Search results

1 – 10 of 707
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 1 December 2002

Helen L. Ford, Michael Johnson and Jon Fear

This paper’s objective is to develop a model for the appropriate and equitable use of disease‐modifying treatments in multiple sclerosis. The prevalence and incidence of multiple…

433

Abstract

This paper’s objective is to develop a model for the appropriate and equitable use of disease‐modifying treatments in multiple sclerosis. The prevalence and incidence of multiple sclerosis was established in Leeds. A specialist multiple sclerosis team with two consultant neurologists and a multiple sclerosis support nurse was based at one centre. The team co‐operated with purchasers to develop a model of care. This included a referral protocol, strict prescribing criteria, counselling and education of patients, the use of patient‐centred outcome measures and training and feedback to other neurologists. A total of 217 people with multiple sclerosis were assessed from April 1997 to March 2000. Our experience suggests that a centralised multi‐district clinic developed by close collaboration between clinicians and health purchasers and operating under agreed rules is a feasible and effective model for the managed introduction of new treatments to the NHS.

Details

British Journal of Clinical Governance, vol. 7 no. 4
Type: Research Article
ISSN: 1466-4100

Keywords

Access Restricted. View access options
Book part
Publication date: 19 April 2021

Ian Lawrence

Abstract

Details

The ‘C-Suite’ Executive Leader in Sport: Contemporary Global Challenges for Elite Professionals
Type: Book
ISBN: 978-1-83909-698-3

Access Restricted. View access options
Article
Publication date: 15 October 2020

Ash Watson and Deborah Lupton

The purpose of this paper is to report on the findings from the Digital Privacy Story Completion Project, which investigated Australian participants' understandings of and…

697

Abstract

Purpose

The purpose of this paper is to report on the findings from the Digital Privacy Story Completion Project, which investigated Australian participants' understandings of and responses to digital privacy scenarios using a novel method and theoretical approach.

Design/methodology/approach

The story completion method was brought together with De Certeau's concept of tactics and more-than-human theoretical perspectives. Participants were presented with four story stems on an online platform. Each story stem introduced a fictional character confronted with a digital privacy dilemma. Participants were asked to complete the stories by typing in open text boxes, responding to the prompts “How does the character feel? What does she/he do? What happens next?”. A total of 29 participants completed the stories, resulting in a corpus of 116 narratives for a theory-driven thematic analysis.

Findings

The stories vividly demonstrate the ways in which tactics are entangled with relational connections and affective intensities. They highlight the micropolitical dimensions of human–nonhuman affordances when people are responding to third-party use of their personal information. The stories identified the tactics used and boundaries that are drawn in people's sense-making concerning how they define appropriate and inappropriate use of their data.

Originality/value

This paper demonstrates the value and insights of creatively attending to personal data privacy issues in ways that decentre the autonomous tactical and agential individual and instead consider the more-than-human relationality of privacy.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-05-2020-0174

Access Restricted. View access options
Article
Publication date: 1 February 1993

Robert M. Cleary

Rap music subordinates music to language. It is this emphasis on language that can make rap a vehicle for many ideas, if that is the rapper's intention. Playthell Benjamin, former…

676

Abstract

Rap music subordinates music to language. It is this emphasis on language that can make rap a vehicle for many ideas, if that is the rapper's intention. Playthell Benjamin, former academic and freelance writer for such magazines as the Village Voice and Emerge, believes that rappers can be divided into distinct groups, based on the message or non‐message conveyed. He groups rappers as “Narcissists, didactics, party‐time rappers, or gangsters” based on the content of their rapping. Any rapper who falls into one of these groups can have political significance for blacks, whites, women, liberals, conservatives, Jews, Muslims, and Christians. Narcissists frequently refer to women as mere sex objects, the worst example being the group 2 Live Crew, and less offensive examples being L.L. Cool J. and Big Daddy Kane. Didactics are the chief proponents of Afrocentric thinking and revisionist history. Representatives of this style would be Public Enemy, KRS‐One, and X‐Clan. Party‐time rappers, such as Heavy D and the Boyz or Biz Markie, are rarely serious, but sexism and homophobia can be elements in their raps. Gangster rappers N.W.A., Ice‐T, and Ice Cube are currently receiving a lot of attention from the press, and violent behavior characterizes their lyrics.

Details

Reference Services Review, vol. 21 no. 2
Type: Research Article
ISSN: 0090-7324

Access Restricted. View access options
Article
Publication date: 10 July 2017

Jon S.T. Quah

The purpose of this paper is to explain Singapore’s success in combating corruption and to identify the lessons for policy makers concerned with enhancing the anti-corruption…

1323

Abstract

Purpose

The purpose of this paper is to explain Singapore’s success in combating corruption and to identify the lessons for policy makers concerned with enhancing the anti-corruption measures in their countries.

Design/methodology/approach

The paper provides a brief literature review and analysis of Singapore’s policy context before explaining Singapore’s success in combating corruption and identifying the lessons for policy makers to enhance the effectiveness of the anti-corruption measures in their countries.

Findings

Singapore’s success in combating corruption can be attributed to the political will of the People’s Action Party government and the effectiveness of the Corrupt Practices Investigation Bureau in investigating all corruption cases and enforcing the anti-corruption laws impartially, without fear or favour. Extrapolating from Singapore’s success, policy makers in other countries can learn these lessons: the critical importance of political will; addressing the causes of corruption and learning from past mistakes; establishing and supporting an independent anti-corruption agency with adequate resources; enforcing the anti-corruption laws impartially but not selectively against the government’s political opponents; and combating corruption is a marathon requiring perseverance and sustained effort.

Originality/value

Scholars, policy makers and anti-corruption practitioners will be interested in learning how Singapore has succeeded in combating corruption as well as the relevant lessons for policy makers.

Details

Asian Education and Development Studies, vol. 6 no. 3
Type: Research Article
ISSN: 2046-3162

Keywords

Access Restricted. View access options
Book part
Publication date: 12 June 2023

Nathan Tong and Michael J. Urick

Abstract

Details

Bend the Knee or Seize the Throne: Leadership Lessons from the Seven Kingdoms
Type: Book
ISBN: 978-1-80262-650-6

Access Restricted. View access options
Book part
Publication date: 29 August 2018

Matt Bolton and Frederick Harry Pitts

Abstract

Details

Corbynism: A Critical Approach
Type: Book
ISBN: 978-1-78754-372-0

Access Restricted. View access options
Article
Publication date: 11 September 2017

Jon Randall Lindsay

The empirical record of cyberattacks features much computer crime, espionage and hacktivism, but none of the major damage feared in prevalent threat narratives. The purpose of…

1852

Abstract

Purpose

The empirical record of cyberattacks features much computer crime, espionage and hacktivism, but none of the major damage feared in prevalent threat narratives. The purpose of this article is to explain the absence of serious adverse consequences to date and the durability of this trend.

Design/methodology/approach

This paper combines concepts from international relations theory and new institutional economics to understand cyberspace as a complex global institution with contracts embodied in both software code and human practice. Constitutive inefficiencies (market and regulatory failure) and incomplete contracts (generative features and unintended flaws) create the vulnerabilities that hackers exploit. Cyber conflict is a form of cheating within the rules, rather than an anarchic struggle, more like an intelligence-counterintelligence contest than traditional war.

Findings

Cyber conflict is restrained by the collective sociotechnical constitution of cyberspace, where actors must cooperate to compete. Maintenance of common protocols and open access is a condition for the possibility of attack, and successful deceptive exploitation of these connections becomes more difficult in politically sensitive situations as defense and deterrence become more feasible. The distribution of cyber conflict is, thus, bounded vertically in severity but unbounded horizontally in the potential for creative exploitation.

Originality/value

Cyber conflict can be understood with familiar political economic concepts applied in fresh ways. This application provides counterintuitive insights at odds with prevalent threat narratives about the likelihood and magnitude of cyber conflict. It also highlights the important advantages of strong states over the weaker non-state actors widely thought to be empowered by cyberspace.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Access Restricted. View access options
Book part
Publication date: 11 March 2020

Jon-Arild Johannessen

Abstract

Details

Knowledge Management for Leadership and Communication
Type: Book
ISBN: 978-1-83982-045-8

Access Restricted. View access options
Book part
Publication date: 24 July 2023

Jon Wagner

The concept of a “visual commons” ties together two key dimensions of how people live together: the expression and pursuit of individual and collective interests, and the…

Abstract

The concept of a “visual commons” ties together two key dimensions of how people live together: the expression and pursuit of individual and collective interests, and the expression and development of how residents see and visualize where they live. This concept has helped me think more critically about the relative contributions of cognitive maps, collective perspectives, and symbolic interaction to community studies. It's also been useful in revealing the visual ground against which residents figure the process of becoming neighbors and the disconnects that follow in how residents see where they're living and the natural environments they live within.

Details

Visual and Multimodal Urban Sociology, Part B
Type: Book
ISBN: 978-1-80455-633-7

Keywords

1 – 10 of 707
Per page
102050