947 resultados para breaches of lease
Resumo:
The role of intangible firm capabilities as a source of competitive advantage has come into prominence in marketing strategy literature, due to the Resource Based View. This paper applies the Resource Based View and hypothesizes that strategic flexibility and organisation learning, conceptualised as capabilities, positively effect e-business adoption and competitive advantage. Partial Lease Squares analysis suggest that theoretical constructs function as hypothesised and explain a significant variation on e-business adoption and competitive advantage. Firms adopting e-business should develop capabilities such as strategic flexibility and organisation learning and that vendor firms may segment their potential clients based on these capabilities.
Resumo:
Environmental impacts caused during Australia's comparatively recent settlement by Europeans are evident. Governments (both Commonwealth and States) have been largely responsible for requiring landholders – through leasehold development conditions and taxation concessions – to conduct clearing that is now perceived as damage. Most governments are now demanding resource protection. There is a measure of bewilderment (if not resentment) among landholders because of this change. The more populous States, where most overall damage has been done (i.e. Victoria and New South Wales), provide most support for attempts to stop development in other regions where there has been less damage. Queensland, i.e. the north-eastern quarter of the continent, has been relatively slow to develop. It also holds the largest and most diverse natural environments. Tree clearing is an unavoidable element of land development, whether to access and enhance native grasses for livestock or to allow for urban developments (with exotic tree plantings). The consequences in terms of regulations are particularly complex because of the dynamic nature of vegetation. The regulatory terms used in current legislation – such as 'Endangered' and 'Of concern' – depend on legally-defined, static baselines. Regrowth and fire damage are two obvious causes of change. A less obvious aspect is succession, where ecosystems change naturally over long timeframes. In the recent past, the Queensland Government encouraged extensive tree-clearing e.g. through the State Brigalow Development Scheme (mostly 1962 to 1975) which resulted in the removal of some 97% of the wide-ranging mature forests of Acacia harpophylla. At the same time, this government controls National Parks and other reservations (occupying some 4% of the State's 1.7 million km2 area) and also holds major World Heritage Areas (such as the Great Barrier Reef and the Wet Tropics Rainforest) promulgated under Commonwealth legislation. This is a highly prescriptive approach, where the community is directed on the one hand to develop (largely through lease conditions) and on the other to avoid development (largely by unusable reserves). Another approach to development and conservation is still possible in Queensland. For this to occur, however, a more workable and equitable solution than has been employed to date is needed, especially for the remote lands of this State. This must involve resident landholders, who have the capacity (through local knowledge, infrastructure and daily presence) to undertake most costeffectively sustainable land-use management (with suitable attention to ecosystems requiring special conservation effort), that is, provided they have the necessary direction, encouragement and incentive to do so.
Resumo:
Unified Enterprise application security is a new emerging approach for providing protection against application level attacks. Conventional application security approach that consists of embedding security into each critical application leads towards scattered security mechanism that is not only difficult to manage but also creates security loopholes. According to the CSIIFBI computer crime survey report, almost 80% of the security breaches come from authorized users. In this paper, we have worked on the concept of unified security model, which manages all security aspect from a single security window. The basic idea is to keep business functionality separate from security components of the application. Our main focus was on the designing of frame work for unified layer which supports single point of policy control, centralize logging mechanism, granular, context aware access control, and independent from any underlying authentication technology and authorization policy.
Resumo:
Franchisor failure is one of the most problematic areas of the franchise relationship. It impacts negatively on landlords and other suppliers, but the contracting parties that are currently without legal rights to respond when a franchisor fails, and thus without consumer protection, are its franchisees. In this thesis I explore the current contractual, regulatory and commercial environment that franchisees inhabit, within the context of franchisor failure. I conclude that ex ante there are opportunities to level the playing field through consumer protection legislation. I also conclude that the task is not one solely for the consumer protection legislation; the problem should also be addressed ex post through the Corporations Act.
Resumo:
Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.
Resumo:
The introduction of the Australian curriculum, the use of standardised testing (e.g. NAPLAN) and the My School website are couched in a context of accountability. This circumstance has stimulated and in some cases renewed a range of boundaries in Australian Education. The consequences that arise from standardised testing have accentuated the boundaries produced by social reproduction in education which has led to an increase in the numbers of students disengaging from mainstream education and applying for enrolment at the Edmund Rice Education Australia Flexible Learning Centre Network (EREAFLCN). Boundaries are created for many young people who are denied access to credentials and certification as a result of being excluded from or in some way disengaging from standardised education and testing. Young people who participate at the EREAFLCN arrive with a variety of forms of cultural capital that are not valued in current education and employment fields. This is not to say that these young people’s different forms of cultural capital have no value, but rather that such funds of knowledge, repertoires and cultural capital are not valued by the majority of powerful agents in educational and employment fields. How then can the qualitative value of traditionally unorthodox - yet often intricate, ingenious, and astute - versions of cultural capital evident in the habitus of many young people be made to count, be recognised, be valuated? Can a process of educational assessment be a field of capital exchange and a space which breaches boundaries through a valuating process? This paper reports on the development of an innovative approach to assessment in an alternative education institution designed for the re-engagement of ‘at risk’ youth who have left formal schooling. A case study approach has been used to document the engagement of six young people, with an educational approach described as assessment for learning as a field of exchange across two sites in the EREAFLCN. In order to capture the broad range of students’ cultural and social capital, an electronic portfolio system (EPS) is under trial. The model draws on categories from sociological models of capital and reconceptualises the eportfolio as a sociocultural zone of learning and development. Results from the trial show a general tendency towards engagement with the EPS and potential for the attainment of socially valued cultural capital in the form of school credentials. In this way restrictive boundaries can be breached and a more equitable outcome achieved for many young Australians.
Resumo:
The Australian Federal Commissioner of Taxation recently released Draft Taxation Ruling TR 2008/D3 with the stated purpose of clarifying ‘what profits derived from the leasing of ships or aircraft fall within the ship and aircraft articles of each of Australia’s tax treaties’. In particular, TR 2008/D3 explains the taxing rights over different types of leasing profits, such as a full basis lease in respect of any transport by a ship operated in international traffic and bareboat leases which are ancillary to the lessor transport operations of ships in international traffic. This article outlines the Commissioner’s views on the application of the standard ships and aircraft articles in the tax treaties to which it is a party as well as considering the major variations on the standard adoption. In doing so, guidance is provided as to the allocation of taxing rights of ship and aircraft leasing profits under Australia’s tax treaties.
Resumo:
In recent years, de-regulation in the airline industry and the introduction of low-cost carriers have conspired to produce significant changes in the airport landscape. From an airport operator’s perspective, one of the most notable has been the shift of capital revenue from traditional airline sources (through exclusive use, long term lease arrangements) to passengers (by way of fees collected from ticket sales). As a result of these developments, passengers have become recognized as major stakeholders who have the power to influence airport profitability. This link between passenger satisfaction and profitability has generated industry wide interest in the “passenger experience”. In this paper, we define the factors which influence passenger experience, namely (a) artifacts, (b) services and (c) the terminal building, and explore the challenges that exist in the current approaches to terminal design. On the basis of these insights, we propose a conceptual model of passenger experience, and motivate its use as a framework for further research into improving terminal design from a passenger oriented perspective.
Resumo:
The greater volume of businesses sold in Australia each year are small to medium enterprises. The administration of business contracts presents far different challenges than, for example, contracts for the sale of goods alone or contracts for the sale of land. The subject matter comprises both real and personal, and tangible and intangible property. Other considerations that do not affect those other commonplace contracts include dealing with employees who are both remaining and departing, taking account of restraints of trade, and the phenomena of the passing of property being different in respect of different forms of property being transferred in the same contract. In keeping with the format of the previous edition, the book is written with the busy practitioner in mind. It deals with the formation of business contracts, all aspects of disclosure both contractual and statutory, the role of agents, and detailed consideration of the different types of subject matter of small business contracts including, the lease of the premises, intellectual property, goodwill, licences, book debts and plant and equipment. It has up to date treatment of income tax implications of the sale and the impact of the latest Commonwealth legislation on dealing with employees of a business on sale. Consistent with the last edition, the book has chapters on time of the essence and completion, personal securities, restraint of trade clauses, special conditions and remedies for breach by both parties and misleading or deceptive conduct by the seller. In relation to personal securities, whilst the current State and Territory based law on Bills of Sale and other Chattel Securities has been the subject of commentary, the proposed national reform agenda has also been commented upon although that legislation is not due until May 2010 at the earliest
Resumo:
Over the past 30 years the nature of airport precincts has changed significantly from purely aviation services to a full range of retail, commercial, industrial and other non aviation uses. Most major airports in Australia are owned and operated by the private sector but are subject to long term head leases to the Federal Government, with subsequent sub leases in place to users of the land. The lease term available for both aviation and non aviation tenants is subject to the head lease term and in a number of Australian airport locations, these head leases are now two-thirds through their initial 50 year lease term and this is raising a number of issues from a valuation and ongoing development perspective. . For our airport precincts to continue to offer levels of infrastructure and services that are comparable or better than many commercial centres in the same location, policy makers need to understand the impact the uncertainty that exists when the current lease term is nearing expiration, especially in relation to the renewed lease term and rental payments. This paper reviews the changes in airport precinct ownership, management and development in Australia and highlights the valuation and rental assessment issues that are currently facing this property sector.
Resumo:
Intercalated Archean komatiites and dacites sit above a thick footwall dacite unit in the host rock succession at the Black Swan Nickel Mine, north of Kalgoorlie in the Yilgarn Craton, Western Australia. Both lithofacies occur in units that vary in scale from laterally extensive at the scale of the mine lease to localized, thin, irregular bodies, from > 100 m thick to only centimetres thick. Some dacites are only slightly altered and deformed, and are interpreted to post-date major deformation and alteration (late porphyries). However, the majority of the dacites display evidence of deformation, especially at contacts, and metamorphism, varying from silicification and chlorite alteration at contacts to pervasive low grade regional metamorphic alteration represented by common assemblages of chlorite, sericite and albite. Texturally, the dacites vary from entirely massive and coherent to partially brecciated to totally brecciated. Strangely, some dacites are coherent at the margins and brecciated internally. Breccia textures vary from cryptically defined, to blocky, closely packed, in situ jig-saw fit textures with secondary minerals in fractures between clasts, to more apparent matrix rich textures with round clast forms, giving apparent conglomerate textures. Some clast zones have multi-coloured clasts, giving the impression of varied provenance. Strangely however, all these textural variants have gradational relationships with each other, and no bedding or depositional structures are present. This indicates that all textures have an in situ origin. The komatiites are generally altered and pervasively carbonate veined. Preservation of original textures is patchy and local, but includes coarse adcumulate, mesocumulate, orthocumulate, crescumulate-harrisite and occasionally spinifex textures. Where original contacts between komatiites and dacites are preserved intact (i.e. not sheared or overprinted by alteration), the komatiites have chilled margins, whereas the dacites do not. The margins of the dacites are commonly silicified, and inclusions of dacite occur in komatiite, even at the top contacts of komatiite units, but komatiite clasts do not occur in the dacites. The komatiites therefore were emplaced as sills into the dacites, and the intercalated relationships are interpreted as intrusive. The brecciation and alteration in the dacites are interpreted as being largely due to hydraulic fracturing and alteration induced by contact metamorphic effects and hydrothermal alteration deriving from the intrusion of komatiites into the felsic pile. The absence of autobreccia and hyaloclastite textures in the dacites suggest that they were emplaced as an earlier intrusive (sill?) complex at a high level in the crust.
Resumo:
Rural land holdings in a number of states in Australia can be freehold or leasehold. The actual type and tenure of the leasehold varies according to each state, but the underlying principles of ownership, transferability and farming and grazing rights are reasonably similar. There are rural areas that are all leasehold title such as the western lands in NSW, while rural land in some states and areas can be a mix of both freehold and lease hold rural property. Over the years many rural farming areas that were originally developed or granted as leasehold land have been converted to freehold title. In many instances the cost of purchasing perpetual leasehold property is similar to the equivalent freehold property despite the fact that an additional rental charge is applied to this form of ownership. Many of the current leasehold rural holdings are located in the more arid regions of the state and the prevailing agricultural farming system is either cattle or sheep grazing.
Resumo:
The opening of the Australian economy in a globalised world has led to Australian garment and retail corporations moving their manufacturing overseas and acquiring goods from overseas providers. This is usually better for the corporations’ bottom-line, as they can purchase goods overseas at a fraction of their local cost, partly due to cheap labour. Australia is one of the many OECD countries not to have a well regulated environment for workplace human rights. This study examines 18 major Australian retail and garment manufacturing corporations and finds that workplace human rights reporting is poor, based on content analysis of their annual reports, corporate social responsibility reports and websites. This is probably due to the failure of the Australian Government to provide adequate oversight by promulgating mandatory reporting standards for both local and overseas operations of Australian companies. This permits corporations to avoid reporting their workplace human rights standards and breaches.