34,177 research outputs found
Peer Harassment: A Weapon in the Struggle for Popularity and Normative Hegemony in American Secondary Schools
This paper addresses two of secondary educationâs most serious problemsâpeer abuse of weaker socially unskilled students and a peer culture that in most schools discourages many students from trying to be all that they can be academically. We have documented the two problems by reviewing ethnographies of secondary schools, by interviewing students in eight suburban high schools and by analyzing data from questionnaires completed by nearly 100,000 students at Educational Excellence Alliance schools. Grounded in these observations, we built a simple mathematical model of peer harassment and popularity and of the pressures for conformity that are created by the struggle for popularity and then tested it in data from the Educational Excellence Alliance.
Students entering middle school learn its norms by trying to copy the traits and behaviors of students who are respected and by avoiding contact with those who are frequently harassed. Peer norms are enforced by encouraging âwannabes,â aspirants for admission to popular crowds, to harass those who visibly violate them. Consequently, one can infer the norms by noting who gets harassed and who doesnât. Traits that in EEA data led to higher risks of being bullied and harassed were: being in a special education, being in gifted programs, taking accelerated courses in middle school, tutoring other students, enjoying school assignments, taking a theatre course, not liking rap-hip hop music and liking instead musicals, heavy metal, country, or classical music. The relationship between harassment and academic effort was curvilinear; both the nerds and the slackers were harassed. To some degree these norms are, as Kenneth Arrow suggests, trying to internalize externalities. But why are music preferences such good predictors of harassment? Why are the student tutors victimized? We propose that norms also have a âWeâre cool, Honor usâ function of legitimating the high status that the leading crowds claim for themselves. As a result the traits and interests that members of leading crowds have in common tend to become normative for everyone. The norms that prevailed were: âSpend your time socializing, do not âstudy too hard.â Value classmates for their athletic prowess and their attractiveness, not their interest in history or their accomplishments in science.
An Economic Theory of Academic Engagement Norms: The Struggle for Popularity and Normative Hegemony in Secondary Schools
[Excerpt] Why and how do groups create norms? Kenneth Arrow proposed that ânorms of social behavior, including ethical and moral codes, âŠ.are reactions of society to compensate for market failureâ. This internalize the real externalities explanation for norms is also standard among rational choice theorists in sociology. The situation becomes more complex when we recognize some actions create positive externalities for some individuals and negative externalities for others. Often this results in no norm being established. However, sometimes one segment of a social system has normative hegemony and enforces norms that enhance their power and prestige at the expense of other groups. Norms regarding caste in India, for example, were functional for Brahmins but humiliating for Harijans. Caste and status norms of this type will also be referred to as âHonor us; Not themâ norms. Such norms arise when one group is much more powerful (has greater ability to enforce their preferred social norm) than other groups and it imposes its will on others. An additional requirement is that the people who oppose the norm established by the dominant group must be unable or unwilling to leave the social system in which the norm operates
A Framework for Analyzing Attorney Liability Under Section 10(b) and Rule 10b-5
[Excerpt] âLawyers who make their living representing securities issuers face a myriad of challenges. Securities lawyers must navigate and master an intricate body of statutory, regulatory, and case law at both the state and the federal level and ensure that their clients comply with the law. The compliance requirement, however, is not limited to the issuer clients. Defrauded investors will often seek recovery of their losses from both the issuer of the failed investment securities and from the lawyers who represent the issuer, which only exacerbates the complexity of the securities lawyerâs work. These securities fraud actions against lawyers raise serious questions about the proper scope of liability under the federal securities laws. Just as lawyers strive for clarity, consistency, and predictability in advising their clients on securities compliance issues, lawyers seek the same level of precision regarding their own compliance.
âŠ
The Court has never directly addressed the issue of attorney liability under section 10(b) of the 34 Act and Rule 10b-5. However, the Courtâs recent pronouncements on primary liability of secondary actors under Rule 10b-5 indicate that the standard for such liability is increasingly becoming one that attorneys acting in the traditional role of adviser and draftsperson to securities issuers will not satisfy. This development does not give lawyers unbridled freedom or authority to commit securities fraud without fear of sanction, nor does it undermine the 34 Actâs purpose of insuring fairness and honesty in the securities markets. On the contrary, protecting lawyers who lend their expertise to the issuers and sellers of securities is consistent with insuring such fairness and honesty. Moreover, existing rules and standards governing attorney conduct and the concomitant penalties for violation of those rules provide the appropriate level of regulation for lawyers, and this article does not suggest otherwise. The article argues only that section 10(b) and Rule 10b-5 are inappropriate and, in most cases, inapposite means of redressing attorney misconduct in connection with a fraudulent securities transaction.
Part II of this article will provide some background on section 10(b) and Rule 10b-5 and will discuss how section 10(b) and Rule 10b-5 have been applied in the area of liability of outside service providers such as lawyers and other secondary actors. In addition, part II will review the most recent developments of the law in this area and discuss how these developments provide an increased level of protection for securities lawyers. Part III of this article will examine how other areas of federal and state law have addressed the issue of attorney liability and suggest that the concepts can be applied to the section 10(b) and Rule 10b-5 analysis. Part IV will briefly discuss the role of the securities lawyer and the influence of the market for legal services on the manner in which these lawyers sell their services to potential clients. The article will then argue that the potential liability of any person under section 10(b) and Rule 10b-5 must be defined in terms of conduct and not in terms of the personâs role in the particular transaction giving rise to the claim. That framework will permit the securities lawyer to more effectively fulfill his or her role because the standard for attorney liability in a private action under section 10(b) and Rule 10b-5 will be clearer.
Analyzing the security of an existing computer system
Most work concerning secure computer systems has dealt with the design, verification, and implementation of provably secure computer systems, or has explored ways of making existing computer systems more secure. The problem of locating security holes in existing systems has received considerably less attention; methods generally rely on thought experiments as a critical step in the procedure. The difficulty is that such experiments require that a large amount of information be available in a format that makes correlating the details of various programs straightforward. This paper describes a method of providing such a basis for the thought experiment by writing a special manual for parts of the operating system, system programs, and library subroutines
Proceedings of the Workshop on Government Oil Spill Modeling
Oil spill model users and modelers were brought together for the purpose of fostering joint communication and increasing understanding of mutual problems. The workshop concentrated on defining user needs, presentations on ongoing modeling programs, and discussions of supporting research for these modeling efforts. Specific user recommendations include the development of an oil spill model user library which identifies and describes available models. The development of models for the long-term fate and effect of spilled oil was examined
POTENTIAL IMPLICATIONS OF FREER TRADE FOR THE UNITED STATES AND CANADIAN DAIRY SECTORS: A SPATIAL ANALYSIS
International Relations/Trade,
Recommended from our members
Chris Cannings: A Life in Games
Chris Cannings was one of the pioneers of evolutionary game theory. His early work was inspired by the formulations of John Maynard Smith, Geoff Parker and Geoff Price; Chris recognized the need for a strong mathematical foundation both to validate stated results and to give a basis for extensions of the models. He was responsible for fundamental results on matrix games, as well as much of the theory of the important war of attrition game, patterns of evolutionarily stable strategies, multiplayer games and games on networks. In this paper we describe his work, key insights and their influence on research by others in this increasingly important field. Chris made substantial contributions to other areas such as population genetics and segregation analysis, but it was to games that he always returned. This review is written by three of his students from different stages of his career
- âŠ