Search results
1 – 3 of 3Leona Mydlowski, Rhys Turner-Moore and Stephanie Kewley
In England and Wales, adult male registered sex offenders (RSOs) are risk assessed and managed using a tool known as the Active Risk Management System; a risk assessment designed…
Abstract
Purpose
In England and Wales, adult male registered sex offenders (RSOs) are risk assessed and managed using a tool known as the Active Risk Management System; a risk assessment designed specifically for police management of RSOs and carried out by a specialist group of police officers known as Management of Violent or Sexual Offenders (MOSOVO) at the RSO’s home, known as “the home visit”. The purpose of this paper is to explore RSOs views of the home visit and risk assessment and to make recommendations to MOSOVO to improve future home visit & risk assessment practice.
Design/methodology/approach
This study aimed to examine a sample of adult male RSOs’ views of the risk assessment and home visit process. Three police forces in England and Wales agreed to facilitate the sampling of 10 RSOs who varied in their level of risk, namely, low, medium, high and very high.
Findings
Three themes were developed from the analysis: anxiety and shame; perceptions of the first home visit; and the property search and observations. This paper discusses these experiences in light of the growing call for MOSOVOs to both manage risk and assist desistance and present recommendations for improving both the home visit and risk assessment practice.
Originality/value
To the best of the authors’ knowledge, this is the first study to understand and explore RSOs views of the home visit and risk assessment process.
Details
Keywords
Social media (SM) has been heavily criticised in recent years for its damaging effects on societies globally. Tasked with empowering those same societies, libraries’ continued use…
Abstract
Purpose
Social media (SM) has been heavily criticised in recent years for its damaging effects on societies globally. Tasked with empowering those same societies, libraries’ continued use of SM is considered ethically contentious. This study presents the findings of a University of Sheffield study that investigated the ethical tension between libraries and their use of SM by aiming to establish whether: (1) libraries’ use of SM is ethically motivated; (2) ethically informed; (3) and compatible with codes of ethics in the Library and Information Science (LIS) sector.
Design/methodology/approach
A phenomenographic approach was employed to gather and analyse the data for this study, which is drawn from the transcripts of seven online interviews with Bodleian Libraries staff who used Twitter, now X, in a professional capacity.
Findings
Three categories of description were identified among participants: (1) Collectivist conception; (2) Settled conception; (3) Questioning conception. The categories are bound by a shared context of conceptualisation made up of a small set of internal and external influences discussed in the interviews which affected all participants to varying degrees.
Originality/value
The findings were used to support the following determinations: (1) Libraries’ use of SM is ethically motivated. (2) Libraries’ use of SM is ethically informed, in part. Due to lack of evidence, no determination was made about whether libraries’ use of SM is compatible with codes of ethics in the LIS sector. Recommendations for LIS professions and professional bodies are offered based on these determinations.
Details
Keywords
Due to the nonrenewable nature of most geoheritage sites, restoration and reconstruction can be extremely difficult or even impossible. The purpose of this study is to create a…
Abstract
Purpose
Due to the nonrenewable nature of most geoheritage sites, restoration and reconstruction can be extremely difficult or even impossible. The purpose of this study is to create a model for the management of geoheritage conservation and vulnerability.
Design/methodology/approach
To develop the initial research model, two steps were taken. First, a systematic review of previous literature was conducted. Second, experts were asked to provide their input through semistructured and structured questionnaires. The statistical population of the research included experts and researchers in geoheritage. To analyze the data, the methods of meta-synthesis, thematic analysis and contextual analysis panels were used.
Findings
Based on research findings, a model for the management of geoheritage conservation and vulnerability has been developed. This model focuses on two key variables vulnerability and intervention, and it is based on three approaches: value-led conservation, preventive conservation and value-led management. The vulnerability variable has two dimensions: antecedents and drivers, while the intervention variable includes a management process with six dimensions: transparency, inclusion, institutionalization, communication, implementation and efficiency.
Originality/value
The management model for geoheritage conservation and vulnerability suggests that if the level of vulnerability of geological values can be controlled or reduced through management interventions, it is possible to achieve geoheritage conservation in three levels: physical, functional and visual.
目的
由于大多数地质遗迹具有不可再生性, 修复和重建可能极其困难甚至不可能。当前的研究旨在创建地质遗迹保护和脆弱性的管理模型。
设计/方法/方法
为了开发初始研究模型, 采取了两个步骤。首先, 对以前的文献进行了系统回顾。其次, 要求专家通过半结构化和结构化问卷提供意见。研究的统计人群包括地质遗迹专家和研究人员。为了分析数据, 使用了综合综合、主题分析和背景分析小组的方法。
结果
根据研究结果, 开发了地质遗迹保护和脆弱性的管理模型。该模型侧重于两个关键变量:脆弱性和干预, 并基于三种方法:价值主导的保护、预防性保护和价值主导的管理。脆弱性变量有两个维度:前因和驱动因素, 而干预变量包括一个管理过程, 该过程有六个维度:透明度、包容性、制度化、沟通、实施和效率。
原创性/价值
地质遗产保护和脆弱性的管理模型表明, 如果可以通过管理干预来控制或降低地质价值的脆弱性水平, 那么就有可能在物理、功能和视觉三个层面实现地质遗产保护。
Objetivo
Debido a la naturaleza no renovable de la mayoría de los sitios del geopatrimonio, la restauración y reconstrucción pueden ser extremadamente difíciles o incluso imposibles. La presente investigación se llevó a cabo para crear un modelo de gestión de la conservación y la vulnerabilidad del geopatrimonio.
Diseño/metodología/enfoque
Para desarrollar el modelo de investigación inicial, se siguieron dos pasos. En primer lugar, se realizó una revisión sistemática de la bibliografía anterior. En segundo lugar, se solicitó la opinión de expertos mediante cuestionarios semiestructurados y estructurados. La población estadística de la investigación incluía expertos e investigadores en geopatrimonio. Para analizar los datos se utilizaron los métodos de metasíntesis, análisis temático y panel de análisis contextual.
Resultados
A partir de los resultados de la investigación, se ha desarrollado un modelo para la gestión de la conservación y la vulnerabilidad del geopatrimonio. Este modelo se centra en dos variables clave: la vulnerabilidad y la intervención, y se basa en tres enfoques: la conservación basada en el valor, la conservación preventiva y la gestión basada en el valor. La variable de vulnerabilidad tiene dos dimensiones: antecedentes e impulsores, mientras que la variable de intervención incluye un proceso de gestión con seis dimensiones: transparencia, inclusión, institucionalización, comunicación, aplicación y eficacia.
Originalidad/valor
El modelo de gestión de la conservación y la vulnerabilidad del geopatrimonio sugiere que si el nivel de vulnerabilidad de los valores geológicos puede controlarse o reducirse mediante intervenciones de gestión, es posible lograr la conservación del geopatrimonio en tres niveles: físico, funcional y visual.
Details