278 research outputs found

    Living well, dying well - the importance of housing

    Get PDF
    David Clark and Sandy Whitelaw outline their vision for a new type of ‘care campus’ that would provide an environment in which older people, ranging from those able to live with complete independence to those with palliative care needs, would become part of the community of the Crichton Campus in dumfries

    Mapping the “housing with care” concept with stakeholders: insights from a UK case study

    Get PDF
    Purpose - The purpose of this paper is to present the findings of an early stage, exploratory case study of a proposed housing with care initiative (the Crichton Care Campus (CCC)). This sought the perspectives of a range of key stakeholders on the proposed model and how it might be best realised. The analyses of these findings show their relevance to debates on integrated housing with care, and reflect on the methodology used and its potential relevance to similar projects. Design/methodology/approach - The study used a transactive planning approach, where grounded views are sought from a variety of stakeholders. A purposive sample identified informants from relevant health, social care and housing organisations and nine semi-structured interviews were conducted. These were transcribed and data analysis was undertaken on an “interactive” basis, relating care theory to empirical expressions. Findings - The authors identify two contrasting orientations – inclusive “community-oriented” and professional “service-oriented”. This distinction provides the basis for a rudimentary conceptual map which can continue to be used in the planning process. Two significant variables within the conceptual map were the extent to which CCC should be intergenerational and as such, the degree to which care should come from formalised and self-care/informal sources. The potential to achieve an integrated approach was high with stakeholders across all sectors fully supporting the CCC concept and agreeing on the need for it to have a mixed tenure basis and include a range of non-care amenities. Originality/value- This paper offers originality in two respects. Methodologically, it describes an attempt to undertake early stage care planning using a needs led transactive methodology. In more practical terms, it also offers an innovative environment for considering any approach to care planning that actively seeks integration – based on an acknowledgement of complexity, a variety of perspectives and possible conflicts. The authors propose that the concepts of “community-orientation” and “service-orientation” are used as a helpful basis for planning negotiations, making implicit divergences explicit and thus better delineated

    Interventions at the end of life – a taxonomy for ‘overlapping consensus’

    Get PDF
    Context: Around the world there is increasing interest in end of life issues. An unprecedented number of people dying in future decades will put new strains on families, communities, services and governments. It will also have implications for representations of death and dying within society and for the overall orientation of health and social care. What interventions are emerging in the face of these challenges? Methods: We conceptualize a comprehensive taxonomy of interventions, defined as ‘organized responses to end of life issues’. Findings: We classify the range of end of life interventions into 10 substantive categories: policy, advocacy, educational, ethico-legal, service, clinical, research, cultural, intangible, self-determined. We distinguish between two empirical aspects of any end of life intervention: the ‘locus’ refers to the space or spaces in which it is situated; the ‘focus’ captures its distinct character and purpose. We also contend that end of life interventions can be seen conceptually in two ways – as ‘frames’ (organized responses that primarily construct a shared understanding of an end of life issue) or as ‘instruments’ (organized responses that assume a shared understanding and then move to act in that context). Conclusions: Our taxonomy opens up the debate about end of life interventions in new ways to provide protagonists, activists, policy makers, clinicians, researchers and educators with a comprehensive framework in which to place their endeavours and more effectively to assess their efficacy. Following the inspiration of political philosopher John Rawls, we seek to foster an ‘overlapping consensus’ on how interventions at the end of life can be construed, understood and assessed

    Lux et Lex: Volume 7, Number 1

    Get PDF
    This issue of Lux et Lex, a publication of the Chester Fritz Library at the University of North Dakota, was published in Spring 2001

    Lux et Lex: Volume 2, Number 2

    Get PDF
    This issue of Lux et Lex, a publication of the Chester Fritz Library at the University of North Dakota, was published in April 1992

    Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet

    Get PDF
    For years, legal wiretapping was straightforward: the officer doing the intercept connected a tape recorder or the like to a single pair of wires. By the 1990s, however, the changing structure of telecommunications—there was no longer just “Ma Bell” to talk to—and new technologies such as ISDN and cellular telephony made executing a wiretap more complicated for law enforcement. Simple technologies would no longer suffice. In response, Congress passed the Communications Assistance for Law Enforcement Act (CALEA) which mandated a standardized lawful intercept interface on all local phone switches. Since its passage, technology has continued to progress, and in the face of new forms of communication—Skype, voice chat during multiplayer online games, instant messaging, etc.—law enforcement is again experiencing problems. The FBI has called this “Going Dark”: their loss of access to suspects’ communication. According to news reports, law enforcement wants changes to the wiretap laws to require a CALEA-like interface in Internet software. CALEA, though, has its own issues: it is complex software specifically intended to create a security hole—eavesdropping capability—in the already-complex environment of a phone switch. It has unfortunately made wiretapping easier for everyone, not just law enforcement. Congress failed to heed experts’ warnings of the danger posed by this mandated vulnerability, and time has proven the experts right. The so-called “Athens Affair,” where someone used the built-in lawful intercept mechanism to listen to the cell phone calls of high Greek officials, including the Prime Minister, is but one example. In an earlier work, we showed why extending CALEA to the Internet would create very serious problems, including the security problems it has visited on the phone system. In this paper, we explore the viability and implications of an alternative method for addressing law enforcements need to access communications: legalized hacking of target devices through existing vulnerabilities in end-user software and platforms. The FBI already uses this approach on a small scale; we expect that its use will increase, especially as centralized wiretapping capabilities become less viable. Relying on vulnerabilities and hacking poses a large set of legal and policy questions, some practical and some normative. Among these are: (1) Will it create disincentives to patching? (2) Will there be a negative effect on innovation? (Lessons from the so-called “Crypto Wars” of the 1990s, and in particular the debate over export controls on cryptography, are instructive here.) (3) Will law enforcement’s participation in vulnerabilities purchasing skew the market? (4) Do local and even state law enforcement agencies have the technical sophistication to develop and use exploits? If not, how should this be handled? A larger FBI role? (5) Should law enforcement even be participating in a market where many of the sellers and other buyers are themselves criminals? (6) What happens if these tools are captured and repurposed by miscreants? (7) Should we sanction otherwise illegal network activity to aid law enforcement? (8) Is the probability of success from such an approach too low for it to be useful? As we will show, these issues are indeed challenging. We regard the issues raised by using vulnerabilities as, on balance, preferable to adding more complexity and insecurity to online systems

    Security Weaknesses in the APCO Project 25 Two-Way Radio System

    Get PDF
    APCO Project 25 (“P25”) is a suite of wireless communications protocols designed for public safety two-way (voice) radio systems. The protocols include security options in which voice and data traffic can be cryptographically protected from eavesdropping. This report analyzes the security of P25 systems against passive and active attacks. We find a number of protocol, implementation, and user interface weaknesses that can leak information to a passive eavesdropper and that facilitate active attacks. In particular, P25 systems are highly susceptible to active traffic analysis attacks, in which radio user locations are surreptitiously determined, and selective jamming attacks, in which an attacker can jam specific kinds of traffic (such as encrypted messages or key management traffic). The P25 protocols make such attacks not only feasible but highly efficient, requiring, for example, significantly less aggregate energy output from a jammer than from the legitimate transmitters

    Idea or Prime Opportunity? A Framework for Evaluating Business Ideas for New and Small Ventures

    Get PDF
     Entrepreneurs and entrepreneurship educators recognize that only a small percentage of venture ideas actually represent viable business opportunities. This paper addresses the important issue of opportunity recognition using a framework designed with a mnemonic structure for easy recall and based on the extant literature on opportunity recognition. The framework prompts users to examine Product/service, Resource, Individual, Market, and Economic start-up issues. Thus, the PRIME analysis is a heuristic designed for initial opportunity evaluation of a business concept prior to preparing a full-blown business plan. We discuss and apply this framework, demonstrating its effectiveness in the classroom and in practice.

    Lux et Lex: Volume 1, Number 2

    Get PDF
    This issue of Lux et Lex, a publication of the Chester Fritz Library at the University of North Dakota, was published in April 1991

    Palliative care in public policy: results from a global survey

    Get PDF
    Background: Public policy has been a foundational component of the World Health Organization public health model for palliative care development since 1990. There is, however, limited evidence on the existence and character of palliative care policy at the country level. Objective: To identify, report on, and map the presence of national palliative care strategies, plans, legislation, and dedicated government resources in 198 countries. Design: An online survey generated 2017 data on indicators of national policy for palliative care. Subjects: In-country experts on palliative care. Measurements: The survey included specific questions on the existence and status of national strategies or plans, recognition of palliative care in national law, and dedicated government support. Results: Fifty-five countries have a national strategy or plan for palliative care of some sort, though levels of implementation vary. Forty-seven countries have some reference to palliative care in national law, and 24 have some form of stand-alone national law on palliative care provision or recognize it as a right in the constitution. Sixty-six countries have a dedicated section within government with responsibility for palliative care. Conclusions: There is a long way to go before palliative care around the world is universally supported by public policy intentions that will support its required development
    • 

    corecore