Land rights and technology adoption: improved rice varieties in Vietnam
In: The journal of development studies, Band 56, Heft 8, S. 1489-1507
ISSN: 1743-9140
45 Ergebnisse
Sortierung:
In: The journal of development studies, Band 56, Heft 8, S. 1489-1507
ISSN: 1743-9140
World Affairs Online
SSRN
Working paper
In: The journal of development studies, Band 56, Heft 8, S. 1489-1507
ISSN: 1743-9140
In: The service industries journal, Band 31, Heft 16, S. 2693-2719
ISSN: 1743-9507
In: Asian American History and Cultu Series
Intro -- Contents -- List of Figures -- Acknowledgments -- Introduction: Displacing Kinship: The Trauma of Assimilation and the Affects of Empire -- 1. Attractive Families: Assimilation and the Sociological Containment of Race -- 2. Ambivalent Attachments: Orienting toward Family in Vietnamerica and The Best We Could Do -- 3. "Like a Fucked Family": Intergenerational and Queer Vietnamese Traumas -- 4. Embodying Memory and Remembering Race -- Epilogue: Shattered Relationalities, Fetishizing Trauma, and the Task of Representation -- Notes -- Bibliography -- Index.
Since taking over the country, the Vietnamese government has been heavily criticized for their policies and actions on addressing religion and ethnic minorities-related matters. 'Religious freedom' is believed to be significantly restricted and 'the life and voices of marginalized minorities' are said to be largely taken for granted. By exploring a specific case that covers both given concerns, the thesis provides insights into how an ethnic minority group – the Hmong – has been actively living out their religious faith in a communist country since the very first mass conversion to a western religion even though the hardships on multiple life aspects that they have to confront are countless, unseen, and untold. The dissertation is built on intensive ethnographic fieldwork that was mainly done at a focal village called Yagad in the Central Highlands. Also, several field trips were conducted in some other Hmong villages of Vietnam to gather comparative data. Along with detailed participant observation notes and a variety of field notes, the research appreciates more than 100 participants' thoughts and voices. In terms of the data analysis, interpretation, and writing-up processes, they have been done mainly in the field of Science of Religion (Religionswissenschaft). Structurally, Part I explains how the research is defined and designed and how the whole research is processed methodologically. Part II is on the Hmong and their Encounters with Christianity on regional and global scales. A more significant portion of their current conversion to Protestantism in Vietnam is reconsidered and illuminated by numerous narratives collected in the field. Part III, titled 'the Hmong Protestants of Vietnam: An Ethnographic Study,' intensively explores the religious life of Hmong converts in a focal village of the Central Highlands. Firstly, this part re-examines existing conclusions on mass Hmong migrations southwards in the early 1990s empirically proved to be driven by religion-related causes. It also provides a detailed investigation of their religious practices and beliefs after their conversion in the late 1980s. As a matter of fact, the Hmong converts have been establishing a well-organized church in their own ways, creating a viral religious environment that enables every adherent to intensify their faith in preferable manners. Regarding religious belief, Hmong converts' significant changes and their concrete expressions are displayed, confirming their unique way of believing in and communicating with God compared with their Christian counterparts worldwide. Furthermore, by examining the inter-group relations between the defined Hmong group with other groups of different ethnic and political backgrounds, this Part III shows the Hmong's process of defining 'Peb Hmoob' , building up and strengthening their community in the alien society. Such a successful process allows them to follow their religious group in a respected co-existence of varied Protestant denominations without any problems due to denominational differences, cohabit with other ethnic groups in harmony, and freely practice their freedom of religion in boundaries. Finally, by discovering Hmong Protestants' religious ethic, their identity markers in the Protestant context, and considering the remaining changes and concerns present in their community, the impact of 'being a Protestant' on these ethnic minority people's lives is revealed, highlighting how their ethnic and religious identities have been negotiated, which eventually results in a reconstructed identity as 'Hmong Protestants.'
BASE
In: Children and youth services review: an international multidisciplinary review of the welfare of young people, Band 161, S. 107657
ISSN: 0190-7409
SSRN
In: CIFR Paper No. 132/2016/Project T023
SSRN
Working paper
In: Accounting & Finance, Band 59, S. 747-771
SSRN
In: Administrative Sciences: open access journal, Band 8, Heft 4, S. 82
ISSN: 2076-3387
Organizational performance development and financial slack have drawn extensive attention in management research. Recent studies have indicated that financial slack has a positive effect on innovation outcomes and organizational performance. However, some other studies have proposed adverse effects. This paper aimed to explore the causal linkages between employee creative self-efficacy, learning orientation, financial slack, innovation outcomes and organizational performance. It also examined the influence of innovation performance and creative self-efficacy as mediating variables in the connection between learning orientation and organizational performance. By doing so, we used a structural equation modelling (SEM) method to test the model using data from 267 small medium enterprises (SMEs) in Vietnam. The findings illustrated that SMEs had not utilized financial slack to invest in innovation activities and improve firm performance. Furthermore, the results indicated that learning orientation had both direct and indirect impacts on innovation and firm performance. It is worth noting that employee creative self-efficacy had a positive effect on innovation performance. The findings also verified a statistically significant association between innovation and organizational performance. Finally, the results provided some managerial implications to stimulate employees to work creatively and improve innovation outcomes for sustainable development.
In: European Journal of Finance, Forthcoming
SSRN
Working paper
With the increase of the threats at information security in Internet of Things (IoT), there are more and more security solutions have been designing. Unlike the traditional security, these solutions need to adapt with IoT Platform because of the difference about complex communication protocol, low energy, processing ability and limited memory. Our research team, after had been under a long process of analyzing theoretical documents and operating simulated experiments, improved, and implemented CurveCP which is one of these Lightweight cryptographies in the Wireless sensor Networks (WSN) to enhance data secure and information security of IoT System. This study briefly describes the improvement of CurveCP Lightweight cryptography by reducing length of cryptographic key as well as implement in IoT System. It also includes the simulated experiments, solutions evaluation, conclusion, and future development. Keywords: Internet of Things (IoTs), Wireless Sensor Network (WSN), CurveCP, cryptographic box References [1] J. Bernstein, CurveCP: Usable Security for the Internet, University of Illinois at Chicago, January 22, 2017. [2] V. Tanh, N. Q. Tri, N. L. Giang, N. A. Tuan, Design of Comprehensive Security Solution on Internet of Things with Improved DTLS Protocol and Overhearing Mechanism, Fundamental and Applied Information Technology Research (FAIR), Nha Trang, Vietnam, 2020. [3] X. Li, W. He, S. Li, Internet of Things in Industries: A Survey,IEEE Transactions on Industrial Informatics, Vol. 10, No. 4, 2014, pp. 2233-2243. [4] Hankerson, A. J. Menezes, S. Vanstone, Guide to Elliptic Curve Cryptography, Springer Publishing, 2003. [5] Pauly, C. Perkins, K. Rose, C. Wood, A Survey of Transport Security Protocols, University of Glasgow, September 6, 2018. [6] Dunkels, Contiki: Bringing IP to Sensor Networks, ERCIM News Journal, European Union, 2009. [7] Pedro, Mugdhe, Samarth, Cooja Simulator - Contiki Tutorials, Autonomous Networks Research Group, University of South California, 2016. [8] Abdellatif, Contiki Developer, Power Consumption, July 17, 2017. [9] Culler, D. Estrin, M. Srivastava, Guest Editors' Introduction: Overview of Sensor Networks, 2004, pp. 41-49, https://doi.org/10.1109/mc.2004.93. [10] C. Mansfield, J.L. Antonakos, Computer Networking from LANs to WANs: Hardware, Software, and Security, Boston Cengage Learning, 2010, pp. 501. [11] SAS Team, What is Network Latency (and How Do You Use a Latency Calculator to Calculate Throughput)?, The SAS Group of Companies Limited, April, 2019. [12] Johnson, M. Healy, P. V.D. Ven, J. H. Martin, J. Nelson, T. Newe, E. Lewis, A Comparative Review of Wireless Sensor Network Mote Technologies, IEEE SENSORS Conference, 2009, pp. 1439-1442. [13] D Hofstrand, Energy Measurements and Conversions, Iowa State University Extension and Outreach, 2007. [14]Mojzís, tinyssh, The SSH Library, 2018. [15] J. Bernstein, T. Lange, P. Schwabe, NaCl: Networking and Cryptography library, University of Illinois at Chicago, 2016. [16] Felker, Musl 1.1.24 Reference Manual, License of Massachusetts Institute of Technology, 2011. [17] V. Tanh, N. Q. Tri, N. G. Tuyen, T. Q. Duc, T. H. Anh, B. T. Tung, The Flooding Attack in Low Power and Lossy Networks: A Case Study, The 7 th IEEE International Conference on Smart Communications in Network Technologies (SaCoNet 2018), El Oued, Algeria, 2018. [18]N. V. Tanh, N. Q. Tri, G. Tuyen, N. L. Giang, N. V. Tien, Design a Security System for Internet of Things with Detectinng and Author Proceedings of Eliminating Denial of Service Attack Based on Overhearing Mechanism, the 3rd Symposium of Information Security (SoIS 2018), Da Nang, Vietnam, 2018. [19] S. Samonas, D. Coss, The CIA Strikes Back: Redefining Confidentiality, Integrity and Availability in Security, Journal of Information System Security, Vol. 10, No. 3, 2014, pp. 21-45.
BASE
In: Review of Corporate Finance Studies, forthcoming
SSRN