899 resultados para Stock exchanges -- Law and legislation -- China
Resumo:
"This is a revised edition"--P. 2 of cover.
Resumo:
Publication no longer for sale by Supt. of Docs.
Resumo:
Mode of access: Internet.
Resumo:
Appendix (A194 p., bound at end of pt. 1) has title: An evaluation of the mandatory petroleum allocation program, January 15-February 28, 1974; staff report to the Federal Trade Commission, March 15, 1974.
Resumo:
Bibliography: v.4, p. [2981]-2998.
Resumo:
"Books": p. 273-278
Resumo:
Current policy issues surrounding management of the Great Artesian Basin - historical development of existing legislation and institutions - hydrological and historical background information - development of concerns over unsustainable use of resources and possible adverse environmental impacts - recent developments associated with the general reforms to water law and policy initiated by the Council of Australian Governments (COAG) - comparison of issues surrounding the Murray-Darling Basin and the Great Artesian Basin.
Resumo:
Key findings: The paper investigates the impact that the legislative changes of 2006 had on civil society in Russia. This legislation has change the regulatory environment in which civil society actors such as Third Sector Organisations operate. Using the past development of civil society organisations as well as insights about how the institutional environment influences this article illustrates: - the undemocratic nature and motivation of the law and how it exploits the structural weaknesses of civil society - how Third Sector Organisations rationalise and translate the legislative changes into their organisational realities and how this changed or did not change their behaviour - the shift in state-civil society relations away from liberal co-existence into more hierarchical arrangements were Third Sector Organisations are subordinated to the state. These trends have far reaching implications for civil society. The empirical evidence shows that state now manages civil society to meet its own political ends. It also shows that organisations in the field welcome the more engage and directive nature of the Russian state. Why is this important? What does it mean for business or other users? Are there policy implications? The research is important as it shows how Third Sector Organisations have reacted to the legislative changes. Further it provides a basis for interpretation of the potential future development of civil society. Additional it highlights how the continuous process of democratisation in transition economies sometimes might come unstuck. In particular donor agencies will need to consider these trends when disturbing funding to Third Sector Organisations.
Resumo:
This article analyses the impact of the EU market abuse law on share repurchases. We find that the Member States' previous rules differed considerably, and therefore it can be said that the Regulation on share repurchases has provided uniformity as to the availability of a safe harbour for share repurchases. The picture, however, gets more difficult to assess if we consider our findings on the actual effect of the law. Our results do not confirm a “simple law and finance story“ according to which market participants would have just reacted as expected by the new legal rules. Rather, it seems to be the case that the value of legal certainty and the positive signal of common legal rules have also had an impact on the propensity to repurchase own stock.
Resumo:
This report is the primary output of Project 4: Copyright and Intellectual Property, the aim of which was to produce a report considering how greater access to and use of government information could be achieved within the scope of the current copyright law. In our submission for Project 4, we undertook to address: •the policy rationales underlying copyright and how they apply in the context of materials owned, held and used by government; • the recommendations of the Copyright Law Review Committee (CLRC) in its 2005 report on Crown copyright; • the legislative and regulatory barriers to information sharing in key domains, including where legal impediments such as copyright have been relied upon (whether rightly or wrongly) to justify a refusal to provide access to government data; • copyright licensing models appropriate to government materials and examples of licensing initiatives in Australia and other relevant jurisdictions; and • issues specific to the galleries, libraries, archives and museums (“GLAM”) sector, including management of copyright in legacy materials and “orphan” works. In addressing these areas, we analysed the submissions received in response to the Government 2.0 Taskforce Issues Paper, consulted with members of the Task Force as well as several key stakeholders and considered the comments posted on the Task Force’s blog. This Project Report sets out our findings on the above issues. It puts forward recommendations for consideration by the Government 2.0 Task Force on steps that can be taken to ensure that copyright and intellectual property promote access to and use of government information.
Resumo:
Heteronormative discourses provide the most common lens through which sexuality is understood within university curricula. This means that sexuality is discussed in terms of categories of identity, with heterosexuality accorded primacy and all ‘others’ indeed ‘othered.’ This paper reports on research carried out by the authors in a core first year university justice class, in which students of law and/or justice were required to engage with, discuss, and reflect on discourses on sexuality. It uses a poststructural framework to identify how students understand non-heterosexualities and how they personally relate to queer identities, in the sense that it asks questions about gender and sexual identity, and the discourses surrounding them. It was found that strongly negative attitudes to non-heterosexualities are quite resistant to challenge, and that some students express being confronted with queerness as a deep-seated fear of being drawn into otherness against their will. The result was that, while many students were able to unpack their attitudes towards queerness and engage in critical reflection and re-evaluation of their attitudes, students with strongly negative views towards non-heterosexualities conversely refused to engage at all, typically perceiving even the engagement itself as a threat to their core heterosexual identity. However, the authors caution against relying on the idea that students are simply “homophobic” to explain this reluctance, as this term does not necessarily account for the complexity of the discourses that inform students’ reactions in this context. This “homophobia” may simply be related to a way of performing gender and sexual identity as opposed to overt discrimination and fear.
Resumo:
This presentation outlines key aspects of public policy in broad terms insofar as they relate to establishment, implementation and compliance with legal measurement standards. It refers in particular to traceability of a legal measurement unit from its source in a single international standard as a compliance issue. It comments on accreditation of legal measurement and liability concerned with errors in measurement.
Resumo:
This thesis is about the derivation of the addition law on an arbitrary elliptic curve and efficiently adding points on this elliptic curve using the derived addition law. The outcomes of this research guarantee practical speedups in higher level operations which depend on point additions. In particular, the contributions immediately find applications in cryptology. Mastered by the 19th century mathematicians, the study of the theory of elliptic curves has been active for decades. Elliptic curves over finite fields made their way into public key cryptography in late 1980’s with independent proposals by Miller [Mil86] and Koblitz [Kob87]. Elliptic Curve Cryptography (ECC), following Miller’s and Koblitz’s proposals, employs the group of rational points on an elliptic curve in building discrete logarithm based public key cryptosystems. Starting from late 1990’s, the emergence of the ECC market has boosted the research in computational aspects of elliptic curves. This thesis falls into this same area of research where the main aim is to speed up the additions of rational points on an arbitrary elliptic curve (over a field of large characteristic). The outcomes of this work can be used to speed up applications which are based on elliptic curves, including cryptographic applications in ECC. The aforementioned goals of this thesis are achieved in five main steps. As the first step, this thesis brings together several algebraic tools in order to derive the unique group law of an elliptic curve. This step also includes an investigation of recent computer algebra packages relating to their capabilities. Although the group law is unique, its evaluation can be performed using abundant (in fact infinitely many) formulae. As the second step, this thesis progresses the finding of the best formulae for efficient addition of points. In the third step, the group law is stated explicitly by handling all possible summands. The fourth step presents the algorithms to be used for efficient point additions. In the fifth and final step, optimized software implementations of the proposed algorithms are presented in order to show that theoretical speedups of step four can be practically obtained. In each of the five steps, this thesis focuses on five forms of elliptic curves over finite fields of large characteristic. A list of these forms and their defining equations are given as follows: (a) Short Weierstrass form, y2 = x3 + ax + b, (b) Extended Jacobi quartic form, y2 = dx4 + 2ax2 + 1, (c) Twisted Hessian form, ax3 + y3 + 1 = dxy, (d) Twisted Edwards form, ax2 + y2 = 1 + dx2y2, (e) Twisted Jacobi intersection form, bs2 + c2 = 1, as2 + d2 = 1, These forms are the most promising candidates for efficient computations and thus considered in this work. Nevertheless, the methods employed in this thesis are capable of handling arbitrary elliptic curves. From a high level point of view, the following outcomes are achieved in this thesis. - Related literature results are brought together and further revisited. For most of the cases several missed formulae, algorithms, and efficient point representations are discovered. - Analogies are made among all studied forms. For instance, it is shown that two sets of affine addition formulae are sufficient to cover all possible affine inputs as long as the output is also an affine point in any of these forms. In the literature, many special cases, especially interactions with points at infinity were omitted from discussion. This thesis handles all of the possibilities. - Several new point doubling/addition formulae and algorithms are introduced, which are more efficient than the existing alternatives in the literature. Most notably, the speed of extended Jacobi quartic, twisted Edwards, and Jacobi intersection forms are improved. New unified addition formulae are proposed for short Weierstrass form. New coordinate systems are studied for the first time. - An optimized implementation is developed using a combination of generic x86-64 assembly instructions and the plain C language. The practical advantages of the proposed algorithms are supported by computer experiments. - All formulae, presented in the body of this thesis, are checked for correctness using computer algebra scripts together with details on register allocations.