Search results

1 – 6 of 6
Content available
Book part
Publication date: 9 March 2021

Abstract

Details

The Emerald Handbook of Blockchain for Business
Type: Book
ISBN: 978-1-83982-198-1

Abstract

Details

The Emerald Handbook of Blockchain for Business
Type: Book
ISBN: 978-1-83982-198-1

Keywords

Book part
Publication date: 17 February 2022

Theodore Greene

This chapter draws on 10 years of ethnographic fieldwork collected in gay bars from three American cities to explore the strategies LGBTQ subcultures deploy to recreate meaningful…

Abstract

This chapter draws on 10 years of ethnographic fieldwork collected in gay bars from three American cities to explore the strategies LGBTQ subcultures deploy to recreate meaningful places within the vestiges of local queer nightlife. As gentrification and social acceptance accelerate the closures of LGBTQ-specific bars and nightclubs worldwide, venues that once served a specific LGBTQ subculture (i.e., leather bars) expand their offerings to incorporate displaced LGBTQ subcultures. Attending to how LGBTQ subcultures might appropriate designated spaces within a gay venue to support community (nightlife complexes), how management and LGBT subcultures temporally circumscribe subcultural practices and traditions to create fleeting, but recurring places (episodic places), and how patrons might disrupt an existing production of place by imposing practices associated with a discrepant LGBTQ subculture(place ruptures), this chapter challenges the notion of “the gay bar” as a singular place catering to a specific subculture. Instead, gay bars increasingly constitute a collection of places within the same space, which may shift depending on its use by patrons occupying the space at any given moment. Beyond the investigation of gay bars, this chapter contributes to the growing sociological literature exploring the multifaceted, unstable, and ephemeral nature of place and place-making in the postmodern city.

Book part
Publication date: 9 March 2021

H. Kent Baker, Ehsan Nikbakht and Sean Stein Smith

Blockchain is an emerging technology that started in the cryptocurrency sphere with bitcoin but expanded to include numerous applications. This chapter provides an overview of the…

Abstract

Blockchain is an emerging technology that started in the cryptocurrency sphere with bitcoin but expanded to include numerous applications. This chapter provides an overview of the book. It begins by identifying the three main components of a blockchain. Next, it discusses the book's purpose, distinguishing features, and its intended audience. The chapter then outlines the book's structure, consisting of 22 chapters divided into four main parts. It offers a brief synopsis of each section and chapter. Finally, it ends with a summary and conclusions.

Details

The Emerald Handbook of Blockchain for Business
Type: Book
ISBN: 978-1-83982-198-1

Keywords

Article
Publication date: 9 December 2011

Randall Smith, Julia Johnson and Sheena Rolph

The purpose of this paper is to examine the history of pet ownership and its relationship to wellbeing in later life. In particular, the paper addresses the issue of pet ownership…

722

Abstract

Purpose

The purpose of this paper is to examine the history of pet ownership and its relationship to wellbeing in later life. In particular, the paper addresses the issue of pet ownership in communal residential settings for older people both now and in the past, comparing attitudes, policies, and practices in regard to pets in the late 1950s with the early years of the twenty‐first century.

Design/methodology/approach

Following a review of the research literature on older people and companion animals, the paper draws on new data derived from recent research conducted by the authors. It compares archived material on the residential homes for older people that Peter Townsend visited in the late 1950s as part of his classic study, The Last Refuge (1962), with findings from revisiting a sample of these homes 50 years later. The authors employed the same methods as Townsend (observation together with interviews with managers and residents).

Findings

The historical dimension of the research reveals ambivalence both in the past and in present times in respect of residents' pets in care homes. Top‐down controlling regimes in the past have been replaced by concerns about health and safety and the need to strike a balance between rights, risks, and responsibilities. The variations in current policy and practice in England and Wales seem to reflect the subjective views and experiences of care home managers and proprietors. The lesson seems to be that care home owners should be expected to have an explicit policy in regard to the keeping of companion animals, but one that is not dictated by law.

Originality/value

The longitudinal data drawn on in this paper add a new perspective to research on older people and pets in care homes.

Details

Quality in Ageing and Older Adults, vol. 12 no. 4
Type: Research Article
ISSN: 1471-7794

Keywords

Article
Publication date: 9 October 2017

Argha Ray and Anjali Kaushik

Cyberspace is a virtual environment where instantaneous communications are initiated and consumed using computer networks without any natural or artificial boundaries. These…

Abstract

Purpose

Cyberspace is a virtual environment where instantaneous communications are initiated and consumed using computer networks without any natural or artificial boundaries. These communications are not only an exchange of information but also a catharsis on the socio-political environment of the real world. This explosion of electronic expression is often detrimental to the traditional secretive maneuvers of nation states and the exercise of its power. Unable to come to terms with the new reality nation states through legislative action or otherwise attempt to assert its sovereignty in the space that has no political and societal boundaries. This may lead to an encroachment on basic human rights that often have constitutional guarantees in the real world but may be violated in the online milieu. This paper aims to investigate this issue in detail and evaluate whether nation states are using cyber-security as a propaganda tool to transgress on electronic expression.

Design/methodology/approach

The Website of the UN Office of the High Commissioner for Human Rights states “In December 2013, the United Nations General Assembly adopted resolution 68/167, which expresses deep concern at the negative impact that surveillance and interception of communications may have on human rights”. It further says “The General Assembly called on all States to review their procedures, practices and legislation related to communications surveillance, interception and collection of personal data and emphasized the need for States to ensure the full and effective implementation of their obligations under international human rights law”. With this development, this paper seeks to unravel the role of nation states in using cybersecurity as a propaganda tool by raising the specter of threat to national security and economic wellbeing. The paper is based on exploratory research with data compilation from secondary sources. To collect data, various research papers, books and journals have been referenced and data available in public domain has been accumulated.

Findings

This paper has tried to unravel state action on cyberspace which often runs counter to the concept of civil liberties. It indicates that in terms of both national security and economic impact, cybercrime represent a very nominal threat vector. Also, cybercrime as compared with other forms of crime is again nominal. Finally, cyber laws and policies of different countries need to be more nuanced such as to allow space for civil liberties. Overall, the propaganda surrounding the malaise of cybercrime seems to be more hype than real. We already have examples of countries who have transgressed into electronic expression in cyber space. Therefore, UN has a valid reason to raise a red flag on this unfolding issue.

Originality/value

This paper was published at 21st Americas Conference of Information Systems held at Puerto Rico, USA, between August 13-15, 2015 (AMCIS, 2015). The authors of this paper seek review by Editors of the Journal for Republication of original work. The authors have taken cognizance of the Originality Guidelines for Emerald published at this URL www.emeraldgrouppublishing.com/authors/writing/originality.htm

Details

Information & Computer Security, vol. 25 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 6 of 6