840 resultados para Third-party complaints
Resumo:
Twitter has developed an increasingly visible presence in Australian journalism, and in the discussion of news. Many journalists have begun to explore manageable approaches to incorporating Twitter into their work practices, and for some – like the ABC’s ‘star recruits’ Annabel Crabb and Latika Bourke – it has already become a career driver. This article examines the positioning of journalists as ‘personal brands’ on Twitter, by documenting the visibility of leading personal and institutional accounts during two major political events in Australia: the Rudd/Gillard leadership spill on 23 June 2010, and the day of the subsequent federal election on 21 August 2010. It highlights the fact that in third-party networks such as Twitter, journalists and news organisations no longer operate solely on their own terms, as they do on their own Websites, but gain and maintain prominence in the network and reach for their messages only in concert with other users. It places these observations in a wider context of journalist/audience relations, a decade after the emergence of the first citizen journalism Websites.
Resumo:
Corticotropin releasing factor (CRF) has been shown to induce various behavioral changes related to adaptation to stress. Dysregulation of the CRF system at any point can lead to a variety of psychiatric disorders, including substance use disorders (SUDs). CRF has been associated with stress-induced drug reinforcement. Extensive literature has identified CRF to play an important role in the molecular mechanisms that lead to an increase in susceptibility that precipitates relapse to SUDs. The CRF system has a heterogeneous role in SUDs. It enhances the acute effects of drugs of abuse and is also responsible for the potentiation of drug-induced neuroplasticity evoked during the withdrawal period. We present in this review the brain regions and circuitries where CRF is expressed and may participate in stress-induced drug abuse. Finally, we attempt to evaluate the role of modulating the CRF system as a possible therapeutic strategy for treating the dysregulation of emotional behaviors that result from the acute positive reinforcement of substances of abuse as well as the negative reinforcement produced by withdrawal.
Resumo:
Addictive drugs can activate systems involved in normal reward-related learning, creating long-lasting memories of the drug's reinforcing effects and the environmental cues surrounding the experience. These memories significantly contribute to the maintenance of compulsive drug use as well as cue-induced relapse which can occur even after long periods of abstinence. Synaptic plasticity is thought to be a prominent molecular mechanism underlying drug-induced learning and memories. Ethanol and nicotine are both widely abused drugs that share a common molecular target in the brain, the neuronal nicotinic acetylcholine receptors (nAChRs). The nAChRs are ligand-gated ion channels that are vastly distributed throughout the brain and play a key role in synaptic neurotransmission. In this review, we will delineate the role of nAChRs in the development of ethanol and nicotine addiction. We will characterize both ethanol and nicotine's effects on nAChR-mediated synaptic transmission and plasticity in several key brain areas that are important for addiction. Finally, we will discuss some of the behavioral outcomes of drug-induced synaptic plasticity in animal models. An understanding of the molecular and cellular changes that occur following administration of ethanol and nicotine will lead to better therapeutic strategies.
Resumo:
Situation awareness lost is a common factor leading to human error in the aviation industry. However, few studies have investigated the effect on situation awareness where the control interface is a touch-screen device that supports simultaneous multi-touch input and information output. This research aims to conduct an experiment to evaluate the difference in situation awareness on a large screen device, DiamondTouch (DT107), and a small screen device, iPad, both with multi-touch interactive functions. The Interface Operation and Situation Awareness Testing Simulator (IOSATS), is a simulator to test the three basis interface operations (Search Target, Information Reading, and Change Detection) by implementing a simplified search and rescue scenario. The result of this experiment will provide reliable data for future research for improving operator's situation awareness in the avionic domain.
Resumo:
This paper outlines a feasible scheme to extract deck trend when a rotary-wing unmanned aerial vehicle (RUAV)approaches an oscillating deck. An extended Kalman filter (EKF) is de- veloped to fuse measurements from multiple sensors for effective estimation of the unknown deck heave motion. Also, a recursive Prony Analysis (PA) procedure is proposed to implement online curve-fitting of the estimated heave mo- tion. The proposed PA constructs an appropriate model with parameters identified using the forgetting factor recursive least square (FFRLS)method. The deck trend is then extracted by separating dominant modes. Performance of the proposed procedure is evaluated using real ship motion data, and simulation results justify the suitability of the proposed method into safe landing of RUAVs operating in a maritime environment.
Resumo:
The Australian Securities Exchange (ASX) listing rule 3.1 requires listed companies to immediately disclose price sensitive information to the market via the ASX’s Company Announcements Platform (CAP) prior to release through other disclosure channels. Since 1999, to improve the communication process, the ASX has permitted third-party mediation in the disclosure process that leads to the release of an Open Briefing (OB) through CAP. An OB is an interview between senior executives of the firm and an Open Briefing analyst employed by Orient Capital Pty Ltd (broaching topics such as current profit and outlook). Motivated by an absence of research on factors that influence firms to use OBs as a discretionary disclosure channel, this study examines (1) Why do firms choose to release information to the market via OBs?, (2) What are the firm characteristics that explain the discretionary use of OBs as a disclosure channel?, and (3) What are the disclosure attributes that influence firms’ decisions to regularly use OBs as a disclosure channel? Based on agency and information economics theories, a theoretical framework is developed to address research questions. This theoretical framework comprises disclosure environments such as firm characteristics and external factors, disclosure attributes and disclosure consequences. In order to address the first research question, the study investigates (i) the purpose of using OBs, (2) whether firms use OBs to provide information relating to previous public announcements, and (3) whether firms use OBs to provide routine or non-routine disclosures. In relation to the second and third research questions, hypotheses are developed to test factors expected to explain the discretionary use of OBs and firms’ decisions to regularly use OBs, and to explore the factors influencing the nature of OB disclosure. Content analysis and logistic regression models are used to investigate the research questions and test the hypotheses. Data are drawn from a hand-collected population of 1863 OB announcements issued by 239 listed firms between 2000 and 2010. The results show that types of information disclosed via an OB announcement are principally on matters relating to corporate strategies and performance and outlook. Most OB announcements are linked with a previous related announcement, with the lag between announcements significantly longer for loss-making firms than profitmaking firms. The main results show that firms which tend to be larger, have an analyst following, and have higher growth opportunities, are more likely to release OBs. Further, older firms and firms that release OB announcements containing good news, historical information and less complex information tend to be regular OB users. Lastly, firms more likely to disclose strategic information via OBs tend to operate in industries facing greater uncertainty, do not have analysts following, and have higher growth opportunities are less likely to disclose good news, historical information and complex information via OBs. This study is expected to contribute to disclosure literature in terms of disclosure attributes and firm characteristics that influence behaviour in this unique (OB) disclosure channel. With regard to practical significance, regulators can gain an understanding of how OBs are disclosed which can assist them in monitoring the use of OBs and improving the effectiveness of communications with stakeholders. In addition, investors can have a better comprehension of information contained in OB announcements, which may in turn better facilitate their investment decisions.
Resumo:
This study examines disillusioned consumers. The theory proposes that this is a group learning to lower their expectations of firm integrity and who, to avoid being let down, ignore marketing activity directly from the firm. This kind of exchange orientation develops as a response to consistent failure in perceptions of firm integrity. The research includes six studies, including over 600 adult consumers, to outline the development and validation of a measure of consumer disillusionment toward marketing activity. Completing the process provides a valid and reliable four-item measure. In addition, the study includes the assessment of the nomological validity of the construct. The nomological validation includes using cue utilization theory to predict that disillusioned consumers favor advertising that provides evidence of verifiable integrity. The validation experiment uses print advertising containing high and low verifiable integrity stimuli. Results confirm the theory with disillusioned consumers focusing less on the firm as source of information. Further, these consumers respond more favorably than non-disillusioned consumers to third party endorsers who serve to verify the firm's attempts to show integrity.
Resumo:
Shared services are increasingly prevalent in practice, their introduction potentially entailing substantive and highly consequential organizational redesign. Yet, attention to the structural arrangements of shared services has been limited. This study explores types of structural arrangements for shared services that are observed in practice, and the salient dimensions along which those types can be usefully differentiated. Through inductive attention to the shared services literature, and content analysis of 36 secondary case studies of shared services in the higher education sector, three salient dimensions emerged: (1) the existence or not of a separate organizational entity, (2) an intra- or inter-organizational sharing boundary, and (3) involvement or not of a third party. Each dimension being dichotomous yields 23 combinations, or eight shared services structural arrangement types. Each of the eight structural arrangement types is defined and demonstrated through case examples. The typology offers clarity around shared services structural arrangements. It can serve as a useful analytical tool for researchers investigating the phenomenon further, and for practitioners considering the introduction or further development of shared services arrangements. Important follow on research is suggested too.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
Smartphones become very critical part of our lives as they offer advanced capabilities with PC-like functionalities. They are getting widely deployed while not only being used for classical voice-centric communication. New smartphone malwares keep emerging where most of them still target Symbian OS. In the case of Symbian OS, application signing seemed to be an appropriate measure for slowing down malware appearance. Unfortunately, latest examples showed that signing can be bypassed resulting in new malware outbreak. In this paper, we present a novel approach to static malware detection in resource-limited mobile environments. This approach can be used to extend currently used third-party application signing mechanisms for increasing malware detection capabilities. In our work, we extract function calls from binaries in order to apply our clustering mechanism, called centroid. This method is capable of detecting unknown malwares. Our results are promising where the employed mechanism might find application at distribution channels, like online application stores. Additionally, it seems suitable for directly being used on smartphones for (pre-)checking installed applications.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.
Resumo:
Good daylighting design in buildings not only provides a comfortable luminous environment, but also delivers energy savings and comfortable and healthy environments for building occupants. Yet, there is still no consensus on how to assess what constitutes good daylighting design. Currently amongst building performance guidelines, Daylighting factors (DF) or minimum illuminance values are the standard; however, previous research has shown the shortcomings of these metrics. New computer software for daylighting analysis contains new more advanced metrics for daylighting (Climate Base Daylight Metrics-CBDM). Yet, these tools (new metrics or simulation tools) are not currently understood by architects and are not used within architectural firms in Australia. A survey of architectural firms in Brisbane showed the most relevant tools used by industry. The purpose of this paper is to assess and compare these computer simulation tools and new tools available architects and designers for daylighting. The tools are assessed in terms of their ease of use (e.g. previous knowledge required, complexity of geometry input, etc.), efficiency (e.g. speed, render capabilities, etc.) and outcomes (e.g. presentation of results, etc. The study shows tools that are most accessible for architects, are those that import a wide variety of files, or can be integrated into the current 3d modelling software or package. These software’s need to be able to calculate for point in times simulations, and annual analysis. There is a current need in these software solutions for an open source program able to read raw data (in the form of spreadsheets) and show that graphically within a 3D medium. Currently, development into plug-in based software’s are trying to solve this need through third party analysis, however some of these packages are heavily reliant and their host program. These programs however which allow dynamic daylighting simulation, which will make it easier to calculate accurate daylighting no matter which modelling platform the designer uses, while producing more tangible analysis today, without the need to process raw data.
Resumo:
Acquaintance is a fundamental determinant of how people behave when interacting with one another. This article focuses on how this type of personal knowledge is an important consideration for people as social actors. Studying naturally-occurring social encounters, I describe how speakers use particular references to convey whether a recipient should be able to recognise a non-present third party. On some occasions, however, the presumption of recognisability or non-recognisability that underpins the use of a particular reference proves questionable. By exploring how recipients can challenge reference forms, and thereby reject claims of either recognisability or non-recognisability, I explain how people establish and maintain a shared understanding of who knows whom. I conclude by discussing motivations for this behaviour, and thereby contribute to understanding the commonsense reasoning that underpins orderly conduct in this aspect of social encounters.
Resumo:
This thesis commences with the proposition that the first limb of the doctrine of privity causes injustice to third party beneficiaries in Malaysia, particularly in commercial contracts. The doctrine of privity has been the subject of criticism by the judiciary and academic commentators in common law jurisdictions, mainly directed at the first limb of the doctrine, whereby only parties to a contract can sue and be sued. The first limb prevents a third party from enforcing benefits conferred on them by those contracts thereby resulting in third parties suffering loss and injustice to those parties. In several common law countries, such as England, Australia, New Zealand and Singapore, legislative reform of the doctrine has occurred. The legislative reform has abrogated to a significant extent the doctrine of privity in commercial contracts. Malaysia is a common law country, where the doctrine of privity is still applied to contracts. An analysis of Malaysian case law demonstrates that the most affected third party beneficiaries are those seeking to enforce insurance and construction contracts. While a small number of other third parties to commercial contracts, such as agreements to pay for work done, sale and purchase agreements and tenancy agreements are also affected, the detriment is not as significant. As a consequence, this thesis focuses primarily on the impact of the doctrine of privity on commercial contracts in the areas of insurance and construction in Malaysia The thesis aims to recommend appropriate reforms to address the injustices arising from the privity doctrine for third parties seeking to obtain the benefit of insurance and construction contracts, which may also benefit third parties to other types of commercial contracts. While the Malaysian insurance, consumer protection, negotiable instruments and agency laws allow third party beneficiaries to enforce benefits in contracts, the rights are found to be inadequate. As not all third parties seeking to enforce an insurance or construction contract can rely upon the legislation, the injustice arising from the doctrine of privity remains and needs to be addressed. To achieve this aim, a comparative analysis of the rights of third party beneficiaries under insurance and construction contracts in Malaysia, Australia and England is undertaken. The results of the analysis are used to identify appropriate elements for a legislative framework guided by the three essential criteria for effective law reform developed in the thesis. The three criteria are certainty, public interest and justice. The thesis recommends first the enactment of general legislation applicable to all commercial contracts including insurance contracts. Secondly, the thesis recommends specific targeted legislation to address the injustice faced by third party beneficiaries in construction contracts.
Resumo:
"LexisNexis Questions and Answers: Equity and Trusts provides students with a clear and systematic approach to successfully analysing and answering assessment questions on equity and trusts. Each chapter commences with a discussion of key principles and issues including a summary of relevant leading cases and legislation for effective revision. Examples of written questions with fact scenarios follow, each with a suggested answer plan, sample answer and comments on how the answer might be viewed by an examiner. Readers are provided with advice on common errors to avoid when answering questions and practical hints and tips on how to achieve higher marks. Features • Summary of key issues helps students revise key areas before attempting problem questions • Sample questions with model answers assist students with effective exam study preparation"--publisher website