1,533 research outputs found

    Grandparental effects on reproductive strategizing

    Get PDF
    This paper analyzes data from the household registers for two villages in the Nôbi region of central Japan in the late Edo period (1717-1869) to assess how grandparents may have affected reproductive strategizing in stem families. The particulars of the family system fostered a culturally favored set of reproductive goals, in particular, a daughter as eldest child, followed by a son (and heir), coupled with gender alternation in subsequent reproduction and overall gender balance. This reproductive strategy was generally followed during the stem phase of the domestic cycle, when one or both grandparents were present, especially when the family head was in the senior generation. By contrast, a son-first strategy was favored when childbearing began in the conjugal phase of the cycle. This suggests grandparental influence on the junior couple’s reproductive decisions in favor of the cultural ideal. I find that the senior couple’s decision to marry the heir early or late strongly affects the reproductive strategies followed by him after marriage. I show that when a grandmother is present at the onset of childbearing, especially if she is relatively young, the junior couple ends up with more offspring on average. A controlled analysis of infanticiding behavior is interpreted in terms of conjugal power and coalition formation. It appears that a grandmother gets her way only when she and her son gang up on the daughter-in-law, but such a coalition is likely only when her son dominates the conjugal relationship (which in turn reflects the grandmother’s success in binding the son tightly to her emotionally and in delaying his marriage). Otherwise, the grandmother may be shut out from reproductive decision-making by the solidary conjugal coalition.family, historical household studies, infanticide, Japan, reproductive strategies

    THE OPTICAL SCANNER - FRIEND OR FOE?

    Get PDF
    Examines pros and cons of the optical scanner for various institutions in the distribution channel. Concludes it's good.Agribusiness,

    Montia chamissoi (Ledeb. ex Spreng.) Greene

    Get PDF
    https://thekeep.eiu.edu/herbarium_specimens_byname/5556/thumbnail.jp

    Montia chamissoi (Ledeb. ex Spreng.) Greene

    Get PDF
    https://thekeep.eiu.edu/herbarium_specimens_byname/5556/thumbnail.jp

    Identity management in a public IaaS Cloud

    Get PDF
    In this thesis the unique environment that is the public IaaS cloud along with its differences from a traditional data center environment has been considered. The Cloud Security Alliance (CSA), states that “Managing identities and access control for enterprise applications remains one of the greatest challenges facing IT today”. The CSA also points out that “there is a lack of consistent secure methods for extending identity management into the cloud and across the cloud” [1]. This thesis examines this challenge of managing identities in the cloud by developing a list of best practices for implementing identity management in the cloud. These best practices were then tested by simulated misuse cases which were tested in a prototype of the implementation strategy. The results and analysis of the misuse cases show that the implementation of the identity management solution solves the problem of managing identities for the control of the infrastructure in the cloud. However, the analysis also shows that there are still areas where the properly implemented identity management solution fails to mitigate attacks to the infrastructure. These failures in particular are attacks that are sourced from the subscriber environments in the cloud. Finally, the best practices from this thesis also present some consistent methods for extending identity management into the cloud
    • …
    corecore