Acknowledgements

Acknowledgments

The content acknowledged below is Proprietary (see terms and conditions) and is used under licence.

Cartoon: "We all want to crack down on crime" David Austin

Figure 1: Croall, H. (1998) Crime and Society in Britain, Addison Wesley Longman Ltd;
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

4.7 Summary

  • The social sciences have generated a range of explanations of criminal behaviour, running on a spectrum from overwhelmingly structural causes to overwhelmingly agency-driven causes.

  • Structural explanations locate the causes of criminality in abnormal or deviant biologies, pathological or problem families and deviant sub-cultures.

  • Agency-driven explanations, like rational choice theory, argue that crimes are an every-day exp
    Author(s): The Open University

    License information
    Related content

    Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

3.6 Summary

  • The common-sense narratives of the crime problem in the UK can be broken down into a series of distinct claims that make assessing them easier.

  • Those claims can be tested against quantitative and qualitative evidence. Both types of evidence suggest that the narrative of change from a secure to an insecure society is at best partial, overestimating the tranquillity of the past, and the uncertainty and riskiness of the present.


  • Author(s): The Open University

    License information
    Related content

    Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

3.4 Interpreting the crime problem

The Whole City, My Lord, is alarm'd and uneasy. Wickedness has got such a Head, and the Robbers and Insolence of the Night are such that the citizens are no longer secure within their own Walls or safe even in passing their Streets, but are robbed, insulted, and abused, even at their own Doors … The citizens are oppressed by Rapin and Violence.

(Defoe, 1730, quoted in Reiner, 1996, p.2)

S
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

3.3 Quantitative and qualitative evidence

The Tables above provide official quantitative evidence: evidence, data or information which is expressed in numerical terms. On the face of it, this clearly shows that recorded crime increased significantly throughout the twentieth century, albeit with some ‘dips’ in recent years. Common sense is confirmed. But there are problems with these data. Remember, we are looking here at crimes recorded by the police. Do you think that all crimes are recorded? There might be different reas
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

References

Anderson, B. (1983) Imagined Communities: Reflections on the Origins and Spread of Nationalism (2nd edn), London, Verso.
Egan, P. (1812) Boxiana; or Sketches of Ancient and Modern Pugilism, from the Days of the Renowned Broughton and Slack to the Heroes of the Present Milling Era, vol. 1, London, G. Smeeton.
Holt, R. and Mason, T. (2007) ‘Sensationalism and t
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

1 Technological advancement

Everything that can be invented has been invented.

(The Commissioner of the United States Office of Patents, 1899, recommending that his office be abolished, quoted in The Economist, 2000, p. 5)

There is nothing now to be foreseen which can prevent the United States from enjoying an era of business prosperity which is entirely
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

Learning outcomes

On completion of this unit, you should be able to:

  • identify criteria to evaluate the politics of racial violence.


Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

1.6.3 Mailing lists and newsgroups

Mailing or discussion lists are e-mail based discussion groups. When you send an e-mail to a mailing list address, it is sent automatically to all the other members of the list.

The majority of academic-related mailing lists in the UK are maintained by JISCMail  You will find details of joining these mailing lists on the JISCMail website. Mailing lists are useful for getting in touch w
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

Learning outcomes

The unit introduces you to:

  • ways in which data may be stored and processed;

  • language notation and concepts that enable discussion of these in a precise way.

  • It enables you to do the following:

  • distinguish between different forms of data, and use notations introduced in the unit to show different forms of data;

  • appreciate that fine details may be important when interpreting formal notation (for example,
    Author(s): The Open University

    License information
    Related content

    Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

17.1 Introduction

I'm going to pause here to try to put together some of the ideas we have encountered so far. I deliberately chose the example of a supermarket to illustrate some of the key processes involved in an ICT system. Figure 15 is a modified version of the block diagram for computers in a ne
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

3.1 Searching for your ancestors

In this section we consider searching for information about your ancestors. We cannot hope to cover all the techniques and information required to research genealogy, family history and local history; there is only time in this unit to scratch the surface. Some of the activities here are open-ended; please do not spend too long on them. If the subject interests you, you can revisit it after the course finishes, making use of the genealogical resources in the Appendix.


Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

Unit summary

In this unit, the emphasis has been on devices communicating with each other in networks. You were introduced to some general principles about signals and networks, and the differences between wired and wireless networks. You met some of the network technologies in common use (Ethernet, WiFi and Bluetooth), before looking more closely at specific applications (smart homes, RFID systems) for networked devices. But we have barely had time to scratch the surface of what these technologies offer
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

4.9 Bluetooth

The driving force for the development of the Bluetooth standard was to eliminate the need for connecting wires between local ICT devices such as keyboards, monitors, printers, PDAs (Personal Digital Assistants), cell phones and headsets. This was already possible using infrared technology, but the requirement for line-of-sight positioning between the communicating interfaces limits infrared's usefulness. Because Bluetooth uses radio waves, Bluetooth devices can communicate with each other wit
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

References

Pearson, I. (2004) The Future of Everyday Life in 2010, British Telecommunications plc. [online] www.bt.com/sphere/insights/pearson/everyday.htm, accessed 6 September 2006.
Pragnell, M., Spence, L, and Moore R. (November, 2000) The Market Potential for Smart Homes, N40, Joseph Rowntree Foundation [online], York Publishing Services www.jrf.org.uk/knowledge/findings/housing/n40.asp, accessed 6 Septem
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

6.2 Objects

To represent a thing such as an account or a payment from an object perspective, the software developers need to say how it can be used. An account is something that can be credited or debited with amounts of money and that remembers the total balance between operations. As users of an account, we do not care whether the balance is represented by electrons or by numbers on a slate, or whether the numbers are represented in binary or decimal. As long as we can withdraw money at some time after
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

5.2 An example

In order to complete this section I shall present a simple example. This is loosely based on one described in [1], currently one of the very few books written on JavaSpaces technology.

An object that can be stored in a space has to implement an interface . The objects that form part of the example will just
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

5.3 The speed of development

E-commerce consultants speak of a web year. This is the time which it takes to bring to implementation a conventional system that would normally take a calendar year to develop. Current estimates are that one calendar year is equivalent to seven web years. Nowhere is there more of an imperative for companies to develop products and services quickly, together with the computing infrastructure required to support them, than in e-commerce. In software engineering terms this has given rise to a n
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

3.8 Summary

  • Because the subject matter of psychology (ourselves and non-human animals) is complex and reactive, psychologists have to choose from amongst a wide range of methods.

  • Psychologists make use of methods that aim to maximise objectivity; they also use methods that focus on and explore subjectivities and meanings.

  • Depending on the topic they are researching, psychologists can choose to adopt an outsider viewpoint or an insider
    Author(s): The Open University

    License information
    Related content

    Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share

2.3.4 Symbolic data

The fourth kind of data is essentially symbolic – symbolic creations of minds, such as the texts people have written, their art, what they have said (recorded and transcribed), the exact ways they use language and the meanings they have communicated. These symbolic data are the products of minds, but once created they can exist and be studied and analysed quite separately from the particular minds that created them. These kinds of data are used to provide evidence of meanings, and th
Author(s): The Open University

License information
Related content

Except for third party materials and/or otherwise stated (see terms and conditions) the content in OpenLearn is released for use under the terms of the Creative Commons Attribution-NonCommercial-Share