scholarly journals Protecting public pension funds from divestment-related lawsuits: Exploring the state laws of the United States

2011 ◽  
Vol 16 (3) ◽  
pp. 212-219 ◽  
Author(s):  
Salar Ghahramani
2017 ◽  
Vol 15 (4) ◽  
pp. 554-584 ◽  
Author(s):  
Natascha van der Zwan

Financialisation and the Pension System: Lessons from the United States and the Netherlands The articles explores the financialisation of private pensions in the United States and the Netherlands. It proposes two distinct arguments. First, the article shows that both the American and the Dutch pension systems stand out internationally for their high degrees of capitalisation and the absence of substantive investment restrictions for pension funds. The article posits that both pension systems are highly financialised, yet the process of financialisation has proceeded along different historical paths and within different institutional contexts. Secondly, the article maintains that the financialisation of pension systems is accompanied by its own political dynamics. In both political economies, different groups of actors (employers, labour unions, financial professionals) have made claims over the growing concentration of pension assets. Here, particular emphasis is given to the role of the state. It shows how since the mid-1970s, both American and Dutch pension funds have altered their investment strategies, abandoning public debt as the dominant investment category. The article explains this change in terms of the rising popularity of modern portfolio theory and the immense growth of pension capital in need of new investment options. As austerity politics have made governments more dependent on financial markets, pension funds have become more assertive in leveraging their assets and demanding political reform which are in the interest of the financial industries. Financialisation has thus fundamentally altered the balance of power between the state and financial market actors.


Author(s):  
Melissa Dark

As information technology has become more ubiquitous and pervasive, assurance and security concerns have escalated; in response, we have seen noticeable growth in public policy aimed at bolstering cybertrust. With this growth in public policy, questions regarding the effectiveness of these policies arise. This chapter focuses on policy analysis of the state data breach disclosure laws recently enacted in the United States. The state data breach disclosure laws were chosen for policy analysis for three reasons: the rapid policy growth (the United States have enacted 45 state laws in 6 years); this is the first instantiation of informational regulation for information security; and the importance of these laws to identity theft and privacy. The chapter begins with a brief history in order to provide context. Then, this chapter examines the way in which historical, political and institutional factors have shaped our current data breach disclosure policies, focusing on discovering how patterns of interaction influenced the legislative outcomes we see today. Finally, this chapter considers: action that may result from these policies; the action type(s) being targeted; alternatives that are being considered, and; potential outcomes of the existing and proposed alternative policies.


Cyber Crime ◽  
2013 ◽  
pp. 430-456 ◽  
Author(s):  
Melissa Dark

As information technology has become more ubiquitous and pervasive, assurance and security concerns have escalated; in response, we have seen noticeable growth in public policy aimed at bolstering cybertrust. With this growth in public policy, questions regarding the effectiveness of these policies arise. This chapter focuses on policy analysis of the state data breach disclosure laws recently enacted in the United States. The state data breach disclosure laws were chosen for policy analysis for three reasons: the rapid policy growth (the United States have enacted 45 state laws in 6 years); this is the first instantiation of informational regulation for information security; and the importance of these laws to identity theft and privacy. The chapter begins with a brief history in order to provide context. Then, this chapter examines the way in which historical, political and institutional factors have shaped our current data breach disclosure policies, focusing on discovering how patterns of interaction influenced the legislative outcomes we see today. Finally, this chapter considers: action that may result from these policies; the action type(s) being targeted; alternatives that are being considered, and; potential outcomes of the existing and proposed alternative policies.


Commonwealth ◽  
2017 ◽  
Vol 19 (2) ◽  
Author(s):  
Jennie Sweet-Cushman ◽  
Ashley Harden

For many families across Pennsylvania, child care is an ever-present concern. Since the 1970s, when Richard Nixon vetoed a national childcare program, child care has received little time in the policy spotlight. Instead, funding for child care in the United States now comes from a mixture of federal, state, and local programs that do not help all families. This article explores childcare options available to families in the state of Pennsylvania and highlights gaps in the current system. Specifically, we examine the state of child care available to families in the Commonwealth in terms of quality, accessibility, flexibility, and affordability. We also incorporate survey data from a nonrepresentative sample of registered Pennsylvania voters conducted by the Pennsylvania Center for Women and Politics. As these results support the need for improvements in the current childcare system, we discuss recommendations for the future.


2020 ◽  
Vol 26 (1) ◽  
pp. 64-74
Author(s):  
Hristov Manush

AbstractThe main objective of the study is to trace the perceptions of the task of an aviation component to provide direct aviation support to both ground and naval forces. Part of the study is devoted to tracing the combat experience gained during the assignment by the Bulgarian Air Force in the final combat operations against the Wehrmacht during the Second World War 1944-1945. The state of the conceptions at the present stage regarding the accomplishment of the task in conducting defensive and offensive battles and operations is also considered. Emphasis is also placed on the development of the perceptions of the task in the armies of the United States and Russia.


1994 ◽  
Vol 11 (1) ◽  
pp. 38-70
Author(s):  
Florence Eid

IntroductionThis paper is a report on the state of research in two areas of Islamicstudies: Islam and economics and Islam and governance. I researched andwrote it as part of my internship at the Ford Foundation during the summerof 1992. On Discourse. The study of Islam in the United States has moved far beyondthe traditional historical and philological methods. This is perhapsbest explained by the development of analytically rigorous social sciencemethods that have contributed to a better balance between the humanisticconcerns of the more traditional approaches and efforts at systematizingthe study of Islam and classifying it across boundaries of communities,religions, even epochs. This is said to have s t a d with the developmentof irenic attitudes towards Islam, which changed the direction of westemorientalist writings from indifference (at best) and often open hostility toand contempt of Islamic values (however they were understood) to phenomenologicalworks by scholars who saw the study of Islam as somethingto be taken seriously and for its own sake, which is best exemplifiedby Clifford Geertz's Islam Observed.The work of Edward Said contested this evolution, and the publicationof his Orientalism has been described as "a stick of dynamite"' that,despite its impact in mobilizing a reevaluation of the field, was unwarrantedin its pessimism. In any case, the field has continued to evolve,with the most powerful force moving it being the subject itself. Thephenomenological/orientalist approach, if we can point to one today, ...


Sign in / Sign up

Export Citation Format

Share Document