The rapid growth in Internet services has led to a demand for scaleable authentication systems to restrict access to licensed services (such as bibliographical services…
Abstract
The rapid growth in Internet services has led to a demand for scaleable authentication systems to restrict access to licensed services (such as bibliographical services, databases, etc.) to authorised users. An increasing number of proprietary applications which provide authentication services are available. However such applications may only provide an interim solution, until authentication services based on open protocols are available. This article reviews developments to such open authentication protocols.
– The purpose of this paper is to explore the role of Police and Crime Panels (PCPs) within the new constitutional arrangements for governing police forces in England and Wales.
Abstract
Purpose
The purpose of this paper is to explore the role of Police and Crime Panels (PCPs) within the new constitutional arrangements for governing police forces in England and Wales.
Design/methodology/approach
Desktop research of the web pages of PCPs, combined with documentary analysis of reports of panel meetings and a literature review of relevant academic materials.
Findings
During the first year of their operation the role of the PCP in the new constitutional arrangements for governing police forces in England and Wales has been widely criticised. This paper explores reasons that may impinge on the effectiveness of these local bodies to scrutinise how Police and Crime Commissioners discharge their statutory functions. In particular, it draws attention to the limited powers of the panel, the contradictions of the “critical/friend” model of scrutiny, the extent of political alignment between “the scrutinisers” and “the scrutinee”, and the ability of the latter to constrain the scrutiny function of the former.
Originality/value
This paper is the first to explore the scrutiny role of PCPs in the context of the research evidence regarding the development and use of scrutiny within the local government context.
Details
Keywords
The purpose of this paper is to describe a pilot experiment to establish a web site to enable people undergoing therapy, or having similar problems, to communicate with one…
Abstract
Purpose
The purpose of this paper is to describe a pilot experiment to establish a web site to enable people undergoing therapy, or having similar problems, to communicate with one another – in effect, the cyber equivalent of a therapeutic community.
Design/methodology/approach
Software for a dating web site was adapted as a low cost means of driving the site. It provided for chatrooms, group discussions on topics of mutual interest, notice boards on which questions, responses, articles and poems could be posted and blogs. A volunteer Steering Group worked on the project launch and thereafter manned the site and monitored the project. User feedback indicated that a cyber community could meet the psychological needs of the participants and provide useful support, particularly between visits to a therapist. A surprising outcome was the feeling of community developed by written exchanges, i.e. blogs and forum notice boards. Direct on-line contact generated anxiety in some people, but most found it beneficial.
Findings
The paper confirms that such a site would be a useful supplement to other therapeutic services available, and would not be expensive to establish or run, but needed the backing of the NHS or a large medical charity to ensure that the number of users would be at a viable level in the long term.
Originality/value
As far as the author is aware the paper reports the first ever study of the potential use of a cyber therapeutic community.
Details
Keywords
The most inspiring ideal of librarianship, embodied in the public library service is of free access to information for all. On the face of it security is part of the more…
Abstract
The most inspiring ideal of librarianship, embodied in the public library service is of free access to information for all. On the face of it security is part of the more niggardly side of library work, conjuring up images of closed access shelves and books on chains. In practice of course making sure one user does not steal or damage books is essential to guarantee access to the next user. Balancing the two needs for security and open access is a key part of the function of the librarian.
Imperial College in 1969 looked like a man's world; it was certainly difficult to locate a ladies’ room which was not apparently hastily constructed in a tight space as an…
Abstract
Imperial College in 1969 looked like a man's world; it was certainly difficult to locate a ladies’ room which was not apparently hastily constructed in a tight space as an afterthought to a great design. Yet I joined a powerhouse of women. Joan Woodward had already tempted Dorothy Wedderburn from Cambridge and together they had secured large sums of research monies from the Research Councils, Fords, Pilkingtons, ICI, the Post Office, the Coal Board, government departments, and other supporters who were each captivated by the promise of the work and rare combination of intellectual strength and practical concerns of its leader. With research funds flowing in abundance, driving passions to explore further the relationship between structure, technology, and performance, and very few specific commitments, Joan and Dorothy set about recruiting what was to be one of the largest groups of young researchers in the United Kingdom in the late 1960s.
Ann Wishart, Kathy Watson, Sue Gorbing, Peter Roscoe and Sal Hampson
The following is a brief outline of what seem to us the main points of the Act:—
With reference to the report of the Annual General Meeting of the Pure Food and Health Society of Great Britain, which was published in the February issue of THE BRITISH FOOD…
Abstract
With reference to the report of the Annual General Meeting of the Pure Food and Health Society of Great Britain, which was published in the February issue of THE BRITISH FOOD JOURNAL, and to the speech delivered by MR. GOSLIN upon the proper handling and purveying of meat, an article which has subsequently appeared in The Standard is of considerable interest. It is pointed out that no one who gives the matter serious consideration can approve of the present methods. “Many years ago Oxford made its protest against carcasses or joints being exposed in open‐fronted shops. It is just possible that when the powers that were objected to and forbade this proceeding they thought more of the æsthetics than the science of it, but they most certainly did a good thing when they took flesh foods away from the contamination of street dust and the variations of temperature that are dependent on every gust of wind or every moment of sunlight or shadow.”
The existing literature on Islamic State of Iraq and Syria (ISIS) has thus far focused on the group’s contemporary or previous financing activities. However, there has not been an…
Abstract
Purpose
The existing literature on Islamic State of Iraq and Syria (ISIS) has thus far focused on the group’s contemporary or previous financing activities. However, there has not been an analysis of the ways in which ISIS’ funding is likely to change moving forward now that it has come under international scrutiny. The purpose of this paper is to assess the ways in which ISIS’ funding is likely to evolve in the future and to also suggest methods for combating its financing activities.
Design/methodology/approach
The paper is theoretical in nature. By assessing the existing literature on terrorist financing, it is apparent that terrorist organizations alter their funding sources and methods after coming under intense international scrutiny. Therefore, two hypotheses are put forth for the future of ISIS’ funding activities: the group will become more effective at building social support among its local population, thereby consolidating is funding sources and methods within Syria and Iraq; and the group will increasingly branch out, searching for sources from a transnational network, as its base in Syria and Iraq begins to deteriorate.
Findings
Community support is essential for sustaining a terrorist network. As a result, it is likely that ISIS will increasingly seek funding from a transnational network as its base of support in Iraq and Syria begins to deteriorate. There is also a distinct third possibility that the group will be able to consolidate its base while also moving abroad for financial support. This third option presents the most complicated outcome for the international community in its fight against ISIS.
Originality/value
This study fills a gap in the literature on terrorist financing, particularly with regards to ISIS, to assist the international community in its fight against the group both now and moving into the future.