The purpose of this paper is to summarise the current state of empirical knowledge pertaining to online risk and cybercrime relating to people with intellectual disabilities (ID).
Abstract
Purpose
The purpose of this paper is to summarise the current state of empirical knowledge pertaining to online risk and cybercrime relating to people with intellectual disabilities (ID).
Design/methodology/approach
This narrative review summarises, synthesises and critically evaluates the current literature and state of knowledge and offers suggestions for extending current knowledge and practice.
Findings
Evidence regarding risk for people with ID is limited but growing. Existing findings highlight that: risk may increase contingent upon higher levels of sociability, loneliness, anxiety and depression, poorer insight, judgement, discrimination and ability to detect deception online and reduced experience and life opportunities; people without ID perceive high online risk for people with ID, which may lead to gatekeeping restrictions and controlling digital access; restriction may potentially impede online self-determination, participation and development by people with ID; and experience of risk may enhance awareness, independence and resilience in managing future online risk amongst people with ID. Further research work is needed in this area to enhance understanding of risk experience and effective support strategies.
Originality/value
This review of current knowledge has highlighted the necessity for more research to better understand the propensity for engagement in different risky online behaviours and to better inform support practices to help people with ID to manage risk whilst maintaining digital inclusion.
Details
Keywords
Darren David Chadwick and Caroline Wesson
Mental health courts (MHCs) may enable better support for people with intellectual disabilities (ID) within the criminal justice system (CJS) but little evaluative empirical…
Abstract
Purpose
Mental health courts (MHCs) may enable better support for people with intellectual disabilities (ID) within the criminal justice system (CJS) but little evaluative empirical evidence is available regarding their operation. The purpose of this paper is to explore professional perceptions of the challenges of including people with ID in a targeted services court (TSC) designed for people with mental health issues and ID.
Design/methodology/approach
Information was gathered, via interviews and focus groups, from 46 professionals working with people with mental health issues and ID within the TSC. Data were analysed by using thematic network analysis.
Findings
Findings highlight the neglect and lack of inclusion of people with ID within the TSC processes, with challenges in identifying people with ID, stakeholder awareness, inconsistent adapting of practices for people with ID and information transfer underpinned by the involvement of numerous organisations with differing agendas.
Research limitations/implications
Although valued, development of a TSC, including people with ID, was a challenging endeavour and may reflect societal and institutional neglect of people with ID, recommendations are provided.
Originality/value
This study adds to the few investigations that have considered the process of including people with ID in a TSC from the perspective of those working in the CJS.
Details
Keywords
In the last four years, since Volume I of this Bibliography first appeared, there has been an explosion of literature in all the main functional areas of business. This wealth of…
Abstract
In the last four years, since Volume I of this Bibliography first appeared, there has been an explosion of literature in all the main functional areas of business. This wealth of material poses problems for the researcher in management studies — and, of course, for the librarian: uncovering what has been written in any one area is not an easy task. This volume aims to help the librarian and the researcher overcome some of the immediate problems of identification of material. It is an annotated bibliography of management, drawing on the wide variety of literature produced by MCB University Press. Over the last four years, MCB University Press has produced an extensive range of books and serial publications covering most of the established and many of the developing areas of management. This volume, in conjunction with Volume I, provides a guide to all the material published so far.
Details
Keywords
Those who are concerned with introducing employee participation into British industry deserve our heartfelt sympathy. It must be like trying to photograph a group of five‐year‐old…
Abstract
Those who are concerned with introducing employee participation into British industry deserve our heartfelt sympathy. It must be like trying to photograph a group of five‐year‐old children whilst crossing a minefield—the subject will never sit still and one toe in the wrong place will cause an explosion. Prospects of legislation on industrial democracy seem to come and go; trade union and employers attitudes appear to fluctuate; new vogues are introduced and vanish without trace. And if this were not enough, everyone seems to be ready to give advice—much of it contradictory. The scene is tangled and confused.
U.M. Mbanaso, G.S. Cooper, David Chadwick and Anne Anderson
This paper aims to describe a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions. The authors introduce the…
Abstract
Purpose
This paper aims to describe a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions. The authors introduce the concept of the obligation of trust (OoT) protocol as a privacy assurance and authorization mechanism that is built upon the XACML standard. The OoT allows two communicating parties to dynamically exchange their privacy and authorization requirements and capabilities, which the authors term a notification of obligation (NoB), as well as their commitments to fulfilling each other's requirements, which the authors term signed acceptance of obligations (SAO). The authors seek to describe some applicability of these concepts and to show how they can be integrated into distributed authorization systems for stricter privacy and confidentiality control.
Design/methodology/approach
Existing access control and privacy protection systems are typically unilateral and provider‐centric, in that the enterprise service provider assigns the access rights, makes the access control decisions, and determines the privacy policy. There is no negotiation between the client and the service provider about which access control or privacy policy to use. The authors adopt a symmetric, more user‐centric approach to privacy protection and authorization, which treats the client and service provider as peers, in which both can stipulate their requirements and capabilities, and hence negotiate terms which are equally acceptable to both parties.
Findings
The authors demonstrate how the obligation of trust protocol can be used in a number of different scenarios to improve upon the mechanisms that are currently available today.
Practical implications
This approach will serve to increase trust in distributed transactions since each communicating party receives a difficult to repudiate digitally signed acceptance of obligations, in a standard language (XACML), which can be automatically enforced by their respective computing machinery.
Originality/value
The paper adds to current research in trust negotiation, privacy protection and authorization by combining all three together into one set of standardized protocols. Furthermore, by providing hard to repudiate signed acceptance of obligations messages, this strengthens the legal case of the injured party should a dispute arise.
Details
Keywords
AT the very outset of this paper it is necessary to make clear that it is not an attempt to compile an exhaustive bibliography of literature relating to special librarianship…
Abstract
AT the very outset of this paper it is necessary to make clear that it is not an attempt to compile an exhaustive bibliography of literature relating to special librarianship. Neither space nor time permit this. In fact, the references given can only claim to be a sample of the wealth of material on the subject and this paper is submitted in the hope that it will stimulate others to more scholarly efforts. Reference numbers throughout this paper refer to items in the ‘Select list of references to the literature of special librarianship’, section 2 onwards.
The Aslib Microfilm Service (AMS) was set up in April 1942, as a document delivery service, unique in its time and vital in importance. Its purpose was to make available in…
Abstract
The Aslib Microfilm Service (AMS) was set up in April 1942, as a document delivery service, unique in its time and vital in importance. Its purpose was to make available in microfilm, or enlargements from microfilm, those journals reaching the UK from enemy and enemy‐occupied countries, which would otherwise be inaccessible to the majority of research workers. It performed this function until December 1945. In September 1982, the collection of microfilm negatives was transferred to the British Library Lending Division (BLLD), so it seemed appropriate to note this with a brief summary article about the Service. This article is based on the review of AMS published in Journal of Documentation in 1946
Lynda L. Moore and Bonita L. Betters-Reed
This case is about Kija Kim, a Korean born founder and CEO of Harvard Design and Mapping Inc. (HDM). Founded in 1988, HDM is a cutting-edge GIS firm with $5 million in revenue and…
Abstract
This case is about Kija Kim, a Korean born founder and CEO of Harvard Design and Mapping Inc. (HDM). Founded in 1988, HDM is a cutting-edge GIS firm with $5 million in revenue and 35 employees in their Cambridge, MA and Washington D.C. offices. Through Kija Kim's leadership, HDM has become a significant niche player in homeland security and disaster relief. The case ends in fall 2005 just after HDM provided Hurricane Katrina mapping support, and Kija is nominated for the SBA Small Business Person of the Year. This case explores the intersection between cultural heritage, leadership effectiveness and organizational behavior. It particularly notes Kija's ability to turn her immigrant female minority status into a business advantage. This strength coupled with her ethos of care and ability to network in all walks of her life contributes to her distinctive and integrated leadership style. Definitions of leadership success and implications for decision making are also highlighted.
In 1941, with the help of the Royal Society and with funds provided by the Rockefeller Foundation, Aslib made a survey of the deficiencies in the supply to libraries in Great…
Abstract
In 1941, with the help of the Royal Society and with funds provided by the Rockefeller Foundation, Aslib made a survey of the deficiencies in the supply to libraries in Great Britain of current scientific and technical periodicals from enemy and enemy‐controlled countries.