首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6篇
  免费   0篇
法律   1篇
政治理论   5篇
  2023年   1篇
  2019年   4篇
  2018年   1篇
排序方式: 共有6条查询结果,搜索用时 78 毫秒
1
1.
Elections have emerged as a leading area for the application of biometric technology in developing countries, despite its high costs and uncertainty over its effectiveness. Why then do countries pursue such programs, often with the support of donors? The paper considers the costs and benefits of technology, where the latter involves its potential to reduce the probability of seriously disputed elections that escalate into violence. Based on the limited data available, it finds that a reduction in the probability of postelection violence by only a few percentage points could offset the cost of the technology. However, this is far from assured; we argue that biometric technology can only contribute to less disputed and less violent elections in particular settings, those where democracy is not yet well institutionalized but where political parties value the legitimacy conferred by elections that are sufficiently credible for their results to be accepted. One priority is therefore to screen potential cases carefully, before investing in costly programs that have a low probability of success. Another step toward using technology more effectively to underpin sustainable elections would be to build on voter registration drives to strengthen permanent identification assets such as civil registration and national ID programs that can serve as the basis for the voter roll.  相似文献   
2.
Information and communications technologies (ICTs) include old technologies—such as the radio and the television—as well as newer technologies—such as the Internet and wireless telephony. This study considers the process that the government of Uganda has used to adopt and implement ICT policy. This study also considers the techniques which the government of Uganda has used to distribute ICTS in public locations such as government offices, schools, and hospitals. In particular, this study attempts to consider the political motivations for distribution. The Ugandan government's attempt to distribute this technology reflects strengths in the area of distribution of artefacts, particularly to rural areas. Information and communications technologies are an important part of the Ugandan economy. In addition, ICTs strengthen the ability of citizens to communicate with each other across regional and language borders through shared access points. Methodologically, this paper uses the case study method. Semi‐structured interviews were conducted with politicians, policy makers, civil society activists, citizens, academics, medical personnel, regional government officials, and business people. This paper argues that politicians use ICTs as a component of a basket of goods and services that they can distribute to witnessing publics. This paper argues that ICT should be viewed as a type of infrastructure, and that as a public good, it can be used as a “club” good or “pork.” Although several authors discuss the potential of ICTs as democratizing, this paper documents that the Ugandan government has employed ICTs in oppressive ways, including for the surveillance of opposition leaders, and for social control.  相似文献   
3.
Public policy scholars have recently focused on the mechanisms accounting for the sustainability of major policy changes. Among the strategies by which policy entrepreneurs may try to avoid future backlash institutionalization is certainly one of the most used. Yet, it can foster ossification and eventually jeopardize policy effectiveness. Such a potential trade-off between institutionalization and long-term effectiveness is particularly intense in policies concerning technological innovation because the necessity to create winning coalitions can undermine the required absorption capacity needed by government to engage the innovation ecosystems. This paper explores such a trade-off with a case study on the Italian policy for public sector's digital transformation. The case is theoretically promising because over three decades institutionalization has always represented the main overall strategy adopted by policymaker, but only the 2016 initiative emerged as a “success.” In this sense, the case study can focus on the mechanisms activated by policy entrepreneurs to trigger and entrench change.  相似文献   
4.
Information controls are actions intended to deny, disrupt, monitor, or secure information for political ends. They can be implemented using a wide variety of technical and nontechnical means. Political contests over the control of information are heightened around important events, such as major anniversaries, armed conflicts, protests, and elections. In this paper, we offer a comparative case study of online censorship of the circumvention tool Psiphon during the Iranian elections in 2016 and 2013, drawing on unique access to analytics data from Psiphon. We find that the Iranian regime developed its censorship approach in two ways, deploying blocking that was more targeted and strategically timed in the more recent case. Evidence suggests that the regime relaxed censorship of Psiphon during the official campaign period for the 2016 election. The apparent objective of this new approach was to control access to information while minimizing the political consequences of doing so.  相似文献   
5.
Big data applications have been acclaimed as potentially transformative for the public sector. But, despite this acclaim, most theory of big data is narrowly focused around technocratic goals. The conceptual frameworks that situate big data within democratic governance systems recognizing the role of citizens are still missing. This paper explores the democratic governance impacts of big data in three policy areas using Robert Dahl’s dimensions of control and autonomy. Key impacts and potential tensions are highlighted. There is evidence of impacts on both dimensions, but the dimensions conflict as well as align in notable ways and focused policy efforts will be needed to find a balance.  相似文献   
6.
At outdoor crime scenes, cadaver-detection and blood-detection dogs may be tasked with locating blood that is days, weeks or months old. Although it is known that the odour profile of blood will change during this time, it is currently unknown how the profile changes when exposed to the environment. Such variables must be studied in order to understand when the odour profile is no longer detectable by the scent-detection dogs and other crime scene tools should be implemented. In this study, blood was deposited onto concrete and varnished wood surfaces and weathered in an outdoor environment over a three-month period. Headspace samples were collected using solid phase microextraction (SPME) and analysed using comprehensive two-dimensional gas chromatography – time-of-flight mass spectrometry (GC×GC–TOFMS). The chemical odour profiles were compared with the behavioural responses of cadaver-detection and blood-detection dogs during training. Data interpretation using principal component analysis (PCA) and hierarchical cluster analysis (HCA) established that the blood odour could no longer be detected using SPME–GC×GC–TOFMS after two months of weathering on both surfaces. Conversely, the blood-detection dogs had difficulty locating the blood samples after one month of weathering on concrete and after one week of weathering on varnished wood. The scent-detection dogs evaluated herein had not been previously exposed to environmentally weathered blood samples during training. Given that this study was conducted to test the dogs' baseline abilities, it is expected that with repeated exposure, the dogs' capabilities would likely improve. The knowledge gained from this study can assist in providing law enforcement with more accurate training aids for blood-detection dogs and can improve their efficiency when deployed to outdoor crime scenes.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号