Disengagement and Integration, 1964-1974: A Transaction Analysis

2021 ◽  
pp. 169-233
Author(s):  
Douglas G. Anglin ◽  
Timothy M. Shaw
Keyword(s):  
Jurnal Akta ◽  
2019 ◽  
Vol 6 (2) ◽  
pp. 321
Author(s):  
Gerin Prayoga ◽  
Jawade Hafidz

Abstract. The purpose of this study was to: 1) To Know and analyze the application of the principle of notary prudence In Knowing the applicant. 2) To Detect and Analyze Effects Of Authentic And Notary Deed Not Applying the Precautionary Principle  In Knowing the applicant. The data used in this study are primary data, secondary data and data that can support tertiary study, which was then analyzed by the method of description and interpretation.Based on the results of data analysis concluded that: 1) The principle of recognizing User Services as referred to in paragraph (1) at least includes identification of User Services, User Verification Transaction Monitoring Services and User Services. Reporting to the Financial Transaction Analysis and Reporting Center (PPATK) is recommended if it is believed their suspicions of money laundering schemes will be carried out, the registration obligation remains to be done, the registration once for serving. Reporting through the application system GRIPS (Gatahering Report Information Processing System). 2) an authentic deed which turned out later proven to be pecucian money, then it becomes the responsibility of the applicant own. Notaries who do not register GRIPS, will apply sanctions in the form of the temporary closure of access to AHU account on line, and thus access to the system notary Legal Administration (SABH) will be automatically blocked.Keywords: Notary; Precautionary Principle; Protection.


2011 ◽  
pp. 487-498
Author(s):  
Liu Wenyin ◽  
An Liu ◽  
Qing Li ◽  
Liusheng Huang

A new business—insurance on business Web services—is proposed. As more and more Web services will be developed to fulfill the ever increasing needs of e-Business, the e-marketplace for Web services will soon be established. However, the qualities of these business Web services are unknown without real experiences and users can hardly make decisions on service selection. We propose that insurance can help build trust in the market of Web services. In this chapter, we propose three insurance models for business Web services and enabling technologies, including quality description, reputation scheme, transaction analysis, etc. We believe that the insurance of business Web services will help service competition and hence boost the development of more and more business Web services, and the software industry at large.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Annette Metz ◽  
Christiane Prange

Purpose With the increasing dependence on the Chinese market, Chinese subsidiary managers rather than Western managers in the headquarters take responsibility for the overall success of the multinational company (MNC). This paper aims to argue that Chinese managers need to actively interfere to guarantee the survival of the MNC. Transaction analysis is suggested as a tool to rebalance the relationship. Design/methodology/approach Based on illustrative material and experience cases, the authors highlight why and how Chinese subsidiary managers have to engage in interference management. Findings Introducing different strategies within transaction analysis shows how Western managers can deal with Chinese interference management to improve relationships. Practical implications With the use of transaction analysis, Western managers can verify their communication strategies and behavior to better relate to Chinese subsidiaries on an “adult” level. Originality/value Interference management is based on counterintuitive thought that Chinese subsidiary managers rather than headquarters become responsible for the overall success of the MNC. Transaction analysis is used to uncover hidden assumptions, communication strategies and behavior in headquarters–subsidiary relationships.


Author(s):  
Min-Young Choi ◽  
June-Kyoung Lee ◽  
Kyoung-Hak Lee

1997 ◽  
Vol 12 (3) ◽  
pp. 1340-1347 ◽  
Author(s):  
R.W. Ferrero ◽  
S.M. Shahidehpour ◽  
V.C. Ramesh

Sign in / Sign up

Export Citation Format

Share Document