Search results

1 – 10 of over 2000
Article
Publication date: 1 March 1997

Gordon Bazemore and Scott Senjo

Examines the extent to which community‐oriented police officers (COP) differ from regular patrol officers in their view of their role in the response to juveniles and in style and…

1773

Abstract

Examines the extent to which community‐oriented police officers (COP) differ from regular patrol officers in their view of their role in the response to juveniles and in style and intensity of interaction. Based on qualitative field research in a densely populated Southeastern city, initial findings suggest that while COPs devote equal attention to traditional police functions (e.g. law enforcement), they adopt different styles of carrying out these functions (e.g. proactive problem solving). In addition, COP officers more routinely practice juvenile crime prevention, monitoring and diversion and clearly articulate these functions as core components of their role orientation. Questions for future research include the extent to which the new more intimate relationship between police and juveniles in COP areas will increase arrests or promote diversion, whether increased discretion will result in increased harassment or improved informal dispute resolution, and whether officers practicing effective diversion and advocacy will be encouraged to continue or see their efforts undercut by competing departmental priorities or by bureaucratic policies that increase formal processing.

Details

Policing: An International Journal of Police Strategies & Management, vol. 20 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 1 February 1981

Frances Hendrix and Stephen Wilson

Preston Polytechnic Library and Learning Resources Service—a member of BLCMP—has developed and now uses a PRECIS‐related subject index produced locally in co‐operation with the…

Abstract

Preston Polytechnic Library and Learning Resources Service—a member of BLCMP—has developed and now uses a PRECIS‐related subject index produced locally in co‐operation with the Polytechnic Computer Services Unit. An in‐house PRECIS system has the advantages of consistency, British terminology and frequent up‐dating. It facilitates reproduction for multiple service sites. The article describes system hardware and software and outlines production routines. A Working Party has been established to review future developments, especially frequency and physical form. The possibility of a local online configuration is discussed.

Details

Program, vol. 15 no. 2
Type: Research Article
ISSN: 0033-0337

Content available
Article
Publication date: 30 January 2007

55

Abstract

Details

Sensor Review, vol. 27 no. 1
Type: Research Article
ISSN: 0260-2288

Article
Publication date: 2 November 2012

Wayne Wilson

The purpose of this paper is to review the acquisition of the Mark H. McCormack Collection by the University of Massachusetts, McCormack's role in marketing history and the…

1317

Abstract

Purpose

The purpose of this paper is to review the acquisition of the Mark H. McCormack Collection by the University of Massachusetts, McCormack's role in marketing history and the significance of the collection to researchers.

Design/methodology/approach

The study is based on an examination of selected documents in the collection and interviews with University of Massachusetts archivists.

Findings

The McCormack Collection contains eight million pages documenting the history of IMG, McCormack's groundbreaking marketing and management company. Most documents cover the period 1960‐2000. IMG, which began as a golf company, became a key player in the marriage of sport and television, as well as the commercialization and globalization of sport and celebrity culture. The University Archives staff plan to make the collection a dynamic multidisciplinary research tool. The collection will be valuable to students of marketing, sport and other forms of popular culture. The availability of archival resources affects what topics researchers pursue. The McCormack Collection will make it possible to investigate a wide range of new topics and personalities.

Research limitations/implications

The paper was written before University of Massachusetts had fully developed its collection access policies or plans for digitizing the collection.

Originality/value

This paper alerts scholars to a major new research resource.

Details

Journal of Historical Research in Marketing, vol. 4 no. 4
Type: Research Article
ISSN: 1755-750X

Keywords

Article
Publication date: 1 December 1997

Stephen Wilson

Suggests that for electronic commerce to thrive among parties who have never met each other, trust must become a commodity item. Certification authorities (CAs) are the standard…

3267

Abstract

Suggests that for electronic commerce to thrive among parties who have never met each other, trust must become a commodity item. Certification authorities (CAs) are the standard mechanism by which online entities can identify one another. The policies and practices followed by a CA are just as important as the basic security of the electronic commerce network. This recognition is now standard, and “trust models” are emerging wherein diverse online business partners can trust one another, through the mutual recognition of their respective CAs. Overviews security and trust in electronic commerce. Discusses the role of certificates, with particular reference to the Australian Public Key Authentication Framework. Presents a vision for electronic commerce, premissed on electronic trust as a commodity.

Details

Information Management & Computer Security, vol. 5 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 December 1998

Stephen Wilson

The “web of trust” is one approach to the problem of trusted exchange of public keys in a public key security system. In a web of trust, individuals accept the bulk of the…

725

Abstract

The “web of trust” is one approach to the problem of trusted exchange of public keys in a public key security system. In a web of trust, individuals accept the bulk of the responsibility for identifying and authenticating each other and subsequently swapping their keys. This trust model is supported by some commercial products and some industry standards. The main alternative is the Public Key Infrastructure (PKI) where key holders are identified and authenticated by third‐party Certification Authorities (CAs). Rather than personally swapping keys, participants in a PKI obtain one another’s public keys from one or more CAs in the form of digital certificates. These two trust models have, for some time, been vying for selection internationally in both policy and commercial forums. In Australia, the debate has been spurred on by recent deliberations over the possible form of a national peak authentication body, and by spirited discussion of the privacy impacts of a national hierarchy. There appears to be a view emerging that a web of trust might be easier to constitute than a hierarchy and that it may be inherently less intrusive. On closer inspection, however, these promises prove to be unfounded. This paper discusses certain limitations of any web of trust model, with particular reference to scalability, uniform standards of identification, auditability, and the protection of personal identification data.

Details

Information Management & Computer Security, vol. 6 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 3 September 2012

Stephen Wilson

During the latter part of the twentieth century, mental hospitals, originally built to provide asylum from the excesses of “community care” in the 1800s, began to be perceived as…

Abstract

Purpose

During the latter part of the twentieth century, mental hospitals, originally built to provide asylum from the excesses of “community care” in the 1800s, began to be perceived as themselves damaging. Therapeutic communities within traditional hospitals offered a hopeful alternative. This paper aims to provide a succinct historical critique of the developments.

Design/methodology/approach

Narrative and historical review.

Findings

Attempts at reform met with varying degrees of success. Some communities closed down in the wake of public scandals while others were eminently successful. Organisational change presented social and psychological threats which were difficult to overcome. Leadership was an important factor in determining the outcome.

Originality/value

This paper gives an insight into the social‐psychiatric approaches and organisational theories of the time. It is published in the belief that many of the themes remain relevant today.

Details

Therapeutic Communities: The International Journal of Therapeutic Communities, vol. 33 no. 1
Type: Research Article
ISSN: 0964-1866

Keywords

Article
Publication date: 1 May 1999

Stephen Wilson

While the business world has been moving inexorably online ever since the PC appeared, documentation itself has remained paper based for the most part. Paper of course has several…

1363

Abstract

While the business world has been moving inexorably online ever since the PC appeared, documentation itself has remained paper based for the most part. Paper of course has several major advantages including its longevity and robustness, its legal traditions, and its ability to be signed. But now the reach and speed of the Internet plus the sheer volume of business documentation is creating irresistible demand for entirely electronic documents and processes. Why should you have to wait for a hard copy to arrive by courier when you can get an e‐mail instantaneously? And why should you have to re‐key faxes, especially when the original almost certainly started out as a soft copy somewhere? Recent digital signature technology and associated legal analysis mean that contracts can be reliably formed online, and that purely electronic evidence can be treated the same as paper, for all legal and accounting purposes. This paper explains how digital signatures are used and online information authenticated, and paints a picture of the future documentation environment, utilising trusted electronic credentials for lawyers, doctors, accountants and so on.

Details

Information Management & Computer Security, vol. 7 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 October 1999

Stephen Wilson

Public key infrastructure (PKI) has been discussed for some time but has yet to command much attention from business or policy makers. The benefits of chaining certificate…

Abstract

Public key infrastructure (PKI) has been discussed for some time but has yet to command much attention from business or policy makers. The benefits of chaining certificate authorities (CA) together have not been obvious and confusion has reigned over the proper role of government. But a new PKI model emphasises control and audit, so that certificates may be issued to different user groups under their own rules, with external assurance of fitness for purpose. This type of model is supported by existing standards certification and accreditation processes. No special new authorities are needed and complex cross‐certification protocols are avoided. Other advantages of an accreditation‐based PKI include a non‐government peak authority, an opt‐in, bottom‐up growth path, easily understood business language for all the elements of the PKI, and clarification of the legal liability of all CAs, in particular the peak authority.

Details

Information Management & Computer Security, vol. 7 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Content available
Article
Publication date: 1 October 2001

Richard Turner

177

Abstract

Details

New Library World, vol. 102 no. 9
Type: Research Article
ISSN: 0307-4803

1 – 10 of over 2000