899 research outputs found

    The President and the Administration

    Full text link

    Who knows who we are? Questioning DNA analysis in disaster victim identification

    Get PDF
    The use of DNA analysis as a mode of identification of disaster victims has become increasingly predominant to other, traditional, methods of identification in recent years. Scientific advances of the technological processes, high-profile use in identification efforts across the globe (such as after 9/11 or in the Asian Tsunami of 2004), and its inclusion in popular media, have led to its popular adoption as one of the primary modes of identification in disaster scenarios, and to the expectation of its use in all cases by the lay public and media. It is increasingly argued to be integral to post-disaster management. However, depending on the circumstances, location, and type of disaster, this technology may not be appropriate, and its use may instead conflict with socio-political and cultural norms and structures of power. Using examples primarily from Cambodia and Iraq this article will explore what these conflicts may be, and in doing so, question the expanding assumption that DNA analysis is a universally appropriate intervention in disaster victim identification. It will argue instead that its use may be a result of a desire for the political and social capital that this highly prestigious technological intervention offers rather than a solely humanitarian intervention on behalf of survivors and the dead

    Architectures of control in consumer product design

    Get PDF
    Copyright @ 2005 Social Services Research GroupThe idea of architectures of control is introduced through examples ranging from urban planning to digital rights management, and the intentions behind their use in consumer products are examined, with reference to case studies of printer cartridges and proposed 'optimum lifetime products.' The reactions of the technical community and consumers themselves are also explored, along with some wider implications for society

    The architecture of a probation office: a reflection of policy and an impact on practice

    Get PDF
    This article illustrates how the physicality of a probation office can be considered both integral to, and representative of, several important changes in the probation service’s recent history through analysis of research conducted in a probation office. I suggest that the relationship between the ‘protected’ zone of the office and the ‘unprotected’ zone of the waiting area and interview rooms is similar to Goffman’s ‘frontstage’ and ‘backstage’ and expand on his theory of social action by describing how the architecture of probation represents and potentially perpetuates the rise of risk, punishment and managerialism in probation. The article then moves onto the exterior and location of the office to look at how these represent probation’s move away from the communities it serves as well as inadvertently increasing the amount of punishment certain offenders receive. This has significant consequences if the policy of probation moves towards modes of practice which no longer prioritise standardisation and punishment over professional judgment and the importance of the offender-officer relationship and the article concludes by looking to some examples of more inclusive forms of office design and architecture

    Net neutrality discourses: comparing advocacy and regulatory arguments in the United States and the United Kingdom

    Get PDF
    Telecommunications policy issues rarely make news, much less mobilize thousands of people. Yet this has been occurring in the United States around efforts to introduce "Net neutrality" regulation. A similar grassroots mobilization has not developed in the United Kingdom or elsewhere in Europe. We develop a comparative analysis of U.S. and UK Net neutrality debates with an eye toward identifying the arguments for and against regulation, how those arguments differ between the countries, and what the implications of those differences are for the Internet. Drawing on mass media, advocacy, and regulatory discourses, we find that local regulatory precedents as well as cultural factors contribute to both agenda setting and framing of Net neutrality. The differences between national discourses provide a way to understand both the structural differences between regulatory cultures and the substantive differences between policy interpretations, both of which must be reconciled for the Internet to continue to thrive as a global medium

    Net neutrality discourses: comparing advocacy and regulatory arguments in the United States and the United Kingdom

    Get PDF
    Telecommunications policy issues rarely make news, much less mobilize thousands of people. Yet this has been occurring in the United States around efforts to introduce "Net neutrality" regulation. A similar grassroots mobilization has not developed in the United Kingdom or elsewhere in Europe. We develop a comparative analysis of U.S. and UK Net neutrality debates with an eye toward identifying the arguments for and against regulation, how those arguments differ between the countries, and what the implications of those differences are for the Internet. Drawing on mass media, advocacy, and regulatory discourses, we find that local regulatory precedents as well as cultural factors contribute to both agenda setting and framing of Net neutrality. The differences between national discourses provide a way to understand both the structural differences between regulatory cultures and the substantive differences between policy interpretations, both of which must be reconciled for the Internet to continue to thrive as a global medium

    Creating the collective: social media, the Occupy Movement and its constitution as a collective actor

    Get PDF
    This paper examines the process through which Occupy activists came to constitute themselves as a collective actor and the role of social media in this process. The theoretical framework combines Melucci's (1996) theory of collective identity with insights from the field of organizational communication and particularly from the ‘CCO’ strand – short for ‘Communication is Constitutive of Organizing’. This allows us to conceptualize collective identity as an open-ended and dynamic process that is constructed in conversations and codified in texts. Based on interviews with Occupy activists in New York, London and other cities, I then discuss the communication processes through which the movement was drawing the boundaries with its environment, creating codes and foundational documents, as well as speaking in a collective voice. The findings show that social media tended to blur the boundaries between the inside and the outside of the movement in a way that suited its values of inclusiveness and direct participation. Social media users could also follow remotely the meetings of the general assembly where the foundational documents were ratified, but their voices were not included in the process. The presence of the movement on social media also led to conflicts and negotiations around Occupy's collective voice as constructed on these platforms. Thus, viewing the movement as a phenomenon emerging in communication allows us an insight into the efforts of Occupy activists to create a collective that was both inclusive of the 99% and a distinctive actor with its own identity

    Distilling Privacy Requirements for Mobile Applications

    Get PDF
    As mobile computing applications have become commonplace, it is increasingly important for them to address end-users’ privacy requirements. Privacy requirements depend on a number of contextual socio-cultural factors to which mobility adds another level of contextual variation. However, traditional requirements elicitation methods do not sufficiently account for contextual factors and therefore cannot be used effectively to represent and analyse the privacy requirements of mobile end users. On the other hand, methods that do investigate contextual factors tend to produce data that does not lend itself to the process of requirements extraction. To address this problem we have developed a Privacy Requirements Distillation approach that employs a problem analysis framework to extract and refine privacy requirements for mobile applications from raw data gathered through empirical studies involving end users. Our approach introduces privacy facets that capture patterns of privacy concerns which are matched against the raw data. We demonstrate and evaluate our approach using qualitative data from an empirical study of a mobile social networking application

    Probation practice in the information age

    Get PDF
    This article analyses the implications of the greater use of technology and information in probation practice. Using data generated via an ethnography of probation, the article firstly argues that probation in England and Wales now exists in what scholars would identify as ‘the information age’ (i.e. that computers and other technologies work to define and create probation practice as we know it). The article goes on to use actor-network theory to analyse two ‘heterogeneous networks’ to explore the way in which probation practitioners and the technologies they use interact to create particular forms of practice. The article argues that unless we understand the technology that underpins practice we cannot fully understand practice. Finally, the article considers the implications of this analysis for probation post-Transforming Rehabilitation (TR)

    Instagrammatics and digital methods: Studying visual social media, from selfies and GIFs to memes and emoji

    Get PDF
    Visual content is a critical component of everyday social media, on platforms explicitly framed around the visual (Instagram and Vine), on those offering a mix of text and images in myriad forms (Facebook, Twitter, and Tumblr), and in apps and profiles where visual presentation and provision of information are important considerations. However, despite being so prominent in forms such as selfies, looping media, infographics, memes, online videos, and more, sociocultural research into the visual as a central component of online communication has lagged behind the analysis of popular, predominantly text-driven social media. This paper underlines the increasing importance of visual elements to digital, social, and mobile media within everyday life, addressing the significant research gap in methods for tracking, analysing, and understanding visual social media as both image-based and intertextual content.In this paper, we build on our previous methodological considerations of Instagram in isolation to examine further questions, challenges, and benefits of studying visual social media more broadly, including methodological and ethical considerations. Our discussion is intended as a rallying cry and provocation for further research into visual (and textual and mixed) social media content, practices, and cultures, mindful of both the specificities of each form, but also, and importantly, the ongoing dialogues and interrelations between them as communication forms
    • …
    corecore