970 resultados para Going public (Securities)
Resumo:
XVIII IUFRO World Congress, Ljubljana 1986.
Resumo:
XVIII IUFRO World Congress, Ljubljana 1986.
Resumo:
Målet för Pro Gradu-avhandlingen är att undersöka hur Europeiska unionen (EU) marknadsförs genom användningen av värderande adjektiv i tre genrer av skriftlig kommunikation från EU till medlemsstaternas medborgare. Undersökningen är inriktad på tre forskningsfrågor: hur marknadsföringen av EU syns i användningen av värderande adjektiv i de tre genrerna, vilka de centrala skillnaderna mellan de tre genrerna är gällande användningen av värderande adjektiv, samt på vilket sätt texterna uppfyller sitt kommunikativa syfte, nämligen att informera allmänheten om EU:s verksamhet och marknadsföra EU som en giltig och handlingskraftig union. Den teoretiska ramen för undersökningen grundar sig på genreanalys, kommunikationsteori och teorier om hur författarens värdering (stance) syns i texter. Skillnaden mellan genre, texttyp och register diskuteras, och teoridelen redogör även för begreppet diskurssamfund, dvs. den grupp personer som i ett yrkesmässigt eller institutionellt sammanhang producerar och använder sig av en genre enligt dess kommunikativa konventioner. Materialet behandlas även utgående från Egon Werlichs indelning av texttyper i deskriptiva, narrativa, expositära, argumentativa och instruktiva texter. Materialet består av tre delar som representerar var sin genre: informationsbroschyrer, pressmeddelanden och den Allmänna rapporten om Europeiska unionens verksamhet, som utges av EU varje år. Storleken på varje del av materialet varierar mellan 20 000 - 30 000 ord. Materialet har valts på basis av de teman texterna behandlar, och kriterierna för urvalet är bl.a. att texterna behandlar ämnen som har anknytning till medborgarnas vardag, att de är riktade till allmänheten, och att de finns tillgängliga på Internet. Undersökningen är genomförd som en kvalitativ genreanalys. Materialet analyseras först utgående från kontexten och det samhälleliga sammanhanget enligt Vijay K. Bhatias metodik för analys av obekanta genrer. Det kommunikativa syftet, författaren och den tilltänkta läsarkretsen, dvs. målgruppen för kommunikationen, fastställs. Värderande adjektiv som uttrycker författarens hållning har plockats ur texten manuellt och med hjälp av konkordansprogrammet AntConc, och placerats i 16 kategorier enligt de värden de uttrycker. Varje genre analyseras sedan språkligt med utgångspunkt i adjektivlistorna, varefter resultaten jämförs med varandra. Undersökningen visar att pressmeddelandena innehåller det största antalet värderande adjektiv, medan informationsbroschyrerna innehåller det minsta antalet värderande adjektiv. Den Allmänna rapporten om Europeiska unionens verksamhet innehåller delar med tätt förekommande värderande adjektiv, i synnerhet i stycken som behandlar mer kontroversiella ämnen. I alla tre genrer sammanfaller ett högt antal värderande adjektiv med argumentativ text, och argumentativ text förekommer främst då ämnet som diskuteras rör sig på en mer abstrakt nivå, t.ex. om EU:s värderingar och grundläggande principer, eller då texten behandlar sådan politik som delar allmänhetens uppfattning. För EU utgör alla tre genrer viktiga kanaler för kommunikationen till medlemsstaternas medborgare, och EU kan genom sitt informationsmaterial och sina officiella publikationer informera om, förklara och marknadsföra sin verksamhet på ett sätt som avser att upprätthålla och förbättra EU:s image. Utarbetandet av lämpliga texter är ändå krävande på grund av den heterogena målgruppen, och det är en utmaning i sig att få fram rätt budskap bland det stora utbudet information som finns tillgängligt på Internet.
Resumo:
The study analyses the ambivalent relationship republicanism, as a form of self-government free from domination, had with the ideal of participatory oratory and non-dominated speech on the one hand, and with the danger of unhindered demagogy and its possibly fatal consequences to that form of government on the other. Although previous scholarship has delved deeply into republicanism as well as into rhetoric and public speech, the interplay between those aspects has only gathered scattered interest, and there has been no systematic study considering the variety of republican approaches to rhetoric and public speech in 17th-century England. The rare attempts to do so have been studies in English literature, and they have not analysed the political philosophy of republicanism, as the focus has been on republicanism as a literary culture. This study connects the fields of political theory, political history as well as literature in order to make a multidisciplinary contribution to intellectual history. The study shows that, within the tradition of classical republicanism, individual authors could make different choices when addressing the problematic topics of public speech and rhetoric, and the variety of their conclusions often set the authors against each other, resulting in the development of their theories through internal debates within the republican tradition. The authors under study were chosen to reflect this variety and the connections between them: the similarities between James Harrington and John Streater, and between John Milton and John Hall of Durham are shown, as well the controversies between Harrington and Milton, and Streater and Hall, respectively. In addition, by analysing the writings of Marchamont Nedham the study will show that the choices were not limited to more, or less, democratic brands of republicanism. Most significantly, the study provides a thorough analysis of the political philosophies behind the various brands of republicanism, in addition to describing them. By means of this analysis, the study shows that previous attempts to assess the role of free speech and public debate, through the lenses of modern, rights-based liberal political theory have resulted in an inappropriate framework for understanding early modern English republicanism. By approaching the topics through concepts used by the republicans legitimate authority, leadership by oratory, and republican freedom and through the frames of reference available and familiar to them roles of education and institutions the study presents a thorough and systematic analysis of the role and function of rhetoric and public speech in English republicanism. The findings of this analysis have significant consequences to our current understanding of the history and development of republican political theory, and, more generally, of the connections between democratic theory and free speech.
Resumo:
The high level of public accountability attached to Public Sector Enterprises as a result of public ownership makes them socially responsible. The Committee of Public Undertakings in 1992 examined the issue relating to social obligations of Central Public Sector Enterprises and observed that ``being part of the `State', every Public Sector enterprise has a moral responsibility to play an active role in discharging the social obligations endowed on a welfare state, subject to the financial health of the enterprise''. It issued the Corporate Social Responsibility Guidelines in 2010 where all Central Public Enterprises, through a Board Resolution, are mandated to create a CSR budget as a specified percentage of net profit of the previous year. This paper examines the CSR activities of the biggest engineering public sector organization in India, Bharath Heavy Electricals Limited. The objectives are twofold, one, to develop a case study of the organization about the funds allocated and utilized for various CSR activities, and two, to examine its status with regard to other organizations, the 2010 guidelines, and the local socio-economic development. Secondary data analysis results show three interesting trends. One, it reveals increasing organizational social orientation with the formal guidelines in place. Two, Firms can no longer continue to exploit environmental resources and escape from their responsibilities by acting separate entities regardless of the interest of the society and Three the thrust of CSR in public sector is on inclusive growth, sustainable development and capacity building with due attention to the socio-economic needs of the neglected and marginalized sections of the society.
Resumo:
In this paper, we have proposed a novel certificate-less on-demand public key management (CLPKM) protocol for self-organized MANETs. The protocol works on flat network architecture, and distinguishes between authentication layer and routing layer of the network. We put an upper limit on the length of verification route and use the end-to-end trust value of a route to evaluate its strength. The end-to-end trust value is used by the protocol to select the most trusted verification route for accomplishing public key verification. Also, the protocol uses MAC function instead of RSA certificates to perform public key verification. By doing this, the protocol saves considerable computation power, bandwidth and storage space. The saved storage space is utilized by the protocol to keep a number of pre-established routes in the network nodes, which helps in reducing the average verification delay of the protocol. Analysis and simulation results confirm the effectiveness of the proposed protocol.
Resumo:
Waters, in 2009, introduced an important technique, called dual system encryption, to construct identity-based encryption (IBE) and related schemes. The resulting IBE scheme was described in the setting of symmetric pairing. A key feature of the construction is the presence of random tags in the ciphertext and decryption key. Later work by Lewko and Waters removed the tags and proceeding through composite-order pairings led to a more efficient dual system IBE scheme using asymmetric pairings whose security is based on non-standard but static assumptions. In this work, we have systematically simplified Waters 2009 IBE scheme in the setting of asymmetric pairing. The simplifications retain tags used in the original description. This leads to several variants, the first one of which is based on standard assumptions and in comparison to Waters’ original scheme reduces ciphertexts and keys by two elements each. Going through several stages of simplifications, we finally obtain a simple scheme whose security can be based on two standard assumptions and a natural and minimal extension of the decision Diffie-Hellman problem for asymmetric pairing groups. The scheme itself is also minimal in the sense that apart from the tags, both encryption and key generation use exactly one randomiser each. This final scheme is more efficient than both the previous dual system IBE scheme in the asymmetric setting due to Lewko and Waters and the more recent dual system IBE scheme due to Lewko. We extend the IBE scheme to hierarchical IBE (HIBE) and broadcast encryption (BE) schemes. Both primitives are secure in their respective full models and have better efficiencies compared to previously known schemes offering the same level and type of security.
Resumo:
The design and synthesis of a new tri- and tetracoordinate boron conjugate is reported. The conjugate shows broad near-IR emission (similar to 625-850 nm) and is found to be a selective colorimetric and ratiometric sensor for fluoride ions.
Self-organized public key management in MANETs with enhanced security and without certificate-chains
Resumo:
In the self-organized public key management approaches, public key verification is achieved through verification routes constituted by the transitive trust relationships among the network principals. Most of the existing approaches do not distinguish among different available verification routes. Moreover, to ensure stronger security, it is important to choose an appropriate metric to evaluate the strength of a route. Besides, all of the existing self-organized approaches use certificate-chains for achieving authentication, which are highly resource consuming. In this paper, we present a self-organized certificate-less on-demand public key management (CLPKM) protocol, which aims at providing the strongest verification routes for authentication purposes. It restricts the compromise probability for a verification route by restricting its length. Besides, we evaluate the strength of a verification route using its end-to-end trust value. The other important aspect of the protocol is that it uses a MAC function instead of RSA certificates to perform public key verifications. By doing this, the protocol saves considerable computation power, bandwidth and storage space. We have used an extended strand space model to analyze the correctness of the protocol. The analytical, simulation, and the testbed implementation results confirm the effectiveness of the proposed protocol. (c) 2014 Elsevier B.V. All rights reserved.
Resumo:
Resumen: ¿Cuál es el precio justo para la asistencia social? Este artículo muestra que la medición económica efectuada en mercados basados en el valor de los servicios prestados podría responder esta pregunta. La medición económica puede hacer lo mismo en distintos campos del trabajo social aplicando diferentes métodos, tales como ofertas públicas o negociaciones calificadas. Después de dar un breve panorama teórico, se presentan y analizan en detalle dos proyectos alemanes. El artículo muestra cómo la introducción de mecanismos de negociación en la asistencia social expresados en términos de resultados pueden traer efectos positivos para las finanzas públicas, así como también para el bien común.
Resumo:
The axisymmetric problem of an elastic fiber perfectly bonded to a nonhomogeneous elastic matrix which contains an annular crack going through the interface into the fiber under axially symmetric shear stress is considered. The nature of the stress singularity is studied. It is shown that at the irregular point on the interface, whether the shear modulus is continuous or discontinuous the stresses are bounded. The problem is formulated in terms of a singular integral equation and can be solved by a regular method. The stress intensity factors and crack surface displacement are given.
Resumo:
This paper provides experimental evidence on how players predict end game effects in a linear public good game. Our regression analysis yields a measure of the relative importance of priors and signals on subjects\' beliefs on contributions and allow us to conclude that, firstly, the weight of the signal is relatively unimportant, while priors have a large weight and, secondly, priors are the same for all periods. Hence, subjects do not expect end game effects and there is very little updating of beliefs.