Search results

21 – 30 of over 10000
Article
Publication date: 7 September 2010

Xiaoyun Liu, Wanchun Luo, Xuefeng Mao, Xiuqing Wang and Xian Xin

The paper aims to assess the impact of agricultural output changes on the general price level over time with China as an example.

1803

Abstract

Purpose

The paper aims to assess the impact of agricultural output changes on the general price level over time with China as an example.

Design/methodology/approach

A simple numerical global general equilibrium (GE) model of two regions (China and the rest of the world) and three commodities (agriculture, manufacturing goods, and services) is used to assess the impacts of agricultural output changes on the overall economy price changes. The numerical GE model of this paper consists of production, final consumption, and market clear conditions. The results are generated with the GE model calibrated to aggregated China's input‐output tables of 1987, 1997, and 2005.

Findings

The results suggest that China witnessed a declining influence of agricultural output changes on general price changes. The contribution of given agricultural output change on the general price change in 2005 was merely less than 60 percent of that in 1987, which in turn implies that macro policies targeting to curb general inflation via boosting agricultural output will be less effective as those of 20 years ago.

Practical implications

China's policy makers should rely less and less on promoting agricultural output policies to fight against general inflation and should resort to non‐agricultural policies.

Originality/value

The paper argues that the influence of agriculture on the China's general price indices has been weakening along with China's economic development with a numerical GE model calibrated to aggregated China's input‐output tables of 1987, 1997, and 2005.

Details

China Agricultural Economic Review, vol. 2 no. 3
Type: Research Article
ISSN: 1756-137X

Keywords

Book part
Publication date: 15 June 2022

Zaozao Zhao

Audit within China has developed since the 1980s in line with developments in Chinese society and political life more generally. The system of Chinese local government audit is…

Abstract

Audit within China has developed since the 1980s in line with developments in Chinese society and political life more generally. The system of Chinese local government audit is deeply related to Chinese national audit. The Chinese National Audit Office sets the standards by which the systems work and each auditor both works for the national auditor and the appropriate tier of regional or local government. The system of audit is designed both to check the way in which the government operates financially and in some cases to examine the effective operation of the government.

Details

Auditing Practices in Local Governments: An International Comparison
Type: Book
ISBN: 978-1-80117-085-7

Keywords

Book part
Publication date: 20 January 2021

Yao Lixia

Abstract

Details

Energy Security in Times of Economic Transition: Lessons from China
Type: Book
ISBN: 978-1-83982-465-4

Article
Publication date: 25 September 2009

John Adams and Hongli Song

The purpose of this paper is to identify the key developments in Sino‐foreign cooperation in higher education (HE) in China in terms of policy initiatives and legal frameworks and…

Abstract

Purpose

The purpose of this paper is to identify the key developments in Sino‐foreign cooperation in higher education (HE) in China in terms of policy initiatives and legal frameworks and to highlight the main challenges for the sector in the future.

Design/methodology/approach

Numerous policy papers, academic literature sources and legal acts are analysed to produce a meta analysis of the understanding to date of the issues involved in partnerships in HE in China. Secondary data sources are accessed and compared for consistency.

Findings

The analysis reveals a clear path of initially slow, enhancing, and then rapid developments in the framework of Sino‐foreign HE cooperation. It also reveals some serious issues in the motives behind cooperation, quality of provision, and relevance to China's future development.

Practical implications

The findings of this paper suggest that cooperative partnerships in HE in China need to be much clearer on strategy and purpose and there is an urgent need for a proper assessment of their contribution to the country's education capacity building, educational, and knowledge exchange and future social and economic development.

Originality/value

This paper offers an insight into how it arrives at where it is in terms of these partnerships, how to improve them and raises questions that may well be uncomfortable reading for some.

Details

Journal of Knowledge-based Innovation in China, vol. 1 no. 3
Type: Research Article
ISSN: 1756-1418

Keywords

Article
Publication date: 2 November 2015

Xiaomi An, Wenlin Bai, Hepu Deng, Shuyang Sun, Yu Dong, Wenrui Zhong and Jufang Hu

This paper aims to develop a comprehensive concept map to guide adequate protection and effective management of personal information in the provision of networked services in China

Abstract

Purpose

This paper aims to develop a comprehensive concept map to guide adequate protection and effective management of personal information in the provision of networked services in China through comprehensively considering the multi-disciplinary perspective of personal information protection and management with respect to their multi-dimensional applications, multi-directional controls and multi-contextual analysis in today’s networked environments. There are different perspectives on what personal information protection and management is about, why and how personal information should be protected and managed in the literature. Little, however, is known about the relationships between these multiple perspectives and their implications to personal information protection and management in the real-world practice.

Design/methodology/approach

A multi-methods approach is adopted in the study, including a comprehensive review of the related literature, a content analysis of the relevant laws, polices, standards, a multi-cases study of the relevant network services providers and an online survey of the Chinese citizens who are the end-users of the networked services to adequately achieve the objective of this study. The concept map building technique is used as a tool for conducting the meta-synthesis of the findings from multiple data resources in the development of a comprehensive concept map for personal information protection and management.

Findings

This study rationalizes the importance of the identification of personal information for adequate protection and effective management. It identifies five perspectives on personal information protection and management, namely, law, economics, sociology, information technology and information resources management for their applications at the organizational level. Five types of personal information are identified in the study for protection and management, namely, identifiable personal information, personal identity information, personal moral right information, personal civil right and interest information and personal business and transaction information. An integrated approach consisting of risk control, security control and users control is proposed for personal information protection and management in the provision of networked services in China. The study shows that not enough attention has been paid to the personal information protection and management from multi-disciplinary perspectives with respect to their multi-dimensional applications, multi-directional controls and multi-contextual analysis in the literature. There is a lack of understanding of what, why and how personal information is protected and managed in real-world practices in China.

Practical implications

The investigation of the issues of personal information protection and management with respect to the relevant laws, polices, standards, networked services and organizations can lead to a better understanding of what, why and how personal information is protected and managed in real-world practices in China. The development of a comprehensive concept map for personal information protection and management can be used as an effective guideline for the formulation and implementation of appropriate strategies and policies in individual organizations for providing their stakeholders with quality-networked services in today’s highly connected network environment in China.

Originality/value

The paper is the first step of a comprehensive study on the protection and management of personal information for the provision of networked services in China. It provides a solid foundation for further research with respect to the personal information protection and management. It is the first of this kind of studies to answer the questions of what types of personal information needed to be protected, why and how they should be protected in conformity with laws, regulations, polices, standards and the needs of networked services and business activities of organizations.

Details

The Electronic Library, vol. 33 no. 6
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 1 January 1997

Dennis Y. Chung

This study examines whether corporate earnings announcements affect investors' beliefs about future earnings using a sample of companies in the People's Republic of China

Abstract

This study examines whether corporate earnings announcements affect investors' beliefs about future earnings using a sample of companies in the People's Republic of China. Revisions in financial analysts' consensus forecasts are used as a proxy for the change in the aggregate belief of investors in the market. Changes in the analysts' forecasts dispersion are used to measure the degree of convergence or divergence of the market's belief after the earnings announcements. Results show that both forecast revisions and changes in forecast dispersion are significantly and positively associated with the unexpected element in the earnings announcements. The results indicate that accounting earnings of Chinese companies contain information useful to the market and that the information is reflected in the analysts' subsequent forecasts of the companies' future earnings. The findings are also consistent with results from recent analytical studies, such as Kim and Verrecchia (1994), Barry and Jennings (1992) and Morse, Stephan and Stice (1991), that information disclosure may increase (rather than reduce) the disagreement among investors.

Details

Asian Review of Accounting, vol. 5 no. 1
Type: Research Article
ISSN: 1321-7348

Article
Publication date: 13 November 2007

Jian Tang, Xiang Cui, Lei Qi, Tiebing Lu, Lin Li, Puxuan Zhu, Guang Yang and Weizhen Zhang

The purpose of this paper is to present a method to calculate the transient induced voltages along the underground pipelines and analyze the transient interference generated in…

Abstract

Purpose

The purpose of this paper is to present a method to calculate the transient induced voltages along the underground pipelines and analyze the transient interference generated in the pipelines due to the inductive coupling in the fault‐to‐ground condition of power lines in close proximity.

Design/methodology/approach

Based on finite difference‐time domain method, an improved method is proposed to calculate transient inductive interference in underground metallic pipelines due to a fault in nearby power lines. The frequency‐dependent problem in the analysis of transient interference is solved in phase domain. Compared with the traditional method, the disposal of phase‐modal transformation matrices’ frequency‐dependent characteristic is avoided and the calculation is simplified by using vector fitting approach and recursive algorithm greatly in the proposed method.

Findings

A novel improved method is proposed to calculate transient induced voltage distribution along underground metallic pipelines due to a fault in nearby power lines. Results show that the peak value of transient induced voltage at the most critical point is about 1.15 times of the magnitude in the steady state without the fault removed and the analysis of transient inductive interference is necessary in the fault‐to‐ground case of power lines.

Practical implications

In order to mitigate the interference from power lines to nearby pipelines, pipelines should be good grounded and positioned as far away from the power line as possible. In high soil resistivity areas, the common corridor should be avoided.

Originality/value

The paper presents a method to calculate the transient induced voltages along the underground pipelines and analyze the transient interference generated in the pipelines due to the inductive coupling in the fault‐to‐ground condition of nearby power lines. The proposed method is general and can also be applied to other transient interference studies such as crosstalk problems of communication networks and interference between power lines and aboveground pipelines or communication cables. Effects of various parameters upon the inductive interference generated in underground pipelines due to a fault in nearby power lines are analyzed to be a guide for controlling the inductive interference.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 26 no. 5
Type: Research Article
ISSN: 0332-1649

Keywords

Abstract

Details

Globalization, Political Economy, Business and Society in Pandemic Times
Type: Book
ISBN: 978-1-80071-792-3

Article
Publication date: 13 March 2020

Lianlian Liu

The issue of concurrent jurisdiction over cross-border crimes has become common in a globalizing world, while the rigid compliance with territoriality and active personality…

Abstract

Purpose

The issue of concurrent jurisdiction over cross-border crimes has become common in a globalizing world, while the rigid compliance with territoriality and active personality jurisdiction has created a legal vacuum for cross-border crimes in many situations. The jurisdiction dispute between mainland China and Taiwan over cross-border telecom fraud crimes is a good example. In recent years, the Ministry of Public Security of the People’s Republic of China cracked down a series of cross-border telecom fraud crimes against mainland residents and extradited suspects to mainland China. Given a certain proportion of Taiwan residents in criminal gangs, the Taiwan side raised jurisdiction objections, arguing that mainland China had no right to exercise jurisdiction over Taiwanese criminals. The essence of the jurisdiction dispute between two sides is the concurrence of Taiwan’s right to exercise active personality jurisdiction and the mainland’s right to exercise passive personality jurisdiction. The purpose of this paper is to analyze the connotation of different jurisdiction principles (namely, territorial, active personality, protective and passive personality jurisdiction) and reinterpret their prioritization of applicability from a jurisprudential perspective, and thus, enhance the theoretical basis for resolving the issue of concurrent jurisdiction over cross-border crimes.

Design/methodology/approach

By reviewing the historical trajectory of major jurisdiction principles since the 1920s, and studying the specificities of the case in this context, this paper argues that territorial jurisdiction and active personality jurisdiction have presumed priority but not an absolute priority for resolving the issue of concurrent jurisdiction. The applicability of protective and passive personality jurisdiction could precede the former provided the jurisdictions of territoriality or active personality are inadequate, incompetent or lack of motivation to combat crimes, which harm other jurisdictions.

Findings

The developmental trajectory and contemporary connotation of major jurisdiction principles suggests that the legitimacy of the mainland’s exercise of passive personality jurisdiction over Taiwan criminal suspects lies in the urgent need to recover mainland victims’ significant property loss, the incompetence of Taiwan in detecting and prosecuting telecom fraud crimes committed by Taiwanese residents and targeting mainland victims and that the mainland has guaranteed the Taiwan side’s right to be timely informed and fully participate in its exercise of criminal jurisdiction over crimes involving Taiwan suspects.

Originality/value

Current literature on jurisdiction doctrines mainly uses a historical or descriptive approach to reveal the attitudes of different countries toward jurisdiction principles, which helps little in resolving the issue of concurrent jurisdiction over cross-border crimes in an era of globalization. This paper uses an interpretative approach, reinterprets the contemporary connotation of different jurisdiction principles and redefines the criteria for determining their prioritization in the context of the specificities of a case. It is expected to update the academic literature for resolving concurrent jurisdiction, fill the legal vacuum for combating cross-border crimes created by rigid compliance with territorial jurisdiction, and meanwhile relieve concerns about abuse of extraterritorial jurisdiction as it provides concrete standards for weighting the applicability of jurisdiction principles.

Article
Publication date: 1 March 2013

Jianbin Gao, Qi Xia, Jianping Li and Mao Ye

The purpose of this paper is to present a symmetrical method to extract smooth signal from linear mixtures in the frequency domain; with experimentations, the method is thereafter…

Abstract

Purpose

The purpose of this paper is to present a symmetrical method to extract smooth signal from linear mixtures in the frequency domain; with experimentations, the method is thereafter evaluated.

Design/methodology/approach

The Second‐order Frequency Identification (SOFI) algorithm has been presented to retrieve baseband signals which have inactive bands and different bandwidths in the frequency domain. However, the SOFI method will bring about accumulative error, therefore an improved method is proposed in this paper by using symmetric extraction mode. In contrast to the SOFI algorithm, the ISOFI method can extract simultaneously the signal with the highest degree of smoothness and the signal with the lowest degree of smoothness. This means that the signals are not extracted one by one; instead, they are extracted in parallel. Experimental results in both noise‐free and noisy scenarios verified that the proposed method has a significant improvement compared with the SOFI algorithm.

Findings

An improved SOFI (ISOFI) method is proposed to reduce the accumulated error encountered in the SOFI algorithm. In the proposed method, the symmetric mode is utilized to extract in parallel the signals with different smooth degrees. Experimental results demonstrated that the ISOFI has a higher accuracy and lower accumulated error compared to the original algorithm.

Originality/value

The paper demonstrates use of the symmetric extraction mode to overcome the disadvantage of accumulated errors existing in the SOFI algorithm.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 32 no. 2
Type: Research Article
ISSN: 0332-1649

Keywords

21 – 30 of over 10000