13,041 research outputs found

    Sport, physical activity and the establishment of Health and Wellbeing Boards in Nottingham and Nottinghamshire

    Get PDF
    This paper will examine the emergence of Health and Wellbeing Boards in Nottinghamshire and the City of Nottingham and explore the implications for sport and physical activity. At the time of writing the transfer of responsibilities for Public Health and the establishment of Health and Wellbeing Boards in both the City of Nottingham and within Nottinghamshire County Council are considered to be relatively advanced by the Strategic Health Authorities, the respective local authorities and by the boards of the two Primary Care Trusts. "Shadow"� Health and Well being Board have been established in both authorities and they have been meeting regularly for s everal months. Public health and commissioning staff have also been successfully relocated and new strategies and priorities are starting to emerge. Nottingham and Nottinghamshire have traditionally acknowledged the role of sport and physical activity to the wider determinants of public health and given a relatively high priority to the contribution that sport and physical activity can make to the ir preventative health and early intervention agendas. This paper will look at the transition to Health and Wellbeing boards to assess how the role of sport and physical activity may be changing and to identify opportunities for its contribution to policy and practise in the future. It will examine both the theory and practise behind the emerging governance arr angements, the strategic objectives and priorities, and the developing evidential base for future policy and delivery within the two areas

    The SECURE collaboration model

    Get PDF
    The SECURE project has shown how trust can be made computationally tractable while retaining a reasonable connection with human and social notions of trust. SECURE has produced a well-founded theory of trust that has been tested and refined through use in real software such as collaborative spam filtering and electronic purse. The software comprises the SECURE kernel with extensions for policy specification by application developers. It has yet to be applied to large-scale, multi-domain distributed systems taking different application contexts into account. The project has not considered privacy in evidence distribution, a crucial issue for many application domains, including public services such as healthcare and police. The SECURE collaboration model has similarities with the trust domain concept, embodying the interaction set of a principal, but SECURE is primarily concerned with pseudonymous entities rather than domain-structured systems

    Conspiracy theories on the basis of the evidence

    Get PDF
    Conspiracy theories are often portrayed as unwarranted beliefs, typically supported by suspicious kinds of evidence. Yet contemporary work in Philosophy argues provisional belief in conspiracy theories is at the very least understandable---because conspiracies occur---and that if we take an evidential approach, judging individual conspiracy theories on their particular merits, belief in such theories turns out to be warranted in a range of cases. Drawing on this work, I examine the kinds of evidence typically associated with conspiracy theories, and show how the so-called evidential problems with conspiracy theories are also problems for the kinds of evidence put forward in support of other theories. As such, if there is a problem with the conspiracy theorist's use of evidence, it is one of principle: is the principle which guides the conspiracy theorist's use of evidence somehow in error? I argue that whatever we might think about conspiracy theories generally, there is no prima facie case for a scepticism of conspiracy theories based purely on their use of evidence

    The Common-Core/Diversity Dilemma: Revisions of Humean thought, New Empirical Research, and the Limits of Rational Religious Belief

    Get PDF
    This paper is the product of an interdisciplinary, interreligious dialogue aiming to outline some of the possibilities and rational limits of supernatural religious belief, in the light of a critique of David Hume’s familiar sceptical arguments -- including a rejection of his famous Maxim on miracles -- combined with a range of striking recent empirical research. The Humean nexus leads us to the formulation of a new ”Common-Core/Diversity Dilemma’, which suggests that the contradictions between different religious belief systems, in conjunction with new understandings of the cognitive forces that shape their common features, persuasively challenge the rationality of most kinds of supernatural belief. In support of this conclusion, we survey empirical research concerning intercessory prayer, religious experience, near-death experience, and various cognitive biases. But we then go on to consider evidence that supernaturalism -- even when rationally unwarranted -- has significant beneficial individual and social effects, despite others that are far less desirable. This prompts the formulation of a ”Normal/Objective Dilemma’, identifying important trade-offs to be found in the choice between our humanly evolved ”normal’ outlook on the world, and one that is more rational and ”objective’. Can we retain the pragmatic benefits of supernatural belief while avoiding irrationality and intergroup conflict? It may well seem that rationality is incompatible with any wilful sacrifice of objectivity. But in a situation of uncertainty, an attractive compromise may be available by moving from the competing factions and mutual contradictions of ”first-order’ supernaturalism to a more abstract and tolerant ”second-order’ view, which itself can be given some distinctive intellectual support through the increasingly popular Fine Tuning Argument. We end by proposing a ”Maxim of the Moon’ to express the undogmatic spirit of this second-order religiosity, providing a cautionary metaphor to counter the pervasive bias endemic to the human condition, and offering a more cooperation- and humility-enhancing understanding of religious diversity in a tense and precarious globalised age

    Face recognition technologies for evidential evaluation of video traces

    Get PDF
    Human recognition from video traces is an important task in forensic investigations and evidence evaluations. Compared with other biometric traits, face is one of the most popularly used modalities for human recognition due to the fact that its collection is non-intrusive and requires less cooperation from the subjects. Moreover, face images taken at a long distance can still provide reasonable resolution, while most biometric modalities, such as iris and fingerprint, do not have this merit. In this chapter, we discuss automatic face recognition technologies for evidential evaluations of video traces. We first introduce the general concepts in both forensic and automatic face recognition , then analyse the difficulties in face recognition from videos . We summarise and categorise the approaches for handling different uncontrollable factors in difficult recognition conditions. Finally we discuss some challenges and trends in face recognition research in both forensics and biometrics . Given its merits tested in many deployed systems and great potential in other emerging applications, considerable research and development efforts are expected to be devoted in face recognition in the near future

    Light me up: power and expertise in risk communication and policy-making in the e-cigarette health debates

    Get PDF
    This paper presents a detailed account of policy-making in a contemporary risk communication arena, where strong power dynamics are at play that have hitherto lacked theoretical analysis and empirical validation. Specifically, it expands on the understanding of how public health policy decisions are made when there is a weak evidential base and where multiple interpretations, power dynamics and values are brought to bear on issues of risk and uncertainty. The aim of the paper is to understand the role that power and expertise play in shaping public health risk communication within policy-related debates. By drawing on insight from a range of literatures, the paper argues that there several interacting factors that shape how a particular narrative gains prominence within a wider set of perspectives and how the arguments and findings associated with that perspective become amplified within the context of policy choices. These findings are conceptualised into a new model – a policy evaluation risk communication (PERC) framework – and are then tested using the Electronic cigarette debate as a case study

    Epistemically Pernicious Groups and the Groupstrapping Problem

    Get PDF
    Recently, there has been growing concern that increased partisanship in news sources, as well as new ways in which people acquire information, has led to a proliferation of epistemic bubbles and echo chambers: in the former, one tends to acquire information from a limited range of sources, ones that generally support the kinds of beliefs that one already has, while the latter function in the same way, but possess the additional characteristic that certain beliefs are actively reinforced. Here I argue, first, that we should conceive of epistemic bubbles and echo chambers as types of epistemically pernicious groups, and second, that while analyses of such groups have typically focused on relationships between individual members, at least part of what such groups epistemically pernicious pertains to the way that members rely on the groups themselves as sources of information. I argue that member reliance on groups results in groups being attributed a degree of credibility that outruns their warrant, a process I call groupstrapping. I argue that by recognizing the groupstrapping as an illicit method of forming and updating beliefs we can make progress on some of the open questions concerning epistemically pernicious groups

    Conspiracy Theories and Their Investigator(s)

    Get PDF
    A reply to Patrick Stokes' 'Reluctance and Suspicion'—itself a reply to an early piece by myself replying to Stokes—in which I clarify what it is I intend when talking about how we should investigate conspiracy theories
    corecore