The Pitchforks' Journey Through Multiple Time Frames

2015 ◽  
pp. 329-353
Keyword(s):  
2013 ◽  
Vol 56 (3) ◽  
pp. 729-756 ◽  
Author(s):  
JEREMY NUTTALL

ABSTRACTObserving the increasing, yet still partial exploration of pluralism, complexity and multiplicity in recent Labour party historiography, this article pursues a pluralist approach to Labour on two central, related themes of its middle-century evolution. First, it probes the plurality of Labour's different conceptions of time, specifically how it lived with the ambiguity of simultaneously viewing social progress as both immediate and rapidly achievable, yet also long term and strewn with constraints. This co-existence of multiple time-frames highlights the party's uncertainty and ideological multi-dimensionality, especially in its focus both on relatively rapid economic or structural transformation, and on much more slow-moving cultural, ethical, and educational change. It also complicates neat characterizations of particular phases in the party's history, challenging straightforwardly declinist views of the post-1945–51 period. Secondly, time connects to Labour's view of the people. Whilst historians have debated between positive and negative perceptions of the people, here the plural, split mind of Labour about the progressive potential of the citizenry is stressed, one closely intertwined with its multiple outlook on how long socialism would take. Contrasts are also suggested between the time-frames and expectations under which Labour and the Conservatives operated.


2008 ◽  
Vol 23 (5) ◽  
pp. 617-636 ◽  
Author(s):  
Kim Bartholomew ◽  
Katherine V. Regan ◽  
Monica A. White ◽  
Doug Oram

Previous studies of abuse in male same-sex relationships have been limited by convenience samples and/or by incomplete assessments of partner abuse. We examined patterns of same-sex partner abuse in a random sample of 284 gay and bisexual men. Respondents reported on perpetration and receipt of physical, psychological, and sexual abuse over multiple time frames, as well as injuries resulting from abuse. Almost all respondents reported psychological abuse, more than one-third reported physical abuse, and 10% reported having engaged in unwanted sexual activity because of partner force or threats of force. More than half of recipients of partner violence reported sustaining injury. We found strong associations between different forms of abuse, and between severity of abuse receipt and perpetration.


Author(s):  
Aidan Duane ◽  
Patrick Finnegan

An email system is a critical business tool and an essential part of organisational communication. Many organisations have experienced negative impacts from email and have responded by electronically monitoring and restricting email system use. However, electronic monitoring of email can be contentious. Staff can react to these controls by dissent, protest and potentially transformative action. This chapter presents the results of a single case study investigation of staff reactions to electronic monitoring and control of an email system in a company based in Ireland. The findings highlight the variations in staff reactions through multiple time frames of electronic monitoring and control, and the chapter identifies the key concerns of staff which need to be addressed by management and consultants advocating the implementation of email system monitoring and control.


2022 ◽  
Vol 13 (2) ◽  
pp. 1-20
Author(s):  
Byron Marshall ◽  
Michael Curry ◽  
Robert E. Crossler ◽  
John Correia

Survey items developed in behavioral Information Security (InfoSec) research should be practically useful in identifying individuals who are likely to create risk by failing to comply with InfoSec guidance. The literature shows that attitudes, beliefs, and perceptions drive compliance behavior and has influenced the creation of a multitude of training programs focused on improving ones’ InfoSec behaviors. While automated controls and directly observable technical indicators are generally preferred by InfoSec practitioners, difficult-to-monitor user actions can still compromise the effectiveness of automatic controls. For example, despite prohibition, doubtful or skeptical employees often increase organizational risk by using the same password to authenticate corporate and external services. Analysis of network traffic or device configurations is unlikely to provide evidence of these vulnerabilities but responses to well-designed surveys might. Guided by the relatively new IPAM model, this study administered 96 survey items from the Behavioral InfoSec literature, across three separate points in time, to 217 respondents. Using systematic feature selection techniques, manageable subsets of 29, 20, and 15 items were identified and tested as predictors of non-compliance with security policy. The feature selection process validates IPAM's innovation in using nuanced self-efficacy and planning items across multiple time frames. Prediction models were trained using several ML algorithms. Practically useful levels of prediction accuracy were achieved with, for example, ensemble tree models identifying 69% of the riskiest individuals within the top 25% of the sample. The findings indicate the usefulness of psychometric items from the behavioral InfoSec in guiding training programs and other cybersecurity control activities and demonstrate that they are promising as additional inputs to AI models that monitor networks for security events.


Author(s):  
Liwayway Adkins ◽  
Richard F. Garbaccio ◽  
Mun S. Ho ◽  
Eric M Moore ◽  
Richard Morgenstern

2020 ◽  
Vol 11 (3) ◽  
pp. 2281-2292 ◽  
Author(s):  
Thomas Carriere ◽  
Christophe Vernay ◽  
Sebastien Pitaval ◽  
George Kariniotakis

Sign in / Sign up

Export Citation Format

Share Document