Skip to main content
ISBN 0-9541898-9-2
This followed a two year evaluation from the implementation of the 2004 Act by Her Majesty’s Inspector of Education (HMIE) in Scotland. Based on the findings published in their report in November 2007, and several Court of Session... more
This followed a two year evaluation from the implementation of the 2004 Act by Her Majesty’s Inspector of Education (HMIE) in Scotland. Based on the findings published in their report in November 2007, and several Court of Session judgements concerning its interpretation, technical amendments were made to the 2004 Act in the Education (Additional Support for Learning) (Scotland) Act 2009 (“the 2009 Act”).
This Bill Research Paper provides information on what is contained in the Education Bill which was introduced in the Northern Ireland Assembly on 25 November 2008 and received its Second Stage on 8 December 2008. It is the first of two... more
This Bill Research Paper provides information on what is contained in the Education Bill which was introduced in the Northern Ireland Assembly on 25 November 2008 and received its Second Stage on 8 December 2008. It is the first of two Bills arising from the Review of Public Administration linked to the review of education policy. The Bill Paper gives an overview of what is contained in the Bill and highlights some of the issues that have caused concern and discussion among stakeholders.
ABSTRACT
On 3 February 2010 the Northern Ireland Nurture Group Network gave a briefing to the Education Committee of the Northern Ireland Assembly. The group advised the Committee that its activities in schools across Northern Ireland have, to... more
On 3 February 2010 the Northern Ireland Nurture Group Network gave a briefing to the Education Committee of the Northern Ireland Assembly. The group advised the Committee that its activities in schools across Northern Ireland have, to date, been supported by funding outside the core education budget. These sources of funding are coming to an end with the nurture groups they are funding at risk of imminent closure.
... the Black and Minority Ethnic Communities in Northern Ireland Katy Radford, Jennifer Betts and Malcolm Ostermeyer Policing, A ccountability and ... Communities in Northern Ireland Katy Radford,Jennifer Betts and Malcolm Ostermeyer... more
... the Black and Minority Ethnic Communities in Northern Ireland Katy Radford, Jennifer Betts and Malcolm Ostermeyer Policing, A ccountability and ... Communities in Northern Ireland Katy Radford,Jennifer Betts and Malcolm Ostermeyer Page 3. First Published February 2006 ...
ABSTRACT Abstract In this article we explore how self-regulation by the advertising industry has failed to address the exploitation of users’ personal information for targeted advertising through the use of smartphone application (app)... more
ABSTRACT Abstract In this article we explore how self-regulation by the advertising industry has failed to address the exploitation of users’ personal information for targeted advertising through the use of smartphone application (app) permissions. Currently smartphone apps are posing a privacy risk of which users are largely unaware. Personal information can be accessed when app permissions make requests to use phone functions that are unnecessary for the operation of the app. These can include access to users’ contact lists, emails and calendars and are sought by advertising networks, rather than the app developer. They can then surreptitiously gather personal user data to serve targeted advertising, but also to sell to other advertising networks and online businesses. Recent market research emphasising consumer trust and loyalty as a key asset for online businesses provides an opportunity for a change in the regulation of the advertising industry. We argue that the lack of transparency and self-regulatory enforcement demonstrated by app permission exploitation shows the potential for continued circumvention of privacy regulation by an industry with expertise in technological development and driven by profit. We therefore argue in favour of the introduction of co-regulation to provide the monitoring and enforcement powers that are clearly lacking in a continued reliance on self-regulation.
ABSTRACT Protection of critical infrastructures has a growing role in national security issues. These include power and water supplies, traffic management systems, financial services and communication networks. Attacks on any of these can... more
ABSTRACT Protection of critical infrastructures has a growing role in national security issues. These include power and water supplies, traffic management systems, financial services and communication networks. Attacks on any of these can damage economies, cause disasters and may lead to loss of life. Dependence on critical infrastructures in modern societies makes them targets for organized crime and terrorism. Their protection is vital to national security and public safety. This paper highlights the importance of ethical principles in the design of critical infrastructure network protection systems, focusing on privacy and data protection. It introduces our research addressing privacy in the design of one such system funded by the European Commission's FP7 Programme. Debates surrounding national security and privacy involve policy makers, regulators, academics, security engineers and the public. A proposal from the designer of the Privacy by Design framework is discussed and the paper concludes by challenging policy makers, researchers and the technology industry to review and develop such proposals and enable the protection of national security and privacy.
... the Black and Minority Ethnic Communities in Northern Ireland Katy Radford, Jennifer Betts and Malcolm Ostermeyer Policing, A ccountability and ... Communities in Northern Ireland Katy Radford,Jennifer Betts and Malcolm Ostermeyer... more
... the Black and Minority Ethnic Communities in Northern Ireland Katy Radford, Jennifer Betts and Malcolm Ostermeyer Policing, A ccountability and ... Communities in Northern Ireland Katy Radford,Jennifer Betts and Malcolm Ostermeyer Page 3. First Published February 2006 ...
ABSTRACT Abstract In this article we explore how self-regulation by the advertising industry has failed to address the exploitation of users’ personal information for targeted advertising through the use of smartphone application (app)... more
ABSTRACT Abstract In this article we explore how self-regulation by the advertising industry has failed to address the exploitation of users’ personal information for targeted advertising through the use of smartphone application (app) permissions. Currently smartphone apps are posing a privacy risk of which users are largely unaware. Personal information can be accessed when app permissions make requests to use phone functions that are unnecessary for the operation of the app. These can include access to users’ contact lists, emails and calendars and are sought by advertising networks, rather than the app developer. They can then surreptitiously gather personal user data to serve targeted advertising, but also to sell to other advertising networks and online businesses. Recent market research emphasising consumer trust and loyalty as a key asset for online businesses provides an opportunity for a change in the regulation of the advertising industry. We argue that the lack of transparency and self-regulatory enforcement demonstrated by app permission exploitation shows the potential for continued circumvention of privacy regulation by an industry with expertise in technological development and driven by profit. We therefore argue in favour of the introduction of co-regulation to provide the monitoring and enforcement powers that are clearly lacking in a continued reliance on self-regulation.
ABSTRACT Protection of critical infrastructures has a growing role in national security issues. These include power and water supplies, traffic management systems, financial services and communication networks. Attacks on any of these can... more
ABSTRACT Protection of critical infrastructures has a growing role in national security issues. These include power and water supplies, traffic management systems, financial services and communication networks. Attacks on any of these can damage economies, cause disasters and may lead to loss of life. Dependence on critical infrastructures in modern societies makes them targets for organized crime and terrorism. Their protection is vital to national security and public safety. This paper highlights the importance of ethical principles in the design of critical infrastructure network protection systems, focusing on privacy and data protection. It introduces our research addressing privacy in the design of one such system funded by the European Commission's FP7 Programme. Debates surrounding national security and privacy involve policy makers, regulators, academics, security engineers and the public. A proposal from the designer of the Privacy by Design framework is discussed and the paper concludes by challenging policy makers, researchers and the technology industry to review and develop such proposals and enable the protection of national security and privacy.
ABSTRACT
Protection of critical infrastructures has a growing role in national security issues. These include power and water supplies, traffic management systems, financial services and communication networks. Attacks on any of these can damage... more
Protection of critical infrastructures has a growing role in
national security issues. These include power and water
supplies, traffic management systems, financial services and
communication networks. Attacks on any of these can damage
economies, cause disasters and may lead to loss of life.
Dependence on critical infrastructures in modern societies
makes them targets for organized crime and terrorism. Their
protection is vital to national security and public safety. This
paper highlights the importance of ethical principles in the
design of critical infrastructure network protection systems,
focusing on privacy and data protection. It introduces our
research addressing privacy in the design of one such system
funded by the European Commission’s FP7 Programme.
Debates surrounding national security and privacy involve
policy makers, regulators, academics, security engineers and
the public. A proposal from the designer of the Privacy by
Design framework is discussed and the paper concludes by
challenging policy makers, researchers and the technology
industry to review and develop such proposals and enable the
protection of national security and privacy.
Research Interests:
Research Interests: