scholarly journals Administrator danych w polskich parkach narodowych (wybrane aspekty prawno-administracyjne)

2019 ◽  
pp. 41-51
Author(s):  
Jarosław Dobkowski ◽  
Jakub Goerick

The article presents an outline of the problem of determining personal data administrator in the public sphere on the example of one of the forms of nature protection in Poland – national parks. The research focused on the differences between legal defnitions of a data controller that has an essential impact on the process of separating a data controller in a national park. The whole is fnished with de lege ferenda postulates, which would solve this problem. 

2018 ◽  
Vol 6 (2) ◽  
Author(s):  
Aminah Swarnawati ◽  
Amiruddin Saleh ◽  
Basita Ginting ◽  
Endriatmo Soetarto ◽  
Arif Satria

<p>Conservation programs in Kepulauan Seribu National Park (TNKpS) need communication space in order to attract target group participation, It is necessary for for community of fisherman to talk each regarding conservation policies addressed to.Public sphere defines asa freepolitical and economic domination elements space, existing public sphere in TNKpS have physical or non-physical characteristics, actors either co-opted or not co-opted, and their political public sphere either authentic or un-authentic.There was a two-way dialogical communicatio in public sphere. Dialogue in the public sphere was seen from five types: technical dialogue, debate, genuine dialogue, reconciliation and critical, the results show only the genuine dialogue that occurred.Five obstacles in dialogical communication did not occurred to traditional small fishermen, they were not protective nor defensive to information and were mostly concerned with appropriate information, the time for dialogue is enough. Obstacles tendency to evaluate occurs in critical fishermen.<br />Keyword: conservation, dialogue communication, environmental communication,national park, public sphere</p><p><br />ABSTRAK<br />Program konservasi di Taman Nasional Kepulauan Seribu (TNKpS) membutuhkan ruang komunikasi supaya bisa menarik partisipasi kelompok sasaran, untuk itu diperlukan ruang publik bagi warga untuk saling berdialog membicarakan masalah terkait kebijakan konservasi yang ditujukan kepada mereka. Ruang publik sebagai ruang yang bebas dari unsur dominasi politik maupun ekonomi, baik yang bersifat fisik maupun non fisik, aktornya baik yang dikooptasi maupun tidak dikooptasi, dan ruang publik politiknya baik yang autentik maupun tidak autentik. Dalam ruang publik terjadi komunikasi dialogis yang bersifat dua arah. Dialog yang terjadi di ruang publik dilihat dari tiga jenis: dialog teknis, debat dan dialog asli. Dua elemen penting komunikasi dialogis yaitu listening dan understanding. Ada lima kendala dalam komunikasi dialogis: protektif, defensif, kecenderungan mengevaluasi, ekspektasi yang tidak sesuai dan kurangnya waktu. Penelitian berparadigm kritis dengan pendekatan kualitatif ini menggunakan teori kritis Habermas mengenai ruang publik dan teori tindakan komunikatif dalam perspektif komunikasi lingkungan.<br />Kata kunci: komunikasi dialogis, komunikasi lingkungan, konservasi, ruang publik, taman nasional</p>


Author(s):  
Lilian Mitrou ◽  
Maria Karyda

This chapter addresses the issue of electronic workplace monitoring and its implications for employees’ privacy. Organizations increasingly use a variety of electronic surveillance methods to mitigate threats to their information systems. Monitoring technology spans different aspects of organizational life, including communications, desktop and physical monitoring, collecting employees’ personal data, and locating employees through active badges. The application of these technologies raises privacy protection concerns. Throughout this chapter, we describe different approaches to privacy protection followed by different jurisdictions. We also highlight privacy issues with regard to new trends and practices, such as teleworking and use of RFID technology for identifying the location of employees. Emphasis is also placed on the reorganization of work facilitated by information technology, since frontiers between the private and the public sphere are becoming blurred. The aim of this chapter is twofold: we discuss privacy concerns and the implications of implementing employee surveillance technologies and we suggest a framework of fair practices which can be used for bridging the gap between the need to provide adequate protection for information systems, while preserving employees’ rights to privacy.


Author(s):  
Vahri G. Mckenzie

Only the Envelope (OTE) combines research methodologies to investigate the ways we share personal information in the public sphere, and document our practices as scholartists. In a live art installation, a “scientist” invited visitors to be involved in an “experiment”: viewing a film while wearing a wireless eye-tracking device. This surveillance technology generated data about viewing behaviour, but of more interest, the work staged encounters that dramatize the act of looking. Engaging in OTE as performance research led to unanticipated findings and the creation of new audiovisual documents when the eye-tracking device was redeployed as a head-mounted camera to reenact the visitor’s experience. These documents extend the work’s artistic outcomes, but are they “the work” or “records” of the work? OTE engages with the traditional debate in performance studies about the supposed ephemerality of performance by illustrating Schneider’s position that the live is a vehicle for recurrence such that a distinction between record and performance collapses, and that photography can mix theatricality and documentality (2011). OTE refused to keep still to submit to its documentation, just as personal data in the public sphere is endlessly generated, captured and recycled in unstable recursion. My acknowledgements are due to research assistant and performer Rachelle Rechichi; technology consultant Neil Ferguson; to all partici¬pants, consenting and otherwise; to eResearch Coordinator Heather Boyd, who reached out to me as a creative arts researcher; to Edith Cowan University’s eResearch Technology Funding Scheme, and School of Arts and Humanities, for their financial support.


Author(s):  
Lilian Mitrou

This chapter addresses the issue of electronic workplace monitoring and its implications for employees’ privacy. Organisations increasingly use a variety of electronic surveillance methods to mitigate threats to their information systems. Monitoring technology spans different aspects of organisational life, including communications, desktop and physical monitoring, collecting employees’ personal data, and locating employees through active badges. The application of these technologies raises privacy protection concerns. Throughout this chapter, we describe different approaches to privacy protection followed by different jurisdictions. We also highlight privacy issues with regard to new trends and practices, such as teleworking and use of RFID technology for identifying the location of employees. Emphasis is also placed on the reorganisation of work facilitated by information technology, since frontiers between the private and the public sphere are becoming blurred. The aim of this chapter is twofold: we discuss privacy concerns and the implications of implementing employee surveillance technologies and we suggest a framework of fair practices which can be used for bridging the gap between the need to provide adequate protection for information systems, while preserving employees’ rights to privacy.


2014 ◽  
Vol 7 (1) ◽  
pp. 64-77
Author(s):  
Doris Wolf

This paper examines two young adult novels, Run Like Jäger (2008) and Summer of Fire (2009), by Canadian writer Karen Bass, which centre on the experiences of so-called ordinary German teenagers in World War II. Although guilt and perpetration are themes addressed in these books, their focus is primarily on the ways in which Germans suffered at the hands of the Allied forces. These books thus participate in the increasingly widespread but still controversial subject of the suffering of the perpetrators. Bringing work in childhood studies to bear on contemporary representations of German wartime suffering in the public sphere, I explore how Bass's novels, through the liminal figure of the adolescent, participate in a culture of self-victimisation that downplays guilt rather than more ethically contextualises suffering within guilt. These historical narratives are framed by contemporary narratives which centre on troubled teen protagonists who need the stories of the past for their own individualisation in the present. In their evacuation of crucial historical contexts, both Run Like Jäger and Summer of Fire support optimistic and gendered narratives of individualism that ultimately refuse complicated understandings of adolescent agency in the past or present.


2018 ◽  
Vol 11 (1-2) ◽  
pp. 43-62
Author(s):  
Wisam Kh. Abdul-Jabbar

This study explores Habermas’s work in terms of the relevance of his theory of the public sphere to the politics and poetics of the Arab oral tradition and its pedagogical practices. In what ways and forms does Arab heritage inform a public sphere of resistance or dissent? How does Habermas’s notion of the public space help or hinder a better understanding of the Arab oral tradition within the sociopolitical and educational landscape of the Arabic-speaking world? This study also explores the pedagogical implications of teaching Arab orality within the context of the public sphere as a contested site that informs a mode of resistance against social inequality and sociopolitical exclusions.


2019 ◽  
Vol 12 (4) ◽  
pp. 83-103
Author(s):  
Mai Mogib Mosad

This paper maps the basic opposition groups that influenced the Egyptian political system in the last years of Hosni Mubarak’s rule. It approaches the nature of the relationship between the system and the opposition through use of the concept of “semi-opposition.” An examination and evaluation of the opposition groups shows the extent to which the regime—in order to appear that it was opening the public sphere to the opposition—had channels of communication with the Muslim Brotherhood. The paper also shows the system’s relations with other groups, such as “Kifaya” and “April 6”; it then explains the reasons behind the success of the Muslim Brotherhood at seizing power after the ousting of President Mubarak.


Sign in / Sign up

Export Citation Format

Share Document