Qualitative Social Work, 10(4), December 2011, pp.520-536.
Publisher:
Sage
This article describes how, in the context of debate about social work's knowledge base, core social work activity might be identified. Based on a conversation between a social worker and two service users, two claims are made. First, that despite concerns with uncertainty in late modernity, some features of interaction remain inherently certain. These include: ‘materiality’, or the setting and its participants are taken as real; ‘identity’, or that participants engage on the basis that they are who they say they are; ‘taken for granted aspects of social organisation’, or all participants can hold a conversation until shown otherwise; and ‘historicity’, referring to a pre-existing set of accounts, justifications, reasons and communicative orderings. The authors concluded that these expectations provide the resource for topic seeking and practices that may be necessary to social work such as ‘authorized breaching of the domestic sphere and private life’.
This article describes how, in the context of debate about social work's knowledge base, core social work activity might be identified. Based on a conversation between a social worker and two service users, two claims are made. First, that despite concerns with uncertainty in late modernity, some features of interaction remain inherently certain. These include: ‘materiality’, or the setting and its participants are taken as real; ‘identity’, or that participants engage on the basis that they are who they say they are; ‘taken for granted aspects of social organisation’, or all participants can hold a conversation until shown otherwise; and ‘historicity’, referring to a pre-existing set of accounts, justifications, reasons and communicative orderings. The authors concluded that these expectations provide the resource for topic seeking and practices that may be necessary to social work such as ‘authorized breaching of the domestic sphere and private life’.
Subject terms:
privacy, social work, social workers, social worker-service user relationships;
Ageing and Society, 31(8), November 2011, pp.1350-1367.
Publisher:
Cambridge University Press
... detectors are classified under four headings: autonomy; privacy; benefit; and the use of resources. It is argued that these issues arise out of the nature of the technology itself, and the way that this technology is integrated into the day-to-day support package of the person for whom it is provided. It is suggested that manufacturers have a duty to provide information about the ethical side-effects
This article explores the ethical issues raised by the use of fall detectors – a form of remote monitoring technology designed to enhance the well-being of adults at risk from falling. The article begins with a description of the fall detection devices currently available and a summary of how these devices carers to respond in particular ways. The ethical issues associated with the use of fall detectors are classified under four headings: autonomy; privacy; benefit; and the use of resources. It is argued that these issues arise out of the nature of the technology itself, and the way that this technology is integrated into the day-to-day support package of the person for whom it is provided. It is suggested that manufacturers have a duty to provide information about the ethical side-effects associated with the use of a particular device, and that the process of making a decision to provide a person with a fall detector should include a checklist of questions designed to enable decision makers to work through the ethical issues raised. Implications for practice are discussed.
Subject terms:
older people, privacy, assistive technology, falls, ethics;
... to. The article explores children’s view and the consultation process, it examines why children’s views be taken into account, and what else can be done to protect their privacy. The article concludes that media attention interferes with children’s privacy; although this was overlooked by the previous government in its efforts to provide open, accountable family justice, this situation can still be changed.
Evidence suggests that children and young people are opposed to the public and media attending court proceedings that affect them. This article discusses the opening up of family courts to media and members of the public in light of the Family Justice Review Panel's interim report. It argues that this may be a concern for children and young people and that their views should be listened to. The article explores children’s view and the consultation process, it examines why children’s views be taken into account, and what else can be done to protect their privacy. The article concludes that media attention interferes with children’s privacy; although this was overlooked by the previous government in its efforts to provide open, accountable family justice, this situation can still be changed.
Subject terms:
mass media, privacy, young people, children, Family Courts;
The purpose of this study was to develop a privacy framework that could inform the development, adoption, and use of home-based technologies for older adults. A five-part privacy framework was developed and then tested through a qualitative exploration of older adults’ perceptions. Focus-group sessions were conducted with 64 community-dwelling older adults. Transcriptions were analyzed using a grounded-theory approach. Participants’ concerns about privacy were more contextualized than the previously defined framework. Factors that influenced perceptions of privacy were identified as perceived usefulness, the importance of social relationships, data granularity, and the sensitivity of activities. Data analysis and gerontological theory was then used to develop a new framework. It is concluded
The purpose of this study was to develop a privacy framework that could inform the development, adoption, and use of home-based technologies for older adults. A five-part privacy framework was developed and then tested through a qualitative exploration of older adults’ perceptions. Focus-group sessions were conducted with 64 community-dwelling older adults. Transcriptions were analyzed using a grounded-theory approach. Participants’ concerns about privacy were more contextualized than the previously defined framework. Factors that influenced perceptions of privacy were identified as perceived usefulness, the importance of social relationships, data granularity, and the sensitivity of activities. Data analysis and gerontological theory was then used to develop a new framework. It is concluded that older people's perception of risk that may be less than actual risk, and that technologies should enable user-centered transparent data control.
Guidance and information for social workers and social services staff on using social media, including sites such as Twitter and Facebook. The document describes what social media is, cautions against befriending service users on sites and warns against posting personal information.
Guidance and information for social workers and social services staff on using social media, including sites such as Twitter and Facebook. The document describes what social media is, cautions against befriending service users on sites and warns against posting personal information.
Subject terms:
internet, professional role, privacy, social media, social networks, social care staff, social workers;
British Association for Counselling and Psychotherapy
Online counselling has been developing rapidly in recent years. This article describes a study of one of the earlier applications of online counselling, namely asynchronous counselling by e-mail. A university counselling service introduced online counselling through the exchange of up to 8 weekly e-mails. The service was introduced to offer counselling opportunities to students away from the university and to appeal to those reluctant to attend face-to-face sessions. This study aimed to explore the effects of online counselling on the therapeutic encounter and relationship. Ten former clients completed a 2-stage semi-structured interview process and the interviews were then analysed using interpretative phenomenological analysis. In addition, 6 online counsellors offering e-mail counselling in other university counselling services were also interviewed. The responses were predominately very positive. The participants stressed the value of anonymity, and the openness arising from the disinhibitory nature of the medium. Another important factor was the greater control over thinking space and time. The article concludes that the asynchronous counselling approach overcame barriers for clients, providing safety, control, anonymity, disinhibition, time to think, and a permanent record of their engagement in counselling.
Online counselling has been developing rapidly in recent years. This article describes a study of one of the earlier applications of online counselling, namely asynchronous counselling by e-mail. A university counselling service introduced online counselling through the exchange of up to 8 weekly e-mails. The service was introduced to offer counselling opportunities to students away from the university and to appeal to those reluctant to attend face-to-face sessions. This study aimed to explore the effects of online counselling on the therapeutic encounter and relationship. Ten former clients completed a 2-stage semi-structured interview process and the interviews were then analysed using interpretative phenomenological analysis. In addition, 6 online counsellors offering e-mail counselling in other university counselling services were also interviewed. The responses were predominately very positive. The participants stressed the value of anonymity, and the openness arising from the disinhibitory nature of the medium. Another important factor was the greater control over thinking space and time. The article concludes that the asynchronous counselling approach overcame barriers for clients, providing safety, control, anonymity, disinhibition, time to think, and a permanent record of their engagement in counselling.
Journal of Dementia Care, 19(5), September 2011, p.12.
Publisher:
Hawker
St Cecilia’s, a privately run residential home, in Scarborough, England, provides support for 21 people with dementia. Staff conduct routine checks though the night to ensure guests are both safe and comfortable. However, the checking process can be time consuming for staff, and intrusive for residents. This study aimed to establish whether telecare equipment would prove to be beneficial in the care and management of residents, through the installation of telecare sensors such as enuresis, bed occupancy and door exits. The study was conducted from June 2009 to August 2010, in order to gain insight on the long term benefits of the technology. Findings indicated that all residents benefitted from the use of telecare. Staff noted that the sensors enabled them to respond directly to possible risk, and productivity increased as staff were able to continue with other tasks in the knowledge that the residents were safe.
St Cecilia’s, a privately run residential home, in Scarborough, England, provides support for 21 people with dementia. Staff conduct routine checks though the night to ensure guests are both safe and comfortable. However, the checking process can be time consuming for staff, and intrusive for residents. This study aimed to establish whether telecare equipment would prove to be beneficial in the care and management of residents, through the installation of telecare sensors such as enuresis, bed occupancy and door exits. The study was conducted from June 2009 to August 2010, in order to gain insight on the long term benefits of the technology. Findings indicated that all residents benefitted from the use of telecare. Staff noted that the sensors enabled them to respond directly to possible risk, and productivity increased as staff were able to continue with other tasks in the knowledge that the residents were safe.
Subject terms:
older people, privacy, residential care, risk management, telecare, assistive technology;
Smith College Studies in Social Work, 81(1), 2011, pp.7-25.
Publisher:
Taylor and Francis
Place of publication:
Philadelphia, USA
... clinical case material. The article summarises participants' responses, with examples. The study found that the participants shared strong commitments to their clients' rights to privacy and the need to maintain confidentiality, but generally expressed confusion and ambivalence about preferred means of protecting the privacy, including concerns about seeking informed consent from clients.
Based on a qualitative study of 8 professionals, this article summarises perceptions of experienced social work clinicians and journal editors about the ethical dilemmas of publishing confidential case material in writing about clinical practice. The article presents a brief review of the literature on the topic, describes the methodology of the study, and discusses the findings. All participants were clinical social workers, 3 had published professional and academic books on social work practice, and 4 were editors of social work journals at the time of the interviews. The interviews explored the participants' education and training, experiences with clinical writing, ethical and therapeutic challenges encountered in clinical writing, and personal and professional policies about publishing clinical case material. The article summarises participants' responses, with examples. The study found that the participants shared strong commitments to their clients' rights to privacy and the need to maintain confidentiality, but generally expressed confusion and ambivalence about preferred means of protecting the privacy, including concerns about seeking informed consent from clients.
Subject terms:
professional conduct, privacy, service users, social workers, case studies, confidentiality, ethics;
Ageing and Society, 31(6), August 2011, pp.934-952.
Publisher:
Cambridge University Press
... living facilities. It also describes the assisted living facility studied, which catered for 13 residents. Information for the qualitative study was collected through observations and personal interviews with staff and residents, over 15 months of fieldwork with 1-2 visits a week. The article reports the results of the analysis, covering routines and privacy,privacy in residents' rooms, public dimensions of residents' rooms, control of access to residents' rooms, and privacy in the public spaces. The study found that during the course of a day residents' privacy was qualified and structured by caring activities that took place in various spaces, that individualised care practices improved privacy for the resident, that residents had more control of access to their private rooms than control of their personal space in public areas, and that although constrained by architectural features, staff used a number of spatial strategies to promote the residents' privacy, for example at mealtimes or when care was provided in residents' private rooms. The author concludes that residential care can contribute to a resident's privacy where staff cultivate a resident's right to personal space through
A case study project examined the relationship between the architectural design of an assisted living facility in Sweden and the care provided by the staff to the residents. This article explains the context of assisted living in Sweden, where most assisted living residents are of advanced age and suffer from multiple conditions and/or dementia, and the general elements of design of assisted living facilities. It also describes the assisted living facility studied, which catered for 13 residents. Information for the qualitative study was collected through observations and personal interviews with staff and residents, over 15 months of fieldwork with 1-2 visits a week. The article reports the results of the analysis, covering routines and privacy, privacy in residents' rooms, public dimensions of residents' rooms, control of access to residents' rooms, and privacy in the public spaces. The study found that during the course of a day residents' privacy was qualified and structured by caring activities that took place in various spaces, that individualised care practices improved privacy for the resident, that residents had more control of access to their private rooms than control of their personal space in public areas, and that although constrained by architectural features, staff used a number of spatial strategies to promote the residents' privacy, for example at mealtimes or when care was provided in residents' private rooms. The author concludes that residential care can contribute to a resident's privacy where staff cultivate a resident's right to personal space through individualised care, negotiations of acceptability, and spatial strategies.
Subject terms:
older people, privacy, residential care, rights, supported living, building design;
Teenagers’ habitual use of and reliance on digital technology as an essential means of peer networking has widely featured sending nude of semi-nude pictures of themselves to friends, or posting them on social networking sites. ‘Sexting’ describes a spectrum of behaviours ranging from what is intended as a private exchange of images, to ‘sextortion’ – securing images without the informed consent or knowledge of the subject for the purpose of blackmail. This article examines how the criminal justice system should respond. It suggests that the use of conventional child pornography legislation can be inappropriately heavy-handed and draconian, considering the age group of offenders. The article considers recent developments in the United States and asks how this mode of juvenile indiscretion fits with law, policy and practice in England and Wales. It examines alternative charges applicable to minor offenders, and related sentencing.
Teenagers’ habitual use of and reliance on digital technology as an essential means of peer networking has widely featured sending nude of semi-nude pictures of themselves to friends, or posting them on social networking sites. ‘Sexting’ describes a spectrum of behaviours ranging from what is intended as a private exchange of images, to ‘sextortion’ – securing images without the informed consent or knowledge of the subject for the purpose of blackmail. This article examines how the criminal justice system should respond. It suggests that the use of conventional child pornography legislation can be inappropriately heavy-handed and draconian, considering the age group of offenders. The article considers recent developments in the United States and asks how this mode of juvenile indiscretion fits with law, policy and practice in England and Wales. It examines alternative charges applicable to minor offenders, and related sentencing.
Subject terms:
information technology, pornography, privacy, sentences, social media, young sex offenders, youth justice, child sexual abuse;