scholarly journals The Austrian path to the constitution of 1 May 1934 – An application of the paradigm of ‘Militant Democracy’ just avant la lettre!?

Author(s):  
Alexander Balthasar

AbstractThis paper seeks to compare the academic model of ‘militant democracy’ advocated in 1937 by Karl Loewenstein with the real political developments that had taken place only a few years before in Austria, under the responsibility of Engelbert Dollfuß. It further aims to to reveal the ‘missing link' between the actions (mere plans included) of - in particular - Catholic political leaders in Germany 1931/1933 (Heinrich Brüning, Franz v. Papen, Heinrich Held), directed at least from 1932 onwards in particular against the rise of the National Socialist movement, well-known both to Loewenstein and Dollfuß. It is argued that Loewenstein's model contains serious theoretical flaws and paves, at least when taken literally, the way to dangerous exaggerations, while the approach of the Dollfuß government was far more balanced. Any assessment of Dollfuß’ measures that – as is still the case in Austria – only focuses on the breach of the constitution then in force (the main document being the Bundes-Verfassungsgesetz, B-VG) as such, without offering a better alternative to prevent the National Socialist danger is unconvincing, not only from a moral, but also, and in particular, from a legal perspective.

Author(s):  
Ross Cranston ◽  
Emilios Avgouleas ◽  
Kristin van Zweiten ◽  
Theodor van Sante ◽  
Christoper Hare

This chapter discusses the legal duty of confidentiality (or secrecy) that banks owe their customers. The real problems in the application of the doctrine in practice are two-fold. First, confidentiality has a habit of getting in the way of commercially acceptable practices. There is the potential for breaches of confidentiality where a bank performs different functions. For instance, banks may like to distribute information throughout the corporate group so that a range of financial, insurance, and other services can be marketed to customers. Secondly, confidentiality can act as a cloak for wrongdoing, often on a massive scale. Political leaders who have exploited their people, drug barons, and criminals have used the banking system to spirit away their ill-gotten gains. Bank confidentiality has then acted as an obstacle to bringing the culprits to justice and recovering the booty. Confidentiality also provides one of the explanations of how international terrorists have transferred financing round the world without detection.


2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Eko Wahyono ◽  
Rizka Amalia ◽  
Ikma Citra Ranteallo

This research further examines the video entitled “what is the truth about post-factual politics?” about the case in the United States related to Trump and in the UK related to Brexit. The phenomenon of Post truth/post factual also occurs in Indonesia as seen in the political struggle experienced by Ahok in the governor election (DKI Jakarta). Through Michel Foucault's approach to post truth with assertive logic, the mass media is constructed for the interested parties and ignores the real reality. The conclusion of this study indicates that new media was able to spread various discourses ranging from influencing the way of thoughts, behavior of society to the ideology adopted by a society.Keywords: Post factual, post truth, new media


Author(s):  
Gary Smith

We live in an incredible period in history. The Computer Revolution may be even more life-changing than the Industrial Revolution. We can do things with computers that could never be done before, and computers can do things for us that could never be done before. But our love of computers should not cloud our thinking about their limitations. We are told that computers are smarter than humans and that data mining can identify previously unknown truths, or make discoveries that will revolutionize our lives. Our lives may well be changed, but not necessarily for the better. Computers are very good at discovering patterns, but are useless in judging whether the unearthed patterns are sensible because computers do not think the way humans think. We fear that super-intelligent machines will decide to protect themselves by enslaving or eliminating humans. But the real danger is not that computers are smarter than us, but that we think computers are smarter than us and, so, trust computers to make important decisions for us. The AI Delusion explains why we should not be intimidated into thinking that computers are infallible, that data-mining is knowledge discovery, and that black boxes should be trusted.


2021 ◽  
pp. 194277862110000
Author(s):  
Sheila Margaret McGregor

This article looks at Engels’s writings to show that his ideas about the role of labour in the evolution of human beings in a dialectical relationship between human beings and nature is a crucial starting point for understanding human society and is correct in its essentials. It is important for understanding that we developed as a species on the basis of social cooperation. The way human beings produce and reproduce themselves, the method of historical materialism, provides the basis for understanding how class and women’s oppression arose and how that can explain LGBTQ oppression. Although Engels’s analysis was once widely accepted by the socialist movement, it has mainly been ignored or opposed by academic researchers and others, including geographers, and more recently by Marxist feminists. However, anthropological research from the 1960s and 1970s as well as more recent anthropological and archaeological research provide overwhelming evidence for the validity of Engels’s argument that there were egalitarian, pre-class societies without women’s oppression. However, much remains to be explained about the transition to class societies. Engels’s analysis of the impact of industrial capitalism on gender roles shows how society shapes our behaviour. Engels’s method needs to be constantly reasserted against those who would argue that we are a competitive, aggressive species who require rules to suppress our true nature, and that social development is driven by ideas, not by changes in the way we produce and reproduce ourselves.


Elenchos ◽  
2015 ◽  
Vol 36 (1) ◽  
pp. 45-88 ◽  
Author(s):  
Monica Ugaglia

Abstract Aristotle’s way of conceiving the relationship between mathematics and other branches of scientific knowledge is completely different from the way a contemporary scientist conceives it. This is one of the causes of the fact that we look at the mathematical passages we find in Aristotle’s works with the wrong expectation. We expect to find more or less stringent proofs, while for the most part Aristotle employs mere analogies. Indeed, this is the primary function of mathematics when employed in a philosophical context: not a demonstrative tool, but a purely analogical model. In the case of the geometrical examples discussed in this paper, the diagrams are not conceived as part of a formalized proof, but as a work in progress. Aristotle is not interested in the final diagram but in the construction viewed in its process of development; namely in the figure a geometer draws, and gradually modifies, when he tries to solve a problem. The way in which the geometer makes use of the elements of his diagram, and the relation between these elements and his inner state of knowledge is the real feature which interests Aristotle. His goal is to use analogy in order to give the reader an idea of the states of mind involved in a more general process of knowing.


2014 ◽  
Vol 61 (1) ◽  
pp. 1-6
Author(s):  
David Harvey

At 3.60 Herodotus tells us that he has dwelt at length on the Samians because ‘they are responsible for three of the greatest buildings in the Greek world’: the tunnel of Eupalinos, the great temple, and the breakwater that protects their harbour. As successive commentators have pointed out, that is not the real reason for the length of his account. We hear about the tunnel for the first time in this chapter (60.1–3); Maiandrios escapes down a secret channel at 146.2, which may or may not be Eupalinos' tunnel; we hear about the temple of Artemis, not of Hera, at Samos in 48; dedications in the temple of Hera are mentioned in passing at 1.70.3, 3.123.1, 4.88.1, and 4.152.4, but the temple itself cannot be said to play a major part in Herodotus' narrative; naval expeditions sail from Samos (e.g. 44.2, 59.4) but there is no emphasis on the harbour or its breakwater. What Herodotus should have said is ‘I have dwelt at length on Samos, because I am interested in the island's history; and, by the way, they are responsible for three…’; but it is not our job to tell him what he ‘should’ have said. As David Asheri remarks, ‘We can explain it [the length of the Samian logos] most simply by supposing that the logos already existed before the final draft of the book’.


AKSEN ◽  
2021 ◽  
Vol 6 (1) ◽  
pp. 19-31
Author(s):  
Andrey Caesar Effendi ◽  
LMF Purwanto

The use of digital technology today can be said to be inseparable in our daily lives. Digital technology isslowly changing the way we communicate with others and the environment. Socialization that is usuallyface-to-face in the real world now can be done to not having to meet face-to-face in cyberspace. Thisliterature review aims to see a change in the way of obtaining data that is growing, with the use of digitaltechnology in ethnographic methods. The method used in this paper is to use descriptive qualitativeresearch methods by analyzing the existing literature. So it can be concluded that the use of digitalethnography in the architectural programming process can be a new way of searching for data at thearchitectural programming stage.


CALL ◽  
2019 ◽  
Vol 1 (2) ◽  
Author(s):  
Rizki Syifaurrahman ◽  
Ujang Suyatman

This research analyzes the elements of personality in the main character of Sweeney Todd: The Demon of Barber of Fleet Street by Tim Burton. The researcher uses descriptive qualitative methods because the results of this research are words which are then described. In this research, the reseacher found the elements of personality in the main character of Sweeney Todd: The Demon of Barber of Fleet Street by Tim Burton such as Todd id as the desire wants to revenge Turpin and Beadle because of what they did to Todd’s family, the desire wants to kill Pirelli because he knew his the real identity, and the desire wants to kill Mrs. Lovett because she lied him. The desires as Todd’s id realized and supported by the ego. The way how ego realized all of id in Sweeney Todd, the ego does his role with an action. Thus the superego does not appear much as the id. His role only related with a good value such as when Todd wants to reveal the fake barber about his crime.Keywords: Sweeney Todd, id, ego, superego.


2017 ◽  
Vol 4 (2) ◽  
pp. 234
Author(s):  
Tubus Tubus

This paper aims to examine the making of the contents of wills examined from the point of view of Islamic law, in practice the reality in the lives of many people who have not heed the word basmallah as an incantation in the contents of the will for the followers of Islam. In this study using sociological juridical method, where the primary data obtained directly from field research, while secondary data obtained from the literature. The results obtained that the way of making the contents of the will and the absence of public legal awareness is optimal for the making of the contents of wills in accordance with Islamic law. And there are still weaknesses in the Making and Implementation of the contents of the current will, when the testament is oral, namely: The absence of the sacred intention or the noble intention of the collector must not necessarily occur; unsecured rights of the recipient, in the event of any problems of the future heirs of the pewasiat; there is a difficulty of proof in the absence of witnesses, when the will is brought before the Court. Law renewal in the making of the contents of the will in the presence of a notary in the perspective of Islamic law are: the reconstruction of its value, the Ideal Formation of the Will, the testament is done in writing witnessed by two witnesses and before the Notary. Ideal Construction Format of Testament Creation. The testament is written in the presence of two witnesses or in the form of a Deed or a Notary Deed. At the head of the will or the Deed or Notarial deed is included a sentence “Basmallah”.


Lexicon ◽  
2013 ◽  
Vol 1 (1) ◽  
Author(s):  
Musadad Musadad

The offer is one form of speech act realizations. Making offer in English belongs to a real example of communicative English learning for it requires practical implementation in some ways. Accordingly, one should not only comprehend the offer in English from what is stated in English grammar books, but also from certain situation providing imaginary life aspects as can be found in the real ones. Such a situation, which is later on called as context, can be displayed through American movies. This study found interesting features in the way the subjects manipulate and manage offers intended to their hearers. The features are mainly noted in three aspects which are utterance length indicating offer (offer-sequence), speech act classification indicating offer, and the most frequently used semantic formulae in accordance with the differences of age, familiarity, and status.


Sign in / Sign up

Export Citation Format

Share Document