Time filter

Source Type

News Article | November 29, 2016
Site: www.marketwired.com

MONTRÉAL, QUÉBEC--(Marketwired - Nov. 29, 2016) - Critical Elements Corporation (the "Corporation" or "Critical Elements") (TSX VENTURE:CRE) (OTCQX:CRECF) (FRANKFURT:F12) is pleased to announce the appointment of Dr. Steffen Haber as its president. Dr. Haber is well known in the lithium industry, having been Chief Executive Officer and President of Rockwood Lithium up until it was acquired by Albermale for $6.2 billion in January 2015. Dr. Haber was President and Chief Executive Officer of Rockwood Lithium GmbH when Chemetall GmbH was legally split off in 2012. From 2011 to 2012, he was Managing Director of Chemetall GmbH and since 2007 President of Chemetall's Lithium business. Prior to joining Chemetall GmbH, Dr. Haber worked in different executive positions for Sanofi-Aventis SA and its predecessor companies, in France. Dr. Haber completed his doctorate in organic chemistry at the University of Kaiserslautern, Germany, in 1991 and added one year as a Post-Doc at Ecole Polytechnique in Paris. In 1997, Dr. Haber earned his Bachelor of Science in Management from the International School of Management in San Diego, in the United States. Dr. Haber is a fellow of the International Directors Program of INSEAD. "The Board of Directors and team at Critical Elements Corporation are delighted to welcome Dr. Steffen Haber as President," said Jean-Sébastien Lavallée, Chief Executive Officer of the Corporation. "The addition of a member with extensive lithium experience and an exceptional background in the industry will provide the team with important knowledge support. Dr. Haber's solid experience and success in leading and developing the largest lithium company as president of Rockwood Lithium will be very valuable assets in the next phase of our Corporation's development." "I'm very enthusiastic in joining the very talented and dynamic team of Critical Elements, the thrive lithium market is in great need of new sources of supply and it will be our focus for success with the development of the Rose Lithium Tantalum Project", said Steffen Haber new President of Critical Elements starting January 1, 2017. Critical Elements is also pleased to announce the appointment of Jean-Sébastien Lavallée as Chairman of the Corporation's Board of Directors. The Corporation would also like to take the opportunity to announce that it has increased the number of shares reserved for issuance under its stock option plan (the "Plan") by 2,448,154. The total number of shares issuable under the Plan now stands at 14,444,591. The increase is subject to the approval of the TSX Venture Exchange. The Corporation is also announcing that it had granted options to its employees, directors and officers to acquire a total of 4,250,000 common shares. Each option entitles its holder to subscribe for one share of the Corporation at a price of $0.56 for a period of five years. The Corporation has also granted 150,000 common shares to consultants at a price of $0.56 per share. Options granted to consultants are valid for five years or under the terms of the Plan. A recent financial analysis (Technical Report and Preliminary Economic Assessment (PEA) on the Rose lithium-tantalum Project, Genivar, December 2011) of the Rose project, 100% owned by Critical Elements, based on price forecasts of US $260/kg ($118/lb) for Ta O contained in a tantalite concentrate and US $6,000/t for lithium carbonate (Li CO ) showed an estimated after-tax Internal Rate of Return (IRR) of 25% for the Rose project, with an estimated Net Present Value (NPV) of CA $279 million at an 8% discount rate. The payback period is estimated at 4.1 years. The pre-tax IRR is estimated at 33% and the NPV at $488 million at a discount rate of 8%. (Mineral resources are not mineral reserves and do not have demonstrated economic viability). (The preliminary economic assessment is preliminary in nature). (See press release dated November 21, 2011.) The conclusions of the PEA indicate the operation would support a production rate of 26,606 tons of high purity (99.9% battery grade) Li CO and 206,670 pounds of Ta O per year over a 17-year mine life. The project hosts a current Indicated resource of 26.5 million tonnes of 1.30% Li O Eq. or 0.98% Li O and 163 ppm Ta O and an Inferred resource of 10.7 million tonnes of 1.14% Li O Eq. or 0.86% Li O and 145 ppm Ta O . Neither the TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.


Zhu X.,West Chester University | Mukhopadhyay S.K.,Sungkyunkwan University | Kurata H.,International School of Management
Journal of Engineering and Technology Management - JET-M | Year: 2012

Radio frequency identification (RFID) is an emerging technology that is increasingly being used in supply chain management. RFID technology plays an important role in supporting logistics and supply chain processes because of their ability to identify, trace and track information throughout the supply chain. The technology can provide suppliers, manufacturers, distributors and retailers precise real time information about the products. This accurate knowledge of the inventory would result in lower labor cost, simplified business processes and improved supply chain efficiency. If properly used, it has the potential to cut ordering lead time and cost on inventory control, increase the accuracy of inventory information, help avoid stockouts and boost the number of inventory turns. In this paper, we provide an overview of the current state of RFID applications in different industries and its impact on business operations. We provide extensive literature survey and develop a framework for future research areas in this field. © 2011 Elsevier B.V. All rights reserved.


Wang H.,Bill and Melinda Gates Foundation | Zhang L.,International School of Management | Yip W.,University of Oxford | Hsiao W.,Harvard University
Health Affairs | Year: 2011

Inefficiency and low quality of health services are common in many developing countries. To mitigate these problems, we conducted an experiment in rural China in which we changed the existing fee-forservice method of paying village doctors to a mixed payment method that included a salary plus a bonus based on performance. The new payment method also removed a feature that previously allowed doctors to purchase medications to prescribe to patients and earn a markup on each prescription. Changing these payment incentives reduced spending at the village level, curbed unnecessary care for healthier patients, and also decreased the prescribing of unnecessary drugs. However, other features of the arrangement encouraged doctors to refer sicker patients to township and county facilities, where costs were higher. As a result, total health care spending was not significantly reduced. The findings underscore that policy makers should design payment methods carefully to both contain costs and improve quality. ©2011 Project HOPE-The People-to-People Health Foundation, Inc.


Kwon O.,International School of Management | Wen Y.,International School of Management
Computers in Human Behavior | Year: 2010

Social network services are emerging as a promising IT-based business, with some services already being provided commercially such as Facebook, Cyworld and Xiaonei. However, it is not yet clear which potential audience groups will be key social network service participants. Moreover, the process showing how an individual actually decides to start using a social network service may be somewhat different from current web-based community services. Hence, the aims of this paper are twofold. First, we empirically examine how individual characteristics affect actual user acceptance of social network services. To examine these individual characteristics, we apply a Technology Acceptance Model (TAM) to construct an amended model that focuses on three individual differences: social identity, altruism and telepresence, and one perceived construct: the perceived encouragement, imported from psychology-based research. Next, we examine if the users' perception to see a target social network service as human relationship-oriented service or as a task-oriented service could be a moderator between perceived constructs and actual use. As a result, we discover that the perceived encouragement and perceived orientation are significant constructs that affect actual use of social network services. © 2009.


Pink S.,RMIT University | Servon L.J.,International School of Management
Environment and Planning A | Year: 2013

This paper explores, through the example of the Slow City (Cittaslow) movement, how an analytical focus on the experiential dimensions of urban experience adds new layers of knowledge to our understandings of how and why town leaders engage with urban frameworks and principles. The global growth of the Italian-based Cittaslow movement has been explained both as part of a deceleration narrative and as a transferable urban development framework. We show how an approach that takes the experiential as its analytical starting point offers an alternative interpretation of the movement's contemporary growing global membership. Cittaslow aims to ensure quality of life in its towns and seeks to create an environmentally sustainable and pleasurable future. Drawing on research in Spanish Cittaslow towns, we examine the terms upon which town leaders engage with the movement's ideas and framework. We propose that Cittaslow is appealing to town leaders because it enables them not only to identify the qualities of their towns against its membership criteria, but also to invest in its framework normally unspoken, embodied, sensory, and tacit dimensions of their towns. A focus on the experiential, we suggest, is key to understanding the movement's appeal to town leaders across diverse cultural and national contexts. © 2013 Pion and its Licensors.


Tiwari S.,International School of Management
Worldwide Hospitality and Tourism Themes | Year: 2015

Purpose – The purpose of this paper is to investigate the role of culture in economic growth in areas where the Shilpgram fair is facilitated in Rajasthan. Design/methodology/approach – The data are acquired through primary and secondary data with individual meetings, interviews and questionnaires. Findings – The study uncovered that the Shilpgram fair is expanding mindfulness and financial development of rural life and crafts particularly for younger people. Originality/value – This study presents recognition of the financial effects of tourism on neighbouring group association in tourism development. ©Emerald Group Publishing Limited


Cheung R.,Oberlin College | Meltzer R.,International School of Management
Journal of Regional Science | Year: 2013

Residents pay into Homeowners Associations (HOAs) to exert greater control over service provision, their properties and those of their neighbors. HOAs enforce restrictions governing land use within their boundaries, but theory is ambiguous about their impact on public land use. By combining two novel data sets on Florida HOAs and municipal regulations, we examine how HOAs affect public land use regimes for 232 cities. We find that the prevalence of HOAs is positively associated with a propensity for regulation, as are newer and bigger HOAs. Also, HOAs are positively associated with land use techniques that direct development through incentives, rather than mandates. © 2012, Wiley Periodicals, Inc.


Bai G.,Lee University | Anderson G.F.,International School of Management
Health Affairs | Year: 2015

Using Medicare cost reports, we examined the fifty US hospitals with the highest charge-to-cost ratios in 2012. These hospitals have markups (ratios of charges over Medicare-allowable costs) approximately ten times their Medicare-allowable costs compared to a national average of 3.4 and a mode of 2.4. Analysis of the fifty hospitals showed that forty-nine are for profit (98 percent), forty-six are owned by for-profit hospital systems (92 percent), and twenty (40 percent) operate in Florida. One for-profit hospital system owns half of these fifty hospitals. While most public and private health insurers do not use hospital charges to set their payment rates, uninsured patients are commonly asked to pay the full charges, and out-of-network patients and casualty and workers' compensation insurers are often expected to pay a large portion of the full charges. Because it is difficult for patients to compare prices, market forces fail to constrain hospital charges. Federal and state governments may want to consider limitations on the chargeto cost ratio, some form of all-payer rate setting, or mandated price disclosure to regulate hospital markups. © 2015 Project HOPE - The People-to-People Health Foundation, Inc.


News Article | December 14, 2016
Site: phys.org

Bring your own device (BYOD) to work is common practice these days. Almost everyone has a smart or a tablet and in many office and other jobs, using the device makes workers more effective and more efficient in their work (games and personal social media aside, perhaps). A new study in the International Journal of Teaching and Case Studies suggests, however, that most company IT security managers would prefer employees not to BYOD. Khaled Zayed of the International School of Management in New York, USA and also Paris, France, reiterates the security and safety concerns that surround BYOD and has carried out a qualitative case study of information technology security managers to determine the industry perspective on BYOD. "IT is critical in our modern world for doing business and communicating with others," explains Zayed, "Businesses, governments, and individuals rely on internet-enabled technology to achieve this, using mobile devices, e-mails, and social media, and companies around the world conduct business using local and wide area networks and virtual private networks." The social networking servers, process virtualization, and cloud computing present both opportunities for rapid innovation as well as risks to proprietary information, trade secrets and intellectual property, especially when those workers with access to sensitive data use their own devices. There are security concerns for any networked data and system, viruses and other malware, phishing and hacking attacks, identity theft, data leaks, corporate espionage, denial of service attacks, and of course social engineering and confidence tricks. It has been said many times before that companies must establish strict policies to address the risks, as employees using IT at work and in particular in the context of BYOD are wholly unaware of the risks. If they are aware of the risks they are not necessarily aware of ways to mitigate those risks or how to address problems that arise if their or the company IT systems are compromised. More information: Zayed, K. (2016) 'Information security awareness: managing web, mobile and endpoint security; overcoming the challenges of bring your own device', Int. J. Teaching and Case Studies, Vol. 7, Nos. 3/4, pp.271-288.


News Article | December 14, 2016
Site: www.eurekalert.org

Bring your own device (BYOD) to work is common practice these days. Almost everyone has a smart or a tablet and in many office and other jobs, using the device makes workers more effective and more efficient in their work (games and personal social media aside, perhaps). A new study in the International Journal of Teaching and Case Studies suggests, however, that most company IT security managers would prefer employees not to BYOD. Khaled Zayed of the International School of Management in New York, USA and also Paris, France, reiterates the security and safety concerns that surround BYOD and has carried out a qualitative case study of information technology security managers to determine the industry perspective on BYOD. "IT is critical in our modern world for doing business and communicating with others," explains Zayed, "Businesses, governments, and individuals rely on internet-enabled technology to achieve this, using mobile devices, e-mails, and social media, and companies around the world conduct business using local and wide area networks and virtual private networks." The social networking servers, process virtualization, and cloud computing present both opportunities for rapid innovation as well as risks to proprietary information, trade secrets and intellectual property, especially when those workers with access to sensitive data use their own devices. There are security concerns for any networked data and system, viruses and other malware, phishing and hacking attacks, identity theft, data leaks, corporate espionage, denial of service attacks, and of course social engineering and confidence tricks. It has been said many times before that companies must establish strict policies to address the risks, as employees using IT at work and in particular in the context of BYOD are wholly unaware of the risks. If they are aware of the risks they are not necessarily aware of ways to mitigate those risks or how to address problems that arise if their or the company IT systems are compromised. Zayed, K. (2016) 'Information security awareness: managing web, mobile and endpoint security; overcoming the challenges of bring your own device', Int. J. Teaching and Case Studies, Vol. 7, Nos. 3/4, pp.271-288.

Loading International School of Management collaborators
Loading International School of Management collaborators