policy control
Recently Published Documents


TOTAL DOCUMENTS

121
(FIVE YEARS 20)

H-INDEX

9
(FIVE YEARS 1)

2021 ◽  
Vol 7 (2) ◽  
pp. 148
Author(s):  
Nurhaslita Sari ◽  
Arfriani Maifizar ◽  
Sri Wahyu Handayani ◽  
Agus Pratama ◽  
Nurasma Aripin ◽  
...  

This study discusses the shape and obstacles of policy control of North Aceh's Revenue and Expenditure Budget in 2020. This study aims to find out how the form and obstacles of monitoring the policy of Revenue and Expenditure Budget of North Aceh Regency in 2020. The method used in this paper is a descriptive qualitative research method. The authors collected data from multiple sources of research books, encyclopedias, journals and interviews with informants of the study. The results showed the form of monitoring of budget policy of North Aceh District Expenditure has not been carried out effectively, because only political. there are obstacles, such as education background of North Aceh DPRK member, political factor and lack of databases in monitoring the APBK North Aceh policy in 2020.


2021 ◽  
Author(s):  
Gabriel Cuadra ◽  
Victoria Nuguer

Advanced economies (AEs) transmit economic crisis to Emerging Market Economies (EMEs) through cross-border bank flows, impacting their output, credit, and assets prices. Empirical evidence suggests that the transmission of the crisis from AEs to EMEs is higher in the absence of macro-prudential policy. A macro-prudential policy in the form of a levy on EMEs banks, when credit grows faster than deposits, reduces the propagation of AEs crisis to EMEs: the consumption drop is 12 percent lower, and the reaction of the labor market smoother, so consumers are better off with the policy than without it.


2021 ◽  
pp. 0160323X2110008
Author(s):  
Brittany Blizzard ◽  
Jocelyn M. Johnston

State preemption of local government discretion is examined through the lenses of county cooperation with federal Immigration and Customs Enforcement (ICE) and “immigration federalism.” Through a mixed-method approach, we examine why counties collaborate with ICE as well as how and why they deviate from state preemptions on local support for immigration. Analysis of a sample restricted to Georgia and Texas, states with especially robust preemptive anti-immigrant laws, suggests that special interests—those related to immigrant-dependent industries important to county economies—have significant influence over county decisions to minimize cooperation with ICE.


Author(s):  
Angela Huyue Zhang

This chapter discusses the bureaucratic politics behind the rise of Chinese antitrust regulation. Chinese antitrust agencies are seldom subject to judicial scrutiny, and as a result, have monopolized the administrative enforcement of the Anti-Monopoly Law (AML). The severe sanctions that can be imposed under the AML give high-powered incentives to both government enforcers who want to expand their policy control and businesses who wish to use the law strategically to sabotage rivals. Moreover, the three former Chinese antitrust agencies were not assembled from scratch but were pre-existing departments within large central ministries. Naturally, the bureaucratic mission, culture, and structure of each of these agencies had shaped their enforcement agendas. Much of the discussion revolves around the National Development and Reform Commission (NDRC), as the agency stood out as the most aggressive institution among the three former agencies. Its rich record of enforcement also allows one to assess the link between these institutional factors and the pattern of enforcement. In 2018, the three agencies were merged into a single bureau under a newly created central ministry. The chapter then elaborates on the continuing challenges faced by this new agency, including the bureaucratic hierarchy, the power fragmentation, and the regional inertia.


Author(s):  
German Peinado Gomez ◽  
Jordi Mongay Batalla ◽  
Yoan Miche ◽  
Silke Holtmanns ◽  
Constandinos X. Mavromoustakis ◽  
...  

Author(s):  
Sara Ramezanian ◽  
Tommi Meskanen ◽  
Valtteri Niemi

Children and teenagers that have been victims of bullying can possibly suffer its psychological effects for a lifetime. With the increase of online social media, cyberbullying incidents have been increased as well. In this paper, the authors discuss how they can detect cyberbullying with AI techniques, using term frequency-inverse document frequency. The authors label messages as benign or bully. The authors want their method of cyberbullying detection to be privacy-preserving, such that the subscribers' benign messages should not be revealed to the operator. Moreover, the operator labels subscribers as normal, bully, and victim. The operator utilizes policy control in 5G networks to protect victims of cyberbullying from harmful traffic.


Sign in / Sign up

Export Citation Format

Share Document