Refine
Year of publication
Document Type
- Report (471) (remove)
Language
- English (471) (remove)
Has Fulltext
- yes (471)
Is part of the Bibliography
- no (471)
Keywords
- islamic state (13)
- terrorism (13)
- IS (9)
- Egypt (8)
- Syria (8)
- islamism (7)
- Europe (6)
- Germany (6)
- Goethe, Johann Wolfgang von (6)
- USA (6)
Institute
- Gesellschaftswissenschaften (212)
- Exzellenzcluster Die Herausbildung normativer Ordnungen (112)
- Wirtschaftswissenschaften (96)
- Center for Financial Studies (CFS) (42)
- House of Finance (HoF) (30)
- Sustainable Architecture for Finance in Europe (SAFE) (30)
- Informatik (20)
- Mathematik (16)
- Extern (8)
- Physik (7)
In this paper I discuss the properties of particle verbs in light of a proposal about syntactic projection. In section 2 I suggest that projection involves functional structure in two important ways: (i) only functional phrases can be complements, and (ii) lexical heads that take complements and project must be inflected. In section 3, I show that the structure of particle verbs is not uniform with respect to (i) and (ii). On the one hand, a particle always combines with an inflected verb; in this respect, particle verbs look like verb-complement constructions. On the other hand, the particle is not a functional phrase and therefore is not a proper complement, which makes the combination of the particle and the verb look more like a morphologically complex verb. I argue that syntactic rules can in fact interpret the node dominating the particle and the verb as a projection and as a complex head. In section 4, I show that many of the characteristic properties of particle verbs in the Germanic languages follow from the fact that they are structural hybrids.
Left dislocation in Zulu
(2004)
This paper examines left dislocation constructions in Zulu, a Southern Bantu language belonging to the Nguni group (Zone S 40). In Zulu left dislocation configurations, a topic phrase in the beginning of the sentence is linked to a resumptive element within the associated clause. Typically, the resumptive element is an incorporated pronoun (cf. Bresnan & Mchombo 1987), as illustrated by the examples in (1) and (2). In these examples, the object pronoun (in italics) is part of the verbal morphology and agrees with the noun class (gender) of the dislocate. This situation is schematically illustrated in (3), where co-indexation represents agreement: ...
Condensing phenomena for systems biology, ecology and sociology present in real life different complex behaviors. Based on local interaction between agents, we present another result of the Energy-based model presented by [20]. We involve an additional condition providing the total condensing (also called consensus) of a discrete positive measure. Key words: Condensing; consensus; random move; self-organizing groups; collective intelligence; stochastic modeling. AMS Subject Classifications: 81T80; 93A30; 37M05; 68U20
Local interactions between particles of a collection causes all particles to reorganize in new positions. The purpose of this paper is to construct an energy-based model of self-organizing subgroups, which describes the behavior of singular local moves of a particle. The present paper extends the Hegselmann-Krause model on consensus dynamics, where agents simultaneously move to the barycenter of all agents in an epsilon neighborhood. The Energy-based model presented here is analyzed and simulated on finite metric space. AMS Subject Classifications:81T80; 93A30; 37M05; 68U20
Freiburg School of Law and Economics, Freiburg (Lehrstuhl-)Tradition and the Genesis of Norms
(2014)
The paper analyzes the parallels and differences between the Freiburg School of Law and Economics represented by the works of Eucken (and Röpke) and the Freiburg (Lehrstuhl-)Tradition represented by the works of Hayek and Vanberg. The parallels are illustrated by making use of the constitutional economics concepts Ordnungspolitik (i.e., order of rules/choices over rules) as well as freedom of privileges and discrimination. The differences, which have received surprisingly little attention, include the following aspects: 1. philosophy of science and epistemology, 2. genesis of norms, and 3. political philosophy. The paper tackles these issues in three steps. The second chapter presents Vanberg’s constitutional economics theory with special emphasis on the concepts of citizen sovereignty and normative individualism. The third chapter reviews the ordoliberal concepts of science and the state which are – to a certain degree – elitist and expertocratic, that is, they rely to a considerable degree on intellectual experts (in particular, scientists) being part of the societal elite. The fourth chapter differentiates two kinds of genesis of norms: an evolutionary one and an elitist-expertocratic one allowing for a differentiation between Eucken’s and Röpke’s Ordoliberalism on the on the hand and Vanberg’s Hayekian -- and Buchanan-style constitutional economics approach on the other hand. The paper ends with a summary of the main findings.
Following Foucault's analysis of German Neoliberalism (Ordoliberalism) and his thesis of ambiguity, this paper introduces a two-level distinction between individual and regulatory ethics. In particular, its aim is to reassess the importance of individual ethics in the conceptual framework of Ordoliberalism. The individual ethics of Ordoliberalism is based on the heritage of Judeo-Christian values and the Kantian individual liberty and responsibility. The regulatory or formal-institutional ethics of Ordoliberalism which has so far received most attention on the contrary refers to the institutional and legal framework of a socio-economic order. By distinguishing these two dimensions of ethics incorporated in German Neoliberalism, it is feasible to distinguish different varieties of neoliberalism and to link Ordoliberalism to modern economic ethics.
Variations and disparities between von Hayek and Ordoliberalism can be detected on diverse levels: 1. philosophy of science; 2. setting dissimilar priorities; 3. social philosophy; 4. genesis of norms; and, 5. notion of freedom. Therefore, it is possible to make an important distinction within neoliberalism itself, which contains at least two factions: von Hayek’s evolutionary liberalism, and German Ordoliberalism. The following essay not only takes the neoliberal separation of different varieties as granted; it proceeds further. It focuses on the topic of justice and elaborates the (slightly) differing conceptions of justice within neoliberalism. Thus, the specific contribution of the paper is that it adds a sixth dimension of differences (which is highly interconnected with the differing conceptions of genesis of norms). In this paper, I emphasize the (often neglected) subtle differences between von Hayek, Eucken, Röpke, and Rüstow, with special emphasis on their theories of justice. In this regard, I focus not only on Eucken and von Hayek; in addition, I include the concepts of justice developed by Rüstow and Röpke, as well, and, in consequence, broaden the perspective incorporating Eucken as a member of the Freiburg School of Law and Economics, and Rüstow and Röpke as representatives of Ordoliberalism in the wider sense. The paper tackles these topics in three steps. After briefly examining and discussing the existing literature and providing a literature overview on the decade-long debate on von Hayek and Ordoliberalism, I then describe von Hayek’s conception of commutative justice; particularly, justice of rules and procedures (rather than end-state justice). Then, I examine Eucken’s, Rüstow’s, and Röpke’s theories of justice, which consist of a mixture of commutative and distributive justice. Then, I draw a comparison between the ideas of justice developed by Eucken, Röpke, Rüstow, and von Hayek. The essay ends with a summary of my main findings.
4 June 2013 marked the formal launch of the third generation of the Equator Principles (EP III) and the tenth anniversary of the EPs – enough reasons for evaluating the EPs initiative from an economic ethics and business ethics perspective. This chapter deals with the following questions: What has been achieved so far by the EPs? Which reform steps need to be adopted to further strengthen the EPs framework? Can the EPs be regarded as a role model in the field of sustainable finance and CSR? The first part explains the term EPs and introduces the keywords related to the EPs framework. The second part summarises the main characteristics of the newly-released third generation of the EPs. The third part critically evaluates EP III from an economic ethical and business ethics perspective. The chapter concludes with a summary of the main findings.
2008/9 sees the 60th anniversary of the German economic and currency reform of June 20, 1948, and the adoption of the Grundgesetz on May 23, 1949, which committed the country to the ideals of a socially committed market economy. Both of these events are important points along the path taken by the Federal Republic of Germany to reach the system of a social market economy. Since the term, Social Market Economy is often used in several different contexts and sometimes to mean contradictory things, we must ask: what exactly does the term social market economy entail? What economic-ethical ideas and theories are behind it? This paper will trace the origins of the social market economy (chapter 2) and explain the central characteristics of the Freiburg School of Economics (chapter 3), one of the main pillars of the social market economy. Central to this paper is the oeuvre of Walter Eucken, one of the leading representatives of the ordoliberal Freiburg School. The aim is to identify socio-political factors of influence and inspiration on his theory of economic policy (chapter 4) and evaluate similarities to the works of Kant, Smith and other economic philosophers. Chapter 5 will seek to elucidate Eucken’s “Program of Liberty”. We shall also allow ourselves a slight diversion to elaborate on the parallels between this work and Kant’s understanding of freedom and autonomy. Chapter 6 deals with Eucken’s dual requirements of an economic and social order (i.e. functioning and humane socio-economic order). In chapter 7, we seek to answer – with considerable reference to Adam Smith – to what extent it can be assumed that self-interest and the common good are mutually compatible. This paper concludes with a few remarks about the topicality of ordoliberalism in relation to modern, German-speaking economic ethics (chapter 8).
This paper investigates the accuracy of point and density forecasts of four DSGE models for inflation, output growth and the federal funds rate. Model parameters are estimated and forecasts are derived successively from historical U.S. data vintages synchronized with the Fed’s Greenbook projections. Point forecasts of some models are of similar accuracy as the forecasts of nonstructural large dataset methods. Despite their common underlying New Keynesian modeling philosophy, forecasts of different DSGE models turn out to be quite distinct. Weighted forecasts are more precise than forecasts from individual models. The accuracy of a simple average of DSGE model forecasts is comparable to Greenbook projections for medium term horizons. Comparing density forecasts of DSGE models with the actual distribution of observations shows that the models overestimate uncertainty around point forecasts.
Who is Ângkar? The nature of authority and responsibility under the Khmer Rouge Forme cadres of the Khmer Rouge today still speak of Ângkar, the organisation of the Khmer Rouge, with the utmost respect and subservience. Unlike in other genocidal regimes in which state actors played an important role, such as the NSDAP and SS in the Holocaust or Ittihad in the Ottoman genocide of the Armenians, Ângkar cannot be reduced merely to the name of the party organisation of the Khmer Rouge. Although Ângkar is a concept known to all in Cambodia and remains synonymous with absolute authority and the necessity for unwavering obedience, there is a broad variety of perspectives when trying to state who or what Ângkar actually is...
This contribution draws on two recent publications in which the macroeconomic model data base (www.macromodelbase.com) is employed for model comparisons. The comparative approach is used to base policy analysis on a systematic evaluation of the different implications that a certain economic policy can have when submitted to different modeling approaches. In this manner, policy recommendations are more robust to modeling uncertainty. By extending the comparative approach to forecasting, the authors investigate the accuracy of different forecasting models and obtain more reliable mean forecasts.
How to be a good European...
(2010)
Unter der Überschrift "Ich kaufe griechische Staatsanleihen weil..." sollten Persönlichkeiten aus Politik, Wirtschaft und Kultur kurz begründen, warum sie griechische Staatsanleihen gekauft haben bzw. kaufen werden--idealerweise unter Nachweis ihres finanziellen Engagements. Zum jetzigen Zeitpunkt kaufe ich keine griechischen Staatsanleihen...
Repertoires of counter-contention: conceptualizing institutional responses to social movements
(2016)
The ways in which political authorities respond to societal challenges is a key element in the interaction between social movements and state institutions. Two conceptual distinctions are important when studying such repertoires of counter-contention: authorities’ responses may (1) aim at either including or excluding challengers, and they may (2) either respect their autonomy or try to control them.
This is the ninth article in our series Trouble on the Far-Right.
Since around 1990, the state of the Austrian far right1 has been characterized by the strength of the Austrian Freedom Party (FPÖ – Freiheitliche Partei Österreichs, more precisely translated as Freedomite Party of Austria2) and the relative weakness of extra-parliamentarian far right activism. Far from a mere coincidence, these two features are to be understood as closely linked: the FPÖ’s electoral successes have brought far right causes and talking points unto the political center stage on a national level, given them ample media coverage and made street militancy increasingly pointless. Insofar, the Austrian far right spectrum could – at least until recently – be described as a photographic negative of the situation in Germany: successful party politics, weak bottom-up mobilizations and a comparatively low incidence of street violence. Currently, however, the long held hopes of German right-wingers for a party both in the mold, and strength, of the FPÖ are apparently being fulfilled by the emergence of the Alternative for Germany (AfD). Conversely, both legal and illegal street activism have been on the rise in Austria in recent years, particularly since the start of the asylum crisis in Europe. Numerous violent incidents were reported in 2015, including a minimum of 25 attacks on housing facilities for asylum seekers.
Using fiscal reaction functions for 3a panel of actual euro-area countries the paper investigates whether euro membership has reduced the responsiveness of countries to increases in the level of inherited debt compared to the period prior to succession to the euro. While we find some evidence for such a loss in prudence, the results are not robust to changes in the specification, as for example an exclusion of Greece from the panel. This suggests that the current debt problems may result to a large extent from pre-existing debt levels prior to entry or from a larger need for fiscal prudence in a common currency, while an adverse change in the fiscal reaction functions for most countries does not apply.
Applying an investment perspective to higher education, the paper presents detailed empirical evidence on the rate of return to higher education and its determinants. Employing a sample of 17,180 higher education graduates derived from the German Labor Force Survey 2004, we show considerable variation in the rates of return to higher education across the different subjects, with some subjects on average not representing attractive private investments from an economic point of view. We find that the decision what to study is worth several hundred thousand Euros. Applying regression analysis, we find gender- and degree-specific return advantages only in certain subjects. Comparing the return of an investment in higher education and the production cost of higher education, we show that more expensive subjects (apart from Medicine) yield a lower return. When considering the cost of study, the overall order of attractiveness of the different forms of education remains stable, but the investment in further subjects is no longer clearly attractive. Keywords: Returns to Education, Human Capital, Higher Education Earnings Capacity.
Option-implied information and predictability of extreme returns : [Version 24 September 2012]
(2012)
We study whether option-implied conditional expectation of market loss due to tail events, or tail loss measure, contains information about future returns, especially the negative ones. Our tail loss measure predicts future market returns, magnitude, and probability of the market crashes, beyond and above other option-implied variables. Stock-specific tail loss measure predicts individual expected returns and magnitude of realized stock-specific crashes in the cross-section of stocks. An investor, especially the one who cares about the left tail of her wealth distribution (e.g., disappointment-averse), benefits from using the tail loss measure as an information variable to construct managed portfolios of a risk-free asset and market index. The tail loss measure is motivated by the results of the extreme value theory, and it is computed from observed prices of out-of-the-money put as the risk-neutral expected value of a loss beyond a given relative threshold.
Security, arms control, disarmament and confidence building measures in the Baltic sea region
(2017)
Taking into consideration the stalemete of all disarmament negotiations as well as the worsening situation in the Baltic Sea region, I would like to present another paper as well, discussing the security trends in the Baltic Sea region and the potential of confidence building measures in this region as well as to discuss in this context the prospects of arms control and disarmament in general as well as specifically in Europeparticularly in the Baltic Sea region...
Terrorism isn't new to the country; in its history, France has experienced a significant number of attacks. In 1995, the GIA-affiliated terrorist network of which Khaled Kelkal was part conducted several attacks, as did the Al Qaida-affiliated gang de Roubaix one year later; but until Mohammed Merah’s murders in 2012 in Toulouse and Montauban, terrorist attacks were treated as political violence in the context of anti-colonial struggles or connected to other kinds of violent conflicts abroad, such as the Bosnian War, rather than as religiously inspired or connected to social, societal and/or political issues within the country, or as some sort of atypical pathology. Terrorist perpetrators, their networks and milieus were met with repressive instruments – a wider angle of analysis which would have allowed to tackle the threat from a more holistic perspective had not been incorporated in a counter-terrorism policy design.
This is the last post in the blog series „Movements and Institutions“. Check out the introductory post for more information on the series and click here for all contributions.
This blog series reflected on the interactions between social movements and institutions. These interactions have proven to be among the most complicated areas of social movement research, especially because causality is very hard to establish: (how) do movements influence formal political institutions – and vice versa? How to study, understand and explain the consequences of the institutionalization of social movements? The difficulties of addressing these questions are also related to definitional problems as social movements and institutions can be understood and defined in various ways. All authors contributing to this blog series highlight the importance of studying interactions between social movements from one perspective or another.
This paper outlines relatively easy to implement reforms for the supervision of transnational banking-groups in the E.U. that should not be primarily based on legal form but on the actual risk structures of the pertinent financial institutions. The proposal also aims at paying close attention to the economics of public administration and international relations in allocating competences among national and supranational supervisory bodies.
Before detailing the own proposition, this paper looks into the relationship between sovereign debt and banking crises that drive regulatory reactions to the financial turmoil in the Euro area. These initiatives inter alia affirm effective prudential supervision as a pivotal element of crisis prevention.
In order to arrive at a more informed idea, which determinants apart from a per-ceived appetite for regulatory arbitrage drive banks’ organizational choices, this paper scrutinizes the merits of either a branch or subsidiary structure for the cross-border business of financial institutions. In doing so, it also considers the policy-makers perspective. The analysis shows that no one size fits all organizational structure is available and concludes that banks’ choices should generally not be second-guessed, particularly because they are subject to (some) market discipline.
The analysis proceeds with describing and evaluating how competences in prudential supervision are currently allocated among national and supranational supervisory authorities. In order to assess the findings the appraisal adopts insights form the economics of public administration and international relations. It argues that the supervisory architecture has to be more aligned with bureaucrats’ incentives and that inefficient requirements to cooperate and share information should be reduced. The evolving Single Supervisory Mechanism for euro area banks with its rather complicated allocation of responsibilities between the ECB and the national supervisors in participating and non-participating Member States will not solve all the problems identified as it is partly in disaccord with bureaucrats’ incentives.
The last part of this paper finally sketches an alternative solution that dwells on far-reaching mutual recognition of national supervisory regimes and allocates competences in line with supervisors’ incentives and the risk inherent in cross-border banking groups.
Following on the ADEA/APNET study on inter-African Book trade that was commissioned in 1999, ADEA tasked APNET to facilitate the production of national book industry updates in each country. The updates are aimed at encouraging commercial development of inter-African book trade and to make available to the public, total systematic and current situations on the book trade in each country.
Threat perceptions is a popular topic among scholars of international relations, yet the focus is oftentimes how two states perceive and misperceive threats (Robert Jervis, David Singer among others). Threats are generally understood as potential harm directed against the territorial integrity or the political regime of the states in question or both. Wandering on the borders of the mainstream realist theory and the rational choice theory – popular since when behavioralism entered into IR literature in the 1960s – and the constructivism of the reflectivist era (Wendt), the topic has been made a subject of study through such several different conceptual lenses but mostly on an international/state level of analysis a la Waltz...
Consensus modality : accommodating parties and containing overt violence in Nepal’s peace process
(2017)
Throughout this decade, most of the literatures in social sciences on Nepal contain Maoist Armed Conflict (1996-2006) in its introduction part. The country is in constant political turmoil even after the Comprehensive Peace Accord of 2006 between Government of Nepal and then rebel force. Since the peace agreement, Nepalese society has observed diverse socio-political tensions in different forms and become fragile society. Nepal is exerting a growing concern on international politics because of the complication in the peace process of ensuring sustainable peace, stability and economic progress. The implications for peace, stability and economic development in fragile countries present a challenge to the international community (In Grävingholt et al, 2013). Political culture and social structure are empirically related to political stability (Lijphart, 1969: 208). So we cannot separate our social and cultural context with the idea of stability...
s.a. Deutsche Fassung: Rechtshistorisches Journal 15, 1996, 255-290 und in: Eric Schwarz (Hg.) La théorie des systèmes: une approche inter- et transdisciplinaire. Bösch, Sion 1996, 101-119. Italienische Fassung: La Bukowina globale: il pluralismo giuridico nella società mondiale. Sociologic a politiche sociali 2, 1999, 49-80. Portugiesische Fassung: Bukowina global sobre a emergência de um pluralismo jurídico transnacional. Impulso: Direito e Globalização 14, 2003. Georgische Fassung: Globaluri bukovina: samarTlebrivi pluralizmi msoflio sazogadoebaSi. Journal of the Institute of State and Law of the Georgian Academy of Sciences 2005 (im Erscheinen)
In the article, a travel sketch of Danish playwright Kaj Munk (1898 – 1944) is analytically considered. The analysis of this text allows drawing at least three conclusions: 1. Explicit motive of seasickness, figuring here as antithetic modification of implicite present free-standing posture motive, symbolizes idea of disintegrating personality. 2. Such a symbolism is deeply rooted in that of Danish identity. 3. From literary styles and trends history point of view, the sketch appears to be typical of that line in expressionism, which continues tradition of symbolism as artistic and literary trend of late 19th century.
This paper surveys the growth and various phases of and influences on the concept of democracy in the Islamic political thought of the last two centuries. Among the thinkers covered in the survey are Rifa'a Tahtawi (1801-73), Khairuddin at-Tunis (1810-99), Jamal ad-Din al-Afghani (1838-97), Muhammad Abduh (1849-1905), Abdurrahman al-Kawakibi (1849-1903), Rashid Rida (1865-1935), Hasan al-Banna (1904-49), Ali Abd Ar-Raziq (1888-1966), Sayyid Qutb (1906-66), Sa'id Hawwa, and Malik Bennabi (1905-73). Reference is made to the influence of Sayyid Mawdudi (1903-79), on the thought of Sayyid Qutb. The paper traces also the bearing of Bennabi's thought on Rachid Ghannouchi and on the Islamic movements of our times.
In the last years, much effort went into the design of robust anaphor resolution algorithms. Many algorithms are based on antecedent filtering and preference strategies that are manually designed. Along a different line of research, corpus-based approaches have been investigated that employ machine-learning techniques for deriving strategies automatically. Since the knowledge-engineering effort for designing and optimizing the strategies is reduced, the latter approaches are considered particularly attractive. Since, however, the hand-coding of robust antecedent filtering strategies such as syntactic disjoint reference and agreement in person, number, and gender constitutes a once-for-all effort, the question arises whether at all they should be derived automatically. In this paper, it is investigated what might be gained by combining the best of two worlds: designing the universally valid antecedent filtering strategies manually, in a once-for-all fashion, and deriving the (potentially genre-specific) antecedent selection strategies automatically by applying machine-learning techniques. An anaphor resolution system ROSANA-ML, which follows this paradigm, is designed and implemented. Through a series of formal evaluations, it is shown that, while exhibiting additional advantages, ROSANAML reaches a performance level that compares with the performance of its manually designed ancestor ROSANA.
“We shall bring victory”. Those were the words of sheik Hassan Nasrallah, leader of Hezbollah, on 25 may 2013. Usually these words would be directed at Israel, the sworn enemy of the Lebanese movement. But this time Nasrallah was referring to the fighting in Syria. That night Hezbollah explicitly chose to side with the Syrian government in her fight against the rebels in the ongoing civil war. Why does the Shia Islamic and pro-Iranian Hezbollah stand so firmly alongside the secular Arab nationalist regime of Bashar al-Assad? What are the consequences for Lebanon and what does the interference of Hezbollah tell us about the balance of power in the small and deeply divided neighbouring country of Syria?
This is the sixth article in our series Trouble on the Far-Right.
As everywhere else in Eastern Europe, ever since the fall of the communist regime, Romania’s political system has experienced dramatic changes from one electoral cycle to another, starting off with what was considered to be an inflation of political parties at the beginning of the 1990’s and arriving today at what seems to approximate a two-party system, with the Social-Democratic Party (PSD) on the left and the National Liberal Party (PNL) on the right side of the political spectrum. However, the fog surrounding the ideological identities of virtually all Romanian political parties has only intensified in time, leaving the party system in flux and creating the idea that there are no significant differences between the major political players. As was the case of many other countries, this situation has generated the (at least partial) success of a radical anti-establishment discourse. However, unlike other European countries, the far right in Romania did not benefit by the financial crisis...
This is the 13. article in our series Trouble on the Far-Right.
The environment for populist radical right (PRR) parties in Europe is favourable. Both the refugee crisis as well as the recent terrorist attacks in Paris and Brussels have ostensibly fuelled further xenophobic and anti-Islam sentiments among European publics, on the basis of which PRR parties have been shown to build their support. Recent elections in Europe have indeed seen good results for parties with an outspoken xenophobic message, the victories in March 2016 for the Alternative for Germany (AfD) in the German regional elections and two far right parties (SNS and L’SNS) in the Slovak national elections being cases in point. Opinion polls in countries such as France and the Netherlands look equally promising for PRR parties. Even though not all European countries have witnessed the successful mobilisation of the PRR, it is fair to conclude that this party family is going strong. It would be too quick to conclude, however, that PRR parties only thrive on the recent salience of the immigration issue.
Part V of our series on ISIS : "Blogforum 'Kalifat des Terrors: Interdisziplinäre Perspektiven auf den Islamischen Staat".
Since 2003, several organizations in the Arab world swore allegiance to Osama Bin Laden and al-Qaida and became part of what was been called “al-Qaeda’s affiliate network”. The emergence of al-Qaeda groups in Saudi Arabia 2003, Iraq 2004, Algeria 2007 and Yemen 2009 convinced many supporters and enemies that there was a truly global network of jihadist groups at work, commanded and controlled by the al-Qaeda leadership in Pakistan.
However, the reality was a lot more complicated. Far from being subordinate to Osama Bin Laden and Aiman al-Zawahiri, these organizations were not willing to submit to al-Qaeda command and control. Their relationship with “al-Qaeda central” was rather an alliance between independent partners of different strength. Although the al-Qaeda leadership sometimes influenced decisions taken by the regional groupings, there are numerous examples of “affiliates” ignoring its advice even regarding strategic issues.
The syndicated loan market, as a hybrid between public and private debt markets, comprises financial institutions with access to valuable private information about borrowers as a result of close bank-borrower relationships. In this paper, we seek empirical evidence for the costs of these relationships in a sample of UK syndicated loan contracts for the time period 1996 through 2005. Using detailed financial data for both borrowers (private and public companies) and for financial institutions, we find that undercapitalized banks charge higher loan spreads for loans to opaque borrowers using various measures for borrower opaqueness and controlling for bank, borrower and loan characteristics. We further analyze this hold-up effect over the business cycle and find that it only prevails during recessions. In expansion phases, however, we do not find evidence for banks exploiting their information monopoly. This finding is consistent with theories on bank reputation in bank loan commitments. Ambiguity about borrower financial health, which induces the information monopoly in the first place, also gives banks the discretion to exploit or not exploit informational captured borrowers. Our findings are both statistically and economically significant and robust to alternative bank and macroeconomic risk proxies. We address potential concerns about unobserved borrower heterogeneity exploiting the panel data nature of our sample. Using firm-bank fixed effect regressions, we find supporting evidence for our theoretical framework. JEL Classifications: G14, G21, G22, G23, G24 Keywords: Syndicated loans; Hold-up; Lending relationships; Business cycle
Part VI of our series on ISIS : "Blogforum 'Kalifat des Terrors: Interdisziplinäre Perspektiven auf den Islamischen Staat".
In 2014, two insurgency organisations stood out by their expansion, success and brutality: The Islamic State (IS) and Boko Haram (BH). The former emerged from the conflicts in Syria and Iraq and became a major actor in the Middle East, its influence reaching beyond the borders of its self-proclaimed “caliphate”, while the latter spread its violence throughout north-eastern Nigeria, spilling over into Cameroon, Chad and Niger. Because of their still growing success, many wonder about a possible partnership between IS and BH. To this I answer that there is a connection, but no partnership. Currently, any evidence suggesting a partnership is circumstantial at best...
We calculate the antibaryon-to-baryon ratios, anti-p/p, anti-Lambda/Lambda, anti-Xi/Xi, and anti-Omega/Omega for Au+Au collisions at RHIC (sqrt{s}_{NN}=200 GeV). The effects of strong color fields associated with an enhanced strangeness and diquark production probability and with an effective decrease of formation times are investigated. Antibaryon-to-baryon ratios increase with the color field strength. The ratios also increase with the strangeness content |S|. The netbaryon number at midrapidity considerably increases with the color field strength while the netproton number remains roughly the same. This shows that the enhanced baryon transport involves a conversion into the hyperon sector (hyperonization) which can be observed in the (Lambda - anti-Lambda)/(p - anti-p) ratio.
We calculate the kaon HBT radius parameters for high energy heavy ion collisions, assuming a first order phase transition from a thermalized Quark-Gluon-Plasma to a gas of hadrons. At high transverse momenta K_T ~ 1 GeV/c direct emission from the phase boundary becomes important, the emission duration signal, i.e., the R_out/R_side ratio, and its sensitivity to T_c (and thus to the latent heat of the phase transition) are enlarged. Moreover, the QGP+hadronic rescattering transport model calculations do not yield unusual large radii (R_i<9fm). Finite momentum resolution effects have a strong impact on the extracted HBT parameters (R_i and lambda) as well as on the ratio R_out/R_side.
Jan Snyman papers
(2007)
Biographical history and context: Professor Jan Snyman spent most of his life researching the lesser known and marginalised San languages of Botswana and South West Africa (now Namibia). Together with O. Kohler, E. Westphal and A. Traill, he pioneered linguistic studies on these endangered languages of Africa. He contributed significantly in collection of the data that helped classify and understand the grammar of San languages. Snyman also wrote several grammars in the form of monographs and notes on these languages. By the time he died, in 2002, a draft for the Tshwaa and Kua languages had been completed. Content: Linguistic, phonetics and orthography research materials including fonts for phonetic languages. Covering dates: 1967-2000
Exodus Eritrea
(2017)
This paper addresses the question whether close borrower-lender relationships, so called hausbank-relationships, facilitate the funding and beneficial development of SME. To this end, we derive a model which relates a firm's growth rate to its need for external funds and subsequently compute the firms that exceed their predicted growth rate. We then use this measure to identify specific characteristics that are associated with long- and short-term financing of firm growth, in particular the influence of relationship lending. We find that close ties with savings banks predict firms' access to external finance to fund growth. Moreover, the long-term liabilities of firms with hausbank-relationships almost double those with multiple relationships while the overall leverage is about the same. In turn, we find an strong empirical relationship between the provision of long-term funds and firm growth. Keywords: small business lending, credit access, public banks JEL Classifications: G21, D21
This review describes how the constraints of limited water resources and an arid and semi-arid environment were overcome by a leadership capable of defining future needs and identifying and implementing appropriate solutions. Advanced technologies proved indispensable in this process. Yet, in recent years, the continuously increasing demand for water, mainly for domestic use, has created a chronic situation in which all available water from natural sources is being used up. The only solution to ensuring a dependable supply of water for both domestic and agricultural use requires that several steps be taken concurrently to implement regulations and measures for saving water and to construct immediately large-scale plants for desalination of seawater and reclamation of urban effluents.
This is the eighth article in our series Trouble on the Far-Right.
Trouble’s brewing for the European Union – also in Finland, where the next country-wide elections will see several new, EU-hostile nationalist groups attempt to establish themselves on the political map. At the same time, Finnish Fascism is seeking to entrench and normalize itself into a respectable part of the political framework.
With disaffection growing, the time appears to be ripe. As Heikki Hiilamo, professor of social policy in Helsinki University notes, Finland has been particularly hard hit by the most recent economic downturn. The middle and lower classes are seeing their expectations fade into uncertainty, as globalization is bringing new and intangible threats in the form of vanishing jobs. Finland is heading towards increasing social inequality, with the reality of the educated and the employed drifting further apart from “globalization’s losers”. With no self-evident owner in sight, the accumulating political capital is attracting radical nationalist utilizers...
In its decision of December 13, 2011, the Constitutional Court of the state of North Rhine-Westphalia ruled that a State Court of Auditors is granted by the constitution a broad scope of powers not only to control the immediate state administration but also entities outside the direct state administration, as far as they exercise financial responsibility for the state. This ruling may have serious implications for the capital guarantees extended by EU Member States to the newly established institutions on the European level, as for instance the European Stability Mechanism (ESM).
After initial temporary measures in support of Greece prooved insufficient to end the sovereign debt crisis, extensive countermeasures have ensued. The heads of state of the euro group have agreed to permanent support mechanims over the course of the past two years. In addition, the European Central Bank (ECB) has become involved in the assistance program. The article provides an overview of the various support mechanisms installed and cautions against the connected legal problems.
We consider Schwarz maps for triangles whose angles are rather general rational multiples of pi. Under which conditions can they have algebraic values at algebraic arguments? The answer is based mainly on considerations of complex multiplication of certain Prym varieties in Jacobians of hypergeometric curves. The paper can serve as an introduction to transcendence techniques for hypergeometric functions, but contains also new results and examples.
When Donald Trump arrived to power, many experts were concerned regarding his ideas on U.S. nuclear weapons. Particular attention was paid to his tweet about strengthening the U.S. nuclear arsenal after 25 years of the consistent WMD-disarmament under "The Cooperative Threat Reduction Program" (aka "Nunn-Lugar Program" an array of START treaties). In that preiod, U.S. and Russia removed more than 8,000 warheads and elements of the nuclear triad – submarines, ICBMs and long-range bombers. Now, experts worry that Trump’s aspirations will bury the U.S.-Russian nuclear cooperation aimed at global security...
Conflict and insecurity have largely been the major driving factors behind the current wave of population influx in Europe. It is desirable that to understand the current migrant crisis in Europe, it is essential to understand the nature of the on-going conflict and existing insecurities in the home states from where the migrants are coming...
A tale of two lost archives
(2009)
The G20 summit starting today will be overshadowed by the Syrian crisis. Wolfgang Seibel assesses that,while Germany and Russia share a common history that has shaped their relationship as well as close and crucial economiclinkages, their worldviews are incompatible – international problem-solvingvs. prioritizing geopolitical interests. The question is, in light of the crisis in Syria, are German foreign policymakers in a position to influence Russian key-players?
A second Yalta
(2014)
The basic problem of primary audio and video research materials is clearly shown by the survey: A great and important part of the entire heritage is still outside archival custody in the narrower sense, scattered over many institutions in fairy small collections, and even in private hands. reservation following generally accepted standards can only be carried out effectively if collections represent critical mass. Specialised audiovisual archives will solve their problems, as they will sooner or later succeed in getting appropriate funding to achieve their aims. A very encouraging example is the case of the Netherlands. The larger audiovisual research archives will also manage, more or less autonomously, the transfer of contents in time. For a considerable part of the research collections, however, the concept of cooperative models and competence centres is the only viable model to successfullly safeguard their holdings. Their organisation and funding is a considerable challenge for the scientific community. TAPE has significantly raised awareness of the fact that, unless action is swiftly taken, the loss of audiovisual materials is inevitable. TAPE’s international and regional workshops were generally overbooked. While TAPE was already underway, several other projects for the promotion of archives have received grants from organisations other than the European Commission, inter alia support for the St. Petersburg Phonogram Archive, and the Folklore Archive in Tirana, obviously as a result of a better understanding of the need for audiovisual preservation. When the TAPE project started its partners assumed that cooperative projects would fail because of the notorious distrust of researchers, specifically in the post-communist countries. One of the most encouraging surprises was to learn that, at least in the most recent survey, it became apparent that this social obstacle is fading out. TAPE may have contributed to this important development.
The goals of Zionism today
(1998)
"European" interventions
(2017)
Black box cryptanalysis applies to hash algorithms consisting of many small boxes, connected by a known graph structure, so that the boxes can be evaluated forward and backwards by given oracles. We study attacks that work for any choice of the black boxes, i.e. we scrutinize the given graph structure. For example we analyze the graph of the fast Fourier transform (FFT). We present optimal black box inversions of FFT-compression functions and black box constructions of collisions. This determines the minimal depth of FFT-compression networks for collision-resistant hashing. We propose the concept of multipermutation, which is a pair of orthogonal latin squares, as a new cryptographic primitive that generalizes the boxes of the FFT. Our examples of multipermutations are based on the operations circular rotation, bitwise xor, addition and multiplication.
We study the following problem: given x element Rn either find a short integer relation m element Zn, so that =0 holds for the inner product <.,.>, or prove that no short integer relation exists for x. Hastad, Just Lagarias and Schnorr (1989) give a polynomial time algorithm for the problem. We present a stable variation of the HJLS--algorithm that preserves lower bounds on lambda(x) for infinitesimal changes of x. Given x \in {\RR}^n and \alpha \in \NN this algorithm finds a nearby point x' and a short integer relation m for x'. The nearby point x' is 'good' in the sense that no very short relation exists for points \bar{x} within half the x'--distance from x. On the other hand if x'=x then m is, up to a factor 2^{n/2}, a shortest integer relation for \mbox{x.} Our algorithm uses, for arbitrary real input x, at most \mbox{O(n^4(n+\log \alpha))} many arithmetical operations on real numbers. If x is rational the algorithm operates on integers having at most \mbox{O(n^5+n^3 (\log \alpha)^2 + \log (\|q x\|^2))} many bits where q is the common denominator for x.
We modify the concept of LLL-reduction of lattice bases in the sense of Lenstra, Lenstra, Lovasz [LLL82] towards a faster reduction algorithm. We organize LLL-reduction in segments of the basis. Our SLLL-bases approximate the successive minima of the lattice in nearly the same way as LLL-bases. For integer lattices of dimension n given by a basis of length 2exp(O(n)), SLLL-reduction runs in O(n.exp(5+epsilon)) bit operations for every epsilon > 0, compared to O(exp(n7+epsilon)) for the original LLL and to O(exp(n6+epsilon)) for the LLL-algorithms of Schnorr (1988) and Storjohann (1996). We present an even faster algorithm for SLLL-reduction via iterated subsegments running in O(n*exp(3)*log n) arithmetic steps.
We present a practical algorithm that given an LLL-reduced lattice basis of dimension n, runs in time O(n3(k=6)k=4+n4) and approximates the length of the shortest, non-zero lattice vector to within a factor (k=6)n=(2k). This result is based on reasonable heuristics. Compared to previous practical algorithms the new method reduces the proven approximation factor achievable in a given time to less than its fourthth root. We also present a sieve algorithm inspired by Ajtai, Kumar, Sivakumar [AKS01].
Let G be a finite cyclic group with generator \alpha and with an encoding so that multiplication is computable in polynomial time. We study the security of bits of the discrete log x when given \exp_{\alpha}(x), assuming that the exponentiation function \exp_{\alpha}(x) = \alpha^x is one-way. We reduce he general problem to the case that G has odd order q. If G has odd order q the security of the least-significant bits of x and of the most significant bits of the rational number \frac{x}{q} \in [0,1) follows from the work of Peralta [P85] and Long and Wigderson [LW88]. We generalize these bits and study the security of consecutive shift bits lsb(2^{-i}x mod q) for i=k+1,...,k+j. When we restrict \exp_{\alpha} to arguments x such that some sequence of j consecutive shift bits of x is constant (i.e., not depending on x) we call it a 2^{-j}-fraction of \exp_{\alpha}. For groups of odd group order q we show that every two 2^{-j}-fractions of \exp_{\alpha} are equally one-way by a polynomial time transformation: Either they are all one-way or none of them. Our key theorem shows that arbitrary j consecutive shift bits of x are simultaneously secure when given \exp_{\alpha}(x) iff the 2^{-j}-fractions of \exp_{\alpha} are one-way. In particular this applies to the j least-significant bits of x and to the j most-significant bits of \frac{x}{q} \in [0,1). For one-way \exp_{\alpha} the individual bits of x are secure when given \exp_{\alpha}(x) by the method of Hastad, N\"aslund [HN98]. For groups of even order 2^{s}q we show that the j least-significant bits of \lfloor x/2^s\rfloor, as well as the j most-significant bits of \frac{x}{q} \in [0,1), are simultaneously secure iff the 2^{-j}-fractions of \exp_{\alpha'} are one-way for \alpha' := \alpha^{2^s}. We use and extend the models of generic algorithms of Nechaev (1994) and Shoup (1997). We determine the generic complexity of inverting fractions of \exp_{\alpha} for the case that \alpha has prime order q. As a consequence, arbitrary segments of (1-\varepsilon)\lg q consecutive shift bits of random x are for constant \varepsilon >0 simultaneously secure against generic attacks. Every generic algorithm using $t$ generic steps (group operations) for distinguishing bit strings of j consecutive shift bits of x from random bit strings has at most advantage O((\lg q) j\sqrt{t} (2^j/q)^{\frac14}).
Korrektur zu: C.P. Schnorr: Security of 2t-Root Identification and Signatures, Proceedings CRYPTO'96, Springer LNCS 1109, (1996), pp. 143-156 page 148, section 3, line 5 of the proof of Theorem 3. Die Korrektur wurde präsentiert als: "Factoring N via proper 2 t-Roots of 1 mod N" at Eurocrypt '97 rump session.
With the current conflict in Gaza going full tilt, the usual questions have popped up: Who is to blame, what is everyone’s motivation and strategy, how to stop the bloodshed, how to end the conflict. And as usual, the two-state solution, i.e. two separate, sovereign states within the borders of the 1949 armistice agreement, keeps popping up as a purported solution. This is especially prominent in the statements of politicians in countries not directly involved in the conflict. Countries that at least claim to want to help end the conflict, be it through mediation or other diplomatic measures. But for those countries, the two-state solution has become an idea to hide behind. It does not help solve the conflict, neither in the short- nor mid-term. Clinging to the idea merely prolongs the status quo. However, it does allow the rest of the world to avoid facing the facts, which would force them to reevaluate their position on who to support and actually do something about the conflict as it currently is. But it’s high time we face the music and admit it: The two-state solution is no longer a viable option when it comes to mediating this conflict...
Part V of our series on cyberpeace "Cyberpeace: Dimensionen eines Gegenentwurfs".
With everybody focusing on cyberwar, our blog has decided to discuss cyberpeace instead. So far we have seen musings on war and peace, the meaning of the term “cyberpeace” itself and how we construct it discursively and calls to end cyberwar by focusing on the technical aspects again. All of these points are valid. But I feel that they are limited in their scope, because they focus too much on the adversarial: The hacks, the malware, the evil hackers from North Korea. But peace is more than the absence of war – and, in our case, more than the absence of hacks. If we want to be serious about cyberpeace as a societal goal, we have to pay more attention to how we handle our data because this data has a huge impact on the peace within our society....
Die Wahlen über den Verbleib Großbritanniens in der EU haben die europäische Ordnung erschüttert. Der Vortrag/Die Präsentation soll nicht nur die Hintergründe beleuchten, sondern auch zeigen, welche Chancen die neue Situation eröffnet, Chancen, die es vorher so nicht gegeben hat...
At least since the 1980s, a scholarly debate on the very meaning of security has structured the field of (Critical) Security Studies to a large extent (see Working Paper #1). Today, many new concept such as human security and societal security are prominent anchors in academic and political debates directing our attention to the non-military aspects of security, in particular to the manifold insecurities people (and not only the state) face. The call for energy security is one prominent example...
This paper documents the experiences of assurance evaluation during the early stage of a large software development project. This project researches, contracts and integrates privacy-respecting software to business environments. While assurance evaluation with ISO 15408 Common Criteria (CC) within the certification schemes is done after a system has been completed, our approach executes evaluation during the early phases of the software life cycle. The promise is to increase quality and to reduce testing and fault removal costs for later phases of the development process. First results from the still-ongoing project suggests that the Common Criteria can define a framework for assurance evaluation in ongoing development projects.
In recent years, Ontological Security Theory (OST) has been established as a new theory in the field of International Relations. The theory seeks to explain state behavior, and offers a new perspective on the security dilemma and the persistence of conflicts. It has proven itself helpful in explaining seemingly irrational state behavior such as an aggressive foreign policy by weak states or the provision of humanitarian aid by powerful nations. OST further allows scholars to analyze norm-violating behavior of states, for instance the use of torture at the hands of Americans in the War on Terror. If you have not engaged with the theory before, you might want to learn about its core arguments as well as its potential and limitations in the following. For those who know the theory well, let me show you how the theory was key to gaining new insights in my research.
Quantificational determiners in Japanese can be marked with genitive case. Current analyses (for example by Watanabe, Natural Language and Linguistic Theory, to appear) treat the genetive case marker in these cases as semantically vacuous, but we show that it has semantic effects. We propose a new analysis as reverse partitives. Following Jackendoff (MIT-Press, 1977), we assume that partitives always contain two NPs one of which is phonologically deleted. We claim that, while in normal partitives the higher noun is deleted, in reverse partitives the lower noun is deleted.
Compositionality
(2007)
Decomposing questions acts
(2006)
The existence of complex clauses in the Amazonian language Pirahã has been controversially debated. We present a novel analysis of field data demonstrating the existence of complex clauses in Pirahã. The data concern the tone of the morpheme 'sai' and stem from a field experiment where a second language speaker of Pirahã presented sentences and Pirahã speakers were asked to correct them saying the correct sentence alound. The experimental items contained the morpheme 'sai' in two different clausal environments: a nominalizer and a conditional environment according to Everett's 1986 description. Our phonetic analysis shows an effect clausal clausal environment on the pitch of 'sai'. The native Pirahã speakers pronounced conditional 'sai' with lower pitch than nominalizer 'sai'. We show furthermore that the experimenters pitch on 'sai' shows the opposite pattern from that of the native Pirahã speakers and hence the Pirahã's pitch could not just have been copied. The effect of the clausal environment on the tone of 'sai' can be explained by a complex clause analysis of Pirahã, while existing alternative proposals do not explain the difference.
In this paper I argue in favor of a Matching Analysis for German relative clauses. The Head Raising Analysis is shown to fail to account for parts of the reconstruction pattern in German, especially cases where only the external head is interpreted and the absence of Principle C effects. I propose a Matching Analysis with Vehicle Change and make consistent assumptions about possible deletion operations in relatives so that the entire pattern can be captured by one analysis which therefore proves superior to previous ones.