Search Results

You are looking at 91 - 100 of 117 items for :

  • "legitimacy" x
  • All content x
Clear All

. S IDANIUS , J. , L EVIN , S. , F EDERICO , C. M. , & P RATTO , F. ( 2001 ). Legitimizing ideologies: The social dominance approach . In J. T. J OST , & B. M AJOR (Eds.), The psychology of legitimacy:Emerging perspectives on ideology

Restricted access

Review , 7 ( 1 ), 19 – 32 . 10.1007/BF03036781 Wang , J . ( 2013 ). Confucian heritage cultural background (chcb) as a descriptor for Chinese learners: The legitimacy . Asian Social Science , 9 ( 10 ), 105 – 113 . 10.5539/ass.v9n10p105 Wang , R

Open access

concept of norms is concerned, STI norms are social definitions regarding what is appropriate in achieving STI policy goals. At the national level, such norms define the legitimacy of a state's activities. At the ASEAN level, they define the legitimacy of

Restricted access

Chinese one; it began to change after Stalin's death in 1953 and abandoned mass terror. The Communist regimes in the Soviet Union and CEE had to look for some sort of social legitimacy and less coercive method of control over societies. This was especially

Restricted access

literature refers to the concept of ‘input legitimacy’ (people vote democratically for what they want, and even if it's not the optimal, it follows a democratic procedure), and ‘output legitimacy’ (giving people what they want, but assuming that those who

Restricted access

between 1979 and 1997, including the marketisation of education and greater parental choice of schools. Private schooling had been given greater legitimacy, and increasing numbers of parents unable to fund private schooling had sought private tutoring to

Open access

nobility, coupled with the mere electoral legitimacy of the king, weakened the monarchy‘s political position. The appointment of foreign kings to the Polish throne drew Poland into successive wars or made the electoral monarchs more interested in their home

Free access

paves the way to a scientific career and at the same time confers social legitimacy (Ben-David 1991 ). The production of a doctoral thesis brings together the three core functions of a university: tuition through mentoring and supervision, research by

Restricted access

wider values of society, namely by defining research priorities according to the rules of saliency, credibility, and legitimacy. This paper represents further research from the authors aiming to clarify the sources and influences underlying the

Restricted access

high technology. We believe that this justifies the legitimacy of the approach of analyzing only the giants or big players in technology in many previous papers on high-technology. In particular, USPTO is representative of a large body of the

Restricted access