4 resultados para Rank and file unionism
em Digital Commons - Michigan Tech
Resumo:
Rooted in critical scholarship this dissertation is an interdisciplinary study, which contends that having a history is a basic human right. Advocating a newly conceived and termed, Solidarity-inspired History framework/practice perspective, the dissertation argues for and then delivers a restorative voice to working-class historical actors during the 1916 Minnesota Iron Ore Strike. Utilizing an interdisciplinary methodological framework the dissertation combines research methods from the Humanities and the Social Sciences to form a working-class history that is a corrective to standardized studies of labor in the late 19th and early 20th centuries. Oftentimes class interests and power relationships determine the dominant perspectives or voices established in history and disregard people and organizations that run counter to, or in the face of, customary or traditional American themes of patriotism, the Protestant work ethic, adherence to capitalist dogma, or United States exceptionalism. This dissertation counteracts these traditional narratives with a unique, perhaps even revolutionary, examination of the 1916 Minnesota Iron Ore Strike. The intention of this dissertation's critical perspective is to poke, prod, and prompt academics, historians, and the general public to rethink, and then think again, about the place of those who have been dislocated from or altogether forgotten, misplaced, or underrepresented in the historical record. Thus, the purpose of the dissertation is to give voice to historical actors in the dismembered past. Historical actors who have run counter to traditional American narratives often have their body of "evidence" disjointed or completely dislocated from the story of our nation. This type of disremembering creates an artificial recollection of our collective past, which de-articulates past struggles from contemporary groups seeking solidarity and social justice in the present. Class-conscious actors, immigrants, women, the GLBTQ community, and people of color have the right to be remembered on their own terms using primary sources and resources they produced. Therefore, similar to the Wobblies industrial union and its rank-and-file, this dissertation seeks to fan the flames of discontented historical memory by offering a working-class perspective of the 1916 Strike that seeks to interpret the actions, events, people, and places of the strike anew, thus restoring the voices of these marginalized historical actors.
Resumo:
Through comparative analysis of the immigrant labor forces at work in iron mining in northern Minnesota, coal mining in Illinois, and steel milling in the Calumet region of Chicago and Gary, this paper addresses the forms of social distance separating and marginalizing new immigrants from American society and trade unionism that existed in 1914, the year that marked the end point of mass immigration from Eastern and Southern Europe. The “new immigration” was a labor migration that congregated its subjects overwhelmingly in what were called "unskilled" or "semi-skilled" forms of labor. Skilled work was largely, with certain variations, the preserve of "American" or old immigrant workers. This labor gulf separating new immigrants and American workers was hardened by a spatial separateness. New immigrants often lived in what have been called industrial villages—the mining town or location, the factory neighborhood— striking in their isolation and insularity from mainstream society. This separateness and insularity became a major preoccupation for corporate managers, Progressive reformers, and for American trade unions as new immigrants began to engage in major labor struggles leading up to 1914. But among the three industries, only the union of coal miners, the United Mine Workers, enjoyed success in organizing the new immigrants. In the steel mills and the iron mines, the unions were either rooted out or failed to gain a foothold at all. The explanation for these differences is to be found in the different forms of industrial development among the industries studied.
Resumo:
File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.
Resumo:
Content Policy outlining the acceptable content and file formats that can be deposited in Digital Commons @ Michigan Tech, as well as information pertaining to the organization of the digital repository, ownership and rights of content, privacy, and access.