146 research outputs found

    Security, control and deviance: Mapping the security domain and why it matters

    Get PDF
    Security is one of the foundations on which a stable and cohesive society is built. It is this security that allows citizens to go about their daily lives with freedom and certainty,affording them the ability to make their own choices as to what they do. Yet it may be argued that security is a concept that is misunderstood and perceived in a myriad of ways by the various stratum of society. Since the tragic events of 9 September 2001, security has become a much used and abused term. Law and legislation have been changed and enacted to protectand control the community. Personal rights and freedoms have been given up, wars have been waged and it may be argued by some, police states have emerged out of democracy in the name and pursuit of security. In this period,the global community has witnessed massive growth of global security organisation and the rise and legitimization of its cousin the global private military company. Yet there is remarkably little consensus as to what security is, what constitutes the security domain and just how much freedom should be traded in a free and democratic culture in pursuit of this nebulous concept that is security. The purpose of this paper is to establish a roadmap for domain exploration which focuses attention on the complex and often contradictory nature of security. Notwithstanding scholarly difference and interpretation of the context of security, and the lack of a singularly acceptable definition of security and ignoring the argument that security is so broad as to lack meaning, the authors will assert that security is a legitimate and necessary construct, with specific concerns.This position is framed within the argument that the alternative of non-security(Manunta, 1998) is not acceptable in the context of a civilised world.This paper is presented in four parts, beginning with a discussion of the domain in general. In the second part the concept of security deviance will be discussed before finally proposing a way forward for domain research and discourse.Then, the structural relations, indicating the depth and embedded nature of security in a modern society, will be presented to articulate the opportunities for security deviance in a modern society

    Completion of fit notes by GPs: a mixed methods study

    Get PDF
    Aims: The aim of this study was to investigate the completion of fit notes by UK general practitioners (GPs). A series of actual fit notes issued to employed patients were examined, and their GPs’ reflections and experiences of fit note completion explored. Methods: A mixed-methods design was used. Data were collected from copies of 94 fit notes issued to employed patients by 11 GPs, and from 86 questionnaires completed by these GPs reflecting on the fit notes they had issued. Face-to-face interviews were then conducted with each GP. Results: Fit note completion is not meeting expectations for a number of reasons. These include the following: limited knowledge and awareness of the guidance in fit note completion; problems with the fit note format; lack of mandatory training in completing fit notes; lack of incentive to change practice; incomplete implementation of the electronic fit note; GPs’ lack of confidence in, and doubts about the appropriateness of performing this role. Conclusion: If UK GPs are to continue their contractual responsibility for completing fit notes, further consideration of their education and training needs is urgently required. Weaknesses in the design and format of the fit note and the availability of the electronic version also need to be addressed

    What lies beneath: exploring links between asylum policy and hate crime in the UK

    Get PDF
    This paper explores the link between increasing incidents of hate crime and the asylum policy of successive British governments with its central emphasis on deterrence. The constant problematisation of asylum seekers in the media and political discourse ensures that 'anti-immigrant' prejudice becomes mainstr earned as a common-sense response. The victims are not only the asylum seekers hoping for a better life but democratic society itself with its inherent values of pluralism and tolerance debased and destabilised

    A systematic review and meta-synthesis of the impact of low back pain on people's lives

    Get PDF
    Copyright @ 2014 Froud et al.; licensee BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.Background - Low back pain (LBP) is a common and costly problem that many interpret within a biopsychosocial model. There is renewed concern that core-sets of outcome measures do not capture what is important. To inform debate about the coverage of back pain outcome measure core-sets, and to suggest areas worthy of exploration within healthcare consultations, we have synthesised the qualitative literature on the impact of low back pain on people’s lives. Methods - Two reviewers searched CINAHL, Embase, PsycINFO, PEDro, and Medline, identifying qualitative studies of people’s experiences of non-specific LBP. Abstracted data were thematic coded and synthesised using a meta-ethnographic, and a meta-narrative approach. Results - We included 49 papers describing 42 studies. Patients are concerned with engagement in meaningful activities; but they also want to be believed and have their experiences and identity, as someone ‘doing battle’ with pain, validated. Patients seek diagnosis, treatment, and cure, but also reassurance of the absence of pathology. Some struggle to meet social expectations and obligations. When these are achieved, the credibility of their pain/disability claims can be jeopardised. Others withdraw, fearful of disapproval, or unable or unwilling to accommodate social demands. Patients generally seek to regain their pre-pain levels of health, and physical and emotional stability. After time, this can be perceived to become unrealistic and some adjust their expectations accordingly. Conclusions - The social component of the biopsychosocial model is not well represented in current core-sets of outcome measures. Clinicians should appreciate that the broader impact of low back pain includes social factors; this may be crucial to improving patients’ experiences of health care. Researchers should consider social factors to help develop a portfolio of more relevant outcome measures.Arthritis Research U

    Enabling the classroom and the curriculum: higher education, literary studies and disability

    Get PDF
    In this article the tripartite model of disability is applied to the lived experience of twenty-first-century higher education. The tripartite model facilitates a complex understanding of disability that recognises assumptions and discrimination but not at the cost of valued identity. This being so, not only the normative positivisms and non-normative negativisms but also the non-normative positivisms of the classroom and the curriculum are explored. Inclusion is taken as the starting point and the argument progresses to a profound and innovational appreciation of disability. The problem addressed is that inclusion, as shown in The Biopolitics of Disability, constitutes little more than inclusion-ism until disability is recognised in the context of alternative lives and values that neither enforce nor reify normalcy. Informed by this understanding, the article adopts the disciplinary example of literary studies and refers to Brian Friel’s Molly Sweeney as a primary text. The conclusion is that, despite passive and active resistance, disability enters higher education in many ways, most of which are beneficial to students and educators alike

    Materiality, health informatics and the limits of knowledge production

    Get PDF
    © IFIP International Federation for Information Processing 2014 Contemporary societies increasingly rely on complex and sophisticated information systems for a wide variety of tasks and, ultimately, knowledge about the world in which we live. Those systems are central to the kinds of problems our systems and sub-systems face such as health and medical diagnosis, treatment and care. While health information systems represent a continuously expanding field of knowledge production, we suggest that they carry forward significant limitations, particularly in their claims to represent human beings as living creatures and in their capacity to critically reflect on the social, cultural and political origins of many forms of data ‘representation’. In this paper we take these ideas and explore them in relation to the way we see healthcare information systems currently functioning. We offer some examples from our own experience in healthcare settings to illustrate how unexamined ideas about individuals, groups and social categories of people continue to influence health information systems and practices as well as their resulting knowledge production. We suggest some ideas for better understanding how and why this still happens and look to a future where the reflexivity of healthcare administration, the healthcare professions and the information sciences might better engage with these issues. There is no denying the role of health informatics in contemporary healthcare systems but their capacity to represent people in those datascapes has a long way to go if the categories they use to describe and analyse human beings are to produce meaningful knowledge about the social world and not simply to replicate past ideologies of those same categories

    Beyond the ontological turn: affirming the relative autonomy of politics

    Get PDF
    In this article, I critically evaluate a characteristic tendency that is found across the various traditions of poststructuralism, both narrowly and more broadly defined. This is an increasing propensity to be preoccupied with ontological questions and seemingly at the expense of either a refinement of political concepts or a concrete analysis of forms of power and domination. I consider the reasons for this development and stress how this characteristic feature of poststructuralism appears to follow from the very fact of ontological pluralism. What we see in contemporary continental thought is a proliferation of different traditions, and each side seeks to defend their position in ontological terms. Following this, I advance the idea of a relative autonomy between ontology and politics, where the former does not determine the latter in any direct or straightforward fashion. I argue that we need to stress this relative autonomy to open a little space between ontology and politics, space where we can return poststructuralism to a more concrete engagement with ‘the political’

    Securing the Anthropocene? International Policy Experiments in Digital Hacktivism: A Case Study of Jakarta

    Get PDF
    This article analyses security discourses that are beginning to self-consciously take on board the shift towards the Anthropocene. Firstly, it sets out the developing episteme of the Anthropocene, highlighting the limits of instrumentalist cause-and-effect approaches to security, increasingly becoming displaced by discursive framings of securing as a process, generated through new forms of mediation and agency, capable of grasping inter-relations in a fluid context. This approach is the methodology of hacking: creatively composing and repurposing already existing forms of agency. It elaborates on hacking as a set of experimental practices and imaginaries of securing the Anthropocene, using as a case study the field of digital policy activism with the focus on community empowerment through social-technical assemblages being developed and applied in ‘the City of the Anthropocene’: Jakarta, Indonesia. The article concludes that policy interventions today cannot readily be grasped in modernist frameworks of ‘problem solving’ but should be seen more in terms of evolving and adaptive ‘life hacks’
    corecore