813 resultados para Contractual party


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Worldwide, education systems have undergone unprecedented change due to a variety of economic, social, and political forces (Limerick, Cunnington & Crowther, 2002). The People’s Republic of China (PRC) is no exception. Continuous educational reform at primary and secondary levels in Mainland China has created new challenges and accountabilities for school principals. The important role of principals in primary and secondary schools has been acknowledged in both policy documents and the broader literature (Central Committee of the Chinese Communist Party, 1985; F. Chen, 2005; Chu, 2003; W. Huang, 2005; T. Wang, 2003). Yet, most of the literature on primary and secondary school principals in Mainland China is prescriptive in nature, identifying from the perspectives of researchers and academics what principals should do and how they should enact leadership. Lacking in this research is an awareness of the daily practices and lived experiences of principals. Furthermore, within the small body of writing on primary and secondary school principals in Mainland China, gender is seldom given any attention. To date, only a small number of empirical studies have focused on female principals as a specific category of research (Zen, 2004; Zhong, 2004). This study aimed to explore the professional lives of two female exemplary school principals in urban primary schools in Mainland China. A qualitative exploratory case study was used. Semi-structured interviews with each individual female principal, with six teachers in each of the school sites and with the superintendent of each principal were conducted. Field observations and document analysis were also undertaken to obtain multiple insights about their leadership practices. The conceptual framework was based largely on the theory of Gronn (1999) and incorporated five core leadership practices (vision building, ethical considerations, teaching and learning, power utilisation, and dealing with risks and challenges) taken from the wider literature. The key findings of this study were twofold. Firstly, while the five leadership practices were evident in the leadership of the two principals, this study identified some subtle differences in the way they approached each of them. Secondly, contextual factors such as Chinese traditional culture, the contemporary societal context, and the school organisational context, in addition to the biographical experiences of each principal were significant factors in shaping the way in which they exercised their leadership practices in the schools.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The art of storytelling is one of the oldest forms of creative discourse. Apart from finding stories, the most important job in television is the construction of stories to have a broad audience appeal. This first-hand review of Missing Persons Unit, hereafter referred to as MPU, a prime time program on the Nine Network in Australia with immense audience appeal, is an original work by the executive producer (development and series producer Series One, executive producer Series Two and Three) based on an overview of two-and-a-half years of production on three series. Through a case study approach, this Masters project explores how story is constructed into a television format. The thesis comprises two parts: the creative component (weighted 50%) is demonstrated through two programs of MPU (one program for evaluation) and the academic component through a written exegesis (50%). This case study aims to demonstrate how observational hybrid series such as MPU can be managed to quick turn-around schedules with precise skill sets that cut across a number of traditional genre styles. With the advent of radio and then television, storytelling found a home and a series of labels called genres to help place them in a schedule for listeners and viewers to choose. Over recent years, with the advent of digital technology and the rush to collect the masses of content required to feed the growing television slate, storytelling has often been replaced by story gathering. Today even in factual series where a clear story construct is important, third party ‘quick fix’ specialists are hired to shape raw content shot by a field team, who never put their own work together and may never come into the edit suite during a project. This thesis explores the art of storytelling in fast turn-around television. In particular it explores the layer cake approach used in the production process of MPU, that enables producers of fast turn-around television to shepherd their own stories from field through to post-production. While each new hybrid series will require its own particular sets of skills, the exploration of the genesis of MPU will demonstrate the building blocks required to successfully produce this type of factual series. This study is also intended as a ‘road map’ for producers who wish to develop similar series.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party, and no third party can even verify the validity of a designated verifier signature. We show that anyone who intercepts one signature can verify subsequent signatures in Zhang-Mao ID-based designated verifier signature scheme and Lal-Verma ID-based designated verifier proxy signature scheme. We propose a new and efficient ID-based designated verifier signature scheme that is strong and unforgeable. As a direct corollary, we also get a new efficient ID-based designated verifier proxy signature scheme.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This position paper examines the development of a dedicated service aggregator role in business networks. We predict that these intermediaries will soon emerge in service ecosystems and add value through the application of dedicated domain knowledge in the process of creating new, innovative services or service bundles based on the aggregation, composition, integration or orchestration of existing services procured from different service providers in the service ecosystem. We discuss general foundations of service aggregators and present Fourth-Party Logistics Providers as a real-world example of emerging business service aggregators. We also point out a demand for future research, e.g. into governance models, risk management tools, service portfolio management approaches and service bundling techniques, to be able to better understand core determinants of competitiveness and success of service aggregators.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Technological and societal change, along with organisational and market change (driven by contracting-out and privatisation), are “creating a new generation of infrastructures” [1]. While inter-organisational contractual arrangements can improve maintenance efficiency through consistent and repeatable patterns of action - unanticipated difficulties in implementation can reduce the performance of these arrangements. When faced with unsatisfactory performance of contracting-out arrangements, government organisations may choose to adapt and change these arrangements over time, with the aim of improving performance. This paper enhances our understanding of ‘next generation infrastructures’ by examining adaptation of the organisational arrangements for the maintenance of these assets, in a case study spanning 20 years.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider a new form of authenticated key exchange which we call multi-factor password-authenticated key exchange, where session establishment depends on successful authentication of multiple short secrets that are complementary in nature, such as a long-term password and a one-time response, allowing the client and server to be mutually assured of each other's identity without directly disclosing private information to the other party. Multi-factor authentication can provide an enhanced level of assurance in higher-security scenarios such as online banking, virtual private network access, and physical access because a multi-factor protocol is designed to remain secure even if all but one of the factors has been compromised. We introduce a security model for multi-factor password-authenticated key exchange protocols, propose an efficient and secure protocol called MFPAK, and provide a security argument to show that our protocol is secure in this model. Our security model is an extension of the Bellare-Pointcheval-Rogaway security model for password-authenticated key exchange and accommodates an arbitrary number of symmetric and asymmetric authentication factors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Parliamentary questions are the most popular and visible tool for making the executive accountable to the legislature. However, their use, purpose and effectiveness vary in different countries. In this study, 4023 parliamentary questions asked in the Uttar Pradesh State Legislative Assembly were analysed. The results show that half of the total members of the Assembly used this device. Contrary to findings in the Australian parliamentary system, there was no evidence of ‘Dorothy Dix’ and party influence on parliamentary questions. Furthermore, 30% of the questions were aimed at seeking information and 70% pressed for action. The government provided the required information in 95% of the questions in the former category but only took action in 37% in the latter category. The study concludes that parliamentary questions serve as an effective legislative tool in the Uttar Pradesh Legislature

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Australian Constitutional referendums have been part of the Australian political system since federation. Up to the year 1999 (the time of the last referendum in Australia), constitutional change in Australia does not have a good history of acceptance. Since 1901, there have been 44 proposed constitutional changes with eight gaining the required acceptance according to section 128 of the Australian Constitution. In the modern era since 1967, there have been 20 proposals over seven referendum votes for a total of four changes. Over this same period, there have been 13 federal general elections which have realised change in government just five times. This research examines the electoral behaviour of Australian voters from 1967 to 1999 for each referendum. Party identification has long been a key indicator in general election voting. This research considers whether the dominant theory of voter behaviour in general elections (the Michigan Model) provides a plausible explanation for voting in Australian referendums. In order to explain electoral behaviour in each referendum, this research has utilised available data from the Australian Electoral Commission, the 1996 Australian Bureau of Statistics Census data, and the 1999 Australian Constitutional Referendum Study. This data has provided the necessary variables required to measure the impact of the Michigan Model of voter behaviour. Measurements have been conducted using bivariate and multivariate analyses. Each referendum provides an overview of the events at the time of the referendum as well as the =yes‘ and =no‘ cases at the time each referendum was initiated. Results from this research provide support for the Michigan Model of voter behaviour in Australian referendum voting. This research concludes that party identification, as a key variable of the Michigan Model, shows that voters continue to take their cues for voting from the political party they identify with in Australian referendums. However, the outcome of Australian referendums clearly shows that partisanship is only one of a number of contributory factors in constitutional referendums.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article examines the representation of Indigenous sexuality on Australian television drama since the 1970s, suggesting the political importance of such representations. In 1976 Justine Saunders became the first regular Indigenous character on an Australian television drama series, as the hairdresser Rhonda Jackson in Number 96. She was presented as sexually attractive, but this was expressed through a rape scene after a party. Twenty five years later, Deborah Mailman starred in The Secret Life of Us, as Kelly, who is also presented as sexually attractive. But her character can be seen in many romantic relationships. The article explores changing representations that moved us from Number 96 to The Secret Life of Us, via The Flying Doctors and Heartland. It suggests that in representations of intimate and loving relationships on screen it has only recently become possible to see hopeful models for interaction between Indigenous and non-Indigenous Australians.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines voter attitudes and behaviour at the 2007 Australian federal election., using data from the Australian Election Study. It considers socio-demographic factors as well as the role of policy issues and voter evaluations of the party leaders. The paper concludes that issues, such as the government's WorkChoices policy, as well as health and leadership contributed to Labor's victory.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sub-surface minerals are in most cases considered to be the proprietary right of a country should those minerals be found within its borders. PRO169 (Indigenous Peoples’ Rights, International Labour Organization) has recorded instances where the private land of indigenous peoples has been pilfered by a government – often through the sale of a contract to a private company, and without the consent of the people living on that land. Other times, indigenous peoples, the government they find themselves living in, and the company that bought mining rights engage in consultation. But these practices are far from transparent, equitable, or fair as indigenous peoples are often unskilled in contractual law and do not have the same legal resources as the company or government does. This paper argues that the sub-surface minerals found within the territory of indigenous tribes should be legally allocated as theirs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Increasingly, major insurers and reinsurers are operating on a global basis. For example, General Re Corporation and Cologne Re operate in almost 150 countries : see "General Re Corporation 1999 Annual Report". This is also true for the world's major brokers, and the emergence of large broking conglomerates such as Aon and Marsh are good examples of global service providers. Against the background of this increasingly global insurance market with global participants, there are a range of common legal issues in this article but a selection of certain critical matters are canvassed in the secitons below. First there are a range of regulatory issues that must be addressed. Secondly globalisation of the industry does create added incentive for a common legal regime to cover the formation of insurance transactions and the resolution of disputes about claims, coverage and termination. In this contect codifcation of insurance laws is a critical issue. Thirdly, major advances in genetic research and biotechnology over recent years have resulted in a dramatic increase in the availability of genetic testing. These developments have given rise to concerns worldwide about the potential for misuse of genetic information by third parties such as insurers and employers. Fourthly, the essence of an insurance transaction is the transference of risk from one person to anther. It is generally accepted that this transference should occur in informed circumstances and without undue advantage being bestowed upon either party. Finally this article will consider some legal matter in relation to transacting insurance on the internet

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article examines the importance of accurate classification and identification of risk with particular reference to the problem of adverse selection. It is argued that, historically, this concern was the paramount consideration influencing standard form contract formation and disclosure laws. The scope of its relevance today however is less apparent in that contemporary insurance contracting is conducted in a vastly different environment from that which prevailed at the time Lloyd's was better known as a coffee house. Accordingly, the second part of this article looks at the contemporary framework of information disclosure and those dynamics within it designed to elicit information weighing on risk forecasting : specifically, (a) direct inquiry and testing requirements; (b) signaling - or incentive based structuring of insurance contractual and (c) bargaining in the shadow of the utmost good faith doctrine. Finally, certain conclusions arising out of contemporary and historical economic considerations underpinning disclosure in insurance law are outlined.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose: The component modules in the standard BEAMnrc distribution may appear to be insufficient to model micro-multileaf collimators that have tri-faceted leaf ends and complex leaf profiles. This note indicates, however, that accurate Monte Carlo simulations of radiotherapy beams defined by a complex collimation device can be completed using BEAMnrc's standard VARMLC component module.---------- Methods: That this simple collimator model can produce spatially and dosimetrically accurate micro-collimated fields is illustrated using comparisons with ion chamber and film measurements of the dose deposited by square and irregular fields incident on planar, homogeneous water phantoms.---------- Results: Monte Carlo dose calculations for on- and off-axis fields are shown to produce good agreement with experimental values, even upon close examination of the penumbrae.--------- Conclusions: The use of a VARMLC model of the micro-multileaf collimator, along with a commissioned model of the associated linear accelerator, is therefore recommended as an alternative to the development or use of in-house or third-party component modules for simulating stereotactic radiotherapy and radiosurgery treatments. Simulation parameters for the VARMLC model are provided which should allow other researchers to adapt and use this model to study clinical stereotactic radiotherapy treatments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session key security, our security model also provides for credential privacy: a participating party learns nothing more about the other party's credentials than whether they satisfy the given predicate. Our model also encompasses attribute-based key exchange since it is a special case of predicate-based key exchange.---------- We demonstrate how to realize a secure predicate-based key exchange protocol by combining any secure predicate-based signature scheme with the basic Diffie-Hellman key exchange protocol, providing an efficient and simple solution.