878 resultados para IP enforcement
Resumo:
This study considers the influence of contracts on enforcement and the subsequent performance impact of aligned and misaligned enforcement. We define enforcement as a corrective action aimed at remedying problems occurring in the transaction. First we explain the role of contracts and show that at the component level, contracts can both increase and decrease enforcement. Building on an alignment perspective and accounting for the endogeneity of enforcement, we use these contractual components and variables related to enforcement to predict the occurrence of enforcement. We use such predictions to show that aligned enforcement results in higher performance. We also show that the performance impact of misaligned enforcement is relatively greater for transactions where enforcement is not expected. We conduct the study using a unique dataset reporting on 971 business transactions across a wide range of industries.
Resumo:
This paper analyses market valuations of UK companies using a new data set of their R&D and IP activities (1989–2002). In contrast to previous studies, the analysis is conducted at the sectoral-level, where the sectors are based on the technological classification originating from Pavitt [Pavitt, K., 1984. Sectoral patterns of technical change. Research Policy 13, 343–373]. The first main result is that the valuation of R&D varies substantially across these sectors. Another important result is that, on average, firms that receive only UK patents tend to have no significant market premium. In direct contrast, patenting through the European Patent Office does raise market value, as does the registration of trade marks in the UK for most sectors. To explore these variations the paper links competitive conditions with the market valuation of innovation. Using profit persistence as a measure of competitive pressure, we find that the sectors that are the most competitive have the lowest market valuation of R&D. Furthermore, within the most competitive sector (‘science based’ manufacturing), firms with larger market shares (an inverse indicator of competitive pressure) also have higher R&D valuations, as well as some positive return to UK patents. We conclude that this evidence supports Schumpeter by finding higher returns to innovation in less than fully competitive markets and contradicts Arrow [Arrow, K., 1962. Economic welfare and the allocation of resources for invention. In: Nelson, R. (Ed.), The Rate and Direction of Inventive Activity. Princeton University Press, Princeton], who argued that, with the existence of IP rights, competitive market structure provides higher incentives to innovate.
Resumo:
The present study explores strategies used to legitimize the transfer of organizational practices in a situation of institutional upheaval. We apply the logic of social action (Risse, 2000) to analyze the effectiveness of consequence-based action and communication-based action, in terms of higher coordination, lower conflict, and overall higher economic performance. Consequence-based legitimation is obtained by using a system of distributor incentives tied to performance of specific tasks, while communicative legitimation can be achieved by recommendations and warnings. Our setting is an export channel to European emerging economies. Our results indicate that in the absence of legitimacy, as manifested in discretionary legal enforcement, consequence-based legitimation is more effective than communicative legitimation in reducing conflict, increasing coordination, and ultimately in improving the performance of the export dyad. © 2014 Elsevier Inc.
Resumo:
This report analyses the 2001 cohort of UK SMEs. The specific focus is on the link between IP activity in 2001 and subsequent performance (to 2004). The 2001 cohort contains 130,082 SMEs of which 3,123 were IP active (2.4%). Specifically, 1,872 SMEs had at least one UK trade mark publication; 697 had one or more Community trade mark registrations; 646 SMEs had one or more UK patents; and 443 had one or more EPO patent publications. The outcome and financial performance of the SMEs is analysed in various ways. Initially, we look at the determinants of survival to 2004. We then look at growth of assets and turnover for the period 2001 to 2004.
Resumo:
Possibilities for investigations of 43 varieties of file formats (objects), joined in 10 groups; 89 information attacks, joined in 33 groups and 73 methods of compression, joined in 10 groups are described in the paper. Experimental, expert, possible and real relations between attacks’ groups, method’ groups and objects’ groups are determined by means of matrix transformations and the respective maximum and potential sets are defined. At the end assessments and conclusions for future investigation are proposed.
Resumo:
It is unquestioned that the importance of IP network will further increase and that it will serve as a platform for more and more services, requiring different types and degrees of service quality. Modern architectures and protocols are being standardized, which aims at guaranteeing the quality of service delivered to users. In this paper, we investigate the queueing behaviour found in IP output buffers. This queueing increases because multiple streams of packets with different length are being multiplexed together. We develop balance equations for the state of the system, from which we derive packet loss and delay results. To analyze these types of behaviour, we study the discrete-time version of the “classical” queue model M/M/1/k called Geo/Gx/1/k, where Gx denotes a different packet length distribution defined on a range between a minimum and maximum value.
Resumo:
This paper is sponsored by the Ministry of Education and Research of the Republic of Bulgaria in the framework of project No 105 “Multimedia Packet Switching Networks Planning with Quality of Service and Traffic Management”.
Resumo:
The principles of adaptive routing and multi-agent control for information flows in IP-networks.
Resumo:
Communication in Forensic Contexts provides in-depth coverage of the complex area of communication in forensic situations. Drawing on expertise from forensic psychology, linguistics and law enforcement worldwide, the text bridges the gap between these fields in a definitive guide to best practice. •Offers best practice for understanding and improving communication in forensic contexts, including interviewing of victims, witnesses and suspects, discourse in courtrooms, and discourse via interpreters •Bridges the knowledge gaps between forensic psychology, forensic linguistics and law enforcement, with chapters written by teams bringing together expertise from each field •Published in collaboration with the International Investigative Interviewing Research Group, dedicated to furthering evidence-based practice and practice-based research amongst researchers and practitioners •International, cross-disciplinary team includes contributors from North America, Europe and Asia Pacific, and from psychology, linguistics and forensic practice
Resumo:
The publication comments on certain moments of the method of teaching the types of addresses and their use in the TCP/IP protocol stack.
Resumo:
Mediation techniques provide interoperability and support integrated query processing among heterogeneous databases. While such techniques help data sharing among different sources, they increase the risk for data security, such as violating access control rules. Successful protection of information by an effective access control mechanism is a basic requirement for interoperation among heterogeneous data sources. ^ This dissertation first identified the challenges in the mediation system in order to achieve both interoperability and security in the interconnected and collaborative computing environment, which includes: (1) context-awareness, (2) semantic heterogeneity, and (3) multiple security policy specification. Currently few existing approaches address all three security challenges in mediation system. This dissertation provides a modeling and architectural solution to the problem of mediation security that addresses the aforementioned security challenges. A context-aware flexible authorization framework was developed in the dissertation to deal with security challenges faced by mediation system. The authorization framework consists of two major tasks, specifying security policies and enforcing security policies. Firstly, the security policy specification provides a generic and extensible method to model the security policies with respect to the challenges posed by the mediation system. The security policies in this study are specified by 5-tuples followed by a series of authorization constraints, which are identified based on the relationship of the different security components in the mediation system. Two essential features of mediation systems, i. e., relationship among authorization components and interoperability among heterogeneous data sources, are the focus of this investigation. Secondly, this dissertation supports effective access control on mediation systems while providing uniform access for heterogeneous data sources. The dynamic security constraints are handled in the authorization phase instead of the authentication phase, thus the maintenance cost of security specification can be reduced compared with related solutions. ^
Sales tax enforcement: An empirical analysis of compliance enforcement methodologies and pathologies
Resumo:
Most research on tax evasion has focused on the income tax. Sales tax evasion has been largely ignored and dismissed as immaterial. This paper explored the differences between income tax and sales tax evasion and demonstrated that sales tax enforcement is deserving of and requires the use of different tools to achieve compliance. Specifically, the major enforcement problem with sales tax is not evasion: it is theft perpetrated by companies that act as collection agents for the state. Companies engage in a principal-agent relationship with the state and many retain funds collected as an agent of the state for private use. As such, the act of sales tax theft bears more resemblance to embezzlement than to income tax evasion. It has long been assumed that the sales tax is nearly evasion free, and state revenue departments report voluntary compliance in a manner that perpetuates this myth. Current sales tax compliance enforcement methodologies are similar in form to income tax compliance enforcement methodologies and are based largely on trust. The primary focus is on delinquent filers with a very small percentage of businesses subject to audit. As a result, there is a very large group of noncompliant businesses who file on time and fly below the radar while stealing millions of taxpayer dollars. ^ The author utilized a variety of statistical methods with actual field data derived from operations of the Southern Region Criminal Investigations Unit of the Florida Department of Revenue to evaluate current and proposed sales tax compliance enforcement methodologies in a quasi-experimental, time series research design and to set forth a typology of sales tax evaders. This study showed that current estimates of voluntary compliance in sales tax systems are seriously and significantly overstated and that current enforcement methodologies are inadequate to identify the majority of violators and enforce compliance. Sales tax evasion is modeled using the theory of planned behavior and Cressey’s fraud triangle and it is demonstrated that proactive enforcement activities, characterized by substantial contact with non-delinquent taxpayers, results in superior ability to identify noncompliance and provides a structure through which noncompliant businesses can be rehabilitated.^