Peters and Welch, “Gradients of Corruption in Perceptions of American Life”

Definitions. Reviews Gardiner's arguments

Claims study of corruption is held back by definition.

I wonder. Probably it is more held back by lack of useful research questions. Anyway..

Corruption is violation of formal norms/legal standards,
or includes "norms"
or public opinion

Heidenheimer (1970) black corruption: both officials and public wish an act could be stopped.

white corruption: petty corruption that neither officials nor government want to punish.

P&W define 4 dimensions of corruption

1. Official (position and context in which favor is performed)

--judge corruption versus mayor corruption

--inside official duties, in a gray area, or wholly outside

2. Favor performed

3. Payoff

4. Donor or recipient.
--in constituency?
--outside of it?

Administer survey to state senators (441 answered)

See p. 162. Table of "More Corrupt" and "Less Corrupt" actions.

Most consensus an act is corrupt if an action is illegal
1. politician gets a direct personal gain (DRIVEWAY)
2. "merger of roles". Donor is the politician-- we are talking about a simple direction of public resources to the politician's gain.

Some ambiguity about campaign contributions.

If a donor just gave money for a policy favor, most would say it is corrupt.

But if the donation is into a campaign fund, people may see it differently. Especially if the donor is a constituent.

Also ambiguity about the "spoils system" and whether donors should bet Ambassadorships.

Lower agreement on corruption seen if
1. The official cannot gain so directly--STOCK, for example.

2. If gain is somehow constituency oriented, a long-run investment, then people are less likely to call it corrupt. Owning stock in a company that does well in one's community.

How does that match up with Lawrence experience (Desidera Pharmaceutical Company).

Posted in ps645 | Leave a comment

Gardiner, “Defining Corruption”

I like the general idea that corruption is diversion of resources from public to private purposes.

That's not enough for Gardiner.

Originally published 1993

Look at separate problems (really separate?)

1. Corruption
Nye (1967) corruption is deviation from behavior norms because of private-regarding, pecuniary, or status gain. Includes bribery, nepotism, misappropriation.

Is this limited? Should it include abuse of power for other reasons? Yes..

Also, norms are vague and multi-contextual.

2. Abuse of Office

3. Business fraud , misbehavior, corruption.

Intimately linked to government corruption, but perhaps a separate topic sometimes.

4. Organized crime

Where do the "standards of behavior" come from?

1. Legal standards.

Clearly, if a law forbids something, then violating it to divert resources

But, what if laws are not formulated clearly?

What if Common Law is in place, where general ideas of common expectations play a role?

2. Public Interest

Even if an act is not against the law, it might be corrupt in the opinion of an observer.

Given many countries and contexts, this creates a lot of room for debate.

Think of the IMF trying to enforce anti-corruption policies in a country where people do not think something is wrong.

3. Public opinion

Perhaps expert observers disagree. So we go survey people.

p. 34 mentions Welch and Peterson survey, differentiates officials, donors, type of favor, and type of payoff.

p. 35 cites Johnston's surveys.

Variations across Nations.

In Italy, a friend once told me that "tipping" in restaurants was a form of corruption.

================

Things I wonder.

If government officials could have stopped the Enron company from ripping people off by fraud, but chose not to do so, then would we call that corruption?

Do we agree with this differentiation of "abuse of office" from "corruption". Maybe it is good to keep things separated, but I'm not wasting any sleep over it.

Posted in ps645 | Leave a comment

N800 list packages in order of installation

/var/lib/dpkg/info # ls -rt

shows list of packages in order of update/installation

Posted in Uncategorized | Leave a comment

Good Fedora Linux install guide

This is quite thorough.

http://www.mjmwired.net/resources/mjm-fedora-f8.html

Also I've referred to many times to the "Tips and Tricks" series. This has been up since Fedora 1, I think. http://www.gagme.com/greg/linux/f8-tips.php

Posted in Linux | Leave a comment

Firefox and plugin problems in x86_64

On x86_64, most plugins don't work. I tried the wrapper thing and could not watch flash.

Don't want to remove firefox.x86_64, even though that's what most people seem to do. Then they just run firefox.i386. Don't want to do that because that requires the removal of the 64 bit apps like yelp and devhelp that depend on firefox.

But it is possible to stop firefox-64 bit from running

Solution: edit the /usr/bin/firefox script and comment out the 64 bit lines, like so:

#if [ -x "/usr/lib64/firefox-1.5.0.7/firefox-bin" ]
#then
# MOZ_LIB_DIR="/usr/lib64"
#fi"

Advice found at:
http://fedorared.org/firefox-and-flash-on-fedora-x86-64

Posted in Linux | Leave a comment

Using gpg to encrypt files. Great web page

From "http://www.somacon.com/p107.php"

Notes for using GPG to encrypt and decrypt backup files

GPG allows you to use public-private key encryption to encrypt
and decrypt files on Windows and Linux. The benefit of public-private
key encryption is that you can keep your public key out in
the open, and use it from anywhere to encrypt files. Once
encrypted with the public key, those files can only be decrypted
with the private key. The idea is to keep the private key
someplace safe, like on a CDROM in a bank vault, and then you can
keep the encrypted backup files and public key just about anywhere.
Better yet, you can send the encrypted backup files over easy-to-use,
unencrypted network protocols, like FTP and HTTP.

In a simple, scheduled Perl script, I can create a backup of my websites,
encrypt them, and then transfer them by anonymous FTP to my home computer.
Similarly, I can encrypt important files on my home computer and store
them safely on third-party servers. The notes below outline the commands
that are needed to perform the necessary operations.

GPG requires a home directory to store its keys.
In Linux, it uses HOME/.gnupg
In Windows, it uses what you specify in the registry keys,
which by default is c:\GnuPG

Keys are stored in files called "key rings".
The secring.gpg file is the key ring that stores secret keys.
The pubring.gpg file is the key ring that stores public keys.

Keys in the key rings are referred to by the name, or partial name.
e.g. to refer to the key of "Shailesh N. Humbad",
you can use "Shailesh" as the name.

To create a new public/private key pair, run:
gpg --gen-key
and follow the prompts.

To list public keys, run:
gpg --list-keys

To list private or secret keys, run:
gpg --list-secret-keys

To export a public key to an ascii text file, run:
gpg -a --export NAME > yourpublickey.gpg

To export a private (or secret) key to an ascii text file, run:
gpg -a --export-secret-keys NAME > yourprivatekey.gpg

To delete a public key from the local key ring:
gpg --delete-keys NAME

To delete a secret key from the local key ring:
gpg --delete-secret-key NAME

To encrypt a file, use:
gpg -r NAME --output OUTFILE.gpg --encrypt INFILE

To decrypt a file, use:
gpg -r NAME --output OUTFILE --decrypt INFILE.gpg

If you leave out the "-r" option, it will prompt you for the
name of the user whose key should be used.
Decrypting a file requires that you have the secret key in the local
key ring, and it will prompt you for the passphrase to access the secret key.

To make a backup of a key, copy the key to an ASCII file as shown above.
These can be imported into another key ring on another computer, but
they can't be directly used during a gpg command.

You may want to keep your secret key ONLY on external media (recommended),
but be able to decrypt files using that key with a single command.

In this case, you need to create a key ring file containing your secret
key. To do this, first make sure the desired key exists in the local key
ring file by using the list commands. Then copy the ring.gpg file
to the external media. To use the external key ring store, use the
--secret-keyring option in the command line.

(You can make sure only selected keys exist in the key ring file by
making a backup copy of the original, importing the selected keys,
copying the new key ring, and then restoring the original.)

To decrypt a file with an external key ring, run:
gpg --secret-keyring KEYRING -o OUTFILE --decrypt INFILE

To import a key, run:
gpg --import KEYFILE

When importing a public key onto another machine, you may have configure gpg to
trust the key. Otherwise, when you use the key to do encryption, you may
see a prompt like this:

It is NOT certain that the key belongs to the person named
in the user ID. If you *really* know what you are doing,
you may answer the next question with yes.

Use this key anyway? (y/N)

To trust the key, run:
gpg --edit-key NAME

GPG will output some information, and show a line like:
trust: undefined validity: unknown

You will be at a console, and you have to type "trust":
Command> trust
Please decide how far you trust this user to correctly verify other users' keys
(by looking at passports, checking fingerprints from different sources, etc.)

1 = I don't know or won't say
2 = I do NOT trust
3 = I trust marginally
4 = I trust fully
5 = I trust ultimately
m = back to the main menu

Your decision? 5
Do you really want to set this key to ultimate trust? (y/N) y

Type "quit" to quit. If you run gpg --edit-key NAME again, you will
see a line as below, which means the key is now trusted.
trust: ultimate validity: ultimate

For more information, see the GPG FAQ and the GPG Manual.
Link to this page: Notes for using GPG to encrypt and decrypt backup files

Posted in Linux | Leave a comment

Chimps choose more rationally than humans

October 5, 2007 Science. Researchers have demonstrated chimpanzees are more nakedly self interested than humans. I'd say "chimps are more like the textbook selfish rational actors than human players." UPI report says "Researchers from the Max Planck Institute of Evolutionary Anthropology in Leipzig studied the chimp's choices by using an economic game with two players. In the game, a human or chimpanzee who receives something of value can offer to share it with another.

If the proposed share is rejected, neither player gets anything.

Humans typically make offers close to 50 percent of the reward. They also reject as unfair offers of significantly less than half of the reward, even though this choice means they get nothing."

Posted in Uncategorized | Leave a comment

Copy Repositories with Rsync

In fedora-list, Ashley M Kirchner wrote Oct 6 2007

You can use rsync with any of the mirrors to keep a local copy. I
have a shell script that I run every so often:

~:> cat rsync.sh
echo "Getting Fedora Core 7 Updates...";
echo -e "********************************\n";
rsync --verbose --progress --archive \
--partial --delete --delete-excluded \
--exclude SRPMS/ \
--exclude ppc/ \
--exclude ppc64/ \
--exclude x86_64/ \
--exclude i386/debug/ \
--exclude i386/repodata/ \
rsync://mirrors.kernel.org/fedora/updates/7/ "/home/Fedora 7/Updates/";

This will fetch just the i386 folder from mirrors.kernel.org and
dump it into /home/Fedora7/Updates

-----------

man reposync

Posted in Uncategorized | Leave a comment

Swap fixups, concerning Read-error on swap device

Mike Lord wrote 2007-08-29

> Read-error on swap-device (8:0:99814256)
...

Looks like a bad sector in the swap partition.
You can probably repair it by using this sequence of commands:

swapoff /dev/sdX <--- replace sdX with actual swap partition dev name sync cat /dev/zero > /dev/sdX
mkswap /dev/sdX
swapon /dev/sdX

If it recurs after doing that, then it's time for a new drive.

MS3FGX in linuxquestions says "You can use the -c option of mkswap to check for bad blocks":

sudo swapoff -a
sudo mkswap -c /dev/hdaX
sudo swapon -a

Posted in Linux | Leave a comment

Testing the N800 ability to post

Wondered how WordPy cauld do

Posted in Uncategorized | Leave a comment