237,887 research outputs found

    The human rights commission of Ethiopia and issues of forced evictions: a case-oriented study of its practice

    Get PDF
    In addition to the past endeavour to meet the MDGs, the Ethiopian government launched an ambitious program, ‘Growth and Transformative Plan (2011-2015)’ in 2011 to transform the country’s economic growth and development. As core part of the Plan, the economic and infrastructure sections envisage massive investment and infrastructure development. While the ultimate target is to improve socio-economic conditions and fulfil basis needs, the Plan will likely heighten massive eviction of people from their ancestral lands and thousands from their houses, and deprive many more of the traditional means of livelihood. In both the past as well as the present development endeavour, little attention has been given to a human rights-approach to development. The discourse on economic growth and development tends to focus more on mere economic improvement, implying needs-based approach. This will reinforce the notion that the fulfilment of economic, social and cultural rights is an aspiration realized by government program, with no obligation on the part of the government. One of the core functions of national human rights institutions (NHRIs) is to investigate complaints. The Human Rights Commission of Ethiopia (Commission) has been receiving complaints on wide range of issues since it started rendering its quasi-judicial functions. Among them, many complaints relating to forced have been brought to its attention. The Commission has rejected the bulk of the complaints or referred them to either courts of law or and the Ombudsman Institute on the ground they do not involve human rights issues (i.e. they are mere administrative matters that do not qualify for its inquiry). By the same token, investigation of complaints on forced eviction is an exception rather than the norm. Disclaiming jurisdiction might shed light on the underlining issues-it might mark fear on the part of the Commission not to confront the economic and development policies of the government; or adoption of pre-conceived approach to issues of economic, social and cultural rights, or erroneous interpretation of its mandate or incapacity to deal with such issues. This paper will deal with the Commission’s handling of complaints pertaining to the right to housing in general and forced eviction in particular. Some of interesting complaints handled by the Commission will be reviewed to see the underlining reasons hampering the Commission from examining the essence of specific cases. Some measures to be adopted so that the Commission could probe complaints of all sorts and of forced evictions in particular are hinted

    Programming with Algebraic Effects and Handlers

    Full text link
    Eff is a programming language based on the algebraic approach to computational effects, in which effects are viewed as algebraic operations and effect handlers as homomorphisms from free algebras. Eff supports first-class effects and handlers through which we may easily define new computational effects, seamlessly combine existing ones, and handle them in novel ways. We give a denotational semantics of eff and discuss a prototype implementation based on it. Through examples we demonstrate how the standard effects are treated in eff, and how eff supports programming techniques that use various forms of delimited continuations, such as backtracking, breadth-first search, selection functionals, cooperative multi-threading, and others

    RAFDA: A Policy-Aware Middleware Supporting the Flexible Separation of Application Logic from Distribution

    Get PDF
    Middleware technologies often limit the way in which object classes may be used in distributed applications due to the fixed distribution policies that they impose. These policies permeate applications developed using existing middleware systems and force an unnatural encoding of application level semantics. For example, the application programmer has no direct control over inter-address-space parameter passing semantics. Semantics are fixed by the distribution topology of the application, which is dictated early in the design cycle. This creates applications that are brittle with respect to changes in distribution. This paper explores technology that provides control over the extent to which inter-address-space communication is exposed to programmers, in order to aid the creation, maintenance and evolution of distributed applications. The described system permits arbitrary objects in an application to be dynamically exposed for remote access, allowing applications to be written without concern for distribution. Programmers can conceal or expose the distributed nature of applications as required, permitting object placement and distribution boundaries to be decided late in the design cycle and even dynamically. Inter-address-space parameter passing semantics may also be decided independently of object implementation and at varying times in the design cycle, again possibly as late as run-time. Furthermore, transmission policy may be defined on a per-class, per-method or per-parameter basis, maximizing plasticity. This flexibility is of utility in the development of new distributed applications, and the creation of management and monitoring infrastructures for existing applications.Comment: Submitted to EuroSys 200

    Instrumenting self-modifying code

    Full text link
    Adding small code snippets at key points to existing code fragments is called instrumentation. It is an established technique to debug certain otherwise hard to solve faults, such as memory management issues and data races. Dynamic instrumentation can already be used to analyse code which is loaded or even generated at run time.With the advent of environments such as the Java Virtual Machine with optimizing Just-In-Time compilers, a new obstacle arises: self-modifying code. In order to instrument this kind of code correctly, one must be able to detect modifications and adapt the instrumentation code accordingly, preferably without incurring a high penalty speedwise. In this paper we propose an innovative technique that uses the hardware page protection mechanism of modern processors to detect such modifications. We also show how an instrumentor can adapt the instrumented version depending on the kind of modificiations as well as an experimental evaluation of said techniques.Comment: In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth International Workshop on Automated Debugging (AADEBUG 2003), September 2003, Ghent. cs.SE/030902

    Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption

    Full text link
    Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the average end user. Today, the average end user often struggles with understanding and using security mecha-nisms. Other security mechanisms are simply annoying for end users. As the overall security of any system is only as strong as the weakest link in this system, bad usability of IT security mechanisms may result in operating errors, resulting in inse-cure systems. Buying decisions of end users may be affected by the usability of security mechanisms. Hence, software provid-ers may decide to better have no security mechanism then one with a bad usability. Usability of IT security mechanisms is one of the most underestimated properties of applications and sys-tems. Even IT security itself is often only an afterthought. Hence, usability of security mechanisms is often the after-thought of an afterthought. This paper presents some guide-lines that should help software developers to improve end user usability of security-related mechanisms, and analyzes com-mon applications based on these guidelines. Based on these guidelines, the usability of email encryption is analyzed and an email encryption solution with increased usability is presented. The approach is based on an automated key and trust man-agement. The compliance of the proposed email encryption solution with the presented guidelines for usable security mechanisms is evaluated

    Tracking Chart 2003 Riddell, China 230015112B

    Get PDF
    This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.FLA_2003_Riddell_TC_China_230015112B.pdf: 7 downloads, before Oct. 1, 2020

    Applying the theory of discursive analysis to governance of forced migration

    Get PDF
    corecore