640 research outputs found

    Social Capital and Governance in Areas of Limited Statehood

    Get PDF
    Im Gegensatz zu Hobb’schen Argumentationen ist die Bereitstellung von Governance nicht notwendigerweise an starke Staatlichkeit gebunden: Empirische Belege zeigen, dass verschiedene (nicht-staatliche) Akteure Governance- Leistungen trotz zumindest begrenzter Staatlichkeit bereitstellen – entgegen vieler Stimmen in zeitgenössischen Diskursen zu schwacher und gescheiterter Staatlichkeit. Der Aufsatz geht der Frage nach, wie die FĂ€lle erklĂ€rt werden können, wo Governance erfolgreich bereitgestellt wird obwohl der Staat entweder keine Governance-Leistungen erbringt oder erbringen kann. Im Rahmen des Transfers von Forschungsergebnissen der Politischen Soziologie in die Analyse von „Governance ohne Staat“ geht der Aufsatz von der Annahme aus, dass Art und Weise wie Gesellschaften sich organisieren maßgeblich von deren sozialstruktureller Bedingtheit abhĂ€ngen. Diese spezifiziert der Aufsatz mithilfe des Sozialkapitaltheorie. Auf dem Weg zu einer Politischen Soziologie der „Governance ohne Staat“, stellt der Aufsatz die Beziehung zwischen Sozialkapital, vor allem in seiner AusprĂ€gung als interpersonelles Vertrauen, und sozialer Handlungskoordination als Grundlage von Governance her. In diesem Kontext wird die Bereitstellung von Governance als Spiel kollektiven Handelns verstanden („Governance Game“), in dem das Verhalten sozial-eingebetteter (kollektiver) Akteure (und insbesondere ihre Kooperationsentscheidungen) maßgeblich von dem Umfang ihres Sozialkapitals abhĂ€ngen. Das zentrale Argument des Aufsatzes ist, dass spezifische Typen von Sozialkapital bestimmte Modi der sozialen Handlungskoordination in RĂ€umen begrenzter Staatlichkeit ermöglichen und entsprechend erklĂ€ren. Im Rahmen eines explorativen Zugangs werden konzeptuelle und theoretische BegrĂŒndungen vorgebracht, die bei der ErklĂ€rung der Varianz und der Prozesse von Governance außerhalb der OECD-Welt neue Perspektiven eröffnen.Unlike what Hobbesian theories argue, the provision of governance is not necessarily undermined by a lack of statehood. Empirical findings show that – contrary to many voices in current debates on weak, failing, or failed states – various (non-state) actors provide governance even when statehood is limited. This paper addresses the puzzle of how to account for cases where governance exists although the state cannot or does not provide it. Transferring insights from political sociology to the analysis of such “gov- ernance without the state,” the paper holds that the way societies manage their affairs critically depends on social conditions, which are captured here following social capital theory. Working toward a political sociology of “governance without a state,” this paper links social capital, resulting in interpersonal trust, to social coordination underlying the provision of governance. In this context, governance is interpreted as a collective action game (“governance game”), in which socially embedded (collective) actors are seen as players whose behavior (in particular their decisions to cooperate) depends critically on their social capital endowments. The main argument is that specific types of social capital endowments facilitate – and, thus, explain – specific modes of social coordination in areas of limited statehood. Explorative in nature, con- ceptual and theoretical arguments will be developed that offer new perspectives to explain the variance and mechanisms of governance outside the OECD world

    On the social conditions of governance : social capital and governance in areas of limited statehood

    Get PDF
    Unlike what Hobbesian theories argue, the provision of governance is not necessarily undermined by a lack of statehood. Empirical findings show that – contrary to many voices in current debates on weak, failing, or failed states – various (non-state) actors provide governance even when statehood is limited. This paper addresses the puzzle of how to account for cases where governance exists although the state cannot or does not provide it. Transferring insights from political sociology to the analysis of such “governance without the state,” the paper holds that the way societies manage their affairs critically depends on social conditions, which are captured here following social capital theory. Working toward a political sociology of “governance without a state,” this paper links social capital, resulting in interpersonal trust, to social coordination underlying the provision of governance. In this context, governance is interpreted as a collective action game (“governance game”), in which socially embedded (collective) actors are seen as players whose behavior (in particular their decisions to cooperate) depends critically on their social capital endowments. The main argument is that specific types of social capital endowments facilitate – and, thus, explain – specific modes of social coordination in areas of limited statehood. Explorative in nature, conceptual and theoretical arguments will be developed that offer new perspectives to explain the variance and mechanisms of governance outside the OECD world

    Guarding the Sacred Fires: Elizabeth E. Farrell\u27s Contributions to the Creation of Special Education in New York City

    Get PDF
    The department Farrell founded became a model for those that followed, causing a ripple effect in the practice of teaching and the organization of school systems across the United States. Further, Farrell\u27s involvement in professional organizations such as the Council for Exceptional Children and the New York State Psychological Association established the basis for a special education professional network, still in existence---and thriving-- today. Although a few short biographical pieces on Farrell are available, and she is referenced in numerous journal articles in the area of special education history, there has been no detailed account of Farrell\u27s life and accomplishments. Relying on archival materials from the Council for Exceptional Children and Teachers College, as well as information provided by family, members, universities, and colleagues, this investigation details Farrell\u27s personal history and work in the area of special needs. It is hoped that this work contributes to that knowledge base

    Towards A Monetary Union in the Economic Community of West African States (ECOWAS): Prospects and Challenges"

    Get PDF
    Student Number : 0414488P - MA research report - School of Social Sciences - Faculty of HumanitiesThis study aims at highlighting the politics of international cooperation with respect to monetary integration in West Africa. Monetary integration was envisaged in the Economic Community of West African States (ECOWAS) when the organization was formed in 1975. Two decades after its formation, it was realized by member states that limited success had been achieved as far as the objectives of the organization were concerned. As a result, the ECOWAS Treaty was revised and significant decisions were made in 1993, and the call for a monetary union was reiterated. Factors which could have worked against the formation of a monetary union prior to 1993 changed in favour of monetary cooperation. The adoption of the Euro in the European Union and more especially by France, weakened the symbolic link of the CFA Franc zone to France, and to an extent reduced the French stigma, which had hitherto discouraged Anglophone countries from participating in an expanded monetary union with their Francophone counterparts. The democratic transition of Nigeria and the accession to power of a new leader who has shown commitment to regional integration, improved cooperation arrangements among ECOWAS states in working towards the formalization of a monetary union. The transformation from the Organization of African Unity (OAU) to the African Union (AU) and its strategy of creating a common African currency as well as the emergence of the New Partnership for Africa’s Development (NEPAD) provided extra motivations for African states to show more commitment towards integration. Based on the above factors, several positive steps have been taken towards the formalization of a monetary union in the community. The West African Monetary Zone (WAMZ) was realized in 2000 and more importantly, the West African Monetary Institute (WAMI) was created and started operating in the same year. The Institute was created to prepare the groundwork for the creation of the West African Central Bank. The above mentioned factors increased the prospects of forming a monetary union in the community but several challenges still remain. First there is the problem of the asymmetric nature of the economies in the region. Secondly, political instability is a major factor that militates against the formation of such a union. Domestic political instability in Nigeria, which is heightened by ethnic and religious differences as well as the asymmetric nature of her economy in relation to those of other states in the region, makes it difficult for a monetary union to revolve around her. This research project is centered on Treaties, statistical analysis, theories and concepts and literature from economic and financial institutions. We conclude by stating that the analysis here reflects the situation on the ground and provide lessons to member states of the community, prospects for monetary integration would be further improved if member states work coherently to overcome such challenges

    HANDLING WORK FROM HOME SECURITY ISSUES IN SALESFORCE

    Get PDF
    Security is a vital component when it is identified with an endeavor record or our genuine materials. To protect our home or valuable things like gold, cash we use bank storage administrations or underground secret storage spaces at home. Similarly, IT enterprises put tremendous measure of capital in expanding security to its business and the archives. Associations use cryptography procedures to get their information utilizing progressed encryption calculations like SHA-256, SHA-512, RSA-1024, RSA-2048 pieces’ key encryption and Elliptic Curve Cryptography (ECC) calculations. These industry standard calculations are difficult to break. For instance, to break RSA-2048-piece encryption key, an old-style PC needs around 300 trillion years. As indicated by the continuous examination, a quantum PC can break it in 10seconds, yet such a quantum PC doesn\u27t yet exist. Despite the fact that these cryptographic calculations guarantee an awesome degree of safety, there will be dependably a space for breaking the security. Programmers will attempt new techniques to break the security. Thus, the association likewise should continue to utilize new strategies to build the level and nature of the security. Now it is time to check how the security aspect is taken care of when the IT employees are at work from home. The 2020 year has made many professionals work from home because of the Covid-19 pandemic. The Covid-19 has transformed almost all organizations to work from home, this has become standard advice, and technology plays an important role during work from home to monitor the employee works and provide security when the work is being carried away from their respective organization. Employees\u27 information security awareness will become one of the most important parts of safeguarding against nefarious information security practices during this work from home. Most of the workers like the expediency of work from home and the flexibility provided for the employees. But in this situation, workers need guarantees that their privacy is secured when using company laptops and phones. Cyber security plays an important role in maintaining a secured environment when working from home. This work focusses on managing the security break attack in the course of work from home. The focus of the study is on dealing with security breaches that occur when salespeople operate from home. The problem of security isn\u27t new. Security issues existed prior to the lockdown or pandemic, but because the staff was working from the office at the time, the system administrator was available to address them. However, how can an employee\u27s laptop and account be secured when working from home? MFH\u27s salesforce has leveraged a variety of innovative technologies to address security concerns during their tenure. Because the IT behemoth Salesforce has made it possible for all employees, including freshly hired ones, to seek WFH on a permanent basis. To address the security breach difficulties faced by employees, the organization used a number of new approaches, including tracking working hours, raising password difficulty, employing VPN (virtual private network), mandating video during meetings, continuously checking right to use control, and MFA (multi-factor authentication). Improvement of existing multi-factor authentication (MFA) is the focused topic discussed in the thesis. To add an additional step of protection to the login process Blockchain technology is proposed and to identify the employee identification a hybrid recognition model is proposed using face and fingerprint recognition. This leads to the employee going through multiple processes to authenticate his or her identity in numerous ways in order to access the business laptop. This procedure entails connecting his or her laptop to his or her mobile phone or email account. Keywords: MFA, WFH, Cyber Security, Encryption, Decryption

    Dispersion, Self-assembly, And Rheological Characterization of Dna-complexed Boron Nitride Nanosystems

    Get PDF
    Stable liquid dispersions and the subsequent self-assembly of boron nitride (BN) nanostructures are a vital precursor for translating their exceptional electrical, mechanical, thermal, and optical properties into large-area assemblies with controlled properties. However, achieving individually dispersed BN nanomaterials including BN nanotubes (BNNTs) and hexagonal BN nanosheets (hBN) in almost any solvent has been hindered by strong van der Waals interactions among nanomaterials. In this dissertation work, we reported a comprehensive study on developing an efficient dispersion, self-assembly, and rheological characterization of BN nanomaterials. Particularly, we reported a highly efficient dispersions of BNNTs through noncovalent complexation while exploiting the solvent-nanotube-dispersant interactions using biopolymer DNA and various solvents including water and alcohol. The subsequent purification by membrane filtration revealed that the raw BNNT material constitutes ~ 45.2 mass % of non-nanotube impurities. Ofthe alcohols tested, isopropyl alcohol (IPA) was found to be an efficient solvent, resulting in a dispersion yield of as high as ~ 48 % nanotubes in an IPA/water mixture with 60 vol % IPA by mild bath sonication. Molecular dynamics simulations further revealed that IPA played a pseudosurfactant role in solvating BNNTs by replacing water molecules in the solvation layer while IPA is added. The dispersion techniques developed for BNNTs has been extended for aqueous dispersions of v hBN as well. Additionally, we demonstrated the formation of solid BNNT films comprised of spontaneously aligned nanotubes through drop drying of DNA-wrapped BNNTs. The overall properties of solid BNNT assemblies are directly influenced by the physical properties of nanotubes, including the tube lengths. Conventional surface deposition method by imaging dried samples on a substrate revealed inconsistencies in the average lengths of the parent BNNTs coated by DNA and SDC, due to the differential binding of DNA-BNNTs to a substrate. Therefore, we determined the nanotube lengths using an alternative method - rheological characterization - by measuring the viscosity of dilute dispersions of DNA-BNNTs, highlighting the Brownian rigid rod behavior of BNNTs. Combined, our study on the dispersion, self-assembly and rheology of BN nanomaterials paved a way for producing BN assemblies with controlled properties while offering green chemistry and multifunctionality

    Concurrent speculative execution of selector applications

    Get PDF
    Upon detecting a user context to select content items, an operating system speculatively launches software applications that provide the particular type of content items. A user interface is provided that enables a user to select items from collections of items provided by the applications. The user interface enables a user to perform such selection without having to launch additional applications or switch between applications

    Differential effects of cigarette smoke on oxidative stress and proinflammatory cytokine release in primary human airway epithelial cells and in a variety of transformed alveolar epithelial cells

    Get PDF
    BACKGROUND: Cigarette smoke mediated oxidative stress and inflammatory events in the airway and alveolar epithelium are important processes in the pathogenesis of smoking related pulmonary diseases. Previously, individual cell lines were used to assess the oxidative and proinflammatory effects of cigarette smoke with confounding results. In this study, a panel of human and rodent transformed epithelial cell lines were used to determine the effects of cigarette smoke extract (CSE) on oxidative stress markers, cell toxicity and proinflammatory cytokine release and compared the effects with that of primary human small airway epithelial cells (SAEC). METHODS: Primary human SAEC, transformed human (A549, H1299, H441), and rodent (murine MLE-15, rat L2) alveolar epithelial cells were treated with different concentrations of CSE (0.2–10%) ranging from 20 min to 24 hr. Cytotoxicity was assessed by lactate dehydrogenase release assay, trypan blue exclusion method and double staining with acridine orange and ethidium bromide. Glutathione concentration was measured by enzymatic recycling assay and 4-hydroxy-2-nonenal levels by using lipid peroxidation assay kit. The levels of proinflammatory cytokines (e.g. IL-8 and IL-6) were measured by ELISA. Nuclear translocation of the transcription factor, NF-ÎșB was assessed by immunocytochemistry and immunoblotting. RESULTS: Cigarette smoke extract dose-dependently depleted glutathione concentration, increased 4-hydroxy-2-nonenal (4-HNE) levels, and caused necrosis in the transformed cell lines as well as in SAEC. None of the transformed cell lines showed any significant release of cytokines in response to CSE. CSE, however, induced IL-8 and IL-6 release in primary cell lines in a dose-dependent manner, which was associated with the nuclear translocation of NF-ÎșB in SAEC. CONCLUSION: This study suggests that primary, but not transformed, lung epithelial cells are an appropriate model to study the inflammatory mechanisms in response to cigarette smoke
    • 

    corecore