956 resultados para Modern portfolio theory
Resumo:
There is a general perception that public confidence in the insolvency profession is low as the result of the recent unethical practices of a few high profile liquidators. As a result, the effectiveness of the current regulatory mechanisms has been questioned, leading to a review of the performance of insolvency practitioners and subsequent regulation proposals. The challenge for the insolvency profession is balancing the expectations of the general public whilst ensuring that the obligations and duties imposed upon them are performed to acceptable and realistic standards. It is difficult (if not impossible) for the profession to meet this challenge in the absence of a cohesive framework which identifies those issues that require further regulation as opposed to those that relate to general education on the insolvency process. This paper will examine the audit expectations gap theory in the context of insolvency practitioners and suggests that a model based on this theory provides an effective framework for evaluating the regulation of the insolvency industry.
Resumo:
This thesis examines the question why the automotive mode and the large technological system it creates, continues to dominate urban transport systems despite the availability of more cost-efficient alternatives. A number of theoretical insights are developed into the way these losses evolve from path dependent growth, and lead to market failure and lock-in. The important role of asymmetries of influence is highlighted. A survey of commuters in Jakarta Indonesia is used to provide a measure of transport modal lock-in (TML) in a developing country conurbation. A discrete choice experiment is used to provide evidence for the thesis central hypothesis that in such conurbations there is a high level of commuter awareness of the negative externalities generated by TML which can produce a strong level of support for its reversal. Why TML nevertheless remains a strong and durable feature of the transport system is examined with reference to the role of asymmetries of influence.
Resumo:
This article responds to the invitation extended by Carney to engage in a dialogue on the topic of graduate legal research units. In his paper, Carney stated the approach of the Sydney course as being to teach theory rather than skills, to "pursue academic goals over skill competencies... ". The Faculty of Law at Queensland University of Technology introduced a postgraduate legal research unit in 1993 with different perspectives and purposes to the Sydney course, and given this experience, the opportunity for a discussion on aspects of such units including the theoretical versus practical approach to teaching cannot be ignored.
Resumo:
The functions of the volunteer functions inventory were combined with the constructs of the theory of planned behaviour (i.e., attitudes, subjective norms, and perceived behavioural control) to establish whether a stronger, single explanatory model prevailed. Undertaken in the context of episodic, skilled volunteering by individuals who were retired or approaching retirement (N = 186), the research advances on prior studies which either examined the predictive capacity of each model independently or compared their explanatory value. Using hierarchical regression analysis, the functions of the volunteer functions inventory (when controlling for demographic variables) explained an additional 7.0% of variability in individuals’ willingness to volunteer over and above that accounted for by the theory of planned behaviour. Significant predictors in the final model included attitudes, subjective norms and perceived behavioural control from the theory of planned behaviour and the understanding function from the volunteer functions inventory. It is proposed that the items comprising the understanding function may represent a deeper psychological construct (e.g., self-actualisation) not accounted for by the theory of planned behaviour. The findings highlight the potential benefit of combining these two prominent models in terms of improving understanding of volunteerism and providing a single parsimonious model for raising rates of this important behaviour.
Resumo:
Purpose: The purpose of this paper is to review, critique and develop a research agenda for the Elaboration Likelihood Model (ELM). The model was introduced by Petty and Cacioppo over three decades ago and has been modified, revised and extended. Given modern communication contexts, it is appropriate to question the model’s validity and relevance. Design/methodology/approach: The authors develop a conceptual approach, based on a fully comprehensive and extensive review and critique of ELM and its development since its inception. Findings: This paper focuses on major issues concerning the ELM. These include model assumptions and its descriptive nature; continuum questions, multi-channel processing and mediating variables before turning to the need to replicate the ELM and to offer recommendations for its future development. Research limitations/implications: This paper offers a series of questions in terms of research implications. These include whether ELM could or should be replicated, its extension, a greater conceptualization of argument quality, an explanation of movement along the continuum and between central and peripheral routes to persuasion, or to use new methodologies and technologies to help better understanding consume thinking and behaviour? All these relate to the current need to explore the relevance of ELM in a more modern context. Practical implications: It is time to question the validity and relevance of the ELM. The diversity of on- and off-line media options and the variants of consumer choice raise significant issues. Originality/value: While the ELM model continues to be widely cited and taught as one of the major cornerstones of persuasion, questions are raised concerning its relevance and validity in 21st century communication contexts.
Resumo:
This paper uses transaction cost theory to study cloud computing adoption. A model is developed and tested with data from an Australian survey. According to the results, perceived vendor opportunism and perceived legislative uncertainty around cloud computing were significantly associated with perceived cloud computing security risk. There was also a significant negative relationship between perceived cloud computing security risk and the intention to adopt cloud services. This study also reports on adoption rates of cloud computing in terms of applications, as well as the types of services used.
Resumo:
The wave of democratisation across Europe, Africa, Asia and Latin America in the early 1990s triggered an increase in donor funding to media assistance initiatives, primarily within good governance policy frameworks. However, few media assistance projects have managed to effectively evaluate the impacts of their work. This thesis explores how the impacts of Australian media assistance on social change and governance can be most effectively evaluated and understood. The findings of this research suggest the importance of early investment in participatory planning of evaluation designs, which are then periodically revisited. These evaluation designs should be based on a theoretically sound link between models of change, evaluative questions and methods.
Resumo:
The phenomenon which dialogism addresses is human interaction. It enables us to conceptualise human interaction as intersubjective, symbolic, cultural, transformative and conflictual, in short, as complex. The complexity of human interaction is evident in all domains of human life, for example, in therapy, education, health intervention, communication, and coordination at all levels. A dialogical approach starts by acknowledging that the social world is perspectival, that people and groups inhabit different social realities. This book stands apart from the proliferation of recent books on dialogism, because rather than applying dialogism to this or that domain, the present volume focuses on dialogicality itself to interrogate the concepts and methods which are taken for granted in the burgeoning literature.
Resumo:
Contents: 1. SOCIOLOGY: An Introduction to the Sociological Imagination. John Carl, Sarah Baker 2. SOCIOLOGICAL THEORY: An Introduction to the Theoretical Foundations of Sociology. John Carl, Sarah Baker 3. SOCIAL CLASS IN AUSTRALIA: Stratification in a Modern Society. John Carl, John Scott 4. RACE AND ETHNIC STRATIFICATION: Is it a Question of Colour? John Carl, John Scott 5. SEX AND GENDER: The Social Side of Sex. John Carl, Wendy Hillman 6. AGE AND AGEING: The Greying of Society. John Carl, Sarah Baker 7. CRIME AND THE LEGAL SYSTEM: How Do Societies Respond to Crime and Deviance? John Carl, John Scott 8. EDUCATION AND EMPLOYMENT: From the Classroom to the Workforce. John Carl, Sarah Baker and Brady Robards 9: MARRIAGE AND FAMILY: How Do Societies Perpetuate Themselves? John Carl, Wendy Hillman 10. THE BODY, HEALTH AND ILLNESS: A Weight on Australia’s Shoulder. John Carl, John Scott 11. GLOBALISATION: The Economy and Society. John Carl, Geoffrey Lawrence 12. CULTURE: A Framework for the Individual. John Carl, Sarah Baker and Brady Robards 13. RELIGION: Is Society Losing Faith? John Carl, Sarah Baker and Brady Robards 14. ENVIRONMENTAL SUSTAINABILITY AND SOCIAL MOVEMENTS: How Do Societies Connect with Nature? John Carl, Geoffrey Lawrence 15. SOCIOLOGICAL RESEARCH: How Do We Learn about Society? John Carl, Wendy Hillman
Resumo:
Table of Contents Acknowledgments Preface by Dr. Pat Carlen Introduction 1. Political Languages of Prostitution 2. Genealogical Analysis: Documenting The Disorder of Things 3. From Death Rituals to Health Practices 4. Policing Female Prostitutes 5. Private Remedies for Public Concerns 6. The Emergence of the Male Prostitute 7. From Procreation to Pleasure 8. HIV/AIDS and Prostitution Conclusion Bibliography Index
Resumo:
Introduction: Ten years after the publication of Elaborated Intrusion (EI) Theory, there is now substantial research into its key predictions. The distinction between intrusive thoughts, which are driven by automatic processes, and their elaboration, involving controlled processing, is well established. Desires for both addictive substances and other desired targets are typically marked by imagery, especially when they are intense. Attention training strategies such as body scanning reduce intrusive thoughts, while concurrent tasks that introduce competing sensory information interfere with elaboration, especially if they compete for the same limited-capacity working memory resources. Conclusion: EI Theory has spawned new assessment instruments that are performing strongly and offer the ability to more clearly delineate craving from correlated processes. It has also inspired new approaches to treatment. In particular, training people to use vivid sensory imagery for functional goals holds promise as an intervention for substance misuse, since it is likely to both sustain motivation and moderate craving.
Resumo:
Background and Aims Research into craving is hampered by lack of theoretical specification and a plethora of substance-specific measures. This study aimed to develop a generic measure of craving based on elaborated intrusion (EI) theory. Confirmatory factor analysis (CFA) examined whether a generic measure replicated the three-factor structure of the Alcohol Craving Experience (ACE) scale over different consummatory targets and time-frames. Design Twelve studies were pooled for CFA. Targets included alcohol, cigarettes, chocolate and food. Focal periods varied from the present moment to the previous week. Separate analyses were conducted for strength and frequency forms. Setting Nine studies included university students, with single studies drawn from an internet survey, a community sample of smokers and alcohol-dependent out-patients. Participants A heterogeneous sample of 1230 participants. Measurements Adaptations of the ACE questionnaire. Findings Both craving strength [comparative fit indices (CFI = 0.974; root mean square error of approximation (RMSEA) = 0.039, 95% confidence interval (CI) = 0.035–0.044] and frequency (CFI = 0.971, RMSEA = 0.049, 95% CI = 0.044–0.055) gave an acceptable three-factor solution across desired targets that mapped onto the structure of the original ACE (intensity, imagery, intrusiveness), after removing an item, re-allocating another and taking intercorrelated error terms into account. Similar structures were obtained across time-frames and targets. Preliminary validity data on the resulting 10-item Craving Experience Questionnaire (CEQ) for cigarettes and alcohol were strong. Conclusions The Craving Experience Questionnaire (CEQ) is a brief, conceptually grounded and psychometrically sound measure of desires. It demonstrates a consistent factor structure across a range of consummatory targets in both laboratory and clinical contexts.
Resumo:
Entrepreneurship Programs and the Modern University is an excellent resource for those who intend to set up an entrepreneurship program or centre, and arguably even more so for those who wish to coordinate or expand such activities into an effective "entrepreneurship eco-system" across the university and its external stakeholders. Morris, Kuratko, and Cornwall's intention in writing this book is to "advocate a more strategic and integrative framework for building the curricular, co-curricular, research, community engagement, and infrastructure components of a program" (p. xii).
Resumo:
We compare three alternative methods for eliciting retrospective confidence in the context of a simple perceptual task: the Simple Confidence Rating (a direct report on a numerical scale), the Quadratic Scoring Rule (a post-wagering procedure), and the Matching Probability (MP; a generalization of the no-loss gambling method). We systematically compare the results obtained with these three rules to the theoretical confidence levels that can be inferred from performance in the perceptual task using Signal Detection Theory (SDT). We find that the MP provides better results in that respect. We conclude that MP is particularly well suited for studies of confidence that use SDT as a theoretical framework.
Resumo:
Since the 1980s the concept of risk has produced a large and diverse volume of sociological research. Ulrich Beck’s groundbreaking risk society thesis provides a particularly engaging contribution, since it seems that nearly every sociological account of risk engages with this work. For Beck, we are living in second modernity – a new epoch that breaks with pre-modernity and industrial society due to the centrality, incalculability and reflexivity of globalised risk. While Beck’s theory is compelling, a reading of other theorists such as Foucault (2007[1978]) and Hacking (1975,1990) suggests that a difficulty with Beck’s work is that in attempting to explain what is novel about risk in contemporary times, he too quickly passes over the complexities and ruptures of historical change that impact on the history and contingency of risk. This paper begins by presenting a brief analysis of the present state of risk by introducing Beck’s historical narrative of risk from pre-modernity to the risk society; it then outlines the challenges with the “risk as epoch” argument by considering a range of literature, which suggests risk has a more complex history than proposed by Beck; and finally it highlights the value in examining strategies of statecraft in early modern Europe, specifically Machiavelli’s The Prince (2008[1513]) and Giovanni Botero’s political treatise, Della Ragion di Stato (1956[1589]) – as a means of more thoroughly understanding how our current concept of risk emerges. In doing so, this paper seeks to open up new trajectories in the historicisation of risk for other interested scholars.