971 resultados para Parties Transacting
Resumo:
From monologues to dialogue. A discussion about changing the fragmented character of the debate concerning schools to one of negotiation, in the spirit of social constructionism. The starting point for the study is the assumption that the interested parties concerning schools such as teachers, students, public servants within school administration or politics construct the idea of the school in disparate ways. It looks as if the representatives of the various interested parties perceive the school in distinctive ways or with particular emphases. Additionally, there are not many discussion forums where these different interested parties have an equal right to speak and be heard. It seems that the lack of dialogue characterizes the debate about school. At the centre of the study are negotiations concerning schools, and the conditions that promote changing the fragmented character of this school debate in a more promising and collectively responsible process of negotiation. The aims of the study are to find both an empirical and theoretical basis for more equal ways to negotiate about school, and to increase cultural self reflection. Social constructionism plays a key role in aspiring to meet these research aims. The research questions are (1) How do the informants of the study construct the idea of school in their texts, and (2) What kind of prospects does social constructionism bring to the negotiations about school. The research informants construct the idea of school in their texts in several ways. To sum up: school is constructed as a place for learning, a place for building the future, a place where ethical education is lived out, a place for social education and Bildung, and a place where the students well-being is ensured. The previously presented assumption that the interested parties of a school construct the idea of a school in disparate ways or with various emphases seems to have support in the informants texts. Based on that, a condition can be put forward: different perspectives should have an equal opportunity to be heard in negotiations about school. It would also be helpful if there was a chance for different perspectives to be documented and/or in some way, visualized. This ensures that different constructions of school are within reach of all the participants. Additionally, while making the process of negotiation transparent, this documentation becomes an important medium for self reflection. On one hand it visualizes the complexity of the school. On the other hand it protects the school and education from serving as the spokesman of any single truth that is presented as objective or universal. Social constructionism seems to offer a stable theoretical basis for changing the fragmented character of the school debate in one of negotiation. More equal and collectively responsible school negotiation presumes that certain aspects or conditions drawn from postmodernism and social constructionism have been studied. In the study, six conditions are presented that can be seen as mediums for changing the fragmented character of the school debate into one of more equal negotiation. Keywords: social constructionism, Kenneth J. Gergen, school negotiation, education policy, dialogue.
Resumo:
A Breakthrough of Welfare State. The inter-relationships of the civic movement, political transformation, and eroding of a hegemony based on small scale farming in the Finnish society in the late 1950's. The unusually rapid and powerful structural change; the non-parliamentary civic movements of 1956 - 1963; and the left majority in the Finnish parliament between 1958 - 1962 all took place as the Finnish welfare state started to develop. The aim of my research is to analyse the inter-relationships of these processes. The research describes the way the former semi self-sufficient, semi-proletarian and labour-intensive form of production - a simple and discriminatory system in itself - made it possible for the majority of the population to survive through hard work. For some it even provided a possibility to prosper. The waning vitality of semi self-sufficiency and small scale agriculture triggered a political ferment and started a period of searching for something new. The process was so intense that it broke up most of the parties and tore down the old consensus that was based on the power of economic and political elite. The most crucial battle of the great transformation was waged over the nature of the state: Should we build a welfare state and construct social security systems, or should we revert to the old night watchman state and, for example, cancel the modest forms of redistribution of income carried out in the 1950's? The people joining the civic movements were either cottagers of the impoverishing countryside or, quite often, people who had come from the countryside and thus had grown up under conditions of some form of solidarity that included taking care of one's own family. The Finnish social insurance developed in the midst of a change in the structure of production of the society, and it became a compromise to satisfy the needs of both the waning society of small scale agriculture and the rising proletarian society based on wage labour. The hodgepodge of political schemes and use of power became a battle between different notions of the economy and the state; the distribution of national income; and the position of Finland in the international context. This battle created a shape of an interregnum - a period of transformation including two notions of society, two alternative paths for the future and the logic of a correctional move. The transformation of Finland from a poor developing country into a prosperous society has been praised as a success story. In 1956 - 1959, when the old form of governance based on the interests of small scale agriculture and wood processing industry was in decay, and when the future seemed uncertain, the projects to reduce social benefits and efforts to distribute national income even more unequally than before led to a powerful counter-movement by citizens and started an hegemonic change and a equal socia development.
Resumo:
International strategic alliances (ISAs) have become increasingly important for the stability, growth, and long-term viability of modern business organizations. Alliance partnerships as inter-firm cooperative ventures represent an influential mechanism for asserting corporate strategic control among autonomous multinational enterprises. These different cooperative arrangements are made of equity investments or contractually-based partnerships. Different alliance forms represent different approaches that partner firms adopt to control their mutual dependence on the alliance and on other partners. Earlier research shows that the partner characteristics could provide an explanation for alliance strategic behavior and see alliances as alternative forms to markets or hierarchies for addressing specific strategic needs linked to partners’ characteristics and their subsequent strategic motives. These characteristics of the partners’ and subsequent strategic motives are analyzed as knowledge sharing factors and how these influence inter-firm control in alliances within the context of the focal-firm STMicroelectronics and its alliance partners Nokia, Ericsson and IBM. This study underline that as contracts are incomplete, they are therefore required to maintain mutual dependence based control mechanisms in addition to a contract. For example, mutual dependence based control mechanisms could be joint financial investments and the building of an ownership structure between the parties (e.g., JVs). However, the present study clarifies that subsequent inter-firm control is also exercised through inter-firm knowledge sharing. The present study contributes by presenting a dynamic interplay between competitive and cooperative rent seeking behavior. Such coopetition behavior describes the firm's strategic orientation to achieve a dynamic balance between competitive and cooperative strategies. This balance is seen in knowledge sharing based cooperation and competition behavior. Thus this study clarifies coopetition strategies by introducing the role of inter-firm cooperation and the competitive nature of knowledge sharing. Simultaneous cooperative and competitive behavior is also seen as synergetic rent-seeking behavior. Therefore, this study extends the perspective of previous studies on competitive and cooperative seeking behavior.
Resumo:
Pro gradu-tutkielma tutkii demokratian ja turvallisuuden paradoksia Pakistanissa esitellen kuusi tekijää, jotka vaikuttavat kyseiseen paradoksiin. Näitä tekijöitä ovat historiallinen kehitys; eliittihallinto; taloudellinen kehitys; Pakistanin poliittisten tekijöiden demokratian eri määritelmät; opetuksen puuttuminen; ja valtataistelu hallituksen, armeijan, tiedustelupalvelun, oikeusjärjestelmän, poliittisten puolueiden sekä eri heimojen, uskonnollisten ja etnisten ryhmien välillä. Tutkimus tarkastelee myös sitä miten nämä tekijät vaikuttavat demokratian kehitykseen Pakistanissa. Keskeinen argumentti on, että länsimainen demokratia ei esiinny eikä toimi Pakistanissa vallitsevissa oloissa, etenkin historiallisen kehityksen ja ulkoisen turvallisuuden takia. Pro gradu-tutkielma käyttää sekundäärisiä lähteitä, kuten kirjoja, artikkeleita, maaraportteja, kommentaareja sekä omiin kokemuksiin perustuvia havaintoja Pakistanin matkalta 2010-2011. Keskeiset teoriat gradussa ovat Guillermo O’ Donnelin delegaattidemokratia sekä Duncan McCargon eliittihallintoteoria, jotka yhdessä selittävät historiallista kehitystä ja eliittihallinnon dynamiikkaa, mitkä johtavat paradoksiin. Kautta historian armeija on hallinnut Pakistania, ja siviilihallinto on ainoastaan neljä kertaa onnistunut olemaan vallassa, mutta silloinkin siviilihallinto päättyi korruptioväitteisiin tai armeijan vallankaappaukseen. Armeijahallinnoille on luonteenomaista hyvät suhteet USA:n, positiivinen taloudellinen kehitys ja vakaus, kun taas siviilihallinnot ovat epävakaita ja korruptoituneita. Tämä kehitys on paradoksin tausta, joka rakentuu turvallisuuspoliittisen tilanteen pohjalle eli hallitusten ja muiden tekijöiden yritykseen löytää vastapaino Intian uhalle. Tämä on ollut keskeinen huoli kelle tahansa poliittiselle päättäjälle itsenäisyydestä lähtien. Loputon valtataistelu eri poliittisten tekijöiden kesken sekä eliittihallinto pitävät yllä paradoksia, koska eliitit ovat kiinnostuneempia oman valtansa säilyttämisestä kuin kansan tahdon huomioonottamisesta. Koska valtaosa ihmisistä ei ole koulutettuja, he ovat paljolti kiinnostuneita omasta selviytymisestään, ja tämän takia sekä kansa että eliitit suosivat armeijahallintoa, koska se tuo vakautta ja taloudellista kehitystä. Sen vuoksi vallitsevissa oloissa demokratian tulevaisuus Pakistanissa näyttää huonolta, koska liberaalidemokratian vaatimukset eivät täyty puoliksi vapaan oikeussysteemin, puoliksi vapaan lehdistön, valtavan korruption ja monien ihmisoikeusloukkauksien takia unohtamatta armeijan ja tiedustelupalvelun sekaantumista siviilihallintoon.
Resumo:
We propose a generic three-pass key agreement protocol that is based on a certain kind of trapdoor one-way function family. When specialized to the RSA setting, the generic protocol yields the so-called KAS2 scheme that has recently been standardized by NIST. On the other hand, when specialized to the discrete log setting, we obtain a new protocol which we call DH2. An interesting feature of DH2 is that parties can use different groups (e.g., different elliptic curves). The generic protocol also has a hybrid implementation, where one party has an RSA key pair and the other party has a discrete log key pair. The security of KAS2 and DH2 is analyzed in an appropriate modification of the extended Canetti-Krawczyk security model.
Resumo:
With ever increasing demand for electric energy, additional generation and associated transmission facilities has to be planned and executed. In order to augment existing transmission facilities, proper planning and selective decisions are to be made whereas keeping in mind the interests of several parties who are directly or indirectly involved. Common trend is to plan optimal generation expansion over the planning period in order to meet the projected demand with minimum cost capacity addition along with a pre-specified reliability margin. Generation expansion at certain locations need new transmission network which involves serious problems such as getting right of way, environmental clearance etc. In this study, an approach to the citing of additional generation facilities in a given system with minimum or no expansion in the transmission facility is attempted using the network connectivity and the concept of electrical distance for projected load demand. The proposed approach is suitable for large interconnected systems with multiple utilities. Sample illustration on real life system is presented in order to show how this approach improves the overall performance on the operation of the system with specified performance parameters.
Resumo:
We consider the problem of developing privacy-preserving machine learning algorithms in a dis-tributed multiparty setting. Here different parties own different parts of a data set, and the goal is to learn a classifier from the entire data set with-out any party revealing any information about the individual data points it owns. Pathak et al [7]recently proposed a solution to this problem in which each party learns a local classifier from its own data, and a third party then aggregates these classifiers in a privacy-preserving manner using a cryptographic scheme. The generaliza-tion performance of their algorithm is sensitive to the number of parties and the relative frac-tions of data owned by the different parties. In this paper, we describe a new differentially pri-vate algorithm for the multiparty setting that uses a stochastic gradient descent based procedure to directly optimize the overall multiparty ob-jective rather than combining classifiers learned from optimizing local objectives. The algorithm achieves a slightly weaker form of differential privacy than that of [7], but provides improved generalization guarantees that do not depend on the number of parties or the relative sizes of the individual data sets. Experimental results corrob-orate our theoretical findings.
Resumo:
We present a multipartite protocol in a counterfactual paradigm. In counterfactual quantum cryptography, secure information is transmitted between two spatially separated parties even when there is no physical travel of particles transferring the information between them. We propose here a tripartite counterfactual quantum protocol for the task of certificate authorization. Here a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. The protocol is counterfactual with respect to either Bob or Charlie. We prove its security against a general incoherent attack, where Eve attacks single particles.
Resumo:
The disclosure of information and its misuse in Privacy Preserving Data Mining (PPDM) systems is a concern to the parties involved. In PPDM systems data is available amongst multiple parties collaborating to achieve cumulative mining accuracy. The vertically partitioned data available with the parties involved cannot provide accurate mining results when compared to the collaborative mining results. To overcome the privacy issue in data disclosure this paper describes a Key Distribution-Less Privacy Preserving Data Mining (KDLPPDM) system in which the publication of local association rules generated by the parties is published. The association rules are securely combined to form the combined rule set using the Commutative RSA algorithm. The combined rule sets established are used to classify or mine the data. The results discussed in this paper compare the accuracy of the rules generated using the C4. 5 based KDLPPDM system and the CS. 0 based KDLPPDM system using receiver operating characteristics curves (ROC).
Resumo:
We consider information theoretic secret key (SK) agreement and secure function computation by multiple parties observing correlated data, with access to an interactive public communication channel. Our main result is an upper bound on the SK length, which is derived using a reduction of binary hypothesis testing to multiparty SK agreement. Building on this basic result, we derive new converses for multiparty SK agreement. Furthermore, we derive converse results for the oblivious transfer problem and the bit commitment problem by relating them to SK agreement. Finally, we derive a necessary condition for the feasibility of secure computation by trusted parties that seek to compute a function of their collective data, using an interactive public communication that by itself does not give away the value of the function. In many cases, we strengthen and improve upon previously known converse bounds. Our results are single-shot and use only the given joint distribution of the correlated observations. For the case when the correlated observations consist of independent and identically distributed (in time) sequences, we derive strong versions of previously known converses.
Resumo:
Anonymity and authenticity are both important yet often conflicting security goals in a wide range of applications. On the one hand for many applications (say for access control) it is crucial to be able to verify the identity of a given legitimate party (a.k.a. entity authentication). Alternatively an application might require that no one but a party can communicate on its behalf (a.k.a. message authentication). Yet, on the other hand privacy concerns also dictate that anonymity of a legitimate party should be preserved; that is no information concerning the identity of parties should be leaked to an outside entity eavesdropping on the communication. This conflict becomes even more acute when considering anonymity with respect to an active entity that may attempt to impersonate other parties in the system. In this work we resolve this conflict in two steps. First we formalize what it means for a system to provide both authenticity and anonymity even in the presence of an active man-in-the-middle adversary for various specific applications such as message and entity authentication using the constructive cryptography framework of Mau11, MR11]. Our approach inherits the composability statement of constructive cryptography and can therefore be directly used in any higher-level context. Next we demonstrate several simple protocols for realizing these systems, at times relying on a new type of (probabilistic) Message Authentication Code (MAC) called key indistinguishable (KI) MACs. Similar to the key hiding encryption schemes of BBDP01] they guarantee that tags leak no discernible information about the keys used to generate them.
Resumo:
Human provisioning of wildlife with food is a widespread global practice that occurs in multiple socio-cultural circumstances. Provisioning may indirectly alter ecosystem functioning through changes in the eco-ethology of animals, but few studies have quantified this aspect. Provisioning of primates by humans is known to impact their activity budgets, diets and ranging patterns. Primates are also keystone species in tropical forests through their role as seed dispersers; yet there is no information on how provisioning might affect primate ecological functions. The rhesus macaque is a major human-commensal species but is also an important seed disperser in the wild. In this study, we investigated the potential impacts of provisioning on the role of rhesus macaques as seed dispersers in the Buxa Tiger Reserve, India. We studied a troop of macaques which were provisioned for a part of the year and were dependent on natural resources for the rest. We observed feeding behaviour, seed handling techniques and ranging patterns of the macaques and monitored availability of wild fruits. Irrespective of fruit availability, frugivory and seed dispersal activities decreased when the macaques were provisioned. Provisioned macaques also had shortened daily ranges implying shorter dispersal distances. Finally, during provisioning periods, seeds were deposited on tarmac roads that were unconducive for germination. Provisioning promotes human-primate conflict, as commensal primates are often involved in aggressive encounters with humans over resources, leading to negative consequences for both parties involved. Preventing or curbing provisioning is not an easy task as feeding wild animals is a socio-cultural tradition across much of South and South-East Asia, including India. We recommend the initiation of literacy programmes that educate lay citizens about the ill-effects of provisioning and strongly caution them against the practice.
Resumo:
Resumen: Este trabajo analiza la acción colectiva sindical postnacional en el MERCOSUR en un período histórico signado por profundas mutaciones políticas, económicas, y productivas sociales (1991-2012) a partir de los relatos y representaciones de sus protagonistas. El trabajo cualitativo intentará explicar la configuración del sindicalismo internacional en la globalización, y describir las estrategias del movimiento obrero mercosureño. La metodología cualitativa ilustra un trabajo de campo a partir de entrevistas en profundidad a 34 sindicalistas del Mercosur, y entrevistas adicionales a tres representantes de la Confederación Sindical de las Américas, dos empresarios del Mercosur, un especialista académico en la dimensión sociolaboral de la integración regional y un representante de la OIT en la región. La metodología de análisis e interpretación de dichas entrevistas ha sido la teoría fundamentada, entendida como la técnica más idónea de aprehender los procesos sociales a través de las voces de los líderes obreros, comprender su realidad, sus representaciones y sistema de valores, sus ideas y su acción colectiva. La literatura de los movimientos sociales en la globalización capitalista ha puesto el énfasis en la emergencia de nuevos colectivos cuyos reclamos se concentran en el reconocimiento (Fraser y Honneth, 2006) de sus identidades que el modelo fordista de producción pareció invisibilizar y soslayar ante la primacía de las prácticas económicas y demandas distributivas. Esta tesis conjuga una perspectiva dualista y demuestra que las estrategias de reconocimiento y las reivindicaciones de redistribución de tipo clasista se resignificaron en el escenario postnacional a través de la Coordinadora de Centrales Sindicales del Cono Sur –CCSCS- (subregional) y, con un desarrollo menor: los Sindicatos Globales (FSI, GUFs) en la acción sectorial [1991-2012]. Para arribar al núcleo configurativo de sus representaciones y su sistema de valores, la investigación transitó por los sentidos y significados del trabajo, las mutaciones productivas y de las condiciones del trabajo, las teorías del fin del trabajo, la precarización y la representación de los trabajadores más frágiles: mujeres, jóvenes y migrantes. En un segundo orden se interpeló sobre la gobernanza mundial, los organismos internacionales, el régimen normativo internacional, la civilización capitalista, para luego abordar el estudio específico del Mercosur y la acción obrera en dicho proceso. El núcleo determinó que para los representantes obreros la acción colectiva sindical debe ser postnacional y su objetivo es limitar la globalización capitalista neoliberal. La CCSCS conformó desde sus inicios un movimiento capaz de elevarse al rango supranacional para representar la voz de los trabajadores del MERCOSUR. La pluralidad configuró su mayor virtud durante sus primeros 20 años, reconociendo una experiencia de aprendizaje de tolerancia y respeto, que ellos definen como la unidad en la diversidad. Esta entidad constituye un patrimonio único como paradigma del sindicalismo postnacional. Los sindicatos del Cono Sur adoptaron diversas modalidades de acción colectiva: a) reactiva (con repertorios de insubordinación, de lucha y resistencia al modelo neoliberal), b) proactiva (con repertorios de incidencia normativa en el MERCOSUR) y c) participativa (con repertorios de producción propositiva de incidencia en la dimensión social del MERCOSUR). Su acción colectiva reactiva, normativa y propositiva fue eficaz a mediano plazo para participar e incidir en el MERCOSUR, crear una dimensión social del bloque y dotar de derechos normativos a los ciudadanos de la región. Su acción tuvo un sentido político de gran poder instituyente, con capacidad movilización y alta exposición pública. Sin embargo, en la segunda década su lógica de construcción quedó subordinada a los procesos nacionales y a los partidos gobernantes, dejó de ser performativa y de creación política, dirimiéndose en la esfera social junto a otros movimientos sociales emergentes, y provocó un ciclo de desmovilización. Simultáneamente, emergió con fuerza otra modalidad de sindicalismo postnacional con la fusión y refundación de los Sindicatos Globales. Su acción sectorial contribuye a restaurar las demandas de distribución que habían quedado soslayadas, pero esta tesis manifiesta que los protagonistas afirman que sus marcos de acción colectiva deberán ser conjuntos para ser exitosa. El sindicalismo postnacional en el MERCOSUR se define a sí mismos como agente de desarrollo, protagonista del modelo socioproductivo, pero también como vehículo partícipe de la democracia y de una matriz sustentable de desarrollo
Resumo:
Resumen: Este artículo procura dar cuenta del escenario legal y político abierto con la sanción de la ley de Derechos Políticos de la Mujer en 1947. Entre ellos, los mecanismos que el estado solventó con el empadronamiento de las mujeres y la confección de los documentos de identidad; la sanción de la normativa acorde al voto femenino en las provincias a fin de no desvirtuar el espíritu de ley nacional; y la ley de Estatutos de Partidos Políticos. Los aspectos políticos revelaban los cambios y reacomodamientos de la rama femenina que integraban los centros cívicos partidarios; la aparición en escena y el juego político que emprendieron algunas primeras damas provinciales. Todos estos temas son analizados a la luz de la incesante metamorfosis que adquiría Eva Perón, que troca de primera dama a líder popular.
Resumo:
Resumen: Las pautas que regulan la competencia por el acceso al poder son aspectos centrales para abordar el funcionamiento del sistema político democrático, las cuales se multiplican en un sistema federal o multinivel. Tras la apertura democrática el sistema político argentino redefinió su funcionamiento frente a la mayor autoridad de las provincias en materia de implementación de políticas públicas, recursos fiscales e independencia electoral respecto de la esfera nacional. La territorialización de la política (o desnacionalización) en parte explica los cambios sufridos por el bipartidismo nacional (PJ-UCR), el surgimiento de nuevos partidos políticos y la construcción de nuevas identidades políticas. Hasta el 2011, Río Negro fue de los pocos distritos con partido predominante diferente al partido predominante a nivel nacional, y el único que gobernó la Unión Cívica Radical de forma ininterrumpida desde 1983. El presente trabajo busca explorar el funcionamiento del sistema político rionegrino en el contexto de desnacionalización a partir de los siguientes interrogantes. ¿Cuán congruente o incongruente es el sistema de partido rionegrino al nacional? ¿Qué niveles registra la competencia partidaria en ambos sistemas? ¿Qué efectos tuvieron las reformas electorales sobre el funcionamiento del sistema de partidos subnacional en Río Negro? Dando respuesta a estas preguntas, este artículo busca aportar al estudio de la interaccion del sistema de partidos nacional y un sistema de partidos subnacional, en el marco de los sistemas políticos federales o multinivel