Beyond the Flexibility/Security Trade-Off: Reconciling Confident Consumers with Insecure Workersbjir_825
نویسنده
چکیده
The article proposes an analysis of labour markets and related social policy that corrects the supply-side emphasis that has dominated economic policy since the decline of Keynesian approaches in the late 1970s. It starts from a potential tension between the apparent need of economies for both flexible workers and confident consumers. This can be resolved through three different approaches: separating insecure workers from secure consumers, separating consumption from labour incomes, and integrating flexibility and security within the labour market itself. These approaches are played out across four different contexts: place, time, externalizing problems on to minorities within a given community, internalizing problems within the community. Up to 19 different public policies and corporate practices are identified, occupying different positions on the framework. These go considerably beyond the issues of industrial relations institutions and related social policy that are the normal focus of labour market
منابع مشابه
A Multi-Mode Resource-Constrained Optimization of Time-Cost Trade-off Problems in Project Scheduling Using a Genetic Algorithm
In this paper, we present a genetic algorithm (GA) for optimization of a multi-mode resource constrained time cost trade off (MRCTCT) problem. The proposed GA, each activity has several operational modes and each mode identifies a possible executive time and cost of the activity. Beyond earlier studies on time-cost trade-off problem, in MRCTCT problem, resource requirements of each execution mo...
متن کاملFlexicurity: A New Paradigm for the Analysis of Labor Markets and Policies Challenging the Trade-Off Between Flexibility and Security
The aim of the article is to discuss the concept of flexicurity presented as a new paradigm for analyzing modern labor markets (analytical perspective) and as a metaphor for policies striving for a better balance between flexibility and security (normative perspective). The purpose is to clarify these analytical and normative meanings of the flexicurity concept from a theoretical and empirical ...
متن کاملAnalysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack
Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...
متن کاملInvestigating food security and food waste control of farm families under drought (A case of Kherameh County)
Introduction For decades, various policy initiatives have been planned to achieve food security. However, the number of malnourished people is growing, especially in rural areas of developing countries. Due to the increase of extreme weather events, such as droughts, and significant depletion of water resources, achieving food security is not an easy task. Therefore, an investigation of rural...
متن کاملPrivacy Negotiations enhance Data Collection for CRM
The application of Privacy Negotiation Techniques alleviates the PrivacyPersonalization trade-off by reconciling consumers' quest for Privacy with the service providers' personalization efforts. The kind and amount of personal data to be disclosed is individually settled. By applying the mechanisms of privacy negotiations to data collection for customer relationship management purposes, drop ou...
متن کامل