842 research outputs found

    On the social conditions of governance : social capital and governance in areas of limited statehood

    Get PDF
    Unlike what Hobbesian theories argue, the provision of governance is not necessarily undermined by a lack of statehood. Empirical findings show that – contrary to many voices in current debates on weak, failing, or failed states – various (non-state) actors provide governance even when statehood is limited. This paper addresses the puzzle of how to account for cases where governance exists although the state cannot or does not provide it. Transferring insights from political sociology to the analysis of such “governance without the state,” the paper holds that the way societies manage their affairs critically depends on social conditions, which are captured here following social capital theory. Working toward a political sociology of “governance without a state,” this paper links social capital, resulting in interpersonal trust, to social coordination underlying the provision of governance. In this context, governance is interpreted as a collective action game (“governance game”), in which socially embedded (collective) actors are seen as players whose behavior (in particular their decisions to cooperate) depends critically on their social capital endowments. The main argument is that specific types of social capital endowments facilitate – and, thus, explain – specific modes of social coordination in areas of limited statehood. Explorative in nature, conceptual and theoretical arguments will be developed that offer new perspectives to explain the variance and mechanisms of governance outside the OECD world

    Towards A Monetary Union in the Economic Community of West African States (ECOWAS): Prospects and Challenges"

    Get PDF
    Student Number : 0414488P - MA research report - School of Social Sciences - Faculty of HumanitiesThis study aims at highlighting the politics of international cooperation with respect to monetary integration in West Africa. Monetary integration was envisaged in the Economic Community of West African States (ECOWAS) when the organization was formed in 1975. Two decades after its formation, it was realized by member states that limited success had been achieved as far as the objectives of the organization were concerned. As a result, the ECOWAS Treaty was revised and significant decisions were made in 1993, and the call for a monetary union was reiterated. Factors which could have worked against the formation of a monetary union prior to 1993 changed in favour of monetary cooperation. The adoption of the Euro in the European Union and more especially by France, weakened the symbolic link of the CFA Franc zone to France, and to an extent reduced the French stigma, which had hitherto discouraged Anglophone countries from participating in an expanded monetary union with their Francophone counterparts. The democratic transition of Nigeria and the accession to power of a new leader who has shown commitment to regional integration, improved cooperation arrangements among ECOWAS states in working towards the formalization of a monetary union. The transformation from the Organization of African Unity (OAU) to the African Union (AU) and its strategy of creating a common African currency as well as the emergence of the New Partnership for Africa’s Development (NEPAD) provided extra motivations for African states to show more commitment towards integration. Based on the above factors, several positive steps have been taken towards the formalization of a monetary union in the community. The West African Monetary Zone (WAMZ) was realized in 2000 and more importantly, the West African Monetary Institute (WAMI) was created and started operating in the same year. The Institute was created to prepare the groundwork for the creation of the West African Central Bank. The above mentioned factors increased the prospects of forming a monetary union in the community but several challenges still remain. First there is the problem of the asymmetric nature of the economies in the region. Secondly, political instability is a major factor that militates against the formation of such a union. Domestic political instability in Nigeria, which is heightened by ethnic and religious differences as well as the asymmetric nature of her economy in relation to those of other states in the region, makes it difficult for a monetary union to revolve around her. This research project is centered on Treaties, statistical analysis, theories and concepts and literature from economic and financial institutions. We conclude by stating that the analysis here reflects the situation on the ground and provide lessons to member states of the community, prospects for monetary integration would be further improved if member states work coherently to overcome such challenges

    Social Capital and Governance in Areas of Limited Statehood

    Get PDF
    Im Gegensatz zu Hobb’schen Argumentationen ist die Bereitstellung von Governance nicht notwendigerweise an starke Staatlichkeit gebunden: Empirische Belege zeigen, dass verschiedene (nicht-staatliche) Akteure Governance- Leistungen trotz zumindest begrenzter Staatlichkeit bereitstellen – entgegen vieler Stimmen in zeitgenössischen Diskursen zu schwacher und gescheiterter Staatlichkeit. Der Aufsatz geht der Frage nach, wie die Fälle erklärt werden können, wo Governance erfolgreich bereitgestellt wird obwohl der Staat entweder keine Governance-Leistungen erbringt oder erbringen kann. Im Rahmen des Transfers von Forschungsergebnissen der Politischen Soziologie in die Analyse von „Governance ohne Staat“ geht der Aufsatz von der Annahme aus, dass Art und Weise wie Gesellschaften sich organisieren maßgeblich von deren sozialstruktureller Bedingtheit abhängen. Diese spezifiziert der Aufsatz mithilfe des Sozialkapitaltheorie. Auf dem Weg zu einer Politischen Soziologie der „Governance ohne Staat“, stellt der Aufsatz die Beziehung zwischen Sozialkapital, vor allem in seiner Ausprägung als interpersonelles Vertrauen, und sozialer Handlungskoordination als Grundlage von Governance her. In diesem Kontext wird die Bereitstellung von Governance als Spiel kollektiven Handelns verstanden („Governance Game“), in dem das Verhalten sozial-eingebetteter (kollektiver) Akteure (und insbesondere ihre Kooperationsentscheidungen) maßgeblich von dem Umfang ihres Sozialkapitals abhängen. Das zentrale Argument des Aufsatzes ist, dass spezifische Typen von Sozialkapital bestimmte Modi der sozialen Handlungskoordination in Räumen begrenzter Staatlichkeit ermöglichen und entsprechend erklären. Im Rahmen eines explorativen Zugangs werden konzeptuelle und theoretische Begründungen vorgebracht, die bei der Erklärung der Varianz und der Prozesse von Governance außerhalb der OECD-Welt neue Perspektiven eröffnen.Unlike what Hobbesian theories argue, the provision of governance is not necessarily undermined by a lack of statehood. Empirical findings show that – contrary to many voices in current debates on weak, failing, or failed states – various (non-state) actors provide governance even when statehood is limited. This paper addresses the puzzle of how to account for cases where governance exists although the state cannot or does not provide it. Transferring insights from political sociology to the analysis of such “gov- ernance without the state,” the paper holds that the way societies manage their affairs critically depends on social conditions, which are captured here following social capital theory. Working toward a political sociology of “governance without a state,” this paper links social capital, resulting in interpersonal trust, to social coordination underlying the provision of governance. In this context, governance is interpreted as a collective action game (“governance game”), in which socially embedded (collective) actors are seen as players whose behavior (in particular their decisions to cooperate) depends critically on their social capital endowments. The main argument is that specific types of social capital endowments facilitate – and, thus, explain – specific modes of social coordination in areas of limited statehood. Explorative in nature, con- ceptual and theoretical arguments will be developed that offer new perspectives to explain the variance and mechanisms of governance outside the OECD world

    Polyfiberquant software tool for cell state prediction

    Get PDF
    According to WHO, non-communicable diseases (NCDs) were responsible for 68% of all deaths globally in 2012, up from 60% in 2000. The four main NCDs are cardiovascular diseases, cancers, diabetes and chronic lung diseases. In most of the diseases, morphological and / or functional characteristics of cell facilitate researchers and clinicians to determine the cell state (i.e. diseased or healthy, disease state, etc). In recent years, high-resolution imaging approaches (ex. confocal microscopy) are used to study and understand the morphological characteristics of the cell.  In addition, there are few computational tools developed to process these high-resolution imaging images to identify the cell state. Polyfiberquant is one of the unique  software tool for cell state prediction. But the sensitivity and specificity of the tool is primarily dependent on the parameters used in the prediction.  Therefore, the primary goal of this study is to find the best parameters that can be used in Polyfiberquant tool that result in reliable cell state prediction using confocal microscopy images. Secondarily, the study will also determine the limitations of this tool

    Single therapeutic and supratherapeutic doses of sacubitril/valsartan (LCZ696) do not affect cardiac repolarization

    Get PDF
    Purpose: Sacubitril/valsartan (LCZ696) is a first-in-class angiotensin receptor neprilysin inhibitor (ARNI) indicated to reduce the risk of cardiovascular death and hospitalization for heart failure in patients with chronic heart failure (NYHA class II–IV) and reduced ejection fraction. This study was aimed to evaluate the effect of single oral therapeutic (400 mg) and supratherapeutic (1200 mg) doses of LCZ696 on cardiac repolarization. Method: This randomized double-blind crossover study in healthy male subjects compared the effect of therapeutic and supratherapeutic doses of LCZ696 with placebo and moxifloxacin 400 mg (open-label treatment) as positive control. The primary assessment was mean baseline- and placebo-corrected QTcF (∆∆QTcF; Fridericia correction). Additional assessments included the ∆∆QTcB (Bazett’s correction), PR interval, QRS duration, heart rate (HR), LCZ696 pharmacokinetics, pharmacokinetic/pharmacodynamic relationships, and safety. Results: Of the 84 subjects enrolled, 81 completed the study. The maximum upper bound of the two-sided 90 % confidence interval for ∆∆QTcF for LCZ696 400 mg and 1200 mg were <10 ms, and assay sensitivity was confirmed with moxifloxacin. No relevant treatment-emergent changes were observed in any of the ECG-derived parameters with LCZ696 or placebo, and the incidence of adverse events was comparable among the treatment groups. Conclusion: Single therapeutic and supratherapeutic doses of LCZ696 did not affect cardiac repolarization as defined by the E14 ICH guidelines

    Guarding the Sacred Fires: Elizabeth E. Farrell\u27s Contributions to the Creation of Special Education in New York City

    Get PDF
    The department Farrell founded became a model for those that followed, causing a ripple effect in the practice of teaching and the organization of school systems across the United States. Further, Farrell\u27s involvement in professional organizations such as the Council for Exceptional Children and the New York State Psychological Association established the basis for a special education professional network, still in existence---and thriving-- today. Although a few short biographical pieces on Farrell are available, and she is referenced in numerous journal articles in the area of special education history, there has been no detailed account of Farrell\u27s life and accomplishments. Relying on archival materials from the Council for Exceptional Children and Teachers College, as well as information provided by family, members, universities, and colleagues, this investigation details Farrell\u27s personal history and work in the area of special needs. It is hoped that this work contributes to that knowledge base

    Dispersion, Self-assembly, And Rheological Characterization of Dna-complexed Boron Nitride Nanosystems

    Get PDF
    Stable liquid dispersions and the subsequent self-assembly of boron nitride (BN) nanostructures are a vital precursor for translating their exceptional electrical, mechanical, thermal, and optical properties into large-area assemblies with controlled properties. However, achieving individually dispersed BN nanomaterials including BN nanotubes (BNNTs) and hexagonal BN nanosheets (hBN) in almost any solvent has been hindered by strong van der Waals interactions among nanomaterials. In this dissertation work, we reported a comprehensive study on developing an efficient dispersion, self-assembly, and rheological characterization of BN nanomaterials. Particularly, we reported a highly efficient dispersions of BNNTs through noncovalent complexation while exploiting the solvent-nanotube-dispersant interactions using biopolymer DNA and various solvents including water and alcohol. The subsequent purification by membrane filtration revealed that the raw BNNT material constitutes ~ 45.2 mass % of non-nanotube impurities. Ofthe alcohols tested, isopropyl alcohol (IPA) was found to be an efficient solvent, resulting in a dispersion yield of as high as ~ 48 % nanotubes in an IPA/water mixture with 60 vol % IPA by mild bath sonication. Molecular dynamics simulations further revealed that IPA played a pseudosurfactant role in solvating BNNTs by replacing water molecules in the solvation layer while IPA is added. The dispersion techniques developed for BNNTs has been extended for aqueous dispersions of v hBN as well. Additionally, we demonstrated the formation of solid BNNT films comprised of spontaneously aligned nanotubes through drop drying of DNA-wrapped BNNTs. The overall properties of solid BNNT assemblies are directly influenced by the physical properties of nanotubes, including the tube lengths. Conventional surface deposition method by imaging dried samples on a substrate revealed inconsistencies in the average lengths of the parent BNNTs coated by DNA and SDC, due to the differential binding of DNA-BNNTs to a substrate. Therefore, we determined the nanotube lengths using an alternative method - rheological characterization - by measuring the viscosity of dilute dispersions of DNA-BNNTs, highlighting the Brownian rigid rod behavior of BNNTs. Combined, our study on the dispersion, self-assembly and rheology of BN nanomaterials paved a way for producing BN assemblies with controlled properties while offering green chemistry and multifunctionality

    HANDLING WORK FROM HOME SECURITY ISSUES IN SALESFORCE

    Get PDF
    Security is a vital component when it is identified with an endeavor record or our genuine materials. To protect our home or valuable things like gold, cash we use bank storage administrations or underground secret storage spaces at home. Similarly, IT enterprises put tremendous measure of capital in expanding security to its business and the archives. Associations use cryptography procedures to get their information utilizing progressed encryption calculations like SHA-256, SHA-512, RSA-1024, RSA-2048 pieces’ key encryption and Elliptic Curve Cryptography (ECC) calculations. These industry standard calculations are difficult to break. For instance, to break RSA-2048-piece encryption key, an old-style PC needs around 300 trillion years. As indicated by the continuous examination, a quantum PC can break it in 10seconds, yet such a quantum PC doesn\u27t yet exist. Despite the fact that these cryptographic calculations guarantee an awesome degree of safety, there will be dependably a space for breaking the security. Programmers will attempt new techniques to break the security. Thus, the association likewise should continue to utilize new strategies to build the level and nature of the security. Now it is time to check how the security aspect is taken care of when the IT employees are at work from home. The 2020 year has made many professionals work from home because of the Covid-19 pandemic. The Covid-19 has transformed almost all organizations to work from home, this has become standard advice, and technology plays an important role during work from home to monitor the employee works and provide security when the work is being carried away from their respective organization. Employees\u27 information security awareness will become one of the most important parts of safeguarding against nefarious information security practices during this work from home. Most of the workers like the expediency of work from home and the flexibility provided for the employees. But in this situation, workers need guarantees that their privacy is secured when using company laptops and phones. Cyber security plays an important role in maintaining a secured environment when working from home. This work focusses on managing the security break attack in the course of work from home. The focus of the study is on dealing with security breaches that occur when salespeople operate from home. The problem of security isn\u27t new. Security issues existed prior to the lockdown or pandemic, but because the staff was working from the office at the time, the system administrator was available to address them. However, how can an employee\u27s laptop and account be secured when working from home? MFH\u27s salesforce has leveraged a variety of innovative technologies to address security concerns during their tenure. Because the IT behemoth Salesforce has made it possible for all employees, including freshly hired ones, to seek WFH on a permanent basis. To address the security breach difficulties faced by employees, the organization used a number of new approaches, including tracking working hours, raising password difficulty, employing VPN (virtual private network), mandating video during meetings, continuously checking right to use control, and MFA (multi-factor authentication). Improvement of existing multi-factor authentication (MFA) is the focused topic discussed in the thesis. To add an additional step of protection to the login process Blockchain technology is proposed and to identify the employee identification a hybrid recognition model is proposed using face and fingerprint recognition. This leads to the employee going through multiple processes to authenticate his or her identity in numerous ways in order to access the business laptop. This procedure entails connecting his or her laptop to his or her mobile phone or email account. Keywords: MFA, WFH, Cyber Security, Encryption, Decryption
    corecore