946 resultados para Federal Party (U.S.)
Resumo:
Based on the theory of international stock market co-movements, this study shows that a profitable trading strategy can be developed. The U.S. market return is considered as overnight information by ordinary investors in the Asian and the European stock markets, and opening prices in local markets reflect the U.S. overnight return. However, smart traders would either judge the impact of overnight information more correctly, or predict unreleased information. Thus, the difference between expected opening prices based on the U.S. return and actual opening prices is counted as smart traders’ prediction power, which is either a buy or a sell signal. Using index futures price data from 12 countries from 2000 to 2011, cumulative returns on the trading strategy are calculated with taking into account transaction costs. The empirical results show that the proposed trading strategy generates higher riskadjusted returns than that of the benchmarks in 12 sample countries. The trading performances for the Asian markets surpass those for the European markets because the U.S. return is the only overnight information for the Asian markets whereas the Asian markets returns are additional information to the European investors.
Resumo:
This paper examines patterns of political activity and campaigning on Twitter in the context of the 2012 election in the Australian state of Queensland. Social media have been a visible component of political campaigning in Australia at least since the 2007 federal election, with Twitter, in particular, rising to greater prominence in the 2010 federal election. At state level, however, they have remained comparatively less important thus far. In this paper, we track uses of Twitter in the Queensland campaign from its unofficial start in February through to the election day of 24 March 2012. We both examine the overall patterns of activity in the hash tag #qldvotes, and track specific interactions between politicians and other users by following some 80 Twitter accounts of sitting members of parliament and alternative candidates. Such analysis provides new insights into the different approaches to social media campaigning which were embraced by specific candidates and party organisations, as well as an indication of the relative importance of social media activities, at present, for state-level election campaigns.
Resumo:
Related-party (RP) transactions are said to be commonly used opportunistically in business and contribute to corporate failures. While periodic disclosure is widely accepted as an effective means of monitoring such transactions, research is scant, particularly in countries where business dealings may be more susceptible to corruption. This study investigates the nature and extent of corporate RP disclosures across six countries in the Asia-Pacific region. The key finding indicates that companies in countries with stronger regulatory enforcement, shareholders’ protection, and control for corruption, have more transparent RP disclosures. This evidence potentially contributes to reforms aimed at strengthening RP disclosure and compliance.
Resumo:
Purpose – This paper adds to growing research of psychiatric intensive care units (PICU) by recounting descriptions of psychiatric intensive care settings and discusses the perceptions held by nurses of the organisational interfaces, arrangements and provisions of care in these settings. Design/methodology/approach – Data gathered from focus groups held with nurses from two PICUs was used to establish terminology, defining attributes, related concepts, antecedents, values, processes and concepts related to current practices. A literature search was conducted to permit a review of the conceptual arrangements and contemporary understanding of intensive care for people experiencing acute psychiatric illness based on the perspectives held by the nurses from the focus groups. Findings – Dissonance between service needs and the needs and management of individual patients overshadow strategies to implement comprehensive recovery-oriented approaches. Three factors are reported in this paper that influence standards and procedural practice in PICU; organisational structures; physical structures; and subtype nomenclature. Practical implications – Acute inpatient care is an important part of a comprehensive approach to mental health services. Commonly intensive acute care is delivered in specialised wards or units co-located with acute mental health inpatient units mostly known as PICU. Evidence of the most effective treatment and approaches in intensive care settings that support comprehensive recovery for improved outcomes is nascent. Originality/value – Current descriptions from nurses substantiate wide variations in the provisions, design and classifications of psychiatric intensive care. Idiosyncratic and localised conceptions of psychiatric intensive care are not adequately entailing effective treatment and methods in support of recovery principles for improved and comprehensive outcomes. The authors suggest that more concrete descriptions, guidelines, training and policies for provision of intensive psychiatric health care encompassing the perspective of nursing professionals, would reinforce conceptual construction and thus optimum treatments within a comprehensive, recovery-oriented approach to mental health services.
Resumo:
The recognition and enforcement of foreign judgments is an aspect of private international law, and concerns situations where a successful party to litigation seeks to rely on a judgment obtained in one court, in a court in another jurisdiction. The most common example where the recognition and enforcement of foreign judgments may arise is where a party who has obtained a favourable judgment in one state or country may seek to recognise and enforce the judgment in another state or country. This occurs because there is no sufficient asset in the state or country where the judgment was rendered to satisfy that judgment. As technological advancements in communications over vast geographical distances have improved exponentially in recent years, there has been an increase in cross-border transactions, as well as litigation arising from these transactions. As a result, the recognition and enforcement of foreign judgments is of increasing importance, since a party who has obtained a judgment in cross-border litigation may wish to recognise and enforce the judgment in another state or country, where the defendant’s assets may be located without having to re-litigate substantive issues that have already been resolved in another court. The purpose of the study is to examine whether the current state of laws for the recognition and enforcement of foreign judgments in Australia, the United States and the European Community are in line with modern-commercial needs. The study is conducted by weighing two competing objectives between the notion of finality of litigation, which encourages courts to recognise and enforce judgments foreign to them, on the one hand, and the adequacy of protection to safeguard the recognition and enforcement proceedings, so that there would be no injustice or unfairness if a foreign judgment is recognised and enforced, on the other. The findings of the study are as follows. In both Australia and the United States, there is a different approach concerning the recognition and enforcement of judgments rendered by courts interstate or in a foreign country. In order to maintain a single and integrated nation, there are constitutional and legislative requirements authorising courts to give conclusive effects to interstate judgments. In contrast, if the recognition and enforcement actions involve judgments rendered by a foreign country’s court, an Australian or a United States court will not recognise and enforce the foreign judgment unless the judgment has satisfied a number of requirements and does not fall under any of the exceptions to justify its non-recognition and non-enforcement. In the European Community, the Brussels I Regulation which governs the recognition and enforcement of judgments among European Union Member States has created a scheme, whereby there is only a minimal requirement that needs to be satisfied for the purposes of recognition and enforcement. Moreover, a judgment that is rendered by a Member State and based on any of the jurisdictional bases set forth in the Brussels I Regulation is entitled to be recognised and enforced in another Member State without further review of its underlying jurisdictional basis. However, there are concerns as to the adequacy of protection available under the Brussels I Regulation to safeguard the judgment-enforcing Member States, as well as those against whom recognition or enforcement is sought. This dissertation concludes by making two recommendations aimed at improving the means by which foreign judgments are recognised and enforced in the selected jurisdictions. The first is for the law in both Australia and the United States to undergo reform, including: adopting the real and substantial connection test as the new jurisdictional basis for the purposes of recognition and enforcement; liberalising the existing defences to safeguard the application of the real and substantial connection test; extending the application of the Foreign Judgments Act 1991 (Cth) in Australia to include at least its important trading partners; and implementing a federal statutory scheme in the United States to govern the recognition and enforcement of foreign judgments. The second recommendation is to introduce a convention on jurisdiction and the recognition and enforcement of foreign judgments. The convention will be a convention double, which provides uniform standards for the rules of jurisdiction a court in a contracting state must exercise when rendering a judgment and a set of provisions for the recognition and enforcement of resulting judgments.
Resumo:
Synopsis and review of For the Term of His Natural Life (Norman Dawn, 1927). Includes cast and credits. For the Term of His Natural Life was one of the last Australian silent films, and also one of the most significant in the history of Australian cinema. At the time of its production, controversy raged over its depiction of convict life, its scale and cost (which was reported to be around 50,000 pounds at a time when most Australian films had budgets of less than 2,000 pounds1) and the fact that the director, several of the crew and the leading cast members were American. Australasian Films launched a publicity campaign of unprecedented scale to counter opposition to the film’s subject matter and the charge that they were “seeking to make capital out of the drab and sordid days of Australia”.2 The film’s expense was turned into a virtue: hundreds of unemployed men were used as extras, while the film also provided work for many within the Australian film industry and, according to Australasian, enabled the establishment of new production companies. The American imports who earlier had been accused of being “party to the slaughtering” of the Australian film industry, were feted for their artistic contributions, and the concerns raised in federal parliament about an American “invasion” were deflected by claims about what the local industry could learn from those with Hollywood experience.3 The publicity campaign was successful, as the film proved enormously popular at the Australian box office in its initial run. But the coming of sound film in 1928 had a considerable impact on audiences for silent films like For the Term, and its early local success was not repeated in subsequent seasons or in overseas markets...
Resumo:
This paper projects the gender wage gap for 25–64 year old Americans for the period 2000–40. The analysis uses data from the Panel Survey of Income Dynamics (PSID) for 1995 and 1996 together with the U.S. Census Bureau demographic projections. The method combines the population projections with assumptions regarding the evolution of educational attainment in order to first project the future distribution of skills and, based on these projections, the future size of the gender wage gap. The main set of projections suggests that changing skill characteristics—specifically educational attainment—will continue to close the gender wage gap. However, even in 2040, a substantial pay gap of at least 75 percent of the size of that in 1995 will remain.
Resumo:
This article considers recent cases on guarantees of business loans to identify the lending practices that led the court to set aside the guarantee as against the creditor on the basis that the creditor had engaged in unconscionable conduct. It also explores the role of industry codes of practice in preventing unconscionable conduct, including whether there is a correlation between commitment to an industry code and higher standards of lending practices; whether compliance with an industry code would have produced different outcomes in the cases considered; and whether lenders need to do more than comply with an industry code to ensure their practices are fair and reasonable.
Resumo:
This thesis examines the stewardship and investment style monitoring by managers and boards of U.S. equity funds. Results indicate that complying with a fund’s declared style, especially in value-growth dimension, remains a challenge for fund managers and boards, and that style-based investors should be aware of the risk of style drift since fund managers and boards do not always monitor the fund’s investment style as stated in the prospectus. Results also show that the quality of fund stewardship, as reflected by fund board quality, corporate culture, manager compensation, regulatory history, and fees are effective in ensuring that fund managers and boards perform their fiduciary obligation by increasing monitoring of the fund investment style.
Resumo:
The Valley Mountain 15’ quadrangle straddles the Pinto Mountain Fault, which bounds the eastern Transverse Ranges in the south against the Mojave Desert province in the north. The Pinto Mountains, part of the eastern Transverse Ranges in the south part of the quadrangle expose a series of Paleoproterozoic gneisses and granite and the Proterozoic quartzite of Pinto Mountain. Early Triassic quartz monzonite intruded the gneisses and was ductiley deformed prior to voluminous Jurassic intrusion of diorite, granodiorite, quartz monzonite, and granite plutons. The Jurassic rocks include part of the Bullion Mountains Intrusive Suite, which crops out prominently at Valley Mountain and in the Bullion Mountains, as well as in the Pinto Mountains. Jurassic plutons in the southwest part of the quadrangle are deeply denuded from midcrustal emplacement levels in contrast to supracrustal Jurassic limestone and volcanic rocks exposed in the northeast. Dikes inferred to be part of the Jurassic Independence Dike Swarm intrude the Jurassic plutons and Proterozoic rocks. Late Cretaceous intrusion of the Cadiz Valley Batholith in the northeast caused contact metamorphism of adjacent Jurassic plutonic rocks...
Resumo:
Poor complaint management may result in organizations losing customers and revenue. Consumers exhibit negative emotional responses when dissatisfied and this may lead to a complaint to a third-party organization. Since little information is available on the role of emotion in the consumer complaint process or how to manage complaints effectively, we offer an emotions perspective by applying Affective Events Theory (AET) to complaint behavior. This study presents the first application of AET in a consumption context and advances a theoretical framework supported by qualitative research for emotional responses to complaints. In contrast to commonly held views on gender and emotion, men as well as women use emotion-focused coping to complain.
Resumo:
“Supermax” prisons, conceived by the United States in the early 1980s, are typically reserved for convicted political criminals such as terrorists and spies and for other inmates who are considered to pose a serious ongoing threat to the wider community, to the security of correctional institutions, or to the safety of other inmates. Prisoners are usually restricted to their cells for up to twenty-three hours a day and typically have minimal contact with other inmates and correctional staff. Not only does the Federal Bureau of Prisons operate one of these facilities, but almost every state has either a supermax wing or stand-alone supermax prison. The Globalization of Supermax Prisons examines why nine advanced industrialized countries have adopted the supermax prototype, paying particular attention to the economic, social, and political processes that have affected each state. Featuring essays that look at the U.S.-run prisons of Abu Ghraib and Guantanemo, this collection seeks to determine if the American model is the basis for the establishment of these facilities and considers such issues as the support or opposition to the building of a supermax and why opposition efforts failed; the allegation of human rights abuses within these prisons; and the extent to which the decision to build a supermax was influenced by developments in the United States. Additionally, contributors address such domestic matters as the role of crime rates, media sensationalism, and terrorism in each country’s decision to build a supermax prison.
Resumo:
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive adversary indicate that every n-variate function can be computed by n participants, such that no set of size t < n/2 participants learns any additional information other than what they could derive from their private inputs and the output of the protocol. We study unconditionally secure MPC protocols in the presence of a passive adversary in the trusted setup (‘semi-ideal’) model, in which the participants are supplied with some auxiliary information (which is random and independent from the participant inputs) ahead of the protocol execution (such information can be purchased as a “commodity” well before a run of the protocol). We present a new MPC protocol in the trusted setup model, which allows the adversary to corrupt an arbitrary number t < n of participants. Our protocol makes use of a novel subprotocol for converting an additive secret sharing over a field to a multiplicative secret sharing, and can be used to securely evaluate any n-variate polynomial G over a field F, with inputs restricted to non-zero elements of F. The communication complexity of our protocol is O(ℓ · n 2) field elements, where ℓ is the number of non-linear monomials in G. Previous protocols in the trusted setup model require communication proportional to the number of multiplications in an arithmetic circuit for G; thus, our protocol may offer savings over previous protocols for functions with a small number of monomials but a large number of multiplications.