(Re)Organizing legitimacy theory
نویسندگان
چکیده
Purpose Despite a common conceptual root, research applying legitimacy theory addresses any number of more or less distinct behaviours, attitudes, and processes. Although this variety in approaches has complicated theoretical development, we argue that it is critical to addressing the breadth construct. To address state affairs, offer Concentric Diagram Legitimacy as an organizing tool for literature. The diagram roots itself dialogue legitimacy, argues fundamentally comprised five key propositions. Proposition 1 link between authority acquiescence directly while remaining propositions organizational support (Proposition 2) public approval 3) with authority, interactions 4) social context 5) acquiescence.
منابع مشابه
A Theory of Legitimacy
We develop a formal theory of legitimate collective choice. In our theory a policy choice is legitimate if the process through which the final choice was determined is consistent with some principle that can be used to (perhaps partially) rank the potential policy choices. The set of principles in any choice situation is taken to be exogenous, but a decision-making process is defined so as to d...
متن کاملA Utilitarian Theory of Political Legitimacy
Although the burgeoning discipline of welfare economics is based on essentially utilititarian principles, the foundations of utilitarianism have received little attention in recent years. This paper seeks to reopen the debate by drawing a distinction between Harsanyi’s two defences of utilitarianism, labeling the first a teleological or ideal-observer theory, and the second a nonteleological th...
متن کاملReorganizing UNIX for Reliability
In this paper, we discuss the architecture of a modular UNIX-compatible operating system, MINIX 3, that provides reliability beyond that of most other systems. With nearly the entire operating system running as a set of user-mode servers and drivers atop a minimal kernel, the system is fully compartmentalized. By moving most of the code to unprivileged user-mode processes and restricting the po...
متن کاملReorganizing Workflow Evolution Provenance
The provenance of related computations presents the opportunity to better understand and explore the differences and similarities of various approaches. As users design and refine workflows, evolution provenance captures the relationships between workflows as actions that mutate one workflow to another. However, such provenance may not always be the most compact or intuitive. This paper present...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Legal and Criminological Psychology
سال: 2022
ISSN: ['2044-8333', '1355-3259']
DOI: https://doi.org/10.1111/lcrp.12199