341 |
Zero Tolerance : What’s the Problem Represented to be?Ekman, Sofia January 2024 (has links)
In 2003 a proclamation of Zero Tolerance towards sexual exploitation and abuse was made by Secretary General of United Nations Kofi Annan. The policy have been around for 20 years and so has the scandals how come? To find out Bacchis (2009) What’s the problem represented to be? approach to policy analysis was chosen to find out what strategies was applied to manage zero tolerance. The identified strategies are a systemwide implementation of the principles of conduct, a victim centred approach including procedures for reporting, and finally an accountability framework. Identified silences are how to change an organisational culture of tolerance, how to restore confidence and how to manage mixed messages.
|
342 |
Digital Capability and Business Model Reconfiguration : a co-evolutionary perspectiveGolshan, Behrooz January 2018 (has links)
While IT-enabled innovations continue to disrupt long-lasting industries, emerging concepts and theories seek to explain implications of digitalisation on its value, competition and organisation. Over the past two decades, the notions of digital capability and business model reconfiguration as antecedents of organisational performance have become increasingly influential in the Information Systems literature. Appreciation of the role of strategic agility, external resources and interorganisational collaborations on IT-enabled value propositions has shaped the core logic and fundamental assumptions of the two aforementioned concepts. Nevertheless, the relationship between digital capability and business model reconfiguration remains underinvested and largely elusive. In order to reconcile such fragmented literature, the aim of this study is to investigate the coevolutionary dynamics of digital capability and business model reconfigurations. Digital capability reflects on the organisational ability to identify IT-enabled opportunities and deploy IS/IT to mobilise resources and structures in order to exploit those opportunities. Business model reconfiguration encapsulates management agenda to elevate value propositions for customers, partners and other stakeholders in order to create and capture value. It entails altering organisational resources and processes to enable such value propositions. Empirical data that is used in this thesis is gathered from an insurance company and contains information about the internal and external contexts, decisions, actions and performance between 2008 and 2016. There are four major phases during this time period. As identified, during each, the company revised its strategic intentions, invested in new IS/IT and human resources and reconfigured its business model. Results of this study illustrate that organisational digital capability drives strategic intentions for co-exploration and co-exploitation of value with partners. Such emerging strategies shape the configuration of the firm’s business model, which in turn leads to investments for generating the required IS competencies. This process increases the organisational digital capability, which affects the future cycles. Development of each IS competency is a result of co- exploration strategies. It is likely that such IS competencies are leveraged for co-exploitation in the future phases. In addition, Business-to-Business (B2B) IS competencies are instrumental in operationalising business models: however, as the number of partners grow and configuration of business models change, dyadic connections are likely to be replaced by standard ones. Strategies of co-exploration and co-exploitation could lead to innovative, adoptive or evolutionary business model reconfigurations. However, for incumbent organisations, business model innovation seems to follow several business model adaptations and evolutions. That is, a great deal of organisational learning and tinkering with business models, strategic intentions and technological backbone is needed to innovate business models. The final contribution of this research is the analytical model devised for exploring the essence of strategic decision making in dynamic environments. Based on the Appreciative Systems Model, the model illustrates how the perception of the constant flux of events and ideas leads to strategic intentions based on value and reality judgments, which in turn triggers action to operationalise those understandings. Both formulating the intentions and executing them will change future events, perceived ideas and emerging intentions based on evolving values and standards.
|
343 |
An Examination of the Instability and Exploitation in Congo From King Leopold II's Free State to the 2nd Congo WarBeal, Baldwin 01 December 2014 (has links)
This thesis will analyze the Congo from King Leopold II's Free State to the 2nd Congo War. After a thorough investigation of the colonial period, this thesis will analyze the modern period. This thesis contends that the underdevelopment of the Congo, and its continuing warfare and poverty are the consequences of an exploitative colonial history. To be sure, King Leopold II of Belgium created the template for administering the Congo through the installation of concessionary companies that were more interested in harvesting huge profits than creating the conditions for a self-sustaining Congolese economy. Indeed, the policies implemented by King Leopold not only created the framework for the exploitation of the Congo after the cessation of the Free State, and set the stage for Congo's current state of instability of warfare.
|
344 |
“That Blood is Real Because I Just Can’t Fake It”: Conceptualizing, Contextualizing, Marketing, and Delivering Gore in Herschell Gordon Lewis’s Blood FeastFeshami, Kevan A. 16 August 2010 (has links)
No description available.
|
345 |
Sex Trafficking in the United States: An Exploratory Study of the Experiences of International and Domestic Women Working in the Sex Industry in the U.S.Hernandez, Carolina 28 July 2014 (has links)
No description available.
|
346 |
Mechanisms of Visual Relational ReasoningHayes, Taylor Ray January 2014 (has links)
No description available.
|
347 |
Characterizing Remote Sensing Data Compression Distortion for Improved Automated Exploitation PerformanceMcGuinness, Christopher 31 May 2018 (has links)
No description available.
|
348 |
Barriers for Victims of Sex Trafficking and Sexual Exploitation in Accessing Medical Care and Counseling Services through the Lens of Frontline ProvidersHountz, Rosanne K. 01 May 2018 (has links)
No description available.
|
349 |
Data Driven High Performance Data AccessRamljak, Dusan January 2018 (has links)
Low-latency, high throughput mechanisms to retrieve data become increasingly crucial as the cyber and cyber-physical systems pour out increasing amounts of data that often must be analyzed in an online manner. Generally, as the data volume increases, the marginal utility of an ``average'' data item tends to decline, which requires greater effort in identifying the most valuable data items and making them available with minimal overhead. We believe that data analytics driven mechanisms have a big role to play in solving this needle-in-the-haystack problem. We rely on the claim that efficient pattern discovery and description, coupled with the observed predictability of complex patterns within many applications offers significant potential to enable many I/O optimizations. Our research covers exploitation of storage hierarchy for data driven caching and tiering, reduction of distance between data and computations, removing redundancy in data, using sparse representations of data, the impact of data access mechanisms on resilience, energy consumption, storage usage, and the enablement of new classes of data driven applications. For caching and prefetching, we offer a powerful model that separates the process of access prediction from the data retrieval mechanism. Predictions are made on a data entity basis and used the notions of ``context'' and its aspects such as ``belief'' to uncover and leverage future data needs. This approach allows truly opportunistic utilization of predictive information. We elaborate on which aspects of the context we are using in areas other than caching and prefetching different situations and why it is appropriate in the specified situation. We present in more details the methods we have developed, BeliefCache for data driven caching and prefetching and AVSC for pattern mining based compression of data. In BeliefCache, using a belief, an aspect of context representing an estimate of the probability that the storage element will be needed, we developed modular framework BeliefCache, to make unified informed decisions about that element or a group. For the workloads we examined we were able to capture complex non-sequential access patterns better than a state-of-the-art framework for optimizing cloud storage gateways. Moreover, our framework is also able to adjust to variations in the workload faster. It also does not require a static workload to be effective since modular framework allows for discovering and adapting to the changes in the workload. In AVSC, using an aspect of context to gauge the similarity of the events, we perform our compression by keeping relevant events intact and approximating other events. We do that in two stages. We first generate a summarization of the data, then approximately match the remaining events with the existing patterns if possible, or add the patterns to the summary otherwise. We show gains over the plain lossless compression for a specified amount of accuracy for purposes of identifying the state of the system and a clear tradeoff in between the compressibility and fidelity. In other mentioned research areas we present challenges and opportunities with the hope that will spur researchers to further examine those issues in the space of rapidly emerging data intensive applications. We also discuss the ideas how our research in other domains could be applied in our attempts to provide high performance data access. / Computer and Information Science
|
350 |
Who Are the Victims? : Scrutinizing the Discursive Representation of Victims in UN Measures Addressing Sexual Exploitation and Abuse by Peacekeepers and PersonnelKarhunen, Meri January 2024 (has links)
The purpose of the United Nations (UN) peace operations is to help states navigate a path towards stability and sustainable peace, yet sexual exploitation and abuse perpetrated by the peacekeepers and other personnel is often an unintended consequence of the missions. Though the UN has employed several victim-centred measures to address the issue, peacebuilding practices often employ a simplistic discourse about the victims that recognizes only certain type of ‘ideal’ victims. It risks disregarding the different conceptualisations of justice that victims have, along with their individual wants and needs. Leaning on van Dijk’s view on social power that deems institutions as locations producing dominant discourses and influencing people’s minds, it is crucial to study which discourses the UN engages with. Thus, through a methodological combination of critical discourse analysis and policy analysis, this study scrutinizes the discourses about the victims present in the resolutions and training materials that specifically apply a victim-centred approach. The findings indicate that the discourses entail characteristics of both ideal and complex political victim discourses, and that above all, the UN positions itself as the saviour of the victims. As this discourse is likely to continue reproducing power imbalances that place victims into a dependant position, this study emphasises a serious need for re-evaluation of the UN’s own discursive positioning.
|
Page generated in 0.0802 seconds