178 research outputs found

    The articulation of identity in discourses of surveillance in the United Kingdom

    Get PDF
    This thesis enacts a discursive approach to surveillance in the UK, revealing implications for surveillance theory, governmentality theory, and for political and social identity theories. It demonstrates the importance of a discursive approach to surveillance, as an expansion of assemblage models of surveillance. It finds convergence between government, governance, finance and media discourses, sufficient to conceive of these as forming a shared governmental discourse of surveillance. Governmental, financial and media discourses tend to privilege the assumption that surveillance systems are effective and accurate. This ideological function elides the contingent nature of surveillant practices, presenting them as non-political technological functions. Governmentality accounts of surveillance are supplemented by an expanded understanding of identity as a contested concept, or floating signifier, articulated in particular ways in governmental discourses. The discourse theory informed analysis in this thesis points to a distinct articulation of identity – the governmental surveillant identity – a political attempt to fix the meaning of identity, and construct a surveillance-permeable form that draws upon the privileging of technological truth over human truth. Identity is articulated across many of the five discourses studied as socially vulnerable. The core articulation of the problem of governance is that identity is problematised; unreliable for the proper functioning of governance in society. Because identity is vulnerable and because identity’s ontological nature makes it possible, identity must be checked and secured

    Preliminary study of possible power development on the Gasconade River

    Get PDF
    The location of a possible dam site on the Gasconade River as a thesis proved to be a very interesting subject. Our first trip pointed out to us that we had undertaken a large task. We also realized that our subject was too big to complete thouroughly sic in the time alloted. Due to this circumstance we tried to cover the essential facts and to eliminate as much of the detail work as possible. For instance, we made no attempt to make a complete survey of the basin, instead, we ran surveys for some distance up the river to give an idea of the nature of the country and a way of approximating the volume of the basin --Foreword, Page 3

    Data protection authority perspectives on the impact of data protection reform on cooperation in the EU

    Get PDF
    This article presents the findings of interviews with representatives from the majority of EU data protection authorities in the context of the ongoing data protection reform process. It identifies commonalities between the authorities to the extent it is possible to speak about a EU DPA perspective, but also identifies areas of tension and disagreement as well as future intentions. The focus of the article is upon the impact of the data protection reform process on the way that these independent bodies, located in EU Member States will increasingly have to cooperate at an EU-level. Capturing these perspectives at this moment in the reform process provides insight into the process from a group of concerned stakeholders, but also insight into how these stakeholders are (re-)positioning themselves, planning, and anticipating the impacts of the reform.This article is based upon research conducted as part of the PHAEDRA II project ("Improving practical and helpful cooperation between data protection authorities" and the article is possible due to the assistance and contribution of all project partners. The project is co-funded by the European Union and the Fundamental Rights and Citizenship Programme (JUST/2013/FRAC/AG6068), however the contents of this article are the sole responsibility of the authors and cannot be taken to represent the views of the European Commission. More information on the project can be found at http://www.phaedra-project.eu

    EU Privacy seals project: Inventory and analysis of privacy certification schemes

    Get PDF
    The objective of this report is to comprehensively inventory and analyse privacy and related certification schemes in the European Union and, where relevant, at the international level. The report will provide insights into the importance of privacy seal schemes and present information on the operational aspects of these schemes. The report will also help understand the privacy and data protection elements of the analysed schemes and provide and initial analysis of their shortcomings. The report specifically aims to understand whether (if at all) the analysed schemes address the requirements proposed under the GDPR. It will highlight the main convergences and differences between the schemes, who benefits from such schemes and what the impact of such schemes is.JRC.G.7-Digital Citizen Securit

    EU Privacy seals project: Challenges and Possible Scope of an EU Privacy Seal Scheme. Final Report Study Deliverable 3.4

    Get PDF
    The objective of this report is focus on the challenges of implementing an effective EU privacy seal and its possible scope. It returns the focus to privacy and data protection, and presents further groundwork to feed into Task 4 of the Study (Proposals and evaluation of options for an EU-wide privacy seals scheme). Where relevant, research results and analyses of Tasks 1 and 2 are used. First, the report assesses the gaps in current privacy seal sector. Next, it highlights the advantages of, priorities for and possible scope of an EU privacy seal scheme. Eventually, four case studies (CCTV systems, cloud services, smart metering systems and biometric systems) illustrate the possible scope of an EU privacy seal scheme and demonstrate whether an EU privacy seals scheme would bring any added value to privacy and data protection.JRC.G.6-Digital Citizen Securit

    EU Privacy seals project: Comparison with other EU certification schemes

    Get PDF
    This report identifies and analyses key EU certification schemes in select sectors such as: network and information security, general product compliance, the environment, financial auditing and accounting, entertainment, the food industry and the telecommunications sectors and analyses them according to a standard set of criteria in relation to their background, development, practical set-up, legislative mandate (e.g., relevant directives, rules, links to legal obligations), main concerns and challenges. This identification and analysis will clarify the key principles on which such EU certification schemes are awarded and operate, and will help us draw lessons for an EU-wide privacy certification scheme.JRC.G.6-Digital Citizen Securit

    EU Privacy seals project: Proposals and evaluation of policy options. Final Report Study Deliverable 4.4

    Get PDF
    This report examines some of the key EU level options and approaches that might be useful to consider and that fit the mandate set by the General Data Protection Reform on privacy seals, whilst at the same time are able to reconcile existing privacy certification initiatives and address the gaps and challenges identified in the existing privacy seals sector as shown in the reports of Task 1 (inventory and analysis) and Task 3 (gaps and possible scopes).JRC.G.6-Digital Citizen Securit

    The effectiveness, acceptability and cost-effectiveness of psychosocial interventions for maltreated children and adolescents: an evidence synthesis.

    Get PDF
    BACKGROUND: Child maltreatment is a substantial social problem that affects large numbers of children and young people in the UK, resulting in a range of significant short- and long-term psychosocial problems. OBJECTIVES: To synthesise evidence of the effectiveness, cost-effectiveness and acceptability of interventions addressing the adverse consequences of child maltreatment. STUDY DESIGN: For effectiveness, we included any controlled study. Other study designs were considered for economic decision modelling. For acceptability, we included any study that asked participants for their views. PARTICIPANTS: Children and young people up to 24 years 11 months, who had experienced maltreatment before the age of 17 years 11 months. INTERVENTIONS: Any psychosocial intervention provided in any setting aiming to address the consequences of maltreatment. MAIN OUTCOME MEASURES: Psychological distress [particularly post-traumatic stress disorder (PTSD), depression and anxiety, and self-harm], behaviour, social functioning, quality of life and acceptability. METHODS: Young Persons and Professional Advisory Groups guided the project, which was conducted in accordance with Cochrane Collaboration and NHS Centre for Reviews and Dissemination guidance. Departures from the published protocol were recorded and explained. Meta-analyses and cost-effectiveness analyses of available data were undertaken where possible. RESULTS: We identified 198 effectiveness studies (including 62 randomised trials); six economic evaluations (five using trial data and one decision-analytic model); and 73 studies investigating treatment acceptability. Pooled data on cognitive-behavioural therapy (CBT) for sexual abuse suggested post-treatment reductions in PTSD [standardised mean difference (SMD) -0.44 (95% CI -4.43 to -1.53)], depression [mean difference -2.83 (95% CI -4.53 to -1.13)] and anxiety [SMD -0.23 (95% CI -0.03 to -0.42)]. No differences were observed for post-treatment sexualised behaviour, externalising behaviour, behaviour management skills of parents, or parental support to the child. Findings from attachment-focused interventions suggested improvements in secure attachment [odds ratio 0.14 (95% CI 0.03 to 0.70)] and reductions in disorganised behaviour [SMD 0.23 (95% CI 0.13 to 0.42)], but no differences in avoidant attachment or externalising behaviour. Few studies addressed the role of caregivers, or the impact of the therapist-child relationship. Economic evaluations suffered methodological limitations and provided conflicting results. As a result, decision-analytic modelling was not possible, but cost-effectiveness analysis using effectiveness data from meta-analyses was undertaken for the most promising intervention: CBT for sexual abuse. Analyses of the cost-effectiveness of CBT were limited by the lack of cost data beyond the cost of CBT itself. CONCLUSIONS: It is not possible to draw firm conclusions about which interventions are effective for children with different maltreatment profiles, which are of no benefit or are harmful, and which factors encourage people to seek therapy, accept the offer of therapy and actively engage with therapy. Little is known about the cost-effectiveness of alternative interventions. LIMITATIONS: Studies were largely conducted outside the UK. The heterogeneity of outcomes and measures seriously impacted on the ability to conduct meta-analyses. FUTURE WORK: Studies are needed that assess the effectiveness of interventions within a UK context, which address the wider effects of maltreatment, as well as specific clinical outcomes. STUDY REGISTRATION: This study is registered as PROSPERO CRD42013003889. FUNDING: The National Institute for Health Research Health Technology Assessment programme

    The choice-structuring properties of security consumption: An exploratory study of security consumption culture within small shops

    Full text link
    Using Manunta’s and Manunta’s (2006) theory of the security process and the concept of choice structuring properties as heuristic devices, this paper develops a conceptual framework designed to aid our understanding of the factors that drive security consumption within the context of small shops. The conceptual framework is developed through a number of exploratory interviews with the owners of convenience stores. These suggest a security consumption culture exists that is generated by a desire to protect businesses from crime threats and a sense of isolation from local criminal justice agencies. A self-protection mentality and functional form of worry is observed that creates demand for security, but decisions to purchase specific security objects are dictated by choice structuring properties focused around subjective anxieties about crime events, the extent security devices are seen to offer reassurance and financial constraints. Of course, these findings are (at best) tentative but help to set an agenda for further research in this area
    • …
    corecore