(Re)Organizing legitimacy theory

نویسندگان

چکیده

Purpose Despite a common conceptual root, research applying legitimacy theory addresses any number of more or less distinct behaviours, attitudes, and processes. Although this variety in approaches has complicated theoretical development, we argue that it is critical to addressing the breadth construct. To address state affairs, offer Concentric Diagram Legitimacy as an organizing tool for literature. The diagram roots itself dialogue legitimacy, argues fundamentally comprised five key propositions. Proposition 1 link between authority acquiescence directly while remaining propositions organizational support (Proposition 2) public approval 3) with authority, interactions 4) social context 5) acquiescence.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Theory of Legitimacy

We develop a formal theory of legitimate collective choice. In our theory a policy choice is legitimate if the process through which the final choice was determined is consistent with some principle that can be used to (perhaps partially) rank the potential policy choices. The set of principles in any choice situation is taken to be exogenous, but a decision-making process is defined so as to d...

متن کامل

A Utilitarian Theory of Political Legitimacy

Although the burgeoning discipline of welfare economics is based on essentially utilititarian principles, the foundations of utilitarianism have received little attention in recent years. This paper seeks to reopen the debate by drawing a distinction between Harsanyi’s two defences of utilitarianism, labeling the first a teleological or ideal-observer theory, and the second a nonteleological th...

متن کامل

Reorganizing UNIX for Reliability

In this paper, we discuss the architecture of a modular UNIX-compatible operating system, MINIX 3, that provides reliability beyond that of most other systems. With nearly the entire operating system running as a set of user-mode servers and drivers atop a minimal kernel, the system is fully compartmentalized. By moving most of the code to unprivileged user-mode processes and restricting the po...

متن کامل

Reorganizing Workflow Evolution Provenance

The provenance of related computations presents the opportunity to better understand and explore the differences and similarities of various approaches. As users design and refine workflows, evolution provenance captures the relationships between workflows as actions that mutate one workflow to another. However, such provenance may not always be the most compact or intuitive. This paper present...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Legal and Criminological Psychology

سال: 2022

ISSN: ['2044-8333', '1355-3259']

DOI: https://doi.org/10.1111/lcrp.12199