scholarly journals Towards a criminology of structurally conditioned emotions: Combining Bourdieu’s field theory and cultural criminology

2017 ◽  
Vol 15 (3) ◽  
pp. 344-363 ◽  
Author(s):  
Annick Prieur

When trying to explain why some people commit crimes while most do not, criminological theory has had a problem with linking agency and structure. A promising solution came in Jock Young’s version of cultural criminology, which integrated Merton’s strain theory with Katz’s account of the emotional rewards from criminal acts. Young claimed the core emotion behind different crimes would be a structurally caused experience of humiliation. Linking individual agency and structural conditions through emotions certainly advances understanding, but Young did not show how this linking was effectuated. Pierre Bourdieu’s field theory may contribute with a better grasp on how structural conditions influence the social agent’s perception of the world and emotional orientation towards it. After exploring how this argument may be supported with regard to empirical cases – studies of graffiti, thefts and violence – the concluding discussion deals with the limits of an approach that combines fields and emotions.

Author(s):  
E. Yu ◽  
L. Liu ◽  
J. Mylopoulous

As software becomes more and more entrenched in everyday life in today’s society, security looms large as an unsolved problem. Despite advances in security mecha-nisms and technologies, most software systems in the world remain precarious and vulnerable. There is now widespread recognition that security cannot be achieved by technology alone. All software systems are ultimately embedded in some human social environment. The effectiveness of the system depends very much on the forces in that environment. Yet there are few systematic techniques for treating the social context of security together with technical system design in an integral way. In this chapter, we argue that a social ontology at the core of a requirements engineering process can be the basis for integrating security into a requirements driven software engineering process. We describe the i* agent-oriented modelling framework and show how it can be used to model and reason about security concerns and responses. A smart card example is used to illustrate. Future directions for a social paradigm for security and software engineering are discussed.


2008 ◽  
pp. 2462-2491 ◽  
Author(s):  
E. Yu ◽  
L. Liu ◽  
J. Mylopoulous

As software becomes more and more entrenched in everyday life in today’s society, security looms large as an unsolved problem. Despite advances in security mecha-nisms and technologies, most software systems in the world remain precarious and vulnerable. There is now widespread recognition that security cannot be achieved by technology alone. All software systems are ultimately embedded in some human social environment. The effectiveness of the system depends very much on the forces in that environment. Yet there are few systematic techniques for treating the social context of security together with technical system design in an integral way. In this chapter, we argue that a social ontology at the core of a requirements engineering process can be the basis for integrating security into a requirements driven software engineering process. We describe the i* agent-oriented modelling framework and show how it can be used to model and reason about security concerns and responses. A smart card example is used to illustrate. Future directions for a social paradigm for security and software engineering are discussed.


Author(s):  
E. Yu ◽  
L. Liu ◽  
J. Mylopoulos

As software becomes more and more entrenched in everyday life in today’s society, security looms large as an unsolved problem. Despite advances in security mechanisms and technologies, most software systems in the world remain precarious and vulnerable. There is now widespread recognition that security cannot be achieved by technology alone. All software systems are ultimately embedded in some human social environment. The effectiveness of the system depends very much on the forces in that environment. Yet there are few systematic techniques for treating the social context of security together with technical system design in an integral way. In this chapter, we argue that a social ontology at the core of a requirements engineering process can be the basis for integrating security into a requirements driven software engineering process. We describe the i* agent-oriented modelling framework and show how it can be used to model and reason about security concerns and responses. A smart card example is used to illustrate. Future directions for a social paradigm for security and software engineering are discussed.


Author(s):  
Muftah Mohamed Mohamed Omar Bakoush

Represented novel alienation real destination for cultural interaction between the ego Arab west and the other, especially in the aspects of the social and cultural life, I have sought writer Abdullah Laroui across the folds of this novel through his insistence on the inevitability of combining the core of the other gains and benefit from, according to Matanajh ego Arabic to regain its renaissance and comparable to Western culture and its development without alienation from the ego and thawing in the other trifles and hung scales civilizations that any writer calls for vision correction and select the path to be followed for the renaissance of the Arab community. The results of this paper that the relationship between the ego and the other long-term relationship with the Arab culture before it was prevalent in the world and got acculturation between them and the other was as a result of wars, as well as trade and two-way trips between East and West.    


Author(s):  
Suzanne Cahill

Since the UN Convention is being used as a compass for analysis and is the common thread linking all chapters in this book, the purpose of this chapter is to provide a broad overview of the objectives, principles and obligations contained in the Convention directly relevant to the lives of people living with dementia and their family members and to explain how the Convention works. The chapter also draws on Flynn’s typology for classifying the core themes contained in the UN Convention namely equality, participation, autonomy and solidarity, a typology which will be returned to in chapter eight. It identifies those Articles (a total of 12) which will be critically reviewed in later chapters, it explains the PANEL principles and shows that as a human rights instrument underpinned by the social model of disability, the UN Convention provides a solid basis for the reframing of dementia as a disability. The chapter concludes by discussing a number of recent events which have taken place across the world which reflect a slowly evolving rights based movement in dementia policy and practice.


2016 ◽  
Vol 22 (5) ◽  
pp. 348-356 ◽  
Author(s):  
Russell Razzaque ◽  
Tom Stockmann

SummaryPeer-supported open dialogue is a variant of the ‘open dialogue’ approach that is currently practised in Finland and is being trialled in several countries around the world. The core principle of the approach is the provision of care at the social network level, by staff who have been trained in family, systems and related approaches. These staff include peer workers, who will help to enhance the democratic nature of the meetings around which care is centred, as well as enabling such meetings to occur where networks are fragmented or lacking. Certain organisational and practice features and underlying themes are key to the approach. Crucially, open dialogue is also a system of service provision. Staff trained in peer-supported open dialogue from six National Health Service (NHS) trusts will launch pilot teams in 2016, as part of an intended national multicentre randomised controlled trial.


Author(s):  
Svend Brinkmann

This chapter introduces the philosophy of pragmatism and its application in the social sciences. In philosophy, there are disagreements between anti-realist pragmatists and realist pragmatists, but all strands of pragmatism conceive of the human being as an active, participating creature who knows the world through acting in it. Methodologically, the core of pragmatism is abduction. Unlike induction (going from many individual instances to general knowledge) and deduction (testing general hypotheses deduced from existing knowledge), abduction begins with a breakdown in our understanding of something and is oriented toward making the indeterminate more determinate in order to facilitate action. This chapter also argues that the pragmatist research ethos can often be described as “making the hidden dubious” because there is a focus on action—what we do, how we experience it, and what the consequences are—rather than on hidden social structures or deeper layers of the social world.


2009 ◽  
pp. 743-772
Author(s):  
E. Yu ◽  
L. Liu ◽  
J. Mylopoulos

As software becomes more and more entrenched in everyday life in today’s society, security looms large as an unsolved problem. Despite advances in security mechanisms and technologies, most software systems in the world remain precarious and vulnerable. There is now widespread recognition that security cannot be achieved by technology alone. All software systems are ultimately embedded in some human social environment. The effectiveness of the system depends very much on the forces in that environment. Yet there are few systematic techniques for treating the social context of security together with technical system design in an integral way. In this chapter, we argue that a social ontology at the core of a requirements engineering process can be the basis for integrating security into a requirements driven software engineering process. We describe the i* agent-oriented modelling framework and show how it can be used to model and reason about security concerns and responses. A smart card example is used to illustrate. Future directions for a social paradigm for security and software engineering are discussed.


2020 ◽  
pp. 48-64
Author(s):  
Graham Harrison

This chapter makes a critical assessment of the capabilities approach (CA). It sets out the core features of the CA and highlights its focus on local livelihoods and its development vision of incremental change. It notes the normative attractiveness of this position, and its focus on individual experiences. It then goes on to identify a series of limitations to this approach. It argues that the CA is excessively inclusive, using rights-speak to see all change as either good or bad. It also has a weak understanding of social relations because it focuses on individuals at the expense of structures. It argues that its liberal understanding of individual agency means that it fails to understand the social construction of agency. The chapter ends by sketching how the inability of capabilities to generate a theory of structural change leaves it limited in ambition and inattentive to history.


1997 ◽  
pp. 3-8
Author(s):  
Borys Lobovyk

An important problem of religious studies, the history of religion as a branch of knowledge is the periodization process of the development of religious phenomenon. It is precisely here, as in focus, that the question of the essence and meaning of the religious development of the human being of the world, the origin of beliefs and cult, the reasons for the changes in them, the place and role of religion in the social and spiritual process, etc., are converging.


Sign in / Sign up

Export Citation Format

Share Document