“Race to the Bottom” Corporate Complicity in Chinese Internet Censorship
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Why Is There No Race to the Bottom in Capital Taxation? Tax Competition Between Countries Of
International Studies Quarterly (2009) 53, 761–786 Why is There No Race to the Bottom in Capital Taxation? Thomas Plu¨mper and Vera E. Troeger University of Essex Hannes Winner University of Innsbruck This article explains the absence of a race to the bottom in capital taxa- tion by analyzing fiscal competition under budget rigidities and tax equity constraints (fairness norms). We outline a political economic model of tax competition that treats the outcome of tax competition as one argu- ment in the governments utility function, the others being public expen- diture and tax equity. In accordance with previous theoretical research, tax competition tends to cause a reduction in taxes on mobile capital and an increase in the tax rates on relatively immobile labor in our model. Yet, our model predicts that governments do not fully abolish taxes on mobile capital. Instead, the government being least restricted by budget constraints and equity norms cuts tax rates to levels slightly below the low- est tax rates of those countries, in which governments are more con- strained, where effective constraints are country size, budget rigidities and fairness norms. Analyzing data from 23 Organization for Economic Co-operation and Development countries between 1975 and 2004 we find empirical support for the hypotheses derived from our theoretical model. A striking feature of international tax competition is the fact that independent jurisdictions share a mobile tax base. As a consequence, a country lowering its capital tax rate attracts an immediate inflow of capital, thereby reducing the tax base of other countries. These respond to the shrinking tax base and to declin- ing tax revenues by lowering their capital tax rate to competitive levels. -
Profit Maximizing Goes Global: the Race to the Bottom David Kiefer Codrina Rada
DEPARTMENT OF ECONOMICS WORKING PAPER SERIES Profit maximizing goes global: the race to the bottom David Kiefer Codrina Rada Working Paper No: 2013-05 March 2013 University of Utah Department of Economics 260 S. Central Campus Dr., Rm. 343 Tel: (801) 581-7481 Fax: (801) 585-5649 http://www.econ.utah.edu Profit maximizing goes global: the race to the bottom David Kiefer Department of Economics, University of Utah [email protected] Codrina Rada Department of Economics, University of Utah [email protected] Abstract We explore four decades of cyclical and long-run dynamics in income distribution and economic activity for a panel of thirteen OECD countries, as measured by the wage share and the output gap. When modeled as a Goodwin model, our results suggest that economic activity is weakly profit-led and that the wage share is pro-cyclical. Our estimated model is dynamically stable and has a long-run equilibrium in distribution- utilization space. An extension of the model suggests that this equilibrium has been shifting south-west towards a lower wage share and a loss of economic activity. This finding is suggestive of a coordination failure among industrialized nations; it could be that the governments of these countries are engaging in a race to the bottom in terms of the wage share; it may even be that this race has the undesirable consequence of decreasing economic efficiency. Keywords: predator-prey models; distributive-demand dynamics; panel data estimation; JEL Classification: D3; C23; C61; Profit maximizing goes global: the race to the bottom David Kiefer ∗ Codrina Rada y Abstract We explore four decades of cyclical and long-run dynamics in income distribution and economic activity for a panel of thirteen OECD countries, as measured by the wage share and the output gap. -
Congressional-Executive Commission on China Annual
CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA ANNUAL REPORT 2007 ONE HUNDRED TENTH CONGRESS FIRST SESSION OCTOBER 10, 2007 Printed for the use of the Congressional-Executive Commission on China ( Available via the World Wide Web: http://www.cecc.gov VerDate 11-MAY-2000 01:22 Oct 11, 2007 Jkt 000000 PO 00000 Frm 00001 Fmt 6011 Sfmt 5011 38026.TXT CHINA1 PsN: CHINA1 2007 ANNUAL REPORT VerDate 11-MAY-2000 01:22 Oct 11, 2007 Jkt 000000 PO 00000 Frm 00002 Fmt 6019 Sfmt 6019 38026.TXT CHINA1 PsN: CHINA1 CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA ANNUAL REPORT 2007 ONE HUNDRED TENTH CONGRESS FIRST SESSION OCTOBER 10, 2007 Printed for the use of the Congressional-Executive Commission on China ( Available via the World Wide Web: http://www.cecc.gov U.S. GOVERNMENT PRINTING OFFICE 38–026 PDF WASHINGTON : 2007 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate 11-MAY-2000 01:22 Oct 11, 2007 Jkt 000000 PO 00000 Frm 00003 Fmt 5011 Sfmt 5011 38026.TXT CHINA1 PsN: CHINA1 VerDate 11-MAY-2000 01:22 Oct 11, 2007 Jkt 000000 PO 00000 Frm 00004 Fmt 5011 Sfmt 5011 38026.TXT CHINA1 PsN: CHINA1 CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA LEGISLATIVE BRANCH COMMISSIONERS House Senate SANDER M. LEVIN, Michigan, Chairman BYRON DORGAN, North Dakota, Co-Chairman MARCY KAPTUR, Ohio MAX BAUCUS, Montana TOM UDALL, New Mexico CARL LEVIN, Michigan MICHAEL M. HONDA, California DIANNE FEINSTEIN, California TIM WALZ, Minnesota SHERROD BROWN, Ohio CHRISTOPHER H. -
Goals for the Rich Indispensible for a Universal Post-2015 Agenda Discussion Paper Civil Society Reflection Group on Global Development Perspectives
Advance Unedited Version | 4 March 2015 1 Goals for the rich Indispensible for a universal Post-2015 Agenda Discussion Paper Civil Society Reflection Group on Global Development Perspectives 1. Introduction: Context and Principles After many years of focusing on the symptoms of extreme poverty with the pursuit of the Millennium Development Goals (MDG), the UN system is finally picking up a universal sustainability agenda, enshrined in the Sustainable Development Goals (SDG), that address sustainability and causes of poverty and inequality. The Open Working Group of the UN General Assembly on Sustainable Development Goals has proposed a list of 17 goals and 169 targets.1 The consensus outcome of this group, endorsed by the UN General Assembly in September 2014 as the “main basis” of the post-2015 development agenda, goes far beyond the narrow scope of the MDGs. The MDGs provided an international framework for the advancement of social development for the poor in the global South with a little help from the rich in the global North. Unlike the MDGs, the Post-2015 Agenda with the SDGs as a pivotal building block is intended to be truly universal and global. SDGs will be for everybody, rich countries, countries with emerging economies and poor countries. If it succeeds, this new global sustainability agenda would not only take forward the unfinished business of the MDGs, by ending poverty in all its forms everywhere, but add important dimensions. Apart from the potential to tackle inequalities and injustices worldwide, it would trigger decisive action to protect the integrity of our planet, to combat climate change, and put an end to the overuse of resources and ecosystems by acknowledging planetary boundaries and promoting the respect for nature. -
Democracy and Inequality: a Resource Guide
Democracy and Inequality A Resource Guide www.idea.int © 2017 International Institute for Democracy and Electoral Assistance International IDEA publications are independent of specific national or political interests. Views expressed in this publication do not necessarily represent the views of International IDEA, its Board or its Council members. References to the names of countries and regions in this publication do not represent the official position of International IDEA with regard to the legal status or policy of the entities mentioned. Applications for permission to reproduce or translate all or any part of this publication should be made to: International IDEA Strömsborg SE–103 34 STOCKHOLM SWEDEN Tel: +46 8 698 37 00 Email: [email protected] Website: <http://www.idea.int> International IDEA encourages dissemination of its work and will promptly respond to requests for permission to reproduce or translate its publications. This publication has received support from International IDEA’s Member States through the Institute’s core funding. Grateful acknowledgement is made to the governments of Norway and Sweden, whose generous support made this publication possible. Text editing: Andrew Mash Layout: International IDEA Original design concept: Phoenix Design Aid Democracy and Inequality Fletcher D. Cox* This Resource Guide is part of a series designed for readers, including students and practitioners, interested in exploring further some of the themes and issues raised in The Global State of Democracy 2017: Exploring Democracy's Resilience (International IDEA 2017). The contents of the series reflect the topics of each chapter in the larger report, presenting current and past debates and key concepts related to each topic. -
Can the West Learn from the Rest?' the Chinese Legal Order's Hybrid
University of Michigan Law School University of Michigan Law School Scholarship Repository Other Publications Faculty Scholarship 2009 Can the West Learn from the Rest?' The hineseC Legal Order's Hybrid Modernity Nicholas C. Howson University of Michigan Law School, [email protected] Available at: https://repository.law.umich.edu/other/4 Follow this and additional works at: https://repository.law.umich.edu/other Part of the Comparative and Foreign Law Commons, and the Rule of Law Commons Recommended Citation Howson, Nicholas C. "'Can the West Learn from the Rest?' The hineC se Legal Order's Hybrid Modernity." Hastings Int'l & Comp. L. Rev. 32, no. 2 (2009): 815-30. This Speech is brought to you for free and open access by the Faculty Scholarship at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Other Publications by an authorized administrator of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. Panel IV - "Can the West Learn from the Rest?" - The Chinese Legal Order's Hybrid Modernityt By NICHOLAS CALCINA HOWSON* I am asked to present on the "shortcomings of the Western model of legality based on a professionalized, individualistic and highly formalistic approach to justice" as a way to understanding if "the West can develop today a form of legality which is relational rather than based on litigation as a zero sum game, learning from face to face social organizations in which individuals understand the law" - presumably in the context of the imperial and modem Chinese legal systems which I know best as a scholar and have lived for many years as a resident of the modem identity of the center of the "Chinese world," the People's Republic of China ("PRC"). -
Lenovo T60 External Usb Keyboard Driver
Lenovo t60 external usb keyboard driver. Free FILE Download sys Sun Apr 13 14 28 38 2008 48025EE6 Infiniti Software Solutions Pvt. Download The Latest VGA Driver Updates 119-0962-00 PANASONIC SPH04SD 80 OHM TWEETER Voice Over IP is a technology that allows you to use the Internet Protocol to transmit your voice and. Our inventions are wont to be pretty toys, which distract our O18 - Protocol bwx0 - 5C61A5BB-A073-48C1-A8AB- 342634AED2E5 - C Program Files Logitech Desktop Messenger 8876480 Program BWPlugProtocol-8876480. Lenovo t60 external usb keyboard driver Direct Link #1 They do work on laptops running 8. Buy More and Get Discounts. so that doesnt count. O17 - HKLM System CS2 Services Tcpip Parameters Domain fjallsatra. c program files Easy Internet signup offers en us content faq2 content. california driver strike. TaxACT gets high marks for including a withholding calculator, FAFSA worksheets, and guidance on the new health insurance mandate. Third Beyond everything else, I want to understand the specific cause of this, so I can prevent it. Photosmart Express button Launches the HP Photosmart Express software application on your computer for printing, editing, and sharing photos. Run LELA C Program Files Linksys Linksys EasyLink Advisor Linksys EasyLink Advisor. Please note that I share this information only to guide you throughout the process. 2008-11-04 22 11 56 -A- C WINDOWS ModemLog HSP56 MR. Spyware Cookie Adrevolver Not disinfected C Documents and Settings Tianxi Wang Cookies tianxi wang adrevolver 2. It might be that sound file is corrupted. i have the 8x. I took this picture with my Samsung Focus, and used Thumba to filter the color. -
Chinese Legal Culture
Chinese Legal Culture Department: Fudan International Summer Session Course LAWS170003 Code Course Chinese Legal Culture Title 36+3 tutorial hours (one credit Credit 2 Credit Hours hour is 45 minutes) □Specific General Education Courses □Core Courses √General Education Elective Courses Course □Basic Courses in General Discipline □Professional Compulsory Courses □Professional Elective Nature Courses □Others To precisely grasp the basic concepts in Chinese legal culture, such as legalist, penal code, etc. Course To thoroughly understand the mainstreams of traditional legal thoughts in China. Objectives To critically look at contemporary legal phenomena in China. This course will examine the spirit of Chinese law from a historical perspective, with a particular emphasis on its political context. We will explore the early transition of Chinese Course politics and law by the 2rd century B.C.E. (including doctrines of Confucian and legalist Description schools), development and spirits of imperial codes, mechanism of judicial administration in criminal and civil justice, local mediation, and family law. Course Requirements: This course requires the students’ attendance at classes and participation in class discussion. Teaching Methods: Lecture, presentation, group discussion Instructor's Academic Background: Prof. SHI Daxiao obtained his undergraduate and master degrees from Peking University, PhD in Foreign Legal History from Peking University Law School. His research interests include the history of foreign legal systems, the history of Western legal thoughts, and jurisprudence. He has translated classic works of foreign legal history such as European Law: Past and Future: Unity and Diversity in Two Thousand Years, and Common Law Tradition. Email: [email protected] 1 Course Schedule Part I: Introduction to Chinese Law and Legal Culture (3 hours) Chronology, in 1 Sources of Chinese Tradition xxvii-xxxiii (Compiled by Wm. -
Addressing the Top 10 Security Issues Organizations Face
Osterman Research WHITE PAPER White Paper by Osterman Research Published January 2019 Sponsored by Carbon Black Addressing the Top 10 Security Issues OrganizationsO Face Addressing the Top 10 Security Issues Organizations Face Executive Summary Cybersecurity must be a top-level priority for any organization and for many it is. Security should be viewed holistically and should include a range of elements, including layered, technology-based solutions on-premises and in the cloud; security awareness training to help employees become a more integral part of security defenses; the establishment of common-sense policies and practices that will bolster security defenses; and security education for the board of directors and senior managers to help them understand the critical role they play in enabling a culture of security. KEY TAKEAWAYS Here are the key takeaways we discovered from the survey that was conducted for this white paper and in our analysis of the results: • Security incidents are common Seventy-eight percent of the organizations we surveyed have experienced one or more serious security incidents during the 12 months ended October 2018. The most common of these incidents were infections resulting from phishing emails, the accidental leak of sensitive or confidential data through email, and targeted email attacks launched from compromised accounts. • Threats come from email and non-email sources While email is a common vector for phishing and other threats, non-email threats are also quite common. Bad actors are frequently using web-based tactics, deploying diverse techniques to target human weakness. These sophisticated phishing attacks are delivered via targeted ads, social media, chat, browser The median extensions, and compromised sites. -
A Study of Judges' and Lawyers' Blogs In
Copyright © 2011 by the President and Fellows of Harvard College. 2011 / Exercising Freedom of Speech behind the Great Firewall 251 reminding both of them of the significance of law, the legal and political boundaries set by the authorities are being pushed, challenged, and renegotiated. Drawing on existing literature on boundary contention and the Chinese cultural norm of fencun (decorum), this study highlights the paradox of how one has to fight within boundaries so as to expand the contours of the latter for one’s ultimate freedom. Judging from the content of the collected postings, one finds that, in various degrees, critical voices can be tolerated. What emerges is a responsive and engaging form of justice which endeavors to address grievances in society, and to resolve them in unique ways both online and offline. I. INTRODUCTION The Internet is a fascinating terrain. Much literature has been devoted to depicting its liberating democratic power in fostering active citizenry, and arguably, an equal number of articles have been written that describe attempts by various states to exercise control.1 China has provided a ready example to illustrate this tension. 2 And this study focuses on the blog postings by judges and public interest lawyers in order to understand better how the legal elites in China have deployed routine and regular legal discussion in the virtual world to form their own unique public sphere, not only as an assertion for their own autonomy but also as a subtle yet powerful form of contention against the legal and political boundaries in an authoritarian state. Chinese authorities are notorious for their determination to stamp out dissenting voices both online and offline. -
Debates on Constitutionalism and the Legacies of the Cultural Revolution Wu Changchang*
674 Debates on Constitutionalism and the Legacies of the Cultural Revolution Wu Changchang* Abstract This article focuses on the debate surrounding constitutionalism that has been driven by a constitutionalist alliance of media reporters, intellectuals and lawyers since 2010, and follows its historical trajectory. It argues that this debate forms a discourse with a structuring absence, the roots of which can be traced back to the taboos surrounding the Cultural Revolution, the 1975 Constitution, and every- thing associated with them. The absence manifests itself in the silence on workers’ right to strike, a right which was deleted from the 1982 Constitution in an attempt to correct the ultra-leftist anarchy of the Cultural Revolution. Previous and in con- trast to that, there was a Maoist constitutional movement in the Cultural Revolution, represented by the 1975 Constitution, that aimed to protect the con- stituent power of the workers by legalizing their right to strike. Today, we are wit- nessing the rise of migrant workers as they struggle for trade union reform and collective bargaining with little support from the party-state or local trade unions. In this context, a third constitutional transformation should be considered that is not a return to the 1975 Constitution but which instead adds some elements which protect labour’s right to strike to the 1982 Constitution. Keywords: China; constituent power; the constitutionalist alliance; the constitutionalist revolution; the constitutional transformation; right to strike In the middle -
An Empirical Account of Defamation Litigation in China
Columbia Law School Scholarship Archive Faculty Scholarship Faculty Publications 2006 Innovation through Intimidation: An Empirical Account of Defamation Litigation in China Benjamin L. Liebman Columbia Law School, [email protected] Follow this and additional works at: https://scholarship.law.columbia.edu/faculty_scholarship Part of the Torts Commons Recommended Citation Benjamin L. Liebman, Innovation through Intimidation: An Empirical Account of Defamation Litigation in China, 47 HARV. INT'L L. J. 33 (2006). Available at: https://scholarship.law.columbia.edu/faculty_scholarship/554 This Article is brought to you for free and open access by the Faculty Publications at Scholarship Archive. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Scholarship Archive. For more information, please contact [email protected]. VOLUME 47, NUMBER 1, WINTER 2006 Innovation Through Intimidation: An Empirical Account of Defamation Litigation in China Benjamin L. Liebman* INTRODUCTION Consider two recent defamation cases in Chinese courts. In 2004, Zhang Xide, a former county-level Communist Party boss, sued the authors of a best selling book, An Investigation into China's Peasants. The book exposed official malfeasance on Zhang's watch and the resultant peasant hardships. Zhang demanded an apology from the book's authors and publisher, excision of the offending chapter, 200,000 yuan (approximately U.S.$25,000)' for emotional damages, and a share of profits from sales of the book. Zhang sued 2 in a local court on which, not coincidentally, his son sat as a judge. * Associate Professor of Law and Director, Center for Chinese Legal Studies, Columbia Law School.