scholarly journals Veto Threat Bargaining with a Bicameral Congress

2020 ◽  
pp. 106591292092591
Author(s):  
Scott M. Guenther ◽  
Samuel Kernell

According to the conventional view, presidents are largely bereft of influence with an opposition-controlled Congress. Congress sends them legislation with a “take it or leave it” choice that maximizes the preferences of the opposition majority while minimizing presidents’ preferences. To extricate themselves from this bind, presidents threaten vetoes. Past research suggests that their efforts largely fail, however, for two model-driven reasons: first, veto threats amount to minimally informative “cheap talk,” and second, Congress is a unitary actor with firm control over its agenda. We relax both assumptions, bringing veto rhetoric into a setting more closely resembling real-world conditions. Presidents transmit credible veto threats to a heterogeneous, bicameral Congress where chamber rules enable the minority party to wield some influence over legislation. Examining the legislative histories of all veto-threatened bills passed between 1985 and 2016, we confirm that veto threats ward off about half of veto-targeted legislative provisions—a far greater share than for comparable unthreatened provisions. The House of Representatives is more likely to introduce and pass legislation objectionable to presidents and the Senate is more likely to accommodate presidents, findings consistent with the textbook description of the modern bicameral Congress.

Author(s):  
Rodolfo Villarroel ◽  
Eduardo Fernández-Medina ◽  
Juan Trujillo ◽  
Mario Piattini

This chapter presents an approach for designing secure Data Warehouses (DWs) that accomplish the conceptual modeling of secure DWs independently from the target platform where the DW has to be implemented, because our complete approach follows the Model Driven Architecture (MDA) and the Model Driven Security (MDS). In most of real world DW projects, the security aspects are issues that usually rely on the DBMS administrators. We argue that the design of these security aspects should be considered together with the conceptual modeling of DWs from the early stages of a DW project, and being able to attach user security information to the basic structures of a Multidimensional (MD) model. In this way, we would be able to generate this information in a semi or automatic way into a target platform and the final DW will better suits the user security requirements.


Author(s):  
Villarroel Rodolfo ◽  
Fernández-Medina Eduardo ◽  
Trujillo Juan ◽  
Piattini Mario

This chapter presents an approach for designing secure Data Warehouses (DWs) that accomplish the conceptual modeling of secure DWs independently from the target platform where the DW has to be implemented, because our complete approach follows the Model Driven Architecture (MDA) and the Model Driven Security (MDS). In most of real world DW projects, the security aspects are issues that usually rely on the DBMS administrators. We argue that the design of these security aspects should be considered together with the conceptual modeling of DWs from the early stages of a DW project, and being able to attach user security information to the basic structures of a Multidimensional (MD) model. In this way, we would be able to generate this information in a semi or automatic way into a target platform and the final DW will better suits the user security requirements.


2020 ◽  
Vol 73 (4) ◽  
pp. 797-812
Author(s):  
Samrat Ghosh ◽  
Benjamin Brooks ◽  
Dev Ranmuthugala ◽  
Marcus Bowles

Past research showed that traditional assessment methods that required seafarer students to construct responses based on memorisation and analysing information presented in absence of real-world contexts (e.g. oral examinations and multiple-choice questions) disengaged the students from learning. Memorising information is a lower-order cognitive ability, failure in which led to errors and low academic achievement for students. Authentic assessment methods require students to construct responses through the critical analysis of information presented in real-world contexts. Hence, this research investigated the difference in seafarer students' academic achievement (measured through scores obtained in assessment) in authentic assessment as compared with traditional assessment. Two separate and independent student groups (the ‘control’ group and ‘treatment’ group) were used for a selected unit of learning delivered at the Australian Maritime College within the Bachelor of Nautical Science degree program. Because some past researchers had defined and implemented traditional assessment methods as a single-occasion assessment, this project implemented the assessment in a summative format, as opposed to authentic assessments implemented during student preparation. Analysis of student scores revealed that the authentically assessed students were guided towards significantly higher academic achievement.


2019 ◽  
Vol 41 (2) ◽  
pp. 91-108 ◽  
Author(s):  
Spencer M. Ross

Past research has found that students and instructors may be disaffected with many of the most widely used learning management systems (LMS). Other research has found that Millennials and post-Millennials have come to expect open and frequent communication and technologies that facilitate greater teamwork in their business careers. The purpose of this article is to first assess the general attitudes and perceptions of widely used LMS platforms in creating an engaging student learning experience and then present and assess Slack, a business communications tool, as an LMS complement. The author finds that many of the LMS platforms present challenges for students and instructors with respect to course communications, and group communications in particular. The author also finds that Slack positively enhances students’ perceptions of the marketing class as a real-world experience, as well as enhances perceived learning outcomes from groupwork.


2008 ◽  
Vol 41 (03) ◽  
pp. 473-474 ◽  
Author(s):  
Theodore S. Arrington

The article on the seats-votes curve by Kastellec, Gelman, and Chandler (January 2008, 139–45) presents interesting and helpful analysis and data. Especially important is the insight that incumbency necessarily requires a minority party to receive more than 50% of the vote to gain control of the House of Representatives. However the article is misleading in two respects.


1969 ◽  
Vol 11 (4) ◽  
pp. 385-397 ◽  
Author(s):  
E. M. Hafner

We are often told, and it is easy to believe, that the images of abstract art are not drawn from the real world. In the most conventional view of the modern school, abstract painting is a search for free expression of the artist's own vision. The non-representational painter works as he pleases and is pleased by little that he sees. A humorous drawing in a sophisticated magazine shows a studio full of wild canvases, with the artist gazing through the window at a magnificent sunset. He says to a friend, ‘Yes, old man, I admit that it's beautiful. Sometimes I'm sorry it's not the sort of thing I do.’ Authority for the establishment of a public attitude that makes such a joke possible is to be found in the writings of many critics and in the words of artists themselves. Harold Rosenberg: ‘The big moment [in art] came when it was decided to paint—just to paint. The gesture on the canvas was a gesture of liberation from value, political, aesthetic, moral.’ André Malraux: ‘What then was painting becoming, now that it no longer imitated or transfigured? Simply—painting.’ Sheldon Cheney: ‘I cannot do better, in trying to help you to an understanding of modernism, than to point out the devastating effect the realistic movement had on the arts as a whole.‘ Piet Mondrian: ‘In order that art … should not represent relations with the natural aspect of things, the law of the denaturalization of matter is of fundamental importance.’ Clive Bell: ‘Creating a work of art is so tremendous a business that it leaves no leisure for catching likenesses.’ Kasimir Malevich: ‘From the supremist point of view, the appearances of natural objects are in themselves meaningless. … The representation of an object … is something that has nothing to do with art.’ Laurence Binyon, in 1911: ‘The theory that art is, above all things, imitative and representative, no longer holds the field with thinking minds.’ Ortega y Gasset: ‘Painting completely reversed its function and, instead of putting us within what is outside, endeavored to pour out upon the canvas what is within: ideal invented objects.’


2016 ◽  
Vol 40 (5) ◽  
pp. 643-659 ◽  
Author(s):  
Jacob R. Straus ◽  
Raymond T. Williams ◽  
Colleen J. Shogan ◽  
Matthew E. Glassman

Purpose The purpose of this paper is to understand why some Senators choose to use Twitter more frequently than others. Building on past research, which explored causal factors leading to early congressional adoption, theories about why some Senators use Twitter more frequently in their daily communications strategies are developed. Design/methodology/approach A “power user” score was developed by evaluating each Senator’s clout, interactivity, and originality on Twitter. These scores are then used as the dependent variable in a regression model to evaluate which factors influence Senators becoming Twitter “power users.” Findings The study found that: constituent income is positively correlated with heavy use, but constituent education level is not; the more ideological a Senator is the more he or she will be a Twitter power user; the number of days on Twitter is a significant indicator of advanced Twitter usage; and having staff dedicated to social media is positively correlated with being a Twitter power user. Research limitations/implications All Senators in the second session of the 113th Congress (2014) were evaluated. As such, future research hope to expand the data set to additional Senators or the House of Representatives. Practical implications A better understanding of why some Senators use Twitter more than others allows insight into constituent communications strategies and the potential implications of real-time communication on representation, and the role of accountability between a Senator and his or her constituents. Originality/value The study examines constituent communication by Senators in a new, more interactive medium than previously considered. Additionally, the study places findings about Senator’s constituent communication in the broader context of representation.


2019 ◽  
Vol 11 (1) ◽  
Author(s):  
Taejun Bak ◽  
Sukhan Lee

The accurate estimation of the State of Health (SOH) and Remaining Useful Life (RUL) has been a subject of keen interest due to its impact on safety and condition-based maintenance services. A number of approaches have been proposed to tackle this problem based either on a model-driven or on a data-driven framework. Due to the electro-chemical complexity involved in battery aging, they are yet to achieve the accuracy required, especially, for real-world applications. This is because of the difficulty either in identifying the time-varying nature of model parameters and in collecting the real-world training dataset from widely varying modes of battery usage. In this paper, we propose a method of estimating SOH and RUL simultaneously in such a way as to contribute to its real-world applicability. First, noticing that battery aging causes the time sequence of charging and discharging voltage and current in a cycle to be shortened and dispersed, we define an aging index, referred to here as the time compensated entropy, for SOH and RUL. Second, for LSTM-based RUL prediction, we optimize the number of SOH input and the RUL prediction sequences for the minimum prediction error associated with a sequence of cycles. Third, we adopt a progressive framework of LSTMs such that whatever learned from the prior predictions are transferred to the subsequent prediction, starting with learned SOH. For experimental verification, we train the proposed progressive LSTM network based on CALCE datasets and apply to various cases of charging and discharging cycles. With SOH estimated online, we achieve less than 10 cycles of accuracy in RUL prediction, moving closer to real-world applicability.


Sign in / Sign up

Export Citation Format

Share Document