to present more accurate safety indicators.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

To achieve the sustainable use and development of water resources is a daunting challenge for both the global and local communities. It requires commitments by all groups within the international, national and local communities from their own particular, possibly conflicting, perspectives. Without a set of coherent legal arrangements designed to ensure effective governance of water resources, their sustainable use and development are unlikely to be achieved. This study looks at how the legal arrangements for managing water resources have evolved across the continents over hundreds of years; their relevance for contemporary society; how the norms of current international and national legal regimes are responding; and, most importantly, how legal rights and duties should be structured so as to achieve sustainability in the future.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Various time-memory tradeoffs attacks for stream ciphers have been proposed over the years. However, the claimed success of these attacks assumes the initialisation process of the stream cipher is one-to-one. Some stream cipher proposals do not have a one-to-one initialisation process. In this paper, we examine the impact of this on the success of time-memory-data tradeoff attacks. Under the circumstances, some attacks are more successful than previously claimed while others are less. The conditions for both cases are established.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The past two decades have witnessed a surge in interest in the field of nascent entrepreneurship. In this collection, the editors successfully draw together the most important works that utilize the new real-time approaches for studying early stage entrepreneurial activity that were developed and refined in the last couple of decades. Providing the empirical, theoretical and methodological insights from some of the most influential researchers in this field, this book is an indispensable source of reference for researchers, students and others who have an interest in new venture creation and its role in the economy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The compressed gas industry and government agencies worldwide utilize "adiabatic compression" testing for qualifying high-pressure valves, regulators, and other related flow control equipment for gaseous oxygen service. This test methodology is known by various terms including adiabatic compression testing, gaseous fluid impact testing, pneumatic impact testing, and BAM testing as the most common terms. The test methodology will be described in greater detail throughout this document but in summary it consists of pressurizing a test article (valve, regulator, etc.) with gaseous oxygen within 15 to 20 milliseconds (ms). Because the driven gas1 and the driving gas2 are rapidly compressed to the final test pressure at the inlet of the test article, they are rapidly heated by the sudden increase in pressure to sufficient temperatures (thermal energies) to sometimes result in ignition of the nonmetallic materials (seals and seats) used within the test article. In general, the more rapid the compression process the more "adiabatic" the pressure surge is presumed to be and the more like an isentropic process the pressure surge has been argued to simulate. Generally speaking, adiabatic compression is widely considered the most efficient ignition mechanism for directly kindling a nonmetallic material in gaseous oxygen and has been implicated in many fire investigations. Because of the ease of ignition of many nonmetallic materials by this heating mechanism, many industry standards prescribe this testing. However, the results between various laboratories conducting the testing have not always been consistent. Research into the test method indicated that the thermal profile achieved (i.e., temperature/time history of the gas) during adiabatic compression testing as required by the prevailing industry standards has not been fully modeled or empirically verified, although attempts have been made. This research evaluated the following questions: 1) Can the rapid compression process required by the industry standards be thermodynamically and fluid dynamically modeled so that predictions of the thermal profiles be made, 2) Can the thermal profiles produced by the rapid compression process be measured in order to validate the thermodynamic and fluid dynamic models; and, estimate the severity of the test, and, 3) Can controlling parameters be recommended so that new guidelines may be established for the industry standards to resolve inconsistencies between various test laboratories conducting tests according to the present standards?

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sfinks is a shift register based stream cipher designed for hardware implementation. The initialisation state update function is different from the state update function used for keystream generation. We demonstrate state convergence during the initialisation process, even though the individual components used in the initialisation are one-to-one. However, the combination of these components is not one-to-one.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Both the SSS and SOBER-t32 stream cipher designs use a single word-based shift register and a nonlinear filter function to produce keystream. In this paper we show that the algebraic attack method previously applied to SOBER-t32 is prevented from succeeding on SSS by the use of the key dependent substitution box (SBox) in the nonlinear filter of SSS. Additional assumptions and modifications to the SSS cipher in an attempt to enable algebraic analysis result in other difficulties that also render the algebraic attack infeasible. Based on these results, we conclude that a well chosen key-dependent substitution box used in the nonlinear filter of the stream cipher provides resistance against such algebraic attacks.