4,719 research outputs found

    The emerging non-violent character of the iranian protest movement

    Get PDF
    In assessing the aftermath of the fraudulent presidential election of 2009 in Iran, one question has received less critical analysis than other complexities of this event: What can explain the remarkable non-violent character of the Green Movement in Iran? I propose that the answer, inter alia, lies with the following three learning experiences: 1) The experience of loss brought about by the Iran/Iraq war; 2) the experience of relative opening during Khatami’s presidency; and 3) the experience of modernization of faith in the work of the post-Islamist thinkers that aimed to make political Islam compatible with democracy. Together, these learning processes fostered a new mode of thinking that is civil and non-violent in character

    Sizing the European Shadow Banking System: A New Methodology

    Get PDF
    One of the critical unanswered questions relating to the shadow-banking system has been to quantify its scale in an industry where entities, by design, are opaque and often outside of regulated and publically shared frameworks. However almost all shadow banking entities, including hedge funds, private equity funds and special purpose vehicles ("SPVs"), interact with the financial markets via regulated investment banks. For example, many SPVs are in fact originated as part of investment banking business and hedge funds typically transact in financial markets exclusively via the "prime brokerage" division of investment banks. This interface with the regulated banking environment combines with the typical practise by investment banks of equalizing compensation (Including bonus) ratios to revenues globally which then allows identification of the implied difference in revenues and hence assets that represents the shadow banking system. The paper will present for critique the results of this methodology to estimate the UK shadow banking system including European business managed from the UK. The estimate will imply a larger scale of shadow banking than previous estimates at £548 billion which, when combined with hedge fund assets of £360 billion (FSA, 2011) gives total shadow banking assets of over £900 billion. It is proposed that the large gap between the estimates of this paper and other estimates reflects the huge, and previously unknown, scale of offshore activities of UK investment banks

    Challenges of web-based personal genomic data sharing

    Get PDF
    In order to study the relationship between genes and diseases, the increasing availability and sharing of phenotypic and genotypic data have been promoted as an imperative within the scientific community. In parallel with data sharing practices by clinicians and researchers, recent initiatives have been observed in which individuals are sharing personal genomic data. The involvement of individuals in such initiatives is facilitated by the increased accessibility of personal genomic data, offered by private test providers along with availability of online networks. Personal webpages and on-line data sharing platforms such as Consent to Research (Portable Legal Consent), Free the Data, and Genomes Unzipped are being utilized to host and share genotypes, electronic health records and family history uploaded by individuals. Although personal genomic data sharing initiatives vary in nature, the emphasis on the individuals’ control on their data in order to benefit research and ultimately health care has seen as a key theme across these initiatives. In line with the growing practice of personal genomic data sharing, this paper aims to shed light on the potential challenges surrounding these initiatives. As in the course of these initiatives individuals are solicited to individually balance the risks and benefits of sharing their genomic data, their awareness of the implications of personal genomic data sharing for themselves and their family members is a necessity. Furthermore, given the sensitivity of genomic data and the controversies around their complete de-identifiability, potential privacy risks and harms originating from unintended uses of data have to be taken into consideration
    • …
    corecore