• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 169
  • 46
  • 45
  • 34
  • 19
  • 19
  • 16
  • 8
  • 5
  • 5
  • 4
  • 2
  • 2
  • 1
  • Tagged with
  • 394
  • 394
  • 111
  • 57
  • 46
  • 39
  • 39
  • 34
  • 34
  • 33
  • 31
  • 31
  • 31
  • 31
  • 30
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
381

Vingt ans après l'arrêt Harper: l'évolution constitutionnelle du plafonnement des dépenses électorales des tierces parties

Burlone, Hadrien 01 1900 (has links)
Ce mémoire cherche à déterminer si la logique de la majorité de la Cour suprême dans l’arrêt Harper c. Canada (Procureur général) demeure valide aujourd’hui, près de deux décennies après que cet arrêt, qui avalise le régime de plafonnement des dépenses électorales des tierces parties, ait été rendu. À cette fin, le régime de plafonnement prévu par la Loi électorale du Canada est examiné en détail, de même que les motifs de la majorité. Ces préliminaires achevés, le cœur de l’analyse est entamé. Trois phénomènes sont étudiés pour déterminer si le raisonnement de la majorité dans Harper doit être remis ou non en question : l’avènement d’une dynamique de « campagne permanente », la monté des technologies de l’information et le déclin des partis politiques. Il est conclu que la logique déployée dans l’arrêt Harper demeure valide, mais qu’elle appelle certains changements à la Loi électorale actuelle. À cet effet, les plafonds préélectoraux des tiers devraient être éliminés et l’usage de sites internet personnels ou de compte de médias sociaux devrait être assujetti à un régime de plafonnement. / This work seeks to determine whether the reasoning of the Supreme Court majority in Harper v. Canada (Attorney General), which validates third parties’ spending limits during the election period,still avails almost two decades after being rendered. The limits on third parties' spending as established by the Canada Election Act are examined in detail. The majority’s reasons are also discussed at length. Then, the core analysis begins. Three new social phenomena are examined to determine whether the Court’s reasoning in Harper should be called into question. These phenomena are: the advent of a “permanent campaign” in Canada, the rise of new information technologies and the decline of political parties. It is concluded that Harper’s logic remains highly compelling, though it may entail some modifications to the current electoral law, such as the abolition of pre-electoral spending limits and the application of some form of limitation to electoral spending regarding personal web sites and social media account.
382

Sécurité et vie privée dans les applications web / Web applications security and privacy

Somé, Dolière Francis 29 October 2018 (has links)
Dans cette thèse, nous nous sommes intéressés aux problématiques de sécurité et de confidentialité liées à l'utilisation d'applications web et à l'installation d'extensions de navigateurs. Parmi les attaques dont sont victimes les applications web, il y a celles très connues de type XSS (ou Cross-Site Scripting). Les extensions sont des logiciels tiers que les utilisateurs peuvent installer afin de booster les fonctionnalités des navigateurs et améliorer leur expérience utilisateur. Content Security Policy (CSP) est une politique de sécurité qui a été proposée pour contrer les attaques de type XSS. La Same Origin Policy (SOP) est une politique de sécurité fondamentale des navigateurs, régissant les interactions entre applications web. Par exemple, elle ne permet pas qu'une application accède aux données d'une autre application. Cependant, le mécanisme de Cross-Origin Resource Sharing (CORS) peut être implémenté par des applications désirant échanger des données entre elles. Tout d'abord, nous avons étudié l'intégration de CSP avec la Same Origin Policy (SOP) et démontré que SOP peut rendre CSP inefficace, surtout quand une application web ne protège pas toutes ses pages avec CSP, et qu'une page avec CSP imbrique ou est imbriquée dans une autre page sans ou avec un CSP différent et inefficace. Nous avons aussi élucidé la sémantique de CSP, en particulier les différences entre ses 3 versions, et leurs implémentations dans les navigateurs. Nous avons ainsi introduit le concept de CSP sans dépendances qui assure à une application la même protection contre les attaques, quelque soit le navigateur dans lequel elle s'exécute. Finalement, nous avons proposé et démontré comment étendre CSP dans son état actuel, afin de pallier à nombre de ses limitations qui ont été révélées dans d'autres études. Les contenus tiers dans les applications web permettent aux propriétaires de ces contenus de pister les utilisateurs quand ils naviguent sur le web. Pour éviter cela, nous avons introduit une nouvelle architecture web qui une fois déployée, supprime le pistage des utilisateurs. Dans un dernier temps, nous nous sommes intéressés aux extensions de navigateurs. Nous avons d'abord démontré que les extensions qu'un utilisateur installe et/ou les applications web auxquelles il se connecte, peuvent le distinguer d'autres utilisateurs. Nous avons aussi étudié les interactions entre extensions et applications web. Ainsi avons-nous trouvé plusieurs extensions dont les privilèges peuvent être exploités par des sites web afin d'accéder à des données sensibles de l'utilisateur. Par exemple, certaines extensions permettent à des applications web d'accéder aux contenus d'autres applications, bien que cela soit normalement interdit par la Same Origin Policy. Finalement, nous avons aussi trouvé qu'un grand nombre d'extensions a la possibilité de désactiver la Same Origin Policy dans le navigateur, en manipulant les entêtes CORS. Cela permet à un attaquant d'accéder aux données de l'utilisateur dans n'importe qu'elle autre application, comme par exemple ses mails, son profile sur les réseaux sociaux, et bien plus. Pour lutter contre ces problèmes, nous préconisons aux navigateurs un système de permissions plus fin et une analyse d'extensions plus poussée, afin d'alerter les utilisateurs des dangers réels liés aux extensions. / In this thesis, we studied security and privacy threats in web applications and browser extensions. There are many attacks targeting the web of which XSS (Cross-Site Scripting) is one of the most notorious. Third party tracking is the ability of an attacker to benefit from its presence in many web applications in order to track the user has she browses the web, and build her browsing profile. Extensions are third party software that users install to extend their browser functionality and improve their browsing experience. Malicious or poorly programmed extensions can be exploited by attackers in web applications, in order to benefit from extensions privileged capabilities and access sensitive user information. Content Security Policy (CSP) is a security mechanism for mitigating the impact of content injection attacks in general and in particular XSS. The Same Origin Policy (SOP) is a security mechanism implemented by browsers to isolate web applications of different origins from one another. In a first work on CSP, we analyzed the interplay of CSP with SOP and demonstrated that the latter allows the former to be bypassed. Then we scrutinized the three CSP versions and found that a CSP is differently interpreted depending on the browser, the version of CSP it implements, and how compliant the implementation is with respect to the specification. To help developers deploy effective policies that encompass all these differences in CSP versions and browsers implementations, we proposed the deployment of dependency-free policies that effectively protect against attacks in all browsers. Finally, previous studies have identified many limitations of CSP. We reviewed the different solutions proposed in the wild, and showed that they do not fully mitigate the identified shortcomings of CSP. Therefore, we proposed to extend the CSP specification, and showed the feasibility of our proposals with an example of implementation. Regarding third party tracking, we introduced and implemented a tracking preserving architecture, that can be deployed by web developers willing to include third party content in their applications while preventing tracking. Intuitively, third party requests are automatically routed to a trusted middle party server which removes tracking information from the requests. Finally considering browser extensions, we first showed that the extensions that users install and the websites they are logged into, can serve to uniquely identify and track them. We then studied the communications between browser extensions and web applications and demonstrate that malicious or poorly programmed extensions can be exploited by web applications to benefit from extensions privileged capabilities. Also, we demonstrated that extensions can disable the Same Origin Policy by tampering with CORS headers. All this enables web applications to read sensitive user information. To mitigate these threats, we proposed countermeasures and a more fine-grained permissions system and review process for browser extensions. We believe that this can help browser vendors identify malicious extensions and warn users about the threats posed by extensions they install.
383

A best practice framework in reverse logistics

Badenhorst, Amanda 02 1900 (has links)
Reverse logistics is an important process that is often misunderstood. Reverse logistics can cause considerable cost, but provide numerous opportunities. Many organisations do not understand the correct processes and procedures to follow and how to manage reverse logistics efficiently. The focus of this study was on best practices in reverse logistics. A best practice framework was developed to help organisations overcome problems and manage their reverse logistics more efficiently. This study adopted a mixed method research approach with both qualitative and quantitative elements. A comprehensive literature study was conducted to develop a conceptual best practice framework in reverse logistics and a survey was conducted to seek inputs from industry in South Africa to refine the framework into a workable instrument in practice. The study concluded that the best practices identified in literature have proven to be important in practice, and applying such practices will enable organisations to manage their reverse logistics more efficiently. / Business Management / M. Com. (Logistics)
384

Factores que afectan el acceso al financiamiento en las pequeñas y micro empresas

Navarrete Torres, Luis Alberto, Vásquez Ángeles, Rosa María del Pilar 05 July 2020 (has links)
El propósito de la presente investigación ha sido identificar aquellos factores que afectan el acceso al financiamiento de las pymes, esto debido a que a la fecha existen muchas limitantes que funcionan como barrera en el desarrollo de dichas empresas. Es preciso indicar que en el mercado en donde se desarrollan existen diversas formas de financiamiento; sin embargo, estas normalmente benefician o aportan un mayor apoyo y valor a las grandes empresas o a las que tienen un historial crediticio previo. Por ello, es que en este trabajo de investigación nos enfocamos en analizar específicamente el apoyo o facilidades de financiamiento que reciben las pymes para su desarrollo. Los tipos de financiamiento que existen para las pymes son con capital propio y/o con capital de terceros: el primero consiste en el inicio y financiamiento de las operaciones con los fondos propios de los inversionistas, y el segundo consiste en el otorgamiento de financiamiento mediante el capital semilla, préstamos informales, proveedores, subsidios del Estado, entidades bancarias-financieras y la emisión de bonos-acciones. Es importante mencionar que existen diversos factores que dificultan o facilitan el acceso al financiamiento de las pymes, los cuales se hacen referencia en esta investigación: la asimetría de la información, el riesgo crediticio, la calidad de los proyectos de negocios pymes y la experiencia previa del cliente. / The purpose of this research has been to identify those factors that affect access to financing for SMEs, due to the fact that to date there are many limitations that function as a barrier in the development of these companies. It is necessary to indicate that in the market where they are developed there are various forms of financing; however, these typically benefit or provide greater support and value to large companies or those with a prior credit history. Therefore, in this research work we focus on specifically analyzing the support or financing facilities that SMEs receive for their development. The types of financing that exist for SMEs are with own capital and / or with third-party capital: the first consists of starting and financing operations with investors' own funds, and the second consists of granting financing through seed capital, informal loans, suppliers, State subsidies, banking-financial entities and the issuance of bond-shares. It is important to mention that there are various factors that hinder or facilitate access to financing for SMEs, which are referenced in this research: the asymmetry of information, credit risk, the quality of SME business projects and previous experience. the client's. / Trabajo de Suficiencia Profesional
385

Measures of University Research Output

Zharova, Alona 14 February 2018 (has links)
New Public Management unterstützt Universitäten und Forschungseinrichtungen dabei, in einem stark wettbewerbsorientierten Forschungsumfeld zu bestehen. Entscheidungen unter Unsicherheit, z.B. die Verteilung von Mitteln für den Forschungsbedarf und Forschungszwecke, erfordert von Politik und Hochschulmanagement, die Beziehungen zwischen den Dimensionen der Forschungsleistung und den resultierenden oder eingehenden Zuschüssen zu verstehen. Hierfür ist es wichtig, die Variablen der wissenschaftlichen Wissensproduktion auf der Ebene von Individuen, Forschungsgruppen und Universitäten zu untersuchen. Das Kapitel 2 dieser Arbeit analysiert die Ebene der Individuen. Es verwendet die Beobachtungen der Forscherprofile von Handelsblatt (HB), Research Papers in Economics (RePEc, hier RP) und Google Scholar (GS) als meist verbreitete Ranking-Systeme in BWL und VWL im deutschsprachigen Raum. Das Kapitel 3 liefert eine empirische Evidenz für die Ebene von Forschungsgruppen und verwendet die Daten eines Sonderforschungsbereichs (SFB) zu Finanzinputs und Forschungsoutput von 2005 bis 2016. Das Kapitel beginnt mit der Beschreibung passender Performanzindikatoren, gefolgt von einer innovativen visuellen Datenanalyse. Im Hauptteil des Kapitels untersucht die Arbeit mit Hilfe eines Zeit-Fixed-Effects-Panel- Modells und eines Fixed-Effects-Poisson-Modells den Zusammenhang zwischen finanziellen Inputs und Forschungsoutputs. Das Kapitel 4 beschäftigt sich mit dem Niveau der Universitäten und untersucht die Interdependenzstruktur zwischen Drittmittelausgaben, Publikationen, Zitationen und akademischem Alter mit Hilfe eines PVARX-Modells, einer Impulsantwort und einer Zerlegung der Prognosefehlervarianz. Abschließend befasst sich das Kapitel mit den möglichen Implikationen für Politik und Entscheidungsfindung und schlägt Empfehlungen für das universitäre Forschungsmanagement vor. / New Public Management helps universities and research institutions to perform in a highly competitive research environment. Decision making in the face of uncertainty, for example distribution of funds for research needs and purposes, urges research policy makers and university managers to understand the relationships between the dimensions of research performance and the resulting or incoming grants. Thus, it is important to accurately reflect the variables of scientific knowledge production on the level of individuals, research groups and universities. Chapter 2 of this thesis introduces an analysis on the level of individuals. The data are taken from the three widely-used ranking systems in the economic and business sciences among German-speaking countries: Handelsblatt (HB), Research Papers in Economics (RePEc, here RP) and Google Scholar (GS). It proposes a framework for collating ranking data for comparison purposes. Chapter 3 provides empirical evidence on the level of research groups using data from a Collaborative Research Center (CRC) on financial inputs and research output from 2005 to 2016. First, suitable performance indicators are discussed. Second, main properties of the data are described using visualization techniques. Finally, the time fixed effects panel data model and the fixed effects Poisson model are used to analyze an interdependency between financial inputs and research outputs. Chapter 4 examines the interdependence structure between third-party expenses (TPE), publications, citations and academic age using university data on individual performance in different scientific areas. A panel vector autoregressive model with exogenous variables (PVARX), impulse response functions and a forecast error variance decomposition help to capture the relationships in the system. To summarize, the chapter addresses the possible implications for policy and decision making and proposes recommendations for university research management.
386

Insurance against damage caused by pollution

Kuschke, Birgit 28 February 2009 (has links)
Universally complications exist concerning insurance cover for the risks posed by pollution damage. Environmental insurance cover can be procured under first-party or third-party insurance. For the latter, the polluter's statutory or civil liability is required. The determination of liability for compensation, especially delictual liability, remains problematic. The right to the environment in section 24 of the Constitution creates a general duty of care. The introduction of a strict liability regime can be recommended to alleviate the burden of proving fault and contributory negligence. Where there is multiple or cumulative causation or the exact identity of the polluter is unknown, potential solutions regarding the allocation of liability include a pollution-share, joint and several, market-share or, as a last resort, a proportional allocation. Actionable damages should include property damage, pure economic loss, clean-up costs and natural resource damages, including compensation for reduced aesthetic value. Due to the uncertainty and potential magnitude of pollution-related claims, insurers have attempted to avoid or limit these risks by including specific pollution exclusion and limitation clauses in policies. Statutory regulation of policy content and prescribed wording for clauses could address problems relating to the interpretation of policy provisions. Various other issues such as the coverage of gradual pollution, the effect of the various triggers of coverage and the potential long-tail liability of insurer, the lack of information and the unpredictability of the risk cause further complications for both the insured and the insurer. Policies should preferably be issued on a `claims-made' basis linked to retroactive dates. Mandatory third-party insurance to the benefit of a third party should be required within specific high-risk industries, specifically for the benefit of the prejudiced person or an environmental remediation fund. The right of a prejudiced party to claim directly from the polluter's liability insurer should be introduced. Currently, the focus appears to be more on protection and environmental remediation than on civil compensation. There is an urgent need for the development of statutory and civil liability compensation mechanisms and for an increased regulation of insurance policies and practices to ensure effective insurance cover to provide compensation for environmental damage. / Jurisprudence / LL.D.
387

以電子支付及第三方支付法制論消費者保護與產業發展 / Research on the legal system of electronic payment and third-party payment for consumer protection and industry development

吳東益 Unknown Date (has links)
《電子支付機構管理條例》自2015年2月實施後,陸續有相關子法作為補充。2015年底,金管會目標台灣非現金支付要在5年內達到52%,因此2016年被稱為「支付元年」。推廣線上支付最重要的除了市場動向外,莫過於法規的設置,因此本文探討目前的法制是否足以因應如此新興產業的需求,從進入門檻監理、消費者保護與產業發展三大個面向討論現行法規,並剖析是否有檢討之處。 由法制面審視我國對支付產業進入門檻的規定,反映了產業的競爭與發展的機會。而消費者的使用經驗是支付產業最佳的廣告,尤其支付系統多由小額且龐雜的交易組成,一旦紛爭發生,使用者大多自認倒楣,因此具有完備的防止糾紛或詐騙機制、資訊安全規範,產業才能永續發展。 / Since the implementation of the《Law on the Administration of Electronic Payment Institutions》in February 2015, the related regulations have been supplemented one after another. By the end of 2015, Financial Supervisory Commission set the target for non-cash payments in Taiwan to reach 52% of the total transaction within 5 years. So 2016 is called "the first year of payment". The most important thing promoting online payment is not only market trends, but also the establishment of legal system. Therefore, this article examines whether the current legal system is sufficient to meet the needs of such emerging industries, From entry barriers and supervision, consumer protection, industrial development, the three-oriented discussion of existing laws and regulations. From the legal point of view of Taiwanese payment industry entry barriers, it reflects the competition and development opportunities. The consumer experience is the best advertisement of payment industry. Especially the payment system is composed of small amount and complex transactions, once the dispute occurs, most users claim to be unfortunate. So there is a comprehensive mechanism to prevent disputes or fraud, information security norms, industry will be sustainable.
388

Les figures de la maternité / Motherhood figures

Térel, Julie 09 December 2016 (has links)
Les évolutions sociétales - émancipation de la femme, maîtrise de la fécondité, acceptation del’homosexualité, multiplication des formes de conjugalité, nouveaux modèles familiaux, médicalisation de laprocréation - ont bouleversé le rapport entre maternité de fait et maternité juridique.La femme qui revendique le statut de mère n’est plus nécessairement celle qui a porté et mis au mondel’enfant. Les techniques d’assistance médicale à la procréation ont ouvert le champ des possibles enpermettant à la femme de réaliser son désir d’enfant, indépendamment des contraintes temporelles oubiologiques. Pourtant, la mère gestationnelle apparaît, aujourd’hui encore, comme la figure certaine de lamaternité. Elle a vu ses droits accrus par un mouvement d’harmonisation du droit de la filiation, jusqu’àdevenir l’égale de l’homme. Elle a cessé d’être identifiée par son statut conjugal, et est désormais définie parréférence au fait biologique maternel de l’accouchement. L’enfantement marque alors la singularité de lamaternité en tant que figure de rattachement, car elle est le seul vecteur d’identification spatio-temporelle del’enfant. Un ordre public fort en la matière est donc de rigueur : l’accouchement, qui détermine l’état civil del’enfant, ne devrait pas pouvoir être dissimulé. En revanche, la fonction maternelle de parenté devraitdavantage être soumise à la volonté de la femme qui se revendique mère. La mère gestationnelle, qui devraittoujours pouvoir établir un lien de filiation, devrait également pouvoir refuser l’établissement d’un tel lien,au profit d’une autre figure maternelle plus incertaine car reposant sur la volonté d’être mère, volontééventuellement corroborée par un lien génétique. Autrement dit, la filiation maternelle de l’enfant devraitpouvoir être transférée afin d’être en concordance avec la réalité sociologique.La multiplication des figures de la maternité conduit ainsi à une rénovation de la conception traditionnelle dela maternité, par un rééquilibrage du rôle joué par les éléments objectifs et subjectifs / A number of developments in society - the emancipation of women, birth control, the acceptanceof homosexuality, the diversification of couple arrangements, new family models, the increasingly medicalapproach to procreation - have shaken up the link between motherhood in fact and motherhood in law.The woman claiming the title of mother is no longer necessarily the one who bore the child and brought itinto the world. Assisted reproductive technology has opened up possibilities by allowing women who want achild to have one, regardless of restrictions related to time or biology. However, the “gestation mother”remains to this day the definite mother figure. Her rights have increased through the harmonisation of thelaws of filiation, eventually making her the man’s equal. She is no longer identified by her marital status andis now defined in relation to the biological process of giving birth. Giving birth hence highlights thespecificity of motherhood as an attachment figure, being the only means of identification in space and timefor the child. A strong public policy is therefore required in this area: giving birth should not be concealable,since it determines the child’s status in law. On the other hand, the maternal parenting role should dependmore on the will of the woman who claims the title of mother. The gestation mother, who should always beable to ascertain the filiation, should also be able to refuse such filiation, in favour of another mother figurenot as firmly ascertained, since her status is dependent on the will to be the mother, a will possiblycorroborated by filiation. The child’s maternal filiation should be transferrable in order to reflect the socialreality.The multiplication of mother figures has thus led to an overhaul of the traditional conception of motherhood,by rebalancing the role played by objective and subjective elements.
389

The interactional organisation of initial business-to-business sales calls with prospective clients

Huma, Bogdana January 2018 (has links)
The aim of this thesis is to break new ground by investigating the interactional organisation of real events that comprise live business-to-business cold calls. Despite being a ubiquitous part of everyday life, we know very little about how cold calls are initiated, progressed, and completed. Cold calls are unsolicited telephone encounters, initiated by salespeople aiming to get prospective clients ( prospects ) interested in their services, with the distal goal of turning them into clients and the proximal goal of getting them to agree to an initial meeting. Cold calls are often treated as a nuisance by call-takers, and salespeople must deal with reluctant gatekeepers, recurrent sales resistance, and the occasional hang-up. The training they receive often draws on outdated theories of communication and is rarely supported by empirical evidence. Thus, this study not only addresses an important domain for interactional research, but also fulfils a practical necessity for empirical research that will inform sales training and improve callers and call-takers experiences. The data comprise 150 recorded calls supplied by three British companies that sell, service, and lease office equipment. The data were collected, transcribed, and analysed within an ethnomethodological framework using conversation analysis and discursive psychology. The first analytic chapter outlines the overall structural organisation of cold calling. It documents the constituent activities within the opening, the business of the call, and the closing. It identifies and describes two types of cold calls. Freezing calls are initiated by salespeople who are contacting a prospect for the very first time. Lukewarm calls feature salespeople who claim to have been in contact with the prospect s organisation in the past. The second chapter excavates the initial turns of lukewarm calls in which salespeople ask to speak to another person within the company, with whom they indicate to be acquainted. The analysis revealed that this third-party acquaintanceship was crucial for establishing the legitimacy of the switchboard request and for improving the chances of getting it granted. The third chapter focused on appointment-making sequences in both freezing and lukewarm calls, showing that they comprise two components: a preamble and a meeting request sequence. I also highlight how salespeople exploit sequential and turn-taking mechanisms to secure meetings with prospects without giving the latter the opportunity to refuse. The final chapter examines two practices for enacting resistance in cold calls blocks and stalls and documents the range of methods salespeople employ for dealing with each type of resistance. Sales blocks expose the salesperson s commercial agenda, attempt to stop the prospecting activity, and move towards call pre-closure. In response, salespeople can challenge, counter, or circumvent blocks as well as redo their initiating actions. Stalls slow down the progress of the sales process by delaying the next phase of the sale or by proposing less commitment-implicative alternatives. Salespeople deal with stalls by either justifying their initial proposal or by spontaneously introducing new action plans, both being more conducive to the progress of the sale. The thesis contributes to a growing body of interactional research on commercial encounters by shedding empirical light on a previously unexamined setting, business-to-business cold calls. It also moves forward discursive psychology s project of respecifying psychological phenomena by documenting the communicative practices associated with persuasion and resistance. Finally, it expands the extant conversation analytic toolkit by examining new practices (such as appointment-making) and by providing new insights into key conversation analytic topics (such as requests, pre-sequences, and accounts for calling). Overall, the findings presented in this thesis challenge existing conceptions of prospecting through cold calling that are prevalent in the sales literature. The thesis puts forward a strong argument for opening the black box of cold calls to better understand these interactions and to identify good practices as the basis for communication training. Research presented in this thesis has already been used in the development of CARM (Conversation Analytic Role-play Method) training for salespeople, who reported having doubled their appointment rates. Based on the findings in this thesis, I plan to develop further training not only for salespeople but also for prospective customers, thus improving the overall outcome of cold call encounters.
390

Managing Intellectual Property and Licensing: A Study on Cooperative Research Centres

Sheen, Peter Bernard January 2005 (has links)
This thesis examines the perceived importance by two-tiered management of Cooperative Research Centres (CRCs) for managing a range of intellectual property issues. Fifty survey items are presented to the executive directors and commercialization managers of 62 CRCs. The survey items are categorized under four themes: relationships with collaborators, project management; design and implementation of agreements; and specific licensing issues. An analysis of the data, using a series of independent samples t-tests, repeated measures t-tests, chi-square tests for independence or relatedness and goodness of fit, shows a range of results. There are significant differences between executive directors and commercialization managers on a number of issues. There are particular emphases or trends about certain issues for the whole sample of managers. These findings are compared with text analyses of 23 CRC strategic planning documents. This is done in order to explore any similarity, difference or nuance between what the managers say in response to the survey items, compared with what is stated in the codified policies of the CRCs. While there is a high degree of consistency among certain themes between the two sets of findings, the overall analysis points to the need for the CRCs to have a better understanding and practice of commercialization opportunities, especially through the involvement of third party commercial interests. It is argued that accommodating third party commercialization interests involves the application of an important knowledge economy principle that has an important bearing on the future economic viability and competitiveness of the CRCs.

Page generated in 0.0263 seconds