640 research outputs found
Social Capital and Governance in Areas of Limited Statehood
Im Gegensatz zu Hobbâschen Argumentationen ist die Bereitstellung von
Governance nicht notwendigerweise an starke Staatlichkeit gebunden: Empirische
Belege zeigen, dass verschiedene (nicht-staatliche) Akteure Governance-
Leistungen trotz zumindest begrenzter Staatlichkeit bereitstellen â entgegen
vieler Stimmen in zeitgenössischen Diskursen zu schwacher und gescheiterter
Staatlichkeit. Der Aufsatz geht der Frage nach, wie die FÀlle erklÀrt werden
können, wo Governance erfolgreich bereitgestellt wird obwohl der Staat
entweder keine Governance-Leistungen erbringt oder erbringen kann. Im Rahmen
des Transfers von Forschungsergebnissen der Politischen Soziologie in die
Analyse von âGovernance ohne Staatâ geht der Aufsatz von der Annahme aus, dass
Art und Weise wie Gesellschaften sich organisieren maĂgeblich von deren
sozialstruktureller Bedingtheit abhÀngen. Diese spezifiziert der Aufsatz
mithilfe des Sozialkapitaltheorie. Auf dem Weg zu einer Politischen Soziologie
der âGovernance ohne Staatâ, stellt der Aufsatz die Beziehung zwischen
Sozialkapital, vor allem in seiner AusprÀgung als interpersonelles Vertrauen,
und sozialer Handlungskoordination als Grundlage von Governance her. In diesem
Kontext wird die Bereitstellung von Governance als Spiel kollektiven Handelns
verstanden (âGovernance Gameâ), in dem das Verhalten sozial-eingebetteter
(kollektiver) Akteure (und insbesondere ihre Kooperationsentscheidungen)
maĂgeblich von dem Umfang ihres Sozialkapitals abhĂ€ngen. Das zentrale Argument
des Aufsatzes ist, dass spezifische Typen von Sozialkapital bestimmte Modi der
sozialen Handlungskoordination in RÀumen begrenzter Staatlichkeit ermöglichen
und entsprechend erklÀren. Im Rahmen eines explorativen Zugangs werden
konzeptuelle und theoretische BegrĂŒndungen vorgebracht, die bei der ErklĂ€rung
der Varianz und der Prozesse von Governance auĂerhalb der OECD-Welt neue
Perspektiven eröffnen.Unlike what Hobbesian theories argue, the provision of governance is not
necessarily undermined by a lack of statehood. Empirical findings show that â
contrary to many voices in current debates on weak, failing, or failed states
â various (non-state) actors provide governance even when statehood is
limited. This paper addresses the puzzle of how to account for cases where
governance exists although the state cannot or does not provide it.
Transferring insights from political sociology to the analysis of such âgov-
ernance without the state,â the paper holds that the way societies manage
their affairs critically depends on social conditions, which are captured here
following social capital theory. Working toward a political sociology of
âgovernance without a state,â this paper links social capital, resulting in
interpersonal trust, to social coordination underlying the provision of
governance. In this context, governance is interpreted as a collective action
game (âgovernance gameâ), in which socially embedded (collective) actors are
seen as players whose behavior (in particular their decisions to cooperate)
depends critically on their social capital endowments. The main argument is
that specific types of social capital endowments facilitate â and, thus,
explain â specific modes of social coordination in areas of limited statehood.
Explorative in nature, con- ceptual and theoretical arguments will be
developed that offer new perspectives to explain the variance and mechanisms
of governance outside the OECD world
On the social conditions of governance : social capital and governance in areas of limited statehood
Unlike what Hobbesian theories argue, the provision of governance is not necessarily undermined by a
lack of statehood. Empirical findings show that â contrary to many voices in current debates on weak,
failing, or failed states â various (non-state) actors provide governance even when statehood is limited.
This paper addresses the puzzle of how to account for cases where governance exists although the state
cannot or does not provide it. Transferring insights from political sociology to the analysis of such âgovernance
without the state,â the paper holds that the way societies manage their affairs critically depends
on social conditions, which are captured here following social capital theory. Working toward a political
sociology of âgovernance without a state,â this paper links social capital, resulting in interpersonal trust, to
social coordination underlying the provision of governance. In this context, governance is interpreted as
a collective action game (âgovernance gameâ), in which socially embedded (collective) actors are seen as
players whose behavior (in particular their decisions to cooperate) depends critically on their social capital
endowments. The main argument is that specific types of social capital endowments facilitate â and, thus,
explain â specific modes of social coordination in areas of limited statehood. Explorative in nature, conceptual
and theoretical arguments will be developed that offer new perspectives to explain the variance and
mechanisms of governance outside the OECD world
Guarding the Sacred Fires: Elizabeth E. Farrell\u27s Contributions to the Creation of Special Education in New York City
The department Farrell founded became a model for those that followed, causing a ripple effect in the practice of teaching and the organization of school systems across the United States. Further, Farrell\u27s involvement in professional organizations such as the Council for Exceptional Children and the New York State Psychological Association established the basis for a special education professional network, still in existence---and thriving-- today. Although a few short biographical pieces on Farrell are available, and she is referenced in numerous journal articles in the area of special education history, there has been no detailed account of Farrell\u27s life and accomplishments. Relying on archival materials from the Council for Exceptional Children and Teachers College, as well as information provided by family, members, universities, and colleagues, this investigation details Farrell\u27s personal history and work in the area of special needs. It is hoped that this work contributes to that knowledge base
Towards A Monetary Union in the Economic Community of West African States (ECOWAS): Prospects and Challenges"
Student Number : 0414488P -
MA research report -
School of Social Sciences -
Faculty of HumanitiesThis study aims at highlighting the politics of international cooperation with respect to
monetary integration in West Africa. Monetary integration was envisaged in the
Economic Community of West African States (ECOWAS) when the organization was
formed in 1975. Two decades after its formation, it was realized by member states
that limited success had been achieved as far as the objectives of the organization
were concerned. As a result, the ECOWAS Treaty was revised and significant
decisions were made in 1993, and the call for a monetary union was reiterated.
Factors which could have worked against the formation of a monetary union prior to
1993 changed in favour of monetary cooperation. The adoption of the Euro in the
European Union and more especially by France, weakened the symbolic link of the
CFA Franc zone to France, and to an extent reduced the French stigma, which had
hitherto discouraged Anglophone countries from participating in an expanded
monetary union with their Francophone counterparts. The democratic transition of
Nigeria and the accession to power of a new leader who has shown commitment to
regional integration, improved cooperation arrangements among ECOWAS states in
working towards the formalization of a monetary union. The transformation from the
Organization of African Unity (OAU) to the African Union (AU) and its strategy of
creating a common African currency as well as the emergence of the New Partnership
for Africaâs Development (NEPAD) provided extra motivations for African states to
show more commitment towards integration. Based on the above factors, several
positive steps have been taken towards the formalization of a monetary union in the
community. The West African Monetary Zone (WAMZ) was realized in 2000 and
more importantly, the West African Monetary Institute (WAMI) was created and
started operating in the same year. The Institute was created to prepare the
groundwork for the creation of the West African Central Bank. The above mentioned
factors increased the prospects of forming a monetary union in the community but
several challenges still remain. First there is the problem of the asymmetric nature of
the economies in the region. Secondly, political instability is a major factor that
militates against the formation of such a union. Domestic political instability in
Nigeria, which is heightened by ethnic and religious differences as well as the
asymmetric nature of her economy in relation to those of other states in the region,
makes it difficult for a monetary union to revolve around her. This research project is centered on Treaties, statistical analysis, theories and concepts and literature from
economic and financial institutions. We conclude by stating that the analysis here
reflects the situation on the ground and provide lessons to member states of the
community, prospects for monetary integration would be further improved if member
states work coherently to overcome such challenges
HANDLING WORK FROM HOME SECURITY ISSUES IN SALESFORCE
Security is a vital component when it is identified with an endeavor record or our genuine materials. To protect our home or valuable things like gold, cash we use bank storage administrations or underground secret storage spaces at home. Similarly, IT enterprises put tremendous measure of capital in expanding security to its business and the archives. Associations use cryptography procedures to get their information utilizing progressed encryption calculations like SHA-256, SHA-512, RSA-1024, RSA-2048 piecesâ key encryption and Elliptic Curve Cryptography (ECC) calculations. These industry standard calculations are difficult to break. For instance, to break RSA-2048-piece encryption key, an old-style PC needs around 300 trillion years. As indicated by the continuous examination, a quantum PC can break it in 10seconds, yet such a quantum PC doesn\u27t yet exist. Despite the fact that these cryptographic calculations guarantee an awesome degree of safety, there will be dependably a space for breaking the security. Programmers will attempt new techniques to break the security. Thus, the association likewise should continue to utilize new strategies to build the level and nature of the security. Now it is time to check how the security aspect is taken care of when the IT employees are at work from home. The 2020 year has made many professionals work from home because of the Covid-19 pandemic. The Covid-19 has transformed almost all organizations to work from home, this has become standard advice, and technology plays an important role during work from home to monitor the employee works and provide security when the work is being carried away from their respective organization. Employees\u27 information security awareness will become one of the most important parts of safeguarding against nefarious information security practices during this work from home. Most of the workers like the expediency of work from home and the flexibility provided for the employees. But in this situation, workers need guarantees that their privacy is secured when using company laptops and phones. Cyber security plays an important role in maintaining a secured environment when working from home. This work focusses on managing the security break attack in the course of work from home. The focus of the study is on dealing with security breaches that occur when salespeople operate from home. The problem of security isn\u27t new. Security issues existed prior to the lockdown or pandemic, but because the staff was working from the office at the time, the system administrator was available to address them. However, how can an employee\u27s laptop and account be secured when working from home? MFH\u27s salesforce has leveraged a variety of innovative technologies to address security concerns during their tenure. Because the IT behemoth Salesforce has made it possible for all employees, including freshly hired ones, to seek WFH on a permanent basis. To address the security breach difficulties faced by employees, the organization used a number of new approaches, including tracking working hours, raising password difficulty, employing VPN (virtual private network), mandating video during meetings, continuously checking right to use control, and MFA (multi-factor authentication). Improvement of existing multi-factor authentication (MFA) is the focused topic discussed in the thesis. To add an additional step of protection to the login process Blockchain technology is proposed and to identify the employee identification a hybrid recognition model is proposed using face and fingerprint recognition. This leads to the employee going through multiple processes to authenticate his or her identity in numerous ways in order to access the business laptop. This procedure entails connecting his or her laptop to his or her mobile phone or email account.
Keywords: MFA, WFH, Cyber Security, Encryption, Decryption
Dispersion, Self-assembly, And Rheological Characterization of Dna-complexed Boron Nitride Nanosystems
Stable liquid dispersions and the subsequent self-assembly of boron nitride (BN) nanostructures are a vital precursor for translating their exceptional electrical, mechanical, thermal, and optical properties into large-area assemblies with controlled properties. However, achieving individually dispersed BN nanomaterials including BN nanotubes (BNNTs) and hexagonal BN nanosheets (hBN) in almost any solvent has been hindered by strong van der Waals interactions among nanomaterials. In this dissertation work, we reported a comprehensive study on developing an efficient dispersion, self-assembly, and rheological characterization of BN nanomaterials. Particularly, we reported a highly efficient dispersions of BNNTs through noncovalent complexation while exploiting the solvent-nanotube-dispersant interactions using biopolymer DNA and various solvents including water and alcohol. The subsequent purification by membrane filtration revealed that the raw BNNT material constitutes ~ 45.2 mass % of non-nanotube impurities. Ofthe alcohols tested, isopropyl alcohol (IPA) was found to be an efficient solvent, resulting in a dispersion yield of as high as ~ 48 % nanotubes in an IPA/water mixture with 60 vol % IPA by mild bath sonication. Molecular dynamics simulations further revealed that IPA played a pseudosurfactant role in solvating BNNTs by replacing water molecules in the solvation layer while IPA is added. The dispersion techniques developed for BNNTs has been extended for aqueous dispersions of v hBN as well. Additionally, we demonstrated the formation of solid BNNT films comprised of spontaneously aligned nanotubes through drop drying of DNA-wrapped BNNTs. The overall properties of solid BNNT assemblies are directly influenced by the physical properties of nanotubes, including the tube lengths. Conventional surface deposition method by imaging dried samples on a substrate revealed inconsistencies in the average lengths of the parent BNNTs coated by DNA and SDC, due to the differential binding of DNA-BNNTs to a substrate. Therefore, we determined the nanotube lengths using an alternative method - rheological characterization - by measuring the viscosity of dilute dispersions of DNA-BNNTs, highlighting the Brownian rigid rod behavior of BNNTs. Combined, our study on the dispersion, self-assembly and rheology of BN nanomaterials paved a way for producing BN assemblies with controlled properties while offering green chemistry and multifunctionality
Concurrent speculative execution of selector applications
Upon detecting a user context to select content items, an operating system speculatively launches software applications that provide the particular type of content items. A user interface is provided that enables a user to select items from collections of items provided by the applications. The user interface enables a user to perform such selection without having to launch additional applications or switch between applications
Differential effects of cigarette smoke on oxidative stress and proinflammatory cytokine release in primary human airway epithelial cells and in a variety of transformed alveolar epithelial cells
BACKGROUND: Cigarette smoke mediated oxidative stress and inflammatory events in the airway and alveolar epithelium are important processes in the pathogenesis of smoking related pulmonary diseases. Previously, individual cell lines were used to assess the oxidative and proinflammatory effects of cigarette smoke with confounding results. In this study, a panel of human and rodent transformed epithelial cell lines were used to determine the effects of cigarette smoke extract (CSE) on oxidative stress markers, cell toxicity and proinflammatory cytokine release and compared the effects with that of primary human small airway epithelial cells (SAEC). METHODS: Primary human SAEC, transformed human (A549, H1299, H441), and rodent (murine MLE-15, rat L2) alveolar epithelial cells were treated with different concentrations of CSE (0.2â10%) ranging from 20 min to 24 hr. Cytotoxicity was assessed by lactate dehydrogenase release assay, trypan blue exclusion method and double staining with acridine orange and ethidium bromide. Glutathione concentration was measured by enzymatic recycling assay and 4-hydroxy-2-nonenal levels by using lipid peroxidation assay kit. The levels of proinflammatory cytokines (e.g. IL-8 and IL-6) were measured by ELISA. Nuclear translocation of the transcription factor, NF-ÎșB was assessed by immunocytochemistry and immunoblotting. RESULTS: Cigarette smoke extract dose-dependently depleted glutathione concentration, increased 4-hydroxy-2-nonenal (4-HNE) levels, and caused necrosis in the transformed cell lines as well as in SAEC. None of the transformed cell lines showed any significant release of cytokines in response to CSE. CSE, however, induced IL-8 and IL-6 release in primary cell lines in a dose-dependent manner, which was associated with the nuclear translocation of NF-ÎșB in SAEC. CONCLUSION: This study suggests that primary, but not transformed, lung epithelial cells are an appropriate model to study the inflammatory mechanisms in response to cigarette smoke
- âŠ