The politics of the Hajj organisation in Senegal: security, legitimation and clientelism

2021 ◽  
Vol 59 (1) ◽  
pp. 1-20
Author(s):  
Cédric Jourde ◽  
Marie Brossier ◽  
Muriel Gomez-Perez

ABSTRACTThis article analyses how the state in Senegal has managed the hajj since the liberalisation era in the early 2000s. Although the essence of the hajj is religious, it is also deeply political and requires that the state manages complex relations with pilgrims, religious leaders, private travel agencies, politicians and Saudi authorities. This article argues that three inter-related imperatives structure the conduct of the Senegalese state: a security imperative, a legitimation imperative, and a clientelistic imperative. Security concerns lead the state to monitor and control pilgrims travelling to Mecca. Legitimation is seen in the collaborative relations with Sûfi orders and in the framing of the hajj organisation as a ‘public service’. Finally, given the magnitude of financial and symbolic resources attached to the hajj, clientelistic relations are constitutive of state officials’ actions. Overall, despite the post-2000 liberalisation of the hajj, the state has maintained its role as a gatekeeper, regulator and supervisor.

2018 ◽  
Vol 64 (3) ◽  
pp. 385-403
Author(s):  
Amitabh Rajan

The state, which regulates conduct in several ways, also regulates through the process of agencification: it creates independent regulatory authorities to set the market right, improve public service accountabilities, ensure proper alignment of incentives, encourage institutional innovation, integrate adequate domain knowledge and bring procedural fairness into the system. As a consequence, there are institutions with a unique administrative identity that are structurally situated at an arm’s length from the control of the state and therefore they are autonomous functionally. It is not only a unique situation in institutional terms but also a matter of establishing balance between autonomy and control in granting justice to the stakeholders. This article examines the realities of the precept in India and, then, reflects on the issues of reform. It keeps the comparative context on regulation in view, particularly the situation since the 2008 Global Financial Crisis and the lessons learnt by the holders of power in democracies.


Author(s):  
Shane Doyle

Uganda's system of recording births and deaths was unusually comprehensive by colonial African standards, but colonial registration struggled to assign individuals a permanent, accurate identity. Many Ugandans used different names at different times in their dealings with officialdom, and local elites were complicit in this reidentification. The flexibility which is an inevitable component of a name-based registration system in East Africa served to alleviate social tension and exclusion. The possession of multiple names was advantageous to the weak, and could benefit rural elites, but it obstructed the state in its desire to monitor and control its population. The rise of biometric systems of identification is in part designed to bypass the naming problem, but also reflects the growing influence on African governments of two contradictory trends: the tying of aid to concepts of universal rights, and growing awareness of the potential of technology to undermine challenges to governmental authority.


1970 ◽  
Vol 13 (2) ◽  
Author(s):  
Pat Walsh

The objective of this paper is to identify and discuss the Principal industrial relations issues that have emerged in the first year of operation of several of the new state-owned enterprises (SOEs). The paper does not cover all the SOEs, nor does it pretend to analyse all the industrial relations issues of the first year of their operation. It is based on research and interviews conducted with unions and management in 6 of the SOEs - Electricorp, Forestrycorp, Airwayscorp, NZ Post, Telecom and Postbank. Its focus is nat on a detailed analysis of the agreements negotiated in the new corporations, but rather upon the natzue of the relationships that have emerged there. The SOEs were established as a Policy decision to shift state trading enterprises away from the public service orientation inherent in their status as departments of state to a new emphasis upon commercial criteria. The issue I wish to address in this paper is the extent to which the character of industrial relations in the SOEs has reflected this shift in orientation.


2014 ◽  
Vol 91 (4) ◽  
pp. 43-55
Author(s):  
Scott Pittman

The story of anti-communism in California schools is a tale well and often told. But few scholars have appreciated the important role played by private surveillance networks. This article examines how privately funded and run investigations shaped the state government’s pursuit of leftist educators. The previously-secret papers of Major General Ralph H. Van Deman, which were opened to researchers at the National Archives in Washington, D.C., only a few years ago, show that the general operated a private spy network out of San Diego and fed information to military, federal, and state government agencies. Moreover, he taught the state government’s chief anti-communist bureaucrat, Richard E. Combs, how to recruit informants and monitor and control subversives. The case of the suspicious death of one University of California, Los Angeles student – a student that the anti-communists claimed had been “scared to death” by the Reds – shows the extent of the collaboration between Combs and Van Deman. It further illustrates how they conspired to promote fear of communism, influence hiring and firing of University of California faculty, and punish those educators who did not support their project. Although it was rarely successful, Combs’ and Van Deman’s coordinated campaign reveals a story of public-private anticommunist collaboration in California that has been largely forgotten. Because Van Deman’s files are now finally open to researchers, Californians can gain a much more complete understanding of their state bureaucracy’s role in the Red Scare purges of California educators.


2013 ◽  
Vol 62 (1) ◽  
pp. 23-31 ◽  
Author(s):  
Maria Mrówczyńska

Abstract The paper attempts to determine an optimum structure of a directional measurement and control network intended for investigating horizontal displacements. For this purpose it uses the notion of entropy as a logarithmical measure of probability of the state of a particular observation system. An optimum number of observations results from the difference of the entropy of the vector of parameters ΔHX̂ (x)corresponding to one extra observation. An increment of entropy interpreted as an increment of the amount of information about the state of the system determines the adoption or rejection of another extra observation to be carried out.


2018 ◽  
Vol 2 (3) ◽  
pp. 427
Author(s):  
Dewi Kania Sugiharti ◽  
Muhammad Ziaurahman ◽  
Sechabudin Sechabudin

Universities that apply the concept of Public Service Agency (BLU - PK PTN ) in performing functions as an organ which is engaged in the service infrastructure support through goods or services . As an institution under the auspices of the government and the state budget receives PTN PK - BLU implement mechanisms to acquire goods or services in accordance with the law. However, the procurement process in obtaining goods or services sometimes poses problems that arise as a consequence of the passage of the procurement of goods or services involving the organs in it as PA / KPA , KDP , ULP , and Committee / Receiver Procurement Officer. Rector of the KPA in PK - BLU PTN has the authority to control the organs that carry out the process of procurement of goods / services in the environment . Errors in the procurement process of goods / services performed by the CO and the ULP / Procurement Officer causing state losses due to these errors, either due to negligence or unlawful acts. As the KPA in the process of procurement of goods / services Rector can control the organs in accordance with the authority given. The consequences are acceptable if the authorities ultimately the procurement of goods / services did not heed the warning Rector officials related procurement process of goods / services will receive sanctions. Keywords: Authorized Budget, Financial State.


Author(s):  
Oleksandra Maslii ◽  
Andrii Maksymenko ◽  
Svitlana Onyshchenko

Place of monitoring and control of risks of financial stability of the state in the system of ensuring financial security of the state was substantiated. Methods of identifying threats to Ukraine's financial security through the current and strategic analysis of financial system development indicators were considered. Tendencies of economic development of Ukraine in the context of revealing sources of threats to financial stability of the state were analyzed. Dynamic analysis of the actual values of the financial security indicators of Ukraine as a whole and its separate components had been carried out. Threats to Ukraine's financial security were identified based on comparative and trend analysis. Reasons for the critical state of debt, banking and monetary security in the financial structure and the preconditions for the emergence of systemic threats had been investigated. Systematization of risks and threats to Ukraine's financial security by its components had been carried out. Influence of systemic threats in the financial sphere on the economic security of the state was generalized. International experience of monitoring financial stability of the state was analyzed. Additional risks to the national financial system are associated with the globalization and digitization of the state financial system that are not taken into account by valid methodological recommendations for calculating the level of economic security of Ukraine were highlighted.


Author(s):  
Zenoviy Siryk

Ukraine is a unitary state, yet historically various regions, oblasts, districts, and local areas have different levels of economic development. To secure sustainable economic and social development and provide social services guaranteed by the state for each citizen according to the Constitution, the mechanism of redistribution between revenues and expenditures of oblasts, regions, and territories through the budgets of a higher level is used. The paper aims to research the peculiarities of improving interbudgetary relations in conditions of authorities’ decentralization. The paper defines the nature of interbudgetary relations. The basic and reverse subsidies to Ukraine and Lvivska oblast are analyzed. The advantages and disadvantages the communities face at changing approaches to balancing local budgets are determined. Regulative documents that cover the interbudgetary relations in Ukraine are analyzed. Special attention is paid to the problem of local finances reforming, including the development of interbudgetary relations. The scheme of the economic interbudgetary relations system in Ukraine is developed. The ways to improve the system of interbudgetary relations in Ukraine are suggested. The negative and positive aspects, advantages, and disadvantages of the system of interbudgetary relations in Ukraine require the following improvements. 1. It is necessary to avoid the complete budget alignment in the process of budgets balancing by interbudgetary transfers as the major objective. 2. The interbudgetary transfers should be distributed based on a formal approach. 3. The changes have to be introduced to the calculation of medical and educational subsidies in terms of financial standard of budget provision to avoid the money deficit for coverage of necessary expenditures. 4. There is a need to improve interbudgetary relations at the levels of districts, villages, towns, and cities of district subordination. 5. Improvement of the mechanism of targeted benefits provision, their real evaluation, and control for the use of funds.


Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 5248
Author(s):  
Aleksandra Pawlicka ◽  
Marek Pawlicki ◽  
Rafał Kozik ◽  
Ryszard S. Choraś

This paper discusses the valuable role recommender systems may play in cybersecurity. First, a comprehensive presentation of recommender system types is presented, as well as their advantages and disadvantages, possible applications and security concerns. Then, the paper collects and presents the state of the art concerning the use of recommender systems in cybersecurity; both the existing solutions and future ideas are presented. The contribution of this paper is two-fold: to date, to the best of our knowledge, there has been no work collecting the applications of recommenders for cybersecurity. Moreover, this paper attempts to complete a comprehensive survey of recommender types, after noticing that other works usually mention two–three types at once and neglect the others.


Sign in / Sign up

Export Citation Format

Share Document