477 resultados para Hostile takeover
Resumo:
This article is based on an analysis of narratives of 26 offenders with mental health problems living in the United Kingdom. It explores the impact of an ascribed dangerous status and the construction of the self as moral and responsible in response to this label with reference to the literature on denial, deviance disavowal and other “techniques of neutralization” and Goffman's presentation of self. Two dominant strands are identified in relation to the construction of moral self-hood: “Not my fault” and “Good at heart” narratives. “Techniques of neutralization” are widely drawn on, particularly denial of responsibility in the “Not my fault” narratives that seek to explain anti-social behavior with reference to external forces such as a hostile environment inhibiting their ability to control their lives. In contrast, “Good at heart” narratives draw on the essentially good and moral nature of the inner-self. Both are used as evidence of sharing and adhering to moral norms in order to present an acceptable and credible self.
Resumo:
Relocated people habitually seek the familiar within their new social milieus as a means of easing their transition into ways strange and alien. However, from networks and food to everyday customs, efforts to hold on to such home comforts are often viewed with a measure of hostile disdain and regarded as preludes to the formation of ethnic enclaves. Through a pilot study on the access of satellite television by mainland Chinese migrants in Perth, Western Australia, this chapter seeks to shed some light on how migrants understand and employ these comforting strategies and how Chinese-Australians are using technology to achieve a sense of sanctuary from the views and habits of Australians while (re)constructing and articulating multiple belongings in their new homes.
Resumo:
Aggressive driving is considered an important road-safety concern for drivers in highly motorised countries. However, understanding of the causes and maintenance factors fundamental to aggressive driving is limited. In keeping with theoretical advances from general aggression research such as the General Aggression Model (GAM), research has begun to examine the emotional and cognitive antecedents of aggressive driving in order to better understand the underlying processes motivating aggressive driving. Early findings in the driving area have suggested that greater levels of aggression are elicited in response to an intentionally aggressive on-road event. In contrast, general aggression research suggests that greater levels of aggression are elicited in response to an ambiguous event. The current study examined emotional and cognitive responses to two hypothetical driving scenarios with differing levels of aggressive intent (intentional versus ambiguous). There was also an interest in whether factors influencing responses were different for hostile aggression (that is, where the action is intended to harm the other) versus instrumental aggression (that is, where the action is motivated by an intention to remove an impediment or attain a goal). Results were that significantly stronger negative emotion and negative attributions, as well as greater levels of threat were reported in response to the scenario which was designed to appear intentional in nature. In addition, participants were more likely to endorse an aggressive behavioural response to a situation that appeared deliberately aggressive than to one where the intention was ambiguous. Analyses to determine if greater levels of negative emotions and cognitions are able to predict aggressive responses provided different patterns of results for instrumental aggression from those for hostile aggression. Specifically, for instrumental aggression, negative emotions and negative attributions were significant predictors for both the intentional and the ambiguous scenarios. In addition, perceived threat was also a significant predictor where the other driver’s intent was clearly aggressive. However, lower rather than higher, levels of perceived threat were associated with greater endorsement of an aggressive response. For hostile aggressive behavioural responses, trait aggression was the strongest predictor for both situations. Overall the results suggest that in the driving context, instrumental aggression is likely to be a much more common response than hostile aggression. Moreover, aggressive responses are more likely in situations where another driver’s behaviour is clearly intentional rather than ambiguous. The results also support the conclusion that there may be different underlying mechanisms motivating an instrumental aggressive response to those motivating a hostile one. In addition, understanding the emotions and cognitions underlying aggressive driving responses may be helpful in predicting and intervening to reduce driving aggression. The finding that drivers appear to regard tailgating as an instrumental response is of concern since this behaviour has the potential to result in crashes.
Resumo:
Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighboring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools.
Resumo:
Secure communications between large number of sensor nodes that are randomly scattered over a hostile territory, necessitate efficient key distribution schemes. However, due to limited resources at sensor nodes such schemes cannot be based on post deployment computations. Instead, pairwise (symmetric) keys are required to be pre-distributed by assigning a list of keys, (a.k.a. key-chain), to each sensor node. If a pair of nodes does not have a common key after deployment then they must find a key-path with secured links. The objective is to minimize the keychain size while (i) maximizing pairwise key sharing probability and resilience, and (ii) minimizing average key-path length. This paper presents a deterministic key distribution scheme based on Expander Graphs. It shows how to map the parameters (e.g., degree, expansion, and diameter) of a Ramanujan Expander Graph to the desired properties of a key distribution scheme for a physical network topology.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pair wise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighbouring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighbouring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools. Comparison to probabilistic schemes shows that our combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
Previous research on homeless adolescents has largely ignored the distinction between those who have left home on their volition (runaways) and those who have been forced to leave (throwaways). Fifty-two homeless adolescents in Brisbane, Australia, were assessed to compare male and female runaways and throwaways for social adjustment and symptomatology. Differences for social adjustment (antisocial tendencies and aggression) and symptomatology (social isolation and depression) were predicted. Results indicated that male runaways were significantly more hostile than male throwaways (p < 0,001), and significantly more socially isolated than female runaways (p < 0,025). Female throwaways, however, were significantly more hostile than male throwaways (p < 0,025) and female runaways (p < 0,025). Yet homeless males overall had a significantly stronger urge to act out hostility than homeless females (p < 0,025). In addition, female throwaways were significantly more antisocial than male throwaways (p < 0,001). There were no significant differences for depression. A theory of inner social control (Hirschi, 1969), postulating absence of bonding in earlier socialization, was supported.
Resumo:
Plant and machinery valuation is important to every company.s annual financial reporting. It is reported under the non-current assets section, and the valuers are generally employed to provide the up to date valuation of the non-current assets valuation such as property, plant and equipment that can make up to 80% of the total assets of a company. The valuation of plant and machinery is also important for other purposes such as securing loan facilities, sales, takeover, insurance and auction. The application of 2005 International Financial Reporting Standard (IFRS) has a subsequent impact on the financial sector, as a whole. The accountants have to choose between the Historical Cost approach and Market Value approach in determining the value of the client.s assets. In Malaysia, the implementation of IFRS has a domino effect on the financial system, especially for plant and machinery valuation for financial reporting. The comparison data for plant and machinery valuation is limited unlike land and building valuation. The question of Malaysian valuer.s ability to comply with the IFRS standard keeps rising every day, not just to the accountants, but also other related parties such as financial institutions, government agencies and the clients. This is happening because of different interpretations of premise of value for plant and machinery, as well as methods been used and differences in standards of reporting among the valuers conducting plant and machinery valuation. The root of the problem lies in the lack of practical guidelines governing plant and machinery valuation practices and different schools of thought among the valuers. Some follow the United Kingdom.s RICS guidelines, whilst some valuers are more comfortable with the United State.s USPAP rules, especially on the premise of value. This research is to investigate the international best practices of plant and machinery valuation and to establish the common valuation concept, awareness and application of valuation methodology and valuation process for plant and machinery valuation in Malaysia. This research uses a combination of the qualitative and quantitative research approach. In the qualitative approach, the content analyses were conducted from the international practices and current Malaysian implementation of plant and machinery valuation. A survey (quantitative approach) via questionnaire was implemented among the registered and probationary valuers in Malaysia to investigate their understanding and opinion relating to plant and machinery valuation based on the current practices. The significance of this research is the identification of international plant and machinery practices and the understanding of current practices of plant and machinery valuation in Malaysia. It is found that issues embedding plant and machinery valuation practices are limited numbers of resources available either from scholars or practitioner. This is supported by the general finding from the research survey that indicates that there are immediate needs for practical notes or guidelines to be developed and implemented to support the Malaysian valuers practising plant and machinery valuation. This move will lead to a better understanding of plant and machinery valuation, reducing discrepancies in valuation of plant and machinery and increased accuracy among practising valuers.
Resumo:
This study explores the accuracy and valuation implications of the application of a comprehensive list of equity multiples in the takeover context. Motivating the study is the prevalent use of equity multiples in practice, the observed long-run underperformance of acquirers following takeovers, and the scarcity of multiplesbased research in the merger and acquisition setting. In exploring the application of equity multiples in this context three research questions are addressed: (1) how accurate are equity multiples (RQ1); which equity multiples are more accurate in valuing the firm (RQ2); and which equity multiples are associated with greater misvaluation of the firm (RQ3). Following a comprehensive review of the extant multiples-based literature it is hypothesised that the accuracy of multiples in estimating stock market prices in the takeover context will rank as follows (from best to worst): (1) forecasted earnings multiples, (2) multiples closer to bottom line earnings, (3) multiples based on Net Cash Flow from Operations (NCFO) and trading revenue. The relative inaccuracies in multiples are expected to flow through to equity misvaluation (as measured by the ratio of estimated market capitalisation to residual income value, or P/V). Accordingly, it is hypothesised that greater overvaluation will be exhibited for multiples based on Trading Revenue, NCFO, Book Value (BV) and earnings before interest, tax, depreciation and amortisation (EBITDA) versus multiples based on bottom line earnings; and that multiples based on Intrinsic Value will display the least overvaluation. The hypotheses are tested using a sample of 147 acquirers and 129 targets involved in Australian takeover transactions announced between 1990 and 2005. The results show that first, the majority of computed multiples examined exhibit valuation errors within 30 percent of stock market values. Second, and consistent with expectations, the results provide support for the superiority of multiples based on forecasted earnings in valuing targets and acquirers engaged in takeover transactions. Although a gradual improvement in estimating stock market values is not entirely evident when moving down the Income Statement, historical earnings multiples perform better than multiples based on Trading Revenue or NCFO. Third, while multiples based on forecasted earnings have the highest valuation accuracy they, along with Trading Revenue multiples for targets, produce the most overvalued valuations for acquirers and targets. Consistent with predictions, greater overvaluation is exhibited for multiples based on Trading Revenue for targets, and NCFO and EBITDA for both acquirers and targets. Finally, as expected, multiples based Intrinsic Value (along with BV) are associated with the least overvaluation. Given the widespread usage of valuation multiples in takeover contexts these findings offer a unique insight into their relative effectiveness. Importantly, the findings add to the growing body of valuation accuracy literature, especially within Australia, and should assist market participants to better understand the relative accuracy and misvaluation consequences of various equity multiples used in takeover documentation and assist them in subsequent investment decision making.
Resumo:
This paper discusses the fast emerging challenges for Malay and Muslim sexual minority storytellers in the face of an aggressive state-sponsored Islamisation of a constitutionally secular Malaysia. I examine the case of Azwan Ismail, a gay Malay and Muslim Malaysian who took part in the local ‘It Gets Better’ Project, initiated in December 2010 by Seksualiti Merdeka (an annual sexuality rights festival) and who suffered an onslaught of hostile comments from fellow Malay Muslims. In this paper, I ask how a message aimed at discouraging suicidal tendencies among sexual minority teenagers can go so wrong. In discussing the contradictions between Azwan’s constructions of self and the expectations others have of him, I highlight the challenges for Azwan’s existential self. For storytellers who are vulnerable if visible, the inevitable sharing of a personal story with unintended and hostile audiences when placed online, can have significant repercussions. The purist Sunni Islam agenda in Malaysia not only rejects the human rights of the sexual minority in Malaysia but has influenced and is often a leading hostile voice in both regional and international blocs. This self-righteous and supremacist political Islam fosters a more disabling environment for vulnerable, minority communities and their human rights. It creates a harsher reality for the sexual minority that manifests in State-endorsed discrimination, compulsory counselling, forced rehabilitation and their criminalisation. It places the right of the sexual minority to live within such a community in doubt. I draw on existing literature on how personal stories have historically been used to advance human rights. Included too, is the signifance and implications of the work by social psychologists in explaining this loss of credibility of personal stories. I then advance an analytical framework that will allow storytelling as a very individual form of witnessing to reclaim and regain its ‘truth to power’.
Resumo:
The monstrous landscape and the revenge of nature are recurring motifs in Australian cinema. In the horror genre, the idea of the monstrous landscape emerges from, and builds upon, an established tradition in Australian cinema in which landscape functions not just as a setting for action, but also as a character in its own right. Rather than a picturesque wilderness or countryside, or a serene natural world untainted by civilisation – representations common in landscape cinema celebrating positive aspects of the Australian ‘outback’ – the monstrous landscape is a dangerous, malevolent and threatening force. Drawing upon themes also common in Australian Gothic narratives such as entrapment in a hostile environment, isolation and fear of the unknown (Turcotte, 1988, see also Jonathan Rayner’s essay in this volume), the monstrous landscape acts according to its own logic indecipherable to non-Indigenous Australians and is represented in terms of its alien-ness and inhuman horror.
Resumo:
The Family Attitude Scale (FAS) is a self-report measure of critical or hostile attitudes and behaviors towards another family member, and demonstrates an ability to predict relapse in psychoses. Data are not currently available on a French version of the scale. The present study developed a French version of the FAS, using a large general population sample to test its internal structure, criterion validity and relationships with the respondents' symptoms and psychiatric diagnoses, and examined the reciprocity of FAS ratings by respondents and their partners. A total of 2072 adults from an urban population undertook a diagnostic interview and completed self-report measures, including an FAS about their partner. A subset of participants had partners who also completed the FAS. Confirmatory factor analyses revealed an excellent fit by a single-factor model, and the FAS demonstrated a strong association with dyadic adjustment. FAS scores of respondents were affected by their anxiety levels and mood, alcohol and anxiety diagnoses, and moderate reciprocity of attitudes and behaviors between the partners was seen. The French version of the FAS has similarly strong psychometric properties to the original English version. Future research should assess the ability of the French FAS to predict relapse of psychiatric disorders.
Resumo:
Small and medium firms (SMEs) that operate in global markets are vulnerable to external shocks in uncertain, hostile and volatile business environments given their limited resources and inexperience. In such environments entrepreneurial firms respond by making strategic choices to mitigate such vulnerabilities. This research examines one such important strategic choice – entrepreneurial posturing and its link to financial performance in Finnish SMEs during the global financial crisis. Findings suggest that the dimensions of entrepreneurial posturing have a differential effect on firm performance depending upon the severity of the business environment as well as the firm’s degree of internationalization. Implications for theory and practice are discussed and directions for future research provided.
Resumo:
Preserving the integrity of the skin's outermost layer (the epidermis) is vital for humans to thrive in hostile surroundings. Covering the entire body, the epidermis forms a thin but impenetrable cellular cordon that repels external assaults and blocks escape of water and electrolytes from within. This structure exists in a perpetual state of regeneration where the production of new cellular subunits at the base of the epidermis is offset by the release of terminally differentiated corneocytes from the surface. It is becoming increasingly clear that proteases hold vital roles in assembling and maintaining the epidermal barrier. More than 30 proteases are expressed by keratinocytes or infiltrating immune cells and the activity of each must be maintained within narrow limits and confined to the correct time and place. Accordingly, over- or under-exertion of proteolytic activity is a common factor in a multitude of skin disorders that range in severity from relatively mild to life-threatening. This review explores the current state of knowledge on the involvement of proteases in skin diseases and the latest findings from proteomic and transcriptomic studies focused on uncovering novel (patho)physiological roles for these enzymes.