scholarly journals Recognition and Work in the Platform Economy: a Normative Reconstruction

Author(s):  
Max Visser ◽  
Thomas C. Arnold

AbstractThe rise of the platform economy in the past two decades (and neoliberal capitalist expansion and crises more in general), have on the whole negatively affected working conditions, leading to growing concerns about the “human side” of organizations. To address these concerns, the purpose of this paper is to apply Axel Honneth’s recognition theory and method of normative reconstruction to working conditions in the platform economy. The paper concludes that the ways in which platform organizations function constitutes a normative paradox, promising flexibility and autonomy while at the same time creating working conditions that undercut these promises. The paper ends with a critical discussion of Honneth’s approach, possible supplementing ideas and further lines of future research.

Marine Drugs ◽  
2020 ◽  
Vol 18 (9) ◽  
pp. 476
Author(s):  
Arijit Mondal ◽  
Sankhadip Bose ◽  
Sabyasachi Banerjee ◽  
Jayanta Kumar Patra ◽  
Jai Malik ◽  
...  

Cancer is at present one of the utmost deadly diseases worldwide. Past efforts in cancer research have focused on natural medicinal products. Over the past decades, a great deal of initiatives was invested towards isolating and identifying new marine metabolites via pharmaceutical companies, and research institutions in general. Secondary marine metabolites are looked at as a favorable source of potentially new pharmaceutically active compounds, having a vast structural diversity and diverse biological activities; therefore, this is an astonishing source of potentially new anticancer therapy. This review contains an extensive critical discussion on the potential of marine microbial compounds and marine microalgae metabolites as anticancer drugs, highlighting their chemical structure and exploring the underlying mechanisms of action. Current limitation, challenges, and future research pathways were also presented.


2021 ◽  
Author(s):  
vinayakumar R ◽  
Mamoun Alazab ◽  
Soman KP ◽  
Sriram Srinivasan ◽  
Sitalakshmi Venkatraman ◽  
...  

Deep Learning (DL), a novel form of machine learning (ML) is gaining much research interest due to its successful application in many classical artificial intelligence (AI) tasks as compared to classical ML algorithms (CMLAs). Recently, DL architectures are being innovatively modelled for diverse applications in the area of cyber security. The literature is now growing with DL architectures and their variations for exploring different innovative DL models and prototypes that can be tailored to suit specific cyber security applications. However, there is a gap in literature for a comprehensive survey reporting on such research studies. Many of the survey-based research have a focus on specific DL architectures and certain types of malicious attacks within a limited cyber security problem scenario of the past and lack futuristic review. This paper aims at providing a well-rounded and thorough survey of the past, present, and future DL architectures including next-generation cyber security scenarios related to intelligent automation, Internet of Things (IoT), Big Data (BD), Blockchain, cloud and edge technologies. <br>This paper presents a tutorial-style comprehensive review of the state-of-the-art DL architectures for diverse applications in cyber security by comparing and analysing the contributions and challenges from various recent research papers. Firstly, the uniqueness of the survey is in reporting the use of DL architectures for an extensive set of cybercrime detection approaches such as intrusion detection, malware and botnet detection, spam and phishing detection, network traffic analysis, binary analysis, insider threat detection, CAPTCHA analysis, and steganography. Secondly, the survey covers key DL architectures in cyber security application domains such as cryptography, cloud security, biometric security, IoT and edge computing. Thirdly, the need for DL based research is discussed for the next generation cyber security applications in cyber physical systems (CPS) that leverage on BD analytics, natural language processing (NLP), signal and image processing and blockchain technology for smart cities and Industry 4.0 of the future. Finally, a critical discussion on open challenges and new proposed DL architecture contributes towards future research directions.


2021 ◽  
Author(s):  
vinayakumar R ◽  
Mamoun Alazab ◽  
Soman KP ◽  
Sriram Srinivasan ◽  
Sitalakshmi Venkatraman ◽  
...  

Deep Learning (DL), a novel form of machine learning (ML) is gaining much research interest due to its successful application in many classical artificial intelligence (AI) tasks as compared to classical ML algorithms (CMLAs). Recently, DL architectures are being innovatively modelled for diverse applications in the area of cyber security. The literature is now growing with DL architectures and their variations for exploring different innovative DL models and prototypes that can be tailored to suit specific cyber security applications. However, there is a gap in literature for a comprehensive survey reporting on such research studies. Many of the survey-based research have a focus on specific DL architectures and certain types of malicious attacks within a limited cyber security problem scenario of the past and lack futuristic review. This paper aims at providing a well-rounded and thorough survey of the past, present, and future DL architectures including next-generation cyber security scenarios related to intelligent automation, Internet of Things (IoT), Big Data (BD), Blockchain, cloud and edge technologies. <br>This paper presents a tutorial-style comprehensive review of the state-of-the-art DL architectures for diverse applications in cyber security by comparing and analysing the contributions and challenges from various recent research papers. Firstly, the uniqueness of the survey is in reporting the use of DL architectures for an extensive set of cybercrime detection approaches such as intrusion detection, malware and botnet detection, spam and phishing detection, network traffic analysis, binary analysis, insider threat detection, CAPTCHA analysis, and steganography. Secondly, the survey covers key DL architectures in cyber security application domains such as cryptography, cloud security, biometric security, IoT and edge computing. Thirdly, the need for DL based research is discussed for the next generation cyber security applications in cyber physical systems (CPS) that leverage on BD analytics, natural language processing (NLP), signal and image processing and blockchain technology for smart cities and Industry 4.0 of the future. Finally, a critical discussion on open challenges and new proposed DL architecture contributes towards future research directions.


2021 ◽  
Vol 13 (11) ◽  
pp. 6355
Author(s):  
Jan Kratzer ◽  
Dodo zu Knyphausen-Aufseß ◽  
Gunter Festel

The increasingly negative effects of climate change are caused by humans and can be solved only by humans. In the past two decades, researchers have conducted considerable studies devoted to the human side of sustainable innovation. The present work aimed to provide a structured overview of these studies in the frame of the Special Issue: The Human Side of Sustainable Innovations. In contrast to the concepts capturing the human side, the definitions and operationalizations of sustainability and sustainable innovations are considerably ambiguous. We identified six journals that exemplify three factors on the human side of sustainable innovation and elucidate the concept. For their findings to be conclusive, researchers need to engage in significant efforts in investigating the differences in the interpretation and recognition of sustainability, in establishing consensus on the sustainable behavior of actors, and in executing comparable studies and experiments. Moreover, future research needs to establish generally accepted evaluations and measurements of sustainability.


Transilvania ◽  
2021 ◽  
pp. 42-49
Author(s):  
Buhle Mpofu

This discussion highlights how some African foreign migrants living in South Africa articulate resistance to exploitative and corrupt tendencies in what emerges as life affirming and death denying developmental discourses. This article triangulated data collected from a Module PRT112 – an Introduction to Missiology – with data which emerged from a study designed to interrogate the lived experiences of foreign migrants in Johannesburg South Africa. Framed within the postcolonial paradigm, the contribution is premised on the idea that the discourses of African migrants are a viable hermeneutical optic for a theological and developmental agenda which legitimises marginal voices of the poor. At the heart of this critical discussion is a statement; ‘I am not a fruit which fell from a tree,’ which emerged as a response to ward off and rebuke corrupt public officials who often demand bribes from foreign migrants as a way to keep them intimidated and confined to liminal working conditions in the informal South African economic sector. By interrogating the radical response ‘I am not a fruit’ alongside data which reflect hostility towards migrants, the study highlights religious resistance to economic exploitation and life denying practices. These articulations are located within the postcolonial resistance discourses which counter neoliberal and dehumanizing tendencies and the study concludes by drawing on Bosnian and Rwandan examples to caution against dehumanization of migrants as it sets parameters for catastrophic genocide and other forms of violence perpetrated in the past.


2011 ◽  
Vol 27 (2) ◽  
Author(s):  
Rien Huiskamp ◽  
Jos Sanders ◽  
Seth van den Bossche

Multiple jobs, necessity or challenge?Summary Multiple jobs, necessity or challenge?Summary In 2007 7% of the employees in the Netherlands have more than one paid job. This percentage has been increasing over the past decade. We feel that employees with a second job should be included in debates on flexible work. In international research two hypotheses have been developed to explain the second jobs phenomenon: the ‘hours constraint’ hypothesis and the ‘heterogeneous jobs’ hypothesis. In this article we use data from the Netherlands Working Conditions Survey 2007 (NWCS) to test these hypotheses.The first hypothesis, the hours constraint hypothesis, is partly confirmed for Dutch employees. The heterogeneous jobs hypothesis is fully rejected. Having more than one job is therefore considered more a necessity than a challenge. However, a lack of suitable data on second and third jobs might be one of the reasons for the rejection of the heterogeneous jobs hypothesis.For future research we suggest collecting and analyzing data on employees’ second jobs in order to find out what factors influence employees choice for a second job. Also we suggest analyzing whether or not taking up a second job is a way for employees to improve their general labor market position or a stepping stone for entrepreneurship.


Author(s):  
I. V. Bukhtiyarov

The article presents the results of the analysis of health, working conditions and prevalence of adverse production factors, the structure of the detected occupational pathology in the working population of the Russian Federation. The article presents Statistical data on the dynamics of the share of workplaces of industrial enterprises that do not meet hygienic standards, occupational morbidity in 2015-2018 for the main groups of adverse factors of the production environment and the labor process. The indicators of occupational morbidity over the past 6 years in the context of the main types of economic activity, individual subjects of the Russian Federation, classes of working conditions, levels of specialized occupational health care. The role of the research Institute of occupational pathology and occupational pathology centers in solving organizational, methodological and practical tasks for the detection, treatment, rehabilitation and prevention of occupational diseases is shown. The basic directions of activity in the field of preservation and strengthening of health of workers, and also safety at a workplace are defined.


2012 ◽  
Vol 163 (6) ◽  
pp. 240-246 ◽  
Author(s):  
Thomas A. Nagel ◽  
Jurij Diaci ◽  
Dusan Rozenbergar ◽  
Tihomir Rugani ◽  
Dejan Firm

Old-growth forest reserves in Slovenia: the past, present, and future Slovenia has a small number of old-growth forest remnants, as well as many forest reserves approaching old-growth conditions. In this paper, we describe some of the basic characteristics of these old-growth remnants and the history of their protection in Slovenia. We then trace the long-term development of research in these old-growth remnants, with a focus on methodological changes. We also review some of the recent findings from old-growth research in Slovenia and discuss future research needs. The conceptual understanding of how these forests work has slowly evolved, from thinking of them in terms of stable systems to more dynamic and unpredictable ones due to the influence of natural disturbances and indirect human influences. In accordance with this thinking, the methods used to study old-growth forests have changed from descriptions of stand structure to studies that address natural processes and ecosystem functions.


2019 ◽  
Vol 20 (5) ◽  
pp. 376-389 ◽  
Author(s):  
Sonali Mishra ◽  
Nupur Srivastava ◽  
Velusamy Sundaresan ◽  
Karuna Shanker

Background: Decalepis arayalpathra (J. Joseph and V. Chandras.) Venter is used primarily for nutrition besides its therapeutic values. Traditional preparations/formulations from its tuber are used as a vitalizer and blood purifier drink. The folklore medicinal uses cover inflammation, cough, wound healing, antipyretic, and digestive system management. A comprehensive review of the current understanding of the plant is required due to emerging concerns over its safety and efficacy. Objective: The systematic collection of the authentic information from different sources with the critical discussion is summarised in order to address various issues related to botanical identity, therapeutic medicine, nutritional usage, phytochemical, and pharmacological potentials of the D. arayalpathra. Current use of traditional systems of medicine can be used to expand future research opportunities. Materials and Methods: Available scripted information was collected manually, from peered review research papers and international databases viz. Science Direct, Google Scholar, SciFinder, Scopus, etc. The unpublished resources which were not available in database were collected through the classical books of ‘Ayurveda’ and ‘Siddha’ published in regional languages. The information from books, Ph.D. and MSc dissertations, conference papers and government reports were also collected. We thoroughly screened the scripted information of classical books, titles, abstracts, reports, and full-texts of the journals to establish the reliability of the content. Results: Tuber bearing vanilla like signature flavor is due to the presence of 2-hydroxy-4-methoxybenzaldehyde (HMB). Among five other species, Decalepis arayalpathra (DA) has come under the ‘critically endangered’ category, due to over-exploitation for traditional, therapeutic and cool drink use. The experimental studies proved that it possesses gastro-protective, anti-tumor, and antiinflammatory activities. Some efforts were also made to develop better therapeutics by logical modifications in 2-Hydroxy-4-methoxy-benzaldehyde, which is a major secondary metabolite of D. arayalpathra. ‘Amruthapala’ offers the enormous opportunity to develop herbal drink with health benefits like gastro-protective, anti-oxidant and anti-inflammatory actions. Results: The plant has the potential to generate the investigational new lead (IND) based on its major secondary metabolite i.e. 2-Hydroxy-4-methoxy-benzaldehyde. The present mini-review summarizes the current knowledge on Decalepis arayalpathra, covering its phytochemical diversity, biological potentials, strategies for its conservation, and intellectual property rights (IPR) status. Chemical Compounds: 2-hydroxy-4-methoxybenzaldehyde (Pubchem CID: 69600), α-amyrin acetate (Pubchem CID: 293754), Magnificol (Pubchem CID: 44575983), β-sitosterol (Pubchem CID: 222284), 3-hydroxy-p-anisaldehyde (Pubchem CID: 12127), Naringenin (Pubchem CID: 932), Kaempferol (Pubchem CID: 5280863), Aromadendrin (Pubchem CID: 122850), 3-methoxy-1,2-cyclopentanedione (Pubchem CID: 61209), p-anisaldehyde (Pubchem CID: 31244), Menthyl acetate (Pubchem CID: 27867), Benzaldehyde (Pubchem CID: 240), p-cymene (Pubchem CID: 7463), Salicylaldehyde (Pubchem CID: 6998), 10-epi-γ-eudesmol (Pubchem CID: 6430754), α -amyrin (Pubchem CID: 225688), 3-hydroxy-4-methoxy benzaldehyde (Pubchem CID: 12127).


2019 ◽  
Vol 20 (3) ◽  
pp. 251-264 ◽  
Author(s):  
Yinlu Feng ◽  
Zifei Yin ◽  
Daniel Zhang ◽  
Arun Srivastava ◽  
Chen Ling

The success of gene and cell therapy in clinic during the past two decades as well as our expanding ability to manipulate these biomaterials are leading to new therapeutic options for a wide range of inherited and acquired diseases. Combining conventional therapies with this emerging field is a promising strategy to treat those previously-thought untreatable diseases. Traditional Chinese medicine (TCM) has evolved for thousands of years in China and still plays an important role in human health. As part of the active ingredients of TCM, proteins and peptides have attracted long-term enthusiasm of researchers. More recently, they have been utilized in gene and cell therapy, resulting in promising novel strategies to treat both cancer and non-cancer diseases. This manuscript presents a critical review on this field, accompanied with perspectives on the challenges and new directions for future research in this emerging frontier.


Sign in / Sign up

Export Citation Format

Share Document