The Insidious Work of the University: From Nationalism to Excellence to Entrepreneurialism1

2008 ◽  
Vol 1 (1) ◽  
pp. 1-3 ◽  
Author(s):  
Don Mitchell

“We are committed to grow the skills and competence of men and women who are or soon will be at the center of making decisions associated with strategic and operational security matters in the public or private sector. Content of our 2-week courses will expose them to the next generation of security thinking and allow them to interact with and learn from colleagues of other agencies and organizations. It will take them to the next level of their careers both intellectually and professionally.” - Flyer for the National Security Studies Program, Maxwell School, Syracuse University

2020 ◽  
pp. 0095327X2091718
Author(s):  
Yagil Levy

Mainstream scholars of IR favor policy-relevant research, that is the agenda to influence government policymakers by offering policy recommendations. In this article, I offer a different perspective by presenting alternative arguments about social scientists’ responsibility to influence. By drawing on themes of public sociology and critical sociology, security studies and public policy, I argue that the core of this responsibility is to seek to influence policy via engagement with the public rather than with policymakers.


Author(s):  
Marius Constantin PROFIROIU ◽  
Maria-Roxana BRIȘCARIU

"The society based on knowledge and innovation brings to the fore the role of universities as research and learning spaces, with the purpose for sustainable development, at local, regional, national and global levels. Following this approach, we explore the capacity of spreading the knowledge and innovation capital in the North-West region of Romania between universities, the private sector and the public sector. Also, the study explores the role taken by the university system in Romania, locally and regionally, emphasizing what type of relationship defines the exchange of outputs and what are the most useful know-how transfer mechanisms from universities to the private and public sectors. The empirical research in this paper has shown that there is a growing relationship between universities – private sector – public sector, which is characterized as ‘in an incipient phase’, ‘based on urgent needs of the parties’. All of the actors involved in this triad want to develop the links between universities – private sector – public sector in communication, research, innovation and technology, and they suggest standardization and regulation of this interaction and developing a legal framework to correspond to the actual needs at local and regional levels."


2021 ◽  
Vol 20 (4) ◽  
pp. 1-18
Author(s):  
Ismael de Mendonça Azevedo ◽  
Lydia Maria Pinto Brito

Este estudo tem por objetivo evidenciar o panorama da percepção de assédio moral no trabalho em trabalhadores brasileiros, elaborado a partir de análises com cruzamentos entre percepções de funcionários públicos e privados, homens e mulheres. Para a coleta de dados, optou-se por utilizar a Escala de Percepção de Assédio Moral no Trabalho (EP-AMT), instrumento validado por Martins e Ferraz (2014). Os resultados mostram que 50,3% dos respondentes são do sexo masculino e 47,8% do sexo feminino, além do que 32,3% são profissionais com contrato de trabalho de servidor/a público e 65,8% atuam na iniciativa privada; 1,9% dos respondentes não informaram sexo e tipo de contrato de trabalho. Para análise cruzada optou-se pela análise com base no Teste-t de Stutent, com uso do software SPSS 21. Ficou evidenciado que o assédio moral pessoal, o assédio moral profissional ou o assédio moral no trabalho não são percebidos de modo diferente pelos respondentes quando da análise cruzada considerando os tipos de contrato ou o sexo dos respondentes. Desse modo, a pesquisa mostra que pessoas que atuam no setor público têm a mesma percepção que aquelas que atuam no setor privado e, também, homens e mulheres têm as mesmas percepções quanto ao assunto. Portanto, conclui-se que o assédio moral no trabalho não foi percebido como alto nos ambientes dos respondentes, e que o contrato de trabalho ou o sexo não foram variáveis que influenciaram numa maior ou menor percepção. ABSTRACT   This study aims to highlight the panorama of the perception of bullying at work among Brazilian workers, drawn from analyzes with intersections between perceptions of public and private employees, men and women. For data collection, we chose to use the Scale of Perception of Moral Harassment at Work (EP-AMT), an instrument validated by Martins and Ferraz (2014). The results show that 50.3% of respondents are male and 47.8% female, in addition to 32.3% are professionals with an employment contract as a public servant and 65.8% work in the private sector; 1.9% of respondents did not inform their gender and type of employment contract. For cross-analysis, we opted for the analysis based on the Stutent t-test, using the SPSS 21 software. It was evident that personal bullying, professional bullying or bullying at work are not perceived differently by the respondents when cross-analysis considering the types of contract or the gender of respondents. Thus, the research shows that people who work in the public sector have the same perception as those who work in the private sector and, also, men and women have the same perceptions on the subject. Therefore, it is concluded that bullying at work was not perceived as high in the respondents' environments, and that the employment contract or gender were not variables that influenced a greater or lesser perception.


2020 ◽  
Vol 54 (1) ◽  
Author(s):  
Ichiro Iwasaki ◽  
Xinxin Ma

AbstractThis paper performs a meta-analysis of 1472 estimates extracted from 199 previous studies to investigate the gender wage gap in China. The results show that, although the gender wage gap in China during the transition period has an impact that statistically significant and economically meaningful, it remains at a low level. It is also revealed that the wage gap between men and women is more severe in rural regions and the private sector than those in urban regions and the public sector. Furthermore, we found that, in China, the gender wage gap has been increasing rapidly in recent years.


Author(s):  
Aigul Kulnazarova

The subject of comparative foreign policy security interests concerns itself with at least two separate subfields of international relations: foreign policy analysis and security studies. The foreign policy analysis concerns the decision-making processes of states in their daily interaction with other actors of international relations: state and nonstate, international organizations and individuals. Security studies in a broad sense also refer to the behavior of states, but, in particular, only to those measures that states take to ensure their own security and survival in the international arena. It is not surprising that any such measures have traditionally been viewed as national security interests. The term national security became widely used only after World War II to understand and explain the national interests of the leading powers, which the latter mainly used as a priority of their foreign policy. Often, national security was associated with military/physical security, strategic parity, and confrontation of mutual threat, although some authors, such as Wolfers 1952 (cited under Theoretical Overview), argue that the meaning of the term is not so clear and is, in fact, more complicated. Since the 1990s, due to the changing world order and the growing forces of globalization, the sphere of national security has expanded significantly and now includes nonmilitary or nontraditional security sectors: economic, environmental, societal, political, etc. The consequences of globalization are obvious, as they have influenced further changes in the behavioral tendencies of states in external relations. Old approaches to security no longer meet the challenges of the new millennium. Perhaps the emerging academic subfield of comparative foreign policy security interests will deal with aspects of state behavior and policy aimed at achieving, maintaining, or redistributing the positions of states in the transforming global system. It is possible to distinguish two levels of foreign policy security interests: public and private. While the first concerns the security and integrity of state sovereignty and independence, protected by diplomatic, political, economic, ideological, and military means, the second includes the need for states to establish themselves in international organizations by instituting and promoting relations in scientific, technological, cultural, educational, social, environmental, and other fields with various actors, and participating in the settlement of regional and local conflicts. The protection of security interests at the public level is more stable, while the private level is more variable, and the latter can turn into the public one. One way to understand how states develop and implement their foreign policy security interests is to use a comparative approach.


ILR Review ◽  
1981 ◽  
Vol 34 (3) ◽  
pp. 408-412 ◽  
Author(s):  
Don Bellante ◽  
Albert N. Link

Available evidence suggests that stability of employment is greater in the public sector than in the private sector. The value that individuals place on this stability depends on the individual's degree of risk aversion. Economic reasoning suggests that, other things equal, those individuals with a high degree of aversion to risk will be more likely than others to seek employment in the public sector. This paper tests that hypothesis through the use of probit analysis and a measure of risk aversion developed in the University of Michigan's Panel Study of Income Dynamics. The results tend to confirm the hypothesis, implying that a policy of intersectoral equality of pay for comparable jobs would result in an excess supply of workers to the public sector.


1991 ◽  
Vol 30 (01) ◽  
pp. 53-64 ◽  
Author(s):  
R. Schosser ◽  
C. Weiss ◽  
K. Messmer

This report focusses on the planning and realization of an interdisciplinary local area network (LAN) for medical research at the University of Heidelberg. After a detailed requirements analysis, several networks were evaluated by means of a test installation, and a cost-performance analysis was carried out. At present, the LAN connects 45 (IBM-compatible) PCs, several heterogeneous mainframes (IBM, DEC and Siemens) and provides access to the public X.25 network and to wide-area networks for research (EARN, BITNET). The network supports application software that is frequently needed in medical research (word processing, statistics, graphics, literature databases and services, etc.). Compliance with existing “official” (e.g., IEEE 802.3) and “de facto” standards (e.g., PostScript) was considered to be extremely important for the selection of both hardware and software. Customized programs were developed to improve access control, user interface and on-line help. Wide acceptance of the LAN was achieved through extensive education and maintenance facilities, e.g., teaching courses, customized manuals and a hotline service. Since requirements of clinical routine differ substantially from medical research needs, two separate networks (with a gateway in between) are proposed as a solution to optimally satisfy the users’ demands.


Author(s):  
Omar Shaikh ◽  
Stefano Bonino

The Colourful Heritage Project (CHP) is the first community heritage focused charitable initiative in Scotland aiming to preserve and to celebrate the contributions of early South Asian and Muslim migrants to Scotland. It has successfully collated a considerable number of oral stories to create an online video archive, providing first-hand accounts of the personal journeys and emotions of the arrival of the earliest generation of these migrants in Scotland and highlighting the inspiring lessons that can be learnt from them. The CHP’s aims are first to capture these stories, second to celebrate the community’s achievements, and third to inspire present and future South Asian, Muslim and Scottish generations. It is a community-led charitable project that has been actively documenting a collection of inspirational stories and personal accounts, uniquely told by the protagonists themselves, describing at first hand their stories and adventures. These range all the way from the time of partition itself to resettling in Pakistan, and then to their final accounts of arriving in Scotland. The video footage enables the public to see their facial expressions, feel their emotions and hear their voices, creating poignant memories of these great men and women, and helping to gain a better understanding of the South Asian and Muslim community’s earliest days in Scotland.


Author(s):  
أ.د.عبد الجبار احمد عبد الله

In order to codify the political and partisan activity in Iraq, after a difficult labor, the Political Parties Law No. (36) for the year 2015 started and this is positive because it is not normal for the political parties and forces in Iraq to continue without a legal framework. Article (24) / paragraph (5) of the law requires that the party and its members commit themselves to the following: (To preserve the neutrality of the public office and public institutions and not to exploit it for the gains of a party or political organization). This is considered because it is illegal to exploit State institutions for partisan purposes . It is a moral duty before the politician not to exploit the political parties or some of its members or those who try to speak on their behalf directly or indirectly to achieve partisan gains. Or personality against other personalities and parties at the expense of the university entity.


Sign in / Sign up

Export Citation Format

Share Document