477 resultados para Hostile takeover
Resumo:
Outdoor robots such as planetary rovers must be able to navigate safely and reliably in order to successfully perform missions in remote or hostile environments. Mobility prediction is critical to achieving this goal due to the inherent control uncertainty faced by robots traversing natural terrain. We propose a novel algorithm for stochastic mobility prediction based on multi-output Gaussian process regression. Our algorithm considers the correlation between heading and distance uncertainty and provides a predictive model that can easily be exploited by motion planning algorithms. We evaluate our method experimentally and report results from over 30 trials in a Mars-analogue environment that demonstrate the effectiveness of our method and illustrate the importance of mobility prediction in navigating challenging terrain.
Resumo:
In this paper, we reflect upon our experiences and those of our peers as doctoral students and early career researchers in an Australian political science department. We seek to explain and understand the diverse ways that participating in an unofficial Feminist Reading Group in our department affected our experiences. We contend that informal peer support networks like reading groups do more than is conventionally assumed, and may provide important avenues for sustaining feminist research in times of austerity, as well as supporting and enabling women and emerging feminist scholars in academia. Participating in the group created a community of belonging and resistance, providing women with personal validation, information and material support, as well as intellectual and political resources to understand and resist our position within the often hostile spaces of the University. While these experiences are specific to our context, time and location, they signal that peer networks may offer critical political resources for responding to the ways that women’s bodies and concerns are marginalised in increasingly competitive and corporatised university environments.
Resumo:
The chlamydiae are obligate intracellular parasites that have evolved specific interactions with their various hosts and host cell types to ensure their successful survival and consequential pathogenesis. The species Chlamydia pneumoniae is ubiquitous, with serological studies showing that most humans are infected at some stage in their lifetime. While most human infections are asymptomatic, C. pneumoniae can cause more-severe respiratory disease and pneumonia and has been linked to chronic diseases such as asthma, atherosclerosis, and even Alzheimer's disease. The widely dispersed animal-adapted C. pneumoniae strains cause an equally wide range of diseases in their hosts. It is emerging that the ability of C. pneumoniae to survive inside its target cells, including evasion of the host's immune attack mechanisms, is linked to the acquisition of key metabolites. Tryptophan and arginine are key checkpoint compounds in this host-parasite battle. Interestingly, the animal strains of C. pneumoniae have a slightly larger genome, enabling them to cope better with metabolite restrictions. It therefore appears that as the evolutionarily more ancient animal strains have evolved to infect humans, they have selectively become more "susceptible" to the levels of key metabolites, such as tryptophan. While this might initially appear to be a weakness, it allows these human C. pneumoniae strains to exquisitely sense host immune attack and respond by rapidly reverting to a persistent phase. During persistence, they reduce their metabolic levels, halting progression of their developmental cycle, waiting until the hostile external conditions have passed before they reemerge.
Resumo:
What is ‘best practice’ when it comes to managing intellectual property rights in participatory media content? As commercial media and entertainment business models have increasingly come to rely upon the networked productivity of end-users (Banks and Humphreys 2008) this question has been framed as a problem of creative labour made all the more precarious by changing employment patterns and work cultures of knowledge-intensive societies and globalising economies (Banks, Gill and Taylor 2014). This paper considers how the problems of ownership are addressed in non-commercial, community-based arts and media contexts. Problems of labour are also manifest in these contexts (for example, reliance on volunteer labour and uncertain economic reward for creative excellence). Nonetheless, managing intellectual property rights in collaborative creative works that are created in community media and arts contexts is no less challenging or complex than in commercial contexts. This paper takes as its focus a particular participatory media practice known as ‘digital storytelling’. The digital storytelling method, formalised by the Centre for Digital Storytelling (CDS) from the mid-1990s, has been internationally adopted and adapted for use in an open-ended variety of community arts, education, health and allied services settings (Hartley and McWilliam 2009; Lambert 2013; Lundby 2008; Thumin 2012). It provides a useful point of departure for thinking about a range of collaborative media production practices that seek to address participation ‘gaps’ (Jenkins 2006). However the outputs of these activities, including digital stories, cannot be fully understood or accurately described as user-generated content. For this reason, digital storytelling is taken here to belong to a category of participatory media activity that has been described as ‘co-creative’ media (Spurgeon 2013) in order to improve understanding of the conditions of mediated and mediatized participation (Couldry 2008). This paper reports on a survey of the actual copyrighting practices of cultural institutions and community-based media arts practitioners that work with digital storytelling and similar participatory content creation methods. This survey finds that although there is a preference for Creative Commons licensing a great variety of approaches are taken to managing intellectual property rights in co-creative media. These range from the use of Creative Commons licences (for example, Lambert 2013, p.193) to retention of full copyrights by storytellers, to retention of certain rights by facilitating organisations (for example, broadcast rights by community radio stations and public service broadcasters), and a range of other shared rights arrangements between professional creative practitioners, the individual storytellers and communities with which they collaborate, media outlets, exhibitors and funders. This paper also considers how aesthetic and ethical considerations shape responses to questions of intellectual property rights in community media arts contexts. For example, embedded in the CDS digital storytelling method is ‘a critique of power and the numerous ways that rank is unconsciously expressed in engagements between classes, races and gender’ (Lambert 117). The CDS method privileges the interests of the storyteller and, through a transformative workshop process, aims to generate original individual stories that, in turn, reflect self-awareness of ‘how much the way we live is scripted by history, by social and cultural norms, by our own unique journey through a contradictory, and at times hostile, world’ (Lambert 118). Such a critical approach is characteristic of co-creative media practices. It extends to a heightened awareness of the risks of ‘story theft’ and the challenges of ownership and informs ideas of ‘best practice’ amongst creative practitioners, teaching artists and community media producers, along with commitments to achieving equitable solutions for all participants in co-creative media practice (for example, Lyons-Reid and Kuddell nd.). Yet, there is surprisingly little written about the challenges of managing intellectual property produced in co-creative media activities. A dialogic sense of ownership in stories has been identified as an indicator of successful digital storytelling practice (Hayes and Matusov 2005) and is helpful to grounding the more abstract claims of empowerment for social participation that are associated with co-creative methods. Contrary to the ‘change from below’ philosophy that underpins much thinking about co-creative media, however, discussions of intellectual property usually focus on how methods such as digital storytelling contribute to the formation of copyright law-compliant subjects, particularly when used in educational settings (for example, Ohler nd.). This also exposes the reliance of co-creative methods on the creative assets storytellers (rather than on the copyrighted materials of the media cultures of storytellers) as a pragmatic response to the constraints that intellectual property right laws impose on the entire category of participatory media. At the level of practical politics, it also becomes apparent that co-creative media practitioners and storytellers located in copyright jurisdictions governed by ‘fair use’ principles have much greater creative flexibility than those located in jurisdictions governed by ‘fair dealing’ principles.
Resumo:
This study examines audit committee effectiveness in its association with regulatory compliance in a highly sanctioned environment. It uses the Australian continuous disclosure regime to investigate whether audit committee effectiveness is associated with a higher frequency of disclosures, thereby enhancing the efficiency of the capital market and creating more informed individual investors. The findings show that, as hypothesised, audit committee effectiveness measured as an index composed of sub-components involving audit committee size, meeting frequency, independence, member financial literacy and membership of other audit committees, is positively associated with disclosure frequency. Further tests show that it is the financial literacy sub component which is most implicated in this relationship. Company size, years of listing, the proportion of inventories and receivables to total assets, whether or not the company has been involved in a takeover offer or bid or in changes to its number of shares are significant control variables.
Resumo:
Transfer schemes are an alternative means of acquiring control of a company to making a takeover bid under the provisions in Ch 6 of the Corporations Act 2001 (Cth). The recent decision Re Kumarina Resources Ltd [2013] FCA 549 overturned long-standing practice in relation to a certain type of transfer scheme. If followed, the decision would allow a “bidder” to vote at scheme meetings where the scheme consideration for the acquisition of the target shares are shares in another company, and the scheme results in a merger. But the bidder is not allowed to vote where the scheme consideration is cash. The article points out the difficulties arising from this decision and argues that it should not be followed. In providing a “no objection” statement, the Australian Securities and Investments Commission (ASIC) has created uncertainty as to the approach it will take towards the bidders being allowed to vote at scheme meetings where the scheme consideration for the acquisition of target shares are shares in another company. The article also points out that in providing the no objection statement in Kumarina, ASIC appears to have ignored breaches of s 606(1) of the Corporations Act. There is a pressing need for ASIC to clarify its position and, in particular, whether or not it will provide a no objection statement in respect of future transfer schemes where a bidder (or its parent company) votes at the scheme meeting.
Resumo:
This article will discuss some real life case examples of what will be termed “lawyers behaving badly” where it will be argued that legal representatives have not performed as effectively as they could have in mediation settings. These instances of “lawyer misbehaviour” will be grouped under several broad headings: the Process Thwarter, the Zealous Adversarial Advocate, the Misguided Advisor, the Distributive Bargainer, the Passive Advocate, and the Legal Takeover. Reflecting on these situations will provide guidance to legal educators as to the specific areas of dispute resolution knowledge and skills that future lawyers need to learn and develop.
Resumo:
This program of research investigated the harmful effects of mistreatment by the workgroup, and the role of perceived rejection as a critical mediator linking mistreatment and outcomes. This research program had three primary purposes. First, the research aimed to examine the important role of workgroup mistreatment as an independent predictor of negative outcomes, over and above the influence of supervisor mistreatment. Second, the research aimed to examine the effect of perceived rejection as an explanatory variable linking workgroup mistreatment and outcomes. Finally, the moderating effect of organizational norms on the relationship between workgroup mistreatment and perceived rejection was examined. The relationships of interest were examined over four studies, using multiple methods of data collection, across part-time and full-time working samples. In Study 1 (Chapter 2), the independent role of workgroup mistreatment and the mediating role of perceived rejection were examined. One hundred and forty two part-time working participants took part in the study. The participants completed a questionnaire on workplace behaviors in their organizations. The results of hierarchical regression analyses revealed a strong harmful effect of workgroup mistreatment, independent of mistreatment by the supervisor. In addition, the results showed that perceived rejection fully mediated the relationship between workgroup mistreatment and depression and organizational based self esteem. The study highlighted that perceived rejection acts as a key underlying psychological mechanism involved in the effect of workgroup mistreatment. This study has been published in the Journal of Occupational Health Psychology. Study 2 and Study 3 were presented as one paper in Chapter 3. The aims of these two studies was to explore the effects of workgroup mistreatment on a wider range of individual and organizational level outcomes, and to provide further evidence of the mediating role of perceived rejection as observed in Study 1. The results from both studies demonstrated that workgroup mistreatment had a significant and independent role in predicting negative individual and organizational level outcomes, providing support for the findings of Study 1. In the first study, 189 participants received scenarios manipulating workgroup mistreatment and supervisor mistreatment. The results of hierarchical regression analyses revealed that workgroup mistreatment harmfully affected participants, over and above that of the supervisor. The results also demonstrated that perceived rejection mediated the positive relationships between workgroup mistreatment and depression and organizational deviance, and also the negative relationships between workgroup mistreatment and organizational based self esteem and organizational citizenship behaviors. The second study included an additional aim, to examine the moderating role of supportive organizational norms. Two hundred and twenty nine participants read scenarios that manipulated workgroup mistreatment, supervisor mistreatment and organizational norms. The results of hierarchical regression analyses revealed the significant harmful effects of workgroup mistreatment, over and above the influence of supervisor mistreatment. The results also revealed the mediating role of perceived rejection. The direct effect of positive organizational norms also emerged, consistent with previous research. In addition, the result revealed that employees who experienced supportive organizational norms were more likely to reconcile with their workgroup members after experiencing mistreatment compared to employees who experienced hostile organizational norms. Finally, an unexpected pattern on the key affective variables of depression and organizational based self esteem emerged, such that mistreatment led to more negative outcomes in the supportive norms condition than in the hostile condition, where employees appeared to be desensitized. This paper is currently under review at the Journal of Applied Social Psychology. In Study 4 (Chapter 4), the overall model of workplace mistreatment was tested on a sample of full-time workers in an applied setting. One hundred and seventy two adults took part in the study. Participants were required to evaluate their workplace regarding mistreatment and organizational norms and to report their own psychological, behavioral and organizational outcomes. The results revealed that workgroup mistreatment was associated with increased depression, stress and avoidance, over and above supervisor mistreatment. In addition, the results revealed that perceived rejection acted as an explanatory variable linking workgroup mistreatment to a number of outcomes. Furthermore, the moderating role of hostile organizational norms emerged on depression, stress, reconciliation and avoidance. This paper is currently under review at the Journal of Occupational Health Psychology. Overall, the four studies provided empirical support for the majority of the hypotheses. The effects were demonstrated for a range of psychological, behavioral, and organizational level outcomes, using multiple methods of data collection, across part-time and full-time workers. At the conclusion of the thesis (Chapter 5), an overall summary is provided of the findings across all four studies, practical and theoretical implications and research directions.
Resumo:
Trade union membership, both in aggregate numbers and in density, has declined in the majority of advanced economies globally over recent decades (Blanchflower, 2007). In Australia, the decline in the 1990s was somewhat more precipitate than in most countries (Peetz, 1998). As discussed in Chapter 1, reasons for the decline are multifactorial, including a more hostile environment to unionism created by employers and the state, difficulties ·with workplace union organisation, and structural change in the economy (Bryson and Gomez, 2005; Bryson et a!., 2011; Ebbinghaus et al., 2011; Payne, 1989; Waddington and Kerr, 2002; Waddington and Whitson, 1997). Our purpose in this chapter is to look beyond aggregate Australian union density data, to examine how age relates to membership decline, and how different age groups, particularly younger workers, are located in the story of union decline. The practical implications of this research are that understanding how unions relate to workers of different age groups, and to workers of different genders amongst those age groups, may lead to improved recruitment and better union organisation.
Resumo:
This chapter discusses the fast emerging challenges for Malay and Muslim sexual minority storytellers in the face of an aggressive state-sponsored Islamisation of a constitutionally secular Malaysia. I examine the case of Azwan Ismail, a gay Malay and Muslim Malaysian who took part in the local ‘It Gets Better’ project, and who suffered an onslaught of hostile comments from fellow Malay Muslims. Azwan’s experience makes one question how a message of discouraging suicidal tendencies among sexual minority youths can be so vehemently misperceived. Azwan’s existential challenges – stemming from the tension between his own constructions of self and those of others – (re)present a unique challenge in the long struggle for human rights. In my examination of the arising contradictions, I highlight the challenges for Azwan’s existential self – one who is deemed morally bankrupt by hostile audiences. The purist Sunni Islam agenda in a constitutionally secular Malaysia not only rejects the human rights of the sexual minorities in Malaysia but has also influenced, and is often a leading hostile voice in both regional and international blocs. This self-righteous, supremacist and authoritarian Islam discourages discourse and attacks all differing opinions. This resulting disabling environment for vulnerable, minority communities and their human rights manifests in State-endorsed discrimination, compulsory counselling, forced rehabilitation and criminalisation. It places the rights of the sexual minorities to live within such a society in doubt. In discussing the arising issues, I draw upon literature that investigates the way in which personal stories have traditionally been used to advance human rights. Included too, is the significance and implications of the work by social psychologists in explaining the loss of credibility of personal stories. I then advance an analytical framework that will allow storytelling as a very individual form of witnessing to reclaim and regain its ‘truth to power’.
Resumo:
This chapter considers the legal ramifications of Wikipedia, and other online media, such as the Encyclopedia of Life. Nathaniel Tkacz (2007) has observed: 'Wikipedia is an ideal entry-point from which to approach the shifting character of knowledge in contemporary society.' He observes: 'Scholarship on Wikipedia from computer science, history, philosophy, pedagogy and media studies has moved beyond speculation regarding its considerable potential, to the task of interpreting - and potentially intervening in - the significance of Wikipedia's impact' (Tkacz 2007). After an introduction, Part II considers the evolution and development of Wikipedia, and the legal troubles that have attended it. It also considers the establishment of rival online encyclopedia - such as Citizendium set up by Larry Sanger, the co-founder of Wikipedia; and Knol, the mysterious new project of Google. Part III explores the use of mass, collaborative authorship in the field of science. In particular, it looks at the development of the Encyclopedia of Life, which seeks to document the world's biodiversity. This chapter expresses concern that Wiki-based software had to develop in a largely hostile and inimical legal environment. It contends that copyright law and related fields of intellectual property need to be reformed in order better to accommodate users of copyright material (Rimmer 2007). This chapter makes a number of recommendations. First, there is a need to acknowledge and recognize forms of mass, collaborative production and consumption - not just individual authorship. Second, the view of a copyright 'work' and other subject matter as a complete and closed piece of cultural production also should be reconceptualised. Third, the defense of fair use should be expanded to accommodate a wide range of amateur, peer-to-peer production activities - not only in the United States, but in other jurisdictions as well. Fourth, the safe harbor protections accorded to Internet intermediaries, such as Wikipedia, should be strengthened. Fifth, there should be a defense in respect of the use of 'orphan works' - especially in cases of large-scale digitization. Sixth, the innovations of open source licensing should be expressly incorporated and entrenched within the formal framework of copyright laws. Finally, courts should craft judicial remedies to take into account concerns about political censorship and freedom of speech.
Resumo:
Many software applications extend their functionality by dynamically loading libraries into their allocated address space. However, shared libraries are also often of unknown provenance and quality and may contain accidental bugs or, in some cases, deliberately malicious code. Most sandboxing techniques which address these issues require recompilation of the libraries using custom tool chains, require significant modifications to the libraries, do not retain the benefits of single address-space programming, do not completely isolate guest code, or incur substantial performance overheads. In this paper we present LibVM, a sandboxing architecture for isolating libraries within a host application without requiring any modifications to the shared libraries themselves, while still retaining the benefits of a single address space and also introducing a system call inter-positioning layer that allows complete arbitration over a shared library’s functionality. We show how to utilize contemporary hardware virtualization support towards this end with reasonable performance overheads and, in the absence of such hardware support, our model can also be implemented using a software-based mechanism. We ensure that our implementation conforms as closely as possible to existing shared library manipulation functions, minimizing the amount of effort needed to apply such isolation to existing programs. Our experimental results show that it is easy to gain immediate benefits in scenarios where the goal is to guard the host application against unintentional programming errors when using shared libraries, as well as in more complex scenarios, where a shared library is suspected of being actively hostile. In both cases, no changes are required to the shared libraries themselves.
Resumo:
Helicoverpa spp. and mirids, Creontiades spp., have been difficult to control biologically in cotton due to their unpredictable temporal abundance combined with a cropping environment often made hostile by frequent usage of broad spectrum insecticides. To address this problem, a range of new generation insecticides registered for use in cotton were tested for compatibility with the assassin bug, Pristhesancus plagipennis (Walker), a potential biological control agent for Helicoverpa spp. and Creontiades spp. Indoxacarb, pyriproxifen, buprofezin, spinosad and fipronil were found to be of low to moderate toxicity on P. plagipennis whilst emamectin benzoate, abamectin, diafenthiuron, imidacloprid and omethaote were moderate to highly toxic. Inundative releases of P. plagipennis integrated with insecticides identified as being of low toxicity were then tested and compared with treatments of P. plagipennis and the compatible insecticides used alone, conventionally sprayed usage practice and an untreated control during two field experiments in cotton. The biological control provided by P. plagipennis nymphs when combined with compatible insecticides provided significant (P<0.001) reductions in Helicoverpa and Creontiades spp. on cotton and provided equivalent yields to conventionally sprayed cotton with half of the synthetic insecticide input. Despite this, the utilization of P. plagipennis in cotton as part of an integrated pest management programme remains unlikely due to high inundative release costs relative to other control technologies such as insecticides and transgenic (Bt) cotton varieties.
Resumo:
The APSIM-Wheat module was used to investigate our present capacity to simulate wheat yields in a semi-arid region of eastern Australia (the Victorian Mallee), where hostile subsoils associated with salinity, sodicity, and boron toxicity are known to limit grain yield. In this study we tested whether the effects of subsoil constraints on wheat growth and production could be modelled with APSIM-Wheat by assuming that either: (a) root exploration within a particular soil layer was reduced by the presence of toxic concentrations of salts, or (b) soil water uptake from a particular soil layer was reduced by high concentration of salts through osmotic effects. After evaluating the improved predictive capacity of the model we applied it to study the interactions between subsoil constraints and seasonal conditions, and to estimate the economic effect that subsoil constraints have on wheat farming in the Victorian Mallee under different climatic scenarios. Although the soils had high levels of salinity, sodicity, and boron, the observed variability in root abundance at different soil layers was mainly related to soil salinity. We concluded that: (i) whether the effect of subsoil limitations on growth and yield of wheat in the Victorian Mallee is driven by toxic, osmotic, or both effects acting simultaneously still requires further research, (ii) at present, the performance of APSIM-Wheat in the region can be improved either by assuming increased values of lower limit for soil water extraction, or by modifying the pattern of root exploration in the soil pro. le, both as a function of soil salinity. The effect of subsoil constraints on wheat yield and gross margin can be expected to be higher during drier than wetter seasons. In this region the interaction between climate and soil properties makes rainfall information alone, of little use for risk management and farm planning when not integrated with cropping systems models.
Resumo:
The iterative two-person Prisoners’ Dilemma game has been generalised to theN-person case. The evolution of cooperation is explored by matching the Tit For Tat (TFT) strategy (Axelrod and Hamilton 1981) against the selfish strategy. Extension of TFT toN-person situations yields a graded set of strategies from the softest TFT, which continues cooperation even if only one of the opponents reciprocates it, to the hardest, which would do so only when all the remaining opponents cooperate. The hardest TFT can go to fixation against the selfish strategy provided it crosses a threshold frequencypc. All the other TFT are invadable by the selfish (D) or the pure defector strategy, while none can invadeD. Yet, provided a thresholdpc is crossed, they can coexist stably withD. AsN, the size of the group increases, the threshold pc also increases, indicating that the evolution of cooperation is more difficult for larger groups. Under certain conditions, only the soft TFT can coexist stably against the selfish strategyD, while the harder ones cannot. An interesting possibility of a complete takeover of the selfish population by successive invasions by harder and harder TFT strategies is also presented.