22 resultados para legitimate autority


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper explores attitudes and perceptions towards entrepreneurs in three Central Eastern European (CEE) countries undergoing transition from planned to market-based economic systems. Entrepreneurs and small and medium-sized enterprises (SME) play a critical role in this transformation process. Study one examines whether governments and general public are perceived as supportive of entrepreneurs. Such perceptions might eventually increase the number of entrepreneurs as it would be seen as a legitimate career choice (cf. Etzioni, 1987). Study two explores whether the concept ‘entrepreneur’ is interpreted in the same way in the three cultures using a student sample. Cross-cultural aspects and support measures for entrepreneurship are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cyberstalking has recently emerged as a new and growing problem and is an area that will probably receive a higher profile within criminal law as more cases reach court (see Griffiths, 1999; Griffiths, Rogers and Sparrow, 1998; Bojic and McFarlane, 2002a; 2002b). For the purposes of this article we define cyberstalking as the use of information and communications technology (in particular the Internet) in order to harass individuals. Such harassment may include actions such as the transmission of offensive e-mail messages, identity theft and damage to data or equipment. Whilst a more comprehensive definition has been presented elsewhere (Bocij and McFarlane, 2002), it is hoped that the definition here is sufficient for those unfamiliar with this field. The stereotypical stalker conjures up images of someone harassing a victim who is the object of their affection. However, not all stalking incidents are motivated by unrequited love. Stalking can also be motivated by hate, a need for revenge, a need for power and/or racism. Similarly, cyberstalking can involve acts that begin with the issuing of threats and end in physical assault. We also make distinctions between conventional stalking and cyberstalking. Whilst some may view cyberstalking as an extension of conventional stalking, we believe cyberstalking should be regarded as an entirely new form of deviant behaviour. It is not surprising that cyberstalking is sometimes thought of as a trivial problem. A number of writers and researchers have suggested that cyberstalking and associated activities are of little genuine concern. Koch (2000), for example, goes as far as accusing those interested in cyberstalking as promoting hysteria over a problem that may be minuscule or even imaginary. The impression gained is that cyberstalking represents a relatively small problem where victims seldom suffer any real harm. Whilst there are no genuinely reliable statistics that can be used to determine how common cyberstalking incidents are, a great deal of evidence is available to show that cyberstalking is a significant and growing problem (Griffiths et al, 1998). For instance, CyberAngels (a well-known Internet safety organization) receives some 500 complaints of cyberstalking each day, of which up to 100 represent legitimate cases (Dean, 2000). Another Internet safety organization (Working to Halt Online Abuse) reports receiving an average of 100 cases per week (WHOA, 2001). To highlight the types of cyberstalking behaviours that take place and some of the major issues facing criminal law, we briefly examine four high profile cases of cyberstalking (adapted from Bocij and MacFarlane, 2002b).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Accession to the EU has had ambiguous effects on civil society organizations (CSOs) in the East Central European countries. A general observation is that accession has not led to the systematic empowerment of CSOs in terms of growing influence on national policy making. This article investigates the determinants of successful CSO advocacy by looking at international development and humanitarian NGOs (NGDOs) in the Czech Republic and Hungary. Reforms in the past decade in the Czech Republic have created an international development policy largely in line with NGDO interests, while Hungary’s ministry of foreign affairs seems to have been unresponsive to reform demands from civil society. The article argues that there is clear evidence of NGDO influence in the Czech Republic on international development policy, which is because of the fact that Czech NGDOs have been able solve problems of collective actions, while the Hungarian NGDO sector remains fragmented. They also have relatively stronger capacities, can rely on greater public support and can thus present more legitimate demands towards their government.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper is about care, insider positions and mothering within feminist research. We ask questions about how honest, ethical and caring can we really be in placing the self into the research process as mothers ourselves. Should we leave out aspects of the research that do not fit neatly and how ethical can we claim to be if we do? Moreover, should difficult differences, secrets and silences that emerge from the research process and research stories that might 'out' us as failures be excluded from research outcomes so as to claim legitimate research? We consider the use of a feminist methods as crucial in the reciprocal and relational understanding of personal enquiry. Mothers invest significant emotional capital in their families and we explore the blurring of the interpersonal and intrapersonal when sharing mothering experiences common to both participant and researcher. Indeed participants can identify themselves within the process as 'friends' of the researcher. We both have familiarity within our respective research that has led to mutual understanding of having insider positions. Crucially individuals' realities are a vital component of the qualitative paradigm and that 'insider' research remains a necessary, albeit messy vehicle in social research. As it is we consider a growing body of literature which marks out and endorses a feminist ethics of care. All of which critique established ways of thinking about ethics, morality, security, citizenship and care. It provides alternatives in mapping private and public aspects of social life as it operates at a theoretical level, but importantly for this paper also at the level of practical application.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Spamming has been a widespread problem for social networks. In recent years there is an increasing interest in the analysis of anti-spamming for microblogs, such as Twitter. In this paper we present a systematic research on the analysis of spamming in Sina Weibo platform, which is currently a dominant microblogging service provider in China. Our research objectives are to understand the specific spamming behaviors in Sina Weibo and find approaches to identify and block spammers in Sina Weibo based on spamming behavior classifiers. To start with the analysis of spamming behaviors we devise several effective methods to collect a large set of spammer samples, including uses of proactive honeypots and crawlers, keywords based searching and buying spammer samples directly from online merchants. We processed the database associated with these spammer samples and interestingly we found three representative spamming behaviors: Aggressive advertising, repeated duplicate reposting and aggressive following. We extract various features and compare the behaviors of spammers and legitimate users with regard to these features. It is found that spamming behaviors and normal behaviors have distinct characteristics. Based on these findings we design an automatic online spammer identification system. Through tests with real data it is demonstrated that the system can effectively detect the spamming behaviors and identify spammers in Sina Weibo.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This edited volume analyzes recent key developments in EU border management. In light of the refugee crises in the Mediterranean and the responses on the part of EU member states, this volume presents an in-depth reflection on European border practices and their political, social and economic consequences. Approaching borders as concepts in flux, the authors identify three main trends: the rise of security technologies such as the EUROSUR system, the continued externalization of EU security governance such as border mission training in third states, and the unfolding dynamics of accountability. The contributions show that internal security cooperation in Europe is far from consolidated, since both political oversight mechanisms and the definition of borders remain in flux. This edited volume makes a timely and interdisciplinary contribution to the ongoing academic and political debate on the future of open borders and legitimate security governance in Europe. It offers a valuable resource for scholars in the fields of international security and migration studies, as well as for practitioners dealing with border management mechanisms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent years, there has been a growing realisation that beyond the realm of legitimate entrepreneurship is a large, hidden enterprise culture composed of entrepreneurs conducting some or all of their trade off-the-books. Until now, however, few have evaluated how many entrepreneurs start-up their ventures trading off-the-books and why they do so. Reporting face-to-face interviews conducted in Ukraine during 2005-2006 with 331 entrepreneurs, the finding is not only that the vast majority (90%) operate partially or wholly off-the-books, but also that they are not all driven by necessity, as a last resort and as a survival strategy into entrepreneurship. Revealing how many are willing rather than reluctant entrepreneurs; and that even those who were initially reluctant and ventured into it out of necessity, became more willing entrepreneurs over time as their business became established - the paper concludes by discussing the implications of these findings for both further research and public policy. © 2010 Wiley Periodicals, Inc.