Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
114
result(s) for
"Bijl, Paul"
Sort by:
Emerging Memory
2015,2016,2025
This incisive volume brings together postcolonial studies, visual culture and cultural memory studies to explain how the Netherlands continues to rediscover its history of violence in colonial Indonesia. Dutch commentators have frequently claimed that the colonial past and especially the violence associated with it has been 'forgotten' in the Netherlands. Uncovering 'lost' photographs and other documents of violence has thereby become a recurring feature aimed at unmasking a hidden truth. The author argues that, rather than absent, such images have been consistently present in the Dutch public sphere and have been widely available in print, on television and now on the internet. Emerging Memory: Photographs of Colonial Atrocity in Dutch Cultural Remembrance shows that between memory and forgetting there is a haunted zone from which pasts that do not fit the stories nations live by keep on emerging and submerging while retaining their disturbing presence.
Regulation and Entry into Telecommunications Markets
2003,2002,2009
This book analyses telecommunications markets from early to mature competition, filling the gap between the existing economic literature on competition and the real-life application of theory to policy. Paul De Bijl and Martin Peitz focus on both the transitory and the persistent asymmetries between telephone companies, investigating the extent to which access price and retail price regulation stimulate both short- and long-term competition. They explore and compare various settings, such as non-linear versus linear pricing, facilities-based versus unbundling-based or carrier-select-based competition, non-segmented versus segmented markets. On the basis of their analysis, De Bijl and Peitz then formulate guidelines for policy. This book is a valuable resource for academics, regulators and telecommunications professionals. It is accompanied by simulation programs devised by the authors both to establish and to illustrate their results.
Legal Self-fashioning in Colonial Indonesia: Human Rights in the Letters of Kartini
2017
Focusing on her writings, this article shows how the Javanese woman Kartini (1879–1904) engaged with conceptions of “human rights” that were globally circulating in the early twentieth century, thereby further developing them by critiquing existing and imagining new conceptions of rights, law, and justice. The article and Kartini deal with colonial history and those who were colonized as a basis for re-theorizing the origins of the concept of human rights vis-à-vis European privilege. The central concept of this essay is that of “legal self-fashioning,” which the author develops to discuss how Kartini's writings constructed an emphatic, willful inner life that made her part of what was at the time considered “humanity” and therefore “ready” for individual rights.
Journal Article
Access regulation and the adoption of VoIP
2009
The introduction of packet-switched telephony in the form of Voice over Internet Protocol (VoIP) raises concerns about current regulatory practice. Access regulation has been designed for traditional telephony on public networks (PSTN). In this paper we analyze the effect of access regulation and retail price regulation of PSTN networks on the adoption of a new technology in the form of VoIP. In particular, we show that with endogenous consumer choice between PSTN and VoIP telephony, higher prices for terminating access to the PSTN network make VoIP less likely to succeed and lead to lower profits of operators that offer exclusively VoIP telephony.
Journal Article
Network neutrality and the nature of competition between network operators
2007
The neutral architecture of the Internet is being challenged by various parties, such as network operators providing the connections to end-users, who are interested in gaining control of the information exchanged over the Internet. What are the effects on competition and welfare of such practices? Currently, there exists very little economic theory on network neutrality. This paper provides a preliminary analysis of the type of economic modeling that can address network neutrality, as well as of the type of results that can be expected. Keywords Network neutrality * Discriminating practices * Product differentiation Imperfect competition * Regulation
Journal Article
Human Rights and Anticolonial Nationalism in Sjahrir's Indonesian Contemplations
2017
In 1945 and under the pseudonym Sjahrazad, Indonesia's first prime minister Sutan Sjahrir and his wife Maria Duchâteau published a book in Dutch entitled Indonesian Contemplations about Sjahrir's exile to and incarceration in the 1930s in the Dutch colonial concentration camp Boven-Digoel. Through an analysis of the book's critique of the legal spatialities of the Dutch empire and its imagination of the space of the Indonesian nation-state, this article makes a double argument: on the one hand, for the importance of scholarly analyses of Indonesian writing on the Dutch colonial-legal project and, on the other, against the idea that national liberation and international human rights were mutually exclusive in anticolonial nationalism.
Journal Article
Network neutrality and competition between networks: A brief sketch of the issues
by
de Bijl, Paul W. J
,
Kocsis, Viktória
in
Communications networks
,
Competition
,
Congressional committees
2008
Users of the Internet benefit from a stream of continuously emerging innovations in applications and services. These innovations give rise to a need for faster and more precise data transmission, which requires investments and innovations by network operators. Certain innovations, such as Quality of Service (QoS) and the labeling of individual data packets (packet shaping), help operators to raise the priority of a certain data flow or limit the priority of another flow. Such technologies may support the provision of applications that are time-sensitive (e.g. voice), or that require high bandwidth (e.g. video) or a higher level of security (e.g. e-commerce). The Internet as people currently know it is based on a simple network architecture, which allows any computer to send packets to any other computer, while packets are not inspected by the networks. As a result, all packets are treated in the same way, and in case of congestion, packets are treated on a first-in/first-out basis (best effort routing practice).
Journal Article