499 research outputs found
Democratising migration governance : temporary labour migration and the responsibility to represent
Defence date: 20 January 2020Examining Board: Professor Rainer Bauböck, European University Institute (Supervisor); Professor Richard Bellamy, European University Institute Professor; Iseult Honohan, University College Dublin; Professor Valeria Ottonelli, UniversitĂ degli Studi di GenovaThis thesis explores the possibility of democratic citizenship of temporary migrants. The main problem I investigate is the persistent and systemic vulnerability of temporary migrants to domination. I argue temporary migrantsâ vulnerability to domination stems primarily from the fact that responsibilities towards them and their political membership are divided between their country of residence and of origin. While their lives are conditioned by both countries, they are democratically isolated from both. Are they merely partial citizens detached from any democratic politics? If not, what responsibility should each country bear towards temporary migrants within and beyond their jurisdictions? Should our commitments to democracy lead us to endorse a radical conception of migrant citizenship through which migrants represent their interests and perspectives in-between their country of residence and origin? This thesis addresses these normative issues surrounding temporary labour migration. It develops a democratic theory applicable to this phenomenon, explores the moral and political basis of migrantsâ freedom, and explains how the current arrangements might be changed to produce a more democratically just outcome. Its main contribution lies in establishing a new account of democratic citizenship and responsibility that coherently accommodates the political agencies of temporary migrants. The thesis introduces, in particular, a new normative concept and political agenda â the Responsibility to Represent (R2R). Under a system of R2R, both sending and receiving countries bear a shared obligation to stage migrantsâ contestatory voices in their public policy-making process for creating a society where everyone is free from domination. In summary, I argue that temporary migration programmes are just and legitimate, if and only if both sending and receiving states (1) recognise temporary migrants as bearers of a distinct life plan deserving equal treatment and non-domination, (2) provide them with necessary protections and sufficient resources for carrying out their plans while accommodating their possible changes, and (3) institutionalise contestatory channels for them to (de)legitimise the current structure of responsibility in-between two states
Current and Future Challenges in Knowledge Representation and Reasoning
Knowledge Representation and Reasoning is a central, longstanding, and active
area of Artificial Intelligence. Over the years it has evolved significantly;
more recently it has been challenged and complemented by research in areas such
as machine learning and reasoning under uncertainty. In July 2022 a Dagstuhl
Perspectives workshop was held on Knowledge Representation and Reasoning. The
goal of the workshop was to describe the state of the art in the field,
including its relation with other areas, its shortcomings and strengths,
together with recommendations for future progress. We developed this manifesto
based on the presentations, panels, working groups, and discussions that took
place at the Dagstuhl Workshop. It is a declaration of our views on Knowledge
Representation: its origins, goals, milestones, and current foci; its relation
to other disciplines, especially to Artificial Intelligence; and on its
challenges, along with key priorities for the next decade
Transition 2.0: Re-establishing Constitutional Democracy in EU Member States
The central question of Transition 2.0 is this: what (and how) may a new government do to re-establish constitutional democracy, as well as repair membership within the European Union, without breaching the European rule of law? This volume demonstrates that EU law and international commitments impose constraints but also offer tools and assistance for facilitating the way back after rule of law and democratic backsliding. The various contributions explore the constitutional, legal, and social framework of 'Transition 2.0'.Dieser Band zeigt, dass das EU-Recht und die internationalen Verpflichtungen zwar ZwĂ€nge auferlegen, aber auch Instrumente und Hilfestellungen bieten, um den Weg zurĂŒck in die EuropĂ€ische Union nach Rechtsstaatlichkeitsdefiziten und demokratischen RĂŒckschritten zu erleichtern. Die verschiedenen BeitrĂ€ge untersuchen den verfassungsrechtlichen, rechtlichen und sozialen Rahmen des "Ăbergangs 2.0"
Demand Response in Smart Grids
The Special Issue âDemand Response in Smart Gridsâ includes 11 papers on a variety of topics. The success of this Special Issue demonstrates the relevance of demand response programs and events in the operation of power and energy systems at both the distribution level and at the wide power system level. This reprint addresses the design, implementation, and operation of demand response programs, with focus on methods and techniques to achieve an optimized operation as well as on the electricity consumer
The great moving countering violent extremism show: An ethnography of CVE in the Canadian context
My dissertation critically examines through ethnographic fieldwork the rise of countering violent extremism [CVE] programs in Canada. CVE is an offshoot of counter-terrorism, with programs first taking hold in the mid-2000s following âhomegrown terrorismâ incidents in Madrid and London. CVE is based on the premise that a âradicalization processâ precedes terrorism. This allows for security and civil society-based interventions in the âpre-crimeâ space to interrupt terrorism before it happens. The most thorough and controversial example of this is the UKâs Prevent strategy, which legally mandates human services professionals to refer individuals showing signs of âradicalizationâ. In Canada, no such duty exists, though its national strategy nonetheless aims to harness âall of societyâ toward preventing violent extremism, enlisting the cooperation of teachers, artists, psychologists, social workers along with actors in the private sector.
My study is not about how individuals turn to âviolent extremismâ or âradicalizationâ but rather about examining that edifices that have created to respond to these perceived problems The implications of CVE as an âall of societyâ endeavour are manifold, particularly as the scope of CVE expands beyond âIslamismâ toward preventing âall typesâ of violent extremism, most recently on right-wing groups and violence against racial, ethnic, and gender minorities. Broadly, my research attempts to conceive of the implications of this expansion. What drives CVEâs growth in the face of sustained criticism over its deleterious impacts on Muslim communities? How do practitioners in CVE align their interests with the cause? What social functions does CVE take on? Moreover, can boundaries even be drawn around what constitutes CVE?
My study draws on interviews with 46 CVE practitioners and participant observation over a three-year period (2018-2020) with CVE entities operating in Canada. My findings indicate how an absence of knowledge over how to conduct CVE propels its encroachment into ever more diverse areas of social life. The paradigm operationalizes âuncertaintyâ to enroll actors with diverse interests and foster partnerships with communities including those (racialized, Indigenous, LGBTQ) that have had fraught relationships with security institutions.
In Chapter 1 - Searching for the CVE space I discuss my immersion in CVE and the type of fieldwork activities conducted. I also attempt to define my research object, outlining how CVE comprises a field of practice, a paradigm, a moral-social imperative, and lastly a space. Chapters 2 and 3 historicize CVEâs contemporary presence and disturb common understandings of its origins. I critique the explanation of CVEâs rise as a necessary and spontaneous reaction to evolving security threats to understand it as an outcome of performative security knowledge, where new security threats are discursively created rather than responded to. Chapters 4 and 5 focus on my fieldwork experience, examining how actors âenrollâ in the CVE cause through the open-ended, speculative quality of its activities. A distinction emerged with Muslim-identifying CVE practitioners, whose motivations to represent their communities in often hostile institutions and reduce the harm of CVE practices were typified by the repeated phrase âif youâre not at the table, youâre on the menuâ. In the conclusion chapter I connect the varying threads of preceding analysis and what they portend for CVEâs effects on societies. This includes examining how CVEâs efforts to redirect political grievances toward âpro-socialâ ends potentially disempowers social justice movements, reinforcing state hegemony and existing power inequities
Analyzing the effects of data mining techniques on management decision making and information exchange in the industrial sector: the role of cooperation as a moderating factor in Saudi Arabia
This research explores the influence of data mining methods on the managerial decision-making in Saudi Arabia's industrial sector, emphasizing the moderating function of cooperation. A total of 500 questionnaires were distributed to information technology managers, with 265 responses selected for data analysis. Smart PLS 4 software was used for the data analysis, and statistical measures were used to analyze the correlations between variables. The findings show that data mining approaches have a substantial positive relationship with improving decision-making and information exchange within external and internal contexts. The study also demonstrates that cooperation plays an important moderating role in these interactions, emphasizing the significance of building a cooperative atmosphere to improve the influence of data mining methods on decision-making and information sharing. The study's conclusions have practical relevance for organizations in the industrial sector. Organizations may improve their decision-making processes and information sharing by adopting data mining tools and boosting collaboration, enhancing performance and competitiveness
Jornadas Nacionales de InvestigaciĂłn en Ciberseguridad: actas de las VIII Jornadas Nacionales de InvestigaciĂłn en ciberseguridad: Vigo, 21 a 23 de junio de 2023
Jornadas Nacionales de InvestigaciĂłn en Ciberseguridad (8ÂȘ. 2023. Vigo)atlanTTicAMTEGA: Axencia para a modernizaciĂłn tecnolĂłxica de GaliciaINCIBE: Instituto Nacional de Cibersegurida
Augmented Computational Design: Methodical Application of Artificial Intelligence in Generative Design
This chapter presents methodological reflections on the necessity and utility
of artificial intelligence in generative design. Specifically, the chapter
discusses how generative design processes can be augmented by AI to deliver in
terms of a few outcomes of interest or performance indicators while dealing
with hundreds or thousands of small decisions. The core of the
performance-based generative design paradigm is about making statistical or
simulation-driven associations between these choices and consequences for
mapping and navigating such a complex decision space. This chapter will discuss
promising directions in Artificial Intelligence for augmenting decision-making
processes in architectural design for mapping and navigating complex design
spaces.Comment: This is the author's version of the book chapter Augmented
Computational Design: Methodical Application of Artificial Intelligence in
Generative Design. In Artificial Intelligence in Performance-Driven Design:
Theories, Methods, and Tools Towards Sustainability, edited by Narjes
Abbasabadi and Mehdi Ashayeri. Wiley, 202
- âŠ