scholarly journals A Constitutional Evaluation on the Candidate's Public Offering of the Personal Information in the Public Office Election Law

법과정책 ◽  
2010 ◽  
Vol 16 (2) ◽  
pp. 275-300
Author(s):  
Hiehoun Lee
Author(s):  
أ.د.عبد الجبار احمد عبد الله

In order to codify the political and partisan activity in Iraq, after a difficult labor, the Political Parties Law No. (36) for the year 2015 started and this is positive because it is not normal for the political parties and forces in Iraq to continue without a legal framework. Article (24) / paragraph (5) of the law requires that the party and its members commit themselves to the following: (To preserve the neutrality of the public office and public institutions and not to exploit it for the gains of a party or political organization). This is considered because it is illegal to exploit State institutions for partisan purposes . It is a moral duty before the politician not to exploit the political parties or some of its members or those who try to speak on their behalf directly or indirectly to achieve partisan gains. Or personality against other personalities and parties at the expense of the university entity.


Author(s):  
Ethan J. Leib ◽  
Stephen R. Galoob

This chapter examines how fiduciary principles apply to public offices, focusing on what it means for officeholders to comport themselves to their respective public roles appropriately. Public law institutions can operate in accordance with fiduciary norms even when they are enforced differently from the remedial mechanisms available in private fiduciary law. In the public sector, fiduciary norms are difficult to enforce directly and the fiduciary norms of public office do not overlap completely with the positive law governing public officials. Nevertheless, core fiduciary principles are at the heart of public officeholding, and public officers need to fulfill their fiduciary role obligations. This chapter first considers three areas of U.S. public law whose fiduciary character reinforces the tenet that public office is a public trust: the U.S. Constitution’s “Emoluments Clauses,” administrative law, and the law of judging. It then explores the fiduciary character of public law by looking at the deeper normative structure of public officeholding, placing emphasis on how public officeholders are constrained by the principles of loyalty, care, deliberation, conscientiousness, and robustness. It also compares the policy implications of the fiduciary view of officeholding with those of Dennis Thompson’s view before concluding with an explanation of how the application of fiduciary principles might differ between public and private law settings and how public institutions might be designed or reformed in light of fiduciary norms.


2015 ◽  
Author(s):  
◽  
Reza Houston

[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI AT AUTHOR'S REQUEST.] This study is an examination of the relationship between political connections and the undertaking of major firm events. In our first essay, presented in Chapter 3, we examine the impact politically connected appointments have on firm acquisition behavior. Using proxy statements, we create a unique database of politically connected bidders and merger targets. We find that bidders who hire connected individuals to the board or management team are more likely to avoid merger litigation. Connected bidders make more bids after the appointment. These firms also bid on larger targets. We determine there is a positive relation between the control premium and the relative of the target's connections. Connected acquirers have superior post-merger accounting performance, particularly when they acquire a connected target firm. In the second essay, presented in Chapter 4, we examine the relationship between political connections of private firms and the initial public offering process. Using registration statement information, we create a unique database of politically connected IPO firms. We find that political connections are substitutes to high-quality underwriters and big four auditors. Politically connected firms manage earnings more highly upward than non-connected firms prior to the public offering. Politically connected firms also exhibit less underpricing than non-connected firms. Politically connected IPO firms also have superior post-IPO returns relative to non-connected IPO firms.


2012 ◽  
Vol 9 (4) ◽  
pp. 378-393 ◽  
Author(s):  
Alice Marwick

People create profiles on social network sites and Twitter accounts against the background of an audience. This paper argues that closely examining content created by others and looking at one’s own content through other people’s eyes, a common part of social media use, should be framed as social surveillance. While social surveillance is distinguished from traditional surveillance along three axes (power, hierarchy, and reciprocity), its effects and behavior modification is common to traditional surveillance. Drawing on ethnographic studies of United States populations, I look at social surveillance, how it is practiced, and its impact on people who engage in it. I use Foucault’s concept of capillaries of power to demonstrate that social surveillance assumes the power differentials evident in everyday interactions rather than the hierarchical power relationships assumed in much of the surveillance literature. Social media involves a collapse of social contexts and social roles, complicating boundary work but facilitating social surveillance. Individuals strategically reveal, disclose and conceal personal information to create connections with others and tend social boundaries. These processes are normal parts of day-to-day life in communities that are highly connected through social media.


2019 ◽  
Vol 19 (3) ◽  
pp. 634
Author(s):  
M Muslih

Legislative members are partners as well as balancing the government in regulating and controlling the government, therefore it is necessary to have a "presence" of honest and clean professional legislators. Reality shows that the professionalism of some legislators still disappoints some of their constituents. For this reason, it is necessary to think about how to escort members of the legislative body in order to realize a clean government. To meet these expectations an election process is needed that can guarantee the implementation of an honest and fair election process. In order to realize the ideal above, the presence of a good legislative Election Law, a professional law enforcement apparatus, and a culture of high legal awareness from the public in exercising their voting rights.


Author(s):  
Anna Rohunen ◽  
Jouni Markkula

Personal data is increasingly collected with the support of rapidly advancing information and communication technology, which raises privacy concerns among data subjects. In order to address these concerns and offer the full benefits of personal data intensive services to the public, service providers need to understand how to evaluate privacy concerns in evolving service contexts. By analyzing the earlier used privacy concerns evaluation instruments, we can learn how to adapt them to new contexts. In this article, the historical development of the most widely used privacy concerns evaluation instruments is presented and analyzed regarding privacy concerns' dimensions. Privacy concerns' core dimensions, and the types of context dependent dimensions, to be incorporated into evaluation instruments are identified. Following this, recommendations on how to utilize the existing evaluation instruments are given, as well as suggestions for future research dealing with validation and standardization of the instruments.


Author(s):  
Maria Moloney ◽  
Gary Coyle

The evolving model of the Future Internet has, at its heart, the users of the Internet. Web 2.0 and Government 2.0 initiatives help citizens communicate even better with their governments. Such initiatives have the potential to empower citizens by giving them a stronger voice in both the traditional sense and in the digital society. Pressure is mounting on governments to listen to the voice of the public expressed through these technologies and incorporate their needs into public policy. On the other hand, governments still have a duty to protect their citizens' personal information against unlawful and malicious intent. This responsibility is essential to any government in an age where there is an increasing burden on citizens to interact with governments via electronic means. This chapter examines this dual agenda of modern governments to engage with its citizens, on the one hand, to encourage transparency and open discussion, and to provide digitally offered public services that require the protection of citizens' private information, on the other. In this chapter, it is argued that a citizen-centric approach to online privacy protection that works in tandem with the open government agenda will provide a unified mode of interaction between citizens, businesses, and governments in digital society.


Sign in / Sign up

Export Citation Format

Share Document