排序方式: 共有42条查询结果,搜索用时 15 毫秒
21.
刘素芝 《湖南经济管理干部学院学报》2010,(6):16-19
征集股东委托书就象一柄双刃剑,利用得当它可以成为保护公司和股东利益、优化公司治理结构、活跃证券市场的有力手段;否则可能会沦为投机人士争夺公司控制权、损害公司和股东利益的工具。许多国家立法上均对此加以详细规定,我国仅作了十分粗略的规定。近年来我国上市公司实践中征集股东委托书实例越来越多,由于缺乏法律规制,出现了不少问题,股东权益受到侵害。在我国,完善征集股东委托书制度已势在必行。而征集股东委托书之基本原则是贯穿于征集股东委托书立法、执法和守法全过程的指南针。本文着重研究征集股东委托书的三大基本原则,即信息公开原则、公平竞争原则和诚实信用原则。 相似文献
22.
授权经营的制度内涵及其局限性 总被引:2,自引:0,他引:2
授权经营是人们讨论国有企业改革问题时经常使用的一个概念。本文区分了国有企业授权经营制度和企业集团国有资产授权经营制度,分别阐述了这两种授权经营制度形成的特定时代背景、制度内涵及其局限性。文章的第三部分探讨了由于人们对授权经营内涵的含混化理解,而造成的对国有企业的过度授权和与“授权”相配套的约束机制、监管机制供给不足的问题。 相似文献
23.
This study aims to provide an integrated model that examines the determinants of customer intention to use facial recognition systems (FRS) in quick-service restaurants (QSRs). An extended model built based on the unified theory of acceptance and use of technology (UTAUT) was tested via structural equation modeling (SEM) using data collected from a sample of 558 QSR customers. The results showed that perceived performance expectancy, social influence, and trust in the system significantly and positively affect customer intention to use FRS to access loyalty and payment accounts. Furthermore, customer hedonic motivation had a positive effect on the intention to use FRS for authorization to their loyalty accounts, but no effect on the intention to use this technology for payment account authorization. The developed model would be helpful to managers for making a decision of utilizing FRS in QSRs and promoting the technology among customers. 相似文献
24.
本文论述了ASP.NET安全架构中基于配置文件的四种身份验证。通过对用户访问页面流程的分析,采用窗体验证及授权策略处理验证和授权事件,并通过实验予以验证。从而提高了ASP.NET开发环境下Web应用系统的安全性。 相似文献
25.
预算是财政年度的开始,决算是财政年度的结果,预算又是国家管理社会经济事务、实施宏观调控的重要手段,并为深化财税体制改革,建立完善社会主义市场经济给公共财政、审计机关开展预算执行审计检查工作指明了方向。本文就审视的层面对预算编制、执行过程中存在的具体问题举一反三分析探究,最终实现效益为目标。 相似文献
26.
One stage of the union organizing process involves the legal requirement that at least 30% of the employees in a potential bargaining unit express a desire for union representation by signing union authorization cards. Beyond the necessary legal requirement, do the data generated by card signing provide a potentially valuable source of information that may be useful to the union organizer in formulating campaign tactics? In addition, do authorization cards provide a sufficiently valid basis for establishing bargaining unit recognition as is the case in Canada? In order to explore these possibilities, the relationship between card signing behavior and certification vote in six union representation elections is examined. Although card signing and vote for certification are significantly related, overall results indicate that relying on union authorization card data as an indicator of vote at the individual level is questionable. 相似文献
27.
In dynamic cross-enterprise collaborations, different enterprises form a – possibly temporary – business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations. 相似文献
28.
特许经营被实践证明是一种成功的商业运作模式;但对这种网络组织的理论研究一直落后于实践。首先,对国外特许经营授权有关理论进行阐述,指出GHM模型是它们的理论基础。但由于GHM模型中的权利配置基于实物资产,而特许经营中的关键资源是品牌等无形资产,GHM模型作为分析特许经营的授权理论的基础存在明显局限。运用R-Z理论,以特许经营中的外部性分析为起点,对其专用性投资外部性进行考察,分析在不同情景下特许经营的不同授权模式,从而为特许经营授权提供理论依据。 相似文献
29.
数字图书馆运营中的版权问题涉及图书馆经营者如何从原作品的版权人处获得授权继而进行数据库编纂形成数据库作品和图书馆自己的数据库作品的版权保护2个方面的内容。在数字图书馆“获得授权”的多种途径中,通过市场寻求可行的授权许可方式是最佳途径。针对版权保护问题,可以通过设定技术保护措施有效保护数据库著作权,按网民下载数量收费的有偿使用方式协调数字图书馆方面和原著作权人的利益关系。 相似文献
30.
本文分析了Acegi安全框架,详细说明了Acegi安全框架的工作过程。举例说明了Acegi安全框架的具体应用,讨论了如何利用Acegi进行Web资源的认证和授权。使用一种基于数据库的策略来对Acegi资源配置进行动态扩展,满足电子商务系统中用户在运行期间的动态改变权限的需求。 相似文献