"LA CRISIS DEL MODELO DE CRECIMIENTO DE LA POSTGUERRA Y SU REPERCUSION EN LA VIABILIDAD DEL MODELO SOCIAL EUROPEO "

@ Rafael Caparrós "LA CRISIS DEL MODELO DE CRECIMIENTO DE LA POSTGUERRA Y SU REPERCUSION EN LA VIABILIDAD DEL MODELO SOCIAL EUROPEO "(*) "Es perjudicial cualquier cosa que oscurezca la fundamental naturaleza moral de los problemas sociales" John Dewey, The Public and its Problems (1985) "Así, la carga de los mercados ha logrado cubrirnos como una segunda piel, considerada más adecuada para nosotros que la de nuestro propio cuerpo humano." Viviane Forrester, L' horreur économique (1996) I. LOS ELEMENTOS DE LA CRISIS Aunque con el modelo de crecimiento económico inaugurado tras la II Guerra Mundial, que, como es sabido, coincidió con una época de expansión económica casi ininterrumpida, no se eliminaran los problemas de desigualdad social, concentración de capitales y otros aspectos de desequilibrio y/o malestar sociales, lo cierto es que, en general, ese período que va desde 1945 a 1973, designado como la edad de oro del Estado de Bienestar, en expresión de Ian Gouh1, se caracteriza por haber conseguido el triunfo de un modelo socioeconómico de bienestar social, basado en los pactos políticos keynesianos de la postguerra, implícita y sucesivamente ratificados por los dirigentes de la democracia cristiana, el liberalismo y

  • Word count: 24251
  • Level: University Degree
  • Subject: European Languages, Literature and related subjects
Access this essay

Security in a computing world.

ABSTRACT Security is big issue in a computing world and more professionals and business and government seeking for further security to safeguard and protect their secret and critical data from falling into evil hands. Now people are security concerned as we have seen lot of cracking of computer, exploiting of program in past decade. Confidentiality, Integrity and Authentication are the top priority in security world. My aim in this thesis is to show how an Intrusion Detection System (IDS) can be handy in detection of network and computer attacks. Intrusion Detection System detects the attacks, notifies and logs the attack for later review. To stop the attack it is necessary to know what type of attack has been done against us and then stopping it from happening. By analyzing IDS architecture and techniques to know what would be a best option for a particular network. To show how intrusion could be detected I'll use snort as my IDS. INTRODUCTION An attack is defined as "an assault on system security that derives from an intelligent threat, i.e., an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system". [65] When people made the computer they never thought about the security, the threats that could bring your computer perhaps whole network can come down

  • Word count: 24218
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

How Do Virtual Communities Create a Value Exchange Proposition for e-businesses? An Exploratory Study.

How Do Virtual Communities Create a Value Exchange Proposition for e-businesses? An Exploratory Study. Abstract As the world continues to change and customers continuously become more sophisticated and demanding, marketing strategies have had to adapt. In the 1990's, processes and customer needs became more recognised, which brought about modern marketing and the concept of relationship marketing (RM). With the emergence of the Internet, many e-businesses have failed to survive the increasingly global competitive environment. This report aims to create understanding of the current marketing schools of thought in order to decipher a means of creating a value exchange proposition for survival in this 'New Economy.' Qualitative secondary research has been gathered from written documents to explore how e-businesses are missing an opportunity to create a value exchange proposition through virtual (on-line) communities. In order to answer the research question, How Do Virtual Communities Create a Value Exchange Proposition, three propositions were developed from the focal theory within the literature review: * (P1) Virtual communities create customer value * (P2) Virtual communities increase loyalty * (P3) Virtual communities enhance business value Case studies within a theoretical framework have supported the propositions and enabled new insights and contributions to be

  • Word count: 23906
  • Level: University Degree
  • Subject: Business and Administrative studies
Access this essay

Marketing Management Application exercise - Footwear Industry India.

Marketing Management APPLICATION EXERCISE Footwear Industry presented to Prof. S. Ramesh Kumar on August 26th, 2003 in partial fulfillment of the requirements for the Marketing Management by Group 8 Soumitra Bhattacharya Shankar Chandrasekar Tenzing Yangdo Bhutia R. Chethan Kumar Raghav Bihani Padam Chhabra Sainag Chakravarty INDIAN INSTITUTE OF MANAGEMENT BANGALORE TABLE OF CONTENTS EXECUTIVE SUMMARY 3 REPORT 8 . Industry Overview 9 1.1 Introduction 9 1.2 Market Structure 10 1.3 Industry Segmentation 12 1.3.1 Geographic Segmentation 12 1.3.2 Demographic Segmentation 14 1.4 Consumer Behaviour 14 1.4.1 Consumer Preferences (urban organized market) 15 1.4.2 Consumer Preferences (Rural Market) 17 1.5 Positioning 21 1.6 Five Force Porter's Analysis 23 1.7 Key players in Domestic Footwear Segment 24 1.7.1 Most Popular Footwear Brands 24 1.7.2 Comparison of Business Profiles of top companies 24 1.7.3 Production Figures of top 7 footwear companies 26 1.8 Detailed Analysis of the Top brands 27 .8.1 Bata India Ltd. 27 .8.2 Liberty 32 .8.3 Reebok 36 .8.4 Adidas 40 .8.5 Nike 45 .8.6 Red Tape 48 .8.7 Woodland 51 .8.8 Regal Shoes 55

  • Word count: 23741
  • Level: University Degree
  • Subject: Business and Administrative studies
Access this essay

At common law, the prosecution were generally prohibited from mentioning the accused's bad character or prior convictions.[1]

CHAPTER FIFTEEN BAD CHARACTER The Accused's Bad Character At common law, the prosecution were generally prohibited from mentioning the accused's bad character or prior convictions.1 It is undoubtedly not competent for the prosecution to adduce evidence tending to show that the accused has been guilty of criminal acts other than those covered by the indictment, for the purpose of leading to the conclusion that the accused is a person likely from his criminal conduct or character to have committed the offence for which he is being tried.2 The argument has always been that there is considerable risk that bad character is accorded much more weight than that relevance warrants. As such its prejudicial effect may well outweigh its probative value and the jury, with little experience in assessing such matters, should be prevented from hearing about previous convictions.3 That was supported when the Law Commission4 commissioned research which showed that knowledge of previous convictions may prejudice a jury or magistrates unfairly against the defendant. Mike Redmayne's study considered the usual justifications for the exclusionary rule, namely irrelevance or the disproportionate and prejudicial impact on the jury. The conclusion was after reviewing the psychological research on character and statistical data on recidivism, that those with previous convictions are much more

  • Word count: 23715
  • Level: University Degree
  • Subject: Law
Access this essay

Marketing Dissertation. An investigation of Celebrity Endorsement, with particular focus on the long-term marketability of celebrity sports personalities

MSc Marketing 2008/10 An investigation of Celebrity Endorsement, with particular focus on the long-term marketability of celebrity sports personalities By Charlotte Louise Blake Confidentiality Statement The dissertation may be made freely available immediately for academic purposes. Charlotte L Blake, May 2010 Acknowledgments I would like to dedicate this work to my fiancé, Miguel Rodriguez, as if it wasn't for his support I would not have had the option of returning to university to pursue my ambition to get a masters degree, and change the direction of my career. I would also like to thank my family for their lifelong support; my father for always being the best source of advice, and my mother for always being there. Furthermore, I would like to pay my gratitude to John May for being a great lecturer throughout the year, and a good supervisor who always pointed me in the right direction. It is also imperative that I mention my classmates for the past 2 academic years, which have all proven to be a great bunch of people to be around, in and out of the classroom. Finally, thank you to everyone who participated in my research, I couldn't have done this without you. In particular Jessica Cole and Jessica Brittan, who not only participated in my focus groups, but also set them up, and hosted the events at their home. Whilst not forgetting, the legendary, Mel Stein,

  • Word count: 23446
  • Level: University Degree
  • Subject: Business and Administrative studies
Access this essay

Arrest under CrPC, India. To make sure that the power to arrest is not arbitrary exercised by the police officer Article 22 of the constitution of India and chapter V of criminal procedure code provides direction for safeguards against arbitrary arrest.

Table of Cases . Ajit v. State of Assam, 1976 Cri.L.J.1303 2. Amrik Singh v. State of Punjab 2000 Cri. L.J 4035 3. Anil Anantrao Lokhande v. The State of Maharashtra, 1981 Cri.L.J. 125. 4. Associated Provincial Picture House ltd. v. Wednusbury Corn, [1947] 2 AllER 680. 5. Beim v. Goyer, [1966] 4 C.C.C. 9. 6. Brijesh Kumar v. The State, 1996 Cri.L.J. 1536 (Allahabad). 7. C.C.Welfare Council of India v Government of Maharashtra 1995 Cri L.J 4223. 8. Challa Ramkonda Reddy v. State of A.P, AIR 1989 AP 235. 9. Chandrika Prassad v. Hiralal AIR 1924 Pat 312 . 0. Collector of Malabar and another v. Erimmal Ebrahim Hajee, AIR 1957 SC 688. 1. Delhi Judicial Service Association, Tis Hajari Court, Delhi v. State of Gujarat, AIR 1991 SC 2176. 2. Dilavar Hussain S/o Mohammadbhai Laliwala, etc., Appellants v. State of Gujarat and another, Respondents, AIR 1991 S.C 56 3. Directorate of Enforcement v. Deepak Mahajan, AIR 1994 SC 1775. 4. Dr. Ghanshyam Narayan Singh v. State of Bihar, 2001 Cri.L.J. 2811 (Patna). 5. Erram Santosh Reddy and others, Appellants v. State of A.P., Respondent, AIR 1991 S.C 1672 6. Fox, Campbell and Hartlay v. United Kingdom, 182 European Court of Human Rights Reporter (1990). 7. G v. D.P.P., [1989] Crim L.R. 150 8. Gauri Shankar Jha v. State of Bihar and others, AIR 1972 SC 711. 9. Gerstein v. Pugh , 420 U.S. 103 (1975). 20. Guljarsing v. State

  • Word count: 22634
  • Level: University Degree
  • Subject: Law
Access this essay

Cache-Enhanced Dynamic Movement-Based Location Management Schemes for 3G Cellular Networks.

Cache-Enhanced Dynamic Movement-Based Location Management Schemes for 3G Cellular Networks A Thesis Presented in Partial Fulfillment of Requirements for the Degree of Master of Science in the College of Arts and Sciences, Georgia State University, 2003 by Krishna Priya Patury Committee: ____________________________________ Dr. Yi Pan, Chair ____________________________________ Dr. Anu Bourgeois, Member ____________________________________ Dr. Alex Zelikovsky, Member ____________________________________ Date ____________________________________ Dr. Martin D. Fraser Department Chair Abstract Keeping track of mobile terminals moving from one place to another has been and will always be one of the key issues in mobile communication, be it cellular or Personal Communications Service. Location management involves two major kinds of operations: Location update- by which the system keeps track of the location of the mobile terminals that are not in conversation and Paging which is a search process by which the system searches for the Mobile Terminal by sending polling signals to cells in the paging area (which may include one or more cells). To perform either of these operations would incur a significant amount of cost, which should be minimized in the systems. Many mobility management schemes have been proposed as of now for 2-tier Cellular/PCS networks but none

  • Word count: 22621
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Corporate Social Responsibility

Branding Name of Student Name of Instructor Date Course name Abstract This paper aims to study the influence of branding on consumers and their purchasing decisions. Branding is also like the reputation of a company¸ which also effects business' publicity. Often the choice of setting up an industry or a business is often directly linked to this notion of reputation. As a company has a good reputation¸ it may attract new customers¸ which would create ones' demand and 'brand loyalty'. Customers tend to purchase products from companies that have a good reputation. This is because as the firm have a good reputation¸ consumers tends to 'trust' their products¸ hence¸ consumers will be more willingly in trying their products¸ which would increases the amount of new customers for the business. As the business have more new customers¸ its demand and loyalty would eventually increase. As consumers try the products¸ satisfy with its quality¸ most of them will be used in using the product and are unwilling to change to another brand. The company would also gain more consumers' recognitions. Thus¸ such consumers will repeat-purchase the product on a regular basis. This way¸ brand loyalty would not only eliminate competition¸ but also increases business's sales and revenue¸ and presumably its profit would increases as well. According to my findings, from the 100

  • Word count: 22605
  • Level: University Degree
  • Subject: Business and Administrative studies
Access this essay

A Study of Nationalism and its relevance in Muslim States.

TABLE OF CONTENTS INTRODUCTION 1 NATIONALISM 2 THE BASIC CONCEPT OF NATION 2 BIRTH OF THE CONCEPT OF "NATION" DURING THE FRENCH REVOLUTION 4 COMMON LANGUAGE 4 COMMON CULTURE 4 COMMON HISTORY 5 COMMON RELIGION 5 THE BASIC CONCEPT OF NATIONALISM 5 NATIONALISM A DISTINCT IDEOLOGY 6 TYPES OF NATIONALISM 7 CIVIC NATIONALISM 8 ETHNIC NATIONALISM 8 IRREDENTISM 9 EXPANSIONIST NATIONALISM 9 RADICAL OR REVOLUTIONARY NATIONALISM 9 FASCISM 9 STATELESS NATIONALISM 9 ETHNOCENTRISM 11 ORIGIN OF NATIONALISM 11 THIRD WORLD NATIONALISM 14 CULTURAL NATIONALISM 24 EUROPEAN NATIONALISM " ENGLISH PURITANISM AND NATIONALISM 25 EUROPEAN NATIONALISM " FRENCH NATIONALISM 26 European Nationalism " The 1848 Revolutionary Wave 27 ASIAN AND AFRICAN NATIONALISM 29 Asian and African Nationalism " The New Nations 30 ASIAN AND AFRICAN NATIONALISM " POLITICAL AND RELIGIOUS DIFFERENCES 31 NATIONALISM IN WORLD WAR I 32 TWO KINDS OF NATIONALISM 32 NATIONALISM IN GERMANY 33 NATIONALISM IN ITALY 33 NATIONALISM IN AUSTRIA-HUNGARY 33 NATIONALISM IN RUSSIA 34 NATIONALISM IN FRANCE 34 NATIONALISM IN BRITAIN 34 CAN NATIONALISM SOLVE THE CHALLENGES FACING PAKISTAN? 35 THE PROHIBITION OF NATIONALISM 36 NATIONALISM WITH ITS POSITIVE AND NEGATIVE ASPECTS 37 TYPE OF NATIONALISM BRINGING ABOUT SOLIDARITY 39 NATIONALISM IN SOUTHEAST ASIA DEVELOPED FROM THREE SOURCES 42 INDIGENOUS

  • Word count: 22315
  • Level: University Degree
  • Subject: Social studies
Access this essay