Search results

1 – 10 of over 6000

Abstract

Details

Gender and the Violence(s) of War and Armed Conflict: More Dangerous to Be a Woman?
Type: Book
ISBN: 978-1-78769-115-5

Book part
Publication date: 8 July 2010

Peter Hall and Robert Wylie

Purpose – To examine the implications of arms export controls on the international spread of weapons production and innovation.Methodology/approach – The chapter analyses…

Abstract

Purpose – To examine the implications of arms export controls on the international spread of weapons production and innovation.

Methodology/approach – The chapter analyses predicted responses to arms export controls, drawing on existing literature. It considers incentives to potential buyer countries to develop their own substitutes and a case study of Australia's response to US denial of access to electronic warfare self-protection (EWSP) technology for fighter aircraft.

Findings – Spurred by the US denial of access to relevant EWSP, Australia devoted many years to developing a homegrown substitute. Although Australia achieved some success, the United States ultimately granted Australia access to the technology. Australia then abandoned research, design and development (RD&D) on EWSP for fast jets in 2009. Cause and effect remain a matter of debate.

Research limitations/implications – Insight into the real-world value of the theory is limited by the use of a single case study. Such cases supported by publicly available information are, however, scarce. Countries seeking to circumvent export controls must expect to incur high costs and uncertain outcomes.

Practical implications – Policy-makers should be wary about committing large budgets in developing substitutes for new technologies denied them through export controls. Such efforts may, however, offer the possibility of putting suppliers under pressure unavailable from other actions.

Social implications – Arms export controls designed to limit proliferation of weapons create incentives for states to develop their capabilities for new arms production and to develop new weapons-related knowledge.

Originality/value of the chapter – This chapter provides a new case study which illustrates an innovative approach to arms export control analysis.

Details

Economics of War and Peace: Economic, Legal, and Political Perspectives
Type: Book
ISBN: 978-0-85724-004-0

Article
Publication date: 14 March 2016

Charlotte Wegener and Marie Kirstejn Aakjær

– The purpose of this paper is to propose a model and some practical considerations for breakdown-driven organizational research.

Abstract

Purpose

The purpose of this paper is to propose a model and some practical considerations for breakdown-driven organizational research.

Design/methodology/approach

The analysis is based on a two-case narrative from two studies of innovation in public welfare organizations. Inspired by Dewey’s pragmatic philosophy, the paper abductively builds a model for reflective practice when research plans break down.

Findings

A breakdown-driven approach to organizational research can open up to new insights about both the empirical field and organizational research methodology. In the present paper, breakdowns serve as pivotal points for reflective practice that not only offer new perspectives on innovation, but also the paper makes use of innovation theory to inform research methodology.

Originality/value

This paper advocates more narrative self-reflecting research that reveals processes of confusion and uncertainty. These narratives are worth sharing as research in its own right as they hold the power to intensify the researcher’s perceptual and reflective skills.

Details

Qualitative Research in Organizations and Management: An International Journal, vol. 11 no. 1
Type: Research Article
ISSN: 1746-5648

Keywords

Book part
Publication date: 6 May 2003

Mary Jane Rootes

Robert Hauptman first raised awareness about the ethical issues of reference service in 1976. Hauptman, a library school student at the time, did a study on the culpability, or…

Abstract

Robert Hauptman first raised awareness about the ethical issues of reference service in 1976. Hauptman, a library school student at the time, did a study on the culpability, or lack thereof, in reference service provided by librarians. In his study, Hauptman posed as a library patron seeking potentially dangerous information. The behavior examined was how librarians respond to the request for material on how to build a bomb that would be powerful enough to blow up a house. Hauptman tried to present himself as a person of questionable character. He used six public and seven academic libraries in this study. Hauptman first made sure that he was speaking to the reference librarian. He then requested information for the construction of a small explosive, requesting specifically the chemical properties of cordite. He then asked for information on the potency of such an explosive, whether or not it could blow up a suburban house (Hauptman, Wilson Library Bulletin, 1976, p. 626).

Details

Advances in Library Administration and Organization
Type: Book
ISBN: 978-1-84950-206-1

Book part
Publication date: 26 January 2011

Jonathan Fox and Libby Haight

The experience of Mexico's 2002 transparency reform sheds light on the challenge of translating the promise of legal reform into more open government in practice. An innovative…

Abstract

The experience of Mexico's 2002 transparency reform sheds light on the challenge of translating the promise of legal reform into more open government in practice. An innovative new agency that serves as an interface between citizens and the executive branch of government has demonstrated an uneven but significant capacity to encourage institutional responsiveness. A “culture of transparency” is emerging in both state and society, although the contribution of Mexico's transparency discourse and law to public accountability remains uncertain and contested.

Details

Government Secrecy
Type: Book
ISBN: 978-0-85724-390-4

Keywords

Article
Publication date: 6 May 2014

Deniz Aslan, Robert Edelmann, Diane Bray and Marcia Worrell

The relationship between accessing indecent images online and the perpetration of contact child sex offences remains unclear. The purpose of this paper is to provide a better…

Abstract

Purpose

The relationship between accessing indecent images online and the perpetration of contact child sex offences remains unclear. The purpose of this paper is to provide a better understanding of the offence process of offenders who have both such convictions.

Design/methodology/approach

A total of eight semi-structured interviews were conducted with older adult males who had downloaded indecent images and also had a history of contact sex offences against children. Data analysis involved thematic coding based on guidelines suggested by Braun and Clarke (2006).

Findings

Themes which emerged suggest some similarities (offence process behaviours), but also some differences (developmental factors) between the eight offenders. Data relevant to developmental factors formed two primary themes: childhood attachment difficulties and experiences of childhood abuse, both of which appeared to influence the offence process. Escalating factors generated a further three themes: adult relationships, personality problems and substance use. Five main categories also emerged with regard to offence behaviours: sexually deviant interests, lack of self-control, opportunity, the role of the internet (availability, easy access and anonymity), and cognitive distortions (justifications: interest in challenge and sexual frustration; denial: accidental access and denial of a victim, normalisation; blame: blame on the victim, new technologies and authorities and blame on other factors; and minimisation).

Practical implications

A better understanding of the offence process would inform clinical practice with such offenders and aid in the process of prevention.

Originality/value

This is the first research to date which explores the rationale provided for their behaviour by those convicted of both internet and contact child sex offences.

Details

Journal of Forensic Practice, vol. 16 no. 2
Type: Research Article
ISSN: 2050-8794

Keywords

Article
Publication date: 2 November 2015

Nancy Ambritta P, Poonam N. Railkar and Parikshit N. Mahalle

This paper aims at providing a comparative analysis of the existing protocols that address the security issues in the Future Internet (FI) and also to introduce a Collaborative…

196

Abstract

Purpose

This paper aims at providing a comparative analysis of the existing protocols that address the security issues in the Future Internet (FI) and also to introduce a Collaborative Mutual Identity Establishment (CMIE) scheme which adopts the elliptical curve cryptography (ECC), to address the issues, such as content integrity, mutual authentication, forward secrecy, auditability and resistance to attacks such as denial-of-service (DoS) and replay attack.

Design/methodology/approach

This paper provides a comparative analysis of the existing protocols that address the security issues in the FI and also provides a CMIE scheme, by adopting the ECC and digital signature verification mechanism, to address the issues, such as content integrity, mutual authentication, forward secrecy, auditability and resistance to attacks such as DoS and replay attack. The proposed scheme enables the establishment of secured interactions between devices and entities of the FI. Further, the algorithm is evaluated against Automated Validation of Internet Security Protocols and Application (AVISPA) tool to verify the security solutions that the CMIE scheme has claimed to address to have been effectively achieved in reality.

Findings

The algorithm is evaluated against AVISPA tool to verify the security solutions that the CMIE scheme has claimed to address and proved to have been effectively achieved in reality. The proposed scheme enables the establishment of secured interactions between devices and entities of the FI.

Research limitations/implications

Considering the Internet of Things (IoT) scenario, another important aspect that is the device-to-location (D2L) aspect has not been considered in this protocol. Major focus of the protocol is centered around the device-to-device (D2D) and device-to-server (D2S) scenarios. Also, IoT basically works upon a confluence of hundreds for protocols that support the achievement of various factors in the IoT, for example Data Distribution Service, Message Queue Telemetry Transport, Extensible Messaging and Presence Protocol, Constrained Application Protocol (CoAP) and so on. Interoperability of the proposed CMIE algorithm with the existing protocols has to be considered to establish a complete model that fits the FI. Further, each request for mutual authentication requires a querying of the database and a computation at each of the participating entities side for verification which could take considerable amount of time. However, for applications that require firm authentication for maintaining and ensuring secure interactions between entities prior to access control and initiation of actual transfer of sensitive information, the negligible difference in computation time can be ignored for the greater benefit that comes with stronger security. Other factors such as quality of service (QoS) (i.e. flexibility of data delivery, resource usage and timing), key management and distribution also need to be considered. However, the user still has the responsibility to choose the required protocol that suits one’s application and serves the purpose.

Originality/value

The originality of the work lies in adopting the ECC and digital signature verification mechanism to develop a new scheme that ensures mutual authentication between participating entities in the FI based upon certain user information such as identities. ECC provides efficiency in terms of key size generated and security against main-in-middle attack. The proposed scheme provides secured interactions between devices/entities in the FI.

Details

International Journal of Pervasive Computing and Communications, vol. 11 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 11 July 2022

Harrison Kwame Golo

This paper aims to identify human rights violations of patients during the early periods of the COVID-19 pandemic in Ghana by investigating the experiences of people on how…

Abstract

Purpose

This paper aims to identify human rights violations of patients during the early periods of the COVID-19 pandemic in Ghana by investigating the experiences of people on how health-care professionals discharged their responsibilities during the time in question.

Design/methodology/approach

Explanatory design of the mixed methods approach was adopted, with the intention of collecting both quantitative and qualitative data sequentially, and then integrating the results at the interpretation stage. The approach enriched the quality of data collected as it offered the advantage of shedding light on the primary motivations and reasons for attitudes and behaviours and helped to provide an in-depth understanding of how individuals interpret the happenings around them and their experiences. Thus, although some amount of quantitative method was used in the data collection, the core of this paper is based on the qualitative interpretations.

Findings

The study reveals that health-care professionals, especially those in the Tema Metropolis, undermined certain fundamental human rights of patients during the early period of the COVID-19 pandemic. This includes failure to provide information to patients about treatment options and potential risks of medications; failure to seek the informed consent of patients before performing medical procedures; denial of access to medical files of patients for transfer; and inability or failure to provide medical ambulances services to patients on time.

Originality/value

Although many publications on human rights dimensions and health protective issues on COVID-19 pandemic are available on a global scale, still little information pertaining to experiences of individuals with health-care professionals during the early days of the COVID-19 pandemic, especially in Ghana through the lens of patient’s rights exists. This paper, therefore, fills an important gap in health-care management information, critical for policy decision-making processes regarding patient’s rights in times of pandemic control.

Details

International Journal of Human Rights in Healthcare, vol. 16 no. 5
Type: Research Article
ISSN: 2056-4902

Keywords

Book part
Publication date: 27 March 2006

Aslı Ü Bâli

This paper argues that the nation's immigration laws are being misused to craft a system of preventive administrative detention of immigrant men, predominantly of Middle Eastern…

Abstract

This paper argues that the nation's immigration laws are being misused to craft a system of preventive administrative detention of immigrant men, predominantly of Middle Eastern background. These detentions give rise to imprisonment without charge for weeks and months, denial of access to lawyers, physical and psychological abuse and ultimately deportations without a fair initial hearing or the exhaustion of available appellate recourse. I argue that this expanded use of civil immigration detention is designed to weaken constitutional due process protections, bringing into the U.S. detention tactics adopted abroad under the rubric of the war on terror. This paper also highlights similarities between the evolving administrative detention system in the United States and longer-standing practices in Israel.

Details

Studies in Law, Politics and Society
Type: Book
ISBN: 978-1-84950-387-7

Article
Publication date: 8 January 2019

Theophilus Azungah

Despite the crucial role of gaining access for successful research in social and management studies, very little has been written on issues and challenges associated with gaining…

Abstract

Purpose

Despite the crucial role of gaining access for successful research in social and management studies, very little has been written on issues and challenges associated with gaining access particularly in an undeveloped research context such as Ghana. The purpose of this paper is to share the experience with other researchers and practitioners for them to recognise the common challenges associated with gaining access to research sites and the significance of critical reflection and reflexivity on how a researcher’s positionality affects knowledge production. The paper emphasises the need for researchers to appreciate the taken-for-granted interactions that can contribute to critical thinking about identities and reflexivity in research. The paper adds to the paucity of voices particularly overseas students and researchers returning home (to country of origin) from Euro-American institutions to carry out field research.

Design/methodology/approach

The paper draws on the field notes relating to the PhD fieldwork experiences in accessing subsidiaries of western multinational enterprises in Ghana. The author discussed how gatekeepers hindered access to key organisational members and the need to identify helpful networks through snowballing in order to access organisations and participants.

Findings

Considerable challenges such as denial of access, physical and psychological distress were encountered in the process of accessing organisations which often led to abandoning certain sites for others, even though those originally chosen were potentially rich sources of information. Also, positionality and the manner in which a researcher is perceived by participants certainly influence the knowledge one produces. Sufficient time is needed to negotiate and build relationships of trust with gatekeepers, which often resulted in delays in data collection. In this present study, gatekeepers often denied, limited or delayed access to potential participants and sites despite institutional ethical approval.

Practical implications

The experiences highlighted in this paper can serve as a toolkit for qualitative researchers interested in conducting research in Ghana with regard to what to expect and how to manoeuvre through in the field.

Originality/value

The paper contributes to the dearth of the methodology literature on issues relating to challenges to access, positionality, insider/outsider status of the researcher and their influences on knowledge production in an under-researched context, Ghana.

Details

Qualitative Research in Organizations and Management: An International Journal, vol. 14 no. 4
Type: Research Article
ISSN: 1746-5648

Keywords

1 – 10 of over 6000