scholarly journals Making Communism Work: Sinicizing a Soviet Governance Practice

2019 ◽  
Vol 61 (3) ◽  
pp. 535-562
Author(s):  
Elizabeth J. Perry

AbstractAmong various grassroots governance practices adopted by the Chinese Communist Party (CCP), few have proven more adaptive and effective than the deployment of work teams—ad hoc units appointed and directed by higher-level Party and government organs and dispatched for a limited time to carry out a specific mission by means of mass mobilization. Yet, perhaps because work teams straddle the boundary between formal and informal institutions, they have received scant analytical attention. While work teams figure prominently in narrative accounts of the major campaigns of Mao's China, their origins, operations, and contemporary implications have yet to be fully explored. This article traces the roots of Chinese work teams to Russian revolutionary precedents, including plenipotentiaries, shock brigades, and 25,000ers, but argues that the CCP's adoption and enhancement of this practice involved creative adaptation over a sustained period of revolutionary and post-revolutionary experimentation. Sinicized work teams were not only a key factor in securing the victory of the Chinese Communist revolution and conducting Maoist mass campaigns such as Land Reform, Collectivization, and the Four Cleans; they continue to play an important role in the development and control of grassroots Chinese society even today. As a flexible means of spanning the center-periphery divide and combatting bureaucratic inertia, Chinese work teams, in contrast to their Soviet precursors, contribute to the resilience of the Communist party-state.

1987 ◽  
Vol 46 (2) ◽  
pp. 279-303 ◽  
Author(s):  
Stephen C. Averill

AbstractIn August 1927 the Chinese Communist Party (CCP) in Jiangxi seemed moribund, yet by the end of 1930 the movement was larger and more active than ever before. How did this occur? Past studies have especially emphasized Mao Zedong's famous rural guerrilla strategy, but this was only part of the story. Equally significant was the little-studied success of members of the Jiangxi hill-country elite who were also in the CCP in using established schools and educational societies, time-honored traditions of local strongman behavior, and existing bandit–secret society gangs to build many localized base areas. Such techniques were congenial to CCP leaders and essential to the movement's survival in the early days when its prestige and material resources were at a very low ebb, and when radical reforms would almost certainly have failed. Nevertheless, this strategy also fostered parochial attitudes and organizational weaknesses that clashed with the later efforts of Mao and his allies to carry out mass mobilization and fundamental land reform. Only after a prolonged and violent crisis within the base areas did the “Maoist” policies vital for the revolution's long-term growth begin to overcome the policies of elite coalition building that had been necessary for the movement to obtain its initial foothold in the Jiangxi hill country.


2018 ◽  
Vol 5 (1) ◽  
pp. 99-138
Author(s):  
Qingyan Meng

The Land Survey Movement ( chatian yundong) led by the Communist Party of China (CPC) in 1933 incorporated, for the first time, quantified measurements into land reform. This became an established practice in the newly liberated areas after 1946 as well as in the nationwide land reform after the 1949 Liberation. The existing research on land reform has paid little attention to this important quantification method used to define rural social classes. Even those who did pay attention were mostly interested in the policy side of the practice. This study focuses on the architect of this quantification method – Wang Guanlan. Through historical archives, memoirs, and journal articles and documents, Wang's personal background, his education, and his involvement in the communist revolution are thoroughly examined to reach an accurate understanding of the person and the practice he was responsible for. In so doing, we gain some insights into the ‘technocrats’ in the CPC during that period and their pragmatism, the way in which the CPC turned a theoretical and ideological concept of ‘class’ into an applicable measurement to define rural classes, and the limitations associated with such a practice.


2016 ◽  
Vol 45 (2) ◽  
pp. 28-48 ◽  
Author(s):  
Isaac Dery

Women’s access to and control over productive resources, including land, has increasingly been recognized in global discussions as a key factor in reducing poverty, ensuring food security and promoting gender equality. Indeed, this argument has been widely accepted by both feminists and development theorists since the 1980s. Based on qualitative research with 50 purposively selected men and women, this study explored the complexity of women’s access to and control over land within a specific relationship of contestations, negotiations, and manipulations with men. Data were analyzed using thematic analysis. While theoretically, participants showed that women’s [secure] access to and control over land has beneficial consequences to women themselves, households and the community at large, in principle, women's access and control status was premised in the traditional framework which largely deprives women, equal access and/or control over the land. The study indicates that even though land is the most revered resource and indeed, the dominant source of income for the rural poor, especially women, gender-erected discrimination and exclusion lie at the heart of many rural women in gaining access to land. This study argues that women's weak access rights and control over land continue to perpetuate the feminization of gender inequality–while men were reported to possess primary access and control over land as the heads of households, women were argued to have secondary rights due to their ‘stranger statuses’ in their husbands’ families. Overall, the degree of access to land among women was reported to be situated within two broad contexts–marriage and inheritance.


2021 ◽  
Vol 22 (15) ◽  
pp. 8139
Author(s):  
Tomoko Tadokoro ◽  
Asahiro Morishita ◽  
Tsutomu Masaki

Remarkable progress has been made in the treatment and control of hepatitis B and C viral infections. However, fundamental treatments for diseases in which liver fibrosis is a key factor, such as cirrhosis, alcoholic/nonalcoholic steatohepatitis, autoimmune hepatitis, primary biliary cholangitis, and primary sclerosing cholangitis, are still under development and remain an unmet medical need. To solve this problem, it is essential to elucidate the pathogenesis of liver fibrosis in detail from a molecular and cellular perspective and to develop targeted therapeutic agents based on this information. Recently, microRNAs (miRNAs), functional RNAs of 22 nucleotides, have been shown to be involved in the pathogenesis of liver fibrosis. In addition, extracellular vesicles called “exosomes” have been attracting attention, and research is being conducted to establish noninvasive and extremely sensitive biomarkers using miRNAs in exosomes. In this review, we summarize miRNAs directly involved in liver fibrosis, miRNAs associated with diseases leading to liver fibrosis, and miRNAs related to complications of cirrhosis. We will also discuss the efficacy of each miRNA as a biomarker of liver fibrosis and pathology, and its potential application as a therapeutic agent.


2021 ◽  
Vol 21 (1) ◽  
pp. 1-32
Author(s):  
Vikram Mehta ◽  
Daniel Gooch ◽  
Arosha Bandara ◽  
Blaine Price ◽  
Bashar Nuseibeh

The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired access to individuals’ physical space or their information, anytime and anywhere, raising potentially serious privacy concerns. Individuals lack awareness and control of the vulnerabilities in everyday contexts and need support and care in regulating disclosures to their physical and digital selves. Existing GUI-based solutions, however, often feel physically interruptive, socially disruptive, time-consuming and cumbersome. To address such challenges, we investigate the user interaction experience and discuss the need for more tangible and embodied interactions for effective and seamless natural privacy management in everyday UbiComp settings. We propose the Privacy Care interaction framework, which is rooted in the literature of privacy management and tangible computing. Keeping users at the center, Awareness and Control are established as the core parts of our framework. This is supported with three interrelated interaction tenets: Direct, Ready-to-Hand, and Contextual . Direct refers to intuitiveness through metaphor usage. Ready-to-Hand supports granularity, non-intrusiveness, and ad hoc management, through periphery-to-center style attention transitions. Contextual supports customization through modularity and configurability. Together, they aim to provide experience of an embodied privacy care with varied interactions that are calming and yet actively empowering. The framework provides designers of such care with a basis to refer to, to generate effective tangible tools for privacy management in everyday settings. Through five semi-structured focus groups, we explore the privacy challenges faced by a sample set of 15 older adults (aged 60+) across their cyber-physical-social spaces. The results show conformity to our framework, demonstrating the relevance of the facets of the framework to the design of privacy management tools in everyday UbiComp contexts.


2017 ◽  
Vol 28 (1) ◽  
pp. 24-49 ◽  
Author(s):  
Yafei Zhang ◽  
Li Chen

Purpose The purpose of this study is to explore possible factors leading to a successful mediation in Chinese mediation shows. In China, media always play an indispensable role in information dissemination, morality advocacy and policy explanation. Design/methodology/approach This paper employed content analysis of 166 episodes of one representative mediation show, Gold Medal Mediation, and regression technique in data analysis. Findings Results of ordinal regression suggested that “secret talking”, rather than transparency, between disputants had significant influence on successful mediation. Function of mediators is limited in reaching full mediation. The effective factors leading to full mediation include compromise of rights, secret talking, attitude of the observer cohort. It suggests that the role of mediator is limited, rather than being over-exaggerated, in successful mediation. The successful mediation is largely dependent on disputants’ motivations. Additionally, “compromise of rights” by disputants is a key factor in solving disputes. Research limitations/implications Findings of this study revealed the role of Chinese mediation shows in propagating mediation in contemporary Chinese society and supporting upheld morality values. Due to the nature of the chosen mediation show, some disputes take more than one episode to solve. However, this study looks at each episode without considering the integrity of the dispute. That is, if the disputes take two episodes, the coder codes the two episodes as two separate disputes instead of looking at it as one dispute. Originality/value By exploring various aspects of mediations shows, including the role of mediators, disputants and a cohort of observers, this study can both explicitly show predicted factors to successful mediations on the shows, and can implicitly examine the power and perceived justification of mediation in contemporary China via media.


2021 ◽  
Vol 13 (04) ◽  
pp. 21-37
Author(s):  
Priyanka Pandey ◽  
Raghuraj Singh

Mobile Ad hoc Network (MANET) is mainly designed to set up communication among devices in infrastructure-less wireless communication network. Routing in this kind of communication network is highly affected by its restricted characteristics such as frequent topological changes and limited battery power. Several research works have been carried out to improve routing performance in MANET. However, the overall performance enhancement in terms of packet delivery, delay and control message overhead is still not come into the wrapping up. In order to overcome the addressed issues, an Efficient and Stable-AODV (EFST-AODV) routing scheme has been proposed which is an improvement over AODV to establish a better quality route between source and destination. In this method, we have modified the route request and route reply phase. During the route request phase, cost metric of a route is calculated on the basis of parameters such as residual energy, delay and distance. In a route reply phase, average residual energy and average delay of overall path is calculated and the data forwarding decision is taken at the source node accordingly. Simulation outcomes reveal that the proposed approach gives better results in terms of packet delivery ratio, delay, throughput, normalized routing load and control message overhead as compared to AODV.


2013 ◽  
Vol 753-755 ◽  
pp. 1382-1385
Author(s):  
Xin Wang ◽  
Han Fu ◽  
Du Chen ◽  
Shu Mao Wang

Harvesting speed is a key factor that influences working quality, utilization and harvest efficiency of the working process of grain combine harvester. In order to solve multi-objective control and poor anti-interference ability of measurement system in combine harvester, this paper uses optimization theory and error analysis theory to integrate analyze multi-source disturbance of data which is acquired in measurement and control system. The optimum working state control algorithm which proposes by this paper has better robust and anti-interference features, and what is more, it can be targeted by low yield loss, high productivity and low power cost. It provides theoretical basis and data support for the domestic agricultural harvesting machine, which also is an effective means to heighten the automatic level of the agricultural information technology. Keywords: Grain Combine harvester; Multiple control strategy; Anti-interference ability


2009 ◽  
Vol 9 (1) ◽  
pp. 1850158 ◽  
Author(s):  
Mirela Gheorghe ◽  
Pavel Nastase ◽  
Dana Boldeanu ◽  
Aleca Ofelia

Relatively new in Romania, IT governance is defined as procedures and policies established in order to assure that the IT system of an organization sustains its goals and strategies. This bundle of policies and procedures, following the best practices in the area, intends to guide and control the IT function in order to add value to the organization and to minimize IT risks. The purpose of the research is to identify the measure in which the IT governance practices are implemented to the level of the financial institutions in Romania. The goal of this paper is a comparative analysis for implementing IT governance using data offered by the IT Governance Institute. This institute makes every year a study (IT Governance Global Status Report – 2006) to determine a sense of priorities and to develop actions for implementing IT governance, using data which acknowledges once more the need for all organizations to have tools and services to assure an efficient IT governance. In this way, the research will analyze, in the field of Romanian financial institutions, the most serious IT problems pointed out by the respondents from the last year, the most efficient measures considered by top management for resolving problems pointed out, the best used practices in IT governance and the most used frameworks for implementing IT governance practices.


Sign in / Sign up

Export Citation Format

Share Document