Results 21 to 30 of about 1,494,656 (306)

Exploitation of Labor or Exploitation of Commodities?

open access: yesReview of Radical Political Economics, 2023
Attempts to use commodities to construct theories of value and use such value theory to claim that, in capitalism, commodities can be exploited, just like labor is, rest on two conceptual flaws: (a) failure to distinguish between labor and labor power and (b) failure to distinguish labor power and other commodities.
openaire   +3 more sources

The role of trade narratives in poverty reduction after the COVID-19 crisis [PDF]

open access: yesReview of Economics and Political Science, 2021
Purpose – This paper aims to explore different possible economic narratives concerning trade, which may emerge based on lessons learned from the COVID-19 crisis and likely effects of these differing narratives would have on global poverty reduction ...
Scott Allen Hipsher
doaj   +1 more source

Exploiting an Exploiter [PDF]

open access: yesScience, 2010
Cell Biology![Figure][1] CREDIT: MAURIZIO MOLINARI Viruses have evolved diverse mechanisms to take control of the host cells in which they replicate. All plus-stranded RNA viruses, such as hepatitis A and poliovirus, use host cell membranes for replication in the cytoplasm ...
openaire   +1 more source

The factors determining the service length of the lead refining kettles

open access: yesZaštita Materijala, 2014
Continuous process, as well as refining capacity of lead is highly dependent on the quality of kettles for refining lead. The kettles are made from special kettles plate and are generally spherical in shape.
Branislav Nikolić   +2 more
doaj   +1 more source

Method for calculating a two-drum mine winder

open access: yesВесці Нацыянальнай акадэміі навук Беларусі: Серыя фізіка-тэхнічных навук, 2020
In the Republic of Belarus, on the base of JSC “Soligorsk Institute for Resources Saving Problems with Pilot Production”, the development and launch of import-substituting mass production of large-capacity double-drum mine winders with an increased ...
V. Ya. Prushak, A. P. Dvornik
doaj   +1 more source

Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence [PDF]

open access: yes, 2009
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack graph in combination with a statistical model of the attacker community ...
Olsson, Tomas
core   +3 more sources

Intersecting Inequalities in Romanian Crime Series Shadows (HBO). Expressions of Identity between Authenticity, Stereotypes and “Eastploitation” [PDF]

open access: yesCaietele Echinox, 2022
The representations of gender, ethnicity and class play a particularly significant part in structuring the way in which East European crime fiction makes sense of its cultural identity.
Roxana Eichel
doaj   +1 more source

Migrant worker policies and national privilege: A UK case study

open access: yesDeusto Journal of Human Rights, 2021
After a long period of decline in the Global North, migrant worker policies are making a comeback on the agenda of the European Union and several of its member states.
Pier-Luc Dupont
doaj   +1 more source

The Powers of the Exploited and the Social Ontology of Praxis

open access: yestripleC: Communication, Capitalism & Critique, 2018
This contribution is the first part of a debate between Michael Hardt/Toni Negri and David Harvey on the occasion of Marx’s bicentenary. The discussion focuses on the question of what capitalism looks like today and how it can best be challenged.
Michael Hardt, Toni Negri
doaj   +1 more source

Achieving the G20 gender equality target by tackling sexual exploitation through legal uniformity, extra territoriality and corporate responsibility [PDF]

open access: yes, 2015
Exploitation of some individuals and groups by others is a depressingly familiar aspect of human society which enables one individual or group to succeed at the expense of another. Whilst not seeking to downplay abuse of men and male children, this paper
Gerry, F, Sjölin, C
core   +1 more source

Home - About - Disclaimer - Privacy