Ta 72367
نویسندگان
چکیده
While the social economy originated in Europe (Desroche, 1983; Gueslin, 1997; Vienney, 1994), by the nineteenth century it emerged in North America as well, particularly in Canada and Quebec with its ties to the United Kingdom and France as well as other European countries, especially Germany and Belgium. Today, it is interesting to explore the renewal of the social economy in Europe and in Canada in the final third of the twentieth for a number of reasons. First, although Canada is an integral part of the North American continent, inter alia because of its participation in free trade agreements (including NAFTA), it shares many characteristics with Europe, including economic policies that are more interventionist, a more comprehensive welfare state than in the United States, and social movements that are more organised and more widely recognized by government. (Brunelle and Lévesque, 2004; Lévesque, 2001). Second, the renewal of the social economy, notably in Quebec, benefited from a rich dialogue inter alia with France, on theoretical approaches as well as from comparisons of experiences. An important example of comparative analysis was undertaken by the France-Quebec Social and Solidarity Economy Project that influenced the development of public policy to support the social and solidarity economy. Lastly, new theoretical approaches to the social economy are increasingly the result of a fertile exchange between several scientific associations and international research networks such as CIRIEC, EMES and ISTR (Evers and Laville, 2004; Laville and Cattani, 2005).
منابع مشابه
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework
This paper reports a preliminary framework that supports stakeholder evaluation, comparison and selection of IT Security Certification schemes. The framework may assist users in the selection of the most appropriate scheme to meet their particular needs.
متن کاملSafeguarding Personal Data using Rights Management in Distributed Applications
Privacy includes the right to determine the use of personal information after it has been released. Some compliance solutions have been proposed already. However, they are usually monolithic systems operating only within one database system or requiring a customized infrastructure. This paper explores the possibility to use an off-the-shelf document rights management platform to enable enforcem...
متن کاملIdentification Now and in the Future: Social Grant Distribution Process in South Africa
This paper seeks to apply Identity Management (IDM) principles to the social grant distribution process in South Africa, which has been prone to fraud and corruption. It discusses the social grant distribution process and the problems encountered. Suggested solutions to the problems are highlighted and these include moving from an Isolated IDM architecture to either a Federated and/or Centralis...
متن کاملSecurity Analysis of Two Ultra-Lightweight RFID Authentication Protocols
In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and MAP, which are recently proposed by Peris-Lopez et al. We identify two effective attacks, namely De-synchronization attack and Full-disclosure attack, against their protocols. The former attack can break the synchronization between the RFID reader and the tag in a singl...
متن کاملDevelopment and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content
Integrity as minimal requirement for successful protection of the learning process is neglected by most learning management systems. To implement integrity protection independent of existing e-learning systems we present the concept of a proxy server that digitally signs outgoing messages to the learning management systems and verifies the signature of incoming messages accordingly. We illustra...
متن کاملCrafting Web Counters into Covert Channels
We present in this paper a new network storage channel WebShare that uses the plentiful, public Web counters for storage. Therefore, the physical locations of the WebShare encoder and decoder are not restricted to a single path. To make WebShare practical, we have addressed a number of thorny issues, such as the “noise” introduced by other legitimate Web requests, and synchronization between en...
متن کامل