scholarly journals Land at the Service of the Regional Growth Coalition: Projects of Special Interest in the Region of Castilla–La Mancha (Spain)

Land ◽  
2021 ◽  
Vol 10 (8) ◽  
pp. 875
Author(s):  
Luis Alfonso Escudero Gómez

Neoliberal urbanism land planning has led to the development of public–private coalitions associating common interest with lucrative private enterprise projects. In Castilla–La Mancha (Spain), this regional growth coalition was backed by a spatial planning instrument, known as Projects of Special Interest (PSI). The aim of this article is to analyse the PSI as a paradigmatic example, to study its key points and examine its current dimensions. This case study employs a review of the literature, desk research, content analysis, interviews and observation. The PSI scheme has permitted private initiatives and developments, and privately used public constructions of many different types, reducing timeframes through possible recourse to expropriation, using basic measures of land reclassification, undervaluing the ecosystems involved and even facilitating construction in areas that had previously been declared protected, or where resources such as water are not guaranteed. Despite the failure of many of these projects and the expected economic growth not being realised, the instrument has been revived, as it is directly linked to multinational enterprises investing in the region.

Urban Studies ◽  
2020 ◽  
pp. 004209801989522 ◽  
Author(s):  
David Ley

In a narrative framed by Harvey Molotch’s growth machine thesis, this article examines the globalisation of property in gateway cities, and its contribution to house price inflation in Vancouver, the least affordable market in North America. In response to a floundering British Columbia (BC) economy, a favourable investment and immigration climate welcomed capital and invited capitalists to re-locate their economic skills. Substantial funds flowed to Vancouver from the buoyant Asia Pacific, from distant investors and wealthy immigrants. Capital flows were facilitated by a powerful growth coalition, as the provincial government benefited significantly from these funds, and held a common interest with a vigorous trans-Pacific property industry. Supporting this growth coalition, the deregulation of private institutions and the under-resourcing of public agencies working in the capital/real estate nexus provided an ecology favourable to the ‘animal spirits’ of the market, including real estate opportunism and money laundering. Such a growth ecology, exacerbating severe unaffordability, may exist in other globally networked cities, though relations are rarely so well developed and so powerful in their effects.


2017 ◽  
Vol 44 (2) ◽  
pp. 334-351 ◽  
Author(s):  
H. Funk

The Swiss physician and naturalist Conrad Gessner (1516–1565) is known as the author of Historia animalium, a multi-volume encyclopaedia published between 1551 and 1558 and intended as an up-to-date version of the Aristotelian work of the same title. It included little-known animals from the New World and other regions outside Europe. To realize this ambitious project, Gessner was dependent on a great number of supporters and informants. One of them was the English physician John Caius (1510–1573), who shared with Gessner a special interest in the medical works of Galen. This common interest resulted in a meeting between the two scholars, leading to cooperation and a life-long friendship. The fact that Caius and Gessner were on good terms and cooperated for Historia animalium, as well as for Gessner's unfinished “Historia plantarum”, has often been noted, usually however in a rather cursory manner. This article provides an analysis of how and when Caius's information found its way into Gessner's works.


2017 ◽  
Vol 1 (1) ◽  
pp. 1-16
Author(s):  
John Harner ◽  
Lee Cerveny ◽  
Rebecca Gronewold

Natural resource managers need up-to-date information about how people interact with public lands and the meanings these places hold for use in planning and decision-making. This case study explains the use of public participatory Geographic Information System (GIS) to generate and analyze spatial patterns of the uses and values people hold for the Browns Canyon National Monument in Colorado. Participants drew on maps and answered questions at both live community meetings and online sessions to develop a series of maps showing detailed responses to different types of resource uses and landscape values. Results can be disaggregated by interaction types, different meaningful values, respondent characteristics, seasonality, or frequency of visit. The study was a test for the Bureau of Land Management and US Forest Service, who jointly manage the monument as they prepare their land management plan. If the information generated is as helpful throughout the entire planning process as initial responses seem, this protocol could become a component of the Bureau’s planning tool kit.


The effective altruism movement consists of a growing global community of people who organize significant parts of their lives around two key ideas, represented in its name. Altruism: If we use a significant portion of the resources in our possession—whether money, time, or talents—with a view to helping others, we can improve the world considerably. Effectiveness: When we do put such resources to altruistic use, it is crucial to focus on how much good this or that intervention is reasonably expected to do per unit of resource expended (for example, per dollar donated). While global poverty is a widely used case study in introducing and motivating effective altruism, if the ultimate aim is to do the most good one can with the resources expended, it is far from obvious that global poverty alleviation is highest priority cause area. In addition to ranking possible poverty-alleviation interventions against one another, we can also try to rank interventions aimed at very different types of outcome against one another. This includes, for example, interventions focusing on animal welfare or future generations. The scale and organization of the effective altruism movement encourage careful dialogue on questions that have perhaps long been there, throwing them into new and sharper relief, and giving rise to previously unnoticed questions. In the present volume, the first of its kind, a group of internationally recognized philosophers, economists, and political theorists contribute in-depth explorations of issues that arise once one takes seriously the twin ideas of altruistic commitment and effectiveness.


Author(s):  
Michael W. Pratt ◽  
M. Kyle Matsuba

Chapter 9 focuses on contexts of positive engagement in the domain of the wider society among emerging adults. The authors examine the growing research literature on civic engagement and volunteering, covering patterns of development and change during emerging to young adulthood, describing how this development is linked to the three personality levels of the McAdams and Pals model. They also describe work on one salient contemporary type of civic engagement, environmentalism, and review what is known on this particular topic in youth. The authors cover the evidence on both of these domains from their Futures Study sample, using both questionnaire and narrative material to expand these findings. As a way of illuminating the key points, the chapter ends with a case study of the early life story of John Muir, an important founder of the environmental and conservation movement in the United States.


Author(s):  
Andrea B. Temkin ◽  
Mina Yadegar ◽  
Christine Cho ◽  
Brian C. Chu

In recent years, the field of clinical psychology has seen a growing movement toward the research and development of transdiagnostic treatments. Transdiagnostic approaches have the potential to address numerous issues related to the development and treatment of mental disorders. Among these are the high rates of comorbidity across disorders, the increasing need for efficient protocols, and the call for treatments that can be more easily disseminated. This chapter provides a review of the current transdiagnostic treatment approaches for the treatment of youth mental disorders. Three different types of transdiagnostic protocols are examined: mechanism-based protocols, common elements treatments, and general treatment models that originated from single-disorder approaches to have broader reach. A case study illuminates how a mechanism-based approach would inform case conceptualization for a client presenting with internalizing and externalizing symptoms and how a transdiagnostic framework translates into practice.


Geosciences ◽  
2021 ◽  
Vol 11 (4) ◽  
pp. 150
Author(s):  
Nilgün Güdük ◽  
Miguel de la Varga ◽  
Janne Kaukolinna ◽  
Florian Wellmann

Structural geological models are widely used to represent relevant geological interfaces and property distributions in the subsurface. Considering the inherent uncertainty of these models, the non-uniqueness of geophysical inverse problems, and the growing availability of data, there is a need for methods that integrate different types of data consistently and consider the uncertainties quantitatively. Probabilistic inference provides a suitable tool for this purpose. Using a Bayesian framework, geological modeling can be considered as an integral part of the inversion and thereby naturally constrain geophysical inversion procedures. This integration prevents geologically unrealistic results and provides the opportunity to include geological and geophysical information in the inversion. This information can be from different sources and is added to the framework through likelihood functions. We applied this methodology to the structurally complex Kevitsa deposit in Finland. We started with an interpretation-based 3D geological model and defined the uncertainties in our geological model through probability density functions. Airborne magnetic data and geological interpretations of borehole data were used to define geophysical and geological likelihoods, respectively. The geophysical data were linked to the uncertain structural parameters through the rock properties. The result of the inverse problem was an ensemble of realized models. These structural models and their uncertainties are visualized using information entropy, which allows for quantitative analysis. Our results show that with our methodology, we can use well-defined likelihood functions to add meaningful information to our initial model without requiring a computationally-heavy full grid inversion, discrepancies between model and data are spotted more easily, and the complementary strength of different types of data can be integrated into one framework.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5300
Author(s):  
Antonia Nisioti ◽  
George Loukas ◽  
Stefan Rass ◽  
Emmanouil Panaousis

The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction between a cyber forensic Investigator and a strategic Attacker using a game-theoretic framework. This is based on a Bayesian game of incomplete information played on a multi-host cyber forensics investigation graph of actions traversed by both players. The edges of the graph represent players’ actions across different hosts in a network. In alignment with the concept of Bayesian games, we define two Attacker types to represent their ability of deploying anti-forensic techniques to conceal their activities. In this way, our model allows the Investigator to identify the optimal investigating policy taking into consideration the cost and impact of the available actions, while coping with the uncertainty of the Attacker’s type and strategic decisions. To evaluate our model, we construct a realistic case study based on threat reports and data extracted from the MITRE ATT&CK STIX repository, Common Vulnerability Scoring System (CVSS), and interviews with cyber-security practitioners. We use the case study to compare the performance of the proposed method against two other investigative methods and three different types of Attackers.


Sign in / Sign up

Export Citation Format

Share Document