Christopher Hood, Henry Rothstein, and Robert Baldwin
- Published in print:
- 2001
- Published Online:
- November 2003
- ISBN:
- 9780199243631
- eISBN:
- 9780191599507
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/0199243638.003.0002
- Subject:
- Political Science, Comparative Politics
Sets out two key dimensions for analysing risk regulation regimes that are employed throughout the book. The first dimension relates to the three constituent components of a risk regulation regime ...
More
Sets out two key dimensions for analysing risk regulation regimes that are employed throughout the book. The first dimension relates to the three constituent components of a risk regulation regime that are common to any control system—i.e. ways of gathering information, ways of setting standards, goals or targets and ways of changing behaviour and enforcement to meet the standards or targets. The second dimension relates both to the context of risk regulation regimes—i.e. the character of the risks being tackled, public attitudes towards risks and the configuration of related organized interests— and the content of regimes—i.e. their size, structure, and style. Analysis of risk regulation regimes along these two dimensions provides an essential starting point for compartive analysis, picks up fine‐grained distinctions between regimes and identifies regime features that are central to a range of debates about risk regulation.Less
Sets out two key dimensions for analysing risk regulation regimes that are employed throughout the book. The first dimension relates to the three constituent components of a risk regulation regime that are common to any control system—i.e. ways of gathering information, ways of setting standards, goals or targets and ways of changing behaviour and enforcement to meet the standards or targets. The second dimension relates both to the context of risk regulation regimes—i.e. the character of the risks being tackled, public attitudes towards risks and the configuration of related organized interests— and the content of regimes—i.e. their size, structure, and style. Analysis of risk regulation regimes along these two dimensions provides an essential starting point for compartive analysis, picks up fine‐grained distinctions between regimes and identifies regime features that are central to a range of debates about risk regulation.
Luther Tai
- Published in print:
- 2007
- Published Online:
- September 2007
- ISBN:
- 9780195311310
- eISBN:
- 9780199789948
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195311310.003.0003
- Subject:
- Business and Management, HRM / IR
This chapter covers the methods for conducting research on e-learning at IBM. A conceptual framework was used to investigate how corporate e-learning is developed, implemented, and evaluated in ...
More
This chapter covers the methods for conducting research on e-learning at IBM. A conceptual framework was used to investigate how corporate e-learning is developed, implemented, and evaluated in corporations with the primary focus on e-learning at IBM. The methodology begins with a careful search of well-crafted questions. Personal interviews were the primary source of data gathering. A set of protocols or questions were posed to interviewees in order to understand how e-learning is developed, how e-learning is balanced with traditional face-to-face training, how corporations implement and support e-learning, and how corporations determine if e-learning is effective as a tool for learning. The determination of effectiveness was made from the interviewees' perspectives about how they define and measure effectiveness.Less
This chapter covers the methods for conducting research on e-learning at IBM. A conceptual framework was used to investigate how corporate e-learning is developed, implemented, and evaluated in corporations with the primary focus on e-learning at IBM. The methodology begins with a careful search of well-crafted questions. Personal interviews were the primary source of data gathering. A set of protocols or questions were posed to interviewees in order to understand how e-learning is developed, how e-learning is balanced with traditional face-to-face training, how corporations implement and support e-learning, and how corporations determine if e-learning is effective as a tool for learning. The determination of effectiveness was made from the interviewees' perspectives about how they define and measure effectiveness.
Roger W Shuy
- Published in print:
- 2011
- Published Online:
- January 2012
- ISBN:
- 9780199795383
- eISBN:
- 9780199919314
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199795383.001.0001
- Subject:
- Linguistics, Sociolinguistics / Anthropological Linguistics
This book describes the contributions of linguistics to the intelligence gathering and analysis in the legal context by showing the way evidence is analyzed in eleven perjury cases. Beginning with a ...
More
This book describes the contributions of linguistics to the intelligence gathering and analysis in the legal context by showing the way evidence is analyzed in eleven perjury cases. Beginning with a brief review of perjury law, it shows how the meaning of lexicon, grammatical structures, and ambiguities are important in such cases, stressing that it would be prudent for prosecutors and defense attorneys alike to begin their review in such cases with the larger units of language, by identifying the speech event, the schemas of the participants, the agendas of the participants as revealed by the topics they introduce and the responses they make to the topics of others. Other smaller language units, such as potentially ambiguous expressions, grammatical referencing, and lexical choices, which are often considered “smoking gun” evidence, often can be better understood when seen in the larger context of the overall discourse. The book suggests that in perjury cases both the prosecution and defense can use many of the tools of linguistics that may be relatively unknown to the legal profession. It further urges that often lawyers would be prudent to call on linguists to help them whether for the prosecution or defense. Eight of the case examples describe the inadequate intelligence gathering and analysis by the prosecution and the use of linguistic tools to resolve these problems. The other three cases show how district attorneys and judges repaired failed intelligence analyses.Less
This book describes the contributions of linguistics to the intelligence gathering and analysis in the legal context by showing the way evidence is analyzed in eleven perjury cases. Beginning with a brief review of perjury law, it shows how the meaning of lexicon, grammatical structures, and ambiguities are important in such cases, stressing that it would be prudent for prosecutors and defense attorneys alike to begin their review in such cases with the larger units of language, by identifying the speech event, the schemas of the participants, the agendas of the participants as revealed by the topics they introduce and the responses they make to the topics of others. Other smaller language units, such as potentially ambiguous expressions, grammatical referencing, and lexical choices, which are often considered “smoking gun” evidence, often can be better understood when seen in the larger context of the overall discourse. The book suggests that in perjury cases both the prosecution and defense can use many of the tools of linguistics that may be relatively unknown to the legal profession. It further urges that often lawyers would be prudent to call on linguists to help them whether for the prosecution or defense. Eight of the case examples describe the inadequate intelligence gathering and analysis by the prosecution and the use of linguistic tools to resolve these problems. The other three cases show how district attorneys and judges repaired failed intelligence analyses.
Natalie Klein
- Published in print:
- 2011
- Published Online:
- May 2011
- ISBN:
- 9780199566532
- eISBN:
- 9780191725197
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199566532.001.0001
- Subject:
- Law, Public International Law
This book examines the rights and duties of states across a broad spectrum of maritime security threats. It provides comprehensive coverage of the different dimensions of maritime security in order ...
More
This book examines the rights and duties of states across a broad spectrum of maritime security threats. It provides comprehensive coverage of the different dimensions of maritime security in order to assess how responses to maritime security concerns are and should be shaping the law of the sea. The discussion canvasses passage of military vessels and military activities at sea, law enforcement activities across the different maritime zones, information sharing and intelligence gathering, as well as armed conflict and naval warfare. In doing so, this book not only addresses traditional security concerns for naval power but also examines responses to contemporary maritime security threats, such as terrorism, weapons of mass destruction, piracy, drug-trafficking, environmental damage and illegal fishing. While the protection of sovereignty and national interests remain fundamental to maritime security and the law of the sea, there is increasing acceptance of a common interest that exists among states when seeking to respond to a variety of modern maritime security threats. It is argued that security interests should be given greater scope in our understanding of the law of the sea in light of the changing dynamics of exclusive and inclusive claims to ocean use. More flexibility may be required in the interpretation and application of the UN Convention on the Law of the Sea if appropriate responses to ensure maritime security are to be allowed.Less
This book examines the rights and duties of states across a broad spectrum of maritime security threats. It provides comprehensive coverage of the different dimensions of maritime security in order to assess how responses to maritime security concerns are and should be shaping the law of the sea. The discussion canvasses passage of military vessels and military activities at sea, law enforcement activities across the different maritime zones, information sharing and intelligence gathering, as well as armed conflict and naval warfare. In doing so, this book not only addresses traditional security concerns for naval power but also examines responses to contemporary maritime security threats, such as terrorism, weapons of mass destruction, piracy, drug-trafficking, environmental damage and illegal fishing. While the protection of sovereignty and national interests remain fundamental to maritime security and the law of the sea, there is increasing acceptance of a common interest that exists among states when seeking to respond to a variety of modern maritime security threats. It is argued that security interests should be given greater scope in our understanding of the law of the sea in light of the changing dynamics of exclusive and inclusive claims to ocean use. More flexibility may be required in the interpretation and application of the UN Convention on the Law of the Sea if appropriate responses to ensure maritime security are to be allowed.
Paul Maddrell
- Published in print:
- 2006
- Published Online:
- January 2010
- ISBN:
- 9780199267507
- eISBN:
- 9780191708404
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199267507.001.0001
- Subject:
- History, European Modern History
The years 1945-61 saw the greatest transformation in weaponry that has ever taken place, as atomic and thermonuclear bombs, intercontinental ballistic missiles and chemical and biological weapons ...
More
The years 1945-61 saw the greatest transformation in weaponry that has ever taken place, as atomic and thermonuclear bombs, intercontinental ballistic missiles and chemical and biological weapons were developed by the superpowers. It was also a distinct era in Western intelligence collection. These were the years of the Germans. Mass interrogation in West Germany and spying in East Germany represented the most important source of intelligence on Soviet war-related science, weapons development and military capability until 1956 and a key one until 1961. This intelligence fuelled the arms race and influenced Western scientific research, weapons development, and intelligence collection. Using intelligence and policy documents held in British and US archives and records of the Ministry of State Security (MfS) of the former German Democratic Republic (GDR), this book studies the scientific intelligence-gathering and subversive operations of the British, US, and West German intelligence services in the period to date. East Germany's scientific potential was contained by inducing leading scientists and engineers to defect to the West, and the book shows that the US government's policy of ‘containment’ was more aggressive than has hitherto been accepted. It also demonstrates that the Western secret services' espionage in the GDR was very successful, even though the MfS and KGB achieved triumphs against them. George Blake twice did appalling damage to MI6's spy networks. The book reveals the identity of the most distinguished scientist to spy for the CIA as yet uncovered.Less
The years 1945-61 saw the greatest transformation in weaponry that has ever taken place, as atomic and thermonuclear bombs, intercontinental ballistic missiles and chemical and biological weapons were developed by the superpowers. It was also a distinct era in Western intelligence collection. These were the years of the Germans. Mass interrogation in West Germany and spying in East Germany represented the most important source of intelligence on Soviet war-related science, weapons development and military capability until 1956 and a key one until 1961. This intelligence fuelled the arms race and influenced Western scientific research, weapons development, and intelligence collection. Using intelligence and policy documents held in British and US archives and records of the Ministry of State Security (MfS) of the former German Democratic Republic (GDR), this book studies the scientific intelligence-gathering and subversive operations of the British, US, and West German intelligence services in the period to date. East Germany's scientific potential was contained by inducing leading scientists and engineers to defect to the West, and the book shows that the US government's policy of ‘containment’ was more aggressive than has hitherto been accepted. It also demonstrates that the Western secret services' espionage in the GDR was very successful, even though the MfS and KGB achieved triumphs against them. George Blake twice did appalling damage to MI6's spy networks. The book reveals the identity of the most distinguished scientist to spy for the CIA as yet uncovered.
Pat Willmer
- Published in print:
- 2011
- Published Online:
- October 2017
- ISBN:
- 9780691128610
- eISBN:
- 9781400838943
- Item type:
- chapter
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691128610.003.0007
- Subject:
- Biology, Ecology
This chapter examines the biology of pollen, the primary reward for flowers in an evolutionary sense and probably the resource for which animals first went to flowers. The inherent characteristics of ...
More
This chapter examines the biology of pollen, the primary reward for flowers in an evolutionary sense and probably the resource for which animals first went to flowers. The inherent characteristics of pollen make it a useful resource to exploit as food, potentially collectable by almost any animal. It remains a crucial reward for pollen-eating and pollen-gathering visitors, such as some flies, some beetles, and virtually all bees. Pollen’s function as a reward of visitors is mutually incompatible with its function in reproduction. The chapter first describes the characteristics of pollen grains before discussing the storage and delivery of pollen in the plant. It then considers pollen packaging, pollen gathering by animals, pollen as food, and pollen preferences. It also explores the longevity and viability of pollen, pollen-only flowers, and pollen competition. Finally, it reflects on the question of how much pollen a plant “should” produce.Less
This chapter examines the biology of pollen, the primary reward for flowers in an evolutionary sense and probably the resource for which animals first went to flowers. The inherent characteristics of pollen make it a useful resource to exploit as food, potentially collectable by almost any animal. It remains a crucial reward for pollen-eating and pollen-gathering visitors, such as some flies, some beetles, and virtually all bees. Pollen’s function as a reward of visitors is mutually incompatible with its function in reproduction. The chapter first describes the characteristics of pollen grains before discussing the storage and delivery of pollen in the plant. It then considers pollen packaging, pollen gathering by animals, pollen as food, and pollen preferences. It also explores the longevity and viability of pollen, pollen-only flowers, and pollen competition. Finally, it reflects on the question of how much pollen a plant “should” produce.
Pat Willmer
- Published in print:
- 2011
- Published Online:
- October 2017
- ISBN:
- 9780691128610
- eISBN:
- 9781400838943
- Item type:
- chapter
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691128610.003.0008
- Subject:
- Biology, Ecology
This chapter examines the biology of nectar, the main secondary floral reward in an evolutionary sense. As a commodity, nectar is easy for plants to produce and easy for animals to handle; its sugars ...
More
This chapter examines the biology of nectar, the main secondary floral reward in an evolutionary sense. As a commodity, nectar is easy for plants to produce and easy for animals to handle; its sugars are simple to metabolize and thus to use as a readily available fuel for an animal’s activities. Nectar is a crucial factor in determining the interactions of flowers and their visitors. The chapter first provides an overview of how floral nectar is produced in a nectary before discussing nectar secretion, the chemical composition of nectar, and nectar volume. It then considers nectar concentration and viscosity, nectar as a sugar and energy reward, and nectar as a water reward. It also explores daily, seasonal, and phylogenetic patterns of nectar production, how flowers control their nectar and their pollinators, and problems in measuring and quantifying nectar. The chapter concludes with an analysis of the costs of nectar gathering.Less
This chapter examines the biology of nectar, the main secondary floral reward in an evolutionary sense. As a commodity, nectar is easy for plants to produce and easy for animals to handle; its sugars are simple to metabolize and thus to use as a readily available fuel for an animal’s activities. Nectar is a crucial factor in determining the interactions of flowers and their visitors. The chapter first provides an overview of how floral nectar is produced in a nectary before discussing nectar secretion, the chemical composition of nectar, and nectar volume. It then considers nectar concentration and viscosity, nectar as a sugar and energy reward, and nectar as a water reward. It also explores daily, seasonal, and phylogenetic patterns of nectar production, how flowers control their nectar and their pollinators, and problems in measuring and quantifying nectar. The chapter concludes with an analysis of the costs of nectar gathering.
Lorna Hutson
- Published in print:
- 2007
- Published Online:
- January 2008
- ISBN:
- 9780199212439
- eISBN:
- 9780191707209
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199212439.003.0002
- Subject:
- Literature, Shakespeare Studies
This chapter examines representations of evidence gathering in 15th-century homiletic and dramatic texts, and finds that within the penitential theology of the period, these are ways of figuring the ...
More
This chapter examines representations of evidence gathering in 15th-century homiletic and dramatic texts, and finds that within the penitential theology of the period, these are ways of figuring the metaphysical terror of divine judgement in diabolic or purgatorial terms. It then shows how the play Mankind and the treatise Jacobs Well represent common law legal procedure as the diabolic, procedural antithesis of absolution and penance. The chapter concludes by showing how St German's writings helped to dismantle the conceptual structure that enabled canon law to claim jurisdiction over the secrets of the individual conscience. St German's writings absorbed and displaced the authority of the priest in confession by adapting his penitential concerns to the evidential limitations and concerns with public accountability that define the positive law.Less
This chapter examines representations of evidence gathering in 15th-century homiletic and dramatic texts, and finds that within the penitential theology of the period, these are ways of figuring the metaphysical terror of divine judgement in diabolic or purgatorial terms. It then shows how the play Mankind and the treatise Jacobs Well represent common law legal procedure as the diabolic, procedural antithesis of absolution and penance. The chapter concludes by showing how St German's writings helped to dismantle the conceptual structure that enabled canon law to claim jurisdiction over the secrets of the individual conscience. St German's writings absorbed and displaced the authority of the priest in confession by adapting his penitential concerns to the evidential limitations and concerns with public accountability that define the positive law.
DAVID LAVEN
- Published in print:
- 2002
- Published Online:
- January 2010
- ISBN:
- 9780198205746
- eISBN:
- 9780191717147
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780198205746.003.0009
- Subject:
- History, European Modern History
Traditionally Austrian rule of Venetia has been associated with repressive policing. This chapter highlights a very different story. Not only does it emphasise that relatively little police activity ...
More
Traditionally Austrian rule of Venetia has been associated with repressive policing. This chapter highlights a very different story. Not only does it emphasise that relatively little police activity went into dealing with subversion — in part because of the quiescence of Venetia during the period on which this study focuses — but also that the police played a key part in ensuring the good government of the region through information gathering, monitoring the bureaucracy, and, perhaps surprisingly, representing Venetian interests to central government.Less
Traditionally Austrian rule of Venetia has been associated with repressive policing. This chapter highlights a very different story. Not only does it emphasise that relatively little police activity went into dealing with subversion — in part because of the quiescence of Venetia during the period on which this study focuses — but also that the police played a key part in ensuring the good government of the region through information gathering, monitoring the bureaucracy, and, perhaps surprisingly, representing Venetian interests to central government.
Nicholas Hope
- Published in print:
- 1999
- Published Online:
- November 2003
- ISBN:
- 9780198269946
- eISBN:
- 9780191600647
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/0198269943.003.0009
- Subject:
- Religion, Church History
Continues the theme of reform: here as an attempt to develop an active gathered congregation modelled consciously on the congregation of the New Testament and early Church. Spirituality, individual ...
More
Continues the theme of reform: here as an attempt to develop an active gathered congregation modelled consciously on the congregation of the New Testament and early Church. Spirituality, individual daily devotional exercise, homiletic reform and the introduction of a modern congregational hymn book are examined. A high vernacular replaced local dialect.Less
Continues the theme of reform: here as an attempt to develop an active gathered congregation modelled consciously on the congregation of the New Testament and early Church. Spirituality, individual daily devotional exercise, homiletic reform and the introduction of a modern congregational hymn book are examined. A high vernacular replaced local dialect.
Nicholas Hope
- Published in print:
- 1999
- Published Online:
- November 2003
- ISBN:
- 9780198269946
- eISBN:
- 9780191600647
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/0198269943.003.0015
- Subject:
- Religion, Church History
Describes a broad religious awakening in German lands amongst Lutherans and the Reformed and in Lutheran Scandinavia (c.1780–1850). Disruption of the old communal parish order of dependent ...
More
Describes a broad religious awakening in German lands amongst Lutherans and the Reformed and in Lutheran Scandinavia (c.1780–1850). Disruption of the old communal parish order of dependent relationships in village and hometown by state legislation spurred voluntary churchmanship and the gathered congregation. A ‘democratic’ church appeared here and thereafter 1840.Less
Describes a broad religious awakening in German lands amongst Lutherans and the Reformed and in Lutheran Scandinavia (c.1780–1850). Disruption of the old communal parish order of dependent relationships in village and hometown by state legislation spurred voluntary churchmanship and the gathered congregation. A ‘democratic’ church appeared here and thereafter 1840.
Justin Crowe
- Published in print:
- 2012
- Published Online:
- October 2017
- ISBN:
- 9780691152936
- eISBN:
- 9781400842575
- Item type:
- chapter
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691152936.003.0007
- Subject:
- Political Science, American Politics
This chapter examines the specialization of the federal judiciary from the start of World War II in 1939 to the election of Bill Clinton's presidential successor in 2000. Coming out of the New Deal, ...
More
This chapter examines the specialization of the federal judiciary from the start of World War II in 1939 to the election of Bill Clinton's presidential successor in 2000. Coming out of the New Deal, politicians of modern America broadened the institutional portfolios of courts and judges with a series of specialized functions and individuals. This deepening of the bureaucratic tendency toward division of labor cemented the key role played by judicial power in modern governance. The chapter discusses the three stages in which judicial institution building occurred during this period: the enhancement and expansion of judicial adjuncts to execute administrative duties for and to relieve the growing caseload burden on federal district court judges; the reorganization of existing courts and judges in order to develop and utilize expertise to handle patent law; and the creation of a new tribunal to provide judicial scrutiny over domestic surveillance and intelligence gathering.Less
This chapter examines the specialization of the federal judiciary from the start of World War II in 1939 to the election of Bill Clinton's presidential successor in 2000. Coming out of the New Deal, politicians of modern America broadened the institutional portfolios of courts and judges with a series of specialized functions and individuals. This deepening of the bureaucratic tendency toward division of labor cemented the key role played by judicial power in modern governance. The chapter discusses the three stages in which judicial institution building occurred during this period: the enhancement and expansion of judicial adjuncts to execute administrative duties for and to relieve the growing caseload burden on federal district court judges; the reorganization of existing courts and judges in order to develop and utilize expertise to handle patent law; and the creation of a new tribunal to provide judicial scrutiny over domestic surveillance and intelligence gathering.
D. Bruce Hindmarsh
- Published in print:
- 2005
- Published Online:
- April 2005
- ISBN:
- 9780199245758
- eISBN:
- 9780191602436
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/0199245754.003.0002
- Subject:
- Religion, Church History
Puritan teaching and practice during the late-sixteenth and seventeenth centuries formed a matrix within which spiritual autobiography would eventually flourish in England. Puritan pastoral theology, ...
More
Puritan teaching and practice during the late-sixteenth and seventeenth centuries formed a matrix within which spiritual autobiography would eventually flourish in England. Puritan pastoral theology, such as that of William Perkins, taught that the first use of the law was to intensify the pangs of introspective conscience on the part of the unregenerate, in fact to lead them to despair, and the crisis this induced was the centre of all the various ‘morphologies’ of conversion that appeared during the seventeenth and eighteenth centuries among Puritans, Pietists, and evangelicals of various sorts. This theology was reflected first in diaries and then in the full expression of narrative identity, the self-interpretation of the entirety of one’s life in terms of conversion. While Richard Kilby offers an early example of Puritan spiritual autobiography, the formal occasion for oral narrative appeared in the requirement of the gathered churches for evidence of personal conversion, a requirement that emerged in the mid-seventeenth century and then became widely adopted. Still, throughout the seventeenth century and well into the eighteenth, a special motive to publish spiritual autobiography was required—especially specimens from ordinary folk without any social standing—and this motive was most often found in the need to defend oneself or the sense that the times were epochal or indeed apocalyptic.Less
Puritan teaching and practice during the late-sixteenth and seventeenth centuries formed a matrix within which spiritual autobiography would eventually flourish in England. Puritan pastoral theology, such as that of William Perkins, taught that the first use of the law was to intensify the pangs of introspective conscience on the part of the unregenerate, in fact to lead them to despair, and the crisis this induced was the centre of all the various ‘morphologies’ of conversion that appeared during the seventeenth and eighteenth centuries among Puritans, Pietists, and evangelicals of various sorts. This theology was reflected first in diaries and then in the full expression of narrative identity, the self-interpretation of the entirety of one’s life in terms of conversion. While Richard Kilby offers an early example of Puritan spiritual autobiography, the formal occasion for oral narrative appeared in the requirement of the gathered churches for evidence of personal conversion, a requirement that emerged in the mid-seventeenth century and then became widely adopted. Still, throughout the seventeenth century and well into the eighteenth, a special motive to publish spiritual autobiography was required—especially specimens from ordinary folk without any social standing—and this motive was most often found in the need to defend oneself or the sense that the times were epochal or indeed apocalyptic.
Kathleen Coulborn Faller and Sandra K. Hewitt
- Published in print:
- 2007
- Published Online:
- January 2009
- ISBN:
- 9780195311778
- eISBN:
- 9780199865055
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195311778.003.0010
- Subject:
- Social Work, Children and Families, Crime and Justice
Pre-school children pose a special challenge in sexual abuse assessment, because of their limited communication skills and increased suggestibility, when compared to older children. This chapter ...
More
Pre-school children pose a special challenge in sexual abuse assessment, because of their limited communication skills and increased suggestibility, when compared to older children. This chapter provides guidelines for both very young children, ages eighteen months to three years, and older pre-schoolers. It describes the unique developmental considerations and data-gathering methods for pre-school children when there are sexual abuse concerns.Less
Pre-school children pose a special challenge in sexual abuse assessment, because of their limited communication skills and increased suggestibility, when compared to older children. This chapter provides guidelines for both very young children, ages eighteen months to three years, and older pre-schoolers. It describes the unique developmental considerations and data-gathering methods for pre-school children when there are sexual abuse concerns.
Deborah Davies and Kathleen Coulborn Faller
- Published in print:
- 2007
- Published Online:
- January 2009
- ISBN:
- 9780195311778
- eISBN:
- 9780199865055
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195311778.003.0011
- Subject:
- Social Work, Children and Families, Crime and Justice
Dealing with children with special needs because of developmental and/or physical disabilities also requires special interview skills. This chapter discusses research on children with disabilities, ...
More
Dealing with children with special needs because of developmental and/or physical disabilities also requires special interview skills. This chapter discusses research on children with disabilities, which includes their increased risk for abuse and greater dependency on potential abusers. Pre-interview data-gathering and adapting the interview structure to the child’s abilities are also covered.Less
Dealing with children with special needs because of developmental and/or physical disabilities also requires special interview skills. This chapter discusses research on children with disabilities, which includes their increased risk for abuse and greater dependency on potential abusers. Pre-interview data-gathering and adapting the interview structure to the child’s abilities are also covered.
Robert E. Verrecchia
- Published in print:
- 2004
- Published Online:
- January 2005
- ISBN:
- 9780199260621
- eISBN:
- 9780191601668
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/0199260621.003.0006
- Subject:
- Economics and Finance, Financial Economics
The theory-based disclosure literature is reviewed to infer policy prescriptions that seem implicit in the results. The author points out that the theory-based literature fails to distinguish ...
More
The theory-based disclosure literature is reviewed to infer policy prescriptions that seem implicit in the results. The author points out that the theory-based literature fails to distinguish adequately between analyses concerned primarily with narrow pathologies, and results that are sufficiently general to extend naturally to broad policy issues. He attempts to make this distinction and discusses broad notions and ideas that originate from the theory-based literature in accounting that comport with casual empiricism. The six sections of the chapter are: Introduction; Public disclosure and private information gathering; Unintended consequences of public disclosure; Other externalities of disclosure; Disclosure standards aside, what thwarts firms from disclosing voluntarily?; and Conclusion.Less
The theory-based disclosure literature is reviewed to infer policy prescriptions that seem implicit in the results. The author points out that the theory-based literature fails to distinguish adequately between analyses concerned primarily with narrow pathologies, and results that are sufficiently general to extend naturally to broad policy issues. He attempts to make this distinction and discusses broad notions and ideas that originate from the theory-based literature in accounting that comport with casual empiricism. The six sections of the chapter are: Introduction; Public disclosure and private information gathering; Unintended consequences of public disclosure; Other externalities of disclosure; Disclosure standards aside, what thwarts firms from disclosing voluntarily?; and Conclusion.
Richard J. Samuels
- Published in print:
- 2019
- Published Online:
- May 2020
- ISBN:
- 9781501741586
- eISBN:
- 9781501741593
- Item type:
- book
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9781501741586.001.0001
- Subject:
- Political Science, International Relations and Politics
The prewar history of the Japanese intelligence community demonstrates how having power over much, but insight into little can have devastating consequences. Its postwar history—one of limited ...
More
The prewar history of the Japanese intelligence community demonstrates how having power over much, but insight into little can have devastating consequences. Its postwar history—one of limited Japanese power despite growing insight—has also been problematic for national security. This book dissects the fascinating history of the intelligence community in Japan. Looking at the impact of shifts in the strategic environment, technological change, and past failures, it probes the reasons why Japan has endured such a roller-coaster ride when it comes to intelligence gathering and analysis, and concludes that the ups and downs of the past century—combined with growing uncertainties in the regional security environment—have convinced Japanese leaders of the critical importance of striking balance between power and insight. Using examples of excessive hubris and debilitating bureaucratic competition before the Asia-Pacific War, the unavoidable dependence on U.S. assets and popular sensitivity to security issues after World War II, and the tardy adoption of image-processing and cyber technologies, the book highlights the century-long history of Japan's struggles to develop a fully functioning and effective intelligence capability, and makes clear that Japanese leaders have begun to reinvent their nation's intelligence community.Less
The prewar history of the Japanese intelligence community demonstrates how having power over much, but insight into little can have devastating consequences. Its postwar history—one of limited Japanese power despite growing insight—has also been problematic for national security. This book dissects the fascinating history of the intelligence community in Japan. Looking at the impact of shifts in the strategic environment, technological change, and past failures, it probes the reasons why Japan has endured such a roller-coaster ride when it comes to intelligence gathering and analysis, and concludes that the ups and downs of the past century—combined with growing uncertainties in the regional security environment—have convinced Japanese leaders of the critical importance of striking balance between power and insight. Using examples of excessive hubris and debilitating bureaucratic competition before the Asia-Pacific War, the unavoidable dependence on U.S. assets and popular sensitivity to security issues after World War II, and the tardy adoption of image-processing and cyber technologies, the book highlights the century-long history of Japan's struggles to develop a fully functioning and effective intelligence capability, and makes clear that Japanese leaders have begun to reinvent their nation's intelligence community.
Huatong Sun
- Published in print:
- 2012
- Published Online:
- May 2012
- ISBN:
- 9780199744763
- eISBN:
- 9780199932993
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199744763.003.0001
- Subject:
- Psychology, Cognitive Models and Architectures
This chapter explores why action and meaning is unintegrated in cross-cultural technology design from the angle of culture. It first assesses the status of culture in cross-cultural design practices; ...
More
This chapter explores why action and meaning is unintegrated in cross-cultural technology design from the angle of culture. It first assesses the status of culture in cross-cultural design practices; discusses how narrow representations of local culture result in poor user experience of localized technologies; and reviews the movement of capturing local culture from the surface to its core with case studies of three approaches commonly adopted in cross-cultural design—DOs and DON’Ts, cultural dimensions, and structured fieldwork methods. To further contextualize the discussion, it examines the complex interactions between culture, technology, and design in a contemporary situation and develops a position for technology design that attends to both instrumentality and social circulation. Built on that, this chapter establishes a dialogic view of culture as a semantic space that connects action and meaning and describes local culture as the dynamic nexus of contextual interactions for requirements gathering in cross-cultural design practices.Less
This chapter explores why action and meaning is unintegrated in cross-cultural technology design from the angle of culture. It first assesses the status of culture in cross-cultural design practices; discusses how narrow representations of local culture result in poor user experience of localized technologies; and reviews the movement of capturing local culture from the surface to its core with case studies of three approaches commonly adopted in cross-cultural design—DOs and DON’Ts, cultural dimensions, and structured fieldwork methods. To further contextualize the discussion, it examines the complex interactions between culture, technology, and design in a contemporary situation and develops a position for technology design that attends to both instrumentality and social circulation. Built on that, this chapter establishes a dialogic view of culture as a semantic space that connects action and meaning and describes local culture as the dynamic nexus of contextual interactions for requirements gathering in cross-cultural design practices.
Lara Buchak
- Published in print:
- 2012
- Published Online:
- September 2012
- ISBN:
- 9780199604760
- eISBN:
- 9780191741548
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199604760.003.0012
- Subject:
- Philosophy, Philosophy of Religion, Metaphysics/Epistemology
This chapter provides an account of what it is to have faith in a proposition p, in both religious and mundane contexts. It is argued that faith in p doesn’t require adopting a degree of belief that ...
More
This chapter provides an account of what it is to have faith in a proposition p, in both religious and mundane contexts. It is argued that faith in p doesn’t require adopting a degree of belief that isn’t supported by one’s evidence but rather it requires terminating one’s search for further evidence and acting on the supposition that p. It is then shown, by responding to a formal result due to I. J. Good, that doing so can be rational in a number of circumstances. If expected utility theory is the correct account of practical rationality, then having faith can be both epistemically and practically rational if the costs associated with gathering further evidence or postponing the decision are high. If a more permissive framework is adopted, then having faith can be rational even when there are no costs associated with gathering further evidence.Less
This chapter provides an account of what it is to have faith in a proposition p, in both religious and mundane contexts. It is argued that faith in p doesn’t require adopting a degree of belief that isn’t supported by one’s evidence but rather it requires terminating one’s search for further evidence and acting on the supposition that p. It is then shown, by responding to a formal result due to I. J. Good, that doing so can be rational in a number of circumstances. If expected utility theory is the correct account of practical rationality, then having faith can be both epistemically and practically rational if the costs associated with gathering further evidence or postponing the decision are high. If a more permissive framework is adopted, then having faith can be rational even when there are no costs associated with gathering further evidence.
Ann Moss
- Published in print:
- 1996
- Published Online:
- October 2011
- ISBN:
- 9780198159087
- eISBN:
- 9780191673474
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780198159087.003.0002
- Subject:
- Literature, 16th-century and Renaissance Literature
The name ‘commonplace-book’ does not seem to have been used before the 16th century, but the thing itself had been evolving at least since the time of John of Salisbury. It is not to the genealogy of ...
More
The name ‘commonplace-book’ does not seem to have been used before the 16th century, but the thing itself had been evolving at least since the time of John of Salisbury. It is not to the genealogy of ‘places’ that one must first look for the ancestors of commonplace-books, but to the other line of descent, the path of flower-gathering. The collections of quotations from classical authors which begin to proliferate in the 12th century were generally entitled ‘flowers’. The larger medieval florilegia, even if they originated as private collections like the one mentioned, soon entered the public domain. Like the future commonplace-book, the florilegium had an ambivalent status, and functioned in both a private and a public context. In the case of commonplace-books, this duality is more visible because the advent of printing made a clear distinction in their means of production and in their methods of circulation.Less
The name ‘commonplace-book’ does not seem to have been used before the 16th century, but the thing itself had been evolving at least since the time of John of Salisbury. It is not to the genealogy of ‘places’ that one must first look for the ancestors of commonplace-books, but to the other line of descent, the path of flower-gathering. The collections of quotations from classical authors which begin to proliferate in the 12th century were generally entitled ‘flowers’. The larger medieval florilegia, even if they originated as private collections like the one mentioned, soon entered the public domain. Like the future commonplace-book, the florilegium had an ambivalent status, and functioned in both a private and a public context. In the case of commonplace-books, this duality is more visible because the advent of printing made a clear distinction in their means of production and in their methods of circulation.