994 resultados para American Party.
Resumo:
Related-party (RP) transactions are said to be commonly used opportunistically in business and contribute to corporate failures. While periodic disclosure is widely accepted as an effective means of monitoring such transactions, research is scant, particularly in countries where business dealings may be more susceptible to corruption. This study investigates the nature and extent of corporate RP disclosures across six countries in the Asia-Pacific region. The key finding indicates that companies in countries with stronger regulatory enforcement, shareholders’ protection, and control for corruption, have more transparent RP disclosures. This evidence potentially contributes to reforms aimed at strengthening RP disclosure and compliance.
Resumo:
Serial killers are among the most popular and enduring character types in contemporary culture. In this exegesis I investigate one of the reasons for this popularity by examining the representational relationships between serial killers and serial consumers. I initially establish that all monsters, whether they are vampires, werewolves or serial killers, emerge from cultural anxieties and signify the anxiety which gave them birth. I go on to identify that the cultural anxiety at play with serial killers is consumerism and in doing so, I identify two key parallels between the serial killer and the consumer, namely a sense of lack and a desire for transformation. I then examine the ways in which the serial killer is representative of the consumer in three exemplar texts, The Silence of the Lambs by Thomas Harris, American Psycho by Bret Easton Ellis and Darkly Dreaming Dexter by Jeff Lindsay. I go on to self-reflexively examine the creation of my novel Carnivore, the accompanying draft of which has been influenced by both the exemplar texts and the findings of the exegesis.
Resumo:
Synopsis and review of For the Term of His Natural Life (Norman Dawn, 1927). Includes cast and credits. For the Term of His Natural Life was one of the last Australian silent films, and also one of the most significant in the history of Australian cinema. At the time of its production, controversy raged over its depiction of convict life, its scale and cost (which was reported to be around 50,000 pounds at a time when most Australian films had budgets of less than 2,000 pounds1) and the fact that the director, several of the crew and the leading cast members were American. Australasian Films launched a publicity campaign of unprecedented scale to counter opposition to the film’s subject matter and the charge that they were “seeking to make capital out of the drab and sordid days of Australia”.2 The film’s expense was turned into a virtue: hundreds of unemployed men were used as extras, while the film also provided work for many within the Australian film industry and, according to Australasian, enabled the establishment of new production companies. The American imports who earlier had been accused of being “party to the slaughtering” of the Australian film industry, were feted for their artistic contributions, and the concerns raised in federal parliament about an American “invasion” were deflected by claims about what the local industry could learn from those with Hollywood experience.3 The publicity campaign was successful, as the film proved enormously popular at the Australian box office in its initial run. But the coming of sound film in 1928 had a considerable impact on audiences for silent films like For the Term, and its early local success was not repeated in subsequent seasons or in overseas markets...
Resumo:
This article considers recent cases on guarantees of business loans to identify the lending practices that led the court to set aside the guarantee as against the creditor on the basis that the creditor had engaged in unconscionable conduct. It also explores the role of industry codes of practice in preventing unconscionable conduct, including whether there is a correlation between commitment to an industry code and higher standards of lending practices; whether compliance with an industry code would have produced different outcomes in the cases considered; and whether lenders need to do more than comply with an industry code to ensure their practices are fair and reasonable.
Resumo:
Despite the importance of destination image in market competitiveness, and the popularity of the field within tourism literature, there remains a dearth of published research examining travellers’ perceptions of destinations in South America. This manuscript addresses this gap by testing a model of consumer-based brand equity (CBBE) associated with three South American countries; Chile, Brazil and Argentina. The introduction of direct air links and a free trade agreement in 2008 has led destination marketing organisations (DMOs) in these countries to increase promotional efforts in the Australian market. This study shows that the CBBE model is an appropriate tool to explore consumers’ attitudes in the long haul travel context. The findings provide DMOs of the three countries studied, with benchmarks against which to compare the impact of future marketing communications in Australia. The results provide increased transparency and accountability to stakeholders, such as South American tourism businesses and Australian travel intermediaries.
Resumo:
By using information collected from numerous American Economic Review publications from the last 100 years, Torgler and Piatti examine the top publishing institutions to determine their most renowned AER papers based on citation success. Areas of interest include how often an individual can publish in the AER, how equally successful citations are distributed and who the top AER publishing authors are. The book explores what the level of cooperation is among authors and what drives systems such as the alphabetical name ordering. Torgler and Piatti critically examine the individual characteristics of AER authors, editors, editorial board members and referees and even tackle more intricate details such as the frequency of female publications in the AER. The authors observe and analyse the relationship between academic age and publication performance to see if there is any pattern on these factors and citation success. The book then goes on to analyse data concerning awards, and whether awards can increase the probability of publishing in the AER at a later stage
Resumo:
Barley yellow dwarf luteovirus-GPV (BYDV-GPV) is a common problem in Chinese wheat crops but is unrecorded elsewhere. A defining characteristic of GPV is its capacity to be transmitted efficiently by both Schizaphis graminum and Rhopaloshiphum padi. This dual aphid species transmission contrasts with those of BYDV-RPV and BYDV-SGV, globally distributed viruses, which are efficiently transmitted only by Rhopaloshiphum padi and Schizaphis graminum respectively. The viral RNA sequences encoding the coat protein (22K) gene, the movement protein (17K) gene, the region surrounding the conserved GDD motif of the polymerase gene and the intergenic sequences between these genes were determined for GPV and an Australian isolate of BYDV-RPV (RPVa). In all three genes, the sequences of GPV and RPVa were more similar to those of an American isolate of BYDV-RPV (RPVu) than to any other luteovirus for which there is data available. RPVa and RPVu were very similar, especially their coat proteins which had 97% identity at the amino acid level. The coat protein of GPV had 76% and 78% amino acid identity with RPVa and RPVu respectively. The data suggest that RPVu and RPVa are correctly named as strains of the same serotype and that GPV is sufficiently different from either RPV strain to be considered a distinct BYDV type. The coat protein and movement protein genes of GPV are very dissimilar to SGV. The polymerase sequences of RPVu, RPVa and GPV show close affinities with those of the sobemo-like luteoviruses and little similarity with those of the carmo-like luteoviruses. The sequences of the coat proteins, movement proteins and the polymerase segments of BYDV serotypes, other than RPV and GPV, form a cluster that is separate from their counterpart sequences from dicot-infecting luteoviruses. The RPV and GPV isolates consistently fall within a dicot-infecting cluster. This suggests that RPV and GPV evolved from within this group of viruses. Since these other viruses all infect dicots it seems likely that their common ancestor infected a dicot and that RPV and GPV evolved from a virus that switched hosts from a dicot to a monocot.
Resumo:
Poor complaint management may result in organizations losing customers and revenue. Consumers exhibit negative emotional responses when dissatisfied and this may lead to a complaint to a third-party organization. Since little information is available on the role of emotion in the consumer complaint process or how to manage complaints effectively, we offer an emotions perspective by applying Affective Events Theory (AET) to complaint behavior. This study presents the first application of AET in a consumption context and advances a theoretical framework supported by qualitative research for emotional responses to complaints. In contrast to commonly held views on gender and emotion, men as well as women use emotion-focused coping to complain.
Resumo:
Community foundations have been described as the fastest growing form of philantrhopy. This report focuses on the development of community foundations in Australia as one especially important example of the growth of community foundations world-wide.
Resumo:
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive adversary indicate that every n-variate function can be computed by n participants, such that no set of size t < n/2 participants learns any additional information other than what they could derive from their private inputs and the output of the protocol. We study unconditionally secure MPC protocols in the presence of a passive adversary in the trusted setup (‘semi-ideal’) model, in which the participants are supplied with some auxiliary information (which is random and independent from the participant inputs) ahead of the protocol execution (such information can be purchased as a “commodity” well before a run of the protocol). We present a new MPC protocol in the trusted setup model, which allows the adversary to corrupt an arbitrary number t < n of participants. Our protocol makes use of a novel subprotocol for converting an additive secret sharing over a field to a multiplicative secret sharing, and can be used to securely evaluate any n-variate polynomial G over a field F, with inputs restricted to non-zero elements of F. The communication complexity of our protocol is O(ℓ · n 2) field elements, where ℓ is the number of non-linear monomials in G. Previous protocols in the trusted setup model require communication proportional to the number of multiplications in an arithmetic circuit for G; thus, our protocol may offer savings over previous protocols for functions with a small number of monomials but a large number of multiplications.
Resumo:
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P 1, ..., P n , each with their own private input x i , to compute a function Y = F(x 1, ..., x n ), such that at the end of the protocol, all participants learn the correct value of Y, while secrecy of the private inputs is maintained. Classical results in the unconditionally secure MPC indicate that in the presence of an active adversary, every function can be computed if and only if the number of corrupted participants, t a , is smaller than n/3. Relaxing the requirement of perfect secrecy and utilizing broadcast channels, one can improve this bound to t a < n/2. All existing MPC protocols assume that uncorrupted participants are truly honest, i.e., they are not even curious in learning other participant secret inputs. Based on this assumption, some MPC protocols are designed in such a way that after elimination of all misbehaving participants, the remaining ones learn all information in the system. This is not consistent with maintaining privacy of the participant inputs. Furthermore, an improvement of the classical results given by Fitzi, Hirt, and Maurer indicates that in addition to t a actively corrupted participants, the adversary may simultaneously corrupt some participants passively. This is in contrast to the assumption that participants who are not corrupted by an active adversary are truly honest. This paper examines the privacy of MPC protocols, and introduces the notion of an omnipresent adversary, which cannot be eliminated from the protocol. The omnipresent adversary can be either a passive, an active or a mixed one. We assume that up to a minority of participants who are not corrupted by an active adversary can be corrupted passively, with the restriction that at any time, the number of corrupted participants does not exceed a predetermined threshold. We will also show that the existence of a t-resilient protocol for a group of n participants, implies the existence of a t’-private protocol for a group of n′ participants. That is, the elimination of misbehaving participants from a t-resilient protocol leads to the decomposition of the protocol. Our adversary model stipulates that a MPC protocol never operates with a set of truly honest participants (which is a more realistic scenario). Therefore, privacy of all participants who properly follow the protocol will be maintained. We present a novel disqualification protocol to avoid a loss of privacy of participants who properly follow the protocol.
Resumo:
I live in the Sydney North Shore suburb of Northbridge. In many ways it is a white middle class enclave, comparable to places like Cabramatta that are identified with a specifically represented ethnic group. Gated primarily by the inflated property prices, it is a location that marks a territory principally for the white middle class. It is not a place of African-American movements. Or is it? Radio, television, film and Internet increasingly constitute a large portion of the sonic and visual landscapes of our suburban lives. In our lounge rooms and in our cars we are presented texts that take us beyond our local environments, into the places of other nations. This paper will explore the position of a fan of rap music, physically located beyond the cultural and political circumstances that drive sustained action for the movements of African-Americans. It will analyze whether such a fandom can indicate membership, as a social actor, in this group and in doing so illuminate the boundaries of movement activity in an information society.
Resumo:
In ASIC v Atlantic 3 Financial (Aust) Pty Ltd [2006] QCA 540 the Queensland Court of Appeal dismissed an appeal from the decision of Mullins J at first instance in ASIC v Atlantic 3 Financial (Aust) Pty LTd [2006] QSC 152, the majority concluding that the client agreement in issue was not inconsistent with s48 of the Queensland Law Society Act 1952.
Resumo:
This study compared the determinants of physical activity in active and low-active African-American sixth grade students (N=108, 57 F, 51 M). Objective assessments of physical activity over a seven-day period were obtained using the CSA 7164 accelerometer. Students were classified as active if they exhibited three pr more 20-minute bouts of moderate to vigorous physical activity over the seven-day period. Relative to low-actives, active boys reported significantly higher levels of self-efficacy, greater involvement in community physical activity organizations, and were significantly more likely to perceive their mother us active. Relative to low-actives, active girls reported significantly higher levels of physical activity self-efficacy, greater positive beliefs regarding physical activity outcomes, and were significantly less likely to watch television or play video games for greater than or equal to 3 hrs/day. These observations provide preliminary guidance as to the design of physical activity interventions targeted at African-American youth.