Helen L. Ford, Michael Johnson and Jon Fear
This paper’s objective is to develop a model for the appropriate and equitable use of disease‐modifying treatments in multiple sclerosis. The prevalence and incidence of multiple…
Abstract
This paper’s objective is to develop a model for the appropriate and equitable use of disease‐modifying treatments in multiple sclerosis. The prevalence and incidence of multiple sclerosis was established in Leeds. A specialist multiple sclerosis team with two consultant neurologists and a multiple sclerosis support nurse was based at one centre. The team co‐operated with purchasers to develop a model of care. This included a referral protocol, strict prescribing criteria, counselling and education of patients, the use of patient‐centred outcome measures and training and feedback to other neurologists. A total of 217 people with multiple sclerosis were assessed from April 1997 to March 2000. Our experience suggests that a centralised multi‐district clinic developed by close collaboration between clinicians and health purchasers and operating under agreed rules is a feasible and effective model for the managed introduction of new treatments to the NHS.
Details
Keywords
The purpose of this paper is to report on the findings from the Digital Privacy Story Completion Project, which investigated Australian participants' understandings of and…
Abstract
Purpose
The purpose of this paper is to report on the findings from the Digital Privacy Story Completion Project, which investigated Australian participants' understandings of and responses to digital privacy scenarios using a novel method and theoretical approach.
Design/methodology/approach
The story completion method was brought together with De Certeau's concept of tactics and more-than-human theoretical perspectives. Participants were presented with four story stems on an online platform. Each story stem introduced a fictional character confronted with a digital privacy dilemma. Participants were asked to complete the stories by typing in open text boxes, responding to the prompts “How does the character feel? What does she/he do? What happens next?”. A total of 29 participants completed the stories, resulting in a corpus of 116 narratives for a theory-driven thematic analysis.
Findings
The stories vividly demonstrate the ways in which tactics are entangled with relational connections and affective intensities. They highlight the micropolitical dimensions of human–nonhuman affordances when people are responding to third-party use of their personal information. The stories identified the tactics used and boundaries that are drawn in people's sense-making concerning how they define appropriate and inappropriate use of their data.
Originality/value
This paper demonstrates the value and insights of creatively attending to personal data privacy issues in ways that decentre the autonomous tactical and agential individual and instead consider the more-than-human relationality of privacy.
Peer review
The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-05-2020-0174
Details
Keywords
Rap music subordinates music to language. It is this emphasis on language that can make rap a vehicle for many ideas, if that is the rapper's intention. Playthell Benjamin, former…
Abstract
Rap music subordinates music to language. It is this emphasis on language that can make rap a vehicle for many ideas, if that is the rapper's intention. Playthell Benjamin, former academic and freelance writer for such magazines as the Village Voice and Emerge, believes that rappers can be divided into distinct groups, based on the message or non‐message conveyed. He groups rappers as “Narcissists, didactics, party‐time rappers, or gangsters” based on the content of their rapping. Any rapper who falls into one of these groups can have political significance for blacks, whites, women, liberals, conservatives, Jews, Muslims, and Christians. Narcissists frequently refer to women as mere sex objects, the worst example being the group 2 Live Crew, and less offensive examples being L.L. Cool J. and Big Daddy Kane. Didactics are the chief proponents of Afrocentric thinking and revisionist history. Representatives of this style would be Public Enemy, KRS‐One, and X‐Clan. Party‐time rappers, such as Heavy D and the Boyz or Biz Markie, are rarely serious, but sexism and homophobia can be elements in their raps. Gangster rappers N.W.A., Ice‐T, and Ice Cube are currently receiving a lot of attention from the press, and violent behavior characterizes their lyrics.
The purpose of this paper is to explain Singapore’s success in combating corruption and to identify the lessons for policy makers concerned with enhancing the anti-corruption…
Abstract
Purpose
The purpose of this paper is to explain Singapore’s success in combating corruption and to identify the lessons for policy makers concerned with enhancing the anti-corruption measures in their countries.
Design/methodology/approach
The paper provides a brief literature review and analysis of Singapore’s policy context before explaining Singapore’s success in combating corruption and identifying the lessons for policy makers to enhance the effectiveness of the anti-corruption measures in their countries.
Findings
Singapore’s success in combating corruption can be attributed to the political will of the People’s Action Party government and the effectiveness of the Corrupt Practices Investigation Bureau in investigating all corruption cases and enforcing the anti-corruption laws impartially, without fear or favour. Extrapolating from Singapore’s success, policy makers in other countries can learn these lessons: the critical importance of political will; addressing the causes of corruption and learning from past mistakes; establishing and supporting an independent anti-corruption agency with adequate resources; enforcing the anti-corruption laws impartially but not selectively against the government’s political opponents; and combating corruption is a marathon requiring perseverance and sustained effort.
Originality/value
Scholars, policy makers and anti-corruption practitioners will be interested in learning how Singapore has succeeded in combating corruption as well as the relevant lessons for policy makers.
Details
Keywords
The empirical record of cyberattacks features much computer crime, espionage and hacktivism, but none of the major damage feared in prevalent threat narratives. The purpose of…
Abstract
Purpose
The empirical record of cyberattacks features much computer crime, espionage and hacktivism, but none of the major damage feared in prevalent threat narratives. The purpose of this article is to explain the absence of serious adverse consequences to date and the durability of this trend.
Design/methodology/approach
This paper combines concepts from international relations theory and new institutional economics to understand cyberspace as a complex global institution with contracts embodied in both software code and human practice. Constitutive inefficiencies (market and regulatory failure) and incomplete contracts (generative features and unintended flaws) create the vulnerabilities that hackers exploit. Cyber conflict is a form of cheating within the rules, rather than an anarchic struggle, more like an intelligence-counterintelligence contest than traditional war.
Findings
Cyber conflict is restrained by the collective sociotechnical constitution of cyberspace, where actors must cooperate to compete. Maintenance of common protocols and open access is a condition for the possibility of attack, and successful deceptive exploitation of these connections becomes more difficult in politically sensitive situations as defense and deterrence become more feasible. The distribution of cyber conflict is, thus, bounded vertically in severity but unbounded horizontally in the potential for creative exploitation.
Originality/value
Cyber conflict can be understood with familiar political economic concepts applied in fresh ways. This application provides counterintuitive insights at odds with prevalent threat narratives about the likelihood and magnitude of cyber conflict. It also highlights the important advantages of strong states over the weaker non-state actors widely thought to be empowered by cyberspace.
Details
Keywords
The concept of a “visual commons” ties together two key dimensions of how people live together: the expression and pursuit of individual and collective interests, and the…
Abstract
The concept of a “visual commons” ties together two key dimensions of how people live together: the expression and pursuit of individual and collective interests, and the expression and development of how residents see and visualize where they live. This concept has helped me think more critically about the relative contributions of cognitive maps, collective perspectives, and symbolic interaction to community studies. It's also been useful in revealing the visual ground against which residents figure the process of becoming neighbors and the disconnects that follow in how residents see where they're living and the natural environments they live within.