CINXE.COM
Brian Rappert | University of Exeter - Academia.edu
<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width, initial-scale=1"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>Brian Rappert | University of Exeter - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "profiles/works", 'action': "summary", 'controller_action': 'profiles/works#summary', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="HL38R0_JuP83dXS-a5YAJZkKMWHtdeT3Lw0fKm7Qlh_6lSo_E1lIsKDDgIKfFE26Vkrq07bvZnFBl0athNo-hA" /> <link rel="stylesheet" href="//a.academia-assets.com/assets/wow-3d36c19b4875b226bfed0fcba1dcea3f2fe61148383d97c0465c016b8c969290.css" media="all" /><link rel="stylesheet" href="//a.academia-assets.com/assets/social/home-79e78ce59bef0a338eb6540ec3d93b4a7952115b56c57f1760943128f4544d42.css" media="all" /><link rel="stylesheet" href="//a.academia-assets.com/assets/single_work_page/figure_carousel-2004283e0948681916eefa74772df54f56cb5c7413d82b160212231c2f474bb3.css" media="all" /><script type="application/ld+json">{"@context":"https://schema.org","@type":"ProfilePage","mainEntity":{"@context":"https://schema.org","@type":"Person","name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert","image":"https://0.academia-photos.com/5109393/2796428/3260792/s200_brian.rappert.jpg","sameAs":[]},"dateCreated":"2013-08-11T23:37:04-07:00","dateModified":"2022-10-01T00:59:28-07:00","name":"Brian Rappert","description":"","image":"https://0.academia-photos.com/5109393/2796428/3260792/s200_brian.rappert.jpg","thumbnailUrl":"https://0.academia-photos.com/5109393/2796428/3260792/s65_brian.rappert.jpg","primaryImageOfPage":{"@type":"ImageObject","url":"https://0.academia-photos.com/5109393/2796428/3260792/s200_brian.rappert.jpg","width":200},"sameAs":[],"relatedLink":"https://www.academia.edu/80514459/Counting_the_dead_and_making_the_dead_count_configuring_data_and_accountability"}</script><link rel="stylesheet" href="//a.academia-assets.com/assets/design_system/heading-95367dc03b794f6737f30123738a886cf53b7a65cdef98a922a98591d60063e3.css" media="all" /><link rel="stylesheet" href="//a.academia-assets.com/assets/design_system/button-8c9ae4b5c8a2531640c354d92a1f3579c8ff103277ef74913e34c8a76d4e6c00.css" media="all" /><link rel="stylesheet" href="//a.academia-assets.com/assets/design_system/body-170d1319f0e354621e81ca17054bb147da2856ec0702fe440a99af314a6338c5.css" media="all" /><style type="text/css">@media(max-width: 567px){:root{--token-mode: Parity;--dropshadow: 0 2px 4px 0 #22223340;--primary-brand: #0645b1;--error-dark: #b60000;--success-dark: #05b01c;--inactive-fill: #ebebee;--hover: #0c3b8d;--pressed: #082f75;--button-primary-fill-inactive: #ebebee;--button-primary-fill: #0645b1;--button-primary-text: #ffffff;--button-primary-fill-hover: #0c3b8d;--button-primary-fill-press: #082f75;--button-primary-icon: #ffffff;--button-primary-fill-inverse: #ffffff;--button-primary-text-inverse: #082f75;--button-primary-icon-inverse: #0645b1;--button-primary-fill-inverse-hover: #cddaef;--button-primary-stroke-inverse-pressed: #0645b1;--button-secondary-stroke-inactive: #b1b1ba;--button-secondary-fill: #eef2f9;--button-secondary-text: #082f75;--button-secondary-fill-press: #cddaef;--button-secondary-fill-inactive: #ebebee;--button-secondary-stroke: #cddaef;--button-secondary-stroke-hover: #386ac1;--button-secondary-stroke-press: #0645b1;--button-secondary-text-inactive: #b1b1ba;--button-secondary-icon: #082f75;--button-secondary-fill-hover: #e6ecf7;--button-secondary-stroke-inverse: #ffffff;--button-secondary-fill-inverse: rgba(255, 255, 255, 0);--button-secondary-icon-inverse: #ffffff;--button-secondary-icon-hover: #082f75;--button-secondary-icon-press: #082f75;--button-secondary-text-inverse: #ffffff;--button-secondary-text-hover: #082f75;--button-secondary-text-press: #082f75;--button-secondary-fill-inverse-hover: #043059;--button-xs-stroke: #141413;--button-xs-stroke-hover: #0c3b8d;--button-xs-stroke-press: #082f75;--button-xs-stroke-inactive: #ebebee;--button-xs-text: #141413;--button-xs-text-hover: #0c3b8d;--button-xs-text-press: #082f75;--button-xs-text-inactive: #91919e;--button-xs-icon: #141413;--button-xs-icon-hover: #0c3b8d;--button-xs-icon-press: #082f75;--button-xs-icon-inactive: #91919e;--button-xs-fill: #ffffff;--button-xs-fill-hover: #f4f7fc;--button-xs-fill-press: #eef2f9;--buttons-button-text-inactive: #91919e;--buttons-button-focus: #0645b1;--buttons-button-icon-inactive: #91919e;--buttons-small-buttons-corner-radius: 8px;--buttons-small-buttons-l-r-padding: 12px;--buttons-small-buttons-height: 44px;--buttons-small-buttons-gap: 8px;--buttons-small-buttons-icon-only-width: 44px;--buttons-small-buttons-icon-size: 20px;--buttons-small-buttons-stroke-default: 1px;--buttons-small-buttons-stroke-thick: 2px;--buttons-large-buttons-l-r-padding: 20px;--buttons-large-buttons-height: 54px;--buttons-large-buttons-icon-only-width: 54px;--buttons-large-buttons-icon-size: 20px;--buttons-large-buttons-gap: 8px;--buttons-large-buttons-corner-radius: 8px;--buttons-large-buttons-stroke-default: 1px;--buttons-large-buttons-stroke-thick: 2px;--buttons-extra-small-buttons-l-r-padding: 8px;--buttons-extra-small-buttons-height: 32px;--buttons-extra-small-buttons-icon-size: 16px;--buttons-extra-small-buttons-gap: 4px;--buttons-extra-small-buttons-corner-radius: 8px;--buttons-stroke-default: 1px;--buttons-stroke-thick: 2px;--background-beige: #f9f7f4;--error-light: #fff2f2;--text-placeholder: #6d6d7d;--stroke-dark: #141413;--stroke-light: #dddde2;--stroke-medium: #535366;--accent-green: #ccffd4;--accent-turquoise: #ccf7ff;--accent-yellow: #f7ffcc;--accent-peach: #ffd4cc;--accent-violet: #f7ccff;--accent-purple: #f4f7fc;--text-primary: #141413;--secondary-brand: #141413;--text-hover: #0c3b8d;--text-white: #ffffff;--text-link: #0645b1;--text-press: #082f75;--success-light: #f0f8f1;--background-light-blue: #eef2f9;--background-white: #ffffff;--premium-dark: #877440;--premium-light: #f9f6ed;--stroke-white: #ffffff;--inactive-content: #b1b1ba;--annotate-light: #a35dff;--annotate-dark: #824acc;--grid: #eef2f9;--inactive-stroke: #ebebee;--shadow: rgba(34, 34, 51, 0.25);--text-inactive: #6d6d7d;--text-error: #b60000;--stroke-error: #b60000;--background-error: #fff2f2;--background-black: #141413;--icon-default: #141413;--icon-blue: #0645b1;--background-grey: #dddde2;--icon-grey: #b1b1ba;--text-focus: #082f75;--brand-colors-neutral-black: #141413;--brand-colors-neutral-900: #535366;--brand-colors-neutral-800: #6d6d7d;--brand-colors-neutral-700: #91919e;--brand-colors-neutral-600: #b1b1ba;--brand-colors-neutral-500: #c8c8cf;--brand-colors-neutral-400: #dddde2;--brand-colors-neutral-300: #ebebee;--brand-colors-neutral-200: #f8f8fb;--brand-colors-neutral-100: #fafafa;--brand-colors-neutral-white: #ffffff;--brand-colors-blue-900: #043059;--brand-colors-blue-800: #082f75;--brand-colors-blue-700: #0c3b8d;--brand-colors-blue-600: #0645b1;--brand-colors-blue-500: #386ac1;--brand-colors-blue-400: #cddaef;--brand-colors-blue-300: #e6ecf7;--brand-colors-blue-200: #eef2f9;--brand-colors-blue-100: #f4f7fc;--brand-colors-gold-500: #877440;--brand-colors-gold-400: #e9e3d4;--brand-colors-gold-300: #f2efe8;--brand-colors-gold-200: #f9f6ed;--brand-colors-gold-100: #f9f7f4;--brand-colors-error-900: #920000;--brand-colors-error-500: #b60000;--brand-colors-success-900: #035c0f;--brand-colors-green: #ccffd4;--brand-colors-turquoise: #ccf7ff;--brand-colors-yellow: #f7ffcc;--brand-colors-peach: #ffd4cc;--brand-colors-violet: #f7ccff;--brand-colors-error-100: #fff2f2;--brand-colors-success-500: #05b01c;--brand-colors-success-100: #f0f8f1;--text-secondary: #535366;--icon-white: #ffffff;--background-beige-darker: #f2efe8;--icon-dark-grey: #535366;--type-font-family-sans-serif: Roboto;--type-font-family-serif: Georgia;--type-font-family-mono: IBM Plex Mono;--type-weights-300: 300;--type-weights-400: 400;--type-weights-500: 500;--type-weights-700: 700;--type-sizes-12: 12px;--type-sizes-14: 14px;--type-sizes-16: 16px;--type-sizes-18: 18px;--type-sizes-20: 20px;--type-sizes-22: 22px;--type-sizes-24: 24px;--type-sizes-28: 28px;--type-sizes-30: 30px;--type-sizes-32: 32px;--type-sizes-40: 40px;--type-sizes-42: 42px;--type-sizes-48-2: 48px;--type-line-heights-16: 16px;--type-line-heights-20: 20px;--type-line-heights-23: 23px;--type-line-heights-24: 24px;--type-line-heights-25: 25px;--type-line-heights-26: 26px;--type-line-heights-29: 29px;--type-line-heights-30: 30px;--type-line-heights-32: 32px;--type-line-heights-34: 34px;--type-line-heights-35: 35px;--type-line-heights-36: 36px;--type-line-heights-38: 38px;--type-line-heights-40: 40px;--type-line-heights-46: 46px;--type-line-heights-48: 48px;--type-line-heights-52: 52px;--type-line-heights-58: 58px;--type-line-heights-68: 68px;--type-line-heights-74: 74px;--type-line-heights-82: 82px;--type-paragraph-spacings-0: 0px;--type-paragraph-spacings-4: 4px;--type-paragraph-spacings-8: 8px;--type-paragraph-spacings-16: 16px;--type-sans-serif-xl-font-weight: 400;--type-sans-serif-xl-size: 32px;--type-sans-serif-xl-line-height: 46px;--type-sans-serif-xl-paragraph-spacing: 16px;--type-sans-serif-lg-font-weight: 400;--type-sans-serif-lg-size: 30px;--type-sans-serif-lg-line-height: 36px;--type-sans-serif-lg-paragraph-spacing: 16px;--type-sans-serif-md-font-weight: 400;--type-sans-serif-md-line-height: 30px;--type-sans-serif-md-paragraph-spacing: 16px;--type-sans-serif-md-size: 24px;--type-sans-serif-xs-font-weight: 700;--type-sans-serif-xs-line-height: 24px;--type-sans-serif-xs-paragraph-spacing: 0px;--type-sans-serif-xs-size: 18px;--type-sans-serif-sm-font-weight: 400;--type-sans-serif-sm-line-height: 32px;--type-sans-serif-sm-paragraph-spacing: 16px;--type-sans-serif-sm-size: 20px;--type-body-xl-font-weight: 400;--type-body-xl-size: 24px;--type-body-xl-line-height: 36px;--type-body-xl-paragraph-spacing: 0px;--type-body-sm-font-weight: 400;--type-body-sm-size: 14px;--type-body-sm-line-height: 20px;--type-body-sm-paragraph-spacing: 8px;--type-body-xs-font-weight: 400;--type-body-xs-size: 12px;--type-body-xs-line-height: 16px;--type-body-xs-paragraph-spacing: 0px;--type-body-md-font-weight: 400;--type-body-md-size: 16px;--type-body-md-line-height: 20px;--type-body-md-paragraph-spacing: 4px;--type-body-lg-font-weight: 400;--type-body-lg-size: 20px;--type-body-lg-line-height: 26px;--type-body-lg-paragraph-spacing: 16px;--type-body-lg-medium-font-weight: 500;--type-body-lg-medium-size: 20px;--type-body-lg-medium-line-height: 32px;--type-body-lg-medium-paragraph-spacing: 16px;--type-body-md-medium-font-weight: 500;--type-body-md-medium-size: 16px;--type-body-md-medium-line-height: 20px;--type-body-md-medium-paragraph-spacing: 4px;--type-body-sm-bold-font-weight: 700;--type-body-sm-bold-size: 14px;--type-body-sm-bold-line-height: 20px;--type-body-sm-bold-paragraph-spacing: 8px;--type-body-sm-medium-font-weight: 500;--type-body-sm-medium-size: 14px;--type-body-sm-medium-line-height: 20px;--type-body-sm-medium-paragraph-spacing: 8px;--type-serif-md-font-weight: 400;--type-serif-md-size: 32px;--type-serif-md-paragraph-spacing: 0px;--type-serif-md-line-height: 40px;--type-serif-sm-font-weight: 400;--type-serif-sm-size: 24px;--type-serif-sm-paragraph-spacing: 0px;--type-serif-sm-line-height: 26px;--type-serif-lg-font-weight: 400;--type-serif-lg-size: 48px;--type-serif-lg-paragraph-spacing: 0px;--type-serif-lg-line-height: 52px;--type-serif-xs-font-weight: 400;--type-serif-xs-size: 18px;--type-serif-xs-line-height: 24px;--type-serif-xs-paragraph-spacing: 0px;--type-serif-xl-font-weight: 400;--type-serif-xl-size: 48px;--type-serif-xl-paragraph-spacing: 0px;--type-serif-xl-line-height: 58px;--type-mono-md-font-weight: 400;--type-mono-md-size: 22px;--type-mono-md-line-height: 24px;--type-mono-md-paragraph-spacing: 0px;--type-mono-lg-font-weight: 400;--type-mono-lg-size: 40px;--type-mono-lg-line-height: 40px;--type-mono-lg-paragraph-spacing: 0px;--type-mono-sm-font-weight: 400;--type-mono-sm-size: 14px;--type-mono-sm-line-height: 24px;--type-mono-sm-paragraph-spacing: 0px;--spacing-xs-4: 4px;--spacing-xs-8: 8px;--spacing-xs-16: 16px;--spacing-sm-24: 24px;--spacing-sm-32: 32px;--spacing-md-40: 40px;--spacing-md-48: 48px;--spacing-lg-64: 64px;--spacing-lg-80: 80px;--spacing-xlg-104: 104px;--spacing-xlg-152: 152px;--spacing-xs-12: 12px;--spacing-page-section: 80px;--spacing-card-list-spacing: 48px;--spacing-text-section-spacing: 64px;--spacing-md-xs-headings: 40px;--corner-radius-radius-lg: 16px;--corner-radius-radius-sm: 4px;--corner-radius-radius-md: 8px;--corner-radius-radius-round: 104px}}@media(min-width: 568px)and (max-width: 1279px){:root{--token-mode: Parity;--dropshadow: 0 2px 4px 0 #22223340;--primary-brand: #0645b1;--error-dark: #b60000;--success-dark: #05b01c;--inactive-fill: #ebebee;--hover: #0c3b8d;--pressed: #082f75;--button-primary-fill-inactive: #ebebee;--button-primary-fill: #0645b1;--button-primary-text: #ffffff;--button-primary-fill-hover: #0c3b8d;--button-primary-fill-press: #082f75;--button-primary-icon: #ffffff;--button-primary-fill-inverse: #ffffff;--button-primary-text-inverse: #082f75;--button-primary-icon-inverse: #0645b1;--button-primary-fill-inverse-hover: #cddaef;--button-primary-stroke-inverse-pressed: #0645b1;--button-secondary-stroke-inactive: #b1b1ba;--button-secondary-fill: #eef2f9;--button-secondary-text: #082f75;--button-secondary-fill-press: #cddaef;--button-secondary-fill-inactive: #ebebee;--button-secondary-stroke: #cddaef;--button-secondary-stroke-hover: #386ac1;--button-secondary-stroke-press: #0645b1;--button-secondary-text-inactive: #b1b1ba;--button-secondary-icon: #082f75;--button-secondary-fill-hover: #e6ecf7;--button-secondary-stroke-inverse: #ffffff;--button-secondary-fill-inverse: rgba(255, 255, 255, 0);--button-secondary-icon-inverse: #ffffff;--button-secondary-icon-hover: #082f75;--button-secondary-icon-press: #082f75;--button-secondary-text-inverse: #ffffff;--button-secondary-text-hover: #082f75;--button-secondary-text-press: #082f75;--button-secondary-fill-inverse-hover: #043059;--button-xs-stroke: #141413;--button-xs-stroke-hover: #0c3b8d;--button-xs-stroke-press: #082f75;--button-xs-stroke-inactive: #ebebee;--button-xs-text: #141413;--button-xs-text-hover: #0c3b8d;--button-xs-text-press: #082f75;--button-xs-text-inactive: #91919e;--button-xs-icon: #141413;--button-xs-icon-hover: #0c3b8d;--button-xs-icon-press: #082f75;--button-xs-icon-inactive: #91919e;--button-xs-fill: #ffffff;--button-xs-fill-hover: #f4f7fc;--button-xs-fill-press: #eef2f9;--buttons-button-text-inactive: #91919e;--buttons-button-focus: #0645b1;--buttons-button-icon-inactive: #91919e;--buttons-small-buttons-corner-radius: 8px;--buttons-small-buttons-l-r-padding: 12px;--buttons-small-buttons-height: 44px;--buttons-small-buttons-gap: 8px;--buttons-small-buttons-icon-only-width: 44px;--buttons-small-buttons-icon-size: 20px;--buttons-small-buttons-stroke-default: 1px;--buttons-small-buttons-stroke-thick: 2px;--buttons-large-buttons-l-r-padding: 20px;--buttons-large-buttons-height: 54px;--buttons-large-buttons-icon-only-width: 54px;--buttons-large-buttons-icon-size: 20px;--buttons-large-buttons-gap: 8px;--buttons-large-buttons-corner-radius: 8px;--buttons-large-buttons-stroke-default: 1px;--buttons-large-buttons-stroke-thick: 2px;--buttons-extra-small-buttons-l-r-padding: 8px;--buttons-extra-small-buttons-height: 32px;--buttons-extra-small-buttons-icon-size: 16px;--buttons-extra-small-buttons-gap: 4px;--buttons-extra-small-buttons-corner-radius: 8px;--buttons-stroke-default: 1px;--buttons-stroke-thick: 2px;--background-beige: #f9f7f4;--error-light: #fff2f2;--text-placeholder: #6d6d7d;--stroke-dark: #141413;--stroke-light: #dddde2;--stroke-medium: #535366;--accent-green: #ccffd4;--accent-turquoise: #ccf7ff;--accent-yellow: #f7ffcc;--accent-peach: #ffd4cc;--accent-violet: #f7ccff;--accent-purple: #f4f7fc;--text-primary: #141413;--secondary-brand: #141413;--text-hover: #0c3b8d;--text-white: #ffffff;--text-link: #0645b1;--text-press: #082f75;--success-light: #f0f8f1;--background-light-blue: #eef2f9;--background-white: #ffffff;--premium-dark: #877440;--premium-light: #f9f6ed;--stroke-white: #ffffff;--inactive-content: #b1b1ba;--annotate-light: #a35dff;--annotate-dark: #824acc;--grid: #eef2f9;--inactive-stroke: #ebebee;--shadow: rgba(34, 34, 51, 0.25);--text-inactive: #6d6d7d;--text-error: #b60000;--stroke-error: #b60000;--background-error: #fff2f2;--background-black: #141413;--icon-default: #141413;--icon-blue: #0645b1;--background-grey: #dddde2;--icon-grey: #b1b1ba;--text-focus: #082f75;--brand-colors-neutral-black: #141413;--brand-colors-neutral-900: #535366;--brand-colors-neutral-800: #6d6d7d;--brand-colors-neutral-700: #91919e;--brand-colors-neutral-600: #b1b1ba;--brand-colors-neutral-500: #c8c8cf;--brand-colors-neutral-400: #dddde2;--brand-colors-neutral-300: #ebebee;--brand-colors-neutral-200: #f8f8fb;--brand-colors-neutral-100: #fafafa;--brand-colors-neutral-white: #ffffff;--brand-colors-blue-900: #043059;--brand-colors-blue-800: #082f75;--brand-colors-blue-700: #0c3b8d;--brand-colors-blue-600: #0645b1;--brand-colors-blue-500: #386ac1;--brand-colors-blue-400: #cddaef;--brand-colors-blue-300: #e6ecf7;--brand-colors-blue-200: #eef2f9;--brand-colors-blue-100: #f4f7fc;--brand-colors-gold-500: #877440;--brand-colors-gold-400: #e9e3d4;--brand-colors-gold-300: #f2efe8;--brand-colors-gold-200: #f9f6ed;--brand-colors-gold-100: #f9f7f4;--brand-colors-error-900: #920000;--brand-colors-error-500: #b60000;--brand-colors-success-900: #035c0f;--brand-colors-green: #ccffd4;--brand-colors-turquoise: #ccf7ff;--brand-colors-yellow: #f7ffcc;--brand-colors-peach: #ffd4cc;--brand-colors-violet: #f7ccff;--brand-colors-error-100: #fff2f2;--brand-colors-success-500: #05b01c;--brand-colors-success-100: #f0f8f1;--text-secondary: #535366;--icon-white: #ffffff;--background-beige-darker: #f2efe8;--icon-dark-grey: #535366;--type-font-family-sans-serif: Roboto;--type-font-family-serif: Georgia;--type-font-family-mono: IBM Plex Mono;--type-weights-300: 300;--type-weights-400: 400;--type-weights-500: 500;--type-weights-700: 700;--type-sizes-12: 12px;--type-sizes-14: 14px;--type-sizes-16: 16px;--type-sizes-18: 18px;--type-sizes-20: 20px;--type-sizes-22: 22px;--type-sizes-24: 24px;--type-sizes-28: 28px;--type-sizes-30: 30px;--type-sizes-32: 32px;--type-sizes-40: 40px;--type-sizes-42: 42px;--type-sizes-48-2: 48px;--type-line-heights-16: 16px;--type-line-heights-20: 20px;--type-line-heights-23: 23px;--type-line-heights-24: 24px;--type-line-heights-25: 25px;--type-line-heights-26: 26px;--type-line-heights-29: 29px;--type-line-heights-30: 30px;--type-line-heights-32: 32px;--type-line-heights-34: 34px;--type-line-heights-35: 35px;--type-line-heights-36: 36px;--type-line-heights-38: 38px;--type-line-heights-40: 40px;--type-line-heights-46: 46px;--type-line-heights-48: 48px;--type-line-heights-52: 52px;--type-line-heights-58: 58px;--type-line-heights-68: 68px;--type-line-heights-74: 74px;--type-line-heights-82: 82px;--type-paragraph-spacings-0: 0px;--type-paragraph-spacings-4: 4px;--type-paragraph-spacings-8: 8px;--type-paragraph-spacings-16: 16px;--type-sans-serif-xl-font-weight: 400;--type-sans-serif-xl-size: 42px;--type-sans-serif-xl-line-height: 46px;--type-sans-serif-xl-paragraph-spacing: 16px;--type-sans-serif-lg-font-weight: 400;--type-sans-serif-lg-size: 32px;--type-sans-serif-lg-line-height: 36px;--type-sans-serif-lg-paragraph-spacing: 16px;--type-sans-serif-md-font-weight: 400;--type-sans-serif-md-line-height: 34px;--type-sans-serif-md-paragraph-spacing: 16px;--type-sans-serif-md-size: 28px;--type-sans-serif-xs-font-weight: 700;--type-sans-serif-xs-line-height: 25px;--type-sans-serif-xs-paragraph-spacing: 0px;--type-sans-serif-xs-size: 20px;--type-sans-serif-sm-font-weight: 400;--type-sans-serif-sm-line-height: 30px;--type-sans-serif-sm-paragraph-spacing: 16px;--type-sans-serif-sm-size: 24px;--type-body-xl-font-weight: 400;--type-body-xl-size: 24px;--type-body-xl-line-height: 36px;--type-body-xl-paragraph-spacing: 0px;--type-body-sm-font-weight: 400;--type-body-sm-size: 14px;--type-body-sm-line-height: 20px;--type-body-sm-paragraph-spacing: 8px;--type-body-xs-font-weight: 400;--type-body-xs-size: 12px;--type-body-xs-line-height: 16px;--type-body-xs-paragraph-spacing: 0px;--type-body-md-font-weight: 400;--type-body-md-size: 16px;--type-body-md-line-height: 20px;--type-body-md-paragraph-spacing: 4px;--type-body-lg-font-weight: 400;--type-body-lg-size: 20px;--type-body-lg-line-height: 26px;--type-body-lg-paragraph-spacing: 16px;--type-body-lg-medium-font-weight: 500;--type-body-lg-medium-size: 20px;--type-body-lg-medium-line-height: 32px;--type-body-lg-medium-paragraph-spacing: 16px;--type-body-md-medium-font-weight: 500;--type-body-md-medium-size: 16px;--type-body-md-medium-line-height: 20px;--type-body-md-medium-paragraph-spacing: 4px;--type-body-sm-bold-font-weight: 700;--type-body-sm-bold-size: 14px;--type-body-sm-bold-line-height: 20px;--type-body-sm-bold-paragraph-spacing: 8px;--type-body-sm-medium-font-weight: 500;--type-body-sm-medium-size: 14px;--type-body-sm-medium-line-height: 20px;--type-body-sm-medium-paragraph-spacing: 8px;--type-serif-md-font-weight: 400;--type-serif-md-size: 40px;--type-serif-md-paragraph-spacing: 0px;--type-serif-md-line-height: 48px;--type-serif-sm-font-weight: 400;--type-serif-sm-size: 28px;--type-serif-sm-paragraph-spacing: 0px;--type-serif-sm-line-height: 32px;--type-serif-lg-font-weight: 400;--type-serif-lg-size: 58px;--type-serif-lg-paragraph-spacing: 0px;--type-serif-lg-line-height: 68px;--type-serif-xs-font-weight: 400;--type-serif-xs-size: 18px;--type-serif-xs-line-height: 24px;--type-serif-xs-paragraph-spacing: 0px;--type-serif-xl-font-weight: 400;--type-serif-xl-size: 74px;--type-serif-xl-paragraph-spacing: 0px;--type-serif-xl-line-height: 82px;--type-mono-md-font-weight: 400;--type-mono-md-size: 22px;--type-mono-md-line-height: 24px;--type-mono-md-paragraph-spacing: 0px;--type-mono-lg-font-weight: 400;--type-mono-lg-size: 40px;--type-mono-lg-line-height: 40px;--type-mono-lg-paragraph-spacing: 0px;--type-mono-sm-font-weight: 400;--type-mono-sm-size: 14px;--type-mono-sm-line-height: 24px;--type-mono-sm-paragraph-spacing: 0px;--spacing-xs-4: 4px;--spacing-xs-8: 8px;--spacing-xs-16: 16px;--spacing-sm-24: 24px;--spacing-sm-32: 32px;--spacing-md-40: 40px;--spacing-md-48: 48px;--spacing-lg-64: 64px;--spacing-lg-80: 80px;--spacing-xlg-104: 104px;--spacing-xlg-152: 152px;--spacing-xs-12: 12px;--spacing-page-section: 104px;--spacing-card-list-spacing: 48px;--spacing-text-section-spacing: 80px;--spacing-md-xs-headings: 40px;--corner-radius-radius-lg: 16px;--corner-radius-radius-sm: 4px;--corner-radius-radius-md: 8px;--corner-radius-radius-round: 104px}}@media(min-width: 1280px){:root{--token-mode: Parity;--dropshadow: 0 2px 4px 0 #22223340;--primary-brand: #0645b1;--error-dark: #b60000;--success-dark: #05b01c;--inactive-fill: #ebebee;--hover: #0c3b8d;--pressed: #082f75;--button-primary-fill-inactive: #ebebee;--button-primary-fill: #0645b1;--button-primary-text: #ffffff;--button-primary-fill-hover: #0c3b8d;--button-primary-fill-press: #082f75;--button-primary-icon: #ffffff;--button-primary-fill-inverse: #ffffff;--button-primary-text-inverse: #082f75;--button-primary-icon-inverse: #0645b1;--button-primary-fill-inverse-hover: #cddaef;--button-primary-stroke-inverse-pressed: #0645b1;--button-secondary-stroke-inactive: #b1b1ba;--button-secondary-fill: #eef2f9;--button-secondary-text: #082f75;--button-secondary-fill-press: #cddaef;--button-secondary-fill-inactive: #ebebee;--button-secondary-stroke: #cddaef;--button-secondary-stroke-hover: #386ac1;--button-secondary-stroke-press: #0645b1;--button-secondary-text-inactive: #b1b1ba;--button-secondary-icon: #082f75;--button-secondary-fill-hover: #e6ecf7;--button-secondary-stroke-inverse: #ffffff;--button-secondary-fill-inverse: rgba(255, 255, 255, 0);--button-secondary-icon-inverse: #ffffff;--button-secondary-icon-hover: #082f75;--button-secondary-icon-press: #082f75;--button-secondary-text-inverse: #ffffff;--button-secondary-text-hover: #082f75;--button-secondary-text-press: #082f75;--button-secondary-fill-inverse-hover: #043059;--button-xs-stroke: #141413;--button-xs-stroke-hover: #0c3b8d;--button-xs-stroke-press: #082f75;--button-xs-stroke-inactive: #ebebee;--button-xs-text: #141413;--button-xs-text-hover: #0c3b8d;--button-xs-text-press: #082f75;--button-xs-text-inactive: #91919e;--button-xs-icon: #141413;--button-xs-icon-hover: #0c3b8d;--button-xs-icon-press: #082f75;--button-xs-icon-inactive: #91919e;--button-xs-fill: #ffffff;--button-xs-fill-hover: #f4f7fc;--button-xs-fill-press: #eef2f9;--buttons-button-text-inactive: #91919e;--buttons-button-focus: #0645b1;--buttons-button-icon-inactive: #91919e;--buttons-small-buttons-corner-radius: 8px;--buttons-small-buttons-l-r-padding: 12px;--buttons-small-buttons-height: 44px;--buttons-small-buttons-gap: 8px;--buttons-small-buttons-icon-only-width: 44px;--buttons-small-buttons-icon-size: 20px;--buttons-small-buttons-stroke-default: 1px;--buttons-small-buttons-stroke-thick: 2px;--buttons-large-buttons-l-r-padding: 20px;--buttons-large-buttons-height: 54px;--buttons-large-buttons-icon-only-width: 54px;--buttons-large-buttons-icon-size: 20px;--buttons-large-buttons-gap: 8px;--buttons-large-buttons-corner-radius: 8px;--buttons-large-buttons-stroke-default: 1px;--buttons-large-buttons-stroke-thick: 2px;--buttons-extra-small-buttons-l-r-padding: 8px;--buttons-extra-small-buttons-height: 32px;--buttons-extra-small-buttons-icon-size: 16px;--buttons-extra-small-buttons-gap: 4px;--buttons-extra-small-buttons-corner-radius: 8px;--buttons-stroke-default: 1px;--buttons-stroke-thick: 2px;--background-beige: #f9f7f4;--error-light: #fff2f2;--text-placeholder: #6d6d7d;--stroke-dark: #141413;--stroke-light: #dddde2;--stroke-medium: #535366;--accent-green: #ccffd4;--accent-turquoise: #ccf7ff;--accent-yellow: #f7ffcc;--accent-peach: #ffd4cc;--accent-violet: #f7ccff;--accent-purple: #f4f7fc;--text-primary: #141413;--secondary-brand: #141413;--text-hover: #0c3b8d;--text-white: #ffffff;--text-link: #0645b1;--text-press: #082f75;--success-light: #f0f8f1;--background-light-blue: #eef2f9;--background-white: #ffffff;--premium-dark: #877440;--premium-light: #f9f6ed;--stroke-white: #ffffff;--inactive-content: #b1b1ba;--annotate-light: #a35dff;--annotate-dark: #824acc;--grid: #eef2f9;--inactive-stroke: #ebebee;--shadow: rgba(34, 34, 51, 0.25);--text-inactive: #6d6d7d;--text-error: #b60000;--stroke-error: #b60000;--background-error: #fff2f2;--background-black: #141413;--icon-default: #141413;--icon-blue: #0645b1;--background-grey: #dddde2;--icon-grey: #b1b1ba;--text-focus: #082f75;--brand-colors-neutral-black: #141413;--brand-colors-neutral-900: #535366;--brand-colors-neutral-800: #6d6d7d;--brand-colors-neutral-700: #91919e;--brand-colors-neutral-600: #b1b1ba;--brand-colors-neutral-500: #c8c8cf;--brand-colors-neutral-400: #dddde2;--brand-colors-neutral-300: #ebebee;--brand-colors-neutral-200: #f8f8fb;--brand-colors-neutral-100: #fafafa;--brand-colors-neutral-white: #ffffff;--brand-colors-blue-900: #043059;--brand-colors-blue-800: #082f75;--brand-colors-blue-700: #0c3b8d;--brand-colors-blue-600: #0645b1;--brand-colors-blue-500: #386ac1;--brand-colors-blue-400: #cddaef;--brand-colors-blue-300: #e6ecf7;--brand-colors-blue-200: #eef2f9;--brand-colors-blue-100: #f4f7fc;--brand-colors-gold-500: #877440;--brand-colors-gold-400: #e9e3d4;--brand-colors-gold-300: #f2efe8;--brand-colors-gold-200: #f9f6ed;--brand-colors-gold-100: #f9f7f4;--brand-colors-error-900: #920000;--brand-colors-error-500: #b60000;--brand-colors-success-900: #035c0f;--brand-colors-green: #ccffd4;--brand-colors-turquoise: #ccf7ff;--brand-colors-yellow: #f7ffcc;--brand-colors-peach: #ffd4cc;--brand-colors-violet: #f7ccff;--brand-colors-error-100: #fff2f2;--brand-colors-success-500: #05b01c;--brand-colors-success-100: #f0f8f1;--text-secondary: #535366;--icon-white: #ffffff;--background-beige-darker: #f2efe8;--icon-dark-grey: #535366;--type-font-family-sans-serif: Roboto;--type-font-family-serif: Georgia;--type-font-family-mono: IBM Plex Mono;--type-weights-300: 300;--type-weights-400: 400;--type-weights-500: 500;--type-weights-700: 700;--type-sizes-12: 12px;--type-sizes-14: 14px;--type-sizes-16: 16px;--type-sizes-18: 18px;--type-sizes-20: 20px;--type-sizes-22: 22px;--type-sizes-24: 24px;--type-sizes-28: 28px;--type-sizes-30: 30px;--type-sizes-32: 32px;--type-sizes-40: 40px;--type-sizes-42: 42px;--type-sizes-48-2: 48px;--type-line-heights-16: 16px;--type-line-heights-20: 20px;--type-line-heights-23: 23px;--type-line-heights-24: 24px;--type-line-heights-25: 25px;--type-line-heights-26: 26px;--type-line-heights-29: 29px;--type-line-heights-30: 30px;--type-line-heights-32: 32px;--type-line-heights-34: 34px;--type-line-heights-35: 35px;--type-line-heights-36: 36px;--type-line-heights-38: 38px;--type-line-heights-40: 40px;--type-line-heights-46: 46px;--type-line-heights-48: 48px;--type-line-heights-52: 52px;--type-line-heights-58: 58px;--type-line-heights-68: 68px;--type-line-heights-74: 74px;--type-line-heights-82: 82px;--type-paragraph-spacings-0: 0px;--type-paragraph-spacings-4: 4px;--type-paragraph-spacings-8: 8px;--type-paragraph-spacings-16: 16px;--type-sans-serif-xl-font-weight: 400;--type-sans-serif-xl-size: 42px;--type-sans-serif-xl-line-height: 46px;--type-sans-serif-xl-paragraph-spacing: 16px;--type-sans-serif-lg-font-weight: 400;--type-sans-serif-lg-size: 32px;--type-sans-serif-lg-line-height: 38px;--type-sans-serif-lg-paragraph-spacing: 16px;--type-sans-serif-md-font-weight: 400;--type-sans-serif-md-line-height: 34px;--type-sans-serif-md-paragraph-spacing: 16px;--type-sans-serif-md-size: 28px;--type-sans-serif-xs-font-weight: 700;--type-sans-serif-xs-line-height: 25px;--type-sans-serif-xs-paragraph-spacing: 0px;--type-sans-serif-xs-size: 20px;--type-sans-serif-sm-font-weight: 400;--type-sans-serif-sm-line-height: 30px;--type-sans-serif-sm-paragraph-spacing: 16px;--type-sans-serif-sm-size: 24px;--type-body-xl-font-weight: 400;--type-body-xl-size: 24px;--type-body-xl-line-height: 36px;--type-body-xl-paragraph-spacing: 0px;--type-body-sm-font-weight: 400;--type-body-sm-size: 14px;--type-body-sm-line-height: 20px;--type-body-sm-paragraph-spacing: 8px;--type-body-xs-font-weight: 400;--type-body-xs-size: 12px;--type-body-xs-line-height: 16px;--type-body-xs-paragraph-spacing: 0px;--type-body-md-font-weight: 400;--type-body-md-size: 16px;--type-body-md-line-height: 20px;--type-body-md-paragraph-spacing: 4px;--type-body-lg-font-weight: 400;--type-body-lg-size: 20px;--type-body-lg-line-height: 26px;--type-body-lg-paragraph-spacing: 16px;--type-body-lg-medium-font-weight: 500;--type-body-lg-medium-size: 20px;--type-body-lg-medium-line-height: 32px;--type-body-lg-medium-paragraph-spacing: 16px;--type-body-md-medium-font-weight: 500;--type-body-md-medium-size: 16px;--type-body-md-medium-line-height: 20px;--type-body-md-medium-paragraph-spacing: 4px;--type-body-sm-bold-font-weight: 700;--type-body-sm-bold-size: 14px;--type-body-sm-bold-line-height: 20px;--type-body-sm-bold-paragraph-spacing: 8px;--type-body-sm-medium-font-weight: 500;--type-body-sm-medium-size: 14px;--type-body-sm-medium-line-height: 20px;--type-body-sm-medium-paragraph-spacing: 8px;--type-serif-md-font-weight: 400;--type-serif-md-size: 40px;--type-serif-md-paragraph-spacing: 0px;--type-serif-md-line-height: 48px;--type-serif-sm-font-weight: 400;--type-serif-sm-size: 28px;--type-serif-sm-paragraph-spacing: 0px;--type-serif-sm-line-height: 32px;--type-serif-lg-font-weight: 400;--type-serif-lg-size: 58px;--type-serif-lg-paragraph-spacing: 0px;--type-serif-lg-line-height: 68px;--type-serif-xs-font-weight: 400;--type-serif-xs-size: 18px;--type-serif-xs-line-height: 24px;--type-serif-xs-paragraph-spacing: 0px;--type-serif-xl-font-weight: 400;--type-serif-xl-size: 74px;--type-serif-xl-paragraph-spacing: 0px;--type-serif-xl-line-height: 82px;--type-mono-md-font-weight: 400;--type-mono-md-size: 22px;--type-mono-md-line-height: 24px;--type-mono-md-paragraph-spacing: 0px;--type-mono-lg-font-weight: 400;--type-mono-lg-size: 40px;--type-mono-lg-line-height: 40px;--type-mono-lg-paragraph-spacing: 0px;--type-mono-sm-font-weight: 400;--type-mono-sm-size: 14px;--type-mono-sm-line-height: 24px;--type-mono-sm-paragraph-spacing: 0px;--spacing-xs-4: 4px;--spacing-xs-8: 8px;--spacing-xs-16: 16px;--spacing-sm-24: 24px;--spacing-sm-32: 32px;--spacing-md-40: 40px;--spacing-md-48: 48px;--spacing-lg-64: 64px;--spacing-lg-80: 80px;--spacing-xlg-104: 104px;--spacing-xlg-152: 152px;--spacing-xs-12: 12px;--spacing-page-section: 152px;--spacing-card-list-spacing: 48px;--spacing-text-section-spacing: 80px;--spacing-md-xs-headings: 40px;--corner-radius-radius-lg: 16px;--corner-radius-radius-sm: 4px;--corner-radius-radius-md: 8px;--corner-radius-radius-round: 104px}}</style><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&family=Gupter:wght@400;500;700&family=IBM+Plex+Mono:wght@300;400&family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&display=swap" rel="stylesheet" /><link rel="stylesheet" href="//a.academia-assets.com/assets/design_system/common-57f9da13cef3fd4e2a8b655342c6488eded3e557e823fe67571f2ac77acd7b6f.css" media="all" /> <meta name="author" content="brian rappert" /> <meta name="description" content="Brian Rappert, University of Exeter: 88 Followers, 30 Following, 199 Research papers. Research interests: Sociology, Ethics, and Secrecy." /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'works'; var $action_name = "summary"; var $rails_env = 'production'; var $app_rev = 'e8a18f05162f50362dc9ff94cb0bb49be84e4276'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":13895,"monthly_visitors":"31 million","monthly_visitor_count":31300000,"monthly_visitor_count_in_millions":31,"user_count":286266094,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1743664754000); window.Aedu.timeDifference = new Date().getTime() - 1743664754000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link rel="preload" href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" as="style" onload="this.rel='stylesheet'"> <link rel="stylesheet" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" media="all" /> <link rel="stylesheet" href="//a.academia-assets.com/assets/academia-9982828ed1de4777566441c35ccf7157c55ca779141fce69380d727ebdbbb926.css" media="all" /> <link rel="stylesheet" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" media="all" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-ea9e09e22b561126b0d4119ad33eee5d92cc3c2c850b903dfd540d5d5bbafa8f.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-7619a748322c52a5dde35876bf9572375d489ce6dc0f5c94eadf71c265acf5fb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://exeter.academia.edu/BrianRappert" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-profiles/works a-summary logged_out'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-profiles/works a-summary logged_out'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&c2=26766707&cv=2.0&cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to <a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more <span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i> We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/hc/en-us"><i class="fa fa-question-circle"></i> Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less <span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <script src="//a.academia-assets.com/assets/webpack_bundles/profile.wjs-bundle-0d4749eb637d9acf3f125ef24206483a8378882ab36d57629c053436c6027b15.js" defer="defer"></script><script>$viewedUser = Aedu.User.set_viewed( {"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert","photo":"https://0.academia-photos.com/5109393/2796428/3260792/s65_brian.rappert.jpg","has_photo":true,"department":{"id":494940,"name":"Department of Sociology, Philosophy and Anthropology","url":"https://exeter.academia.edu/Departments/Department_of_Sociology_Philosophy_and_Anthropology/Documents","university":{"id":40,"name":"University of Exeter","url":"https://exeter.academia.edu/"}},"position":"Faculty Member","position_id":1,"is_analytics_public":false,"interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology"},{"id":814,"name":"Ethics","url":"https://www.academia.edu/Documents/in/Ethics"},{"id":6662,"name":"Secrecy","url":"https://www.academia.edu/Documents/in/Secrecy"},{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies"},{"id":1744493,"name":"Science and Technology Studies","url":"https://www.academia.edu/Documents/in/Science_and_Technology_Studies"},{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks"},{"id":27360,"name":"Databases","url":"https://www.academia.edu/Documents/in/Databases"},{"id":53293,"name":"Software","url":"https://www.academia.edu/Documents/in/Software"}]} ); if ($a.is_logged_in() && $viewedUser.is_current_user()) { $('body').addClass('profile-viewed-by-owner'); } $socialProfiles = []</script><div id="js-react-on-rails-context" style="display:none" data-rails-context="{"inMailer":false,"i18nLocale":"en","i18nDefaultLocale":"en","href":"https://exeter.academia.edu/BrianRappert","location":"/BrianRappert","scheme":"https","host":"exeter.academia.edu","port":null,"pathname":"/BrianRappert","search":null,"httpAcceptLanguage":null,"serverSide":false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="ProfileCheckPaperUpdate" data-props="{}" data-trace="false" data-dom-id="ProfileCheckPaperUpdate-react-component-c2d13135-eda5-4c37-b148-bf46c88c2588"></div> <div id="ProfileCheckPaperUpdate-react-component-c2d13135-eda5-4c37-b148-bf46c88c2588"></div> <div class="DesignSystem"><div class="onsite-ping" id="onsite-ping"></div></div><div class="profile-user-info DesignSystem"><div class="social-profile-container"><div class="left-panel-container"><div class="user-info-component-wrapper"><div class="user-summary-cta-container"><div class="user-summary-container"><div class="social-profile-avatar-container"><img class="profile-avatar u-positionAbsolute" alt="Brian Rappert" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/5109393/2796428/3260792/s200_brian.rappert.jpg" /></div><div class="title-container"><h1 class="ds2-5-heading-sans-serif-sm">Brian Rappert</h1><div class="affiliations-container fake-truncate js-profile-affiliations"><div><a class="u-tcGrayDarker" href="https://exeter.academia.edu/">University of Exeter</a>, <a class="u-tcGrayDarker" href="https://exeter.academia.edu/Departments/Department_of_Sociology_Philosophy_and_Anthropology/Documents">Department of Sociology, Philosophy and Anthropology</a>, <span class="u-tcGrayDarker">Faculty Member</span></div></div></div></div><div class="sidebar-cta-container"><button class="ds2-5-button hidden profile-cta-button grow js-profile-follow-button" data-broccoli-component="user-info.follow-button" data-click-track="profile-user-info-follow-button" data-follow-user-fname="Brian" data-follow-user-id="5109393" data-follow-user-source="profile_button" data-has-google="false"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">add</span>Follow</button><button class="ds2-5-button hidden profile-cta-button grow js-profile-unfollow-button" data-broccoli-component="user-info.unfollow-button" data-click-track="profile-user-info-unfollow-button" data-unfollow-user-id="5109393"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">done</span>Following</button></div></div><div class="user-stats-container"><a><div class="stat-container js-profile-followers"><p class="label">Followers</p><p class="data">88</p></div></a><a><div class="stat-container js-profile-followees" data-broccoli-component="user-info.followees-count" data-click-track="profile-expand-user-info-following"><p class="label">Following</p><p class="data">30</p></div></a><a><div class="stat-container js-profile-coauthors" data-broccoli-component="user-info.coauthors-count" data-click-track="profile-expand-user-info-coauthors"><p class="label">Co-authors</p><p class="data">3</p></div></a><span><div class="stat-container"><p class="label"><span class="js-profile-total-view-text">Public Views</span></p><p class="data"><span class="js-profile-view-count"></span></p></div></span></div><div class="user-bio-container"><div class="profile-bio fake-truncate js-profile-about" style="margin: 0px;"><span class="u-fw700">Phone: </span>+44 (0)1392 723353<br /><b>Address: </b>Exeter, UK<br /><div class="js-profile-less-about u-linkUnstyled u-tcGrayDarker u-textDecorationUnderline u-displayNone">less</div></div></div><div class="suggested-academics-container"><div class="suggested-academics--header"><h3 class="ds2-5-heading-sans-serif-xs">Related Authors</h3></div><ul class="suggested-user-card-list" data-nosnippet="true"><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a data-nosnippet="" href="https://exeter.academia.edu/RichardMoyes"><img class="profile-avatar u-positionAbsolute" alt="Richard Moyes related author profile picture" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" src="https://gravatar.com/avatar/ea13bb37f9da2436fd6f67c329e24b59?s=200" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://exeter.academia.edu/RichardMoyes">Richard Moyes</a><p class="suggested-user-card__user-info__subheader ds2-5-body-xs">University of Exeter</p></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a data-nosnippet="" href="https://usf.academia.edu/ThomasSmith"><img class="profile-avatar u-positionAbsolute" alt="Thomas W Smith related author profile picture" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/5432119/2389375/15068577/s200_thomas.smith.jpg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://usf.academia.edu/ThomasSmith">Thomas W Smith</a><p class="suggested-user-card__user-info__subheader ds2-5-body-xs">University of South Florida</p></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a data-nosnippet="" href="https://pennstate.academia.edu/FrankStec"><img class="profile-avatar u-positionAbsolute" alt="Frank Stec related author profile picture" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/931567/349587/15080986/s200_frank.stec.jpg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://pennstate.academia.edu/FrankStec">Frank Stec</a><p class="suggested-user-card__user-info__subheader ds2-5-body-xs">Pennsylvania State University</p></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a data-nosnippet="" href="https://asu.academia.edu/GabriellaSoto"><img class="profile-avatar u-positionAbsolute" alt="Gabriella Soto related author profile picture" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/423334/109526/15088673/s200_gabriella.soto.jpg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://asu.academia.edu/GabriellaSoto">Gabriella Soto</a><p class="suggested-user-card__user-info__subheader ds2-5-body-xs">Arizona State University</p></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a data-nosnippet="" href="https://yorku.academia.edu/JenniferHyndman"><img class="profile-avatar u-positionAbsolute" alt="Jennifer Hyndman related author profile picture" border="0" src="//a.academia-assets.com/images/s200_no_pic.png" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://yorku.academia.edu/JenniferHyndman">Jennifer Hyndman</a><p class="suggested-user-card__user-info__subheader ds2-5-body-xs">York University</p></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a data-nosnippet="" href="https://radboud.academia.edu/NoraStel"><img class="profile-avatar u-positionAbsolute" alt="Nora Stel related author profile picture" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/1850025/628661/19864304/s200_nora.stel.jpg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://radboud.academia.edu/NoraStel">Nora Stel</a><p class="suggested-user-card__user-info__subheader ds2-5-body-xs">Radboud University Nijmegen</p></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a data-nosnippet="" href="https://independent.academia.edu/ChelseaDaymon"><img class="profile-avatar u-positionAbsolute" alt="Chelsea Daymon related author profile picture" border="0" src="//a.academia-assets.com/images/s200_no_pic.png" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://independent.academia.edu/ChelseaDaymon">Chelsea Daymon</a></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a data-nosnippet="" href="https://independent.academia.edu/MeiliCriezis"><img class="profile-avatar u-positionAbsolute" alt="Meili (Malika) Criezis related author profile picture" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/80674480/19539523/84599544/s200_meili_malika_.criezis.jpeg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://independent.academia.edu/MeiliCriezis">Meili (Malika) Criezis</a></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a data-nosnippet="" href="https://anu-au.academia.edu/AmraLee"><img class="profile-avatar u-positionAbsolute" alt="Amra Lee related author profile picture" border="0" src="//a.academia-assets.com/images/s200_no_pic.png" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://anu-au.academia.edu/AmraLee">Amra Lee</a><p class="suggested-user-card__user-info__subheader ds2-5-body-xs">The Australian National University</p></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a data-nosnippet="" href="https://independent.academia.edu/CConetta"><img class="profile-avatar u-positionAbsolute" alt="Carl Conetta related author profile picture" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/24516633/20261418/19973840/s200_carl.conetta.jpg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://independent.academia.edu/CConetta">Carl Conetta</a></div></div></ul></div><style type="text/css">.suggested-academics--header h3{font-size:16px;font-weight:500;line-height:20px}</style><div class="ri-section"><div class="ri-section-header"><span>Interests</span></div><div class="ri-tags-container"><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="5109393" href="https://www.academia.edu/Documents/in/Sociology"><div id="js-react-on-rails-context" style="display:none" data-rails-context="{"inMailer":false,"i18nLocale":"en","i18nDefaultLocale":"en","href":"https://exeter.academia.edu/BrianRappert","location":"/BrianRappert","scheme":"https","host":"exeter.academia.edu","port":null,"pathname":"/BrianRappert","search":null,"httpAcceptLanguage":null,"serverSide":false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Sociology"]}" data-trace="false" data-dom-id="Pill-react-component-ad20f8c3-a3dd-4ddb-b26e-28ef39630978"></div> <div id="Pill-react-component-ad20f8c3-a3dd-4ddb-b26e-28ef39630978"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="5109393" href="https://www.academia.edu/Documents/in/Ethics"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Ethics"]}" data-trace="false" data-dom-id="Pill-react-component-e35921c8-41a7-45a4-b5e8-ba06f2bfc370"></div> <div id="Pill-react-component-e35921c8-41a7-45a4-b5e8-ba06f2bfc370"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="5109393" href="https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Peace and Conflict Studies"]}" data-trace="false" data-dom-id="Pill-react-component-a7a868c1-f2a2-41e5-b04a-e4ec07468857"></div> <div id="Pill-react-component-a7a868c1-f2a2-41e5-b04a-e4ec07468857"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="5109393" href="https://www.academia.edu/Documents/in/Science_and_Technology_Studies"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Science and Technology Studies"]}" data-trace="false" data-dom-id="Pill-react-component-33efdd32-0bfd-4b1b-9ce6-989a9e68b48a"></div> <div id="Pill-react-component-33efdd32-0bfd-4b1b-9ce6-989a9e68b48a"></div> </a></div></div><div class="external-links-container"><ul class="profile-links new-profile js-UserInfo-social"><li class="profile-profiles js-social-profiles-container"><i class="fa fa-spin fa-spinner"></i></li></ul></div></div></div><div class="right-panel-container"><div class="user-content-wrapper"><div class="uploads-container" id="social-redesign-work-container"><div class="upload-header"><h2 class="ds2-5-heading-sans-serif-xs">Uploads</h2></div><div class="nav-container backbone-profile-documents-nav hidden-xs"><ul class="nav-tablist" role="tablist"><li class="nav-chip active" role="presentation"><a data-section-name="" data-toggle="tab" href="#all" role="tab">all</a></li><li class="nav-chip" role="presentation"><a class="js-profile-docs-nav-section u-textTruncate" data-click-track="profile-works-tab" data-section-name="Books" data-toggle="tab" href="#books" role="tab" title="Books"><span>2</span> <span class="ds2-5-body-sm-bold">Books</span></a></li><li class="nav-chip" role="presentation"><a class="js-profile-docs-nav-section u-textTruncate" data-click-track="profile-works-tab" data-section-name="Biosecurity" data-toggle="tab" href="#biosecurity" role="tab" title="Biosecurity"><span>12</span> <span class="ds2-5-body-sm-bold">Biosecurity</span></a></li><li class="nav-chip" role="presentation"><a class="js-profile-docs-nav-section u-textTruncate" data-click-track="profile-works-tab" data-section-name="Intellectual-Property" data-toggle="tab" href="#intellectualproperty" role="tab" title="Intellectual Property"><span>3</span> <span class="ds2-5-body-sm-bold">Intellectual Property</span></a></li><li class="nav-chip more-tab" role="presentation"><a class="js-profile-documents-more-tab link-unstyled u-textTruncate" data-toggle="dropdown" role="tab">More <i class="fa fa-chevron-down"></i></a><ul class="js-profile-documents-more-dropdown dropdown-menu dropdown-menu-right profile-documents-more-dropdown" role="menu"><li role="presentation"><a data-click-track="profile-works-tab" data-section-name="Armed-Conflict" data-toggle="tab" href="#armedconflict" role="tab" style="border: none;"><span>7</span> Armed Conflict </a></li><li role="presentation"><a data-click-track="profile-works-tab" data-section-name="Genetics" data-toggle="tab" href="#genetics" role="tab" style="border: none;"><span>2</span> Genetics</a></li><li role="presentation"><a data-click-track="profile-works-tab" data-section-name="'Non-lethal'-Weapons" data-toggle="tab" href="#nonlethalweapons" role="tab" style="border: none;"><span>6</span> 'Non-lethal' Weapons</a></li><li role="presentation"><a data-click-track="profile-works-tab" data-section-name="STS---General" data-toggle="tab" href="#stsgeneral" role="tab" style="border: none;"><span>2</span> STS - General </a></li><li role="presentation"><a data-click-track="profile-works-tab" data-section-name="Other" data-toggle="tab" href="#other" role="tab" style="border: none;"><span>3</span> Other</a></li><li role="presentation"><a data-click-track="profile-works-tab" data-section-name="Papers" data-toggle="tab" href="#papers" role="tab" style="border: none;"><span>155</span> Papers</a></li><li role="presentation"><a data-click-track="profile-works-tab" data-section-name="Secrecy" data-toggle="tab" href="#secrecy" role="tab" style="border: none;"><span>1</span> Secrecy</a></li><li role="presentation"><a data-click-track="profile-works-tab" data-section-name="Absences" data-toggle="tab" href="#absences" role="tab" style="border: none;"><span>2</span> Absences</a></li><li role="presentation"><a data-click-track="profile-works-tab" data-section-name="Articles-&-Chapters" data-toggle="tab" href="#articleschapters" role="tab" style="border: none;"><span>2</span> Articles & Chapters</a></li></ul></li></ul></div><div class="divider ds-divider-16" style="margin: 0px;"></div><div class="documents-container backbone-social-profile-documents" style="width: 100%;"><div class="u-taCenter"></div><div class="profile--tab_content_container js-tab-pane tab-pane active" id="all"><div class="profile--tab_heading_container js-section-heading" data-section="Books" id="Books"><h3 class="profile--tab_heading_container">Books by Brian Rappert</h3></div><div class="js-work-strip profile--work_container" data-work-id="7775754"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/7775754/On_the_Dual_Uses_of_Science_and_Ethics"><img alt="Research paper thumbnail of On the Dual Uses of Science and Ethics" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">On the Dual Uses of Science and Ethics</div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="7775754"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="7775754"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 7775754; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=7775754]").text(description); $(".js-view-count[data-work-id=7775754]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 7775754; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='7775754']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=7775754]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":7775754,"title":"On the Dual Uses of Science and Ethics","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/7775754/On_the_Dual_Uses_of_Science_and_Ethics","translated_internal_url":"","created_at":"2014-07-24T22:27:40.677-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"book","co_author_tags":[],"downloadable_attachments":[],"slug":"On_the_Dual_Uses_of_Science_and_Ethics","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":814,"name":"Ethics","url":"https://www.academia.edu/Documents/in/Ethics"},{"id":56415,"name":"Biosecurity","url":"https://www.academia.edu/Documents/in/Biosecurity"}],"urls":[{"id":3240599,"url":"http://press.anu.edu.au/titles/centre-for-applied-philosophy-and-public-ethics-cappe/on-the-dual-uses-of-science-and-ethics/"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-7775754-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4405045"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/4405045/Education_and_Ethics_in_the_Life_Sciences"><img alt="Research paper thumbnail of Education and Ethics in the Life Sciences " class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Education and Ethics in the Life Sciences </div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4405045"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4405045"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4405045; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4405045]").text(description); $(".js-view-count[data-work-id=4405045]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4405045; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4405045']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=4405045]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4405045,"title":"Education and Ethics in the Life Sciences ","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/4405045/Education_and_Ethics_in_the_Life_Sciences","translated_internal_url":"","created_at":"2013-09-04T01:55:37.069-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"book","co_author_tags":[],"downloadable_attachments":[],"slug":"Education_and_Ethics_in_the_Life_Sciences","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[],"urls":[{"id":1546878,"url":"http://epress.anu.edu.au/titles/centre-for-applied-philosophy-and-public-ethics-cappe/education-and-ethics-in-the-life-sciences"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4405045-figures'); } }); </script> <div class="profile--tab_heading_container js-section-heading" data-section="Biosecurity" id="Biosecurity"><h3 class="profile--tab_heading_container">Biosecurity by Brian Rappert</h3></div><div class="js-work-strip profile--work_container" data-work-id="16404104"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/16404104/Why_has_not_there_been_more_research_of_concern"><img alt="Research paper thumbnail of Why has not there been more research of concern?" class="work-thumbnail" src="https://attachments.academia-assets.com/38978716/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/16404104/Why_has_not_there_been_more_research_of_concern">Why has not there been more research of concern?</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Amid the renewed concern in the last several years about the potential for life science research ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Amid the renewed concern in the last several years about the potential for life science research to facilitate the spread of disease, a central plank of the policy response has been to enact processes for assessing the risks and benefits of “research of concern.” The recent controversy regarding a proposed redaction of work on the modification of a H5N1 avian influenza virus is perhaps the most prominent such instance. And yet, a noteworthy feature of this case is its exceptionalness. In the last 10 years, life science publishers, funders, and labs have rarely identified any research as “of concern,” let alone proposed censors. This article takes this experience with risk assessment as an invitation for reflection. Reasons for the low number of instances of concern are related to how the biosecurity dimensions of the life sciences are identified, how they are described, how the assessments of benefits and risks are undertaken, how value considerations do and do not enter into assessments, as well as the lack of information on the outcomes of reviews. This argument builds on such considerations to examine the limitations and implications of the risk–benefit experiment of concern framing, the politics of expertise as well as the prospects for alternative responses.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="24ee621307268a4a9464a7594f20908d" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":38978716,"asset_id":16404104,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/38978716/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="16404104"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="16404104"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 16404104; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=16404104]").text(description); $(".js-view-count[data-work-id=16404104]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 16404104; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='16404104']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "24ee621307268a4a9464a7594f20908d" } } $('.js-work-strip[data-work-id=16404104]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":16404104,"title":"Why has not there been more research of concern?","translated_title":"","metadata":{"abstract":"Amid the renewed concern in the last several years about the potential for life science research to facilitate the spread of disease, a central plank of the policy response has been to enact processes for assessing the risks and benefits of “research of concern.” The recent controversy regarding a proposed redaction of work on the modification of a H5N1 avian influenza virus is perhaps the most prominent such instance. And yet, a noteworthy feature of this case is its exceptionalness. In the last 10 years, life science publishers, funders, and labs have rarely identified any research as “of concern,” let alone proposed censors. This article takes this experience with risk assessment as an invitation for reflection. Reasons for the low number of instances of concern are related to how the biosecurity dimensions of the life sciences are identified, how they are described, how the assessments of benefits and risks are undertaken, how value considerations do and do not enter into assessments, as well as the lack of information on the outcomes of reviews. This argument builds on such considerations to examine the limitations and implications of the risk–benefit experiment of concern framing, the politics of expertise as well as the prospects for alternative responses.","ai_title_tag":"Evaluating the Scarcity of Life Science Research of Concern"},"translated_abstract":"Amid the renewed concern in the last several years about the potential for life science research to facilitate the spread of disease, a central plank of the policy response has been to enact processes for assessing the risks and benefits of “research of concern.” The recent controversy regarding a proposed redaction of work on the modification of a H5N1 avian influenza virus is perhaps the most prominent such instance. And yet, a noteworthy feature of this case is its exceptionalness. In the last 10 years, life science publishers, funders, and labs have rarely identified any research as “of concern,” let alone proposed censors. This article takes this experience with risk assessment as an invitation for reflection. Reasons for the low number of instances of concern are related to how the biosecurity dimensions of the life sciences are identified, how they are described, how the assessments of benefits and risks are undertaken, how value considerations do and do not enter into assessments, as well as the lack of information on the outcomes of reviews. This argument builds on such considerations to examine the limitations and implications of the risk–benefit experiment of concern framing, the politics of expertise as well as the prospects for alternative responses.","internal_url":"https://www.academia.edu/16404104/Why_has_not_there_been_more_research_of_concern","translated_internal_url":"","created_at":"2015-10-02T07:56:45.549-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":38978716,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/38978716/thumbnails/1.jpg","file_name":"fpubh-02-00074_1.pdf","download_url":"https://www.academia.edu/attachments/38978716/download_file","bulk_download_file_name":"Why_has_not_there_been_more_research_of.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/38978716/fpubh-02-00074_1-libre.pdf?1443797743=\u0026response-content-disposition=attachment%3B+filename%3DWhy_has_not_there_been_more_research_of.pdf\u0026Expires=1743668352\u0026Signature=cF5HS-BD-JEclk5Y9BI6wh8TE0FPn6Tixmoh~sZ~8VDVcbmMXfqNfTNR~aUt1~LAawoPvUgPZLc2NlBhG5NifjRXKtSzXDFpdsENbko5Vm1uAlB3X39EvQlVjeV03wNIV1mCoWi7CM9~d~dfsgjnit8izniXs-yLlexdmo0vYsvD6UxOGOvFNdBvnnRdCShTbdbC9V9zr5NTZtl24jTPMXQI-JgbNvexqo9tpBLogPt-n7h~veuGWNH8pTPwdFZSIGwokK43MM6CU-KBxv-P5c6E5ID8KDvWgk~rxrh7AZMrvnUHTYGI~ivIj~MfZ3pnAkWKZG~AVxa~fTSl-~wz-Q__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Why_has_not_there_been_more_research_of_concern","translated_slug":"","page_count":14,"language":"en","content_type":"Work","summary":"Amid the renewed concern in the last several years about the potential for life science research to facilitate the spread of disease, a central plank of the policy response has been to enact processes for assessing the risks and benefits of “research of concern.” The recent controversy regarding a proposed redaction of work on the modification of a H5N1 avian influenza virus is perhaps the most prominent such instance. And yet, a noteworthy feature of this case is its exceptionalness. In the last 10 years, life science publishers, funders, and labs have rarely identified any research as “of concern,” let alone proposed censors. This article takes this experience with risk assessment as an invitation for reflection. Reasons for the low number of instances of concern are related to how the biosecurity dimensions of the life sciences are identified, how they are described, how the assessments of benefits and risks are undertaken, how value considerations do and do not enter into assessments, as well as the lack of information on the outcomes of reviews. This argument builds on such considerations to examine the limitations and implications of the risk–benefit experiment of concern framing, the politics of expertise as well as the prospects for alternative responses.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":38978716,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/38978716/thumbnails/1.jpg","file_name":"fpubh-02-00074_1.pdf","download_url":"https://www.academia.edu/attachments/38978716/download_file","bulk_download_file_name":"Why_has_not_there_been_more_research_of.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/38978716/fpubh-02-00074_1-libre.pdf?1443797743=\u0026response-content-disposition=attachment%3B+filename%3DWhy_has_not_there_been_more_research_of.pdf\u0026Expires=1743668352\u0026Signature=cF5HS-BD-JEclk5Y9BI6wh8TE0FPn6Tixmoh~sZ~8VDVcbmMXfqNfTNR~aUt1~LAawoPvUgPZLc2NlBhG5NifjRXKtSzXDFpdsENbko5Vm1uAlB3X39EvQlVjeV03wNIV1mCoWi7CM9~d~dfsgjnit8izniXs-yLlexdmo0vYsvD6UxOGOvFNdBvnnRdCShTbdbC9V9zr5NTZtl24jTPMXQI-JgbNvexqo9tpBLogPt-n7h~veuGWNH8pTPwdFZSIGwokK43MM6CU-KBxv-P5c6E5ID8KDvWgk~rxrh7AZMrvnUHTYGI~ivIj~MfZ3pnAkWKZG~AVxa~fTSl-~wz-Q__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":4508,"name":"Biological Weapons","url":"https://www.academia.edu/Documents/in/Biological_Weapons"},{"id":22182,"name":"Precautionary Principle","url":"https://www.academia.edu/Documents/in/Precautionary_Principle"},{"id":56415,"name":"Biosecurity","url":"https://www.academia.edu/Documents/in/Biosecurity"},{"id":280205,"name":"Dual Use Techmology Defense Industry","url":"https://www.academia.edu/Documents/in/Dual_Use_Techmology_Defense_Industry"},{"id":563838,"name":"Biosecurity, Bioethics, Bioterrorism","url":"https://www.academia.edu/Documents/in/Biosecurity_Bioethics_Bioterrorism"},{"id":1415883,"name":"Dual-use Research","url":"https://www.academia.edu/Documents/in/Dual-use_Research"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-16404104-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="16404055"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/16404055/Confidence_in_the_Biological_Weapons_Convention_What_is_it_How_can_it_be_secured"><img alt="Research paper thumbnail of Confidence in the Biological Weapons Convention: What is it? How can it be secured?" class="work-thumbnail" src="https://attachments.academia-assets.com/38978618/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/16404055/Confidence_in_the_Biological_Weapons_Convention_What_is_it_How_can_it_be_secured">Confidence in the Biological Weapons Convention: What is it? How can it be secured?</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://exeter.academia.edu/BrianRappert">Brian Rappert</a> and <a class="" data-click-track="profile-work-strip-authors" href="https://issafrica.academia.edu/ChandreGould">Chandre Gould</a></span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">It is vital to revisit how confidence in the Biological Weapons Convention (BWC) can be strengthe...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">It is vital to revisit how confidence in the Biological Weapons Convention (BWC) can be strengthened. To do that we need to ask challenging questions about what limits the relevance of Confidence Building Measures,1 and we need to identify what else is needed to establish and maintain confidence between states parties. This paper enables reflection on how those involved in the BWC process collectively assess issues affecting the convention. It focuses on the prevalence of defensive reasoning, which inhibits robust enquiry and encourages anti-learning practices. It argues that instead of more of the same, alternative types of discussions needed to be nurtured.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="5abf83cc287fa08394a4e9f3139ed894" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":38978618,"asset_id":16404055,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/38978618/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="16404055"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="16404055"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 16404055; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=16404055]").text(description); $(".js-view-count[data-work-id=16404055]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 16404055; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='16404055']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "5abf83cc287fa08394a4e9f3139ed894" } } $('.js-work-strip[data-work-id=16404055]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":16404055,"title":"Confidence in the Biological Weapons Convention: What is it? How can it be secured?","translated_title":"","metadata":{"abstract":"It is vital to revisit how confidence in the Biological Weapons Convention (BWC) can be strengthened. To do that we need to ask challenging questions about what limits the relevance of Confidence Building Measures,1 and we need to identify what else is needed to establish and maintain confidence between states parties. This paper enables reflection on how those involved in the BWC process collectively assess issues affecting the convention. It focuses on the prevalence of defensive reasoning, which inhibits robust enquiry and encourages anti-learning practices. It argues that instead of more of the same, alternative types of discussions needed to be nurtured."},"translated_abstract":"It is vital to revisit how confidence in the Biological Weapons Convention (BWC) can be strengthened. To do that we need to ask challenging questions about what limits the relevance of Confidence Building Measures,1 and we need to identify what else is needed to establish and maintain confidence between states parties. This paper enables reflection on how those involved in the BWC process collectively assess issues affecting the convention. It focuses on the prevalence of defensive reasoning, which inhibits robust enquiry and encourages anti-learning practices. It argues that instead of more of the same, alternative types of discussions needed to be nurtured.","internal_url":"https://www.academia.edu/16404055/Confidence_in_the_Biological_Weapons_Convention_What_is_it_How_can_it_be_secured","translated_internal_url":"","created_at":"2015-10-02T07:52:52.484-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[{"id":6584637,"work_id":16404055,"tagging_user_id":5109393,"tagged_user_id":9103917,"co_author_invite_id":null,"email":"g***d@mweb.co.za","affiliation":"Institute for Security Studies and Sciences-Po","display_order":0,"name":"Chandre Gould","title":"Confidence in the Biological Weapons Convention: What is it? How can it be secured?"},{"id":11936875,"work_id":16404055,"tagging_user_id":9103917,"tagged_user_id":248203936,"co_author_invite_id":2802458,"email":"p***a@issafrica.org","display_order":4194304,"name":"Institute Security Studies","title":"Confidence in the Biological Weapons Convention: What is it? How can it be secured?"}],"downloadable_attachments":[{"id":38978618,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/38978618/thumbnails/1.jpg","file_name":"ISS_Paper_258_Rappert_and_Gould.pdf","download_url":"https://www.academia.edu/attachments/38978618/download_file","bulk_download_file_name":"Confidence_in_the_Biological_Weapons_Con.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/38978618/ISS_Paper_258_Rappert_and_Gould-libre.pdf?1443797304=\u0026response-content-disposition=attachment%3B+filename%3DConfidence_in_the_Biological_Weapons_Con.pdf\u0026Expires=1743668352\u0026Signature=R4~BwYNseFSYBXaOwAjXHQ1m0lFeWqGao3ETzl~2myA2mpoEgcmhEGh7yD6y17QgO~k2QCkasFCAw2BG9csZLMqBr32BRF9PqiIDzQDgjh1dZUcr9bHCy-E4QY-uYnv~h3Oj3wVctPDT7jB4KbKIOBq3AH3uMW2BIGQ~0vAoaATh9AKyxx2M1aFzK5NyQiUzGGIMoIOQIOJmayek5P0XRI4Zn289qUHx0C9NTMc5WoQN189wum-N-cKV-4uB6ZVmwS11VSlhhIS6OerA20wQ1jUqHG010wHy7kKtdsFyzGE3~Jb6G~wlL7kZhgT48O75AHsbverKXyNNmcwjvYiLHQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Confidence_in_the_Biological_Weapons_Convention_What_is_it_How_can_it_be_secured","translated_slug":"","page_count":20,"language":"en","content_type":"Work","summary":"It is vital to revisit how confidence in the Biological Weapons Convention (BWC) can be strengthened. To do that we need to ask challenging questions about what limits the relevance of Confidence Building Measures,1 and we need to identify what else is needed to establish and maintain confidence between states parties. This paper enables reflection on how those involved in the BWC process collectively assess issues affecting the convention. It focuses on the prevalence of defensive reasoning, which inhibits robust enquiry and encourages anti-learning practices. It argues that instead of more of the same, alternative types of discussions needed to be nurtured.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":38978618,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/38978618/thumbnails/1.jpg","file_name":"ISS_Paper_258_Rappert_and_Gould.pdf","download_url":"https://www.academia.edu/attachments/38978618/download_file","bulk_download_file_name":"Confidence_in_the_Biological_Weapons_Con.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/38978618/ISS_Paper_258_Rappert_and_Gould-libre.pdf?1443797304=\u0026response-content-disposition=attachment%3B+filename%3DConfidence_in_the_Biological_Weapons_Con.pdf\u0026Expires=1743668352\u0026Signature=R4~BwYNseFSYBXaOwAjXHQ1m0lFeWqGao3ETzl~2myA2mpoEgcmhEGh7yD6y17QgO~k2QCkasFCAw2BG9csZLMqBr32BRF9PqiIDzQDgjh1dZUcr9bHCy-E4QY-uYnv~h3Oj3wVctPDT7jB4KbKIOBq3AH3uMW2BIGQ~0vAoaATh9AKyxx2M1aFzK5NyQiUzGGIMoIOQIOJmayek5P0XRI4Zn289qUHx0C9NTMc5WoQN189wum-N-cKV-4uB6ZVmwS11VSlhhIS6OerA20wQ1jUqHG010wHy7kKtdsFyzGE3~Jb6G~wlL7kZhgT48O75AHsbverKXyNNmcwjvYiLHQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":4508,"name":"Biological Weapons","url":"https://www.academia.edu/Documents/in/Biological_Weapons"},{"id":184185,"name":"Arms Control and Disarmament","url":"https://www.academia.edu/Documents/in/Arms_Control_and_Disarmament"},{"id":747385,"name":"Biological and Toxin Weapons Convention","url":"https://www.academia.edu/Documents/in/Biological_and_Toxin_Weapons_Convention"},{"id":860449,"name":"Argyris, Chris","url":"https://www.academia.edu/Documents/in/Argyris_Chris"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-16404055-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="7775799"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/7775799/Biological_Weapons_Convention_Confidence_the_prohibition_and_learning_from_the_past"><img alt="Research paper thumbnail of Biological Weapons Convention Confidence, the prohibition and learning from the past " class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Biological Weapons Convention Confidence, the prohibition and learning from the past </div><div class="wp-workCard_item"><span>ISS Report</span><span>, Jul 2014</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="7775799"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="7775799"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 7775799; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=7775799]").text(description); $(".js-view-count[data-work-id=7775799]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 7775799; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='7775799']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=7775799]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":7775799,"title":"Biological Weapons Convention Confidence, the prohibition and learning from the past ","translated_title":"","metadata":{"publication_date":{"day":null,"month":7,"year":2014,"errors":{}},"publication_name":"ISS Report"},"translated_abstract":null,"internal_url":"https://www.academia.edu/7775799/Biological_Weapons_Convention_Confidence_the_prohibition_and_learning_from_the_past","translated_internal_url":"","created_at":"2014-07-24T22:33:03.377-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"Biological_Weapons_Convention_Confidence_the_prohibition_and_learning_from_the_past","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":56415,"name":"Biosecurity","url":"https://www.academia.edu/Documents/in/Biosecurity"},{"id":563838,"name":"Biosecurity, Bioethics, Bioterrorism","url":"https://www.academia.edu/Documents/in/Biosecurity_Bioethics_Bioterrorism"}],"urls":[{"id":3240609,"url":"http://www.issafrica.org/publications/papers/biological-weapons-convention-confidence-the-prohibition-and-learning-from-the-past"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-7775799-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="7775788"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/7775788/Why_has_not_there_been_more_research_of_concern"><img alt="Research paper thumbnail of Why has not there been more research of concern? " class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Why has not there been more research of concern? </div><div class="wp-workCard_item"><span>Front. Public Health </span><span>, Jul 2014</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="7775788"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="7775788"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 7775788; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=7775788]").text(description); $(".js-view-count[data-work-id=7775788]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 7775788; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='7775788']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=7775788]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":7775788,"title":"Why has not there been more research of concern? ","translated_title":"","metadata":{"publication_date":{"day":null,"month":7,"year":2014,"errors":{}},"publication_name":"Front. Public Health "},"translated_abstract":null,"internal_url":"https://www.academia.edu/7775788/Why_has_not_there_been_more_research_of_concern","translated_internal_url":"","created_at":"2014-07-24T22:31:37.185-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"Why_has_not_there_been_more_research_of_concern","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":4508,"name":"Biological Weapons","url":"https://www.academia.edu/Documents/in/Biological_Weapons"},{"id":56415,"name":"Biosecurity","url":"https://www.academia.edu/Documents/in/Biosecurity"},{"id":563838,"name":"Biosecurity, Bioethics, Bioterrorism","url":"https://www.academia.edu/Documents/in/Biosecurity_Bioethics_Bioterrorism"}],"urls":[{"id":3240608,"url":"http://journal.frontiersin.org/Journal/10.3389/fpubh.2014.00074/abstract"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-7775788-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="7775772"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/7775772/Ethics_as_"><img alt="Research paper thumbnail of Ethics as …" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Ethics as …</div><div class="wp-workCard_item"><span>On the Dual uses of Sciene and Ethics: Principles, Practices, and Prospects </span><span>, Dec 2013</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="7775772"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="7775772"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 7775772; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=7775772]").text(description); $(".js-view-count[data-work-id=7775772]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 7775772; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='7775772']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=7775772]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":7775772,"title":"Ethics as …","translated_title":"","metadata":{"publication_date":{"day":null,"month":12,"year":2013,"errors":{}},"publication_name":"On the Dual uses of Sciene and Ethics: Principles, Practices, and Prospects "},"translated_abstract":null,"internal_url":"https://www.academia.edu/7775772/Ethics_as_","translated_internal_url":"","created_at":"2014-07-24T22:29:33.637-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"Ethics_as_","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":814,"name":"Ethics","url":"https://www.academia.edu/Documents/in/Ethics"},{"id":56415,"name":"Biosecurity","url":"https://www.academia.edu/Documents/in/Biosecurity"},{"id":563838,"name":"Biosecurity, Bioethics, Bioterrorism","url":"https://www.academia.edu/Documents/in/Biosecurity_Bioethics_Bioterrorism"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-7775772-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404974"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/4404974/Introduction_A_Web_of_Prevention"><img alt="Research paper thumbnail of Introduction: A Web of Prevention" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Introduction: A Web of Prevention</div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404974"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404974"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404974; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404974]").text(description); $(".js-view-count[data-work-id=4404974]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404974; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404974']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=4404974]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404974,"title":"Introduction: A Web of Prevention","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404974/Introduction_A_Web_of_Prevention","translated_internal_url":"","created_at":"2013-09-04T01:49:15.552-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"Introduction_A_Web_of_Prevention","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[],"urls":[{"id":1546828,"url":"http://eric.exeter.ac.uk/exeter/bitstream/10036/31457/1/9781844073733.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404974-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404964"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/4404964/Responsibility_in_the_Life_Sciences_Assessing_the_Role_of_Professional_Codes"><img alt="Research paper thumbnail of Responsibility in the Life Sciences: Assessing the Role of Professional Codes" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Responsibility in the Life Sciences: Assessing the Role of Professional Codes</div><div class="wp-workCard_item"><span>Biosecurity and Bioterrorism-biodefense Strategy Practice and Science</span><span>, 2004</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">In response to threats from bioweapons, questions are being asked today in some countries about t...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">In response to threats from bioweapons, questions are being asked today in some countries about the implications and appropriateness of biological research. Many organizations and governments have suggested that bioscientists adopt what is generally referred to as a &amp;amp;amp;amp;amp;amp;amp;quot;code of conduct&amp;amp;amp;amp;amp;amp;amp;quot; to reduce the security concerns associated with their work. This article examines the potential contribution of such codes. By drawing on past lessons in other areas of professional life, it suggests some key questions, issues, and dilemmas for future consideration. As argued, attempts to establish codes must address demanding questions about their aims and audience--questions whose answers depend on potentially contentious issues regarding arms control, science, ethics, and politics.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404964"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404964"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404964; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404964]").text(description); $(".js-view-count[data-work-id=4404964]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404964; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404964']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=4404964]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404964,"title":"Responsibility in the Life Sciences: Assessing the Role of Professional Codes","translated_title":"","metadata":{"abstract":"In response to threats from bioweapons, questions are being asked today in some countries about the implications and appropriateness of biological research. Many organizations and governments have suggested that bioscientists adopt what is generally referred to as a \u0026amp;amp;amp;amp;amp;amp;amp;quot;code of conduct\u0026amp;amp;amp;amp;amp;amp;amp;quot; to reduce the security concerns associated with their work. This article examines the potential contribution of such codes. By drawing on past lessons in other areas of professional life, it suggests some key questions, issues, and dilemmas for future consideration. As argued, attempts to establish codes must address demanding questions about their aims and audience--questions whose answers depend on potentially contentious issues regarding arms control, science, ethics, and politics.","publication_date":{"day":null,"month":null,"year":2004,"errors":{}},"publication_name":"Biosecurity and Bioterrorism-biodefense Strategy Practice and Science"},"translated_abstract":"In response to threats from bioweapons, questions are being asked today in some countries about the implications and appropriateness of biological research. Many organizations and governments have suggested that bioscientists adopt what is generally referred to as a \u0026amp;amp;amp;amp;amp;amp;amp;quot;code of conduct\u0026amp;amp;amp;amp;amp;amp;amp;quot; to reduce the security concerns associated with their work. This article examines the potential contribution of such codes. By drawing on past lessons in other areas of professional life, it suggests some key questions, issues, and dilemmas for future consideration. As argued, attempts to establish codes must address demanding questions about their aims and audience--questions whose answers depend on potentially contentious issues regarding arms control, science, ethics, and politics.","internal_url":"https://www.academia.edu/4404964/Responsibility_in_the_Life_Sciences_Assessing_the_Role_of_Professional_Codes","translated_internal_url":"","created_at":"2013-09-04T01:48:59.681-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"Responsibility_in_the_Life_Sciences_Assessing_the_Role_of_Professional_Codes","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"In response to threats from bioweapons, questions are being asked today in some countries about the implications and appropriateness of biological research. Many organizations and governments have suggested that bioscientists adopt what is generally referred to as a \u0026amp;amp;amp;amp;amp;amp;amp;quot;code of conduct\u0026amp;amp;amp;amp;amp;amp;amp;quot; to reduce the security concerns associated with their work. This article examines the potential contribution of such codes. By drawing on past lessons in other areas of professional life, it suggests some key questions, issues, and dilemmas for future consideration. As argued, attempts to establish codes must address demanding questions about their aims and audience--questions whose answers depend on potentially contentious issues regarding arms control, science, ethics, and politics.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":7646,"name":"Professional Ethics","url":"https://www.academia.edu/Documents/in/Professional_Ethics"},{"id":8014,"name":"Life Sciences","url":"https://www.academia.edu/Documents/in/Life_Sciences"},{"id":47884,"name":"Biological Sciences","url":"https://www.academia.edu/Documents/in/Biological_Sciences"},{"id":98134,"name":"United States","url":"https://www.academia.edu/Documents/in/United_States"},{"id":291274,"name":"Great Britain","url":"https://www.academia.edu/Documents/in/Great_Britain"},{"id":332907,"name":"Biological Warfare","url":"https://www.academia.edu/Documents/in/Biological_Warfare"},{"id":396310,"name":"Codes of Ethics","url":"https://www.academia.edu/Documents/in/Codes_of_Ethics"}],"urls":[{"id":1546821,"url":"http://www.ingentaselect.com/rpsv/cgi-bin/cgi?ini=xref\u0026body=linker\u0026reqdoi=10.1089/15387130460759218"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404964-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404966"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4404966/Coding_ethical_behaviour_The_challenges_of_biological_weapons"><img alt="Research paper thumbnail of Coding ethical behaviour: The challenges of biological weapons" class="work-thumbnail" src="https://attachments.academia-assets.com/49877973/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4404966/Coding_ethical_behaviour_The_challenges_of_biological_weapons">Coding ethical behaviour: The challenges of biological weapons</a></div><div class="wp-workCard_item"><span>Science and Engineering Ethics</span><span>, 2003</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Since 11 September 2001 and the anthrax attacks that followed in the US, public and policy concer...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Since 11 September 2001 and the anthrax attacks that followed in the US, public and policy concerns about the security threats posed by biological weapons have increased significantly. With this has come an expansion of those activities in civil society deemed as potential sites for applying security controls. This paper examines the assumptions and implications of national and international efforts in one such area: how a balance or integration can take place between security and openness in civilian biomedical research through devising professional codes of conduct for scientists. Future attempts to establish such codes must find a way of reconciling or at least addressing dilemmatic and tension-ridden issues about the appropriateness of research; a topic that raises fundamental questions about the position of science within society.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="f0d8e31df3f6749f897bc4f4c3bf071d" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":49877973,"asset_id":4404966,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/49877973/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404966"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404966"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404966; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404966]").text(description); $(".js-view-count[data-work-id=4404966]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404966; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404966']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "f0d8e31df3f6749f897bc4f4c3bf071d" } } $('.js-work-strip[data-work-id=4404966]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404966,"title":"Coding ethical behaviour: The challenges of biological weapons","translated_title":"","metadata":{"abstract":"Since 11 September 2001 and the anthrax attacks that followed in the US, public and policy concerns about the security threats posed by biological weapons have increased significantly. With this has come an expansion of those activities in civil society deemed as potential sites for applying security controls. This paper examines the assumptions and implications of national and international efforts in one such area: how a balance or integration can take place between security and openness in civilian biomedical research through devising professional codes of conduct for scientists. Future attempts to establish such codes must find a way of reconciling or at least addressing dilemmatic and tension-ridden issues about the appropriateness of research; a topic that raises fundamental questions about the position of science within society.","publication_date":{"day":null,"month":null,"year":2003,"errors":{}},"publication_name":"Science and Engineering Ethics"},"translated_abstract":"Since 11 September 2001 and the anthrax attacks that followed in the US, public and policy concerns about the security threats posed by biological weapons have increased significantly. With this has come an expansion of those activities in civil society deemed as potential sites for applying security controls. This paper examines the assumptions and implications of national and international efforts in one such area: how a balance or integration can take place between security and openness in civilian biomedical research through devising professional codes of conduct for scientists. Future attempts to establish such codes must find a way of reconciling or at least addressing dilemmatic and tension-ridden issues about the appropriateness of research; a topic that raises fundamental questions about the position of science within society.","internal_url":"https://www.academia.edu/4404966/Coding_ethical_behaviour_The_challenges_of_biological_weapons","translated_internal_url":"","created_at":"2013-09-04T01:49:03.567-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":49877973,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/49877973/thumbnails/1.jpg","file_name":"s11948-003-0044-720161026-27105-117ahf0.pdf","download_url":"https://www.academia.edu/attachments/49877973/download_file","bulk_download_file_name":"Coding_ethical_behaviour_The_challenges.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/49877973/s11948-003-0044-720161026-27105-117ahf0-libre.pdf?1477475926=\u0026response-content-disposition=attachment%3B+filename%3DCoding_ethical_behaviour_The_challenges.pdf\u0026Expires=1743668352\u0026Signature=KcuTzf94pFLgFMo5c1cuRK4Z4pPnqOZh4JC6Hi41h31EfqzJyIko11aMliZkMaBc4Ghknk0rYgV8nLGU1LaP1V4tYXchOUWbUM3pI5~Q3a0y2G63UDj8cx1U1QtB7kmo7UIq6hk9bACETZ9MyH0BzQo9PmL62ENoDlJwT-H2Sgn7Dp46sjFAWLm0fhErdQLiFZDdpRr9bWnDs9NDZTlQDGhADWxu-B6t0q6qsGE5PGBhwIwW4boy1y1lu-eHGB4XdcQilkvFPFzA52QXy12tBXc7HR1G9tFs1kPZJm~pjFzk1QcFdVB9Y6re5MlB5~uRw6GCKvx3TdRCf-c4tlIeVA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Coding_ethical_behaviour_The_challenges_of_biological_weapons","translated_slug":"","page_count":18,"language":"en","content_type":"Work","summary":"Since 11 September 2001 and the anthrax attacks that followed in the US, public and policy concerns about the security threats posed by biological weapons have increased significantly. With this has come an expansion of those activities in civil society deemed as potential sites for applying security controls. This paper examines the assumptions and implications of national and international efforts in one such area: how a balance or integration can take place between security and openness in civilian biomedical research through devising professional codes of conduct for scientists. Future attempts to establish such codes must find a way of reconciling or at least addressing dilemmatic and tension-ridden issues about the appropriateness of research; a topic that raises fundamental questions about the position of science within society.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":49877973,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/49877973/thumbnails/1.jpg","file_name":"s11948-003-0044-720161026-27105-117ahf0.pdf","download_url":"https://www.academia.edu/attachments/49877973/download_file","bulk_download_file_name":"Coding_ethical_behaviour_The_challenges.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/49877973/s11948-003-0044-720161026-27105-117ahf0-libre.pdf?1477475926=\u0026response-content-disposition=attachment%3B+filename%3DCoding_ethical_behaviour_The_challenges.pdf\u0026Expires=1743668352\u0026Signature=KcuTzf94pFLgFMo5c1cuRK4Z4pPnqOZh4JC6Hi41h31EfqzJyIko11aMliZkMaBc4Ghknk0rYgV8nLGU1LaP1V4tYXchOUWbUM3pI5~Q3a0y2G63UDj8cx1U1QtB7kmo7UIq6hk9bACETZ9MyH0BzQo9PmL62ENoDlJwT-H2Sgn7Dp46sjFAWLm0fhErdQLiFZDdpRr9bWnDs9NDZTlQDGhADWxu-B6t0q6qsGE5PGBhwIwW4boy1y1lu-eHGB4XdcQilkvFPFzA52QXy12tBXc7HR1G9tFs1kPZJm~pjFzk1QcFdVB9Y6re5MlB5~uRw6GCKvx3TdRCf-c4tlIeVA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":906,"name":"Applied Ethics","url":"https://www.academia.edu/Documents/in/Applied_Ethics"},{"id":6779,"name":"Science","url":"https://www.academia.edu/Documents/in/Science"},{"id":24890,"name":"Intergroup Conflict (Psychology)","url":"https://www.academia.edu/Documents/in/Intergroup_Conflict_Psychology_"},{"id":40023,"name":"Social Responsibility","url":"https://www.academia.edu/Documents/in/Social_Responsibility"},{"id":43017,"name":"Civil Society","url":"https://www.academia.edu/Documents/in/Civil_Society"},{"id":76284,"name":"Code of Conduct","url":"https://www.academia.edu/Documents/in/Code_of_Conduct"},{"id":102808,"name":"Bioterrorism","url":"https://www.academia.edu/Documents/in/Bioterrorism"},{"id":291274,"name":"Great Britain","url":"https://www.academia.edu/Documents/in/Great_Britain"},{"id":332907,"name":"Biological Warfare","url":"https://www.academia.edu/Documents/in/Biological_Warfare"},{"id":396310,"name":"Codes of Ethics","url":"https://www.academia.edu/Documents/in/Codes_of_Ethics"},{"id":489423,"name":"Morals","url":"https://www.academia.edu/Documents/in/Morals"},{"id":839672,"name":"Ethics Research","url":"https://www.academia.edu/Documents/in/Ethics_Research"}],"urls":[{"id":1546823,"url":"http://www.springerlink.com/index/71up4822299p6275.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404966-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404973"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4404973/The_Narrative_Shaping_of_a_Product_Creaction_Process"><img alt="Research paper thumbnail of The Narrative Shaping of a Product Creaction Process" class="work-thumbnail" src="https://attachments.academia-assets.com/49877972/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4404973/The_Narrative_Shaping_of_a_Product_Creaction_Process">The Narrative Shaping of a Product Creaction Process</a></div><div class="wp-workCard_item"><span>Futures</span><span>, 2000</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="8ed0c70af6f3e2cef9a219f65f12376e" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":49877972,"asset_id":4404973,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/49877972/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404973"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404973"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404973; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404973]").text(description); $(".js-view-count[data-work-id=4404973]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404973; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404973']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "8ed0c70af6f3e2cef9a219f65f12376e" } } $('.js-work-strip[data-work-id=4404973]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404973,"title":"The Narrative Shaping of a Product Creaction Process","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2000,"errors":{}},"publication_name":"Futures"},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404973/The_Narrative_Shaping_of_a_Product_Creaction_Process","translated_internal_url":"","created_at":"2013-09-04T01:49:08.730-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":49877972,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/49877972/thumbnails/1.jpg","file_name":"The_Narrative_Shaping_of_a_Product_Creac20161026-6304-1tkbqw5.pdf","download_url":"https://www.academia.edu/attachments/49877972/download_file","bulk_download_file_name":"The_Narrative_Shaping_of_a_Product_Creac.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/49877972/The_Narrative_Shaping_of_a_Product_Creac20161026-6304-1tkbqw5-libre.pdf?1477475920=\u0026response-content-disposition=attachment%3B+filename%3DThe_Narrative_Shaping_of_a_Product_Creac.pdf\u0026Expires=1743575525\u0026Signature=Oc2IvWPlLw82oRGz-QFhQVdmNvexSyeklINRltoTs-HeKRXBC3pBJf8vkSu5EWBu-NSQf4vvxVs-1XocSFCk1yELyd6t2LxoyGgy0BoiUs0vOdmAEEn4ahdieskCFXrQasu~Q2rNS1giATzHRYY~TpQGZieR4TfTsCMN19wJux9hBSMQR0WbnUrSTUE8Izm4K4tXxc50VY-YFjbBlqKLL-OBXM0l83-SzEqKN0idM1LgOenVS4fYQGUJIEbGa~leAPAZm0S2FDwQVpZaefY6Iu1jxqTZqNoOuSN-AzJRUj5rZnd1glqif2bpCOHzBPl7UgyUX4JzkNu52pqrBQwMbg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"The_Narrative_Shaping_of_a_Product_Creaction_Process","translated_slug":"","page_count":22,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":49877972,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/49877972/thumbnails/1.jpg","file_name":"The_Narrative_Shaping_of_a_Product_Creac20161026-6304-1tkbqw5.pdf","download_url":"https://www.academia.edu/attachments/49877972/download_file","bulk_download_file_name":"The_Narrative_Shaping_of_a_Product_Creac.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/49877972/The_Narrative_Shaping_of_a_Product_Creac20161026-6304-1tkbqw5-libre.pdf?1477475920=\u0026response-content-disposition=attachment%3B+filename%3DThe_Narrative_Shaping_of_a_Product_Creac.pdf\u0026Expires=1743575525\u0026Signature=Oc2IvWPlLw82oRGz-QFhQVdmNvexSyeklINRltoTs-HeKRXBC3pBJf8vkSu5EWBu-NSQf4vvxVs-1XocSFCk1yELyd6t2LxoyGgy0BoiUs0vOdmAEEn4ahdieskCFXrQasu~Q2rNS1giATzHRYY~TpQGZieR4TfTsCMN19wJux9hBSMQR0WbnUrSTUE8Izm4K4tXxc50VY-YFjbBlqKLL-OBXM0l83-SzEqKN0idM1LgOenVS4fYQGUJIEbGa~leAPAZm0S2FDwQVpZaefY6Iu1jxqTZqNoOuSN-AzJRUj5rZnd1glqif2bpCOHzBPl7UgyUX4JzkNu52pqrBQwMbg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":111757,"name":"Futures","url":"https://www.academia.edu/Documents/in/Futures"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404973-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404975"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4404975/The_benefits_risks_and_threats_of_biotechnology"><img alt="Research paper thumbnail of The benefits, risks, and threats of biotechnology" class="work-thumbnail" src="https://attachments.academia-assets.com/31832356/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4404975/The_benefits_risks_and_threats_of_biotechnology">The benefits, risks, and threats of biotechnology</a></div><div class="wp-workCard_item"><span>Science & Public Policy</span><span>, 2008</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">This article considers how threats, risks, and benefits associated with research are defined in c...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">This article considers how threats, risks, and benefits associated with research are defined in contemporary policy debates. Specifically, it examines what has become known as the 'dual-use potential' of life science research findings and techniques. Focus is given to the emerging dominant policy response of enacting oversight processes to weigh the risks and benefits of individual instances of research. The curiosity at the center of this article is how it is often said that any knowledge might be used for destructive ends but, in practice, it has been extremely rare that anything has even been identified as 'of concern'. This situation raises basic questions about the purposes and prospects of oversight procedures. Various proposals are advanced in reply. These include better understanding how notions of the utility of research are constructed, searching for improved methods for assessing risks and benefits, attending to factors that might affect risk-benefit calculations, pursuing alternative questions and challenging fundamental tenants in policy discussions. S Brian Rappert is at the</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="fabf8259b414c6d79ad91401dd9715a7" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":31832356,"asset_id":4404975,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/31832356/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404975"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404975"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404975; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404975]").text(description); $(".js-view-count[data-work-id=4404975]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404975; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404975']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "fabf8259b414c6d79ad91401dd9715a7" } } $('.js-work-strip[data-work-id=4404975]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404975,"title":"The benefits, risks, and threats of biotechnology","translated_title":"","metadata":{"grobid_abstract":"This article considers how threats, risks, and benefits associated with research are defined in contemporary policy debates. Specifically, it examines what has become known as the 'dual-use potential' of life science research findings and techniques. Focus is given to the emerging dominant policy response of enacting oversight processes to weigh the risks and benefits of individual instances of research. The curiosity at the center of this article is how it is often said that any knowledge might be used for destructive ends but, in practice, it has been extremely rare that anything has even been identified as 'of concern'. This situation raises basic questions about the purposes and prospects of oversight procedures. Various proposals are advanced in reply. These include better understanding how notions of the utility of research are constructed, searching for improved methods for assessing risks and benefits, attending to factors that might affect risk-benefit calculations, pursuing alternative questions and challenging fundamental tenants in policy discussions. S Brian Rappert is at the","publication_date":{"day":null,"month":null,"year":2008,"errors":{}},"publication_name":"Science \u0026 Public Policy","grobid_abstract_attachment_id":31832356},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404975/The_benefits_risks_and_threats_of_biotechnology","translated_internal_url":"","created_at":"2013-09-04T01:49:16.126-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":31832356,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/31832356/thumbnails/1.jpg","file_name":"SPP.pdf","download_url":"https://www.academia.edu/attachments/31832356/download_file","bulk_download_file_name":"The_benefits_risks_and_threats_of_biotec.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/31832356/SPP-libre.pdf?1392448825=\u0026response-content-disposition=attachment%3B+filename%3DThe_benefits_risks_and_threats_of_biotec.pdf\u0026Expires=1743668352\u0026Signature=W~TD6ampYWgCkDken-F0-CpBuSzZnDdJ9pyjS3e3LLOrWWTqA~xTPF3rQaGQFYAFq~dD-jIo3JvzME2WS~pExHgclIxFMSvHjYgdETdXcnjEiGOTBnlBXly54Wtlh6fIg3Y6UII-DrvjEADR7YwZ4n-JFH4xcyso8h2vHGFbdmUXetohmJt~HIBnvCMzQ9L8ChCd~o-zpXfwOTbidMRXoClNWwiFwz1RYiiQjnt1V~cGHPOI-Lz8JsEJmJeMNqSpd2NGHcVVJkmytQvdfbSdc8mAV0l30G54As0MXaJ5BYQkN8yZiaP0-1I6LVBmiHBPbSZ3AcHNqlIHhMM3obMoVg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"The_benefits_risks_and_threats_of_biotechnology","translated_slug":"","page_count":7,"language":"en","content_type":"Work","summary":"This article considers how threats, risks, and benefits associated with research are defined in contemporary policy debates. Specifically, it examines what has become known as the 'dual-use potential' of life science research findings and techniques. Focus is given to the emerging dominant policy response of enacting oversight processes to weigh the risks and benefits of individual instances of research. The curiosity at the center of this article is how it is often said that any knowledge might be used for destructive ends but, in practice, it has been extremely rare that anything has even been identified as 'of concern'. This situation raises basic questions about the purposes and prospects of oversight procedures. Various proposals are advanced in reply. These include better understanding how notions of the utility of research are constructed, searching for improved methods for assessing risks and benefits, attending to factors that might affect risk-benefit calculations, pursuing alternative questions and challenging fundamental tenants in policy discussions. S Brian Rappert is at the","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":31832356,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/31832356/thumbnails/1.jpg","file_name":"SPP.pdf","download_url":"https://www.academia.edu/attachments/31832356/download_file","bulk_download_file_name":"The_benefits_risks_and_threats_of_biotec.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/31832356/SPP-libre.pdf?1392448825=\u0026response-content-disposition=attachment%3B+filename%3DThe_benefits_risks_and_threats_of_biotec.pdf\u0026Expires=1743668352\u0026Signature=W~TD6ampYWgCkDken-F0-CpBuSzZnDdJ9pyjS3e3LLOrWWTqA~xTPF3rQaGQFYAFq~dD-jIo3JvzME2WS~pExHgclIxFMSvHjYgdETdXcnjEiGOTBnlBXly54Wtlh6fIg3Y6UII-DrvjEADR7YwZ4n-JFH4xcyso8h2vHGFbdmUXetohmJt~HIBnvCMzQ9L8ChCd~o-zpXfwOTbidMRXoClNWwiFwz1RYiiQjnt1V~cGHPOI-Lz8JsEJmJeMNqSpd2NGHcVVJkmytQvdfbSdc8mAV0l30G54As0MXaJ5BYQkN8yZiaP0-1I6LVBmiHBPbSZ3AcHNqlIHhMM3obMoVg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"},{"id":8014,"name":"Life Sciences","url":"https://www.academia.edu/Documents/in/Life_Sciences"}],"urls":[{"id":1546829,"url":"http://people.exeter.ac.uk/br201/Research/Publications/SPP.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404975-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404986"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4404986/Codes_of_Conduct_and_Biological_Weapons_An_In_process_Assessment"><img alt="Research paper thumbnail of Codes of Conduct and Biological Weapons: An In-process Assessment" class="work-thumbnail" src="https://attachments.academia-assets.com/31832358/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4404986/Codes_of_Conduct_and_Biological_Weapons_An_In_process_Assessment">Codes of Conduct and Biological Weapons: An In-process Assessment</a></div><div class="wp-workCard_item"><span>Biosecurity and Bioterrorism-biodefense Strategy Practice and Science</span><span>, 2007</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Codes of conduct have received a significant amount of attention in recent years as a policy opti...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Codes of conduct have received a significant amount of attention in recent years as a policy option to address concerns about the relation between life science research and the deliberate spread of disease through biological weapons. While the term code of conduct has functioned as a generic umbrella phrase for an array of different types of codes, in general, such codes seek to set expectations regarding thinking and behavior for those associated with the life sciences. The purpose of this article is fourfold: (1) to survey recent developments, specifically with respect to "universal" and "scientific society" types of codes; (2) to propose criteria for assessing these initiatives; (3) to evaluate activities undertaken to date on the basis of these criteria; and (4) to propose key questions for the future. Overall, a mixed assessment is offered of the achievements of code-related activities to date. As argued, because of this overall situation, in the future careful attention should be given to what is sought out of this option and how it can be realized in practice.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="2545afbfcee8be29f4d2ccf03586cb13" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":31832358,"asset_id":4404986,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/31832358/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404986"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404986"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404986; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404986]").text(description); $(".js-view-count[data-work-id=4404986]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404986; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404986']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "2545afbfcee8be29f4d2ccf03586cb13" } } $('.js-work-strip[data-work-id=4404986]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404986,"title":"Codes of Conduct and Biological Weapons: An In-process Assessment","translated_title":"","metadata":{"ai_title_tag":"Evaluating Codes of Conduct on Biological Weapons Strategy","grobid_abstract":"Codes of conduct have received a significant amount of attention in recent years as a policy option to address concerns about the relation between life science research and the deliberate spread of disease through biological weapons. While the term code of conduct has functioned as a generic umbrella phrase for an array of different types of codes, in general, such codes seek to set expectations regarding thinking and behavior for those associated with the life sciences. The purpose of this article is fourfold: (1) to survey recent developments, specifically with respect to \"universal\" and \"scientific society\" types of codes; (2) to propose criteria for assessing these initiatives; (3) to evaluate activities undertaken to date on the basis of these criteria; and (4) to propose key questions for the future. Overall, a mixed assessment is offered of the achievements of code-related activities to date. As argued, because of this overall situation, in the future careful attention should be given to what is sought out of this option and how it can be realized in practice.","publication_date":{"day":null,"month":null,"year":2007,"errors":{}},"publication_name":"Biosecurity and Bioterrorism-biodefense Strategy Practice and Science","grobid_abstract_attachment_id":31832358},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404986/Codes_of_Conduct_and_Biological_Weapons_An_In_process_Assessment","translated_internal_url":"","created_at":"2013-09-04T01:49:39.541-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":31832358,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/31832358/thumbnails/1.jpg","file_name":"Rappert.pdf","download_url":"https://www.academia.edu/attachments/31832358/download_file","bulk_download_file_name":"Codes_of_Conduct_and_Biological_Weapons.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/31832358/Rappert-libre.pdf?1392432388=\u0026response-content-disposition=attachment%3B+filename%3DCodes_of_Conduct_and_Biological_Weapons.pdf\u0026Expires=1743668352\u0026Signature=bWPD0Kf8JGu85E0fJiAIRBueHyydXK6qWEo8rSOM8PgOQnXFBGJKD8YsQr6BAa8Yov~zofGHuNVeiLVCr-1doEFchkm68HAc3vJIKln6TgLLeX7bmUI30vzWN4EzVY328Af3639mnRUEYPFfvHPDL52WzRg7sDLZt75S8JicsTrf4QqDx9ycBNtLHXTA9ji8hg4YWdM9ab2-75qJaANcIgNg3SMOBVmv~BAoqfqCy1Jsym-moKzhAwpl13NxlbAUI4I5-E8f8yEcB1Ss5trUsizEJVrMh8x-iDfAvWP9qBZLTMoxZLKVab6qrLjpA2lnmByuTBsZc8XrYp1tY6n9lA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Codes_of_Conduct_and_Biological_Weapons_An_In_process_Assessment","translated_slug":"","page_count":10,"language":"en","content_type":"Work","summary":"Codes of conduct have received a significant amount of attention in recent years as a policy option to address concerns about the relation between life science research and the deliberate spread of disease through biological weapons. While the term code of conduct has functioned as a generic umbrella phrase for an array of different types of codes, in general, such codes seek to set expectations regarding thinking and behavior for those associated with the life sciences. The purpose of this article is fourfold: (1) to survey recent developments, specifically with respect to \"universal\" and \"scientific society\" types of codes; (2) to propose criteria for assessing these initiatives; (3) to evaluate activities undertaken to date on the basis of these criteria; and (4) to propose key questions for the future. Overall, a mixed assessment is offered of the achievements of code-related activities to date. As argued, because of this overall situation, in the future careful attention should be given to what is sought out of this option and how it can be realized in practice.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":31832358,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/31832358/thumbnails/1.jpg","file_name":"Rappert.pdf","download_url":"https://www.academia.edu/attachments/31832358/download_file","bulk_download_file_name":"Codes_of_Conduct_and_Biological_Weapons.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/31832358/Rappert-libre.pdf?1392432388=\u0026response-content-disposition=attachment%3B+filename%3DCodes_of_Conduct_and_Biological_Weapons.pdf\u0026Expires=1743668353\u0026Signature=IEShf~qNl3ckNLbHmsbxs1C140FB4YKFMv185fCcn~6DrdKB-EI0CR2WNPv2Alr6Olaewq1yUb5CK-9ic2To45W8PDBoReHB8JV2oEhKcIf~PnQyEPZ41orjH9KPBlpXDPws~1u4HQuhRPNZoTnmS-7H8yEP-0JKETM1e037EhpxavTr9jwZk~t-lXn9tWu1VWDALI-0FX1lqQrlKUT8lOAGEJztBt7AjWRbVKaP9Xn~y8Lzo1OGrA6JGchX~hMtcl6QE5NhVj6m0y08KocMETNcjcwb~kCJ3jT4j8beNhJpIF5HCfF6bv2hpfnXaOwOeAHWAeee32zQmcfDk46dWA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":19870,"name":"Research","url":"https://www.academia.edu/Documents/in/Research"},{"id":47884,"name":"Biological Sciences","url":"https://www.academia.edu/Documents/in/Biological_Sciences"},{"id":76284,"name":"Code of Conduct","url":"https://www.academia.edu/Documents/in/Code_of_Conduct"},{"id":102808,"name":"Bioterrorism","url":"https://www.academia.edu/Documents/in/Bioterrorism"},{"id":230733,"name":"Process Assessment","url":"https://www.academia.edu/Documents/in/Process_Assessment"},{"id":396310,"name":"Codes of Ethics","url":"https://www.academia.edu/Documents/in/Codes_of_Ethics"}],"urls":[{"id":1546839,"url":"http://projects.exeter.ac.uk/codesofconduct/Chronology/Rappert.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404986-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4405012"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4405012/Biological_weapons_genetics_and_social_analysis_emerging_responses_emerging_issues_I"><img alt="Research paper thumbnail of Biological weapons, genetics and social analysis: emerging responses, emerging issues--I" class="work-thumbnail" src="https://attachments.academia-assets.com/49877956/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4405012/Biological_weapons_genetics_and_social_analysis_emerging_responses_emerging_issues_I">Biological weapons, genetics and social analysis: emerging responses, emerging issues--I</a></div><div class="wp-workCard_item"><span>New Genetics and Society</span><span>, 2003</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Recent terrorist attacks in the USA have generated significant attention in many countries to the...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Recent terrorist attacks in the USA have generated significant attention in many countries to the threats posed by biological weapons. In response to these events and the spectre of future attacks, bioscientists and professional organizations have begun or intensified asking questions about the possible malign applications of their research. As Part I of a two-part article, this paper surveys how genetics might contribute to the development of novel forms of weaponry. It is further argued that the dilemmas and difficulties facing bioscientists pose pressing and thorny questions for the hitherto agendas and orientations of those concerned with the social, ethical and political implications of genetics. Part II will examine the emerging responses initiated by biomedical organizations and spokespersons in the US and the UK. This will be done with a view to asking how scientific and medical research communities are defining and policing notions of professionalism, responsibility and accountability. On the basis of this, suggested lines for future social analysis will be offered.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="23864f033cf4655309d1375963e1046e" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":49877956,"asset_id":4405012,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/49877956/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4405012"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4405012"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4405012; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4405012]").text(description); $(".js-view-count[data-work-id=4405012]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4405012; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4405012']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "23864f033cf4655309d1375963e1046e" } } $('.js-work-strip[data-work-id=4405012]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4405012,"title":"Biological weapons, genetics and social analysis: emerging responses, emerging issues--I","translated_title":"","metadata":{"grobid_abstract":"Recent terrorist attacks in the USA have generated significant attention in many countries to the threats posed by biological weapons. In response to these events and the spectre of future attacks, bioscientists and professional organizations have begun or intensified asking questions about the possible malign applications of their research. As Part I of a two-part article, this paper surveys how genetics might contribute to the development of novel forms of weaponry. It is further argued that the dilemmas and difficulties facing bioscientists pose pressing and thorny questions for the hitherto agendas and orientations of those concerned with the social, ethical and political implications of genetics. Part II will examine the emerging responses initiated by biomedical organizations and spokespersons in the US and the UK. This will be done with a view to asking how scientific and medical research communities are defining and policing notions of professionalism, responsibility and accountability. On the basis of this, suggested lines for future social analysis will be offered.","publication_date":{"day":null,"month":null,"year":2003,"errors":{}},"publication_name":"New Genetics and Society","grobid_abstract_attachment_id":49877956},"translated_abstract":null,"internal_url":"https://www.academia.edu/4405012/Biological_weapons_genetics_and_social_analysis_emerging_responses_emerging_issues_I","translated_internal_url":"","created_at":"2013-09-04T01:52:20.375-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":49877956,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/49877956/thumbnails/1.jpg","file_name":"NGS_20I.pdf","download_url":"https://www.academia.edu/attachments/49877956/download_file","bulk_download_file_name":"Biological_weapons_genetics_and_social_a.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/49877956/NGS_20I-libre.pdf?1477475920=\u0026response-content-disposition=attachment%3B+filename%3DBiological_weapons_genetics_and_social_a.pdf\u0026Expires=1743668353\u0026Signature=f3fir2I9~pCpAAB0SjiZVCYd4q4RnnVE~5wwLUb6AiOn6s8sA28gd3Lo2gKDyXJ--yr8wAXclD64VaGH9XBPnssnWcj6fvHjuhTnm22mAEIFRVX~zE5U5SMflOCQt9yXOR9pLeUqiOdn9Oddrlq52T7wxnksIFQnX70bqgWIDLbNLlwoGHsxAdDVCzWMK4eMO93Yq67I6jAgmqi9Zz8E3KBcr0DKqAR0CgZU9Sl1ubVjgWprygiuruEyVLkV2Opltzd9tzklGpQAXWMwcoXi2cmL8HIFnj1oUn6gAuK8CrNLrc3mpZkpV1eHDBFdyWac10e98S1vhS0-qDnTq222TA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Biological_weapons_genetics_and_social_analysis_emerging_responses_emerging_issues_I","translated_slug":"","page_count":14,"language":"en","content_type":"Work","summary":"Recent terrorist attacks in the USA have generated significant attention in many countries to the threats posed by biological weapons. In response to these events and the spectre of future attacks, bioscientists and professional organizations have begun or intensified asking questions about the possible malign applications of their research. As Part I of a two-part article, this paper surveys how genetics might contribute to the development of novel forms of weaponry. It is further argued that the dilemmas and difficulties facing bioscientists pose pressing and thorny questions for the hitherto agendas and orientations of those concerned with the social, ethical and political implications of genetics. Part II will examine the emerging responses initiated by biomedical organizations and spokespersons in the US and the UK. This will be done with a view to asking how scientific and medical research communities are defining and policing notions of professionalism, responsibility and accountability. On the basis of this, suggested lines for future social analysis will be offered.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":49877956,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/49877956/thumbnails/1.jpg","file_name":"NGS_20I.pdf","download_url":"https://www.academia.edu/attachments/49877956/download_file","bulk_download_file_name":"Biological_weapons_genetics_and_social_a.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/49877956/NGS_20I-libre.pdf?1477475920=\u0026response-content-disposition=attachment%3B+filename%3DBiological_weapons_genetics_and_social_a.pdf\u0026Expires=1743668353\u0026Signature=f3fir2I9~pCpAAB0SjiZVCYd4q4RnnVE~5wwLUb6AiOn6s8sA28gd3Lo2gKDyXJ--yr8wAXclD64VaGH9XBPnssnWcj6fvHjuhTnm22mAEIFRVX~zE5U5SMflOCQt9yXOR9pLeUqiOdn9Oddrlq52T7wxnksIFQnX70bqgWIDLbNLlwoGHsxAdDVCzWMK4eMO93Yq67I6jAgmqi9Zz8E3KBcr0DKqAR0CgZU9Sl1ubVjgWprygiuruEyVLkV2Opltzd9tzklGpQAXWMwcoXi2cmL8HIFnj1oUn6gAuK8CrNLrc3mpZkpV1eHDBFdyWac10e98S1vhS0-qDnTq222TA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":156,"name":"Genetics","url":"https://www.academia.edu/Documents/in/Genetics"},{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology"},{"id":1139,"name":"Publishing","url":"https://www.academia.edu/Documents/in/Publishing"},{"id":5398,"name":"Biotechnology","url":"https://www.academia.edu/Documents/in/Biotechnology"},{"id":7646,"name":"Professional Ethics","url":"https://www.academia.edu/Documents/in/Professional_Ethics"},{"id":32696,"name":"Scientific Societies","url":"https://www.academia.edu/Documents/in/Scientific_Societies"},{"id":40023,"name":"Social Responsibility","url":"https://www.academia.edu/Documents/in/Social_Responsibility"},{"id":41749,"name":"Genetic Engineering","url":"https://www.academia.edu/Documents/in/Genetic_Engineering"},{"id":58277,"name":"Emergency Response","url":"https://www.academia.edu/Documents/in/Emergency_Response"},{"id":66744,"name":"Biomedical Research","url":"https://www.academia.edu/Documents/in/Biomedical_Research"},{"id":85280,"name":"Industry","url":"https://www.academia.edu/Documents/in/Industry"},{"id":98134,"name":"United States","url":"https://www.academia.edu/Documents/in/United_States"},{"id":102808,"name":"Bioterrorism","url":"https://www.academia.edu/Documents/in/Bioterrorism"},{"id":159736,"name":"Universities","url":"https://www.academia.edu/Documents/in/Universities"},{"id":193772,"name":"Genetic research","url":"https://www.academia.edu/Documents/in/Genetic_research"},{"id":291274,"name":"Great Britain","url":"https://www.academia.edu/Documents/in/Great_Britain"},{"id":332907,"name":"Biological Warfare","url":"https://www.academia.edu/Documents/in/Biological_Warfare"},{"id":396310,"name":"Codes of Ethics","url":"https://www.academia.edu/Documents/in/Codes_of_Ethics"},{"id":839672,"name":"Ethics Research","url":"https://www.academia.edu/Documents/in/Ethics_Research"}],"urls":[{"id":1546858,"url":"http://projects.exeter.ac.uk/codesofconduct/Publications/NGS%2520I.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4405012-figures'); } }); </script> <div class="profile--tab_heading_container js-section-heading" data-section="Intellectual Property" id="Intellectual Property"><h3 class="profile--tab_heading_container">Intellectual Property by Brian Rappert</h3></div><div class="js-work-strip profile--work_container" data-work-id="20029412"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/20029412/Making_sense_of_diversity_and_reluctance_academic_industrial_relations_and_intellectual_property"><img alt="Research paper thumbnail of Making sense of diversity and reluctance: academic–industrial relations and intellectual property" class="work-thumbnail" src="https://attachments.academia-assets.com/40965447/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/20029412/Making_sense_of_diversity_and_reluctance_academic_industrial_relations_and_intellectual_property">Making sense of diversity and reluctance: academic–industrial relations and intellectual property</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The commercialisation of the public sector research base, and in particular academic research, ha...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The commercialisation of the public sector research base, and in particular academic research, has been a continuing preoccupation among policy makers around the world. Empirically, these issues are explored in the management of intellectual property in university spin-offs (USOs) that emerge through both informal and formal linkages with universities across three sectors. The paper utilises a recently developed methodology to map knowledge flows as well as linkages between organisations. This enables us to examine the exchange of knowledge in commercial and academic networks and the implications of changes in the sponsorship, ownership, and proprietary status of knowledge for these patterns of exchange. It is argued that some of the most important points of tension between universities and the firms studied derive from misconceptions in the value of intellectual property rights.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="e5a0bd56c4bd66f81f9838070be1b660" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":40965447,"asset_id":20029412,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/40965447/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="20029412"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="20029412"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 20029412; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=20029412]").text(description); $(".js-view-count[data-work-id=20029412]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 20029412; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='20029412']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "e5a0bd56c4bd66f81f9838070be1b660" } } $('.js-work-strip[data-work-id=20029412]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":20029412,"title":"Making sense of diversity and reluctance: academic–industrial relations and intellectual property","translated_title":"","metadata":{"abstract":"The commercialisation of the public sector research base, and in particular academic research, has been a continuing preoccupation among policy makers around the world. Empirically, these issues are explored in the management of intellectual property in university spin-offs (USOs) that emerge through both informal and formal linkages with universities across three sectors. The paper utilises a recently developed methodology to map knowledge flows as well as linkages between organisations. This enables us to examine the exchange of knowledge in commercial and academic networks and the implications of changes in the sponsorship, ownership, and proprietary status of knowledge for these patterns of exchange. It is argued that some of the most important points of tension between universities and the firms studied derive from misconceptions in the value of intellectual property rights.\n"},"translated_abstract":"The commercialisation of the public sector research base, and in particular academic research, has been a continuing preoccupation among policy makers around the world. Empirically, these issues are explored in the management of intellectual property in university spin-offs (USOs) that emerge through both informal and formal linkages with universities across three sectors. The paper utilises a recently developed methodology to map knowledge flows as well as linkages between organisations. This enables us to examine the exchange of knowledge in commercial and academic networks and the implications of changes in the sponsorship, ownership, and proprietary status of knowledge for these patterns of exchange. It is argued that some of the most important points of tension between universities and the firms studied derive from misconceptions in the value of intellectual property rights.\n","internal_url":"https://www.academia.edu/20029412/Making_sense_of_diversity_and_reluctance_academic_industrial_relations_and_intellectual_property","translated_internal_url":"","created_at":"2016-01-05T01:08:41.980-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[{"id":12571775,"work_id":20029412,"tagging_user_id":5109393,"tagged_user_id":80894,"co_author_invite_id":null,"email":"a***5@york.ac.uk","affiliation":"University of York","display_order":0,"name":"Andrew Webster","title":"Making sense of diversity and reluctance: academic–industrial relations and intellectual property"}],"downloadable_attachments":[{"id":40965447,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/40965447/thumbnails/1.jpg","file_name":"1-s2.0-S0048733399000281-main.pdf","download_url":"https://www.academia.edu/attachments/40965447/download_file","bulk_download_file_name":"Making_sense_of_diversity_and_reluctance.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/40965447/1-s2.0-S0048733399000281-main-libre.pdf?1451985004=\u0026response-content-disposition=attachment%3B+filename%3DMaking_sense_of_diversity_and_reluctance.pdf\u0026Expires=1743668353\u0026Signature=VG45QD6tyuGXFxh-9daNJqoXEOjcrkj3~QCEDwEYpvhpAPM~E8ij0P89UoUdUdMZ5E~BdCR6CfoIDpqZBOTNCNGXhE9YgtXB9jWtfwyBcLm-xTEL5--YfIVB8k3QFBJcsf-wF7x7VM8Inyzw4XZ88MsetHTiaR1vWtTFIiq1KoUkpRU5oImHj1ntF0bz7UcFxK6tFmEj4KkvNkP~GjbWh39yQSu5TP9JMeL0pUS0TsjRK2RN2Lf5Pn3xrnFXRRIAgcG-7JTpn9LXoxCIlZkQZRDfV5ZXk8T1bJSF--f2b7wpK02DEEEu1g~oItqowz9QyWFPxvhabSvu3PatjPq6OA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Making_sense_of_diversity_and_reluctance_academic_industrial_relations_and_intellectual_property","translated_slug":"","page_count":18,"language":"en","content_type":"Work","summary":"The commercialisation of the public sector research base, and in particular academic research, has been a continuing preoccupation among policy makers around the world. Empirically, these issues are explored in the management of intellectual property in university spin-offs (USOs) that emerge through both informal and formal linkages with universities across three sectors. The paper utilises a recently developed methodology to map knowledge flows as well as linkages between organisations. This enables us to examine the exchange of knowledge in commercial and academic networks and the implications of changes in the sponsorship, ownership, and proprietary status of knowledge for these patterns of exchange. It is argued that some of the most important points of tension between universities and the firms studied derive from misconceptions in the value of intellectual property rights.\n","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":40965447,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/40965447/thumbnails/1.jpg","file_name":"1-s2.0-S0048733399000281-main.pdf","download_url":"https://www.academia.edu/attachments/40965447/download_file","bulk_download_file_name":"Making_sense_of_diversity_and_reluctance.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/40965447/1-s2.0-S0048733399000281-main-libre.pdf?1451985004=\u0026response-content-disposition=attachment%3B+filename%3DMaking_sense_of_diversity_and_reluctance.pdf\u0026Expires=1743668353\u0026Signature=VG45QD6tyuGXFxh-9daNJqoXEOjcrkj3~QCEDwEYpvhpAPM~E8ij0P89UoUdUdMZ5E~BdCR6CfoIDpqZBOTNCNGXhE9YgtXB9jWtfwyBcLm-xTEL5--YfIVB8k3QFBJcsf-wF7x7VM8Inyzw4XZ88MsetHTiaR1vWtTFIiq1KoUkpRU5oImHj1ntF0bz7UcFxK6tFmEj4KkvNkP~GjbWh39yQSu5TP9JMeL0pUS0TsjRK2RN2Lf5Pn3xrnFXRRIAgcG-7JTpn9LXoxCIlZkQZRDfV5ZXk8T1bJSF--f2b7wpK02DEEEu1g~oItqowz9QyWFPxvhabSvu3PatjPq6OA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":967,"name":"Intellectual Property","url":"https://www.academia.edu/Documents/in/Intellectual_Property"},{"id":150888,"name":"Academic Spin-Offs","url":"https://www.academia.edu/Documents/in/Academic_Spin-Offs"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-20029412-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404737"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4404737/Making_sense_of_diversity_and_reluctance_academic_industrial_relations_and_intellectual_property"><img alt="Research paper thumbnail of Making sense of diversity and reluctance: academic–industrial relations and intellectual property" class="work-thumbnail" src="https://attachments.academia-assets.com/40965438/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4404737/Making_sense_of_diversity_and_reluctance_academic_industrial_relations_and_intellectual_property">Making sense of diversity and reluctance: academic–industrial relations and intellectual property</a></div><div class="wp-workCard_item"><span>Research Policy</span><span>, 1999</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The commercialisation of the public sector research base, and in particular academic research, ha...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The commercialisation of the public sector research base, and in particular academic research, has been a continuing preoccupation among policy makers around the world. Empirically, these issues are explored in the management of Ž . intellectual property in university spin-offs USOs that emerge through both informal and formal linkages with universities across three sectors. The paper utilises a recently developed methodology to map knowledge flows as well as linkages between organisations. This enables us to examine the exchange of knowledge in commercial and academic networks and the implications of changes in the sponsorship, ownership, and proprietary status of knowledge for these patterns of exchange. It is argued that some of the most important points of tension between universities and the firms studied derive from misconceptions in the value of intellectual property rights. q 0048-7333r99r$ -see front matter q 1999 Elsevier Science B.V. All rights reserved.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="cb400d57fbc10db632cda048832c99ff" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":40965438,"asset_id":4404737,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/40965438/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404737"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404737"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404737; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404737]").text(description); $(".js-view-count[data-work-id=4404737]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404737; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404737']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "cb400d57fbc10db632cda048832c99ff" } } $('.js-work-strip[data-work-id=4404737]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404737,"title":"Making sense of diversity and reluctance: academic–industrial relations and intellectual property","translated_title":"","metadata":{"ai_title_tag":"Intellectual Property in Academic Spin-Offs","grobid_abstract":"The commercialisation of the public sector research base, and in particular academic research, has been a continuing preoccupation among policy makers around the world. Empirically, these issues are explored in the management of Ž . intellectual property in university spin-offs USOs that emerge through both informal and formal linkages with universities across three sectors. The paper utilises a recently developed methodology to map knowledge flows as well as linkages between organisations. This enables us to examine the exchange of knowledge in commercial and academic networks and the implications of changes in the sponsorship, ownership, and proprietary status of knowledge for these patterns of exchange. It is argued that some of the most important points of tension between universities and the firms studied derive from misconceptions in the value of intellectual property rights. q 0048-7333r99r$ -see front matter q 1999 Elsevier Science B.V. All rights reserved.","publication_date":{"day":null,"month":null,"year":1999,"errors":{}},"publication_name":"Research Policy","grobid_abstract_attachment_id":40965438},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404737/Making_sense_of_diversity_and_reluctance_academic_industrial_relations_and_intellectual_property","translated_internal_url":"","created_at":"2013-09-04T01:26:14.755-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":40965438,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/40965438/thumbnails/1.jpg","file_name":"1-s2.0-S0048733399000281-main.pdf","download_url":"https://www.academia.edu/attachments/40965438/download_file","bulk_download_file_name":"Making_sense_of_diversity_and_reluctance.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/40965438/1-s2.0-S0048733399000281-main-libre.pdf?1451984898=\u0026response-content-disposition=attachment%3B+filename%3DMaking_sense_of_diversity_and_reluctance.pdf\u0026Expires=1743668353\u0026Signature=AEItwNZFSiUHiXa~zgGDRuhKL5Kkx2gLJiDKvWXBgcfBA8F8xa0eDRfEq508IRyULGASVQ1sEZ0p5QY5iEUs5RtkAbCvkTxMmtJon2xpPrDzbjYlpls6yOnbP35cShG5scuf9H0i~aqxpDqAJi1OdBhbYYnB7xgIa7Vm~sYwuZrc4bUFoIbgtruJh-6iybIIN3h326gg2ho6eZkUhE-p1a4FC11sXmAUo82WQkMdqTAeByAw5wTrlFiz-qPi~7IEgqA5XcdhckcjxhWZeR9Y89t1iSWq6CJATGM3TtXdtJ7pRARWOpJPT2v3SUFwVmlgV5pzbdDnzshv3ehoQiXMgw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Making_sense_of_diversity_and_reluctance_academic_industrial_relations_and_intellectual_property","translated_slug":"","page_count":18,"language":"en","content_type":"Work","summary":"The commercialisation of the public sector research base, and in particular academic research, has been a continuing preoccupation among policy makers around the world. Empirically, these issues are explored in the management of Ž . intellectual property in university spin-offs USOs that emerge through both informal and formal linkages with universities across three sectors. The paper utilises a recently developed methodology to map knowledge flows as well as linkages between organisations. This enables us to examine the exchange of knowledge in commercial and academic networks and the implications of changes in the sponsorship, ownership, and proprietary status of knowledge for these patterns of exchange. It is argued that some of the most important points of tension between universities and the firms studied derive from misconceptions in the value of intellectual property rights. q 0048-7333r99r$ -see front matter q 1999 Elsevier Science B.V. All rights reserved.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":40965438,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/40965438/thumbnails/1.jpg","file_name":"1-s2.0-S0048733399000281-main.pdf","download_url":"https://www.academia.edu/attachments/40965438/download_file","bulk_download_file_name":"Making_sense_of_diversity_and_reluctance.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/40965438/1-s2.0-S0048733399000281-main-libre.pdf?1451984898=\u0026response-content-disposition=attachment%3B+filename%3DMaking_sense_of_diversity_and_reluctance.pdf\u0026Expires=1743668353\u0026Signature=AEItwNZFSiUHiXa~zgGDRuhKL5Kkx2gLJiDKvWXBgcfBA8F8xa0eDRfEq508IRyULGASVQ1sEZ0p5QY5iEUs5RtkAbCvkTxMmtJon2xpPrDzbjYlpls6yOnbP35cShG5scuf9H0i~aqxpDqAJi1OdBhbYYnB7xgIa7Vm~sYwuZrc4bUFoIbgtruJh-6iybIIN3h326gg2ho6eZkUhE-p1a4FC11sXmAUo82WQkMdqTAeByAw5wTrlFiz-qPi~7IEgqA5XcdhckcjxhWZeR9Y89t1iSWq6CJATGM3TtXdtJ7pRARWOpJPT2v3SUFwVmlgV5pzbdDnzshv3ehoQiXMgw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":967,"name":"Intellectual Property","url":"https://www.academia.edu/Documents/in/Intellectual_Property"},{"id":3357,"name":"Industrial Relations","url":"https://www.academia.edu/Documents/in/Industrial_Relations"},{"id":5547,"name":"Policy","url":"https://www.academia.edu/Documents/in/Policy"},{"id":16457,"name":"Public sector","url":"https://www.academia.edu/Documents/in/Public_sector"},{"id":73149,"name":"Business and Management","url":"https://www.academia.edu/Documents/in/Business_and_Management"},{"id":264195,"name":"Intellectual Property Right","url":"https://www.academia.edu/Documents/in/Intellectual_Property_Right"},{"id":316273,"name":"Development Methodology","url":"https://www.academia.edu/Documents/in/Development_Methodology"},{"id":488304,"name":"Academic Spin Offs","url":"https://www.academia.edu/Documents/in/Academic_Spin_Offs"},{"id":1473542,"name":"Knowledge Flow","url":"https://www.academia.edu/Documents/in/Knowledge_Flow"},{"id":1745949,"name":"Innovation","url":"https://www.academia.edu/Documents/in/Innovation-61"}],"urls":[{"id":1546734,"url":"http://www.sciencedirect.com/science/article/pii/S0048733399000281"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404737-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404739"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4404739/Regimes_of_ordering_the_commercialization_of_intellectual_property_in_industrial_academic_collaborations"><img alt="Research paper thumbnail of Regimes of ordering: the commercialization of intellectual property in industrial-academic collaborations" class="work-thumbnail" src="https://attachments.academia-assets.com/49878097/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4404739/Regimes_of_ordering_the_commercialization_of_intellectual_property_in_industrial_academic_collaborations">Regimes of ordering: the commercialization of intellectual property in industrial-academic collaborations</a></div><div class="wp-workCard_item"><span>Technology Analysis & Strategic Management</span><span>, 1997</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">This paper examines a diversity of regulatory mechanisms and negotiation processes involved in at...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">This paper examines a diversity of regulatory mechanisms and negotiation processes involved in attempts to commercialise university research which provide direct and indirect means of linking the activities of individuals and organisations in the acquisition and exchange of commodified goods. The key question addressed is how is an activity that is always uncertain --the production of knowledge --'packaged' by intellectual property management and intellectual property rights so that it is controllable, commodifiable, and enters into exchange relationships. This paper addresses the acquisition and stabilisation of proprietary claims to knowledge between public and private organisations by considering a detailed case of a university spin-off and in doing so raises a number of more general issues about the translation of knowledge.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="04b0ab793a6f33dbaf3f4bfda52190af" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":49878097,"asset_id":4404739,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/49878097/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404739"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404739"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404739; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404739]").text(description); $(".js-view-count[data-work-id=4404739]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404739; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404739']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "04b0ab793a6f33dbaf3f4bfda52190af" } } $('.js-work-strip[data-work-id=4404739]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404739,"title":"Regimes of ordering: the commercialization of intellectual property in industrial-academic collaborations","translated_title":"","metadata":{"ai_title_tag":"Commercializing University Research: IP Dynamics","grobid_abstract":"This paper examines a diversity of regulatory mechanisms and negotiation processes involved in attempts to commercialise university research which provide direct and indirect means of linking the activities of individuals and organisations in the acquisition and exchange of commodified goods. The key question addressed is how is an activity that is always uncertain --the production of knowledge --'packaged' by intellectual property management and intellectual property rights so that it is controllable, commodifiable, and enters into exchange relationships. This paper addresses the acquisition and stabilisation of proprietary claims to knowledge between public and private organisations by considering a detailed case of a university spin-off and in doing so raises a number of more general issues about the translation of knowledge.","publication_date":{"day":null,"month":null,"year":1997,"errors":{}},"publication_name":"Technology Analysis \u0026 Strategic Management","grobid_abstract_attachment_id":49878097},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404739/Regimes_of_ordering_the_commercialization_of_intellectual_property_in_industrial_academic_collaborations","translated_internal_url":"","created_at":"2013-09-04T01:26:17.579-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":49878097,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/49878097/thumbnails/1.jpg","file_name":"Regimes_of_ordering_The_commercializatio20161026-27102-146fwad.pdf","download_url":"https://www.academia.edu/attachments/49878097/download_file","bulk_download_file_name":"Regimes_of_ordering_the_commercializatio.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/49878097/Regimes_of_ordering_The_commercializatio20161026-27102-146fwad-libre.pdf?1477475901=\u0026response-content-disposition=attachment%3B+filename%3DRegimes_of_ordering_the_commercializatio.pdf\u0026Expires=1743668353\u0026Signature=GbXrwvqpUTIdnPsjldtXjcTWDIOPOrMWL-bZxz0Cny1CXb4l56joTUomqLRAjgtQkagnemf4xx1cr9A0Dg-ie6UjaGsu49Ac55VG6L2MoPjMUtB6C4FxabjRLZxKcCk5c5RBpvuLp5xb0m3Rh4MsExRCT50F0dQssNkf7xdOnSJViiUbUkYzPF~DImyPVJ7719qy1zGV5G7td68oDXw650QvgZa5V8m4MsVl9EDoHxLvVD7Ftjg4aLpHJ9u6KqWcxrGS6xA1Bu6JRXiABNXbr2XWElyXp06CwBJ3OE6Ky52MH4qOWqDphJB376owbCr9DAsz0J~i4ssjnLd7QwSvlQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Regimes_of_ordering_the_commercialization_of_intellectual_property_in_industrial_academic_collaborations","translated_slug":"","page_count":13,"language":"en","content_type":"Work","summary":"This paper examines a diversity of regulatory mechanisms and negotiation processes involved in attempts to commercialise university research which provide direct and indirect means of linking the activities of individuals and organisations in the acquisition and exchange of commodified goods. The key question addressed is how is an activity that is always uncertain --the production of knowledge --'packaged' by intellectual property management and intellectual property rights so that it is controllable, commodifiable, and enters into exchange relationships. This paper addresses the acquisition and stabilisation of proprietary claims to knowledge between public and private organisations by considering a detailed case of a university spin-off and in doing so raises a number of more general issues about the translation of knowledge.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":49878097,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/49878097/thumbnails/1.jpg","file_name":"Regimes_of_ordering_The_commercializatio20161026-27102-146fwad.pdf","download_url":"https://www.academia.edu/attachments/49878097/download_file","bulk_download_file_name":"Regimes_of_ordering_the_commercializatio.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/49878097/Regimes_of_ordering_The_commercializatio20161026-27102-146fwad-libre.pdf?1477475901=\u0026response-content-disposition=attachment%3B+filename%3DRegimes_of_ordering_the_commercializatio.pdf\u0026Expires=1743668353\u0026Signature=GbXrwvqpUTIdnPsjldtXjcTWDIOPOrMWL-bZxz0Cny1CXb4l56joTUomqLRAjgtQkagnemf4xx1cr9A0Dg-ie6UjaGsu49Ac55VG6L2MoPjMUtB6C4FxabjRLZxKcCk5c5RBpvuLp5xb0m3Rh4MsExRCT50F0dQssNkf7xdOnSJViiUbUkYzPF~DImyPVJ7719qy1zGV5G7td68oDXw650QvgZa5V8m4MsVl9EDoHxLvVD7Ftjg4aLpHJ9u6KqWcxrGS6xA1Bu6JRXiABNXbr2XWElyXp06CwBJ3OE6Ky52MH4qOWqDphJB376owbCr9DAsz0J~i4ssjnLd7QwSvlQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":967,"name":"Intellectual Property","url":"https://www.academia.edu/Documents/in/Intellectual_Property"},{"id":27659,"name":"Applied Economics","url":"https://www.academia.edu/Documents/in/Applied_Economics"},{"id":73149,"name":"Business and Management","url":"https://www.academia.edu/Documents/in/Business_and_Management"},{"id":264195,"name":"Intellectual Property Right","url":"https://www.academia.edu/Documents/in/Intellectual_Property_Right"},{"id":269854,"name":"Technology analysis \u0026 strategic management","url":"https://www.academia.edu/Documents/in/Technology_analysis_and_strategic_management"}],"urls":[{"id":1546735,"url":"http://www.york.ac.uk/res/satsu/online-papers/RappertandWebsteRegimesofordering.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404739-figures'); } }); </script> <div class="profile--tab_heading_container js-section-heading" data-section="Armed Conflict " id="Armed Conflict "><h3 class="profile--tab_heading_container">Armed Conflict by Brian Rappert</h3></div><div class="js-work-strip profile--work_container" data-work-id="4404968"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/4404968/Enhancing_the_protection_of_civilians_from_armed_conflict_precautionary_lessons"><img alt="Research paper thumbnail of Enhancing the protection of civilians from armed conflict: precautionary lessons" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Enhancing the protection of civilians from armed conflict: precautionary lessons</div><div class="wp-workCard_item"><span>Medicine, Conflict and Survival</span><span>, 2010</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Attempts to place limits on the conduct of conflict raise many practical and political concerns. ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Attempts to place limits on the conduct of conflict raise many practical and political concerns. This article asks how debates regarding precautionary approaches to risk might inform discussions about how limits are set for armed conflict. The 2008 Convention on Cluster Munitions (CCM) provides the starting point for this analysis. While the adoption of this convention represents a major achievement in multilateral humanitarian disarmament, its provisions are open to question about their meaning. As argued, the manner in which the CCM was agreed provides an opening for embedding precautionary thinking into its future interpretation. Experiences with precautionary approaches to risk are surveyed with a view to considering what lessons they hold for the central prohibition of cluster munitions in the CCM, its novel provisions for Victim Assistance, and its possible implications for the use of explosive force. The overall goal is to ask how debates about the precautionary principle might enhance the protection of civilian populations.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404968"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404968"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404968; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404968]").text(description); $(".js-view-count[data-work-id=4404968]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404968; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404968']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=4404968]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404968,"title":"Enhancing the protection of civilians from armed conflict: precautionary lessons","translated_title":"","metadata":{"abstract":"Attempts to place limits on the conduct of conflict raise many practical and political concerns. This article asks how debates regarding precautionary approaches to risk might inform discussions about how limits are set for armed conflict. The 2008 Convention on Cluster Munitions (CCM) provides the starting point for this analysis. While the adoption of this convention represents a major achievement in multilateral humanitarian disarmament, its provisions are open to question about their meaning. As argued, the manner in which the CCM was agreed provides an opening for embedding precautionary thinking into its future interpretation. Experiences with precautionary approaches to risk are surveyed with a view to considering what lessons they hold for the central prohibition of cluster munitions in the CCM, its novel provisions for Victim Assistance, and its possible implications for the use of explosive force. The overall goal is to ask how debates about the precautionary principle might enhance the protection of civilian populations.","publication_date":{"day":null,"month":null,"year":2010,"errors":{}},"publication_name":"Medicine, Conflict and Survival"},"translated_abstract":"Attempts to place limits on the conduct of conflict raise many practical and political concerns. This article asks how debates regarding precautionary approaches to risk might inform discussions about how limits are set for armed conflict. The 2008 Convention on Cluster Munitions (CCM) provides the starting point for this analysis. While the adoption of this convention represents a major achievement in multilateral humanitarian disarmament, its provisions are open to question about their meaning. As argued, the manner in which the CCM was agreed provides an opening for embedding precautionary thinking into its future interpretation. Experiences with precautionary approaches to risk are surveyed with a view to considering what lessons they hold for the central prohibition of cluster munitions in the CCM, its novel provisions for Victim Assistance, and its possible implications for the use of explosive force. The overall goal is to ask how debates about the precautionary principle might enhance the protection of civilian populations.","internal_url":"https://www.academia.edu/4404968/Enhancing_the_protection_of_civilians_from_armed_conflict_precautionary_lessons","translated_internal_url":"","created_at":"2013-09-04T01:49:04.501-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"Enhancing_the_protection_of_civilians_from_armed_conflict_precautionary_lessons","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"Attempts to place limits on the conduct of conflict raise many practical and political concerns. This article asks how debates regarding precautionary approaches to risk might inform discussions about how limits are set for armed conflict. The 2008 Convention on Cluster Munitions (CCM) provides the starting point for this analysis. While the adoption of this convention represents a major achievement in multilateral humanitarian disarmament, its provisions are open to question about their meaning. As argued, the manner in which the CCM was agreed provides an opening for embedding precautionary thinking into its future interpretation. Experiences with precautionary approaches to risk are surveyed with a view to considering what lessons they hold for the central prohibition of cluster munitions in the CCM, its novel provisions for Victim Assistance, and its possible implications for the use of explosive force. The overall goal is to ask how debates about the precautionary principle might enhance the protection of civilian populations.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":1697,"name":"Violence","url":"https://www.academia.edu/Documents/in/Violence"},{"id":8207,"name":"Risk","url":"https://www.academia.edu/Documents/in/Risk"},{"id":11665,"name":"International Humanitarian Law","url":"https://www.academia.edu/Documents/in/International_Humanitarian_Law"},{"id":12054,"name":"International Cooperation","url":"https://www.academia.edu/Documents/in/International_Cooperation"},{"id":12939,"name":"Armed Conflict","url":"https://www.academia.edu/Documents/in/Armed_Conflict"},{"id":14835,"name":"Altruism","url":"https://www.academia.edu/Documents/in/Altruism"},{"id":22182,"name":"Precautionary Principle","url":"https://www.academia.edu/Documents/in/Precautionary_Principle"},{"id":41861,"name":"War","url":"https://www.academia.edu/Documents/in/War"},{"id":54279,"name":"Policy making","url":"https://www.academia.edu/Documents/in/Policy_making"},{"id":61603,"name":"Uncertainty","url":"https://www.academia.edu/Documents/in/Uncertainty"},{"id":70307,"name":"Weapons","url":"https://www.academia.edu/Documents/in/Weapons"},{"id":165279,"name":"Relief Work","url":"https://www.academia.edu/Documents/in/Relief_Work"},{"id":167992,"name":"Cluster Munitions","url":"https://www.academia.edu/Documents/in/Cluster_Munitions"},{"id":334667,"name":"Protection of Civilians in Armed Conflict","url":"https://www.academia.edu/Documents/in/Protection_of_Civilians_in_Armed_Conflict"}],"urls":[{"id":1546825,"url":"http://www.informaworld.com/openurl?genre=article\u0026doi=10.1080/13623690903553228\u0026magic=crossref%7C%7CD404A21C5BB053405B1A640AFFD44AE3"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404968-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404856"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4404856/The_Roles_of_Civil_Society_in_the_Development_of_Standards_around_New_Weapons_and_other_Technologies_of_Warfare"><img alt="Research paper thumbnail of The Roles of Civil Society in the Development of Standards around New Weapons and other Technologies of Warfare" class="work-thumbnail" src="https://attachments.academia-assets.com/34287374/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4404856/The_Roles_of_Civil_Society_in_the_Development_of_Standards_around_New_Weapons_and_other_Technologies_of_Warfare">The Roles of Civil Society in the Development of Standards around New Weapons and other Technologies of Warfare</a></div><div class="wp-workCard_item"><span>International Review of the Red Cross </span><span>, 2012</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="aae1dd7cb0bf9cb39d0b733f02779dae" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":34287374,"asset_id":4404856,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/34287374/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404856"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404856"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404856; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404856]").text(description); $(".js-view-count[data-work-id=4404856]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404856; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404856']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "aae1dd7cb0bf9cb39d0b733f02779dae" } } $('.js-work-strip[data-work-id=4404856]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404856,"title":"The Roles of Civil Society in the Development of Standards around New Weapons and other Technologies of Warfare","translated_title":"","metadata":{"ai_abstract":"The article explores the complex role of civil society in shaping standards for new weapons and warfare technologies, emphasizing the balance between military necessity and humanitarian concerns as prescribed by international humanitarian law (IHL). It critiques the limitations of IHL and discusses the challenges in regulating weapon technologies, highlighting the influence of political, moral, and technical factors in defining legitimacy. The discussion is framed within recent interpretations of legal frameworks for weapon use, suggesting the need for a more proactive review and consideration of anticipated uses beyond traditional norms.","publication_date":{"day":null,"month":null,"year":2012,"errors":{}},"publication_name":"International Review of the Red Cross "},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404856/The_Roles_of_Civil_Society_in_the_Development_of_Standards_around_New_Weapons_and_other_Technologies_of_Warfare","translated_internal_url":"","created_at":"2013-09-04T01:42:24.751-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":34287374,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/34287374/thumbnails/1.jpg","file_name":"irrc-886-rappert-moyes-crowe-nash.pdf","download_url":"https://www.academia.edu/attachments/34287374/download_file","bulk_download_file_name":"The_Roles_of_Civil_Society_in_the_Develo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/34287374/irrc-886-rappert-moyes-crowe-nash-libre.pdf?1406270104=\u0026response-content-disposition=attachment%3B+filename%3DThe_Roles_of_Civil_Society_in_the_Develo.pdf\u0026Expires=1743668353\u0026Signature=MMF9V~hcCvv5SY3cBvBLqttrve~ZZsQPXqrCp49utRNazXdnf1tAQBtpv~ul0DBLfh9nU-5zGIRxGC6dM7Q3NsH~Utk2Rx9tgJtvySdDxL5LJ7BX-OlpEKqOyjZ669PtLDyY35GMEqZ9R76H1Nlfae1aolhFDAKl4UUFAACR5QAOdXI1M6JuWG4i6IzNs-NiOQgNsDJEUYUEQVPqv6Ve5RpG0GQ48Dz00ue5Kigxk1VoNmFn-PbHGA1W03iT-ca4LxAbSt6Ghe9vp7faozV3sV6JWyRk3m0VviRyqFnCGGAhQoBXPBJSw0wkm5YToUYzRILWceoG3O5iWk1xfBE2Lw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"The_Roles_of_Civil_Society_in_the_Development_of_Standards_around_New_Weapons_and_other_Technologies_of_Warfare","translated_slug":"","page_count":21,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":34287374,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/34287374/thumbnails/1.jpg","file_name":"irrc-886-rappert-moyes-crowe-nash.pdf","download_url":"https://www.academia.edu/attachments/34287374/download_file","bulk_download_file_name":"The_Roles_of_Civil_Society_in_the_Develo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/34287374/irrc-886-rappert-moyes-crowe-nash-libre.pdf?1406270104=\u0026response-content-disposition=attachment%3B+filename%3DThe_Roles_of_Civil_Society_in_the_Develo.pdf\u0026Expires=1743668353\u0026Signature=MMF9V~hcCvv5SY3cBvBLqttrve~ZZsQPXqrCp49utRNazXdnf1tAQBtpv~ul0DBLfh9nU-5zGIRxGC6dM7Q3NsH~Utk2Rx9tgJtvySdDxL5LJ7BX-OlpEKqOyjZ669PtLDyY35GMEqZ9R76H1Nlfae1aolhFDAKl4UUFAACR5QAOdXI1M6JuWG4i6IzNs-NiOQgNsDJEUYUEQVPqv6Ve5RpG0GQ48Dz00ue5Kigxk1VoNmFn-PbHGA1W03iT-ca4LxAbSt6Ghe9vp7faozV3sV6JWyRk3m0VviRyqFnCGGAhQoBXPBJSw0wkm5YToUYzRILWceoG3O5iWk1xfBE2Lw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":34287373,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/34287373/thumbnails/1.jpg","file_name":"irrc-886-rappert-moyes-crowe-nash.pdf","download_url":"https://www.academia.edu/attachments/34287373/download_file","bulk_download_file_name":"The_Roles_of_Civil_Society_in_the_Develo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/34287373/irrc-886-rappert-moyes-crowe-nash-libre.pdf?1406270095=\u0026response-content-disposition=attachment%3B+filename%3DThe_Roles_of_Civil_Society_in_the_Develo.pdf\u0026Expires=1743668353\u0026Signature=LwfNCDOVdS4xe8~E6Pjo0JbMF5jR-YNBzII7~7QLOypTYwFZ-iryp8tV3tN2WGfHO8zi5RjXpHKjYFqt-bG8tRnomUlfH6sHhaYBemSGuBNbcs1BVsaIbT4sgewr1hA2pWjbtjSqLbPUvMDYzmu4gdvpljW2t~fjqCv0Ou8NLwRCQdJL8s--nSPjNbOlL0fF~DV0V~8t3RZj3WOAgI-YVVb3wiqIsDSqiIA9y0yd6n3fmxTV~NSe7ufa50tSOK7UtovpXe5PowrfydCcaJ4RJKEKOmxiAvr4Z793psWkBqMGYkluDbGw4G2KAswP8MgjHhSJPF9eekbPvYkwGxDEMQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[{"id":3240641,"url":"http://www.icrc.org/eng/assets/files/review/2012/irrc-886-rappert-moyes-crowe-nash.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404856-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404880"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/4404880/Enhancing_the_protection_of_civilians_from_armed_conflict_precautionary_lessons"><img alt="Research paper thumbnail of Enhancing the protection of civilians from armed conflict: precautionary lessons" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Enhancing the protection of civilians from armed conflict: precautionary lessons</div><div class="wp-workCard_item"><span>Medicine, Conflict and Survival</span><span>, 2010</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404880"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404880"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404880; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404880]").text(description); $(".js-view-count[data-work-id=4404880]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404880; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404880']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=4404880]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404880,"title":"Enhancing the protection of civilians from armed conflict: precautionary lessons","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2010,"errors":{}},"publication_name":"Medicine, Conflict and Survival"},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404880/Enhancing_the_protection_of_civilians_from_armed_conflict_precautionary_lessons","translated_internal_url":"","created_at":"2013-09-04T01:44:23.147-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"Enhancing_the_protection_of_civilians_from_armed_conflict_precautionary_lessons","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[],"urls":[{"id":1546792,"url":"http://www.tandfonline.com/doi/abs/10.1080/13623690903553228#.UidUANJgRy0"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404880-figures'); } }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="716175" id="books"><div class="js-work-strip profile--work_container" data-work-id="7775754"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/7775754/On_the_Dual_Uses_of_Science_and_Ethics"><img alt="Research paper thumbnail of On the Dual Uses of Science and Ethics" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">On the Dual Uses of Science and Ethics</div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="7775754"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="7775754"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 7775754; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=7775754]").text(description); $(".js-view-count[data-work-id=7775754]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 7775754; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='7775754']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=7775754]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":7775754,"title":"On the Dual Uses of Science and Ethics","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/7775754/On_the_Dual_Uses_of_Science_and_Ethics","translated_internal_url":"","created_at":"2014-07-24T22:27:40.677-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"book","co_author_tags":[],"downloadable_attachments":[],"slug":"On_the_Dual_Uses_of_Science_and_Ethics","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":814,"name":"Ethics","url":"https://www.academia.edu/Documents/in/Ethics"},{"id":56415,"name":"Biosecurity","url":"https://www.academia.edu/Documents/in/Biosecurity"}],"urls":[{"id":3240599,"url":"http://press.anu.edu.au/titles/centre-for-applied-philosophy-and-public-ethics-cappe/on-the-dual-uses-of-science-and-ethics/"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-7775754-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4405045"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/4405045/Education_and_Ethics_in_the_Life_Sciences"><img alt="Research paper thumbnail of Education and Ethics in the Life Sciences " class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Education and Ethics in the Life Sciences </div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4405045"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4405045"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4405045; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4405045]").text(description); $(".js-view-count[data-work-id=4405045]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4405045; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4405045']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=4405045]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4405045,"title":"Education and Ethics in the Life Sciences ","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/4405045/Education_and_Ethics_in_the_Life_Sciences","translated_internal_url":"","created_at":"2013-09-04T01:55:37.069-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"book","co_author_tags":[],"downloadable_attachments":[],"slug":"Education_and_Ethics_in_the_Life_Sciences","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[],"urls":[{"id":1546878,"url":"http://epress.anu.edu.au/titles/centre-for-applied-philosophy-and-public-ethics-cappe/education-and-ethics-in-the-life-sciences"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4405045-figures'); } }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="716177" id="biosecurity"><div class="js-work-strip profile--work_container" data-work-id="16404104"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/16404104/Why_has_not_there_been_more_research_of_concern"><img alt="Research paper thumbnail of Why has not there been more research of concern?" class="work-thumbnail" src="https://attachments.academia-assets.com/38978716/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/16404104/Why_has_not_there_been_more_research_of_concern">Why has not there been more research of concern?</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Amid the renewed concern in the last several years about the potential for life science research ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Amid the renewed concern in the last several years about the potential for life science research to facilitate the spread of disease, a central plank of the policy response has been to enact processes for assessing the risks and benefits of “research of concern.” The recent controversy regarding a proposed redaction of work on the modification of a H5N1 avian influenza virus is perhaps the most prominent such instance. And yet, a noteworthy feature of this case is its exceptionalness. In the last 10 years, life science publishers, funders, and labs have rarely identified any research as “of concern,” let alone proposed censors. This article takes this experience with risk assessment as an invitation for reflection. Reasons for the low number of instances of concern are related to how the biosecurity dimensions of the life sciences are identified, how they are described, how the assessments of benefits and risks are undertaken, how value considerations do and do not enter into assessments, as well as the lack of information on the outcomes of reviews. This argument builds on such considerations to examine the limitations and implications of the risk–benefit experiment of concern framing, the politics of expertise as well as the prospects for alternative responses.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="24ee621307268a4a9464a7594f20908d" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":38978716,"asset_id":16404104,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/38978716/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="16404104"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="16404104"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 16404104; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=16404104]").text(description); $(".js-view-count[data-work-id=16404104]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 16404104; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='16404104']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "24ee621307268a4a9464a7594f20908d" } } $('.js-work-strip[data-work-id=16404104]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":16404104,"title":"Why has not there been more research of concern?","translated_title":"","metadata":{"abstract":"Amid the renewed concern in the last several years about the potential for life science research to facilitate the spread of disease, a central plank of the policy response has been to enact processes for assessing the risks and benefits of “research of concern.” The recent controversy regarding a proposed redaction of work on the modification of a H5N1 avian influenza virus is perhaps the most prominent such instance. And yet, a noteworthy feature of this case is its exceptionalness. In the last 10 years, life science publishers, funders, and labs have rarely identified any research as “of concern,” let alone proposed censors. This article takes this experience with risk assessment as an invitation for reflection. Reasons for the low number of instances of concern are related to how the biosecurity dimensions of the life sciences are identified, how they are described, how the assessments of benefits and risks are undertaken, how value considerations do and do not enter into assessments, as well as the lack of information on the outcomes of reviews. This argument builds on such considerations to examine the limitations and implications of the risk–benefit experiment of concern framing, the politics of expertise as well as the prospects for alternative responses.","ai_title_tag":"Evaluating the Scarcity of Life Science Research of Concern"},"translated_abstract":"Amid the renewed concern in the last several years about the potential for life science research to facilitate the spread of disease, a central plank of the policy response has been to enact processes for assessing the risks and benefits of “research of concern.” The recent controversy regarding a proposed redaction of work on the modification of a H5N1 avian influenza virus is perhaps the most prominent such instance. And yet, a noteworthy feature of this case is its exceptionalness. In the last 10 years, life science publishers, funders, and labs have rarely identified any research as “of concern,” let alone proposed censors. This article takes this experience with risk assessment as an invitation for reflection. Reasons for the low number of instances of concern are related to how the biosecurity dimensions of the life sciences are identified, how they are described, how the assessments of benefits and risks are undertaken, how value considerations do and do not enter into assessments, as well as the lack of information on the outcomes of reviews. This argument builds on such considerations to examine the limitations and implications of the risk–benefit experiment of concern framing, the politics of expertise as well as the prospects for alternative responses.","internal_url":"https://www.academia.edu/16404104/Why_has_not_there_been_more_research_of_concern","translated_internal_url":"","created_at":"2015-10-02T07:56:45.549-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":38978716,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/38978716/thumbnails/1.jpg","file_name":"fpubh-02-00074_1.pdf","download_url":"https://www.academia.edu/attachments/38978716/download_file","bulk_download_file_name":"Why_has_not_there_been_more_research_of.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/38978716/fpubh-02-00074_1-libre.pdf?1443797743=\u0026response-content-disposition=attachment%3B+filename%3DWhy_has_not_there_been_more_research_of.pdf\u0026Expires=1743668352\u0026Signature=cF5HS-BD-JEclk5Y9BI6wh8TE0FPn6Tixmoh~sZ~8VDVcbmMXfqNfTNR~aUt1~LAawoPvUgPZLc2NlBhG5NifjRXKtSzXDFpdsENbko5Vm1uAlB3X39EvQlVjeV03wNIV1mCoWi7CM9~d~dfsgjnit8izniXs-yLlexdmo0vYsvD6UxOGOvFNdBvnnRdCShTbdbC9V9zr5NTZtl24jTPMXQI-JgbNvexqo9tpBLogPt-n7h~veuGWNH8pTPwdFZSIGwokK43MM6CU-KBxv-P5c6E5ID8KDvWgk~rxrh7AZMrvnUHTYGI~ivIj~MfZ3pnAkWKZG~AVxa~fTSl-~wz-Q__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Why_has_not_there_been_more_research_of_concern","translated_slug":"","page_count":14,"language":"en","content_type":"Work","summary":"Amid the renewed concern in the last several years about the potential for life science research to facilitate the spread of disease, a central plank of the policy response has been to enact processes for assessing the risks and benefits of “research of concern.” The recent controversy regarding a proposed redaction of work on the modification of a H5N1 avian influenza virus is perhaps the most prominent such instance. And yet, a noteworthy feature of this case is its exceptionalness. In the last 10 years, life science publishers, funders, and labs have rarely identified any research as “of concern,” let alone proposed censors. This article takes this experience with risk assessment as an invitation for reflection. Reasons for the low number of instances of concern are related to how the biosecurity dimensions of the life sciences are identified, how they are described, how the assessments of benefits and risks are undertaken, how value considerations do and do not enter into assessments, as well as the lack of information on the outcomes of reviews. This argument builds on such considerations to examine the limitations and implications of the risk–benefit experiment of concern framing, the politics of expertise as well as the prospects for alternative responses.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":38978716,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/38978716/thumbnails/1.jpg","file_name":"fpubh-02-00074_1.pdf","download_url":"https://www.academia.edu/attachments/38978716/download_file","bulk_download_file_name":"Why_has_not_there_been_more_research_of.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/38978716/fpubh-02-00074_1-libre.pdf?1443797743=\u0026response-content-disposition=attachment%3B+filename%3DWhy_has_not_there_been_more_research_of.pdf\u0026Expires=1743668352\u0026Signature=cF5HS-BD-JEclk5Y9BI6wh8TE0FPn6Tixmoh~sZ~8VDVcbmMXfqNfTNR~aUt1~LAawoPvUgPZLc2NlBhG5NifjRXKtSzXDFpdsENbko5Vm1uAlB3X39EvQlVjeV03wNIV1mCoWi7CM9~d~dfsgjnit8izniXs-yLlexdmo0vYsvD6UxOGOvFNdBvnnRdCShTbdbC9V9zr5NTZtl24jTPMXQI-JgbNvexqo9tpBLogPt-n7h~veuGWNH8pTPwdFZSIGwokK43MM6CU-KBxv-P5c6E5ID8KDvWgk~rxrh7AZMrvnUHTYGI~ivIj~MfZ3pnAkWKZG~AVxa~fTSl-~wz-Q__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":4508,"name":"Biological Weapons","url":"https://www.academia.edu/Documents/in/Biological_Weapons"},{"id":22182,"name":"Precautionary Principle","url":"https://www.academia.edu/Documents/in/Precautionary_Principle"},{"id":56415,"name":"Biosecurity","url":"https://www.academia.edu/Documents/in/Biosecurity"},{"id":280205,"name":"Dual Use Techmology Defense Industry","url":"https://www.academia.edu/Documents/in/Dual_Use_Techmology_Defense_Industry"},{"id":563838,"name":"Biosecurity, Bioethics, Bioterrorism","url":"https://www.academia.edu/Documents/in/Biosecurity_Bioethics_Bioterrorism"},{"id":1415883,"name":"Dual-use Research","url":"https://www.academia.edu/Documents/in/Dual-use_Research"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-16404104-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="16404055"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/16404055/Confidence_in_the_Biological_Weapons_Convention_What_is_it_How_can_it_be_secured"><img alt="Research paper thumbnail of Confidence in the Biological Weapons Convention: What is it? How can it be secured?" class="work-thumbnail" src="https://attachments.academia-assets.com/38978618/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/16404055/Confidence_in_the_Biological_Weapons_Convention_What_is_it_How_can_it_be_secured">Confidence in the Biological Weapons Convention: What is it? How can it be secured?</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://exeter.academia.edu/BrianRappert">Brian Rappert</a> and <a class="" data-click-track="profile-work-strip-authors" href="https://issafrica.academia.edu/ChandreGould">Chandre Gould</a></span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">It is vital to revisit how confidence in the Biological Weapons Convention (BWC) can be strengthe...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">It is vital to revisit how confidence in the Biological Weapons Convention (BWC) can be strengthened. To do that we need to ask challenging questions about what limits the relevance of Confidence Building Measures,1 and we need to identify what else is needed to establish and maintain confidence between states parties. This paper enables reflection on how those involved in the BWC process collectively assess issues affecting the convention. It focuses on the prevalence of defensive reasoning, which inhibits robust enquiry and encourages anti-learning practices. It argues that instead of more of the same, alternative types of discussions needed to be nurtured.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="5abf83cc287fa08394a4e9f3139ed894" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":38978618,"asset_id":16404055,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/38978618/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="16404055"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="16404055"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 16404055; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=16404055]").text(description); $(".js-view-count[data-work-id=16404055]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 16404055; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='16404055']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "5abf83cc287fa08394a4e9f3139ed894" } } $('.js-work-strip[data-work-id=16404055]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":16404055,"title":"Confidence in the Biological Weapons Convention: What is it? How can it be secured?","translated_title":"","metadata":{"abstract":"It is vital to revisit how confidence in the Biological Weapons Convention (BWC) can be strengthened. To do that we need to ask challenging questions about what limits the relevance of Confidence Building Measures,1 and we need to identify what else is needed to establish and maintain confidence between states parties. This paper enables reflection on how those involved in the BWC process collectively assess issues affecting the convention. It focuses on the prevalence of defensive reasoning, which inhibits robust enquiry and encourages anti-learning practices. It argues that instead of more of the same, alternative types of discussions needed to be nurtured."},"translated_abstract":"It is vital to revisit how confidence in the Biological Weapons Convention (BWC) can be strengthened. To do that we need to ask challenging questions about what limits the relevance of Confidence Building Measures,1 and we need to identify what else is needed to establish and maintain confidence between states parties. This paper enables reflection on how those involved in the BWC process collectively assess issues affecting the convention. It focuses on the prevalence of defensive reasoning, which inhibits robust enquiry and encourages anti-learning practices. It argues that instead of more of the same, alternative types of discussions needed to be nurtured.","internal_url":"https://www.academia.edu/16404055/Confidence_in_the_Biological_Weapons_Convention_What_is_it_How_can_it_be_secured","translated_internal_url":"","created_at":"2015-10-02T07:52:52.484-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[{"id":6584637,"work_id":16404055,"tagging_user_id":5109393,"tagged_user_id":9103917,"co_author_invite_id":null,"email":"g***d@mweb.co.za","affiliation":"Institute for Security Studies and Sciences-Po","display_order":0,"name":"Chandre Gould","title":"Confidence in the Biological Weapons Convention: What is it? How can it be secured?"},{"id":11936875,"work_id":16404055,"tagging_user_id":9103917,"tagged_user_id":248203936,"co_author_invite_id":2802458,"email":"p***a@issafrica.org","display_order":4194304,"name":"Institute Security Studies","title":"Confidence in the Biological Weapons Convention: What is it? How can it be secured?"}],"downloadable_attachments":[{"id":38978618,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/38978618/thumbnails/1.jpg","file_name":"ISS_Paper_258_Rappert_and_Gould.pdf","download_url":"https://www.academia.edu/attachments/38978618/download_file","bulk_download_file_name":"Confidence_in_the_Biological_Weapons_Con.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/38978618/ISS_Paper_258_Rappert_and_Gould-libre.pdf?1443797304=\u0026response-content-disposition=attachment%3B+filename%3DConfidence_in_the_Biological_Weapons_Con.pdf\u0026Expires=1743668352\u0026Signature=R4~BwYNseFSYBXaOwAjXHQ1m0lFeWqGao3ETzl~2myA2mpoEgcmhEGh7yD6y17QgO~k2QCkasFCAw2BG9csZLMqBr32BRF9PqiIDzQDgjh1dZUcr9bHCy-E4QY-uYnv~h3Oj3wVctPDT7jB4KbKIOBq3AH3uMW2BIGQ~0vAoaATh9AKyxx2M1aFzK5NyQiUzGGIMoIOQIOJmayek5P0XRI4Zn289qUHx0C9NTMc5WoQN189wum-N-cKV-4uB6ZVmwS11VSlhhIS6OerA20wQ1jUqHG010wHy7kKtdsFyzGE3~Jb6G~wlL7kZhgT48O75AHsbverKXyNNmcwjvYiLHQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Confidence_in_the_Biological_Weapons_Convention_What_is_it_How_can_it_be_secured","translated_slug":"","page_count":20,"language":"en","content_type":"Work","summary":"It is vital to revisit how confidence in the Biological Weapons Convention (BWC) can be strengthened. To do that we need to ask challenging questions about what limits the relevance of Confidence Building Measures,1 and we need to identify what else is needed to establish and maintain confidence between states parties. This paper enables reflection on how those involved in the BWC process collectively assess issues affecting the convention. It focuses on the prevalence of defensive reasoning, which inhibits robust enquiry and encourages anti-learning practices. It argues that instead of more of the same, alternative types of discussions needed to be nurtured.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":38978618,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/38978618/thumbnails/1.jpg","file_name":"ISS_Paper_258_Rappert_and_Gould.pdf","download_url":"https://www.academia.edu/attachments/38978618/download_file","bulk_download_file_name":"Confidence_in_the_Biological_Weapons_Con.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/38978618/ISS_Paper_258_Rappert_and_Gould-libre.pdf?1443797304=\u0026response-content-disposition=attachment%3B+filename%3DConfidence_in_the_Biological_Weapons_Con.pdf\u0026Expires=1743668352\u0026Signature=R4~BwYNseFSYBXaOwAjXHQ1m0lFeWqGao3ETzl~2myA2mpoEgcmhEGh7yD6y17QgO~k2QCkasFCAw2BG9csZLMqBr32BRF9PqiIDzQDgjh1dZUcr9bHCy-E4QY-uYnv~h3Oj3wVctPDT7jB4KbKIOBq3AH3uMW2BIGQ~0vAoaATh9AKyxx2M1aFzK5NyQiUzGGIMoIOQIOJmayek5P0XRI4Zn289qUHx0C9NTMc5WoQN189wum-N-cKV-4uB6ZVmwS11VSlhhIS6OerA20wQ1jUqHG010wHy7kKtdsFyzGE3~Jb6G~wlL7kZhgT48O75AHsbverKXyNNmcwjvYiLHQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":4508,"name":"Biological Weapons","url":"https://www.academia.edu/Documents/in/Biological_Weapons"},{"id":184185,"name":"Arms Control and Disarmament","url":"https://www.academia.edu/Documents/in/Arms_Control_and_Disarmament"},{"id":747385,"name":"Biological and Toxin Weapons Convention","url":"https://www.academia.edu/Documents/in/Biological_and_Toxin_Weapons_Convention"},{"id":860449,"name":"Argyris, Chris","url":"https://www.academia.edu/Documents/in/Argyris_Chris"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-16404055-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="7775799"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/7775799/Biological_Weapons_Convention_Confidence_the_prohibition_and_learning_from_the_past"><img alt="Research paper thumbnail of Biological Weapons Convention Confidence, the prohibition and learning from the past " class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Biological Weapons Convention Confidence, the prohibition and learning from the past </div><div class="wp-workCard_item"><span>ISS Report</span><span>, Jul 2014</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="7775799"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="7775799"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 7775799; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=7775799]").text(description); $(".js-view-count[data-work-id=7775799]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 7775799; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='7775799']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=7775799]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":7775799,"title":"Biological Weapons Convention Confidence, the prohibition and learning from the past ","translated_title":"","metadata":{"publication_date":{"day":null,"month":7,"year":2014,"errors":{}},"publication_name":"ISS Report"},"translated_abstract":null,"internal_url":"https://www.academia.edu/7775799/Biological_Weapons_Convention_Confidence_the_prohibition_and_learning_from_the_past","translated_internal_url":"","created_at":"2014-07-24T22:33:03.377-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"Biological_Weapons_Convention_Confidence_the_prohibition_and_learning_from_the_past","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":56415,"name":"Biosecurity","url":"https://www.academia.edu/Documents/in/Biosecurity"},{"id":563838,"name":"Biosecurity, Bioethics, Bioterrorism","url":"https://www.academia.edu/Documents/in/Biosecurity_Bioethics_Bioterrorism"}],"urls":[{"id":3240609,"url":"http://www.issafrica.org/publications/papers/biological-weapons-convention-confidence-the-prohibition-and-learning-from-the-past"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-7775799-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="7775788"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/7775788/Why_has_not_there_been_more_research_of_concern"><img alt="Research paper thumbnail of Why has not there been more research of concern? " class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Why has not there been more research of concern? </div><div class="wp-workCard_item"><span>Front. Public Health </span><span>, Jul 2014</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="7775788"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="7775788"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 7775788; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=7775788]").text(description); $(".js-view-count[data-work-id=7775788]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 7775788; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='7775788']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=7775788]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":7775788,"title":"Why has not there been more research of concern? ","translated_title":"","metadata":{"publication_date":{"day":null,"month":7,"year":2014,"errors":{}},"publication_name":"Front. Public Health "},"translated_abstract":null,"internal_url":"https://www.academia.edu/7775788/Why_has_not_there_been_more_research_of_concern","translated_internal_url":"","created_at":"2014-07-24T22:31:37.185-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"Why_has_not_there_been_more_research_of_concern","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":4508,"name":"Biological Weapons","url":"https://www.academia.edu/Documents/in/Biological_Weapons"},{"id":56415,"name":"Biosecurity","url":"https://www.academia.edu/Documents/in/Biosecurity"},{"id":563838,"name":"Biosecurity, Bioethics, Bioterrorism","url":"https://www.academia.edu/Documents/in/Biosecurity_Bioethics_Bioterrorism"}],"urls":[{"id":3240608,"url":"http://journal.frontiersin.org/Journal/10.3389/fpubh.2014.00074/abstract"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-7775788-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="7775772"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/7775772/Ethics_as_"><img alt="Research paper thumbnail of Ethics as …" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Ethics as …</div><div class="wp-workCard_item"><span>On the Dual uses of Sciene and Ethics: Principles, Practices, and Prospects </span><span>, Dec 2013</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="7775772"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="7775772"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 7775772; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=7775772]").text(description); $(".js-view-count[data-work-id=7775772]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 7775772; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='7775772']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=7775772]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":7775772,"title":"Ethics as …","translated_title":"","metadata":{"publication_date":{"day":null,"month":12,"year":2013,"errors":{}},"publication_name":"On the Dual uses of Sciene and Ethics: Principles, Practices, and Prospects "},"translated_abstract":null,"internal_url":"https://www.academia.edu/7775772/Ethics_as_","translated_internal_url":"","created_at":"2014-07-24T22:29:33.637-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"Ethics_as_","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":814,"name":"Ethics","url":"https://www.academia.edu/Documents/in/Ethics"},{"id":56415,"name":"Biosecurity","url":"https://www.academia.edu/Documents/in/Biosecurity"},{"id":563838,"name":"Biosecurity, Bioethics, Bioterrorism","url":"https://www.academia.edu/Documents/in/Biosecurity_Bioethics_Bioterrorism"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-7775772-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404974"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/4404974/Introduction_A_Web_of_Prevention"><img alt="Research paper thumbnail of Introduction: A Web of Prevention" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Introduction: A Web of Prevention</div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404974"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404974"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404974; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404974]").text(description); $(".js-view-count[data-work-id=4404974]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404974; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404974']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=4404974]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404974,"title":"Introduction: A Web of Prevention","translated_title":"","metadata":{},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404974/Introduction_A_Web_of_Prevention","translated_internal_url":"","created_at":"2013-09-04T01:49:15.552-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"Introduction_A_Web_of_Prevention","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[],"urls":[{"id":1546828,"url":"http://eric.exeter.ac.uk/exeter/bitstream/10036/31457/1/9781844073733.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404974-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404964"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/4404964/Responsibility_in_the_Life_Sciences_Assessing_the_Role_of_Professional_Codes"><img alt="Research paper thumbnail of Responsibility in the Life Sciences: Assessing the Role of Professional Codes" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Responsibility in the Life Sciences: Assessing the Role of Professional Codes</div><div class="wp-workCard_item"><span>Biosecurity and Bioterrorism-biodefense Strategy Practice and Science</span><span>, 2004</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">In response to threats from bioweapons, questions are being asked today in some countries about t...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">In response to threats from bioweapons, questions are being asked today in some countries about the implications and appropriateness of biological research. Many organizations and governments have suggested that bioscientists adopt what is generally referred to as a &amp;amp;amp;amp;amp;amp;amp;quot;code of conduct&amp;amp;amp;amp;amp;amp;amp;quot; to reduce the security concerns associated with their work. This article examines the potential contribution of such codes. By drawing on past lessons in other areas of professional life, it suggests some key questions, issues, and dilemmas for future consideration. As argued, attempts to establish codes must address demanding questions about their aims and audience--questions whose answers depend on potentially contentious issues regarding arms control, science, ethics, and politics.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404964"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404964"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404964; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404964]").text(description); $(".js-view-count[data-work-id=4404964]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404964; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404964']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=4404964]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404964,"title":"Responsibility in the Life Sciences: Assessing the Role of Professional Codes","translated_title":"","metadata":{"abstract":"In response to threats from bioweapons, questions are being asked today in some countries about the implications and appropriateness of biological research. Many organizations and governments have suggested that bioscientists adopt what is generally referred to as a \u0026amp;amp;amp;amp;amp;amp;amp;quot;code of conduct\u0026amp;amp;amp;amp;amp;amp;amp;quot; to reduce the security concerns associated with their work. This article examines the potential contribution of such codes. By drawing on past lessons in other areas of professional life, it suggests some key questions, issues, and dilemmas for future consideration. As argued, attempts to establish codes must address demanding questions about their aims and audience--questions whose answers depend on potentially contentious issues regarding arms control, science, ethics, and politics.","publication_date":{"day":null,"month":null,"year":2004,"errors":{}},"publication_name":"Biosecurity and Bioterrorism-biodefense Strategy Practice and Science"},"translated_abstract":"In response to threats from bioweapons, questions are being asked today in some countries about the implications and appropriateness of biological research. Many organizations and governments have suggested that bioscientists adopt what is generally referred to as a \u0026amp;amp;amp;amp;amp;amp;amp;quot;code of conduct\u0026amp;amp;amp;amp;amp;amp;amp;quot; to reduce the security concerns associated with their work. This article examines the potential contribution of such codes. By drawing on past lessons in other areas of professional life, it suggests some key questions, issues, and dilemmas for future consideration. As argued, attempts to establish codes must address demanding questions about their aims and audience--questions whose answers depend on potentially contentious issues regarding arms control, science, ethics, and politics.","internal_url":"https://www.academia.edu/4404964/Responsibility_in_the_Life_Sciences_Assessing_the_Role_of_Professional_Codes","translated_internal_url":"","created_at":"2013-09-04T01:48:59.681-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"Responsibility_in_the_Life_Sciences_Assessing_the_Role_of_Professional_Codes","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"In response to threats from bioweapons, questions are being asked today in some countries about the implications and appropriateness of biological research. Many organizations and governments have suggested that bioscientists adopt what is generally referred to as a \u0026amp;amp;amp;amp;amp;amp;amp;quot;code of conduct\u0026amp;amp;amp;amp;amp;amp;amp;quot; to reduce the security concerns associated with their work. This article examines the potential contribution of such codes. By drawing on past lessons in other areas of professional life, it suggests some key questions, issues, and dilemmas for future consideration. As argued, attempts to establish codes must address demanding questions about their aims and audience--questions whose answers depend on potentially contentious issues regarding arms control, science, ethics, and politics.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":7646,"name":"Professional Ethics","url":"https://www.academia.edu/Documents/in/Professional_Ethics"},{"id":8014,"name":"Life Sciences","url":"https://www.academia.edu/Documents/in/Life_Sciences"},{"id":47884,"name":"Biological Sciences","url":"https://www.academia.edu/Documents/in/Biological_Sciences"},{"id":98134,"name":"United States","url":"https://www.academia.edu/Documents/in/United_States"},{"id":291274,"name":"Great Britain","url":"https://www.academia.edu/Documents/in/Great_Britain"},{"id":332907,"name":"Biological Warfare","url":"https://www.academia.edu/Documents/in/Biological_Warfare"},{"id":396310,"name":"Codes of Ethics","url":"https://www.academia.edu/Documents/in/Codes_of_Ethics"}],"urls":[{"id":1546821,"url":"http://www.ingentaselect.com/rpsv/cgi-bin/cgi?ini=xref\u0026body=linker\u0026reqdoi=10.1089/15387130460759218"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404964-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404966"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4404966/Coding_ethical_behaviour_The_challenges_of_biological_weapons"><img alt="Research paper thumbnail of Coding ethical behaviour: The challenges of biological weapons" class="work-thumbnail" src="https://attachments.academia-assets.com/49877973/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4404966/Coding_ethical_behaviour_The_challenges_of_biological_weapons">Coding ethical behaviour: The challenges of biological weapons</a></div><div class="wp-workCard_item"><span>Science and Engineering Ethics</span><span>, 2003</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Since 11 September 2001 and the anthrax attacks that followed in the US, public and policy concer...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Since 11 September 2001 and the anthrax attacks that followed in the US, public and policy concerns about the security threats posed by biological weapons have increased significantly. With this has come an expansion of those activities in civil society deemed as potential sites for applying security controls. This paper examines the assumptions and implications of national and international efforts in one such area: how a balance or integration can take place between security and openness in civilian biomedical research through devising professional codes of conduct for scientists. Future attempts to establish such codes must find a way of reconciling or at least addressing dilemmatic and tension-ridden issues about the appropriateness of research; a topic that raises fundamental questions about the position of science within society.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="f0d8e31df3f6749f897bc4f4c3bf071d" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":49877973,"asset_id":4404966,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/49877973/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404966"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404966"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404966; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404966]").text(description); $(".js-view-count[data-work-id=4404966]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404966; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404966']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "f0d8e31df3f6749f897bc4f4c3bf071d" } } $('.js-work-strip[data-work-id=4404966]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404966,"title":"Coding ethical behaviour: The challenges of biological weapons","translated_title":"","metadata":{"abstract":"Since 11 September 2001 and the anthrax attacks that followed in the US, public and policy concerns about the security threats posed by biological weapons have increased significantly. With this has come an expansion of those activities in civil society deemed as potential sites for applying security controls. This paper examines the assumptions and implications of national and international efforts in one such area: how a balance or integration can take place between security and openness in civilian biomedical research through devising professional codes of conduct for scientists. Future attempts to establish such codes must find a way of reconciling or at least addressing dilemmatic and tension-ridden issues about the appropriateness of research; a topic that raises fundamental questions about the position of science within society.","publication_date":{"day":null,"month":null,"year":2003,"errors":{}},"publication_name":"Science and Engineering Ethics"},"translated_abstract":"Since 11 September 2001 and the anthrax attacks that followed in the US, public and policy concerns about the security threats posed by biological weapons have increased significantly. With this has come an expansion of those activities in civil society deemed as potential sites for applying security controls. This paper examines the assumptions and implications of national and international efforts in one such area: how a balance or integration can take place between security and openness in civilian biomedical research through devising professional codes of conduct for scientists. Future attempts to establish such codes must find a way of reconciling or at least addressing dilemmatic and tension-ridden issues about the appropriateness of research; a topic that raises fundamental questions about the position of science within society.","internal_url":"https://www.academia.edu/4404966/Coding_ethical_behaviour_The_challenges_of_biological_weapons","translated_internal_url":"","created_at":"2013-09-04T01:49:03.567-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":49877973,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/49877973/thumbnails/1.jpg","file_name":"s11948-003-0044-720161026-27105-117ahf0.pdf","download_url":"https://www.academia.edu/attachments/49877973/download_file","bulk_download_file_name":"Coding_ethical_behaviour_The_challenges.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/49877973/s11948-003-0044-720161026-27105-117ahf0-libre.pdf?1477475926=\u0026response-content-disposition=attachment%3B+filename%3DCoding_ethical_behaviour_The_challenges.pdf\u0026Expires=1743668352\u0026Signature=KcuTzf94pFLgFMo5c1cuRK4Z4pPnqOZh4JC6Hi41h31EfqzJyIko11aMliZkMaBc4Ghknk0rYgV8nLGU1LaP1V4tYXchOUWbUM3pI5~Q3a0y2G63UDj8cx1U1QtB7kmo7UIq6hk9bACETZ9MyH0BzQo9PmL62ENoDlJwT-H2Sgn7Dp46sjFAWLm0fhErdQLiFZDdpRr9bWnDs9NDZTlQDGhADWxu-B6t0q6qsGE5PGBhwIwW4boy1y1lu-eHGB4XdcQilkvFPFzA52QXy12tBXc7HR1G9tFs1kPZJm~pjFzk1QcFdVB9Y6re5MlB5~uRw6GCKvx3TdRCf-c4tlIeVA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Coding_ethical_behaviour_The_challenges_of_biological_weapons","translated_slug":"","page_count":18,"language":"en","content_type":"Work","summary":"Since 11 September 2001 and the anthrax attacks that followed in the US, public and policy concerns about the security threats posed by biological weapons have increased significantly. With this has come an expansion of those activities in civil society deemed as potential sites for applying security controls. This paper examines the assumptions and implications of national and international efforts in one such area: how a balance or integration can take place between security and openness in civilian biomedical research through devising professional codes of conduct for scientists. Future attempts to establish such codes must find a way of reconciling or at least addressing dilemmatic and tension-ridden issues about the appropriateness of research; a topic that raises fundamental questions about the position of science within society.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":49877973,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/49877973/thumbnails/1.jpg","file_name":"s11948-003-0044-720161026-27105-117ahf0.pdf","download_url":"https://www.academia.edu/attachments/49877973/download_file","bulk_download_file_name":"Coding_ethical_behaviour_The_challenges.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/49877973/s11948-003-0044-720161026-27105-117ahf0-libre.pdf?1477475926=\u0026response-content-disposition=attachment%3B+filename%3DCoding_ethical_behaviour_The_challenges.pdf\u0026Expires=1743668352\u0026Signature=KcuTzf94pFLgFMo5c1cuRK4Z4pPnqOZh4JC6Hi41h31EfqzJyIko11aMliZkMaBc4Ghknk0rYgV8nLGU1LaP1V4tYXchOUWbUM3pI5~Q3a0y2G63UDj8cx1U1QtB7kmo7UIq6hk9bACETZ9MyH0BzQo9PmL62ENoDlJwT-H2Sgn7Dp46sjFAWLm0fhErdQLiFZDdpRr9bWnDs9NDZTlQDGhADWxu-B6t0q6qsGE5PGBhwIwW4boy1y1lu-eHGB4XdcQilkvFPFzA52QXy12tBXc7HR1G9tFs1kPZJm~pjFzk1QcFdVB9Y6re5MlB5~uRw6GCKvx3TdRCf-c4tlIeVA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":906,"name":"Applied Ethics","url":"https://www.academia.edu/Documents/in/Applied_Ethics"},{"id":6779,"name":"Science","url":"https://www.academia.edu/Documents/in/Science"},{"id":24890,"name":"Intergroup Conflict (Psychology)","url":"https://www.academia.edu/Documents/in/Intergroup_Conflict_Psychology_"},{"id":40023,"name":"Social Responsibility","url":"https://www.academia.edu/Documents/in/Social_Responsibility"},{"id":43017,"name":"Civil Society","url":"https://www.academia.edu/Documents/in/Civil_Society"},{"id":76284,"name":"Code of Conduct","url":"https://www.academia.edu/Documents/in/Code_of_Conduct"},{"id":102808,"name":"Bioterrorism","url":"https://www.academia.edu/Documents/in/Bioterrorism"},{"id":291274,"name":"Great Britain","url":"https://www.academia.edu/Documents/in/Great_Britain"},{"id":332907,"name":"Biological Warfare","url":"https://www.academia.edu/Documents/in/Biological_Warfare"},{"id":396310,"name":"Codes of Ethics","url":"https://www.academia.edu/Documents/in/Codes_of_Ethics"},{"id":489423,"name":"Morals","url":"https://www.academia.edu/Documents/in/Morals"},{"id":839672,"name":"Ethics Research","url":"https://www.academia.edu/Documents/in/Ethics_Research"}],"urls":[{"id":1546823,"url":"http://www.springerlink.com/index/71up4822299p6275.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404966-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404973"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4404973/The_Narrative_Shaping_of_a_Product_Creaction_Process"><img alt="Research paper thumbnail of The Narrative Shaping of a Product Creaction Process" class="work-thumbnail" src="https://attachments.academia-assets.com/49877972/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4404973/The_Narrative_Shaping_of_a_Product_Creaction_Process">The Narrative Shaping of a Product Creaction Process</a></div><div class="wp-workCard_item"><span>Futures</span><span>, 2000</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="8ed0c70af6f3e2cef9a219f65f12376e" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":49877972,"asset_id":4404973,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/49877972/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404973"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404973"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404973; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404973]").text(description); $(".js-view-count[data-work-id=4404973]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404973; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404973']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "8ed0c70af6f3e2cef9a219f65f12376e" } } $('.js-work-strip[data-work-id=4404973]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404973,"title":"The Narrative Shaping of a Product Creaction Process","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2000,"errors":{}},"publication_name":"Futures"},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404973/The_Narrative_Shaping_of_a_Product_Creaction_Process","translated_internal_url":"","created_at":"2013-09-04T01:49:08.730-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":49877972,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/49877972/thumbnails/1.jpg","file_name":"The_Narrative_Shaping_of_a_Product_Creac20161026-6304-1tkbqw5.pdf","download_url":"https://www.academia.edu/attachments/49877972/download_file","bulk_download_file_name":"The_Narrative_Shaping_of_a_Product_Creac.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/49877972/The_Narrative_Shaping_of_a_Product_Creac20161026-6304-1tkbqw5-libre.pdf?1477475920=\u0026response-content-disposition=attachment%3B+filename%3DThe_Narrative_Shaping_of_a_Product_Creac.pdf\u0026Expires=1743575525\u0026Signature=Oc2IvWPlLw82oRGz-QFhQVdmNvexSyeklINRltoTs-HeKRXBC3pBJf8vkSu5EWBu-NSQf4vvxVs-1XocSFCk1yELyd6t2LxoyGgy0BoiUs0vOdmAEEn4ahdieskCFXrQasu~Q2rNS1giATzHRYY~TpQGZieR4TfTsCMN19wJux9hBSMQR0WbnUrSTUE8Izm4K4tXxc50VY-YFjbBlqKLL-OBXM0l83-SzEqKN0idM1LgOenVS4fYQGUJIEbGa~leAPAZm0S2FDwQVpZaefY6Iu1jxqTZqNoOuSN-AzJRUj5rZnd1glqif2bpCOHzBPl7UgyUX4JzkNu52pqrBQwMbg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"The_Narrative_Shaping_of_a_Product_Creaction_Process","translated_slug":"","page_count":22,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":49877972,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/49877972/thumbnails/1.jpg","file_name":"The_Narrative_Shaping_of_a_Product_Creac20161026-6304-1tkbqw5.pdf","download_url":"https://www.academia.edu/attachments/49877972/download_file","bulk_download_file_name":"The_Narrative_Shaping_of_a_Product_Creac.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/49877972/The_Narrative_Shaping_of_a_Product_Creac20161026-6304-1tkbqw5-libre.pdf?1477475920=\u0026response-content-disposition=attachment%3B+filename%3DThe_Narrative_Shaping_of_a_Product_Creac.pdf\u0026Expires=1743575525\u0026Signature=Oc2IvWPlLw82oRGz-QFhQVdmNvexSyeklINRltoTs-HeKRXBC3pBJf8vkSu5EWBu-NSQf4vvxVs-1XocSFCk1yELyd6t2LxoyGgy0BoiUs0vOdmAEEn4ahdieskCFXrQasu~Q2rNS1giATzHRYY~TpQGZieR4TfTsCMN19wJux9hBSMQR0WbnUrSTUE8Izm4K4tXxc50VY-YFjbBlqKLL-OBXM0l83-SzEqKN0idM1LgOenVS4fYQGUJIEbGa~leAPAZm0S2FDwQVpZaefY6Iu1jxqTZqNoOuSN-AzJRUj5rZnd1glqif2bpCOHzBPl7UgyUX4JzkNu52pqrBQwMbg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":111757,"name":"Futures","url":"https://www.academia.edu/Documents/in/Futures"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404973-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404975"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4404975/The_benefits_risks_and_threats_of_biotechnology"><img alt="Research paper thumbnail of The benefits, risks, and threats of biotechnology" class="work-thumbnail" src="https://attachments.academia-assets.com/31832356/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4404975/The_benefits_risks_and_threats_of_biotechnology">The benefits, risks, and threats of biotechnology</a></div><div class="wp-workCard_item"><span>Science & Public Policy</span><span>, 2008</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">This article considers how threats, risks, and benefits associated with research are defined in c...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">This article considers how threats, risks, and benefits associated with research are defined in contemporary policy debates. Specifically, it examines what has become known as the 'dual-use potential' of life science research findings and techniques. Focus is given to the emerging dominant policy response of enacting oversight processes to weigh the risks and benefits of individual instances of research. The curiosity at the center of this article is how it is often said that any knowledge might be used for destructive ends but, in practice, it has been extremely rare that anything has even been identified as 'of concern'. This situation raises basic questions about the purposes and prospects of oversight procedures. Various proposals are advanced in reply. These include better understanding how notions of the utility of research are constructed, searching for improved methods for assessing risks and benefits, attending to factors that might affect risk-benefit calculations, pursuing alternative questions and challenging fundamental tenants in policy discussions. S Brian Rappert is at the</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="fabf8259b414c6d79ad91401dd9715a7" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":31832356,"asset_id":4404975,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/31832356/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404975"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404975"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404975; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404975]").text(description); $(".js-view-count[data-work-id=4404975]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404975; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404975']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "fabf8259b414c6d79ad91401dd9715a7" } } $('.js-work-strip[data-work-id=4404975]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404975,"title":"The benefits, risks, and threats of biotechnology","translated_title":"","metadata":{"grobid_abstract":"This article considers how threats, risks, and benefits associated with research are defined in contemporary policy debates. Specifically, it examines what has become known as the 'dual-use potential' of life science research findings and techniques. Focus is given to the emerging dominant policy response of enacting oversight processes to weigh the risks and benefits of individual instances of research. The curiosity at the center of this article is how it is often said that any knowledge might be used for destructive ends but, in practice, it has been extremely rare that anything has even been identified as 'of concern'. This situation raises basic questions about the purposes and prospects of oversight procedures. Various proposals are advanced in reply. These include better understanding how notions of the utility of research are constructed, searching for improved methods for assessing risks and benefits, attending to factors that might affect risk-benefit calculations, pursuing alternative questions and challenging fundamental tenants in policy discussions. S Brian Rappert is at the","publication_date":{"day":null,"month":null,"year":2008,"errors":{}},"publication_name":"Science \u0026 Public Policy","grobid_abstract_attachment_id":31832356},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404975/The_benefits_risks_and_threats_of_biotechnology","translated_internal_url":"","created_at":"2013-09-04T01:49:16.126-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":31832356,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/31832356/thumbnails/1.jpg","file_name":"SPP.pdf","download_url":"https://www.academia.edu/attachments/31832356/download_file","bulk_download_file_name":"The_benefits_risks_and_threats_of_biotec.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/31832356/SPP-libre.pdf?1392448825=\u0026response-content-disposition=attachment%3B+filename%3DThe_benefits_risks_and_threats_of_biotec.pdf\u0026Expires=1743668352\u0026Signature=W~TD6ampYWgCkDken-F0-CpBuSzZnDdJ9pyjS3e3LLOrWWTqA~xTPF3rQaGQFYAFq~dD-jIo3JvzME2WS~pExHgclIxFMSvHjYgdETdXcnjEiGOTBnlBXly54Wtlh6fIg3Y6UII-DrvjEADR7YwZ4n-JFH4xcyso8h2vHGFbdmUXetohmJt~HIBnvCMzQ9L8ChCd~o-zpXfwOTbidMRXoClNWwiFwz1RYiiQjnt1V~cGHPOI-Lz8JsEJmJeMNqSpd2NGHcVVJkmytQvdfbSdc8mAV0l30G54As0MXaJ5BYQkN8yZiaP0-1I6LVBmiHBPbSZ3AcHNqlIHhMM3obMoVg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"The_benefits_risks_and_threats_of_biotechnology","translated_slug":"","page_count":7,"language":"en","content_type":"Work","summary":"This article considers how threats, risks, and benefits associated with research are defined in contemporary policy debates. Specifically, it examines what has become known as the 'dual-use potential' of life science research findings and techniques. Focus is given to the emerging dominant policy response of enacting oversight processes to weigh the risks and benefits of individual instances of research. The curiosity at the center of this article is how it is often said that any knowledge might be used for destructive ends but, in practice, it has been extremely rare that anything has even been identified as 'of concern'. This situation raises basic questions about the purposes and prospects of oversight procedures. Various proposals are advanced in reply. These include better understanding how notions of the utility of research are constructed, searching for improved methods for assessing risks and benefits, attending to factors that might affect risk-benefit calculations, pursuing alternative questions and challenging fundamental tenants in policy discussions. S Brian Rappert is at the","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":31832356,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/31832356/thumbnails/1.jpg","file_name":"SPP.pdf","download_url":"https://www.academia.edu/attachments/31832356/download_file","bulk_download_file_name":"The_benefits_risks_and_threats_of_biotec.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/31832356/SPP-libre.pdf?1392448825=\u0026response-content-disposition=attachment%3B+filename%3DThe_benefits_risks_and_threats_of_biotec.pdf\u0026Expires=1743668352\u0026Signature=W~TD6ampYWgCkDken-F0-CpBuSzZnDdJ9pyjS3e3LLOrWWTqA~xTPF3rQaGQFYAFq~dD-jIo3JvzME2WS~pExHgclIxFMSvHjYgdETdXcnjEiGOTBnlBXly54Wtlh6fIg3Y6UII-DrvjEADR7YwZ4n-JFH4xcyso8h2vHGFbdmUXetohmJt~HIBnvCMzQ9L8ChCd~o-zpXfwOTbidMRXoClNWwiFwz1RYiiQjnt1V~cGHPOI-Lz8JsEJmJeMNqSpd2NGHcVVJkmytQvdfbSdc8mAV0l30G54As0MXaJ5BYQkN8yZiaP0-1I6LVBmiHBPbSZ3AcHNqlIHhMM3obMoVg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"},{"id":8014,"name":"Life Sciences","url":"https://www.academia.edu/Documents/in/Life_Sciences"}],"urls":[{"id":1546829,"url":"http://people.exeter.ac.uk/br201/Research/Publications/SPP.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404975-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404986"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4404986/Codes_of_Conduct_and_Biological_Weapons_An_In_process_Assessment"><img alt="Research paper thumbnail of Codes of Conduct and Biological Weapons: An In-process Assessment" class="work-thumbnail" src="https://attachments.academia-assets.com/31832358/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4404986/Codes_of_Conduct_and_Biological_Weapons_An_In_process_Assessment">Codes of Conduct and Biological Weapons: An In-process Assessment</a></div><div class="wp-workCard_item"><span>Biosecurity and Bioterrorism-biodefense Strategy Practice and Science</span><span>, 2007</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Codes of conduct have received a significant amount of attention in recent years as a policy opti...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Codes of conduct have received a significant amount of attention in recent years as a policy option to address concerns about the relation between life science research and the deliberate spread of disease through biological weapons. While the term code of conduct has functioned as a generic umbrella phrase for an array of different types of codes, in general, such codes seek to set expectations regarding thinking and behavior for those associated with the life sciences. The purpose of this article is fourfold: (1) to survey recent developments, specifically with respect to "universal" and "scientific society" types of codes; (2) to propose criteria for assessing these initiatives; (3) to evaluate activities undertaken to date on the basis of these criteria; and (4) to propose key questions for the future. Overall, a mixed assessment is offered of the achievements of code-related activities to date. As argued, because of this overall situation, in the future careful attention should be given to what is sought out of this option and how it can be realized in practice.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="2545afbfcee8be29f4d2ccf03586cb13" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":31832358,"asset_id":4404986,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/31832358/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404986"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404986"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404986; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404986]").text(description); $(".js-view-count[data-work-id=4404986]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404986; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404986']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "2545afbfcee8be29f4d2ccf03586cb13" } } $('.js-work-strip[data-work-id=4404986]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404986,"title":"Codes of Conduct and Biological Weapons: An In-process Assessment","translated_title":"","metadata":{"ai_title_tag":"Evaluating Codes of Conduct on Biological Weapons Strategy","grobid_abstract":"Codes of conduct have received a significant amount of attention in recent years as a policy option to address concerns about the relation between life science research and the deliberate spread of disease through biological weapons. While the term code of conduct has functioned as a generic umbrella phrase for an array of different types of codes, in general, such codes seek to set expectations regarding thinking and behavior for those associated with the life sciences. The purpose of this article is fourfold: (1) to survey recent developments, specifically with respect to \"universal\" and \"scientific society\" types of codes; (2) to propose criteria for assessing these initiatives; (3) to evaluate activities undertaken to date on the basis of these criteria; and (4) to propose key questions for the future. Overall, a mixed assessment is offered of the achievements of code-related activities to date. As argued, because of this overall situation, in the future careful attention should be given to what is sought out of this option and how it can be realized in practice.","publication_date":{"day":null,"month":null,"year":2007,"errors":{}},"publication_name":"Biosecurity and Bioterrorism-biodefense Strategy Practice and Science","grobid_abstract_attachment_id":31832358},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404986/Codes_of_Conduct_and_Biological_Weapons_An_In_process_Assessment","translated_internal_url":"","created_at":"2013-09-04T01:49:39.541-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":31832358,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/31832358/thumbnails/1.jpg","file_name":"Rappert.pdf","download_url":"https://www.academia.edu/attachments/31832358/download_file","bulk_download_file_name":"Codes_of_Conduct_and_Biological_Weapons.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/31832358/Rappert-libre.pdf?1392432388=\u0026response-content-disposition=attachment%3B+filename%3DCodes_of_Conduct_and_Biological_Weapons.pdf\u0026Expires=1743668352\u0026Signature=bWPD0Kf8JGu85E0fJiAIRBueHyydXK6qWEo8rSOM8PgOQnXFBGJKD8YsQr6BAa8Yov~zofGHuNVeiLVCr-1doEFchkm68HAc3vJIKln6TgLLeX7bmUI30vzWN4EzVY328Af3639mnRUEYPFfvHPDL52WzRg7sDLZt75S8JicsTrf4QqDx9ycBNtLHXTA9ji8hg4YWdM9ab2-75qJaANcIgNg3SMOBVmv~BAoqfqCy1Jsym-moKzhAwpl13NxlbAUI4I5-E8f8yEcB1Ss5trUsizEJVrMh8x-iDfAvWP9qBZLTMoxZLKVab6qrLjpA2lnmByuTBsZc8XrYp1tY6n9lA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Codes_of_Conduct_and_Biological_Weapons_An_In_process_Assessment","translated_slug":"","page_count":10,"language":"en","content_type":"Work","summary":"Codes of conduct have received a significant amount of attention in recent years as a policy option to address concerns about the relation between life science research and the deliberate spread of disease through biological weapons. While the term code of conduct has functioned as a generic umbrella phrase for an array of different types of codes, in general, such codes seek to set expectations regarding thinking and behavior for those associated with the life sciences. The purpose of this article is fourfold: (1) to survey recent developments, specifically with respect to \"universal\" and \"scientific society\" types of codes; (2) to propose criteria for assessing these initiatives; (3) to evaluate activities undertaken to date on the basis of these criteria; and (4) to propose key questions for the future. Overall, a mixed assessment is offered of the achievements of code-related activities to date. As argued, because of this overall situation, in the future careful attention should be given to what is sought out of this option and how it can be realized in practice.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":31832358,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/31832358/thumbnails/1.jpg","file_name":"Rappert.pdf","download_url":"https://www.academia.edu/attachments/31832358/download_file","bulk_download_file_name":"Codes_of_Conduct_and_Biological_Weapons.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/31832358/Rappert-libre.pdf?1392432388=\u0026response-content-disposition=attachment%3B+filename%3DCodes_of_Conduct_and_Biological_Weapons.pdf\u0026Expires=1743668353\u0026Signature=IEShf~qNl3ckNLbHmsbxs1C140FB4YKFMv185fCcn~6DrdKB-EI0CR2WNPv2Alr6Olaewq1yUb5CK-9ic2To45W8PDBoReHB8JV2oEhKcIf~PnQyEPZ41orjH9KPBlpXDPws~1u4HQuhRPNZoTnmS-7H8yEP-0JKETM1e037EhpxavTr9jwZk~t-lXn9tWu1VWDALI-0FX1lqQrlKUT8lOAGEJztBt7AjWRbVKaP9Xn~y8Lzo1OGrA6JGchX~hMtcl6QE5NhVj6m0y08KocMETNcjcwb~kCJ3jT4j8beNhJpIF5HCfF6bv2hpfnXaOwOeAHWAeee32zQmcfDk46dWA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":19870,"name":"Research","url":"https://www.academia.edu/Documents/in/Research"},{"id":47884,"name":"Biological Sciences","url":"https://www.academia.edu/Documents/in/Biological_Sciences"},{"id":76284,"name":"Code of Conduct","url":"https://www.academia.edu/Documents/in/Code_of_Conduct"},{"id":102808,"name":"Bioterrorism","url":"https://www.academia.edu/Documents/in/Bioterrorism"},{"id":230733,"name":"Process Assessment","url":"https://www.academia.edu/Documents/in/Process_Assessment"},{"id":396310,"name":"Codes of Ethics","url":"https://www.academia.edu/Documents/in/Codes_of_Ethics"}],"urls":[{"id":1546839,"url":"http://projects.exeter.ac.uk/codesofconduct/Chronology/Rappert.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404986-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4405012"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4405012/Biological_weapons_genetics_and_social_analysis_emerging_responses_emerging_issues_I"><img alt="Research paper thumbnail of Biological weapons, genetics and social analysis: emerging responses, emerging issues--I" class="work-thumbnail" src="https://attachments.academia-assets.com/49877956/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4405012/Biological_weapons_genetics_and_social_analysis_emerging_responses_emerging_issues_I">Biological weapons, genetics and social analysis: emerging responses, emerging issues--I</a></div><div class="wp-workCard_item"><span>New Genetics and Society</span><span>, 2003</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Recent terrorist attacks in the USA have generated significant attention in many countries to the...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Recent terrorist attacks in the USA have generated significant attention in many countries to the threats posed by biological weapons. In response to these events and the spectre of future attacks, bioscientists and professional organizations have begun or intensified asking questions about the possible malign applications of their research. As Part I of a two-part article, this paper surveys how genetics might contribute to the development of novel forms of weaponry. It is further argued that the dilemmas and difficulties facing bioscientists pose pressing and thorny questions for the hitherto agendas and orientations of those concerned with the social, ethical and political implications of genetics. Part II will examine the emerging responses initiated by biomedical organizations and spokespersons in the US and the UK. This will be done with a view to asking how scientific and medical research communities are defining and policing notions of professionalism, responsibility and accountability. On the basis of this, suggested lines for future social analysis will be offered.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="23864f033cf4655309d1375963e1046e" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":49877956,"asset_id":4405012,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/49877956/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4405012"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4405012"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4405012; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4405012]").text(description); $(".js-view-count[data-work-id=4405012]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4405012; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4405012']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "23864f033cf4655309d1375963e1046e" } } $('.js-work-strip[data-work-id=4405012]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4405012,"title":"Biological weapons, genetics and social analysis: emerging responses, emerging issues--I","translated_title":"","metadata":{"grobid_abstract":"Recent terrorist attacks in the USA have generated significant attention in many countries to the threats posed by biological weapons. In response to these events and the spectre of future attacks, bioscientists and professional organizations have begun or intensified asking questions about the possible malign applications of their research. As Part I of a two-part article, this paper surveys how genetics might contribute to the development of novel forms of weaponry. It is further argued that the dilemmas and difficulties facing bioscientists pose pressing and thorny questions for the hitherto agendas and orientations of those concerned with the social, ethical and political implications of genetics. Part II will examine the emerging responses initiated by biomedical organizations and spokespersons in the US and the UK. This will be done with a view to asking how scientific and medical research communities are defining and policing notions of professionalism, responsibility and accountability. On the basis of this, suggested lines for future social analysis will be offered.","publication_date":{"day":null,"month":null,"year":2003,"errors":{}},"publication_name":"New Genetics and Society","grobid_abstract_attachment_id":49877956},"translated_abstract":null,"internal_url":"https://www.academia.edu/4405012/Biological_weapons_genetics_and_social_analysis_emerging_responses_emerging_issues_I","translated_internal_url":"","created_at":"2013-09-04T01:52:20.375-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":49877956,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/49877956/thumbnails/1.jpg","file_name":"NGS_20I.pdf","download_url":"https://www.academia.edu/attachments/49877956/download_file","bulk_download_file_name":"Biological_weapons_genetics_and_social_a.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/49877956/NGS_20I-libre.pdf?1477475920=\u0026response-content-disposition=attachment%3B+filename%3DBiological_weapons_genetics_and_social_a.pdf\u0026Expires=1743668353\u0026Signature=f3fir2I9~pCpAAB0SjiZVCYd4q4RnnVE~5wwLUb6AiOn6s8sA28gd3Lo2gKDyXJ--yr8wAXclD64VaGH9XBPnssnWcj6fvHjuhTnm22mAEIFRVX~zE5U5SMflOCQt9yXOR9pLeUqiOdn9Oddrlq52T7wxnksIFQnX70bqgWIDLbNLlwoGHsxAdDVCzWMK4eMO93Yq67I6jAgmqi9Zz8E3KBcr0DKqAR0CgZU9Sl1ubVjgWprygiuruEyVLkV2Opltzd9tzklGpQAXWMwcoXi2cmL8HIFnj1oUn6gAuK8CrNLrc3mpZkpV1eHDBFdyWac10e98S1vhS0-qDnTq222TA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Biological_weapons_genetics_and_social_analysis_emerging_responses_emerging_issues_I","translated_slug":"","page_count":14,"language":"en","content_type":"Work","summary":"Recent terrorist attacks in the USA have generated significant attention in many countries to the threats posed by biological weapons. In response to these events and the spectre of future attacks, bioscientists and professional organizations have begun or intensified asking questions about the possible malign applications of their research. As Part I of a two-part article, this paper surveys how genetics might contribute to the development of novel forms of weaponry. It is further argued that the dilemmas and difficulties facing bioscientists pose pressing and thorny questions for the hitherto agendas and orientations of those concerned with the social, ethical and political implications of genetics. Part II will examine the emerging responses initiated by biomedical organizations and spokespersons in the US and the UK. This will be done with a view to asking how scientific and medical research communities are defining and policing notions of professionalism, responsibility and accountability. On the basis of this, suggested lines for future social analysis will be offered.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":49877956,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/49877956/thumbnails/1.jpg","file_name":"NGS_20I.pdf","download_url":"https://www.academia.edu/attachments/49877956/download_file","bulk_download_file_name":"Biological_weapons_genetics_and_social_a.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/49877956/NGS_20I-libre.pdf?1477475920=\u0026response-content-disposition=attachment%3B+filename%3DBiological_weapons_genetics_and_social_a.pdf\u0026Expires=1743668353\u0026Signature=f3fir2I9~pCpAAB0SjiZVCYd4q4RnnVE~5wwLUb6AiOn6s8sA28gd3Lo2gKDyXJ--yr8wAXclD64VaGH9XBPnssnWcj6fvHjuhTnm22mAEIFRVX~zE5U5SMflOCQt9yXOR9pLeUqiOdn9Oddrlq52T7wxnksIFQnX70bqgWIDLbNLlwoGHsxAdDVCzWMK4eMO93Yq67I6jAgmqi9Zz8E3KBcr0DKqAR0CgZU9Sl1ubVjgWprygiuruEyVLkV2Opltzd9tzklGpQAXWMwcoXi2cmL8HIFnj1oUn6gAuK8CrNLrc3mpZkpV1eHDBFdyWac10e98S1vhS0-qDnTq222TA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":156,"name":"Genetics","url":"https://www.academia.edu/Documents/in/Genetics"},{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology"},{"id":1139,"name":"Publishing","url":"https://www.academia.edu/Documents/in/Publishing"},{"id":5398,"name":"Biotechnology","url":"https://www.academia.edu/Documents/in/Biotechnology"},{"id":7646,"name":"Professional Ethics","url":"https://www.academia.edu/Documents/in/Professional_Ethics"},{"id":32696,"name":"Scientific Societies","url":"https://www.academia.edu/Documents/in/Scientific_Societies"},{"id":40023,"name":"Social Responsibility","url":"https://www.academia.edu/Documents/in/Social_Responsibility"},{"id":41749,"name":"Genetic Engineering","url":"https://www.academia.edu/Documents/in/Genetic_Engineering"},{"id":58277,"name":"Emergency Response","url":"https://www.academia.edu/Documents/in/Emergency_Response"},{"id":66744,"name":"Biomedical Research","url":"https://www.academia.edu/Documents/in/Biomedical_Research"},{"id":85280,"name":"Industry","url":"https://www.academia.edu/Documents/in/Industry"},{"id":98134,"name":"United States","url":"https://www.academia.edu/Documents/in/United_States"},{"id":102808,"name":"Bioterrorism","url":"https://www.academia.edu/Documents/in/Bioterrorism"},{"id":159736,"name":"Universities","url":"https://www.academia.edu/Documents/in/Universities"},{"id":193772,"name":"Genetic research","url":"https://www.academia.edu/Documents/in/Genetic_research"},{"id":291274,"name":"Great Britain","url":"https://www.academia.edu/Documents/in/Great_Britain"},{"id":332907,"name":"Biological Warfare","url":"https://www.academia.edu/Documents/in/Biological_Warfare"},{"id":396310,"name":"Codes of Ethics","url":"https://www.academia.edu/Documents/in/Codes_of_Ethics"},{"id":839672,"name":"Ethics Research","url":"https://www.academia.edu/Documents/in/Ethics_Research"}],"urls":[{"id":1546858,"url":"http://projects.exeter.ac.uk/codesofconduct/Publications/NGS%2520I.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4405012-figures'); } }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="716199" id="intellectualproperty"><div class="js-work-strip profile--work_container" data-work-id="20029412"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/20029412/Making_sense_of_diversity_and_reluctance_academic_industrial_relations_and_intellectual_property"><img alt="Research paper thumbnail of Making sense of diversity and reluctance: academic–industrial relations and intellectual property" class="work-thumbnail" src="https://attachments.academia-assets.com/40965447/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/20029412/Making_sense_of_diversity_and_reluctance_academic_industrial_relations_and_intellectual_property">Making sense of diversity and reluctance: academic–industrial relations and intellectual property</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The commercialisation of the public sector research base, and in particular academic research, ha...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The commercialisation of the public sector research base, and in particular academic research, has been a continuing preoccupation among policy makers around the world. Empirically, these issues are explored in the management of intellectual property in university spin-offs (USOs) that emerge through both informal and formal linkages with universities across three sectors. The paper utilises a recently developed methodology to map knowledge flows as well as linkages between organisations. This enables us to examine the exchange of knowledge in commercial and academic networks and the implications of changes in the sponsorship, ownership, and proprietary status of knowledge for these patterns of exchange. It is argued that some of the most important points of tension between universities and the firms studied derive from misconceptions in the value of intellectual property rights.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="e5a0bd56c4bd66f81f9838070be1b660" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":40965447,"asset_id":20029412,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/40965447/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="20029412"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="20029412"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 20029412; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=20029412]").text(description); $(".js-view-count[data-work-id=20029412]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 20029412; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='20029412']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "e5a0bd56c4bd66f81f9838070be1b660" } } $('.js-work-strip[data-work-id=20029412]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":20029412,"title":"Making sense of diversity and reluctance: academic–industrial relations and intellectual property","translated_title":"","metadata":{"abstract":"The commercialisation of the public sector research base, and in particular academic research, has been a continuing preoccupation among policy makers around the world. Empirically, these issues are explored in the management of intellectual property in university spin-offs (USOs) that emerge through both informal and formal linkages with universities across three sectors. The paper utilises a recently developed methodology to map knowledge flows as well as linkages between organisations. This enables us to examine the exchange of knowledge in commercial and academic networks and the implications of changes in the sponsorship, ownership, and proprietary status of knowledge for these patterns of exchange. It is argued that some of the most important points of tension between universities and the firms studied derive from misconceptions in the value of intellectual property rights.\n"},"translated_abstract":"The commercialisation of the public sector research base, and in particular academic research, has been a continuing preoccupation among policy makers around the world. Empirically, these issues are explored in the management of intellectual property in university spin-offs (USOs) that emerge through both informal and formal linkages with universities across three sectors. The paper utilises a recently developed methodology to map knowledge flows as well as linkages between organisations. This enables us to examine the exchange of knowledge in commercial and academic networks and the implications of changes in the sponsorship, ownership, and proprietary status of knowledge for these patterns of exchange. It is argued that some of the most important points of tension between universities and the firms studied derive from misconceptions in the value of intellectual property rights.\n","internal_url":"https://www.academia.edu/20029412/Making_sense_of_diversity_and_reluctance_academic_industrial_relations_and_intellectual_property","translated_internal_url":"","created_at":"2016-01-05T01:08:41.980-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[{"id":12571775,"work_id":20029412,"tagging_user_id":5109393,"tagged_user_id":80894,"co_author_invite_id":null,"email":"a***5@york.ac.uk","affiliation":"University of York","display_order":0,"name":"Andrew Webster","title":"Making sense of diversity and reluctance: academic–industrial relations and intellectual property"}],"downloadable_attachments":[{"id":40965447,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/40965447/thumbnails/1.jpg","file_name":"1-s2.0-S0048733399000281-main.pdf","download_url":"https://www.academia.edu/attachments/40965447/download_file","bulk_download_file_name":"Making_sense_of_diversity_and_reluctance.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/40965447/1-s2.0-S0048733399000281-main-libre.pdf?1451985004=\u0026response-content-disposition=attachment%3B+filename%3DMaking_sense_of_diversity_and_reluctance.pdf\u0026Expires=1743668353\u0026Signature=VG45QD6tyuGXFxh-9daNJqoXEOjcrkj3~QCEDwEYpvhpAPM~E8ij0P89UoUdUdMZ5E~BdCR6CfoIDpqZBOTNCNGXhE9YgtXB9jWtfwyBcLm-xTEL5--YfIVB8k3QFBJcsf-wF7x7VM8Inyzw4XZ88MsetHTiaR1vWtTFIiq1KoUkpRU5oImHj1ntF0bz7UcFxK6tFmEj4KkvNkP~GjbWh39yQSu5TP9JMeL0pUS0TsjRK2RN2Lf5Pn3xrnFXRRIAgcG-7JTpn9LXoxCIlZkQZRDfV5ZXk8T1bJSF--f2b7wpK02DEEEu1g~oItqowz9QyWFPxvhabSvu3PatjPq6OA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Making_sense_of_diversity_and_reluctance_academic_industrial_relations_and_intellectual_property","translated_slug":"","page_count":18,"language":"en","content_type":"Work","summary":"The commercialisation of the public sector research base, and in particular academic research, has been a continuing preoccupation among policy makers around the world. Empirically, these issues are explored in the management of intellectual property in university spin-offs (USOs) that emerge through both informal and formal linkages with universities across three sectors. The paper utilises a recently developed methodology to map knowledge flows as well as linkages between organisations. This enables us to examine the exchange of knowledge in commercial and academic networks and the implications of changes in the sponsorship, ownership, and proprietary status of knowledge for these patterns of exchange. It is argued that some of the most important points of tension between universities and the firms studied derive from misconceptions in the value of intellectual property rights.\n","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":40965447,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/40965447/thumbnails/1.jpg","file_name":"1-s2.0-S0048733399000281-main.pdf","download_url":"https://www.academia.edu/attachments/40965447/download_file","bulk_download_file_name":"Making_sense_of_diversity_and_reluctance.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/40965447/1-s2.0-S0048733399000281-main-libre.pdf?1451985004=\u0026response-content-disposition=attachment%3B+filename%3DMaking_sense_of_diversity_and_reluctance.pdf\u0026Expires=1743668353\u0026Signature=VG45QD6tyuGXFxh-9daNJqoXEOjcrkj3~QCEDwEYpvhpAPM~E8ij0P89UoUdUdMZ5E~BdCR6CfoIDpqZBOTNCNGXhE9YgtXB9jWtfwyBcLm-xTEL5--YfIVB8k3QFBJcsf-wF7x7VM8Inyzw4XZ88MsetHTiaR1vWtTFIiq1KoUkpRU5oImHj1ntF0bz7UcFxK6tFmEj4KkvNkP~GjbWh39yQSu5TP9JMeL0pUS0TsjRK2RN2Lf5Pn3xrnFXRRIAgcG-7JTpn9LXoxCIlZkQZRDfV5ZXk8T1bJSF--f2b7wpK02DEEEu1g~oItqowz9QyWFPxvhabSvu3PatjPq6OA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":967,"name":"Intellectual Property","url":"https://www.academia.edu/Documents/in/Intellectual_Property"},{"id":150888,"name":"Academic Spin-Offs","url":"https://www.academia.edu/Documents/in/Academic_Spin-Offs"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-20029412-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404737"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4404737/Making_sense_of_diversity_and_reluctance_academic_industrial_relations_and_intellectual_property"><img alt="Research paper thumbnail of Making sense of diversity and reluctance: academic–industrial relations and intellectual property" class="work-thumbnail" src="https://attachments.academia-assets.com/40965438/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4404737/Making_sense_of_diversity_and_reluctance_academic_industrial_relations_and_intellectual_property">Making sense of diversity and reluctance: academic–industrial relations and intellectual property</a></div><div class="wp-workCard_item"><span>Research Policy</span><span>, 1999</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The commercialisation of the public sector research base, and in particular academic research, ha...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The commercialisation of the public sector research base, and in particular academic research, has been a continuing preoccupation among policy makers around the world. Empirically, these issues are explored in the management of Ž . intellectual property in university spin-offs USOs that emerge through both informal and formal linkages with universities across three sectors. The paper utilises a recently developed methodology to map knowledge flows as well as linkages between organisations. This enables us to examine the exchange of knowledge in commercial and academic networks and the implications of changes in the sponsorship, ownership, and proprietary status of knowledge for these patterns of exchange. It is argued that some of the most important points of tension between universities and the firms studied derive from misconceptions in the value of intellectual property rights. q 0048-7333r99r$ -see front matter q 1999 Elsevier Science B.V. All rights reserved.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="cb400d57fbc10db632cda048832c99ff" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":40965438,"asset_id":4404737,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/40965438/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404737"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404737"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404737; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404737]").text(description); $(".js-view-count[data-work-id=4404737]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404737; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404737']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "cb400d57fbc10db632cda048832c99ff" } } $('.js-work-strip[data-work-id=4404737]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404737,"title":"Making sense of diversity and reluctance: academic–industrial relations and intellectual property","translated_title":"","metadata":{"ai_title_tag":"Intellectual Property in Academic Spin-Offs","grobid_abstract":"The commercialisation of the public sector research base, and in particular academic research, has been a continuing preoccupation among policy makers around the world. Empirically, these issues are explored in the management of Ž . intellectual property in university spin-offs USOs that emerge through both informal and formal linkages with universities across three sectors. The paper utilises a recently developed methodology to map knowledge flows as well as linkages between organisations. This enables us to examine the exchange of knowledge in commercial and academic networks and the implications of changes in the sponsorship, ownership, and proprietary status of knowledge for these patterns of exchange. It is argued that some of the most important points of tension between universities and the firms studied derive from misconceptions in the value of intellectual property rights. q 0048-7333r99r$ -see front matter q 1999 Elsevier Science B.V. All rights reserved.","publication_date":{"day":null,"month":null,"year":1999,"errors":{}},"publication_name":"Research Policy","grobid_abstract_attachment_id":40965438},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404737/Making_sense_of_diversity_and_reluctance_academic_industrial_relations_and_intellectual_property","translated_internal_url":"","created_at":"2013-09-04T01:26:14.755-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":40965438,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/40965438/thumbnails/1.jpg","file_name":"1-s2.0-S0048733399000281-main.pdf","download_url":"https://www.academia.edu/attachments/40965438/download_file","bulk_download_file_name":"Making_sense_of_diversity_and_reluctance.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/40965438/1-s2.0-S0048733399000281-main-libre.pdf?1451984898=\u0026response-content-disposition=attachment%3B+filename%3DMaking_sense_of_diversity_and_reluctance.pdf\u0026Expires=1743668353\u0026Signature=AEItwNZFSiUHiXa~zgGDRuhKL5Kkx2gLJiDKvWXBgcfBA8F8xa0eDRfEq508IRyULGASVQ1sEZ0p5QY5iEUs5RtkAbCvkTxMmtJon2xpPrDzbjYlpls6yOnbP35cShG5scuf9H0i~aqxpDqAJi1OdBhbYYnB7xgIa7Vm~sYwuZrc4bUFoIbgtruJh-6iybIIN3h326gg2ho6eZkUhE-p1a4FC11sXmAUo82WQkMdqTAeByAw5wTrlFiz-qPi~7IEgqA5XcdhckcjxhWZeR9Y89t1iSWq6CJATGM3TtXdtJ7pRARWOpJPT2v3SUFwVmlgV5pzbdDnzshv3ehoQiXMgw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Making_sense_of_diversity_and_reluctance_academic_industrial_relations_and_intellectual_property","translated_slug":"","page_count":18,"language":"en","content_type":"Work","summary":"The commercialisation of the public sector research base, and in particular academic research, has been a continuing preoccupation among policy makers around the world. Empirically, these issues are explored in the management of Ž . intellectual property in university spin-offs USOs that emerge through both informal and formal linkages with universities across three sectors. The paper utilises a recently developed methodology to map knowledge flows as well as linkages between organisations. This enables us to examine the exchange of knowledge in commercial and academic networks and the implications of changes in the sponsorship, ownership, and proprietary status of knowledge for these patterns of exchange. It is argued that some of the most important points of tension between universities and the firms studied derive from misconceptions in the value of intellectual property rights. q 0048-7333r99r$ -see front matter q 1999 Elsevier Science B.V. All rights reserved.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":40965438,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/40965438/thumbnails/1.jpg","file_name":"1-s2.0-S0048733399000281-main.pdf","download_url":"https://www.academia.edu/attachments/40965438/download_file","bulk_download_file_name":"Making_sense_of_diversity_and_reluctance.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/40965438/1-s2.0-S0048733399000281-main-libre.pdf?1451984898=\u0026response-content-disposition=attachment%3B+filename%3DMaking_sense_of_diversity_and_reluctance.pdf\u0026Expires=1743668353\u0026Signature=AEItwNZFSiUHiXa~zgGDRuhKL5Kkx2gLJiDKvWXBgcfBA8F8xa0eDRfEq508IRyULGASVQ1sEZ0p5QY5iEUs5RtkAbCvkTxMmtJon2xpPrDzbjYlpls6yOnbP35cShG5scuf9H0i~aqxpDqAJi1OdBhbYYnB7xgIa7Vm~sYwuZrc4bUFoIbgtruJh-6iybIIN3h326gg2ho6eZkUhE-p1a4FC11sXmAUo82WQkMdqTAeByAw5wTrlFiz-qPi~7IEgqA5XcdhckcjxhWZeR9Y89t1iSWq6CJATGM3TtXdtJ7pRARWOpJPT2v3SUFwVmlgV5pzbdDnzshv3ehoQiXMgw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":967,"name":"Intellectual Property","url":"https://www.academia.edu/Documents/in/Intellectual_Property"},{"id":3357,"name":"Industrial Relations","url":"https://www.academia.edu/Documents/in/Industrial_Relations"},{"id":5547,"name":"Policy","url":"https://www.academia.edu/Documents/in/Policy"},{"id":16457,"name":"Public sector","url":"https://www.academia.edu/Documents/in/Public_sector"},{"id":73149,"name":"Business and Management","url":"https://www.academia.edu/Documents/in/Business_and_Management"},{"id":264195,"name":"Intellectual Property Right","url":"https://www.academia.edu/Documents/in/Intellectual_Property_Right"},{"id":316273,"name":"Development Methodology","url":"https://www.academia.edu/Documents/in/Development_Methodology"},{"id":488304,"name":"Academic Spin Offs","url":"https://www.academia.edu/Documents/in/Academic_Spin_Offs"},{"id":1473542,"name":"Knowledge Flow","url":"https://www.academia.edu/Documents/in/Knowledge_Flow"},{"id":1745949,"name":"Innovation","url":"https://www.academia.edu/Documents/in/Innovation-61"}],"urls":[{"id":1546734,"url":"http://www.sciencedirect.com/science/article/pii/S0048733399000281"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404737-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404739"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4404739/Regimes_of_ordering_the_commercialization_of_intellectual_property_in_industrial_academic_collaborations"><img alt="Research paper thumbnail of Regimes of ordering: the commercialization of intellectual property in industrial-academic collaborations" class="work-thumbnail" src="https://attachments.academia-assets.com/49878097/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4404739/Regimes_of_ordering_the_commercialization_of_intellectual_property_in_industrial_academic_collaborations">Regimes of ordering: the commercialization of intellectual property in industrial-academic collaborations</a></div><div class="wp-workCard_item"><span>Technology Analysis & Strategic Management</span><span>, 1997</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">This paper examines a diversity of regulatory mechanisms and negotiation processes involved in at...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">This paper examines a diversity of regulatory mechanisms and negotiation processes involved in attempts to commercialise university research which provide direct and indirect means of linking the activities of individuals and organisations in the acquisition and exchange of commodified goods. The key question addressed is how is an activity that is always uncertain --the production of knowledge --'packaged' by intellectual property management and intellectual property rights so that it is controllable, commodifiable, and enters into exchange relationships. This paper addresses the acquisition and stabilisation of proprietary claims to knowledge between public and private organisations by considering a detailed case of a university spin-off and in doing so raises a number of more general issues about the translation of knowledge.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="04b0ab793a6f33dbaf3f4bfda52190af" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":49878097,"asset_id":4404739,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/49878097/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404739"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404739"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404739; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404739]").text(description); $(".js-view-count[data-work-id=4404739]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404739; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404739']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "04b0ab793a6f33dbaf3f4bfda52190af" } } $('.js-work-strip[data-work-id=4404739]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404739,"title":"Regimes of ordering: the commercialization of intellectual property in industrial-academic collaborations","translated_title":"","metadata":{"ai_title_tag":"Commercializing University Research: IP Dynamics","grobid_abstract":"This paper examines a diversity of regulatory mechanisms and negotiation processes involved in attempts to commercialise university research which provide direct and indirect means of linking the activities of individuals and organisations in the acquisition and exchange of commodified goods. The key question addressed is how is an activity that is always uncertain --the production of knowledge --'packaged' by intellectual property management and intellectual property rights so that it is controllable, commodifiable, and enters into exchange relationships. This paper addresses the acquisition and stabilisation of proprietary claims to knowledge between public and private organisations by considering a detailed case of a university spin-off and in doing so raises a number of more general issues about the translation of knowledge.","publication_date":{"day":null,"month":null,"year":1997,"errors":{}},"publication_name":"Technology Analysis \u0026 Strategic Management","grobid_abstract_attachment_id":49878097},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404739/Regimes_of_ordering_the_commercialization_of_intellectual_property_in_industrial_academic_collaborations","translated_internal_url":"","created_at":"2013-09-04T01:26:17.579-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":49878097,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/49878097/thumbnails/1.jpg","file_name":"Regimes_of_ordering_The_commercializatio20161026-27102-146fwad.pdf","download_url":"https://www.academia.edu/attachments/49878097/download_file","bulk_download_file_name":"Regimes_of_ordering_the_commercializatio.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/49878097/Regimes_of_ordering_The_commercializatio20161026-27102-146fwad-libre.pdf?1477475901=\u0026response-content-disposition=attachment%3B+filename%3DRegimes_of_ordering_the_commercializatio.pdf\u0026Expires=1743668353\u0026Signature=GbXrwvqpUTIdnPsjldtXjcTWDIOPOrMWL-bZxz0Cny1CXb4l56joTUomqLRAjgtQkagnemf4xx1cr9A0Dg-ie6UjaGsu49Ac55VG6L2MoPjMUtB6C4FxabjRLZxKcCk5c5RBpvuLp5xb0m3Rh4MsExRCT50F0dQssNkf7xdOnSJViiUbUkYzPF~DImyPVJ7719qy1zGV5G7td68oDXw650QvgZa5V8m4MsVl9EDoHxLvVD7Ftjg4aLpHJ9u6KqWcxrGS6xA1Bu6JRXiABNXbr2XWElyXp06CwBJ3OE6Ky52MH4qOWqDphJB376owbCr9DAsz0J~i4ssjnLd7QwSvlQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Regimes_of_ordering_the_commercialization_of_intellectual_property_in_industrial_academic_collaborations","translated_slug":"","page_count":13,"language":"en","content_type":"Work","summary":"This paper examines a diversity of regulatory mechanisms and negotiation processes involved in attempts to commercialise university research which provide direct and indirect means of linking the activities of individuals and organisations in the acquisition and exchange of commodified goods. The key question addressed is how is an activity that is always uncertain --the production of knowledge --'packaged' by intellectual property management and intellectual property rights so that it is controllable, commodifiable, and enters into exchange relationships. This paper addresses the acquisition and stabilisation of proprietary claims to knowledge between public and private organisations by considering a detailed case of a university spin-off and in doing so raises a number of more general issues about the translation of knowledge.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":49878097,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/49878097/thumbnails/1.jpg","file_name":"Regimes_of_ordering_The_commercializatio20161026-27102-146fwad.pdf","download_url":"https://www.academia.edu/attachments/49878097/download_file","bulk_download_file_name":"Regimes_of_ordering_the_commercializatio.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/49878097/Regimes_of_ordering_The_commercializatio20161026-27102-146fwad-libre.pdf?1477475901=\u0026response-content-disposition=attachment%3B+filename%3DRegimes_of_ordering_the_commercializatio.pdf\u0026Expires=1743668353\u0026Signature=GbXrwvqpUTIdnPsjldtXjcTWDIOPOrMWL-bZxz0Cny1CXb4l56joTUomqLRAjgtQkagnemf4xx1cr9A0Dg-ie6UjaGsu49Ac55VG6L2MoPjMUtB6C4FxabjRLZxKcCk5c5RBpvuLp5xb0m3Rh4MsExRCT50F0dQssNkf7xdOnSJViiUbUkYzPF~DImyPVJ7719qy1zGV5G7td68oDXw650QvgZa5V8m4MsVl9EDoHxLvVD7Ftjg4aLpHJ9u6KqWcxrGS6xA1Bu6JRXiABNXbr2XWElyXp06CwBJ3OE6Ky52MH4qOWqDphJB376owbCr9DAsz0J~i4ssjnLd7QwSvlQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":967,"name":"Intellectual Property","url":"https://www.academia.edu/Documents/in/Intellectual_Property"},{"id":27659,"name":"Applied Economics","url":"https://www.academia.edu/Documents/in/Applied_Economics"},{"id":73149,"name":"Business and Management","url":"https://www.academia.edu/Documents/in/Business_and_Management"},{"id":264195,"name":"Intellectual Property Right","url":"https://www.academia.edu/Documents/in/Intellectual_Property_Right"},{"id":269854,"name":"Technology analysis \u0026 strategic management","url":"https://www.academia.edu/Documents/in/Technology_analysis_and_strategic_management"}],"urls":[{"id":1546735,"url":"http://www.york.ac.uk/res/satsu/online-papers/RappertandWebsteRegimesofordering.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404739-figures'); } }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="716200" id="armedconflict"><div class="js-work-strip profile--work_container" data-work-id="4404968"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/4404968/Enhancing_the_protection_of_civilians_from_armed_conflict_precautionary_lessons"><img alt="Research paper thumbnail of Enhancing the protection of civilians from armed conflict: precautionary lessons" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Enhancing the protection of civilians from armed conflict: precautionary lessons</div><div class="wp-workCard_item"><span>Medicine, Conflict and Survival</span><span>, 2010</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Attempts to place limits on the conduct of conflict raise many practical and political concerns. ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Attempts to place limits on the conduct of conflict raise many practical and political concerns. This article asks how debates regarding precautionary approaches to risk might inform discussions about how limits are set for armed conflict. The 2008 Convention on Cluster Munitions (CCM) provides the starting point for this analysis. While the adoption of this convention represents a major achievement in multilateral humanitarian disarmament, its provisions are open to question about their meaning. As argued, the manner in which the CCM was agreed provides an opening for embedding precautionary thinking into its future interpretation. Experiences with precautionary approaches to risk are surveyed with a view to considering what lessons they hold for the central prohibition of cluster munitions in the CCM, its novel provisions for Victim Assistance, and its possible implications for the use of explosive force. The overall goal is to ask how debates about the precautionary principle might enhance the protection of civilian populations.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404968"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404968"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404968; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404968]").text(description); $(".js-view-count[data-work-id=4404968]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404968; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404968']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=4404968]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404968,"title":"Enhancing the protection of civilians from armed conflict: precautionary lessons","translated_title":"","metadata":{"abstract":"Attempts to place limits on the conduct of conflict raise many practical and political concerns. This article asks how debates regarding precautionary approaches to risk might inform discussions about how limits are set for armed conflict. The 2008 Convention on Cluster Munitions (CCM) provides the starting point for this analysis. While the adoption of this convention represents a major achievement in multilateral humanitarian disarmament, its provisions are open to question about their meaning. As argued, the manner in which the CCM was agreed provides an opening for embedding precautionary thinking into its future interpretation. Experiences with precautionary approaches to risk are surveyed with a view to considering what lessons they hold for the central prohibition of cluster munitions in the CCM, its novel provisions for Victim Assistance, and its possible implications for the use of explosive force. The overall goal is to ask how debates about the precautionary principle might enhance the protection of civilian populations.","publication_date":{"day":null,"month":null,"year":2010,"errors":{}},"publication_name":"Medicine, Conflict and Survival"},"translated_abstract":"Attempts to place limits on the conduct of conflict raise many practical and political concerns. This article asks how debates regarding precautionary approaches to risk might inform discussions about how limits are set for armed conflict. The 2008 Convention on Cluster Munitions (CCM) provides the starting point for this analysis. While the adoption of this convention represents a major achievement in multilateral humanitarian disarmament, its provisions are open to question about their meaning. As argued, the manner in which the CCM was agreed provides an opening for embedding precautionary thinking into its future interpretation. Experiences with precautionary approaches to risk are surveyed with a view to considering what lessons they hold for the central prohibition of cluster munitions in the CCM, its novel provisions for Victim Assistance, and its possible implications for the use of explosive force. The overall goal is to ask how debates about the precautionary principle might enhance the protection of civilian populations.","internal_url":"https://www.academia.edu/4404968/Enhancing_the_protection_of_civilians_from_armed_conflict_precautionary_lessons","translated_internal_url":"","created_at":"2013-09-04T01:49:04.501-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"Enhancing_the_protection_of_civilians_from_armed_conflict_precautionary_lessons","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"Attempts to place limits on the conduct of conflict raise many practical and political concerns. This article asks how debates regarding precautionary approaches to risk might inform discussions about how limits are set for armed conflict. The 2008 Convention on Cluster Munitions (CCM) provides the starting point for this analysis. While the adoption of this convention represents a major achievement in multilateral humanitarian disarmament, its provisions are open to question about their meaning. As argued, the manner in which the CCM was agreed provides an opening for embedding precautionary thinking into its future interpretation. Experiences with precautionary approaches to risk are surveyed with a view to considering what lessons they hold for the central prohibition of cluster munitions in the CCM, its novel provisions for Victim Assistance, and its possible implications for the use of explosive force. The overall goal is to ask how debates about the precautionary principle might enhance the protection of civilian populations.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":1697,"name":"Violence","url":"https://www.academia.edu/Documents/in/Violence"},{"id":8207,"name":"Risk","url":"https://www.academia.edu/Documents/in/Risk"},{"id":11665,"name":"International Humanitarian Law","url":"https://www.academia.edu/Documents/in/International_Humanitarian_Law"},{"id":12054,"name":"International Cooperation","url":"https://www.academia.edu/Documents/in/International_Cooperation"},{"id":12939,"name":"Armed Conflict","url":"https://www.academia.edu/Documents/in/Armed_Conflict"},{"id":14835,"name":"Altruism","url":"https://www.academia.edu/Documents/in/Altruism"},{"id":22182,"name":"Precautionary Principle","url":"https://www.academia.edu/Documents/in/Precautionary_Principle"},{"id":41861,"name":"War","url":"https://www.academia.edu/Documents/in/War"},{"id":54279,"name":"Policy making","url":"https://www.academia.edu/Documents/in/Policy_making"},{"id":61603,"name":"Uncertainty","url":"https://www.academia.edu/Documents/in/Uncertainty"},{"id":70307,"name":"Weapons","url":"https://www.academia.edu/Documents/in/Weapons"},{"id":165279,"name":"Relief Work","url":"https://www.academia.edu/Documents/in/Relief_Work"},{"id":167992,"name":"Cluster Munitions","url":"https://www.academia.edu/Documents/in/Cluster_Munitions"},{"id":334667,"name":"Protection of Civilians in Armed Conflict","url":"https://www.academia.edu/Documents/in/Protection_of_Civilians_in_Armed_Conflict"}],"urls":[{"id":1546825,"url":"http://www.informaworld.com/openurl?genre=article\u0026doi=10.1080/13623690903553228\u0026magic=crossref%7C%7CD404A21C5BB053405B1A640AFFD44AE3"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404968-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404856"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4404856/The_Roles_of_Civil_Society_in_the_Development_of_Standards_around_New_Weapons_and_other_Technologies_of_Warfare"><img alt="Research paper thumbnail of The Roles of Civil Society in the Development of Standards around New Weapons and other Technologies of Warfare" class="work-thumbnail" src="https://attachments.academia-assets.com/34287374/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4404856/The_Roles_of_Civil_Society_in_the_Development_of_Standards_around_New_Weapons_and_other_Technologies_of_Warfare">The Roles of Civil Society in the Development of Standards around New Weapons and other Technologies of Warfare</a></div><div class="wp-workCard_item"><span>International Review of the Red Cross </span><span>, 2012</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="aae1dd7cb0bf9cb39d0b733f02779dae" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":34287374,"asset_id":4404856,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/34287374/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404856"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404856"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404856; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404856]").text(description); $(".js-view-count[data-work-id=4404856]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404856; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404856']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "aae1dd7cb0bf9cb39d0b733f02779dae" } } $('.js-work-strip[data-work-id=4404856]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404856,"title":"The Roles of Civil Society in the Development of Standards around New Weapons and other Technologies of Warfare","translated_title":"","metadata":{"ai_abstract":"The article explores the complex role of civil society in shaping standards for new weapons and warfare technologies, emphasizing the balance between military necessity and humanitarian concerns as prescribed by international humanitarian law (IHL). It critiques the limitations of IHL and discusses the challenges in regulating weapon technologies, highlighting the influence of political, moral, and technical factors in defining legitimacy. The discussion is framed within recent interpretations of legal frameworks for weapon use, suggesting the need for a more proactive review and consideration of anticipated uses beyond traditional norms.","publication_date":{"day":null,"month":null,"year":2012,"errors":{}},"publication_name":"International Review of the Red Cross "},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404856/The_Roles_of_Civil_Society_in_the_Development_of_Standards_around_New_Weapons_and_other_Technologies_of_Warfare","translated_internal_url":"","created_at":"2013-09-04T01:42:24.751-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":34287374,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/34287374/thumbnails/1.jpg","file_name":"irrc-886-rappert-moyes-crowe-nash.pdf","download_url":"https://www.academia.edu/attachments/34287374/download_file","bulk_download_file_name":"The_Roles_of_Civil_Society_in_the_Develo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/34287374/irrc-886-rappert-moyes-crowe-nash-libre.pdf?1406270104=\u0026response-content-disposition=attachment%3B+filename%3DThe_Roles_of_Civil_Society_in_the_Develo.pdf\u0026Expires=1743668353\u0026Signature=MMF9V~hcCvv5SY3cBvBLqttrve~ZZsQPXqrCp49utRNazXdnf1tAQBtpv~ul0DBLfh9nU-5zGIRxGC6dM7Q3NsH~Utk2Rx9tgJtvySdDxL5LJ7BX-OlpEKqOyjZ669PtLDyY35GMEqZ9R76H1Nlfae1aolhFDAKl4UUFAACR5QAOdXI1M6JuWG4i6IzNs-NiOQgNsDJEUYUEQVPqv6Ve5RpG0GQ48Dz00ue5Kigxk1VoNmFn-PbHGA1W03iT-ca4LxAbSt6Ghe9vp7faozV3sV6JWyRk3m0VviRyqFnCGGAhQoBXPBJSw0wkm5YToUYzRILWceoG3O5iWk1xfBE2Lw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"The_Roles_of_Civil_Society_in_the_Development_of_Standards_around_New_Weapons_and_other_Technologies_of_Warfare","translated_slug":"","page_count":21,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":34287374,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/34287374/thumbnails/1.jpg","file_name":"irrc-886-rappert-moyes-crowe-nash.pdf","download_url":"https://www.academia.edu/attachments/34287374/download_file","bulk_download_file_name":"The_Roles_of_Civil_Society_in_the_Develo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/34287374/irrc-886-rappert-moyes-crowe-nash-libre.pdf?1406270104=\u0026response-content-disposition=attachment%3B+filename%3DThe_Roles_of_Civil_Society_in_the_Develo.pdf\u0026Expires=1743668353\u0026Signature=MMF9V~hcCvv5SY3cBvBLqttrve~ZZsQPXqrCp49utRNazXdnf1tAQBtpv~ul0DBLfh9nU-5zGIRxGC6dM7Q3NsH~Utk2Rx9tgJtvySdDxL5LJ7BX-OlpEKqOyjZ669PtLDyY35GMEqZ9R76H1Nlfae1aolhFDAKl4UUFAACR5QAOdXI1M6JuWG4i6IzNs-NiOQgNsDJEUYUEQVPqv6Ve5RpG0GQ48Dz00ue5Kigxk1VoNmFn-PbHGA1W03iT-ca4LxAbSt6Ghe9vp7faozV3sV6JWyRk3m0VviRyqFnCGGAhQoBXPBJSw0wkm5YToUYzRILWceoG3O5iWk1xfBE2Lw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":34287373,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/34287373/thumbnails/1.jpg","file_name":"irrc-886-rappert-moyes-crowe-nash.pdf","download_url":"https://www.academia.edu/attachments/34287373/download_file","bulk_download_file_name":"The_Roles_of_Civil_Society_in_the_Develo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/34287373/irrc-886-rappert-moyes-crowe-nash-libre.pdf?1406270095=\u0026response-content-disposition=attachment%3B+filename%3DThe_Roles_of_Civil_Society_in_the_Develo.pdf\u0026Expires=1743668353\u0026Signature=LwfNCDOVdS4xe8~E6Pjo0JbMF5jR-YNBzII7~7QLOypTYwFZ-iryp8tV3tN2WGfHO8zi5RjXpHKjYFqt-bG8tRnomUlfH6sHhaYBemSGuBNbcs1BVsaIbT4sgewr1hA2pWjbtjSqLbPUvMDYzmu4gdvpljW2t~fjqCv0Ou8NLwRCQdJL8s--nSPjNbOlL0fF~DV0V~8t3RZj3WOAgI-YVVb3wiqIsDSqiIA9y0yd6n3fmxTV~NSe7ufa50tSOK7UtovpXe5PowrfydCcaJ4RJKEKOmxiAvr4Z793psWkBqMGYkluDbGw4G2KAswP8MgjHhSJPF9eekbPvYkwGxDEMQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[{"id":3240641,"url":"http://www.icrc.org/eng/assets/files/review/2012/irrc-886-rappert-moyes-crowe-nash.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404856-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404880"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/4404880/Enhancing_the_protection_of_civilians_from_armed_conflict_precautionary_lessons"><img alt="Research paper thumbnail of Enhancing the protection of civilians from armed conflict: precautionary lessons" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Enhancing the protection of civilians from armed conflict: precautionary lessons</div><div class="wp-workCard_item"><span>Medicine, Conflict and Survival</span><span>, 2010</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404880"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404880"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404880; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404880]").text(description); $(".js-view-count[data-work-id=4404880]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404880; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404880']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=4404880]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404880,"title":"Enhancing the protection of civilians from armed conflict: precautionary lessons","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2010,"errors":{}},"publication_name":"Medicine, Conflict and Survival"},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404880/Enhancing_the_protection_of_civilians_from_armed_conflict_precautionary_lessons","translated_internal_url":"","created_at":"2013-09-04T01:44:23.147-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"Enhancing_the_protection_of_civilians_from_armed_conflict_precautionary_lessons","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[],"urls":[{"id":1546792,"url":"http://www.tandfonline.com/doi/abs/10.1080/13623690903553228#.UidUANJgRy0"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404880-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404961"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/4404961/THE_PROHIBITION_OF_CLUSTER_MUNITIONS"><img alt="Research paper thumbnail of THE PROHIBITION OF CLUSTER MUNITIONS" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">THE PROHIBITION OF CLUSTER MUNITIONS</div><div class="wp-workCard_item"><span>The Nonproliferation Review</span><span>, 2009</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404961"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404961"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404961; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404961]").text(description); $(".js-view-count[data-work-id=4404961]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404961; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404961']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=4404961]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404961,"title":"THE PROHIBITION OF CLUSTER MUNITIONS","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2009,"errors":{}},"publication_name":"The Nonproliferation Review"},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404961/THE_PROHIBITION_OF_CLUSTER_MUNITIONS","translated_internal_url":"","created_at":"2013-09-04T01:48:53.969-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"THE_PROHIBITION_OF_CLUSTER_MUNITIONS","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"}],"urls":[{"id":1546819,"url":"http://www.informaworld.com/openurl?genre=article\u0026doi=10.1080/10736700902969687\u0026magic=crossref%7C%7CD404A21C5BB053405B1A640AFFD44AE3"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404961-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404979"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/4404979/Prohibitions_Weapons_and_Controversy_Managing_the_Problems_of_Ordering"><img alt="Research paper thumbnail of Prohibitions, Weapons and Controversy:: Managing the Problems of Ordering" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Prohibitions, Weapons and Controversy:: Managing the Problems of Ordering</div><div class="wp-workCard_item"><span>Social Studies of Science</span><span>, 2005</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404979"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404979"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404979; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404979]").text(description); $(".js-view-count[data-work-id=4404979]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404979; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404979']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=4404979]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404979,"title":"Prohibitions, Weapons and Controversy:: Managing the Problems of Ordering","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2005,"errors":{}},"publication_name":"Social Studies of Science"},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404979/Prohibitions_Weapons_and_Controversy_Managing_the_Problems_of_Ordering","translated_internal_url":"","created_at":"2013-09-04T01:49:18.885-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"Prohibitions_Weapons_and_Controversy_Managing_the_Problems_of_Ordering","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":4508,"name":"Biological Weapons","url":"https://www.academia.edu/Documents/in/Biological_Weapons"},{"id":21500,"name":"Social Studies Of Science","url":"https://www.academia.edu/Documents/in/Social_Studies_Of_Science"}],"urls":[{"id":1546833,"url":"http://sss.sagepub.com/cgi/doi/10.1177/0306312705046629"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404979-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404984"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4404984/On_the_Mid_Range_An_Exercise_in_Disposing_or_Minding_the_Gaps"><img alt="Research paper thumbnail of On the Mid Range: An Exercise in Disposing (or Minding the Gaps" class="work-thumbnail" src="https://attachments.academia-assets.com/31832417/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4404984/On_the_Mid_Range_An_Exercise_in_Disposing_or_Minding_the_Gaps">On the Mid Range: An Exercise in Disposing (or Minding the Gaps</a></div><div class="wp-workCard_item"><span>Science Technology & Human Values</span><span>, 2007</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Many efforts to establish concepts and theories of the middle range have sought to find an approp...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Many efforts to establish concepts and theories of the middle range have sought to find an appropriate balance between theoretical abstraction and the desire to remain faithful to the empirical complexity of phenomenon. As with other forms of expertise, those analyzing sociotechnical life face acute tensions in attempting to reconcile the general and the specific in a manner which is regarded as credible. Through a consideration of the self-referential implications of STS critiques of traditional notions of science as well as attempts to establish rules for the acceptability of physical force, this article develops a sense of what is at stake in attempts by actors and analysts to grasp the general and the specific together. Instead of seeking to identify a point of resolution for the two, it advocates and exemplifies the need to attend to the dilemmas associated with the movement between the general and the specific. The middle range concept of 'disposal strategies' is offered both as an aid to the study of socio-technical life and as an example of attending to the movement between the general and specific.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="d33d2f0974000f8eb5b1399ec774a383" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":31832417,"asset_id":4404984,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/31832417/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404984"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404984"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404984; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404984]").text(description); $(".js-view-count[data-work-id=4404984]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404984; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404984']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "d33d2f0974000f8eb5b1399ec774a383" } } $('.js-work-strip[data-work-id=4404984]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404984,"title":"On the Mid Range: An Exercise in Disposing (or Minding the Gaps","translated_title":"","metadata":{"grobid_abstract":"Many efforts to establish concepts and theories of the middle range have sought to find an appropriate balance between theoretical abstraction and the desire to remain faithful to the empirical complexity of phenomenon. As with other forms of expertise, those analyzing sociotechnical life face acute tensions in attempting to reconcile the general and the specific in a manner which is regarded as credible. Through a consideration of the self-referential implications of STS critiques of traditional notions of science as well as attempts to establish rules for the acceptability of physical force, this article develops a sense of what is at stake in attempts by actors and analysts to grasp the general and the specific together. Instead of seeking to identify a point of resolution for the two, it advocates and exemplifies the need to attend to the dilemmas associated with the movement between the general and the specific. The middle range concept of 'disposal strategies' is offered both as an aid to the study of socio-technical life and as an example of attending to the movement between the general and specific.","publication_date":{"day":null,"month":null,"year":2007,"errors":{}},"publication_name":"Science Technology \u0026 Human Values","grobid_abstract_attachment_id":31832417},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404984/On_the_Mid_Range_An_Exercise_in_Disposing_or_Minding_the_Gaps","translated_internal_url":"","created_at":"2013-09-04T01:49:33.146-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":31832417,"title":"","file_type":"doc","scribd_thumbnail_url":"https://attachments.academia-assets.com/31832417/thumbnails/1.jpg","file_name":"ST_HV_-_Rappert.doc","download_url":"https://www.academia.edu/attachments/31832417/download_file","bulk_download_file_name":"On_the_Mid_Range_An_Exercise_in_Disposin.doc","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/31832417/ST_HV_-_Rappert.doc?1738087128=\u0026response-content-disposition=attachment%3B+filename%3DOn_the_Mid_Range_An_Exercise_in_Disposin.doc\u0026Expires=1743668353\u0026Signature=EPYsUgRv8329dfZjd3Puj6mSWAjda80wL02e5vWbLco0HiX5PV~3zjNH4-ZV~LtbspsQLjFgujS6O9-mRRsMk6IDMJCrqjm2aZkIf47AhFVsoTsxfmb8v4JGLL~4JnkAkU7DsShRqBR3hjAc5gT4in91ek7Ap3YXE8TcJa2efSZlv~OVcWoQEng99~olz01-oD445eaRzD8PIRCpd~N8Qs5QsMVGNvxYPYFJvQwKBcqwst2KoX0MMHxxxE~wgcj~ci6gqRZm~sMjfneq95eXwzS~iuYwxgYo3d1-pIhOTMCL2wVt~zJU8CdMvtAaLuovDHW5p1qnXBjAgmQK1Wi2LA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"On_the_Mid_Range_An_Exercise_in_Disposing_or_Minding_the_Gaps","translated_slug":"","page_count":22,"language":"en","content_type":"Work","summary":"Many efforts to establish concepts and theories of the middle range have sought to find an appropriate balance between theoretical abstraction and the desire to remain faithful to the empirical complexity of phenomenon. As with other forms of expertise, those analyzing sociotechnical life face acute tensions in attempting to reconcile the general and the specific in a manner which is regarded as credible. Through a consideration of the self-referential implications of STS critiques of traditional notions of science as well as attempts to establish rules for the acceptability of physical force, this article develops a sense of what is at stake in attempts by actors and analysts to grasp the general and the specific together. Instead of seeking to identify a point of resolution for the two, it advocates and exemplifies the need to attend to the dilemmas associated with the movement between the general and the specific. The middle range concept of 'disposal strategies' is offered both as an aid to the study of socio-technical life and as an example of attending to the movement between the general and specific.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":31832417,"title":"","file_type":"doc","scribd_thumbnail_url":"https://attachments.academia-assets.com/31832417/thumbnails/1.jpg","file_name":"ST_HV_-_Rappert.doc","download_url":"https://www.academia.edu/attachments/31832417/download_file","bulk_download_file_name":"On_the_Mid_Range_An_Exercise_in_Disposin.doc","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/31832417/ST_HV_-_Rappert.doc?1738087128=\u0026response-content-disposition=attachment%3B+filename%3DOn_the_Mid_Range_An_Exercise_in_Disposin.doc\u0026Expires=1743668353\u0026Signature=EPYsUgRv8329dfZjd3Puj6mSWAjda80wL02e5vWbLco0HiX5PV~3zjNH4-ZV~LtbspsQLjFgujS6O9-mRRsMk6IDMJCrqjm2aZkIf47AhFVsoTsxfmb8v4JGLL~4JnkAkU7DsShRqBR3hjAc5gT4in91ek7Ap3YXE8TcJa2efSZlv~OVcWoQEng99~olz01-oD445eaRzD8PIRCpd~N8Qs5QsMVGNvxYPYFJvQwKBcqwst2KoX0MMHxxxE~wgcj~ci6gqRZm~sMjfneq95eXwzS~iuYwxgYo3d1-pIhOTMCL2wVt~zJU8CdMvtAaLuovDHW5p1qnXBjAgmQK1Wi2LA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology"},{"id":410370,"name":"Public health systems and services research","url":"https://www.academia.edu/Documents/in/Public_health_systems_and_services_research-1"}],"urls":[{"id":1546837,"url":"http://eric.ex.ac.uk/exeter/bitstream/10036/31356/1/STHV%2520-%2520Rappert.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404984-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404991"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/4404991/The_case_for_addressing_explosive_weapons_conflict_violence_and_health"><img alt="Research paper thumbnail of The case for addressing explosive weapons: conflict, violence and health" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">The case for addressing explosive weapons: conflict, violence and health</div><div class="wp-workCard_item"><span>Social science & medicine (1982)</span><span>, 2012</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">In recent years, states and non-governmental organizations have expressed concern about the human...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">In recent years, states and non-governmental organizations have expressed concern about the humanitarian consequences of the category of technologies labelled &amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;explosive weapons&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;, particularly in relation to their use in populated areas. This article seeks to outline the magnitude of these consequences as well as what can be done to reduce harms. In particular, it makes a case for how health approaches could help prevent the harms associated with this category of weapons. Attention is given to the types of evidence and argument that might be required to characterize explosive weapons. An overarching aim is to consider how alternative ways of understanding weapons and violence can create new opportunities for addressing harms from conflict.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404991"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404991"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404991; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404991]").text(description); $(".js-view-count[data-work-id=4404991]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404991; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404991']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=4404991]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404991,"title":"The case for addressing explosive weapons: conflict, violence and health","translated_title":"","metadata":{"abstract":"In recent years, states and non-governmental organizations have expressed concern about the humanitarian consequences of the category of technologies labelled \u0026amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;explosive weapons\u0026amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;, particularly in relation to their use in populated areas. This article seeks to outline the magnitude of these consequences as well as what can be done to reduce harms. In particular, it makes a case for how health approaches could help prevent the harms associated with this category of weapons. Attention is given to the types of evidence and argument that might be required to characterize explosive weapons. An overarching aim is to consider how alternative ways of understanding weapons and violence can create new opportunities for addressing harms from conflict.","publisher":"ncbi.nlm.nih.gov","publication_date":{"day":null,"month":null,"year":2012,"errors":{}},"publication_name":"Social science \u0026 medicine (1982)"},"translated_abstract":"In recent years, states and non-governmental organizations have expressed concern about the humanitarian consequences of the category of technologies labelled \u0026amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;explosive weapons\u0026amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;, particularly in relation to their use in populated areas. This article seeks to outline the magnitude of these consequences as well as what can be done to reduce harms. In particular, it makes a case for how health approaches could help prevent the harms associated with this category of weapons. Attention is given to the types of evidence and argument that might be required to characterize explosive weapons. An overarching aim is to consider how alternative ways of understanding weapons and violence can create new opportunities for addressing harms from conflict.","internal_url":"https://www.academia.edu/4404991/The_case_for_addressing_explosive_weapons_conflict_violence_and_health","translated_internal_url":"","created_at":"2013-09-04T01:50:28.266-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"The_case_for_addressing_explosive_weapons_conflict_violence_and_health","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"In recent years, states and non-governmental organizations have expressed concern about the humanitarian consequences of the category of technologies labelled \u0026amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;explosive weapons\u0026amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;, particularly in relation to their use in populated areas. This article seeks to outline the magnitude of these consequences as well as what can be done to reduce harms. In particular, it makes a case for how health approaches could help prevent the harms associated with this category of weapons. Attention is given to the types of evidence and argument that might be required to characterize explosive weapons. An overarching aim is to consider how alternative ways of understanding weapons and violence can create new opportunities for addressing harms from conflict.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology"},{"id":767,"name":"Anthropology","url":"https://www.academia.edu/Documents/in/Anthropology"},{"id":1697,"name":"Violence","url":"https://www.academia.edu/Documents/in/Violence"},{"id":14835,"name":"Altruism","url":"https://www.academia.edu/Documents/in/Altruism"},{"id":16288,"name":"Public Health","url":"https://www.academia.edu/Documents/in/Public_Health"},{"id":41861,"name":"War","url":"https://www.academia.edu/Documents/in/War"},{"id":48423,"name":"Social Science \u0026 Medicine","url":"https://www.academia.edu/Documents/in/Social_Science_and_Medicine"},{"id":70307,"name":"Weapons","url":"https://www.academia.edu/Documents/in/Weapons"},{"id":162645,"name":"Population Density","url":"https://www.academia.edu/Documents/in/Population_Density"},{"id":410370,"name":"Public health systems and services research","url":"https://www.academia.edu/Documents/in/Public_health_systems_and_services_research-1"},{"id":1031658,"name":"Wounds and Injuries","url":"https://www.academia.edu/Documents/in/Wounds_and_Injuries"},{"id":1427100,"name":"Explosive Weapons","url":"https://www.academia.edu/Documents/in/Explosive_Weapons"}],"urls":[{"id":1546842,"url":"http://dx.doi.org/10.1016/j.socscimed.2012.08.003"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404991-figures'); } }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="716202" id="genetics"><div class="js-work-strip profile--work_container" data-work-id="4404972"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/4404972/Putting_the_future_in_its_place_Comparing_innovation_moments_in_genetic_diagnostics_and_telemedicine"><img alt="Research paper thumbnail of Putting the future in its place: Comparing innovation moments in genetic diagnostics and telemedicine" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Putting the future in its place: Comparing innovation moments in genetic diagnostics and telemedicine</div><div class="wp-workCard_item"><span>New Genetics and Society</span><span>, 2000</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">ABSTRACT Health care professionals today struggle to establish strategic directions for the futur...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">ABSTRACT Health care professionals today struggle to establish strategic directions for the future, in part because of the continuing uncertainties engendered by innovations in the diagnosis and treatment of disease. Emerging technologies such as genetics and information ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404972"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404972"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404972; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404972]").text(description); $(".js-view-count[data-work-id=4404972]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404972; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404972']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=4404972]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404972,"title":"Putting the future in its place: Comparing innovation moments in genetic diagnostics and telemedicine","translated_title":"","metadata":{"abstract":"ABSTRACT Health care professionals today struggle to establish strategic directions for the future, in part because of the continuing uncertainties engendered by innovations in the diagnosis and treatment of disease. Emerging technologies such as genetics and information ...","publication_date":{"day":null,"month":null,"year":2000,"errors":{}},"publication_name":"New Genetics and Society"},"translated_abstract":"ABSTRACT Health care professionals today struggle to establish strategic directions for the future, in part because of the continuing uncertainties engendered by innovations in the diagnosis and treatment of disease. Emerging technologies such as genetics and information ...","internal_url":"https://www.academia.edu/4404972/Putting_the_future_in_its_place_Comparing_innovation_moments_in_genetic_diagnostics_and_telemedicine","translated_internal_url":"","created_at":"2013-09-04T01:49:08.039-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"Putting_the_future_in_its_place_Comparing_innovation_moments_in_genetic_diagnostics_and_telemedicine","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"ABSTRACT Health care professionals today struggle to establish strategic directions for the future, in part because of the continuing uncertainties engendered by innovations in the diagnosis and treatment of disease. Emerging technologies such as genetics and information ...","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":156,"name":"Genetics","url":"https://www.academia.edu/Documents/in/Genetics"},{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology"}],"urls":[{"id":1546827,"url":"http://www.informaworld.com/openurl?genre=article\u0026doi=10.1080/14636770050002955\u0026magic=crossref%7C%7CD404A21C5BB053405B1A640AFFD44AE3"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404972-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404970"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/4404970/Emerging_Bioinformatic_Networks_Contesting_the_Public_Meaning_of_Private_and_the_Private_Meaning_of_Public"><img alt="Research paper thumbnail of Emerging Bioinformatic Networks: Contesting the Public Meaning of Private and the Private Meaning of Public" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Emerging Bioinformatic Networks: Contesting the Public Meaning of Private and the Private Meaning of Public</div><div class="wp-workCard_item"><span>Prometheus</span><span>, 2000</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">This paper explores the complexity of public/private identities in the emerging global economies ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">This paper explores the complexity of public/private identities in the emerging global economies of gene sequence mapping and analysis. In so doing we seek to offer a less over-determined acccount of what it means to describe institutional actors as either &amp;amp;#x27;public&amp;amp;#x27; or &amp;amp;#x27;private&amp;amp;#x27;. ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404970"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404970"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404970; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404970]").text(description); $(".js-view-count[data-work-id=4404970]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404970; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404970']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=4404970]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404970,"title":"Emerging Bioinformatic Networks: Contesting the Public Meaning of Private and the Private Meaning of Public","translated_title":"","metadata":{"abstract":"This paper explores the complexity of public/private identities in the emerging global economies of gene sequence mapping and analysis. In so doing we seek to offer a less over-determined acccount of what it means to describe institutional actors as either \u0026amp;amp;#x27;public\u0026amp;amp;#x27; or \u0026amp;amp;#x27;private\u0026amp;amp;#x27;. ...","publication_date":{"day":null,"month":null,"year":2000,"errors":{}},"publication_name":"Prometheus"},"translated_abstract":"This paper explores the complexity of public/private identities in the emerging global economies of gene sequence mapping and analysis. In so doing we seek to offer a less over-determined acccount of what it means to describe institutional actors as either \u0026amp;amp;#x27;public\u0026amp;amp;#x27; or \u0026amp;amp;#x27;private\u0026amp;amp;#x27;. ...","internal_url":"https://www.academia.edu/4404970/Emerging_Bioinformatic_Networks_Contesting_the_Public_Meaning_of_Private_and_the_Private_Meaning_of_Public","translated_internal_url":"","created_at":"2013-09-04T01:49:05.365-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"Emerging_Bioinformatic_Networks_Contesting_the_Public_Meaning_of_Private_and_the_Private_Meaning_of_Public","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"This paper explores the complexity of public/private identities in the emerging global economies of gene sequence mapping and analysis. In so doing we seek to offer a less over-determined acccount of what it means to describe institutional actors as either \u0026amp;amp;#x27;public\u0026amp;amp;#x27; or \u0026amp;amp;#x27;private\u0026amp;amp;#x27;. ...","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":534,"name":"Law","url":"https://www.academia.edu/Documents/in/Law"},{"id":162706,"name":"Prometheus","url":"https://www.academia.edu/Documents/in/Prometheus"},{"id":168913,"name":"Human Genome Project","url":"https://www.academia.edu/Documents/in/Human_Genome_Project"},{"id":331794,"name":"Global Economy","url":"https://www.academia.edu/Documents/in/Global_Economy"},{"id":380315,"name":"Public Administration and Policy","url":"https://www.academia.edu/Documents/in/Public_Administration_and_Policy"}],"urls":[{"id":1546826,"url":"http://www.informaworld.com/openurl?genre=article\u0026doi=10.1080/08109020020008532\u0026magic=crossref%7C%7CD404A21C5BB053405B1A640AFFD44AE3"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404970-figures'); } }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="716206" id="nonlethalweapons"><div class="js-work-strip profile--work_container" data-work-id="16468458"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/16468458/Policing_Science_The_Lessons_of_Taser"><img alt="Research paper thumbnail of Policing Science: The Lessons of Taser" class="work-thumbnail" src="https://attachments.academia-assets.com/39006947/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/16468458/Policing_Science_The_Lessons_of_Taser">Policing Science: The Lessons of Taser</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated"> The introduction of the electric-shock weapon the Taser into England and Wales incorporates much...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The introduction of the electric-shock weapon the Taser into England and Wales incorporates much good practice, but also illustrates a series of broader lessons with wide-ranging implications for practitioners, social scientists and the relationship between them. In terms of the former, these include the need to: improve research design and methodologies; acknowledge what is unknown and undone; reform the basis of evidence gathering; value varied forms of expertise; and heed science when it is available. In terms of the latter, the article demonstrates the need for an appreciation of the wide range of purposes of policing research. One of the most powerful ways in which social scientists can add value is not just by contributing to the quantitative and qualitative evidence base but by critically analysing the evidence base itself, by paying careful attention to science that remains ‘undone’ and findings that remain ‘unheeded’. At a time when corporate and other vested interests are particularly vocal—and discussions are ongoing around the introduction of the next generation of Tasers into the UK--the involvement of social scientists in such discussions is not a luxury but an imperative.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="834a3058446d1d15f9445e71c35c5a47" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":39006947,"asset_id":16468458,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/39006947/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="16468458"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="16468458"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 16468458; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=16468458]").text(description); $(".js-view-count[data-work-id=16468458]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 16468458; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='16468458']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "834a3058446d1d15f9445e71c35c5a47" } } $('.js-work-strip[data-work-id=16468458]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":16468458,"title":"Policing Science: The Lessons of Taser","translated_title":"","metadata":{"abstract":" The introduction of the electric-shock weapon the Taser into England and Wales incorporates much good practice, but also illustrates a series of broader lessons with wide-ranging implications for practitioners, social scientists and the relationship between them. In terms of the former, these include the need to: improve research design and methodologies; acknowledge what is unknown and undone; reform the basis of evidence gathering; value varied forms of expertise; and heed science when it is available. In terms of the latter, the article demonstrates the need for an appreciation of the wide range of purposes of policing research. One of the most powerful ways in which social scientists can add value is not just by contributing to the quantitative and qualitative evidence base but by critically analysing the evidence base itself, by paying careful attention to science that remains ‘undone’ and findings that remain ‘unheeded’. At a time when corporate and other vested interests are particularly vocal—and discussions are ongoing around the introduction of the next generation of Tasers into the UK--the involvement of social scientists in such discussions is not a luxury but an imperative."},"translated_abstract":" The introduction of the electric-shock weapon the Taser into England and Wales incorporates much good practice, but also illustrates a series of broader lessons with wide-ranging implications for practitioners, social scientists and the relationship between them. In terms of the former, these include the need to: improve research design and methodologies; acknowledge what is unknown and undone; reform the basis of evidence gathering; value varied forms of expertise; and heed science when it is available. In terms of the latter, the article demonstrates the need for an appreciation of the wide range of purposes of policing research. One of the most powerful ways in which social scientists can add value is not just by contributing to the quantitative and qualitative evidence base but by critically analysing the evidence base itself, by paying careful attention to science that remains ‘undone’ and findings that remain ‘unheeded’. At a time when corporate and other vested interests are particularly vocal—and discussions are ongoing around the introduction of the next generation of Tasers into the UK--the involvement of social scientists in such discussions is not a luxury but an imperative.","internal_url":"https://www.academia.edu/16468458/Policing_Science_The_Lessons_of_Taser","translated_internal_url":"","created_at":"2015-10-05T01:33:45.657-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":39006947,"title":"","file_type":"doc","scribd_thumbnail_url":"https://attachments.academia-assets.com/39006947/thumbnails/1.jpg","file_name":"Police_Science_FINAL_v5_WITH_AUTHOR_DETAILS.doc","download_url":"https://www.academia.edu/attachments/39006947/download_file","bulk_download_file_name":"Policing_Science_The_Lessons_of_Taser.doc","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/39006947/Police_Science_FINAL_v5_WITH_AUTHOR_DETAILS.doc?1738238808=\u0026response-content-disposition=attachment%3B+filename%3DPolicing_Science_The_Lessons_of_Taser.doc\u0026Expires=1743668353\u0026Signature=QxLobgGBmQHS-yp9psPBwXDM~oy4CU97L7Nje5lr79BsLsuxPXrQmNCTkEtVIx9KuYcdcUkwhhlC7hThiqBbZpjgVN-miCN50maxgI0uDlSKBcJDxgcb6iNpjoAN3sWjA1m9X5xNUQJgVL4Ea80Ac8H~0zp09qy4qFNAuHNC36WV3tsW-pJ3U56NmAqJ34MNhXGeZ01a45FJNrvqpAL617qRVKgqppllCiZikLLS4F8nBXgTz4iZj6KyKRzx8aCiedWnZNqHWlzw9wyaBMfQWFARsGjpvSCEr0Cs6cBcGZobbbftRMgDOmZ9zdjZ2XEJXmH94HHDwF1BwIwla91M8A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Policing_Science_The_Lessons_of_Taser","translated_slug":"","page_count":16,"language":"en","content_type":"Work","summary":" The introduction of the electric-shock weapon the Taser into England and Wales incorporates much good practice, but also illustrates a series of broader lessons with wide-ranging implications for practitioners, social scientists and the relationship between them. In terms of the former, these include the need to: improve research design and methodologies; acknowledge what is unknown and undone; reform the basis of evidence gathering; value varied forms of expertise; and heed science when it is available. In terms of the latter, the article demonstrates the need for an appreciation of the wide range of purposes of policing research. One of the most powerful ways in which social scientists can add value is not just by contributing to the quantitative and qualitative evidence base but by critically analysing the evidence base itself, by paying careful attention to science that remains ‘undone’ and findings that remain ‘unheeded’. At a time when corporate and other vested interests are particularly vocal—and discussions are ongoing around the introduction of the next generation of Tasers into the UK--the involvement of social scientists in such discussions is not a luxury but an imperative.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":39006947,"title":"","file_type":"doc","scribd_thumbnail_url":"https://attachments.academia-assets.com/39006947/thumbnails/1.jpg","file_name":"Police_Science_FINAL_v5_WITH_AUTHOR_DETAILS.doc","download_url":"https://www.academia.edu/attachments/39006947/download_file","bulk_download_file_name":"Policing_Science_The_Lessons_of_Taser.doc","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/39006947/Police_Science_FINAL_v5_WITH_AUTHOR_DETAILS.doc?1738238808=\u0026response-content-disposition=attachment%3B+filename%3DPolicing_Science_The_Lessons_of_Taser.doc\u0026Expires=1743668353\u0026Signature=QxLobgGBmQHS-yp9psPBwXDM~oy4CU97L7Nje5lr79BsLsuxPXrQmNCTkEtVIx9KuYcdcUkwhhlC7hThiqBbZpjgVN-miCN50maxgI0uDlSKBcJDxgcb6iNpjoAN3sWjA1m9X5xNUQJgVL4Ea80Ac8H~0zp09qy4qFNAuHNC36WV3tsW-pJ3U56NmAqJ34MNhXGeZ01a45FJNrvqpAL617qRVKgqppllCiZikLLS4F8nBXgTz4iZj6KyKRzx8aCiedWnZNqHWlzw9wyaBMfQWFARsGjpvSCEr0Cs6cBcGZobbbftRMgDOmZ9zdjZ2XEJXmH94HHDwF1BwIwla91M8A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":36980,"name":"Non-Lethal Weapons","url":"https://www.academia.edu/Documents/in/Non-Lethal_Weapons"},{"id":99309,"name":"Less Lethal Weapons","url":"https://www.academia.edu/Documents/in/Less_Lethal_Weapons"},{"id":761561,"name":"Less Lethal Weapon","url":"https://www.academia.edu/Documents/in/Less_Lethal_Weapon"},{"id":1915247,"name":"TASER Electrical Weapons","url":"https://www.academia.edu/Documents/in/TASER_Electrical_Weapons"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-16468458-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404965"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/4404965/Constructions_of_Legitimate_Force_The_Case_of_CS_Sprays"><img alt="Research paper thumbnail of Constructions of Legitimate Force. The Case of CS Sprays" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Constructions of Legitimate Force. The Case of CS Sprays</div><div class="wp-workCard_item"><span>British Journal of Criminology</span><span>, 2002</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404965"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404965"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404965; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404965]").text(description); $(".js-view-count[data-work-id=4404965]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404965; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404965']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=4404965]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404965,"title":"Constructions of Legitimate Force. The Case of CS Sprays","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2002,"errors":{}},"publication_name":"British Journal of Criminology"},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404965/Constructions_of_Legitimate_Force_The_Case_of_CS_Sprays","translated_internal_url":"","created_at":"2013-09-04T01:49:00.647-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"Constructions_of_Legitimate_Force_The_Case_of_CS_Sprays","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[],"urls":[{"id":1546822,"url":"http://bjc.oupjournals.org/cgi/doi/10.1093/bjc/42.4.689"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404965-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404976"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4404976/MORALIZING_VIOLENCE_Debating_the_acceptability_of_electrical_weapons"><img alt="Research paper thumbnail of MORALIZING VIOLENCE: Debating the acceptability of electrical weapons" class="work-thumbnail" src="https://attachments.academia-assets.com/31832357/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4404976/MORALIZING_VIOLENCE_Debating_the_acceptability_of_electrical_weapons">MORALIZING VIOLENCE: Debating the acceptability of electrical weapons</a></div><div class="wp-workCard_item"><span>Science As Culture</span><span>, 2004</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="5f254acac2fce1c68b0b0fc421f83d18" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":31832357,"asset_id":4404976,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/31832357/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404976"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404976"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404976; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404976]").text(description); $(".js-view-count[data-work-id=4404976]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404976; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404976']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "5f254acac2fce1c68b0b0fc421f83d18" } } $('.js-work-strip[data-work-id=4404976]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404976,"title":"MORALIZING VIOLENCE: Debating the acceptability of electrical weapons","translated_title":"","metadata":{"ai_abstract":"This paper explores the contrasting assessments of the acceptability of technologies that deliver electrical shocks to individuals, focusing on devices such as Tasers. It examines the claims made about these technologies and the expertise utilized in establishing their acceptability or unacceptability. Through critical analysis of firsthand accounts and public commentary, the paper discusses how arguments about coercive violence are framed within societal contexts, and it highlights the roles that academics can play in these debates.","publication_date":{"day":null,"month":null,"year":2004,"errors":{}},"publication_name":"Science As Culture"},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404976/MORALIZING_VIOLENCE_Debating_the_acceptability_of_electrical_weapons","translated_internal_url":"","created_at":"2013-09-04T01:49:16.783-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":31832357,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/31832357/thumbnails/1.jpg","file_name":"CSAC_13_1_01LORES.pdf","download_url":"https://www.academia.edu/attachments/31832357/download_file","bulk_download_file_name":"MORALIZING_VIOLENCE_Debating_the_accepta.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/31832357/CSAC_13_1_01LORES-libre.pdf?1392449117=\u0026response-content-disposition=attachment%3B+filename%3DMORALIZING_VIOLENCE_Debating_the_accepta.pdf\u0026Expires=1743668353\u0026Signature=LfH0z7CPn30-u1kEVUa4elhhlU-A-A9iSCFQOfJy-mcW9q3J35zL8BrRdz9AtX59~z1xge0nRSiS4WbyyRIc6L2GAYN~XYJtsX5R7owAJ1Vn8ogumc9y1ABetGU7OJBJ5j-ipaBIkUNIW1L-qVKo4wx~31BeE~t5RimXyDGVS~DLJFg7XVIGDdhkdon3SWJm7AI8xWNI2Mi1goAgP-G7hQ~GHQa~guRn~CwktSVfLD1ylqzEGCuI3hA7Th0vNyyPgfSHYRMT3NLkqsi~-1SzG3lIa87PKq5-ipNOisM06MWQhykmlK4UruyKjvVGAabhm8AtEnrT~ItwRtbtXj~Wiw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"MORALIZING_VIOLENCE_Debating_the_acceptability_of_electrical_weapons","translated_slug":"","page_count":34,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":31832357,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/31832357/thumbnails/1.jpg","file_name":"CSAC_13_1_01LORES.pdf","download_url":"https://www.academia.edu/attachments/31832357/download_file","bulk_download_file_name":"MORALIZING_VIOLENCE_Debating_the_accepta.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/31832357/CSAC_13_1_01LORES-libre.pdf?1392449117=\u0026response-content-disposition=attachment%3B+filename%3DMORALIZING_VIOLENCE_Debating_the_accepta.pdf\u0026Expires=1743668353\u0026Signature=LfH0z7CPn30-u1kEVUa4elhhlU-A-A9iSCFQOfJy-mcW9q3J35zL8BrRdz9AtX59~z1xge0nRSiS4WbyyRIc6L2GAYN~XYJtsX5R7owAJ1Vn8ogumc9y1ABetGU7OJBJ5j-ipaBIkUNIW1L-qVKo4wx~31BeE~t5RimXyDGVS~DLJFg7XVIGDdhkdon3SWJm7AI8xWNI2Mi1goAgP-G7hQ~GHQa~guRn~CwktSVfLD1ylqzEGCuI3hA7Th0vNyyPgfSHYRMT3NLkqsi~-1SzG3lIa87PKq5-ipNOisM06MWQhykmlK4UruyKjvVGAabhm8AtEnrT~ItwRtbtXj~Wiw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology"},{"id":2454421,"name":"Science as culture","url":"https://www.academia.edu/Documents/in/Science_as_culture"}],"urls":[{"id":1546830,"url":"http://people.exeter.ac.uk/br201/Research/Non-lethalWeapons/CSAC_13_1_01LORES.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404976-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404977"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/4404977/The_Distribution_and_Resolution_of_the_Ambiguities_of_Technology_or_Why_Bobby_Cant_Spray"><img alt="Research paper thumbnail of The Distribution and Resolution of the Ambiguities of Technology, or Why Bobby Can't Spray" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">The Distribution and Resolution of the Ambiguities of Technology, or Why Bobby Can't Spray</div><div class="wp-workCard_item"><span>Social Studies of Science</span><span>, 2001</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Page 1. Social Studies of Science http://sss.sagepub.com/ The Distribution and Resolution of the ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Page 1. Social Studies of Science <a href="http://sss.sagepub.com/" rel="nofollow">http://sss.sagepub.com/</a> The Distribution and Resolution of the Ambiguities of Technology, or Why Bobby Can&#39;t Spray Brian Rappert Social Studies of Science 2001 31 : 557 DOI: 10.1177/030631201031004004 ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404977"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404977"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404977; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404977]").text(description); $(".js-view-count[data-work-id=4404977]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404977; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404977']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=4404977]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404977,"title":"The Distribution and Resolution of the Ambiguities of Technology, or Why Bobby Can't Spray","translated_title":"","metadata":{"abstract":"Page 1. Social Studies of Science http://sss.sagepub.com/ The Distribution and Resolution of the Ambiguities of Technology, or Why Bobby Can\u0026#39;t Spray Brian Rappert Social Studies of Science 2001 31 : 557 DOI: 10.1177/030631201031004004 ...","publication_date":{"day":null,"month":null,"year":2001,"errors":{}},"publication_name":"Social Studies of Science"},"translated_abstract":"Page 1. Social Studies of Science http://sss.sagepub.com/ The Distribution and Resolution of the Ambiguities of Technology, or Why Bobby Can\u0026#39;t Spray Brian Rappert Social Studies of Science 2001 31 : 557 DOI: 10.1177/030631201031004004 ...","internal_url":"https://www.academia.edu/4404977/The_Distribution_and_Resolution_of_the_Ambiguities_of_Technology_or_Why_Bobby_Cant_Spray","translated_internal_url":"","created_at":"2013-09-04T01:49:17.541-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"The_Distribution_and_Resolution_of_the_Ambiguities_of_Technology_or_Why_Bobby_Cant_Spray","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"Page 1. Social Studies of Science http://sss.sagepub.com/ The Distribution and Resolution of the Ambiguities of Technology, or Why Bobby Can\u0026#39;t Spray Brian Rappert Social Studies of Science 2001 31 : 557 DOI: 10.1177/030631201031004004 ...","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":21500,"name":"Social Studies Of Science","url":"https://www.academia.edu/Documents/in/Social_Studies_Of_Science"}],"urls":[{"id":1546831,"url":"http://sss.sagepub.com/cgi/doi/10.1177/030631201031004004"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404977-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404985"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/4404985/A_Flexible_Response_Assessing_Non_lethal_Weapons"><img alt="Research paper thumbnail of A Flexible Response? Assessing Non-lethal Weapons" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">A Flexible Response? Assessing Non-lethal Weapons</div><div class="wp-workCard_item"><span>Technology Analysis & Strategic Management</span><span>, 2000</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Recently, much promise has been attached to non-lethal weapons as tools for managing contemporary...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Recently, much promise has been attached to non-lethal weapons as tools for managing contemporary security demands. The utility of this class of technology derives from the flexibility it supposedly offers in the use of force. Despite the growing literature on non-lethal weapons, few commentators have scrutinized them in a systematic fashion. Drawing on a wide range of academic disciplines, the</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404985"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404985"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404985; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404985]").text(description); $(".js-view-count[data-work-id=4404985]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404985; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404985']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=4404985]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404985,"title":"A Flexible Response? Assessing Non-lethal Weapons","translated_title":"","metadata":{"abstract":"Recently, much promise has been attached to non-lethal weapons as tools for managing contemporary security demands. The utility of this class of technology derives from the flexibility it supposedly offers in the use of force. Despite the growing literature on non-lethal weapons, few commentators have scrutinized them in a systematic fashion. Drawing on a wide range of academic disciplines, the","publication_date":{"day":null,"month":null,"year":2000,"errors":{}},"publication_name":"Technology Analysis \u0026 Strategic Management"},"translated_abstract":"Recently, much promise has been attached to non-lethal weapons as tools for managing contemporary security demands. The utility of this class of technology derives from the flexibility it supposedly offers in the use of force. Despite the growing literature on non-lethal weapons, few commentators have scrutinized them in a systematic fashion. Drawing on a wide range of academic disciplines, the","internal_url":"https://www.academia.edu/4404985/A_Flexible_Response_Assessing_Non_lethal_Weapons","translated_internal_url":"","created_at":"2013-09-04T01:49:38.628-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"A_Flexible_Response_Assessing_Non_lethal_Weapons","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"Recently, much promise has been attached to non-lethal weapons as tools for managing contemporary security demands. The utility of this class of technology derives from the flexibility it supposedly offers in the use of force. Despite the growing literature on non-lethal weapons, few commentators have scrutinized them in a systematic fashion. Drawing on a wide range of academic disciplines, the","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":27659,"name":"Applied Economics","url":"https://www.academia.edu/Documents/in/Applied_Economics"},{"id":36979,"name":"Use of Force","url":"https://www.academia.edu/Documents/in/Use_of_Force"},{"id":73149,"name":"Business and Management","url":"https://www.academia.edu/Documents/in/Business_and_Management"},{"id":269854,"name":"Technology analysis \u0026 strategic management","url":"https://www.academia.edu/Documents/in/Technology_analysis_and_strategic_management"}],"urls":[{"id":1546838,"url":"http://www.informaworld.com/openurl?genre=article\u0026doi=10.1080/713698500\u0026magic=crossref%7C%7CD404A21C5BB053405B1A640AFFD44AE3"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404985-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404988"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/4404988/Health_and_safety_in_policing_lessons_from_the_regulation_of_CS_sprays_in_the_UK"><img alt="Research paper thumbnail of Health and safety in policing: lessons from the regulation of CS sprays in the UK" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Health and safety in policing: lessons from the regulation of CS sprays in the UK</div><div class="wp-workCard_item"><span>Social Science & Medicine</span><span>, 2003</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Recent years have seen the introduction of a wide range of weapons for police forces around the w...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Recent years have seen the introduction of a wide range of weapons for police forces around the world intended to minimise injuries incurred in officer-public encounters. In 1996, police forces in England and Wales began trials of CS incapacitant sprays. This article reviews the claims and counterclaims surrounding the medical implications of the sprays with a view to asking how the uncertainties associated with them have been handled in the regulation process. This analysis casts considerable doubt on the robustness of the precautions taken and demonstrates a continuing failure for relevant government agencies to respond and learn from problems identified. Drawing on wider literature regarding the health implications of risky technologies, it further asks what policy lessons the case of the CS sprays holds for the regulation of weaponry at an international level.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404988"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404988"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404988; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404988]").text(description); $(".js-view-count[data-work-id=4404988]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404988; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404988']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=4404988]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404988,"title":"Health and safety in policing: lessons from the regulation of CS sprays in the UK","translated_title":"","metadata":{"abstract":"Recent years have seen the introduction of a wide range of weapons for police forces around the world intended to minimise injuries incurred in officer-public encounters. In 1996, police forces in England and Wales began trials of CS incapacitant sprays. This article reviews the claims and counterclaims surrounding the medical implications of the sprays with a view to asking how the uncertainties associated with them have been handled in the regulation process. This analysis casts considerable doubt on the robustness of the precautions taken and demonstrates a continuing failure for relevant government agencies to respond and learn from problems identified. Drawing on wider literature regarding the health implications of risky technologies, it further asks what policy lessons the case of the CS sprays holds for the regulation of weaponry at an international level.","publication_date":{"day":null,"month":null,"year":2003,"errors":{}},"publication_name":"Social Science \u0026 Medicine"},"translated_abstract":"Recent years have seen the introduction of a wide range of weapons for police forces around the world intended to minimise injuries incurred in officer-public encounters. In 1996, police forces in England and Wales began trials of CS incapacitant sprays. This article reviews the claims and counterclaims surrounding the medical implications of the sprays with a view to asking how the uncertainties associated with them have been handled in the regulation process. This analysis casts considerable doubt on the robustness of the precautions taken and demonstrates a continuing failure for relevant government agencies to respond and learn from problems identified. Drawing on wider literature regarding the health implications of risky technologies, it further asks what policy lessons the case of the CS sprays holds for the regulation of weaponry at an international level.","internal_url":"https://www.academia.edu/4404988/Health_and_safety_in_policing_lessons_from_the_regulation_of_CS_sprays_in_the_UK","translated_internal_url":"","created_at":"2013-09-04T01:49:41.627-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"Health_and_safety_in_policing_lessons_from_the_regulation_of_CS_sprays_in_the_UK","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"Recent years have seen the introduction of a wide range of weapons for police forces around the world intended to minimise injuries incurred in officer-public encounters. In 1996, police forces in England and Wales began trials of CS incapacitant sprays. This article reviews the claims and counterclaims surrounding the medical implications of the sprays with a view to asking how the uncertainties associated with them have been handled in the regulation process. This analysis casts considerable doubt on the robustness of the precautions taken and demonstrates a continuing failure for relevant government agencies to respond and learn from problems identified. Drawing on wider literature regarding the health implications of risky technologies, it further asks what policy lessons the case of the CS sprays holds for the regulation of weaponry at an international level.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology"},{"id":767,"name":"Anthropology","url":"https://www.academia.edu/Documents/in/Anthropology"},{"id":8206,"name":"Police","url":"https://www.academia.edu/Documents/in/Police"},{"id":16288,"name":"Public Health","url":"https://www.academia.edu/Documents/in/Public_Health"},{"id":19870,"name":"Research","url":"https://www.academia.edu/Documents/in/Research"},{"id":36763,"name":"Aerosols","url":"https://www.academia.edu/Documents/in/Aerosols"},{"id":37778,"name":"Law Enforcement","url":"https://www.academia.edu/Documents/in/Law_Enforcement"},{"id":48423,"name":"Social Science \u0026 Medicine","url":"https://www.academia.edu/Documents/in/Social_Science_and_Medicine"},{"id":49161,"name":"Safety","url":"https://www.academia.edu/Documents/in/Safety"},{"id":69015,"name":"England and Wales","url":"https://www.academia.edu/Documents/in/England_and_Wales"},{"id":258767,"name":"Health and Safety","url":"https://www.academia.edu/Documents/in/Health_and_Safety"},{"id":291274,"name":"Great Britain","url":"https://www.academia.edu/Documents/in/Great_Britain"},{"id":325096,"name":"Security Measures","url":"https://www.academia.edu/Documents/in/Security_Measures"},{"id":410370,"name":"Public health systems and services research","url":"https://www.academia.edu/Documents/in/Public_health_systems_and_services_research-1"},{"id":2489706,"name":"Organizational case studies","url":"https://www.academia.edu/Documents/in/Organizational_case_studies"}],"urls":[{"id":1546841,"url":"http://www.sciencedirect.com/science/article/pii/S0277953602001272"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404988-figures'); } }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="718022" id="stsgeneral"><div class="js-work-strip profile--work_container" data-work-id="4404939"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4404939/Science_Technology_and_the_Military_Priorities_Preoccupations_and_Possibilities"><img alt="Research paper thumbnail of Science, Technology and the Military: Priorities, Preoccupations and Possibilities " class="work-thumbnail" src="https://attachments.academia-assets.com/31832342/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4404939/Science_Technology_and_the_Military_Priorities_Preoccupations_and_Possibilities">Science, Technology and the Military: Priorities, Preoccupations and Possibilities </a></div><div class="wp-workCard_item"><span>The Handbook of Science and Technology Studies </span><span>, 2008</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The relationships between science, technology and the military have been an important topic of pu...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The relationships between science, technology and the military have been an important topic of public and political debate throughout the twentieth, and into the twenty-first, centuries . Since at least World War II, a substantial percentage of the world's scientific and technological personnel and resources have been committed to defense-related endeavors. Nevertheless, despite the continuous importance attached to such efforts by governments, questions have always been asked about the effectiveness of, and the ends served by, military R&D. Developments in international affairs have also produced misgivings about whether the basic assumptions underpinning such expenditure remained sound. Most recently, the attacks of 9/11 have led to widespread suggestions that "everything has changed" -not least with regard to perceptions of security threats and the legitimacy accorded to the use of military force. This, in turn, has produced counterclaims to the effect that very little has in fact altered. This chapter reviews "STS" analyses of the relationships between science, technology and the military since the publication of the first Handbook in 1977. It does so with particular reference to the question of how notions of change and continuity have been marshaled in attempts to understand the place and purpose of science and technology in military matters. It highlights how perceptions of what is unique and common in international affairs have pervaded analyses of the relationships between science, technology and the military. In considering these matters, this chapter also engages with the manner in which the priorities and perspectives of STS have transformed over time.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="de4943ffe42254cf26eb5b02ac4d8c40" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":31832342,"asset_id":4404939,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/31832342/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404939"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404939"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404939; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404939]").text(description); $(".js-view-count[data-work-id=4404939]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404939; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404939']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "de4943ffe42254cf26eb5b02ac4d8c40" } } $('.js-work-strip[data-work-id=4404939]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404939,"title":"Science, Technology and the Military: Priorities, Preoccupations and Possibilities ","translated_title":"","metadata":{"grobid_abstract":"The relationships between science, technology and the military have been an important topic of public and political debate throughout the twentieth, and into the twenty-first, centuries . Since at least World War II, a substantial percentage of the world's scientific and technological personnel and resources have been committed to defense-related endeavors. Nevertheless, despite the continuous importance attached to such efforts by governments, questions have always been asked about the effectiveness of, and the ends served by, military R\u0026D. Developments in international affairs have also produced misgivings about whether the basic assumptions underpinning such expenditure remained sound. Most recently, the attacks of 9/11 have led to widespread suggestions that \"everything has changed\" -not least with regard to perceptions of security threats and the legitimacy accorded to the use of military force. This, in turn, has produced counterclaims to the effect that very little has in fact altered. This chapter reviews \"STS\" analyses of the relationships between science, technology and the military since the publication of the first Handbook in 1977. It does so with particular reference to the question of how notions of change and continuity have been marshaled in attempts to understand the place and purpose of science and technology in military matters. It highlights how perceptions of what is unique and common in international affairs have pervaded analyses of the relationships between science, technology and the military. In considering these matters, this chapter also engages with the manner in which the priorities and perspectives of STS have transformed over time.","publication_date":{"day":null,"month":null,"year":2008,"errors":{}},"publication_name":"The Handbook of Science and Technology Studies ","grobid_abstract_attachment_id":31832342},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404939/Science_Technology_and_the_Military_Priorities_Preoccupations_and_Possibilities","translated_internal_url":"","created_at":"2013-09-04T01:47:14.940-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":31832342,"title":"","file_type":"doc","scribd_thumbnail_url":"https://attachments.academia-assets.com/31832342/thumbnails/1.jpg","file_name":"Handbook_-_Rappert.doc","download_url":"https://www.academia.edu/attachments/31832342/download_file","bulk_download_file_name":"Science_Technology_and_the_Military_Prio.doc","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/31832342/Handbook_-_Rappert.doc?1738087125=\u0026response-content-disposition=attachment%3B+filename%3DScience_Technology_and_the_Military_Prio.doc\u0026Expires=1743668353\u0026Signature=dIjyn1tQBjjBwj4akwFkU~1OsqqDgKg4W7pytIIjs365sgTfQm1UQL6s9i9c3zMNFMSrJ9RuIdNLuq~hhCKf8jS9c~-69s7K-YmgMMAzR8S0yydnZ6J2N11wqHdH0uZCsYnUSoxBL-1OoY~MKQAOGNqs~~JsgRbHSHWoTFcIrTbUMnt4S0SiA7YnT7cf15WUsR1dexmPj17besLoPx9s9IkuAJctdvEb7Kd8FfcF4aiTUWY4bnRJssKs5wy1ZPKR4NTVC63fUMyxJTIhElUs-76vaYhbl55F3K2yLRb2Pbocc2CL7sHjju2f7m3Tl3WMIwOdnEztwmxVuhVe3UNQXQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Science_Technology_and_the_Military_Priorities_Preoccupations_and_Possibilities","translated_slug":"","page_count":24,"language":"en","content_type":"Work","summary":"The relationships between science, technology and the military have been an important topic of public and political debate throughout the twentieth, and into the twenty-first, centuries . Since at least World War II, a substantial percentage of the world's scientific and technological personnel and resources have been committed to defense-related endeavors. Nevertheless, despite the continuous importance attached to such efforts by governments, questions have always been asked about the effectiveness of, and the ends served by, military R\u0026D. Developments in international affairs have also produced misgivings about whether the basic assumptions underpinning such expenditure remained sound. Most recently, the attacks of 9/11 have led to widespread suggestions that \"everything has changed\" -not least with regard to perceptions of security threats and the legitimacy accorded to the use of military force. This, in turn, has produced counterclaims to the effect that very little has in fact altered. This chapter reviews \"STS\" analyses of the relationships between science, technology and the military since the publication of the first Handbook in 1977. It does so with particular reference to the question of how notions of change and continuity have been marshaled in attempts to understand the place and purpose of science and technology in military matters. It highlights how perceptions of what is unique and common in international affairs have pervaded analyses of the relationships between science, technology and the military. In considering these matters, this chapter also engages with the manner in which the priorities and perspectives of STS have transformed over time.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":31832342,"title":"","file_type":"doc","scribd_thumbnail_url":"https://attachments.academia-assets.com/31832342/thumbnails/1.jpg","file_name":"Handbook_-_Rappert.doc","download_url":"https://www.academia.edu/attachments/31832342/download_file","bulk_download_file_name":"Science_Technology_and_the_Military_Prio.doc","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/31832342/Handbook_-_Rappert.doc?1738087125=\u0026response-content-disposition=attachment%3B+filename%3DScience_Technology_and_the_Military_Prio.doc\u0026Expires=1743668353\u0026Signature=dIjyn1tQBjjBwj4akwFkU~1OsqqDgKg4W7pytIIjs365sgTfQm1UQL6s9i9c3zMNFMSrJ9RuIdNLuq~hhCKf8jS9c~-69s7K-YmgMMAzR8S0yydnZ6J2N11wqHdH0uZCsYnUSoxBL-1OoY~MKQAOGNqs~~JsgRbHSHWoTFcIrTbUMnt4S0SiA7YnT7cf15WUsR1dexmPj17besLoPx9s9IkuAJctdvEb7Kd8FfcF4aiTUWY4bnRJssKs5wy1ZPKR4NTVC63fUMyxJTIhElUs-76vaYhbl55F3K2yLRb2Pbocc2CL7sHjju2f7m3Tl3WMIwOdnEztwmxVuhVe3UNQXQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404939-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404981"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4404981/Technologies_Texts_and_Possibilities_A_Reply_to_Hutchby"><img alt="Research paper thumbnail of Technologies, Texts and Possibilities: A Reply to Hutchby" class="work-thumbnail" src="https://attachments.academia-assets.com/34287287/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4404981/Technologies_Texts_and_Possibilities_A_Reply_to_Hutchby">Technologies, Texts and Possibilities: A Reply to Hutchby</a></div><div class="wp-workCard_item"><span>Sociology-the Journal of The British Sociological Association</span><span>, 2003</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="85975bbc7ab42727528da5500f3cf2a7" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":34287287,"asset_id":4404981,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/34287287/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404981"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404981"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404981; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404981]").text(description); $(".js-view-count[data-work-id=4404981]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404981; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404981']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "85975bbc7ab42727528da5500f3cf2a7" } } $('.js-work-strip[data-work-id=4404981]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404981,"title":"Technologies, Texts and Possibilities: A Reply to Hutchby","translated_title":"","metadata":{"ai_abstract":"This paper critiques Hutchby's application of the concept of affordance within the sociology of technology, challenging its supposed distinctiveness and the essentialistic assumptions underpinning it. The argument posits that while Hutchby aims to present affordance as a novel framework bridging radical constructivism and determinism, it ultimately lacks the innovative depth claimed and overlooks critical debates within science and technology studies. The author calls for a more nuanced understanding of how sociologists engage with technological claims and emphasizes the value of skepticism and interpretative flexibility in analyzing the relationship between technology, text, and their socio-cultural contexts.","publication_date":{"day":null,"month":null,"year":2003,"errors":{}},"publication_name":"Sociology-the Journal of The British Sociological Association"},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404981/Technologies_Texts_and_Possibilities_A_Reply_to_Hutchby","translated_internal_url":"","created_at":"2013-09-04T01:49:21.189-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":34287287,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/34287287/thumbnails/1.jpg","file_name":"Rappert_Reply.pdf","download_url":"https://www.academia.edu/attachments/34287287/download_file","bulk_download_file_name":"Technologies_Texts_and_Possibilities_A_R.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/34287287/Rappert_Reply-libre.pdf?1406265809=\u0026response-content-disposition=attachment%3B+filename%3DTechnologies_Texts_and_Possibilities_A_R.pdf\u0026Expires=1743575526\u0026Signature=L83hCk-bdCej-sYKeofGCRZm9t-QOGNsVWMUv8AiXXNcHmPShRFypMn5A7nyzGv3VX~RwmpXkXym5Syhj~Nf0xksyY~pDo1HDh1A0omaX1n54jFAmWTHGzrAmyTDHSf2h9HnVOMwZut-~oG-7bT6bglPaJqD6~C2FgeBx6QGzsPzkSueUsfUYojO1JuzPDvF6p2dmMrNcvvkyj8OIQZzt654Kyfhw-aWBatrLLd1SslEVRwh6-Bb~ihIbootlo0EsWCL~aW6iqpkOjz5JiCg2YZ6MWj~W51NcIdo0L8Twn0Ix-uFbr1wGIiDZFncNn~fTFIpHq6o7D7SUgH9nL~Thg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Technologies_Texts_and_Possibilities_A_Reply_to_Hutchby","translated_slug":"","page_count":16,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":34287287,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/34287287/thumbnails/1.jpg","file_name":"Rappert_Reply.pdf","download_url":"https://www.academia.edu/attachments/34287287/download_file","bulk_download_file_name":"Technologies_Texts_and_Possibilities_A_R.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/34287287/Rappert_Reply-libre.pdf?1406265809=\u0026response-content-disposition=attachment%3B+filename%3DTechnologies_Texts_and_Possibilities_A_R.pdf\u0026Expires=1743575526\u0026Signature=L83hCk-bdCej-sYKeofGCRZm9t-QOGNsVWMUv8AiXXNcHmPShRFypMn5A7nyzGv3VX~RwmpXkXym5Syhj~Nf0xksyY~pDo1HDh1A0omaX1n54jFAmWTHGzrAmyTDHSf2h9HnVOMwZut-~oG-7bT6bglPaJqD6~C2FgeBx6QGzsPzkSueUsfUYojO1JuzPDvF6p2dmMrNcvvkyj8OIQZzt654Kyfhw-aWBatrLLd1SslEVRwh6-Bb~ihIbootlo0EsWCL~aW6iqpkOjz5JiCg2YZ6MWj~W51NcIdo0L8Twn0Ix-uFbr1wGIiDZFncNn~fTFIpHq6o7D7SUgH9nL~Thg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology"}],"urls":[{"id":1546835,"url":"http://soc.sagepub.com/cgi/doi/10.1177/00380385030373010"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404981-figures'); } }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="718023" id="other"><div class="js-work-strip profile--work_container" data-work-id="4404978"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/4404978/Assessing_Technologies_of_Political_Control"><img alt="Research paper thumbnail of Assessing Technologies of Political Control" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Assessing Technologies of Political Control</div><div class="wp-workCard_item"><span>Journal of Peace Research</span><span>, 1999</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404978"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404978"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404978; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404978]").text(description); $(".js-view-count[data-work-id=4404978]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404978; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404978']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=4404978]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404978,"title":"Assessing Technologies of Political Control","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":1999,"errors":{}},"publication_name":"Journal of Peace Research"},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404978/Assessing_Technologies_of_Political_Control","translated_internal_url":"","created_at":"2013-09-04T01:49:18.031-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[],"slug":"Assessing_Technologies_of_Political_Control","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"},{"id":27659,"name":"Applied Economics","url":"https://www.academia.edu/Documents/in/Applied_Economics"},{"id":45559,"name":"Peace","url":"https://www.academia.edu/Documents/in/Peace"},{"id":380315,"name":"Public Administration and Policy","url":"https://www.academia.edu/Documents/in/Public_Administration_and_Policy"}],"urls":[{"id":1546832,"url":"http://jpr.sagepub.com/cgi/doi/10.1177/0022343399036006009"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404978-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404963"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4404963/Rationalising_the_future_Foresight_in_science_and_technology_policy_co_ordination"><img alt="Research paper thumbnail of Rationalising the future? Foresight in science and technology policy co-ordination" class="work-thumbnail" src="https://attachments.academia-assets.com/49877975/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4404963/Rationalising_the_future_Foresight_in_science_and_technology_policy_co_ordination">Rationalising the future? Foresight in science and technology policy co-ordination</a></div><div class="wp-workCard_item"><span>Futures</span><span>, 1999</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Commentators from diverse fields and backgrounds have argued the present innovation environment i...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Commentators from diverse fields and backgrounds have argued the present innovation environment is one constituted by unprecedented levels of uncertainty. National Foresight programmes recently have emerged as a means of co-ordinating science and technology policies and responding to a condition of uncertainty and change. Perhaps the most systematic Foresight programme is that of the United Kingdom. This article discusses the response the UK Foresight programme offers to the present and future innovation environments. In doing so, it is argued we should examine how the 'need' for the programme is constructed and how that need is defined and shaped in relation to past UK science and technology policies. It is suggested that Foresight presents an ambivalent response to many of the concerns it proposes to address.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="9873690e4aa89ff3b6e06d7f00445291" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":49877975,"asset_id":4404963,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/49877975/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404963"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404963"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404963; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404963]").text(description); $(".js-view-count[data-work-id=4404963]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404963; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404963']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "9873690e4aa89ff3b6e06d7f00445291" } } $('.js-work-strip[data-work-id=4404963]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404963,"title":"Rationalising the future? Foresight in science and technology policy co-ordination","translated_title":"","metadata":{"grobid_abstract":"Commentators from diverse fields and backgrounds have argued the present innovation environment is one constituted by unprecedented levels of uncertainty. National Foresight programmes recently have emerged as a means of co-ordinating science and technology policies and responding to a condition of uncertainty and change. Perhaps the most systematic Foresight programme is that of the United Kingdom. This article discusses the response the UK Foresight programme offers to the present and future innovation environments. In doing so, it is argued we should examine how the 'need' for the programme is constructed and how that need is defined and shaped in relation to past UK science and technology policies. It is suggested that Foresight presents an ambivalent response to many of the concerns it proposes to address.","publication_date":{"day":null,"month":null,"year":1999,"errors":{}},"publication_name":"Futures","grobid_abstract_attachment_id":49877975},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404963/Rationalising_the_future_Foresight_in_science_and_technology_policy_co_ordination","translated_internal_url":"","created_at":"2013-09-04T01:48:58.198-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":49877975,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/49877975/thumbnails/1.jpg","file_name":"s0016-3287_2899_2900012-920161026-6517-hynlh9.pdf","download_url":"https://www.academia.edu/attachments/49877975/download_file","bulk_download_file_name":"Rationalising_the_future_Foresight_in_sc.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/49877975/s0016-3287_2899_2900012-920161026-6517-hynlh9-libre.pdf?1477475922=\u0026response-content-disposition=attachment%3B+filename%3DRationalising_the_future_Foresight_in_sc.pdf\u0026Expires=1743575526\u0026Signature=hDwRdV-0UDsS39t6yqNj8aEvKeejtj8LqM1748TWbsjLMTd-FhPjUGYmqmFsel7wUnjzmtShejNvPaBcHoyqbBvJsksQwDUnXDGJxNBBqHAIBKT6REvWXRKAiR4vItpjk9HLFhVGO2uROavDA3SGu73cE~3kcgXUKIcWPaJmqoASxTayZu70KKH6lxdReAaQZnVTXdl5gb4AdGu7v2EXeeZd4ghehB~Z8GaNHAfpI16cSggkHxy8lTwI8Ignr-FasJvb-alOWb0vGhBJIJICHgG8t3GFF3erHSSMEx9uNEpKmSIiggBrf4J2m7qXnCfcZljqLMi2yxDrUnLtvRKtfg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Rationalising_the_future_Foresight_in_science_and_technology_policy_co_ordination","translated_slug":"","page_count":19,"language":"en","content_type":"Work","summary":"Commentators from diverse fields and backgrounds have argued the present innovation environment is one constituted by unprecedented levels of uncertainty. National Foresight programmes recently have emerged as a means of co-ordinating science and technology policies and responding to a condition of uncertainty and change. Perhaps the most systematic Foresight programme is that of the United Kingdom. This article discusses the response the UK Foresight programme offers to the present and future innovation environments. In doing so, it is argued we should examine how the 'need' for the programme is constructed and how that need is defined and shaped in relation to past UK science and technology policies. It is suggested that Foresight presents an ambivalent response to many of the concerns it proposes to address.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":49877975,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/49877975/thumbnails/1.jpg","file_name":"s0016-3287_2899_2900012-920161026-6517-hynlh9.pdf","download_url":"https://www.academia.edu/attachments/49877975/download_file","bulk_download_file_name":"Rationalising_the_future_Foresight_in_sc.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/49877975/s0016-3287_2899_2900012-920161026-6517-hynlh9-libre.pdf?1477475922=\u0026response-content-disposition=attachment%3B+filename%3DRationalising_the_future_Foresight_in_sc.pdf\u0026Expires=1743575526\u0026Signature=hDwRdV-0UDsS39t6yqNj8aEvKeejtj8LqM1748TWbsjLMTd-FhPjUGYmqmFsel7wUnjzmtShejNvPaBcHoyqbBvJsksQwDUnXDGJxNBBqHAIBKT6REvWXRKAiR4vItpjk9HLFhVGO2uROavDA3SGu73cE~3kcgXUKIcWPaJmqoASxTayZu70KKH6lxdReAaQZnVTXdl5gb4AdGu7v2EXeeZd4ghehB~Z8GaNHAfpI16cSggkHxy8lTwI8Ignr-FasJvb-alOWb0vGhBJIJICHgG8t3GFF3erHSSMEx9uNEpKmSIiggBrf4J2m7qXnCfcZljqLMi2yxDrUnLtvRKtfg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":12546,"name":"Science and Technology Policy","url":"https://www.academia.edu/Documents/in/Science_and_Technology_Policy"},{"id":28235,"name":"Multidisciplinary","url":"https://www.academia.edu/Documents/in/Multidisciplinary"},{"id":40867,"name":"United Kingdom","url":"https://www.academia.edu/Documents/in/United_Kingdom"},{"id":111757,"name":"Futures","url":"https://www.academia.edu/Documents/in/Futures"}],"urls":[{"id":1546820,"url":"http://www.sciencedirect.com/science/article/pii/S0016328799000129"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404963-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="4404980"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/4404980/THE_USES_OF_RELEVANCE_THOUGHTS_ON_A_REFLEXIVE_SOCIOLOGY"><img alt="Research paper thumbnail of THE USES OF RELEVANCE: THOUGHTS ON A REFLEXIVE SOCIOLOGY" class="work-thumbnail" src="https://attachments.academia-assets.com/49877978/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/4404980/THE_USES_OF_RELEVANCE_THOUGHTS_ON_A_REFLEXIVE_SOCIOLOGY">THE USES OF RELEVANCE: THOUGHTS ON A REFLEXIVE SOCIOLOGY</a></div><div class="wp-workCard_item"><span>Sociology-the Journal of The British Sociological Association</span><span>, 1999</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="08869d4c55a959a158e58730927982e6" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":49877978,"asset_id":4404980,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/49877978/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="4404980"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="4404980"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4404980; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4404980]").text(description); $(".js-view-count[data-work-id=4404980]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4404980; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='4404980']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "08869d4c55a959a158e58730927982e6" } } $('.js-work-strip[data-work-id=4404980]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":4404980,"title":"THE USES OF RELEVANCE: THOUGHTS ON A REFLEXIVE SOCIOLOGY","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":1999,"errors":{}},"publication_name":"Sociology-the Journal of The British Sociological Association"},"translated_abstract":null,"internal_url":"https://www.academia.edu/4404980/THE_USES_OF_RELEVANCE_THOUGHTS_ON_A_REFLEXIVE_SOCIOLOGY","translated_internal_url":"","created_at":"2013-09-04T01:49:19.631-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":49877978,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/49877978/thumbnails/1.jpg","file_name":"705.full.pdf","download_url":"https://www.academia.edu/attachments/49877978/download_file","bulk_download_file_name":"THE_USES_OF_RELEVANCE_THOUGHTS_ON_A_REFL.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/49877978/705.full-libre.pdf?1477475922=\u0026response-content-disposition=attachment%3B+filename%3DTHE_USES_OF_RELEVANCE_THOUGHTS_ON_A_REFL.pdf\u0026Expires=1743575526\u0026Signature=VYTxZYokGpwuWniPSv1sggWLMs6D1ugVJUTOJVn31UyoFcXxvQLlBI-JUDK~VVa097mu3qiUsMKSlp-sG-ratpK6CdIkSdH2724TdSB3G~N-rvKhPatw8~8KXTlsW0hW82tBDO2T39ChF1vE~yNtstBMbrMISqbfkkrXBa8XPCNQ3v-D3fOgCQDb3hPRgXQnWt3N4oVeNPqt7LwYbslWDATnmtP-opntqLJmULgB61idQ3P0c2b21DL59y5KKOc5R~yk7z-M~Qhx6dH4IZRIEN52LKEAddtUETCagZb1utfmmRG2s~7Gth38IzsiggHCicdwkUSCGt3lHEZJNnVC5A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"THE_USES_OF_RELEVANCE_THOUGHTS_ON_A_REFLEXIVE_SOCIOLOGY","translated_slug":"","page_count":19,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":49877978,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/49877978/thumbnails/1.jpg","file_name":"705.full.pdf","download_url":"https://www.academia.edu/attachments/49877978/download_file","bulk_download_file_name":"THE_USES_OF_RELEVANCE_THOUGHTS_ON_A_REFL.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/49877978/705.full-libre.pdf?1477475922=\u0026response-content-disposition=attachment%3B+filename%3DTHE_USES_OF_RELEVANCE_THOUGHTS_ON_A_REFL.pdf\u0026Expires=1743575526\u0026Signature=VYTxZYokGpwuWniPSv1sggWLMs6D1ugVJUTOJVn31UyoFcXxvQLlBI-JUDK~VVa097mu3qiUsMKSlp-sG-ratpK6CdIkSdH2724TdSB3G~N-rvKhPatw8~8KXTlsW0hW82tBDO2T39ChF1vE~yNtstBMbrMISqbfkkrXBa8XPCNQ3v-D3fOgCQDb3hPRgXQnWt3N4oVeNPqt7LwYbslWDATnmtP-opntqLJmULgB61idQ3P0c2b21DL59y5KKOc5R~yk7z-M~Qhx6dH4IZRIEN52LKEAddtUETCagZb1utfmmRG2s~7Gth38IzsiggHCicdwkUSCGt3lHEZJNnVC5A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology"},{"id":815,"name":"Epistemology","url":"https://www.academia.edu/Documents/in/Epistemology"},{"id":941,"name":"Social Policy","url":"https://www.academia.edu/Documents/in/Social_Policy"},{"id":1716,"name":"Action Research","url":"https://www.academia.edu/Documents/in/Action_Research"},{"id":135990,"name":"Relevance","url":"https://www.academia.edu/Documents/in/Relevance"},{"id":160256,"name":"Social Role","url":"https://www.academia.edu/Documents/in/Social_Role"},{"id":354713,"name":"Social Problem","url":"https://www.academia.edu/Documents/in/Social_Problem"},{"id":414770,"name":"Scientific Knowledge","url":"https://www.academia.edu/Documents/in/Scientific_Knowledge"}],"urls":[{"id":1546834,"url":"http://www.journals.cambridge.org/abstract_S0038038599000450"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-4404980-figures'); } }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="1650713" id="papers"><div class="js-work-strip profile--work_container" data-work-id="80514459"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/80514459/Counting_the_dead_and_making_the_dead_count_configuring_data_and_accountability"><img alt="Research paper thumbnail of Counting the dead and making the dead count: configuring data and accountability" class="work-thumbnail" src="https://attachments.academia-assets.com/86870802/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/80514459/Counting_the_dead_and_making_the_dead_count_configuring_data_and_accountability">Counting the dead and making the dead count: configuring data and accountability</a></div><div class="wp-workCard_item"><span>History and Philosophy of the Life Sciences</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">This article examines the relation between counting, counts and accountability. It does so by com...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">This article examines the relation between counting, counts and accountability. It does so by comparing the responses of the British government to deaths associated with Covid-19 in 2020 to its responses to deaths associated with the 2003 invasion of Iraq. Similarities and dissimilarities between the cases regarding what counted as data, what data were taken to count, what data counted for, and how data were counted provide the basis for considering how the bounds of democratic accountability are constituted. Based on these two cases, the article sets out the metaphors of leaks and cascades as ways of characterising the data practices whereby counts, counting and accountability get configured. By situating deaths associated with Covid-19 against previous experience with deaths from war, the article also proposes how claims to truth and ignorance might figure in any future official inquiry into the handling of the pandemic.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="7618b018fee946df9e0ea4ecb9e37821" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":86870802,"asset_id":80514459,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/86870802/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80514459"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80514459"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80514459; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80514459]").text(description); $(".js-view-count[data-work-id=80514459]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80514459; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80514459']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "7618b018fee946df9e0ea4ecb9e37821" } } $('.js-work-strip[data-work-id=80514459]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80514459,"title":"Counting the dead and making the dead count: configuring data and accountability","translated_title":"","metadata":{"abstract":"This article examines the relation between counting, counts and accountability. It does so by comparing the responses of the British government to deaths associated with Covid-19 in 2020 to its responses to deaths associated with the 2003 invasion of Iraq. Similarities and dissimilarities between the cases regarding what counted as data, what data were taken to count, what data counted for, and how data were counted provide the basis for considering how the bounds of democratic accountability are constituted. Based on these two cases, the article sets out the metaphors of leaks and cascades as ways of characterising the data practices whereby counts, counting and accountability get configured. By situating deaths associated with Covid-19 against previous experience with deaths from war, the article also proposes how claims to truth and ignorance might figure in any future official inquiry into the handling of the pandemic.","publisher":"Springer Science and Business Media LLC","publication_name":"History and Philosophy of the Life Sciences"},"translated_abstract":"This article examines the relation between counting, counts and accountability. It does so by comparing the responses of the British government to deaths associated with Covid-19 in 2020 to its responses to deaths associated with the 2003 invasion of Iraq. Similarities and dissimilarities between the cases regarding what counted as data, what data were taken to count, what data counted for, and how data were counted provide the basis for considering how the bounds of democratic accountability are constituted. Based on these two cases, the article sets out the metaphors of leaks and cascades as ways of characterising the data practices whereby counts, counting and accountability get configured. By situating deaths associated with Covid-19 against previous experience with deaths from war, the article also proposes how claims to truth and ignorance might figure in any future official inquiry into the handling of the pandemic.","internal_url":"https://www.academia.edu/80514459/Counting_the_dead_and_making_the_dead_count_configuring_data_and_accountability","translated_internal_url":"","created_at":"2022-06-02T01:50:21.812-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":86870802,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86870802/thumbnails/1.jpg","file_name":"s40656-021-00415-5.pdf","download_url":"https://www.academia.edu/attachments/86870802/download_file","bulk_download_file_name":"Counting_the_dead_and_making_the_dead_co.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86870802/s40656-021-00415-5-libre.pdf?1654161094=\u0026response-content-disposition=attachment%3B+filename%3DCounting_the_dead_and_making_the_dead_co.pdf\u0026Expires=1743575526\u0026Signature=F15Ri7sVnnil5MuHcJX3YdgX-uNlkysatQn8nsEMtBcZn-Z9aZd2UWMSGoUFfUdNKjhtmAMkEncZI5IriUcf9MgpfgPEkZGgW09FpZ3MP1VkhoKOnHZ-OXMolH489hmc2OJ7-bBQRmoIJvwVD1ZJ376MQBg6UqkYiG8ICj9woInF30L7LU758PAjkQuH4CC8jFXsfQxX97iYEpx31JT4enQ~3CLJrmL6SLehN9VsI62pCDyNma8bOyiyLYH0XmTFDDWCK8L84JAeWI4N0ecJfuu97kDWjt5-yUw4ss6f-4elpF4072NIDgBlVpA4B4g1kR9W7YWjhlax6A4RAD80lQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Counting_the_dead_and_making_the_dead_count_configuring_data_and_accountability","translated_slug":"","page_count":24,"language":"en","content_type":"Work","summary":"This article examines the relation between counting, counts and accountability. It does so by comparing the responses of the British government to deaths associated with Covid-19 in 2020 to its responses to deaths associated with the 2003 invasion of Iraq. Similarities and dissimilarities between the cases regarding what counted as data, what data were taken to count, what data counted for, and how data were counted provide the basis for considering how the bounds of democratic accountability are constituted. Based on these two cases, the article sets out the metaphors of leaks and cascades as ways of characterising the data practices whereby counts, counting and accountability get configured. By situating deaths associated with Covid-19 against previous experience with deaths from war, the article also proposes how claims to truth and ignorance might figure in any future official inquiry into the handling of the pandemic.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":86870802,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86870802/thumbnails/1.jpg","file_name":"s40656-021-00415-5.pdf","download_url":"https://www.academia.edu/attachments/86870802/download_file","bulk_download_file_name":"Counting_the_dead_and_making_the_dead_co.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86870802/s40656-021-00415-5-libre.pdf?1654161094=\u0026response-content-disposition=attachment%3B+filename%3DCounting_the_dead_and_making_the_dead_co.pdf\u0026Expires=1743575526\u0026Signature=F15Ri7sVnnil5MuHcJX3YdgX-uNlkysatQn8nsEMtBcZn-Z9aZd2UWMSGoUFfUdNKjhtmAMkEncZI5IriUcf9MgpfgPEkZGgW09FpZ3MP1VkhoKOnHZ-OXMolH489hmc2OJ7-bBQRmoIJvwVD1ZJ376MQBg6UqkYiG8ICj9woInF30L7LU758PAjkQuH4CC8jFXsfQxX97iYEpx31JT4enQ~3CLJrmL6SLehN9VsI62pCDyNma8bOyiyLYH0XmTFDDWCK8L84JAeWI4N0ecJfuu97kDWjt5-yUw4ss6f-4elpF4072NIDgBlVpA4B4g1kR9W7YWjhlax6A4RAD80lQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":26327,"name":"Medicine","url":"https://www.academia.edu/Documents/in/Medicine"}],"urls":[{"id":21019742,"url":"https://link.springer.com/content/pdf/10.1007/s40656-021-00415-5.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-80514459-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="80514457"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/80514457/Conjuring_Imposters_The_Extraordinary_Illusions_of_Mundanity"><img alt="Research paper thumbnail of Conjuring Imposters: The Extraordinary Illusions of Mundanity" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Conjuring Imposters: The Extraordinary Illusions of Mundanity</div><div class="wp-workCard_item"><span>The Imposter as Social Theory</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">This chapter examines how entertainment magic and the notion of impostering can inform each other...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">This chapter examines how entertainment magic and the notion of impostering can inform each other. It does so through considering how assessments of skill and perception are constituted in interactions between performers and audiences. A main plank of the argument derives from a self-study of the acquisition of skill.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80514457"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80514457"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80514457; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80514457]").text(description); $(".js-view-count[data-work-id=80514457]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80514457; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80514457']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=80514457]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80514457,"title":"Conjuring Imposters: The Extraordinary Illusions of Mundanity","translated_title":"","metadata":{"abstract":"This chapter examines how entertainment magic and the notion of impostering can inform each other. It does so through considering how assessments of skill and perception are constituted in interactions between performers and audiences. A main plank of the argument derives from a self-study of the acquisition of skill.","publisher":"Bristol University Press","publication_name":"The Imposter as Social Theory"},"translated_abstract":"This chapter examines how entertainment magic and the notion of impostering can inform each other. It does so through considering how assessments of skill and perception are constituted in interactions between performers and audiences. A main plank of the argument derives from a self-study of the acquisition of skill.","internal_url":"https://www.academia.edu/80514457/Conjuring_Imposters_The_Extraordinary_Illusions_of_Mundanity","translated_internal_url":"","created_at":"2022-06-02T01:50:21.626-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Conjuring_Imposters_The_Extraordinary_Illusions_of_Mundanity","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"This chapter examines how entertainment magic and the notion of impostering can inform each other. It does so through considering how assessments of skill and perception are constituted in interactions between performers and audiences. A main plank of the argument derives from a self-study of the acquisition of skill.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[],"urls":[{"id":21019741,"url":"https://bristoluniversitypressdigital.com/view/book/9781529213102/ch007.xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-80514457-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="80514456"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/80514456/Now_you_see_it_now_you_don_t_methods_for_perceiving_intersubjectivity"><img alt="Research paper thumbnail of Now you see it, now you don’t: methods for perceiving intersubjectivity" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Now you see it, now you don’t: methods for perceiving intersubjectivity</div><div class="wp-workCard_item"><span>Qualitative Research</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">What work is entailed in learning skills? How do processes of enskillment enable alternative ways...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">What work is entailed in learning skills? How do processes of enskillment enable alternative ways of seeing, feeling and acting? How can we intersubjectively meet each other when deception is regarded as prevalent? This article addresses these questions through recounting my experiences associated with learning entertainment magic. I outline how the training of competencies can involve an ongoing problematising of the relationship between seeing and knowing as well as between knowledge and ignorance. Furthermore, through recounting the affirmations and disorientations of my process of learning, I want to consider how skills acquisition can serve as a method for self-other investigation.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80514456"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80514456"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80514456; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80514456]").text(description); $(".js-view-count[data-work-id=80514456]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80514456; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80514456']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=80514456]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80514456,"title":"Now you see it, now you don’t: methods for perceiving intersubjectivity","translated_title":"","metadata":{"abstract":"What work is entailed in learning skills? How do processes of enskillment enable alternative ways of seeing, feeling and acting? How can we intersubjectively meet each other when deception is regarded as prevalent? This article addresses these questions through recounting my experiences associated with learning entertainment magic. I outline how the training of competencies can involve an ongoing problematising of the relationship between seeing and knowing as well as between knowledge and ignorance. Furthermore, through recounting the affirmations and disorientations of my process of learning, I want to consider how skills acquisition can serve as a method for self-other investigation.","publisher":"SAGE Publications","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Qualitative Research"},"translated_abstract":"What work is entailed in learning skills? How do processes of enskillment enable alternative ways of seeing, feeling and acting? How can we intersubjectively meet each other when deception is regarded as prevalent? This article addresses these questions through recounting my experiences associated with learning entertainment magic. I outline how the training of competencies can involve an ongoing problematising of the relationship between seeing and knowing as well as between knowledge and ignorance. Furthermore, through recounting the affirmations and disorientations of my process of learning, I want to consider how skills acquisition can serve as a method for self-other investigation.","internal_url":"https://www.academia.edu/80514456/Now_you_see_it_now_you_don_t_methods_for_perceiving_intersubjectivity","translated_internal_url":"","created_at":"2022-06-02T01:50:21.402-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Now_you_see_it_now_you_don_t_methods_for_perceiving_intersubjectivity","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"What work is entailed in learning skills? How do processes of enskillment enable alternative ways of seeing, feeling and acting? How can we intersubjectively meet each other when deception is regarded as prevalent? This article addresses these questions through recounting my experiences associated with learning entertainment magic. I outline how the training of competencies can involve an ongoing problematising of the relationship between seeing and knowing as well as between knowledge and ignorance. Furthermore, through recounting the affirmations and disorientations of my process of learning, I want to consider how skills acquisition can serve as a method for self-other investigation.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":922,"name":"Education","url":"https://www.academia.edu/Documents/in/Education"},{"id":12824,"name":"Intersubjectivity","url":"https://www.academia.edu/Documents/in/Intersubjectivity"},{"id":73146,"name":"Qualitative","url":"https://www.academia.edu/Documents/in/Qualitative"}],"urls":[{"id":21019740,"url":"http://journals.sagepub.com/doi/pdf/10.1177/1468794120965367"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-80514456-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="80514455"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/80514455/Ethics_as_"><img alt="Research paper thumbnail of Ethics as …" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Ethics as …</div><div class="wp-workCard_item"><span>On the Dual Uses of Science and Ethics: Principles, Practices, and Prospects</span><span>, 2013</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80514455"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80514455"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80514455; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80514455]").text(description); $(".js-view-count[data-work-id=80514455]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80514455; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80514455']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=80514455]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80514455,"title":"Ethics as …","translated_title":"","metadata":{"publisher":"ANU Press","publication_date":{"day":null,"month":null,"year":2013,"errors":{}},"publication_name":"On the Dual Uses of Science and Ethics: Principles, Practices, and Prospects"},"translated_abstract":null,"internal_url":"https://www.academia.edu/80514455/Ethics_as_","translated_internal_url":"","created_at":"2022-06-02T01:50:21.272-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Ethics_as_","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-80514455-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="80514454"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/80514454/What_is_absent_from_contemplative_neuroscience_Rethinking_limits_within_the_study_of_consciousness_experience_and_meditation"><img alt="Research paper thumbnail of What is absent from contemplative neuroscience? : Rethinking limits within the study of consciousness, experience, and meditation" class="work-thumbnail" src="https://attachments.academia-assets.com/86870799/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/80514454/What_is_absent_from_contemplative_neuroscience_Rethinking_limits_within_the_study_of_consciousness_experience_and_meditation">What is absent from contemplative neuroscience? : Rethinking limits within the study of consciousness, experience, and meditation</a></div><div class="wp-workCard_item"><span>Journal of Consciousness Studies</span><span>, 2017</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">In conveying experiences of meditation, the question of what exceeds or should resist description...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">In conveying experiences of meditation, the question of what exceeds or should resist description has been a recurrent topic of commentary in a wide array of literature -- including religious doctr ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="5daa441065c22655d881677d07a55714" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":86870799,"asset_id":80514454,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/86870799/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80514454"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80514454"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80514454; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80514454]").text(description); $(".js-view-count[data-work-id=80514454]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80514454; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80514454']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "5daa441065c22655d881677d07a55714" } } $('.js-work-strip[data-work-id=80514454]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80514454,"title":"What is absent from contemplative neuroscience? : Rethinking limits within the study of consciousness, experience, and meditation","translated_title":"","metadata":{"abstract":"In conveying experiences of meditation, the question of what exceeds or should resist description has been a recurrent topic of commentary in a wide array of literature -- including religious doctr ...","ai_title_tag":"Rethinking Limits in Contemplative Neuroscience","publication_date":{"day":null,"month":null,"year":2017,"errors":{}},"publication_name":"Journal of Consciousness Studies"},"translated_abstract":"In conveying experiences of meditation, the question of what exceeds or should resist description has been a recurrent topic of commentary in a wide array of literature -- including religious doctr ...","internal_url":"https://www.academia.edu/80514454/What_is_absent_from_contemplative_neuroscience_Rethinking_limits_within_the_study_of_consciousness_experience_and_meditation","translated_internal_url":"","created_at":"2022-06-02T01:50:21.095-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":86870799,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86870799/thumbnails/1.jpg","file_name":"Absences_20Contemplative_20Neuroscience_20-_20Rappert_20Colombetti_20Coopmans.pdf","download_url":"https://www.academia.edu/attachments/86870799/download_file","bulk_download_file_name":"What_is_absent_from_contemplative_neuros.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86870799/Absences_20Contemplative_20Neuroscience_20-_20Rappert_20Colombetti_20Coopmans-libre.pdf?1654161098=\u0026response-content-disposition=attachment%3B+filename%3DWhat_is_absent_from_contemplative_neuros.pdf\u0026Expires=1743668353\u0026Signature=WKS-4pyP0rsUOafplU6mGxBfW7w5qEygamXZEBW8UayKe-oCRivnse-bCWpnuUZrlADml-kDLZqZDPJ-krjDPS~zyjnSSHIo6VYvWXsElA3HImR0UTvByclSjYvkkcBosjZFOz0eViIfBobQbENWOZBQnuxgOTVOWKCiyDczsgSuyKyLzmpH1eMa7oiiZQoameS4bJaIQaWSNmAk4Q2KJP4U9f6RDQEfpijiT6dz7zON4m0k9wVxm~q0470HQb4heNUi65X0PmFp9xZfznnB5zlDyWNQwSSvqLPNcxr5M0lStH2UNIceOGCZhlaWN4LNfoSucgUdQJ5OzGCDwVaqKA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"What_is_absent_from_contemplative_neuroscience_Rethinking_limits_within_the_study_of_consciousness_experience_and_meditation","translated_slug":"","page_count":31,"language":"en","content_type":"Work","summary":"In conveying experiences of meditation, the question of what exceeds or should resist description has been a recurrent topic of commentary in a wide array of literature -- including religious doctr ...","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":86870799,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86870799/thumbnails/1.jpg","file_name":"Absences_20Contemplative_20Neuroscience_20-_20Rappert_20Colombetti_20Coopmans.pdf","download_url":"https://www.academia.edu/attachments/86870799/download_file","bulk_download_file_name":"What_is_absent_from_contemplative_neuros.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86870799/Absences_20Contemplative_20Neuroscience_20-_20Rappert_20Colombetti_20Coopmans-libre.pdf?1654161098=\u0026response-content-disposition=attachment%3B+filename%3DWhat_is_absent_from_contemplative_neuros.pdf\u0026Expires=1743668354\u0026Signature=OfP8Z3CIiHr8unUYMLKAAy6oZQ~C6Zv8PbUl~fSXVZ6UqjpK4lbd1XCNzmspzjGetiL6~0NxSrQnESgmIOs6uVg8E~7qVbULDA6JYW6G7P7LcMW3UgryTGp58UzVOeFsT305JCTxHXgf4zDKG7Cou5e5am9Mw9U02XySumyXQCrjHQkmviFreV-y4KWZABQjlgunkdxvI39ELuIA4urPVPc7Zvdpx0PFcCglStQcS5oi-ZfR0-8wmW3CZ6c6XZoEeI89DbTSTfTFkOZ-3p5tJIbMeMlQkOFUTOhQ1kb5utXtU6Rs9zKGFX5K32UjR7FUUSpfIDXFCDU9ouD99N~Gww__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":86870800,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86870800/thumbnails/1.jpg","file_name":"Absences_20Contemplative_20Neuroscience_20-_20Rappert_20Colombetti_20Coopmans.pdf","download_url":"https://www.academia.edu/attachments/86870800/download_file","bulk_download_file_name":"What_is_absent_from_contemplative_neuros.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86870800/Absences_20Contemplative_20Neuroscience_20-_20Rappert_20Colombetti_20Coopmans-libre.pdf?1654161098=\u0026response-content-disposition=attachment%3B+filename%3DWhat_is_absent_from_contemplative_neuros.pdf\u0026Expires=1743668354\u0026Signature=UpNpg38~6OjIDuuS3TYIQmLcBOjD-yUG0cRjbcsIrJ9pVL81X~-549-vtydN1GDl6QRly8fnzTUrB~5rgkYi2GIHdEzwo8wuCpKQ5RYqi3S1bAQJoeJBrB0BnOMTzhQ3fRgya-NjI0pHvVMbRgy4SO93UaHZiULIgnShWV~n5BFQh0ZZzbh20Dr5-hwgjKNK6FQBkTsrt2vuCh3DDRgkKpCS5wS7Zy0jcrhoowYTU1VTFobUnSelLj2NhSupxFwLFMGxa4hskudDxYeTevKRFE4SYE7syaA5bruSzd4lr~8rGLv-0Mwz7ymyw4WllVWyx7QH8qM8PvcWTihaKqGlKg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology"},{"id":6941,"name":"Sociology of Expertise","url":"https://www.academia.edu/Documents/in/Sociology_of_Expertise"},{"id":14616,"name":"Neurophenomenology","url":"https://www.academia.edu/Documents/in/Neurophenomenology"},{"id":33304,"name":"Contemplative Neuroscience","url":"https://www.academia.edu/Documents/in/Contemplative_Neuroscience"},{"id":40633,"name":"Consciousness Studies","url":"https://www.academia.edu/Documents/in/Consciousness_Studies"},{"id":71529,"name":"Silence Studies","url":"https://www.academia.edu/Documents/in/Silence_Studies"},{"id":1211462,"name":"Meditation and Cognitive Neuroscience","url":"https://www.academia.edu/Documents/in/Meditation_and_Cognitive_Neuroscience"}],"urls":[{"id":21019738,"url":"https://ore.exeter.ac.uk/repository/bitstream/handle/10871/25464/Absences%20Contemplative%20Neuroscience%20-%20Rappert%20Colombetti%20Coopmans.pdf?isAllowed=y\u0026sequence=1"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-80514454-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="80514326"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/80514326/What_is_absent_from_contemplative_neuroscience_Rethinking_limits_within_the_study_of_consciousness_experience_and_meditation"><img alt="Research paper thumbnail of What is absent from contemplative neuroscience? : Rethinking limits within the study of consciousness, experience, and meditation" class="work-thumbnail" src="https://attachments.academia-assets.com/86870791/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/80514326/What_is_absent_from_contemplative_neuroscience_Rethinking_limits_within_the_study_of_consciousness_experience_and_meditation">What is absent from contemplative neuroscience? : Rethinking limits within the study of consciousness, experience, and meditation</a></div><div class="wp-workCard_item"><span>Journal of Consciousness Studies</span><span>, 2017</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">In conveying experiences of meditation, the question of what exceeds or should resist description...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">In conveying experiences of meditation, the question of what exceeds or should resist description has been a recurrent topic of commentary in a wide array of literature -- including religious doctr ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="00dcaafe158fc4141bb9989a38f3abd2" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":86870791,"asset_id":80514326,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/86870791/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80514326"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80514326"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80514326; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80514326]").text(description); $(".js-view-count[data-work-id=80514326]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80514326; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80514326']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "00dcaafe158fc4141bb9989a38f3abd2" } } $('.js-work-strip[data-work-id=80514326]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80514326,"title":"What is absent from contemplative neuroscience? : Rethinking limits within the study of consciousness, experience, and meditation","translated_title":"","metadata":{"abstract":"In conveying experiences of meditation, the question of what exceeds or should resist description has been a recurrent topic of commentary in a wide array of literature -- including religious doctr ...","publication_date":{"day":null,"month":null,"year":2017,"errors":{}},"publication_name":"Journal of Consciousness Studies"},"translated_abstract":"In conveying experiences of meditation, the question of what exceeds or should resist description has been a recurrent topic of commentary in a wide array of literature -- including religious doctr ...","internal_url":"https://www.academia.edu/80514326/What_is_absent_from_contemplative_neuroscience_Rethinking_limits_within_the_study_of_consciousness_experience_and_meditation","translated_internal_url":"","created_at":"2022-06-02T01:48:49.456-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":86870791,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86870791/thumbnails/1.jpg","file_name":"Absences_20Contemplative_20Neuroscience_20-_20Rappert_20Colombetti_20Coopmans.pdf","download_url":"https://www.academia.edu/attachments/86870791/download_file","bulk_download_file_name":"What_is_absent_from_contemplative_neuros.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86870791/Absences_20Contemplative_20Neuroscience_20-_20Rappert_20Colombetti_20Coopmans-libre.pdf?1654161098=\u0026response-content-disposition=attachment%3B+filename%3DWhat_is_absent_from_contemplative_neuros.pdf\u0026Expires=1743575527\u0026Signature=UBCp-EOgSMrqMUfyVLQbUN9wzZkT~sdrevPXRsBnOvM6QVnWPuuLJkLr-cWuP5RUBbEf~0jkQs3RYeqNndVE80ckoiym4tksK4UdcK9hlX8Z-xq6wZGvTOjknG6fufMc2DNyRxkKDKgVjaUEKtqQ9vDnK9wr9DtwsND2D5RMAmxrF3LlJOItKkvUfisrtQxbiGRfdwPoViEsg1hH69cJfs22Q5mouw~XkOtVFrhBO87HzkqDiqbCx-Tr4-pk6Sregl6WM3uB~Lf3M5b09ITjrLYJosaTijQolDtiBzcEAQEMRvXoGIoFebLDyBQdzxi9PiG4zMwn2xr8NuuGtGovjQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"What_is_absent_from_contemplative_neuroscience_Rethinking_limits_within_the_study_of_consciousness_experience_and_meditation","translated_slug":"","page_count":31,"language":"en","content_type":"Work","summary":"In conveying experiences of meditation, the question of what exceeds or should resist description has been a recurrent topic of commentary in a wide array of literature -- including religious doctr ...","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":86870791,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86870791/thumbnails/1.jpg","file_name":"Absences_20Contemplative_20Neuroscience_20-_20Rappert_20Colombetti_20Coopmans.pdf","download_url":"https://www.academia.edu/attachments/86870791/download_file","bulk_download_file_name":"What_is_absent_from_contemplative_neuros.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86870791/Absences_20Contemplative_20Neuroscience_20-_20Rappert_20Colombetti_20Coopmans-libre.pdf?1654161098=\u0026response-content-disposition=attachment%3B+filename%3DWhat_is_absent_from_contemplative_neuros.pdf\u0026Expires=1743575527\u0026Signature=UBCp-EOgSMrqMUfyVLQbUN9wzZkT~sdrevPXRsBnOvM6QVnWPuuLJkLr-cWuP5RUBbEf~0jkQs3RYeqNndVE80ckoiym4tksK4UdcK9hlX8Z-xq6wZGvTOjknG6fufMc2DNyRxkKDKgVjaUEKtqQ9vDnK9wr9DtwsND2D5RMAmxrF3LlJOItKkvUfisrtQxbiGRfdwPoViEsg1hH69cJfs22Q5mouw~XkOtVFrhBO87HzkqDiqbCx-Tr4-pk6Sregl6WM3uB~Lf3M5b09ITjrLYJosaTijQolDtiBzcEAQEMRvXoGIoFebLDyBQdzxi9PiG4zMwn2xr8NuuGtGovjQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology"},{"id":6941,"name":"Sociology of Expertise","url":"https://www.academia.edu/Documents/in/Sociology_of_Expertise"},{"id":9040,"name":"Consciousness","url":"https://www.academia.edu/Documents/in/Consciousness"},{"id":14616,"name":"Neurophenomenology","url":"https://www.academia.edu/Documents/in/Neurophenomenology"},{"id":33304,"name":"Contemplative Neuroscience","url":"https://www.academia.edu/Documents/in/Contemplative_Neuroscience"},{"id":40633,"name":"Consciousness Studies","url":"https://www.academia.edu/Documents/in/Consciousness_Studies"},{"id":57275,"name":"Meditation","url":"https://www.academia.edu/Documents/in/Meditation"},{"id":71529,"name":"Silence Studies","url":"https://www.academia.edu/Documents/in/Silence_Studies"},{"id":1211462,"name":"Meditation and Cognitive Neuroscience","url":"https://www.academia.edu/Documents/in/Meditation_and_Cognitive_Neuroscience"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-80514326-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="80514172"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/80514172/Ignorance_is_strength"><img alt="Research paper thumbnail of Ignorance is strength?" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Ignorance is strength?</div><div class="wp-workCard_item"><span>Routledge International Handbook of Ignorance Studies</span><span>, 2015</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80514172"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80514172"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80514172; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80514172]").text(description); $(".js-view-count[data-work-id=80514172]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80514172; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80514172']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=80514172]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80514172,"title":"Ignorance is strength?","translated_title":"","metadata":{"publisher":"Routledge","publication_date":{"day":null,"month":null,"year":2015,"errors":{}},"publication_name":"Routledge International Handbook of Ignorance Studies"},"translated_abstract":null,"internal_url":"https://www.academia.edu/80514172/Ignorance_is_strength","translated_internal_url":"","created_at":"2022-06-02T01:48:01.176-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Ignorance_is_strength","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":953669,"name":"Routledge","url":"https://www.academia.edu/Documents/in/Routledge"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-80514172-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="80514108"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/80514108/On_the_Dual_Uses_of_Science_and_Ethics_Principles_Practices_and_Prospects"><img alt="Research paper thumbnail of On the Dual Uses of Science and Ethics Principles, Practices, and Prospects" class="work-thumbnail" src="https://attachments.academia-assets.com/86870681/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/80514108/On_the_Dual_Uses_of_Science_and_Ethics_Principles_Practices_and_Prospects">On the Dual Uses of Science and Ethics Principles, Practices, and Prospects</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">and at the Marist college campus of Florence, Italy. Valentina is also Visiting Fellow at the Uni...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">and at the Marist college campus of Florence, Italy. Valentina is also Visiting Fellow at the University of Derby (UK). She maintains a close connection with the School for Social and International Studies at the University of Bradford, UK. Valentina has a degree in peace studies from the University of Pisa, an MA in conflict management and human rights from the Sant' Anna School of Advanced Studies, and a PhD from the University of Bradford. Dr Bartolucci has previously worked as a junior technical expert for the Italian Ministry of Foreign Affairs in Morocco, and as a consultant for various international organisations (in Italy, Burkina-Faso and India). She is currently offering consultancies on issues linked to terrorism, organised crime, migration, and American and Middle Eastern foreign policies for various national and international organisations as well as government departments around Europe. In recognition of her impact internationally, she was recently made a Member of the Aspen Institute (group 'I protagonisti italiani nel mondo'). In 2011, she was nominated for the Who's Who Academic Excellence. Apart from her doctoral thesis on the governmental discourse on terrorism, Dr Bartolucci has written numerous articles in the fields of politics, critical discourse analysis, security and surveillance. Her research mainly addresses the foreign and security policies of the United States and other states, terrorism and counterterrorism, discourses on threat and emergency, and strategic communication as anti-terrorism. She has recently been awarded with a Fulbright Research Scholar Bursary for 2013-14 to be spent at Arizona State University working on 'public diplomacy as anti-terrorism'.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="6d76b62ebf6b1b426dea2ebcdef55ebe" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":86870681,"asset_id":80514108,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/86870681/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80514108"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80514108"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80514108; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80514108]").text(description); $(".js-view-count[data-work-id=80514108]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80514108; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80514108']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "6d76b62ebf6b1b426dea2ebcdef55ebe" } } $('.js-work-strip[data-work-id=80514108]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80514108,"title":"On the Dual Uses of Science and Ethics Principles, Practices, and Prospects","translated_title":"","metadata":{"publisher":"ANU Press","grobid_abstract":"and at the Marist college campus of Florence, Italy. Valentina is also Visiting Fellow at the University of Derby (UK). She maintains a close connection with the School for Social and International Studies at the University of Bradford, UK. Valentina has a degree in peace studies from the University of Pisa, an MA in conflict management and human rights from the Sant' Anna School of Advanced Studies, and a PhD from the University of Bradford. Dr Bartolucci has previously worked as a junior technical expert for the Italian Ministry of Foreign Affairs in Morocco, and as a consultant for various international organisations (in Italy, Burkina-Faso and India). She is currently offering consultancies on issues linked to terrorism, organised crime, migration, and American and Middle Eastern foreign policies for various national and international organisations as well as government departments around Europe. In recognition of her impact internationally, she was recently made a Member of the Aspen Institute (group 'I protagonisti italiani nel mondo'). In 2011, she was nominated for the Who's Who Academic Excellence. Apart from her doctoral thesis on the governmental discourse on terrorism, Dr Bartolucci has written numerous articles in the fields of politics, critical discourse analysis, security and surveillance. Her research mainly addresses the foreign and security policies of the United States and other states, terrorism and counterterrorism, discourses on threat and emergency, and strategic communication as anti-terrorism. She has recently been awarded with a Fulbright Research Scholar Bursary for 2013-14 to be spent at Arizona State University working on 'public diplomacy as anti-terrorism'.","publication_date":{"day":null,"month":null,"year":2013,"errors":{}},"grobid_abstract_attachment_id":86870681},"translated_abstract":null,"internal_url":"https://www.academia.edu/80514108/On_the_Dual_Uses_of_Science_and_Ethics_Principles_Practices_and_Prospects","translated_internal_url":"","created_at":"2022-06-02T01:47:07.274-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":86870681,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86870681/thumbnails/1.jpg","file_name":"external_content.pdf","download_url":"https://www.academia.edu/attachments/86870681/download_file","bulk_download_file_name":"On_the_Dual_Uses_of_Science_and_Ethics_P.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86870681/external_content-libre.pdf?1654161144=\u0026response-content-disposition=attachment%3B+filename%3DOn_the_Dual_Uses_of_Science_and_Ethics_P.pdf\u0026Expires=1743668354\u0026Signature=MqSo~Ih372oRB9P389L~7TLIYoL0YXcebRDEGAbCxuBCBBLpfzGYJI0COYnHTBepIlzzjiHvQ3QIuL8P33cxW4A0LSuN68fwTrAD08FJq-wTZCTnNgtzz7gyfeI707nFi3Z9Tjs~wL~yqis50tsuUHn520CsqJIDrTXR6H4K1lei-9Hi1Uw4KILaWfXKxMywbJ~y0h7rUX2E2He9byjyZDi3vOsYF0vQFwhRP6IlOb2L~13aTnNehCxgyrPc8BLooM-n83tIuY8D-iYKQzZStRJCD7rw0tmZe8-X2yz5Pr-GFRqPdmYilW78ziS3zl3C2SjEeZaE3KkaxtOE0PpucQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"On_the_Dual_Uses_of_Science_and_Ethics_Principles_Practices_and_Prospects","translated_slug":"","page_count":410,"language":"en","content_type":"Work","summary":"and at the Marist college campus of Florence, Italy. Valentina is also Visiting Fellow at the University of Derby (UK). She maintains a close connection with the School for Social and International Studies at the University of Bradford, UK. Valentina has a degree in peace studies from the University of Pisa, an MA in conflict management and human rights from the Sant' Anna School of Advanced Studies, and a PhD from the University of Bradford. Dr Bartolucci has previously worked as a junior technical expert for the Italian Ministry of Foreign Affairs in Morocco, and as a consultant for various international organisations (in Italy, Burkina-Faso and India). She is currently offering consultancies on issues linked to terrorism, organised crime, migration, and American and Middle Eastern foreign policies for various national and international organisations as well as government departments around Europe. In recognition of her impact internationally, she was recently made a Member of the Aspen Institute (group 'I protagonisti italiani nel mondo'). In 2011, she was nominated for the Who's Who Academic Excellence. Apart from her doctoral thesis on the governmental discourse on terrorism, Dr Bartolucci has written numerous articles in the fields of politics, critical discourse analysis, security and surveillance. Her research mainly addresses the foreign and security policies of the United States and other states, terrorism and counterterrorism, discourses on threat and emergency, and strategic communication as anti-terrorism. She has recently been awarded with a Fulbright Research Scholar Bursary for 2013-14 to be spent at Arizona State University working on 'public diplomacy as anti-terrorism'.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":86870681,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86870681/thumbnails/1.jpg","file_name":"external_content.pdf","download_url":"https://www.academia.edu/attachments/86870681/download_file","bulk_download_file_name":"On_the_Dual_Uses_of_Science_and_Ethics_P.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86870681/external_content-libre.pdf?1654161144=\u0026response-content-disposition=attachment%3B+filename%3DOn_the_Dual_Uses_of_Science_and_Ethics_P.pdf\u0026Expires=1743668354\u0026Signature=MqSo~Ih372oRB9P389L~7TLIYoL0YXcebRDEGAbCxuBCBBLpfzGYJI0COYnHTBepIlzzjiHvQ3QIuL8P33cxW4A0LSuN68fwTrAD08FJq-wTZCTnNgtzz7gyfeI707nFi3Z9Tjs~wL~yqis50tsuUHn520CsqJIDrTXR6H4K1lei-9Hi1Uw4KILaWfXKxMywbJ~y0h7rUX2E2He9byjyZDi3vOsYF0vQFwhRP6IlOb2L~13aTnNehCxgyrPc8BLooM-n83tIuY8D-iYKQzZStRJCD7rw0tmZe8-X2yz5Pr-GFRqPdmYilW78ziS3zl3C2SjEeZaE3KkaxtOE0PpucQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"},{"id":82713,"name":"Engineering Ethics","url":"https://www.academia.edu/Documents/in/Engineering_Ethics"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-80514108-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="80514027"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/80514027/Replanteando_el_secreto_y_la_revelaci%C3%B3n_lo_que_pueden_ofrecer_los_estudios_de_ciencia_y_tecnolog%C3%ADa_a_nuesta_comprensi%C3%B3n_de_la_tecnolog%C3%ADa_militar_y_el_Estado"><img alt="Research paper thumbnail of Replanteando el secreto y la revelación: lo que pueden ofrecer los estudios de ciencia y tecnología a nuesta comprensión de la tecnología militar y el Estado" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Replanteando el secreto y la revelación: lo que pueden ofrecer los estudios de ciencia y tecnología a nuesta comprensión de la tecnología militar y el Estado</div><div class="wp-workCard_item"><span>Ciencia Y Fascismos La Ciencia Espanola De Posguerra 2009 Isbn 978 84 7584 657 6 Pags 303 330</span><span>, 2009</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80514027"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80514027"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80514027; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80514027]").text(description); $(".js-view-count[data-work-id=80514027]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80514027; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80514027']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=80514027]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80514027,"title":"Replanteando el secreto y la revelación: lo que pueden ofrecer los estudios de ciencia y tecnología a nuesta comprensión de la tecnología militar y el Estado","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2009,"errors":{}},"publication_name":"Ciencia Y Fascismos La Ciencia Espanola De Posguerra 2009 Isbn 978 84 7584 657 6 Pags 303 330"},"translated_abstract":null,"internal_url":"https://www.academia.edu/80514027/Replanteando_el_secreto_y_la_revelaci%C3%B3n_lo_que_pueden_ofrecer_los_estudios_de_ciencia_y_tecnolog%C3%ADa_a_nuesta_comprensi%C3%B3n_de_la_tecnolog%C3%ADa_militar_y_el_Estado","translated_internal_url":"","created_at":"2022-06-02T01:45:54.196-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Replanteando_el_secreto_y_la_revelación_lo_que_pueden_ofrecer_los_estudios_de_ciencia_y_tecnología_a_nuesta_comprensión_de_la_tecnología_militar_y_el_Estado","translated_slug":"","page_count":null,"language":"es","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[],"urls":[{"id":21019596,"url":"http://dialnet.unirioja.es/servlet/articulo?codigo=3306378"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-80514027-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="80513982"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/80513982/The_Narrative_Shaping_of_a_Product_Creaction_Process"><img alt="Research paper thumbnail of The Narrative Shaping of a Product Creaction Process" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">The Narrative Shaping of a Product Creaction Process</div><div class="wp-workCard_item"><span>Futures</span><span>, 2000</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80513982"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80513982"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80513982; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80513982]").text(description); $(".js-view-count[data-work-id=80513982]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80513982; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80513982']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=80513982]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80513982,"title":"The Narrative Shaping of a Product Creaction Process","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2000,"errors":{}},"publication_name":"Futures"},"translated_abstract":null,"internal_url":"https://www.academia.edu/80513982/The_Narrative_Shaping_of_a_Product_Creaction_Process","translated_internal_url":"","created_at":"2022-06-02T01:45:17.026-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"The_Narrative_Shaping_of_a_Product_Creaction_Process","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology"},{"id":2852,"name":"Narrative","url":"https://www.academia.edu/Documents/in/Narrative"},{"id":111757,"name":"Futures","url":"https://www.academia.edu/Documents/in/Futures"},{"id":581723,"name":"Ashgate","url":"https://www.academia.edu/Documents/in/Ashgate"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-80513982-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="80513937"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/80513937/Constructions_of_Legitimate_Force_The_Case_of_CS_Sprays"><img alt="Research paper thumbnail of Constructions of Legitimate Force. The Case of CS Sprays" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Constructions of Legitimate Force. The Case of CS Sprays</div><div class="wp-workCard_item"><span>British Journal of Criminology</span><span>, 2002</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The use of force by the police is an area of significant concern both within and outside the poli...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The use of force by the police is an area of significant concern both within and outside the police. The police struggle to find effective but publicly acceptable options. Recently in the United Kingdom, the deployment of CS chemical incapacitant sprays has emerged as a key initiative in the protection of officers and the enforcement of the law. Yet, the sprays have proved controversial. Reflecting debates within criminology about the contribution of police tactics and equipment to public disorder, radically different assessments of the sprays have been offered. This paper examines the conditions under which assessments of the legitimacy of the CS sprays are made. The findings of this paper suggest the need to reframe existing analysis of the use of force.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80513937"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80513937"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80513937; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80513937]").text(description); $(".js-view-count[data-work-id=80513937]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80513937; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80513937']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=80513937]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80513937,"title":"Constructions of Legitimate Force. The Case of CS Sprays","translated_title":"","metadata":{"abstract":"The use of force by the police is an area of significant concern both within and outside the police. The police struggle to find effective but publicly acceptable options. Recently in the United Kingdom, the deployment of CS chemical incapacitant sprays has emerged as a key initiative in the protection of officers and the enforcement of the law. Yet, the sprays have proved controversial. Reflecting debates within criminology about the contribution of police tactics and equipment to public disorder, radically different assessments of the sprays have been offered. This paper examines the conditions under which assessments of the legitimacy of the CS sprays are made. The findings of this paper suggest the need to reframe existing analysis of the use of force.","publisher":"Oxford University Press (OUP)","publication_date":{"day":null,"month":null,"year":2002,"errors":{}},"publication_name":"British Journal of Criminology"},"translated_abstract":"The use of force by the police is an area of significant concern both within and outside the police. The police struggle to find effective but publicly acceptable options. Recently in the United Kingdom, the deployment of CS chemical incapacitant sprays has emerged as a key initiative in the protection of officers and the enforcement of the law. Yet, the sprays have proved controversial. Reflecting debates within criminology about the contribution of police tactics and equipment to public disorder, radically different assessments of the sprays have been offered. This paper examines the conditions under which assessments of the legitimacy of the CS sprays are made. The findings of this paper suggest the need to reframe existing analysis of the use of force.","internal_url":"https://www.academia.edu/80513937/Constructions_of_Legitimate_Force_The_Case_of_CS_Sprays","translated_internal_url":"","created_at":"2022-06-02T01:44:28.954-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Constructions_of_Legitimate_Force_The_Case_of_CS_Sprays","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"The use of force by the police is an area of significant concern both within and outside the police. The police struggle to find effective but publicly acceptable options. Recently in the United Kingdom, the deployment of CS chemical incapacitant sprays has emerged as a key initiative in the protection of officers and the enforcement of the law. Yet, the sprays have proved controversial. Reflecting debates within criminology about the contribution of police tactics and equipment to public disorder, radically different assessments of the sprays have been offered. This paper examines the conditions under which assessments of the legitimacy of the CS sprays are made. The findings of this paper suggest the need to reframe existing analysis of the use of force.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology"},{"id":534,"name":"Law","url":"https://www.academia.edu/Documents/in/Law"},{"id":69856,"name":"Social Science Research Network","url":"https://www.academia.edu/Documents/in/Social_Science_Research_Network"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-80513937-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="80513885"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/80513885/Non_lethal_Weapons_as_Legitimising_Forces"><img alt="Research paper thumbnail of Non-lethal Weapons as Legitimising Forces?" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Non-lethal Weapons as Legitimising Forces?</div><div class="wp-workCard_item"><span>Non-lethal Weapons as Legitimising Forces?</span><span>, 2004</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Part 1 Claims and expectations: what&#39;s in a name? tools of the trade threats and promises. Pa...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Part 1 Claims and expectations: what&#39;s in a name? tools of the trade threats and promises. Part 2 Technologies, contexts and controls: weapons of minimal harm? assessing effects on to the streets - examining major deployments of non-lethals controlling evaluations - the prospects for prohibitions. Part 3 Case studies: CS sprays in Britain gauging electroshock weapons humanitarian interventions, humanitarian tools?. Conclusions and recommendations.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80513885"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80513885"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80513885; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80513885]").text(description); $(".js-view-count[data-work-id=80513885]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80513885; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80513885']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=80513885]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80513885,"title":"Non-lethal Weapons as Legitimising Forces?","translated_title":"","metadata":{"abstract":"Part 1 Claims and expectations: what\u0026#39;s in a name? tools of the trade threats and promises. Part 2 Technologies, contexts and controls: weapons of minimal harm? assessing effects on to the streets - examining major deployments of non-lethals controlling evaluations - the prospects for prohibitions. Part 3 Case studies: CS sprays in Britain gauging electroshock weapons humanitarian interventions, humanitarian tools?. Conclusions and recommendations.","publisher":"Routledge","publication_date":{"day":null,"month":null,"year":2004,"errors":{}},"publication_name":"Non-lethal Weapons as Legitimising Forces?"},"translated_abstract":"Part 1 Claims and expectations: what\u0026#39;s in a name? tools of the trade threats and promises. Part 2 Technologies, contexts and controls: weapons of minimal harm? assessing effects on to the streets - examining major deployments of non-lethals controlling evaluations - the prospects for prohibitions. Part 3 Case studies: CS sprays in Britain gauging electroshock weapons humanitarian interventions, humanitarian tools?. Conclusions and recommendations.","internal_url":"https://www.academia.edu/80513885/Non_lethal_Weapons_as_Legitimising_Forces","translated_internal_url":"","created_at":"2022-06-02T01:43:47.877-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Non_lethal_Weapons_as_Legitimising_Forces","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"Part 1 Claims and expectations: what\u0026#39;s in a name? tools of the trade threats and promises. Part 2 Technologies, contexts and controls: weapons of minimal harm? assessing effects on to the streets - examining major deployments of non-lethals controlling evaluations - the prospects for prohibitions. Part 3 Case studies: CS sprays in Britain gauging electroshock weapons humanitarian interventions, humanitarian tools?. Conclusions and recommendations.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-80513885-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="80513865"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/80513865/On_conveying_and_not_conveying_expertise"><img alt="Research paper thumbnail of On conveying and not conveying expertise" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">On conveying and not conveying expertise</div><div class="wp-workCard_item"><span>Social Studies of Science</span><span>, 2015</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">This article attends to the movement between disclosing and non-disclosing in accounts of experti...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">This article attends to the movement between disclosing and non-disclosing in accounts of expertise. While referencing discussions about tacit knowledge (&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;experts know more than they can say&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;) and the politics of non-disclosure (&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;withholding can help as well as harm the credibility of experts&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;), in the main it considers how experts move between conveying and not conveying in order to make their proficiencies recognized and accessible to others. The article examines this movement through a form that partakes in it, thus drawing attention to conventions and tensions in how authors make themselves accountable, and their subject matter available, to audiences. It thereby proposes to explore the possibilities of careful, and generative, non-disclosure as part of expert writing practices.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80513865"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80513865"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80513865; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80513865]").text(description); $(".js-view-count[data-work-id=80513865]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80513865; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80513865']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=80513865]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80513865,"title":"On conveying and not conveying expertise","translated_title":"","metadata":{"abstract":"This article attends to the movement between disclosing and non-disclosing in accounts of expertise. While referencing discussions about tacit knowledge (\u0026amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;experts know more than they can say\u0026amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;) and the politics of non-disclosure (\u0026amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;withholding can help as well as harm the credibility of experts\u0026amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;), in the main it considers how experts move between conveying and not conveying in order to make their proficiencies recognized and accessible to others. The article examines this movement through a form that partakes in it, thus drawing attention to conventions and tensions in how authors make themselves accountable, and their subject matter available, to audiences. It thereby proposes to explore the possibilities of careful, and generative, non-disclosure as part of expert writing practices.","publisher":"SAGE Publications","publication_date":{"day":null,"month":null,"year":2015,"errors":{}},"publication_name":"Social Studies of Science"},"translated_abstract":"This article attends to the movement between disclosing and non-disclosing in accounts of expertise. While referencing discussions about tacit knowledge (\u0026amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;experts know more than they can say\u0026amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;) and the politics of non-disclosure (\u0026amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;withholding can help as well as harm the credibility of experts\u0026amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;), in the main it considers how experts move between conveying and not conveying in order to make their proficiencies recognized and accessible to others. The article examines this movement through a form that partakes in it, thus drawing attention to conventions and tensions in how authors make themselves accountable, and their subject matter available, to audiences. It thereby proposes to explore the possibilities of careful, and generative, non-disclosure as part of expert writing practices.","internal_url":"https://www.academia.edu/80513865/On_conveying_and_not_conveying_expertise","translated_internal_url":"","created_at":"2022-06-02T01:43:26.251-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"On_conveying_and_not_conveying_expertise","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"This article attends to the movement between disclosing and non-disclosing in accounts of expertise. While referencing discussions about tacit knowledge (\u0026amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;experts know more than they can say\u0026amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;) and the politics of non-disclosure (\u0026amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;withholding can help as well as harm the credibility of experts\u0026amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;#39;), in the main it considers how experts move between conveying and not conveying in order to make their proficiencies recognized and accessible to others. The article examines this movement through a form that partakes in it, thus drawing attention to conventions and tensions in how authors make themselves accountable, and their subject matter available, to audiences. It thereby proposes to explore the possibilities of careful, and generative, non-disclosure as part of expert writing practices.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":1851,"name":"Expertise","url":"https://www.academia.edu/Documents/in/Expertise"},{"id":6941,"name":"Sociology of Expertise","url":"https://www.academia.edu/Documents/in/Sociology_of_Expertise"},{"id":21500,"name":"Social Studies Of Science","url":"https://www.academia.edu/Documents/in/Social_Studies_Of_Science"},{"id":24837,"name":"Peer Review","url":"https://www.academia.edu/Documents/in/Peer_Review"},{"id":64667,"name":"Disclosure","url":"https://www.academia.edu/Documents/in/Disclosure"},{"id":1744493,"name":"Science and Technology Studies","url":"https://www.academia.edu/Documents/in/Science_and_Technology_Studies"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-80513865-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="80513853"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/80513853/The_roles_of_civil_society_in_the_development_of_standards_around_new_weapons_and_other_technologies_of_warfare"><img alt="Research paper thumbnail of The roles of civil society in the development of standards around new weapons and other technologies of warfare" class="work-thumbnail" src="https://attachments.academia-assets.com/86870506/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/80513853/The_roles_of_civil_society_in_the_development_of_standards_around_new_weapons_and_other_technologies_of_warfare">The roles of civil society in the development of standards around new weapons and other technologies of warfare</a></div><div class="wp-workCard_item"><span>International Review of the Red Cross</span><span>, 2012</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">This article considers the role of civil society in the development of new standards around weapo...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">This article considers the role of civil society in the development of new standards around weapons. The broad but informal roles that civil society has undertaken are contrasted with the relatively narrow review mechanisms adopted by states in fulfilment of their legal obligations. Such review mechanisms are also considered in the context of wider thinking about processes by which society considers new technologies that may be adopted into the public sphere. The article concludes that formalized review mechanisms, such as those undertaken in terms of Article 36 of Additional Protocol I (1977) of the Geneva Conventions of 1949, should be a focus of civil society attention in their own right as part of efforts to strengthen standard-setting in relation to emerging military technologies.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="0ff322ab8e04c6af07e87d7dd422c88c" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":86870506,"asset_id":80513853,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/86870506/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80513853"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80513853"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80513853; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80513853]").text(description); $(".js-view-count[data-work-id=80513853]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80513853; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80513853']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "0ff322ab8e04c6af07e87d7dd422c88c" } } $('.js-work-strip[data-work-id=80513853]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80513853,"title":"The roles of civil society in the development of standards around new weapons and other technologies of warfare","translated_title":"","metadata":{"abstract":"This article considers the role of civil society in the development of new standards around weapons. The broad but informal roles that civil society has undertaken are contrasted with the relatively narrow review mechanisms adopted by states in fulfilment of their legal obligations. Such review mechanisms are also considered in the context of wider thinking about processes by which society considers new technologies that may be adopted into the public sphere. The article concludes that formalized review mechanisms, such as those undertaken in terms of Article 36 of Additional Protocol I (1977) of the Geneva Conventions of 1949, should be a focus of civil society attention in their own right as part of efforts to strengthen standard-setting in relation to emerging military technologies.","publisher":"Cambridge University Press (CUP)","ai_title_tag":"Civil Society's Role in Setting Standards for New Warfare Technologies","publication_date":{"day":null,"month":null,"year":2012,"errors":{}},"publication_name":"International Review of the Red Cross"},"translated_abstract":"This article considers the role of civil society in the development of new standards around weapons. The broad but informal roles that civil society has undertaken are contrasted with the relatively narrow review mechanisms adopted by states in fulfilment of their legal obligations. Such review mechanisms are also considered in the context of wider thinking about processes by which society considers new technologies that may be adopted into the public sphere. The article concludes that formalized review mechanisms, such as those undertaken in terms of Article 36 of Additional Protocol I (1977) of the Geneva Conventions of 1949, should be a focus of civil society attention in their own right as part of efforts to strengthen standard-setting in relation to emerging military technologies.","internal_url":"https://www.academia.edu/80513853/The_roles_of_civil_society_in_the_development_of_standards_around_new_weapons_and_other_technologies_of_warfare","translated_internal_url":"","created_at":"2022-06-02T01:43:07.499-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":86870506,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86870506/thumbnails/1.jpg","file_name":"irrc-886-rappert-moyes-crowe-nash.pdf","download_url":"https://www.academia.edu/attachments/86870506/download_file","bulk_download_file_name":"The_roles_of_civil_society_in_the_develo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86870506/irrc-886-rappert-moyes-crowe-nash-libre.pdf?1654161133=\u0026response-content-disposition=attachment%3B+filename%3DThe_roles_of_civil_society_in_the_develo.pdf\u0026Expires=1743668354\u0026Signature=ZUxay6eijayj9-7UFGhaaOESb4Bz44Nxpe~N9vNz51i0FEqRq3dc~23Er4eMrRLG-k3n1IcbK7Cf3KKwZmlbX0fV4bDvwyB6NjIfqjdTvwq8VwBWD3whcUUX4nav2AD6XlfnJLOyDiGV1Uk5z1RNddnqRclrTAZrZaufwXgUc8tSBN-6E2SdpO3cwKA-DBi-L--srMRpLBKSdkvygGmyWcSRwKFjy5pm-OyXIfUfLhVdnOn7LSPLpq7y0ZsUfZd8BIrFUrSuhWufZe5s3jbKQIZcixHVKLcxz5T8mPVD7dtNvfna4bXophKgqOlBF3TScvvAtJiV2cZzWXdfE-oU3w__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"The_roles_of_civil_society_in_the_development_of_standards_around_new_weapons_and_other_technologies_of_warfare","translated_slug":"","page_count":21,"language":"en","content_type":"Work","summary":"This article considers the role of civil society in the development of new standards around weapons. The broad but informal roles that civil society has undertaken are contrasted with the relatively narrow review mechanisms adopted by states in fulfilment of their legal obligations. Such review mechanisms are also considered in the context of wider thinking about processes by which society considers new technologies that may be adopted into the public sphere. The article concludes that formalized review mechanisms, such as those undertaken in terms of Article 36 of Additional Protocol I (1977) of the Geneva Conventions of 1949, should be a focus of civil society attention in their own right as part of efforts to strengthen standard-setting in relation to emerging military technologies.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":86870506,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86870506/thumbnails/1.jpg","file_name":"irrc-886-rappert-moyes-crowe-nash.pdf","download_url":"https://www.academia.edu/attachments/86870506/download_file","bulk_download_file_name":"The_roles_of_civil_society_in_the_develo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86870506/irrc-886-rappert-moyes-crowe-nash-libre.pdf?1654161133=\u0026response-content-disposition=attachment%3B+filename%3DThe_roles_of_civil_society_in_the_develo.pdf\u0026Expires=1743668354\u0026Signature=ZUxay6eijayj9-7UFGhaaOESb4Bz44Nxpe~N9vNz51i0FEqRq3dc~23Er4eMrRLG-k3n1IcbK7Cf3KKwZmlbX0fV4bDvwyB6NjIfqjdTvwq8VwBWD3whcUUX4nav2AD6XlfnJLOyDiGV1Uk5z1RNddnqRclrTAZrZaufwXgUc8tSBN-6E2SdpO3cwKA-DBi-L--srMRpLBKSdkvygGmyWcSRwKFjy5pm-OyXIfUfLhVdnOn7LSPLpq7y0ZsUfZd8BIrFUrSuhWufZe5s3jbKQIZcixHVKLcxz5T8mPVD7dtNvfna4bXophKgqOlBF3TScvvAtJiV2cZzWXdfE-oU3w__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"},{"id":11665,"name":"International Humanitarian Law","url":"https://www.academia.edu/Documents/in/International_Humanitarian_Law"},{"id":21852,"name":"Governance and Civil Society","url":"https://www.academia.edu/Documents/in/Governance_and_Civil_Society"},{"id":361113,"name":"The Red Cross","url":"https://www.academia.edu/Documents/in/The_Red_Cross"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-80513853-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="80513846"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/80513846/Why_has_Not_There_been_More_Research_of_Concern"><img alt="Research paper thumbnail of Why has Not There been More Research of Concern?" class="work-thumbnail" src="https://attachments.academia-assets.com/86870500/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/80513846/Why_has_Not_There_been_More_Research_of_Concern">Why has Not There been More Research of Concern?</a></div><div class="wp-workCard_item"><span>Frontiers in public health</span><span>, 2014</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Amid the renewed concern in the last several years about the potential for life science research ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Amid the renewed concern in the last several years about the potential for life science research to facilitate the spread of disease, a central plank of the policy response has been to enact processes for assessing the risks and benefits of &quot;research of concern.&quot; The recent controversy regarding a proposed redaction of work on the modification of a H5N1 avian influenza virus is perhaps the most prominent such instance. And yet, a noteworthy feature of this case is its exceptionalness. In the last 10 years, life science publishers, funders, and labs have rarely identified any research as &quot;of concern,&quot; let alone proposed censors. This article takes this experience with risk assessment as an invitation for reflection. Reasons for the low number of instances of concern are related to how the biosecurity dimensions of the life sciences are identified, how they are described, how the assessments of benefits and risks are undertaken, how value considerations do and do n...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="ed76d5121868dd981edb35186087b03e" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":86870500,"asset_id":80513846,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/86870500/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80513846"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80513846"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80513846; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80513846]").text(description); $(".js-view-count[data-work-id=80513846]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80513846; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80513846']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "ed76d5121868dd981edb35186087b03e" } } $('.js-work-strip[data-work-id=80513846]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80513846,"title":"Why has Not There been More Research of Concern?","translated_title":"","metadata":{"abstract":"Amid the renewed concern in the last several years about the potential for life science research to facilitate the spread of disease, a central plank of the policy response has been to enact processes for assessing the risks and benefits of \u0026quot;research of concern.\u0026quot; The recent controversy regarding a proposed redaction of work on the modification of a H5N1 avian influenza virus is perhaps the most prominent such instance. And yet, a noteworthy feature of this case is its exceptionalness. In the last 10 years, life science publishers, funders, and labs have rarely identified any research as \u0026quot;of concern,\u0026quot; let alone proposed censors. This article takes this experience with risk assessment as an invitation for reflection. Reasons for the low number of instances of concern are related to how the biosecurity dimensions of the life sciences are identified, how they are described, how the assessments of benefits and risks are undertaken, how value considerations do and do n...","publication_date":{"day":null,"month":null,"year":2014,"errors":{}},"publication_name":"Frontiers in public health"},"translated_abstract":"Amid the renewed concern in the last several years about the potential for life science research to facilitate the spread of disease, a central plank of the policy response has been to enact processes for assessing the risks and benefits of \u0026quot;research of concern.\u0026quot; The recent controversy regarding a proposed redaction of work on the modification of a H5N1 avian influenza virus is perhaps the most prominent such instance. And yet, a noteworthy feature of this case is its exceptionalness. In the last 10 years, life science publishers, funders, and labs have rarely identified any research as \u0026quot;of concern,\u0026quot; let alone proposed censors. This article takes this experience with risk assessment as an invitation for reflection. Reasons for the low number of instances of concern are related to how the biosecurity dimensions of the life sciences are identified, how they are described, how the assessments of benefits and risks are undertaken, how value considerations do and do n...","internal_url":"https://www.academia.edu/80513846/Why_has_Not_There_been_More_Research_of_Concern","translated_internal_url":"","created_at":"2022-06-02T01:42:56.129-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":86870500,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86870500/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/86870500/download_file","bulk_download_file_name":"Why_has_Not_There_been_More_Research_of.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86870500/pdf-libre.pdf?1654161145=\u0026response-content-disposition=attachment%3B+filename%3DWhy_has_Not_There_been_More_Research_of.pdf\u0026Expires=1743668354\u0026Signature=WQ6HS7Ckeu-Zfo1OQNHdddKL0Fa7MkwfQFUjlskVwfm-Q4ZEGYUa36D5GJtK9uGoZdLB-ANUguykEF4rqGq01Loi9IFrEwHo2Zj4FEKVC2LGTzwXdnRyJSORIW-f9oNG0AfincokitD1VaN3jf4LXOsp2fO6iKvFrrUeZ5cKz1p3cJil56L953Mk668~91NFKF24Y4Y8yjmBmRcfC~GOOsSRqcwUSeEXHxhNDLLg4qqOYMA-4eXsD~RHpRTBY5k2iUsdqlV-Hxz0Y6cw3AyfEApo~4g~5tsIkwRrqwqnI1GF3x-92rKe-36Qc-7YI0qG0JjbBgKIvv10WByCEA~Ixw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Why_has_Not_There_been_More_Research_of_Concern","translated_slug":"","page_count":14,"language":"en","content_type":"Work","summary":"Amid the renewed concern in the last several years about the potential for life science research to facilitate the spread of disease, a central plank of the policy response has been to enact processes for assessing the risks and benefits of \u0026quot;research of concern.\u0026quot; The recent controversy regarding a proposed redaction of work on the modification of a H5N1 avian influenza virus is perhaps the most prominent such instance. And yet, a noteworthy feature of this case is its exceptionalness. In the last 10 years, life science publishers, funders, and labs have rarely identified any research as \u0026quot;of concern,\u0026quot; let alone proposed censors. This article takes this experience with risk assessment as an invitation for reflection. Reasons for the low number of instances of concern are related to how the biosecurity dimensions of the life sciences are identified, how they are described, how the assessments of benefits and risks are undertaken, how value considerations do and do n...","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":86870500,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86870500/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/86870500/download_file","bulk_download_file_name":"Why_has_Not_There_been_More_Research_of.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86870500/pdf-libre.pdf?1654161145=\u0026response-content-disposition=attachment%3B+filename%3DWhy_has_Not_There_been_More_Research_of.pdf\u0026Expires=1743668354\u0026Signature=WQ6HS7Ckeu-Zfo1OQNHdddKL0Fa7MkwfQFUjlskVwfm-Q4ZEGYUa36D5GJtK9uGoZdLB-ANUguykEF4rqGq01Loi9IFrEwHo2Zj4FEKVC2LGTzwXdnRyJSORIW-f9oNG0AfincokitD1VaN3jf4LXOsp2fO6iKvFrrUeZ5cKz1p3cJil56L953Mk668~91NFKF24Y4Y8yjmBmRcfC~GOOsSRqcwUSeEXHxhNDLLg4qqOYMA-4eXsD~RHpRTBY5k2iUsdqlV-Hxz0Y6cw3AyfEApo~4g~5tsIkwRrqwqnI1GF3x-92rKe-36Qc-7YI0qG0JjbBgKIvv10WByCEA~Ixw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":4508,"name":"Biological Weapons","url":"https://www.academia.edu/Documents/in/Biological_Weapons"},{"id":22182,"name":"Precautionary Principle","url":"https://www.academia.edu/Documents/in/Precautionary_Principle"},{"id":26327,"name":"Medicine","url":"https://www.academia.edu/Documents/in/Medicine"},{"id":52867,"name":"Rationality","url":"https://www.academia.edu/Documents/in/Rationality"},{"id":56415,"name":"Biosecurity","url":"https://www.academia.edu/Documents/in/Biosecurity"},{"id":280205,"name":"Dual Use Techmology Defense Industry","url":"https://www.academia.edu/Documents/in/Dual_Use_Techmology_Defense_Industry"},{"id":1415883,"name":"Dual-use Research","url":"https://www.academia.edu/Documents/in/Dual-use_Research"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-80513846-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="80513839"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/80513839/Policing_Science_The_Lessons_of_Taser"><img alt="Research paper thumbnail of Policing Science: The Lessons of Taser" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Policing Science: The Lessons of Taser</div><div class="wp-workCard_item"><span>Policing</span><span>, 2014</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The introduction of the electric-shock weapon the Taser into England and Wales incorporates much ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The introduction of the electric-shock weapon the Taser into England and Wales incorporates much good practice, but also illustrates a series of broader lessons with wide-ranging implications for practitioners, social scientists and the relationship between them. In terms of the former, these include the need to: improve research design and methodologies; acknowledge what is unknown and undone; reform the basis of evidence gathering; value varied forms of expertise; and heed science when it is available. In terms of the latter, the article demonstrates the need for an appreciation of the wide range of purposes of policing research. One of the most powerful ways in which social scientists can add value is not just by contributing to the quantitative and qualitative evidence base but by critically analysing the evidence base itself, by paying careful attention to science that remains ‘undone’ and findings that remain ‘unheeded’. At a time when corporate and other vested interests are particularly vocal—and discussions are ongoing around the introduction of the next generation of Tasers into the UK--the involvement of social scientists in such discussions is not a luxury but an imperative.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80513839"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80513839"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80513839; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80513839]").text(description); $(".js-view-count[data-work-id=80513839]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80513839; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80513839']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=80513839]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80513839,"title":"Policing Science: The Lessons of Taser","translated_title":"","metadata":{"abstract":"The introduction of the electric-shock weapon the Taser into England and Wales incorporates much good practice, but also illustrates a series of broader lessons with wide-ranging implications for practitioners, social scientists and the relationship between them. In terms of the former, these include the need to: improve research design and methodologies; acknowledge what is unknown and undone; reform the basis of evidence gathering; value varied forms of expertise; and heed science when it is available. In terms of the latter, the article demonstrates the need for an appreciation of the wide range of purposes of policing research. One of the most powerful ways in which social scientists can add value is not just by contributing to the quantitative and qualitative evidence base but by critically analysing the evidence base itself, by paying careful attention to science that remains ‘undone’ and findings that remain ‘unheeded’. At a time when corporate and other vested interests are particularly vocal—and discussions are ongoing around the introduction of the next generation of Tasers into the UK--the involvement of social scientists in such discussions is not a luxury but an imperative.","publisher":"Oxford University Press (OUP)","publication_date":{"day":null,"month":null,"year":2014,"errors":{}},"publication_name":"Policing"},"translated_abstract":"The introduction of the electric-shock weapon the Taser into England and Wales incorporates much good practice, but also illustrates a series of broader lessons with wide-ranging implications for practitioners, social scientists and the relationship between them. In terms of the former, these include the need to: improve research design and methodologies; acknowledge what is unknown and undone; reform the basis of evidence gathering; value varied forms of expertise; and heed science when it is available. In terms of the latter, the article demonstrates the need for an appreciation of the wide range of purposes of policing research. One of the most powerful ways in which social scientists can add value is not just by contributing to the quantitative and qualitative evidence base but by critically analysing the evidence base itself, by paying careful attention to science that remains ‘undone’ and findings that remain ‘unheeded’. At a time when corporate and other vested interests are particularly vocal—and discussions are ongoing around the introduction of the next generation of Tasers into the UK--the involvement of social scientists in such discussions is not a luxury but an imperative.","internal_url":"https://www.academia.edu/80513839/Policing_Science_The_Lessons_of_Taser","translated_internal_url":"","created_at":"2022-06-02T01:42:42.789-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Policing_Science_The_Lessons_of_Taser","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"The introduction of the electric-shock weapon the Taser into England and Wales incorporates much good practice, but also illustrates a series of broader lessons with wide-ranging implications for practitioners, social scientists and the relationship between them. In terms of the former, these include the need to: improve research design and methodologies; acknowledge what is unknown and undone; reform the basis of evidence gathering; value varied forms of expertise; and heed science when it is available. In terms of the latter, the article demonstrates the need for an appreciation of the wide range of purposes of policing research. One of the most powerful ways in which social scientists can add value is not just by contributing to the quantitative and qualitative evidence base but by critically analysing the evidence base itself, by paying careful attention to science that remains ‘undone’ and findings that remain ‘unheeded’. At a time when corporate and other vested interests are particularly vocal—and discussions are ongoing around the introduction of the next generation of Tasers into the UK--the involvement of social scientists in such discussions is not a luxury but an imperative.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology"},{"id":54342,"name":"Policing","url":"https://www.academia.edu/Documents/in/Policing"},{"id":99309,"name":"Less Lethal Weapons","url":"https://www.academia.edu/Documents/in/Less_Lethal_Weapons"},{"id":761561,"name":"Less Lethal Weapon","url":"https://www.academia.edu/Documents/in/Less_Lethal_Weapon"},{"id":833346,"name":"Non Lethal Weapons","url":"https://www.academia.edu/Documents/in/Non_Lethal_Weapons"},{"id":1915247,"name":"TASER Electrical Weapons","url":"https://www.academia.edu/Documents/in/TASER_Electrical_Weapons"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-80513839-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="80513829"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/80513829/Zygmunt_Bauman_Dialectic_of_Modernity_Peter_Beilarz_London_Sage_2000_45_00_14_99_paperback_xi_180_pp_ISBN_0_76196734_X_The_Bauman_Reader_Peter_Beilarz_London_Blackwell_2000_15_99_paperback_xi_192_pp_ISBN_0_631_1492_5_"><img alt="Research paper thumbnail of Zygmunt Bauman: Dialectic of Modernity, Peter Beilarz, London: Sage, 2000, £45.00 (£14.99 paperback), xi+180 pp. (ISBN 0-76196734-X) The Bauman Reader, Peter Beilarz, London: Blackwell, 2000, £15.99 paperback, xi+192 pp. (ISBN 0-631-1492-5)" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Zygmunt Bauman: Dialectic of Modernity, Peter Beilarz, London: Sage, 2000, £45.00 (£14.99 paperback), xi+180 pp. (ISBN 0-76196734-X) The Bauman Reader, Peter Beilarz, London: Blackwell, 2000, £15.99 paperback, xi+192 pp. (ISBN 0-631-1492-5)</div><div class="wp-workCard_item"><span>Sociology</span><span>, 2001</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80513829"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80513829"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80513829; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80513829]").text(description); $(".js-view-count[data-work-id=80513829]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80513829; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80513829']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=80513829]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80513829,"title":"Zygmunt Bauman: Dialectic of Modernity, Peter Beilarz, London: Sage, 2000, £45.00 (£14.99 paperback), xi+180 pp. (ISBN 0-76196734-X) The Bauman Reader, Peter Beilarz, London: Blackwell, 2000, £15.99 paperback, xi+192 pp. (ISBN 0-631-1492-5)","translated_title":"","metadata":{"publisher":"Cambridge University Press (CUP)","publication_date":{"day":null,"month":null,"year":2001,"errors":{}},"publication_name":"Sociology"},"translated_abstract":null,"internal_url":"https://www.academia.edu/80513829/Zygmunt_Bauman_Dialectic_of_Modernity_Peter_Beilarz_London_Sage_2000_45_00_14_99_paperback_xi_180_pp_ISBN_0_76196734_X_The_Bauman_Reader_Peter_Beilarz_London_Blackwell_2000_15_99_paperback_xi_192_pp_ISBN_0_631_1492_5_","translated_internal_url":"","created_at":"2022-06-02T01:42:27.193-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Zygmunt_Bauman_Dialectic_of_Modernity_Peter_Beilarz_London_Sage_2000_45_00_14_99_paperback_xi_180_pp_ISBN_0_76196734_X_The_Bauman_Reader_Peter_Beilarz_London_Blackwell_2000_15_99_paperback_xi_192_pp_ISBN_0_631_1492_5_","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":null,"owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-80513829-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="80513782"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/80513782/Present_Absences_Hauntings_and_Whirlwinds_in_Graphy_"><img alt="Research paper thumbnail of Present Absences: Hauntings and Whirlwinds in “-Graphy”" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Present Absences: Hauntings and Whirlwinds in “-Graphy”</div><div class="wp-workCard_item"><span>Social Epistemology</span><span>, 2014</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Whether it pertains to what is not considered, what cannot be determined, what is not allowed to ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Whether it pertains to what is not considered, what cannot be determined, what is not allowed to be known, or what is deliberately concealed, absences figure as the constant shadows of what is made present by social research. This article explores the relation between what is presented and what is not by treating it first as a vexing conundrum for representation and then as a vehicle for understanding. The matters under examination include what is written about the social world as well as the methods of writing employed. This article seeks an orientation toward both aspects that attends to the binds, contradictions, and possibilities of depicting what is missing. That involves addressing how authors labor to render absences present, the criteria for assessment, as well as the metaphors that guide activities.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80513782"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80513782"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80513782; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80513782]").text(description); $(".js-view-count[data-work-id=80513782]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80513782; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80513782']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=80513782]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80513782,"title":"Present Absences: Hauntings and Whirlwinds in “-Graphy”","translated_title":"","metadata":{"abstract":"Whether it pertains to what is not considered, what cannot be determined, what is not allowed to be known, or what is deliberately concealed, absences figure as the constant shadows of what is made present by social research. This article explores the relation between what is presented and what is not by treating it first as a vexing conundrum for representation and then as a vehicle for understanding. The matters under examination include what is written about the social world as well as the methods of writing employed. This article seeks an orientation toward both aspects that attends to the binds, contradictions, and possibilities of depicting what is missing. That involves addressing how authors labor to render absences present, the criteria for assessment, as well as the metaphors that guide activities.","publisher":"Informa UK Limited","publication_date":{"day":null,"month":null,"year":2014,"errors":{}},"publication_name":"Social Epistemology"},"translated_abstract":"Whether it pertains to what is not considered, what cannot be determined, what is not allowed to be known, or what is deliberately concealed, absences figure as the constant shadows of what is made present by social research. This article explores the relation between what is presented and what is not by treating it first as a vexing conundrum for representation and then as a vehicle for understanding. The matters under examination include what is written about the social world as well as the methods of writing employed. This article seeks an orientation toward both aspects that attends to the binds, contradictions, and possibilities of depicting what is missing. That involves addressing how authors labor to render absences present, the criteria for assessment, as well as the metaphors that guide activities.","internal_url":"https://www.academia.edu/80513782/Present_Absences_Hauntings_and_Whirlwinds_in_Graphy_","translated_internal_url":"","created_at":"2022-06-02T01:41:57.036-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Present_Absences_Hauntings_and_Whirlwinds_in_Graphy_","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"Whether it pertains to what is not considered, what cannot be determined, what is not allowed to be known, or what is deliberately concealed, absences figure as the constant shadows of what is made present by social research. This article explores the relation between what is presented and what is not by treating it first as a vexing conundrum for representation and then as a vehicle for understanding. The matters under examination include what is written about the social world as well as the methods of writing employed. This article seeks an orientation toward both aspects that attends to the binds, contradictions, and possibilities of depicting what is missing. That involves addressing how authors labor to render absences present, the criteria for assessment, as well as the metaphors that guide activities.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science"},{"id":803,"name":"Philosophy","url":"https://www.academia.edu/Documents/in/Philosophy"},{"id":5276,"name":"Reflexivity","url":"https://www.academia.edu/Documents/in/Reflexivity"},{"id":13833,"name":"Social Epistemology","url":"https://www.academia.edu/Documents/in/Social_Epistemology"},{"id":14787,"name":"Reflexivity (Sociology)","url":"https://www.academia.edu/Documents/in/Reflexivity_Sociology_"},{"id":808459,"name":"Presence/absence","url":"https://www.academia.edu/Documents/in/Presence_absence"}],"urls":[{"id":21019492,"url":"http://www.tandfonline.com/doi/pdf/10.1080/02691728.2013.862876"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-80513782-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="80513552"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/80513552/Sensing_Absence_How_to_See_What_Isnt_There_in_the_Study_of_Science_and_Security"><img alt="Research paper thumbnail of Sensing Absence: How to See What Isn't There in the Study of Science and Security" class="work-thumbnail" src="https://attachments.academia-assets.com/86870319/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/80513552/Sensing_Absence_How_to_See_What_Isnt_There_in_the_Study_of_Science_and_Security">Sensing Absence: How to See What Isn't There in the Study of Science and Security</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">What is not of concern in social and political life is the ever-shifting shadow to what is of con...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">What is not of concern in social and political life is the ever-shifting shadow to what is of concern. 1 At any one time only certain topics will garner the limelight in public discussions. Yet, what remains off the agenda can be judged to be equally, if not more, important than what is so. This is perhaps most obviously evident in the manner priorities change over time and across locations. Swine flu, human trafficking, animal experimentation, HIV/AIDS, and Ebola outbreaks are just some instances of topics that have waxed and waned as matters of apprehension. Much the same can be said about how any topics come to be understood. While issues or events could be described in almost any number of ways, only certain framings are likely to be prevalent at a given time and place. Yet which ones are widespread can be highly consequential in suggesting what is at stake. As, for instance, James Revill and Brett Edwards note in their chapter in this volume, disfiguring acid attacks frequently perpetuated around the world are rarely described as chemical weapon attacks within the parlance of international diplomacy. Through the connections made and not, ways of seeing can obscure or sideline considerations. In this sense, presence and absence come bundled together in what is concealed within what is revealed. With any newfound heightened awareness, regard can be cast on the reasons for past indifference or apathy. For instance, some have argued that ethical, legal, and social analysis of science has often been reactive to scandals, catastrophes, experiments, and so on (rather than proactive in setting out a positive future agenda), and has tended to focus on new technologies (rather than the major public health problems measured in terms of burden of disease). 2 Likewise, avoiding "strategic surprise" by learning from the past has long led to soul-searching about</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="f11dcebacbf0de31e106cd805d8e41dd" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":86870319,"asset_id":80513552,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/86870319/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80513552"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80513552"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80513552; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80513552]").text(description); $(".js-view-count[data-work-id=80513552]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80513552; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80513552']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "f11dcebacbf0de31e106cd805d8e41dd" } } $('.js-work-strip[data-work-id=80513552]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80513552,"title":"Sensing Absence: How to See What Isn't There in the Study of Science and Security","translated_title":"","metadata":{"publisher":"Palgrave Macmillan University of Exeter University of Exeter ESRC/AHRC/Dstl grant","grobid_abstract":"What is not of concern in social and political life is the ever-shifting shadow to what is of concern. 1 At any one time only certain topics will garner the limelight in public discussions. Yet, what remains off the agenda can be judged to be equally, if not more, important than what is so. This is perhaps most obviously evident in the manner priorities change over time and across locations. Swine flu, human trafficking, animal experimentation, HIV/AIDS, and Ebola outbreaks are just some instances of topics that have waxed and waned as matters of apprehension. Much the same can be said about how any topics come to be understood. While issues or events could be described in almost any number of ways, only certain framings are likely to be prevalent at a given time and place. Yet which ones are widespread can be highly consequential in suggesting what is at stake. As, for instance, James Revill and Brett Edwards note in their chapter in this volume, disfiguring acid attacks frequently perpetuated around the world are rarely described as chemical weapon attacks within the parlance of international diplomacy. Through the connections made and not, ways of seeing can obscure or sideline considerations. In this sense, presence and absence come bundled together in what is concealed within what is revealed. With any newfound heightened awareness, regard can be cast on the reasons for past indifference or apathy. For instance, some have argued that ethical, legal, and social analysis of science has often been reactive to scandals, catastrophes, experiments, and so on (rather than proactive in setting out a positive future agenda), and has tended to focus on new technologies (rather than the major public health problems measured in terms of burden of disease). 2 Likewise, avoiding \"strategic surprise\" by learning from the past has long led to soul-searching about","publication_date":{"day":null,"month":null,"year":2015,"errors":{}},"grobid_abstract_attachment_id":86870319},"translated_abstract":null,"internal_url":"https://www.academia.edu/80513552/Sensing_Absence_How_to_See_What_Isnt_There_in_the_Study_of_Science_and_Security","translated_internal_url":"","created_at":"2022-06-02T01:38:22.658-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":86870319,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86870319/thumbnails/1.jpg","file_name":"10.1057_2F9781137493736_1.pdf","download_url":"https://www.academia.edu/attachments/86870319/download_file","bulk_download_file_name":"Sensing_Absence_How_to_See_What_Isnt_The.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86870319/10.1057_2F9781137493736_1-libre.pdf?1654161163=\u0026response-content-disposition=attachment%3B+filename%3DSensing_Absence_How_to_See_What_Isnt_The.pdf\u0026Expires=1743668354\u0026Signature=CqLDmR2OQBgywr1uzJDZPDQU3M28Mz5MY9kUBKUn0qdopihJoNbJjRg6dtBz1XCwoWteWuzm8Qb5nEzZaOPL8RMsdsxoJEilmelrcdcox70UA0hHNYwLUWRMm3NfdEm8RX1KJBNUWvPfZ9u-EP3RWuf9k6NQAJO8UeiHxHD1F6sGqE-zqeovC4Kl7jHGGZ5L-rL8rXRCMDMh-XTh5jny1bd-tdlioS4CCpw8zh7P0Z~TSaPu1TY-v90sFWVZLgJuFbMKI~AZuvTJH3yDu6TFK66lXXWict2LzTJQoaT6rANIJdOuVaAwPROk1ks7X4weR4PgItoLgs9PMl4ZhbyFUg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Sensing_Absence_How_to_See_What_Isnt_There_in_the_Study_of_Science_and_Security","translated_slug":"","page_count":31,"language":"en","content_type":"Work","summary":"What is not of concern in social and political life is the ever-shifting shadow to what is of concern. 1 At any one time only certain topics will garner the limelight in public discussions. Yet, what remains off the agenda can be judged to be equally, if not more, important than what is so. This is perhaps most obviously evident in the manner priorities change over time and across locations. Swine flu, human trafficking, animal experimentation, HIV/AIDS, and Ebola outbreaks are just some instances of topics that have waxed and waned as matters of apprehension. Much the same can be said about how any topics come to be understood. While issues or events could be described in almost any number of ways, only certain framings are likely to be prevalent at a given time and place. Yet which ones are widespread can be highly consequential in suggesting what is at stake. As, for instance, James Revill and Brett Edwards note in their chapter in this volume, disfiguring acid attacks frequently perpetuated around the world are rarely described as chemical weapon attacks within the parlance of international diplomacy. Through the connections made and not, ways of seeing can obscure or sideline considerations. In this sense, presence and absence come bundled together in what is concealed within what is revealed. With any newfound heightened awareness, regard can be cast on the reasons for past indifference or apathy. For instance, some have argued that ethical, legal, and social analysis of science has often been reactive to scandals, catastrophes, experiments, and so on (rather than proactive in setting out a positive future agenda), and has tended to focus on new technologies (rather than the major public health problems measured in terms of burden of disease). 2 Likewise, avoiding \"strategic surprise\" by learning from the past has long led to soul-searching about","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":86870319,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86870319/thumbnails/1.jpg","file_name":"10.1057_2F9781137493736_1.pdf","download_url":"https://www.academia.edu/attachments/86870319/download_file","bulk_download_file_name":"Sensing_Absence_How_to_See_What_Isnt_The.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86870319/10.1057_2F9781137493736_1-libre.pdf?1654161163=\u0026response-content-disposition=attachment%3B+filename%3DSensing_Absence_How_to_See_What_Isnt_The.pdf\u0026Expires=1743668354\u0026Signature=CqLDmR2OQBgywr1uzJDZPDQU3M28Mz5MY9kUBKUn0qdopihJoNbJjRg6dtBz1XCwoWteWuzm8Qb5nEzZaOPL8RMsdsxoJEilmelrcdcox70UA0hHNYwLUWRMm3NfdEm8RX1KJBNUWvPfZ9u-EP3RWuf9k6NQAJO8UeiHxHD1F6sGqE-zqeovC4Kl7jHGGZ5L-rL8rXRCMDMh-XTh5jny1bd-tdlioS4CCpw8zh7P0Z~TSaPu1TY-v90sFWVZLgJuFbMKI~AZuvTJH3yDu6TFK66lXXWict2LzTJQoaT6rANIJdOuVaAwPROk1ks7X4weR4PgItoLgs9PMl4ZhbyFUg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"},{"id":54424,"name":"science and technology studies (STS)","url":"https://www.academia.edu/Documents/in/science_and_technology_studies_STS_"},{"id":177340,"name":"Absence","url":"https://www.academia.edu/Documents/in/Absence"},{"id":808459,"name":"Presence/absence","url":"https://www.academia.edu/Documents/in/Presence_absence"},{"id":979537,"name":"Security Threat Groups","url":"https://www.academia.edu/Documents/in/Security_Threat_Groups"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-80513552-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="70755899"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/70755899/Science_Technology_and_the_Military_Priorities_Preoccupations_and_Possibilities"><img alt="Research paper thumbnail of Science, Technology and the Military: Priorities, Preoccupations and Possibilities" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title">Science, Technology and the Military: Priorities, Preoccupations and Possibilities</div><div class="wp-workCard_item"><span>The Handbook of Science and Technology Studies</span><span>, 2008</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The relationships between science, technology and the military have been an important topic of pu...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The relationships between science, technology and the military have been an important topic of public and political debate throughout the twentieth, and into the twenty-first, centuries (Edgerton, 1990; Mendelsohn, 1997). Since at least World War II, a substantial percentage of the world’s scientific and technological personnel and resources have been committed to defense-related endeavors. Nevertheless, despite the continuous importance attached to such efforts by governments, questions have always been asked about the effectiveness of, and the ends served by, military R&amp;D. Developments in international affairs have also produced misgivings about whether the basic assumptions underpinning such expenditure remained sound. Most recently, the attacks of 9/11 have led to widespread suggestions that “everything has changed” – not least with regard to perceptions of security threats and the legitimacy accorded to the use of military force. This, in turn, has produced counterclaims to the effect that very little has in fact altered.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="70755899"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="70755899"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 70755899; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=70755899]").text(description); $(".js-view-count[data-work-id=70755899]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 70755899; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='70755899']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=70755899]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":70755899,"title":"Science, Technology and the Military: Priorities, Preoccupations and Possibilities","translated_title":"","metadata":{"abstract":"The relationships between science, technology and the military have been an important topic of public and political debate throughout the twentieth, and into the twenty-first, centuries (Edgerton, 1990; Mendelsohn, 1997). Since at least World War II, a substantial percentage of the world’s scientific and technological personnel and resources have been committed to defense-related endeavors. Nevertheless, despite the continuous importance attached to such efforts by governments, questions have always been asked about the effectiveness of, and the ends served by, military R\u0026amp;D. Developments in international affairs have also produced misgivings about whether the basic assumptions underpinning such expenditure remained sound. Most recently, the attacks of 9/11 have led to widespread suggestions that “everything has changed” – not least with regard to perceptions of security threats and the legitimacy accorded to the use of military force. This, in turn, has produced counterclaims to the effect that very little has in fact altered.","publication_date":{"day":null,"month":null,"year":2008,"errors":{}},"publication_name":"The Handbook of Science and Technology Studies"},"translated_abstract":"The relationships between science, technology and the military have been an important topic of public and political debate throughout the twentieth, and into the twenty-first, centuries (Edgerton, 1990; Mendelsohn, 1997). Since at least World War II, a substantial percentage of the world’s scientific and technological personnel and resources have been committed to defense-related endeavors. Nevertheless, despite the continuous importance attached to such efforts by governments, questions have always been asked about the effectiveness of, and the ends served by, military R\u0026amp;D. Developments in international affairs have also produced misgivings about whether the basic assumptions underpinning such expenditure remained sound. Most recently, the attacks of 9/11 have led to widespread suggestions that “everything has changed” – not least with regard to perceptions of security threats and the legitimacy accorded to the use of military force. This, in turn, has produced counterclaims to the effect that very little has in fact altered.","internal_url":"https://www.academia.edu/70755899/Science_Technology_and_the_Military_Priorities_Preoccupations_and_Possibilities","translated_internal_url":"","created_at":"2022-02-06T14:55:06.856-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Science_Technology_and_the_Military_Priorities_Preoccupations_and_Possibilities","translated_slug":"","page_count":null,"language":"en","content_type":"Work","summary":"The relationships between science, technology and the military have been an important topic of public and political debate throughout the twentieth, and into the twenty-first, centuries (Edgerton, 1990; Mendelsohn, 1997). Since at least World War II, a substantial percentage of the world’s scientific and technological personnel and resources have been committed to defense-related endeavors. Nevertheless, despite the continuous importance attached to such efforts by governments, questions have always been asked about the effectiveness of, and the ends served by, military R\u0026amp;D. Developments in international affairs have also produced misgivings about whether the basic assumptions underpinning such expenditure remained sound. Most recently, the attacks of 9/11 have led to widespread suggestions that “everything has changed” – not least with regard to perceptions of security threats and the legitimacy accorded to the use of military force. This, in turn, has produced counterclaims to the effect that very little has in fact altered.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-70755899-figures'); } }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="3663742" id="secrecy"><div class="js-work-strip profile--work_container" data-work-id="16406752"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/16406752/Ignorance_is_Strength_Intelligence_Security_and_National_Secrets"><img alt="Research paper thumbnail of Ignorance is Strength? Intelligence, Security and National Secrets" class="work-thumbnail" src="https://attachments.academia-assets.com/38979869/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/16406752/Ignorance_is_Strength_Intelligence_Security_and_National_Secrets">Ignorance is Strength? Intelligence, Security and National Secrets</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Brian Rappert and Brian Balmer (2015). Ignorance is Strength? Intelligence, Security and National...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Brian Rappert and Brian Balmer (2015). Ignorance is Strength? Intelligence, Security and National Secrets. In: Gross, M. and L. McGoey (eds), Routledge International Handbook of Ignorance Studies. London: Routledge.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="8667ddd01b8cff7d0fd36acde7b8e158" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":38979869,"asset_id":16406752,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/38979869/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="16406752"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="16406752"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 16406752; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=16406752]").text(description); $(".js-view-count[data-work-id=16406752]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 16406752; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='16406752']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "8667ddd01b8cff7d0fd36acde7b8e158" } } $('.js-work-strip[data-work-id=16406752]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":16406752,"title":"Ignorance is Strength? Intelligence, Security and National Secrets","translated_title":"","metadata":{"abstract":"Brian Rappert and Brian Balmer (2015). Ignorance is Strength? Intelligence, Security and National Secrets. In: Gross, M. and L. McGoey (eds), Routledge International Handbook of Ignorance Studies. London: Routledge.","ai_title_tag":"Intelligence, Security, and the Role of National Secrets"},"translated_abstract":"Brian Rappert and Brian Balmer (2015). Ignorance is Strength? Intelligence, Security and National Secrets. In: Gross, M. and L. McGoey (eds), Routledge International Handbook of Ignorance Studies. London: Routledge.","internal_url":"https://www.academia.edu/16406752/Ignorance_is_Strength_Intelligence_Security_and_National_Secrets","translated_internal_url":"","created_at":"2015-10-02T09:26:48.319-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":38979869,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/38979869/thumbnails/1.jpg","file_name":"34_Routledge_Handbook_of_Ignorance_Studies_Proof_No_one-12.pdf","download_url":"https://www.academia.edu/attachments/38979869/download_file","bulk_download_file_name":"Ignorance_is_Strength_Intelligence_Secur.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/38979869/34_Routledge_Handbook_of_Ignorance_Studies_Proof_No_one-12-libre.pdf?1443803116=\u0026response-content-disposition=attachment%3B+filename%3DIgnorance_is_Strength_Intelligence_Secur.pdf\u0026Expires=1743668354\u0026Signature=bGJ3PgmaovrK~nRoE~SiollRxIbm6tdFiBVUI76LGDcQYsjVOpKN8V9ZgC1QgY4clkVMkt2aV85APcTwyqSJN0S5bMhweVhsUG6MAuQmOzt5kDSJC3cM3w~0Y58JZwnLls81PjOyscep0bUOzIZLg1HXmNuzdpH4orssXdjeAO1Qsaq--yLU6ozbJr3w7VBmDDifIdUrdG6CsDBg4qVutvwSvrpWRyiTEMdBx9X-eAJqqzoiAF5gzeEI5RKglW3-Z7p0J-nS4AK6B0BIO730l3isMZE9ZaXnvB5~t45OAtN8Kxm5xfB0joBGF2bqK8qC01xsM2eeycUiASNeGDIOAA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Ignorance_is_Strength_Intelligence_Security_and_National_Secrets","translated_slug":"","page_count":10,"language":"en","content_type":"Work","summary":"Brian Rappert and Brian Balmer (2015). Ignorance is Strength? Intelligence, Security and National Secrets. In: Gross, M. and L. McGoey (eds), Routledge International Handbook of Ignorance Studies. London: Routledge.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":38979869,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/38979869/thumbnails/1.jpg","file_name":"34_Routledge_Handbook_of_Ignorance_Studies_Proof_No_one-12.pdf","download_url":"https://www.academia.edu/attachments/38979869/download_file","bulk_download_file_name":"Ignorance_is_Strength_Intelligence_Secur.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/38979869/34_Routledge_Handbook_of_Ignorance_Studies_Proof_No_one-12-libre.pdf?1443803116=\u0026response-content-disposition=attachment%3B+filename%3DIgnorance_is_Strength_Intelligence_Secur.pdf\u0026Expires=1743668354\u0026Signature=bGJ3PgmaovrK~nRoE~SiollRxIbm6tdFiBVUI76LGDcQYsjVOpKN8V9ZgC1QgY4clkVMkt2aV85APcTwyqSJN0S5bMhweVhsUG6MAuQmOzt5kDSJC3cM3w~0Y58JZwnLls81PjOyscep0bUOzIZLg1HXmNuzdpH4orssXdjeAO1Qsaq--yLU6ozbJr3w7VBmDDifIdUrdG6CsDBg4qVutvwSvrpWRyiTEMdBx9X-eAJqqzoiAF5gzeEI5RKglW3-Z7p0J-nS4AK6B0BIO730l3isMZE9ZaXnvB5~t45OAtN8Kxm5xfB0joBGF2bqK8qC01xsM2eeycUiASNeGDIOAA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":2052,"name":"Intelligence Studies","url":"https://www.academia.edu/Documents/in/Intelligence_Studies"},{"id":6662,"name":"Secrecy","url":"https://www.academia.edu/Documents/in/Secrecy"},{"id":49819,"name":"Epistemologies of Ignorance","url":"https://www.academia.edu/Documents/in/Epistemologies_of_Ignorance"},{"id":217464,"name":"Ignorance","url":"https://www.academia.edu/Documents/in/Ignorance"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-16406752-figures'); } }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="3663745" id="absences"><div class="js-work-strip profile--work_container" data-work-id="17090947"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/17090947/Sensing_Absence_How_to_See_What_Isnt_There_in_the_Study_of_Science_and_Security"><img alt="Research paper thumbnail of Sensing Absence: How to See What Isn't There in the Study of Science and Security" class="work-thumbnail" src="https://attachments.academia-assets.com/39334078/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/17090947/Sensing_Absence_How_to_See_What_Isnt_There_in_the_Study_of_Science_and_Security">Sensing Absence: How to See What Isn't There in the Study of Science and Security</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">We all, in everyday life, routinely ignore far more things than we pay attention to. This is no l...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">We all, in everyday life, routinely ignore far more things than we pay attention to. This is no less the case in the science policy-making process, thus making the processes by which some matters become salient or absent open to empirical and theoretical investigation. In this respect, the edited volume "Absence in Science, Security and Policy" addresses two main questions: how can people and institutions concerned with the ethical, legal and social implications of science and medicine become more mindful about the implications they are not addressing? How can the recognition of such absences be translated into analysis that is practically relevant? The volume explores the absent and missing in debates about science and security. Through a range of case studies, including biological and chemical weapons control, science journalism, nanotechnology research and neuroethics, the contributors explore how matters become absent, ignored or forgotten and the implications of this for ethics, policy and society. The Introduction chapter "Sensing Absence" sets out the overall argument for the book.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="c3508c02c7fed15aeb7a7f64a4ac7b7f" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":39334078,"asset_id":17090947,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/39334078/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="17090947"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="17090947"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 17090947; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=17090947]").text(description); $(".js-view-count[data-work-id=17090947]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 17090947; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='17090947']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "c3508c02c7fed15aeb7a7f64a4ac7b7f" } } $('.js-work-strip[data-work-id=17090947]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":17090947,"title":"Sensing Absence: How to See What Isn't There in the Study of Science and Security","translated_title":"","metadata":{"abstract":"We all, in everyday life, routinely ignore far more things than we pay attention to. This is no less the case in the science policy-making process, thus making the processes by which some matters become salient or absent open to empirical and theoretical investigation. In this respect, the edited volume \"Absence in Science, Security and Policy\" addresses two main questions: how can people and institutions concerned with the ethical, legal and social implications of science and medicine become more mindful about the implications they are not addressing? How can the recognition of such absences be translated into analysis that is practically relevant? The volume explores the absent and missing in debates about science and security. Through a range of case studies, including biological and chemical weapons control, science journalism, nanotechnology research and neuroethics, the contributors explore how matters become absent, ignored or forgotten and the implications of this for ethics, policy and society. The Introduction chapter \"Sensing Absence\" sets out the overall argument for the book.","ai_title_tag":"Exploring Absences in Science and Security"},"translated_abstract":"We all, in everyday life, routinely ignore far more things than we pay attention to. This is no less the case in the science policy-making process, thus making the processes by which some matters become salient or absent open to empirical and theoretical investigation. In this respect, the edited volume \"Absence in Science, Security and Policy\" addresses two main questions: how can people and institutions concerned with the ethical, legal and social implications of science and medicine become more mindful about the implications they are not addressing? How can the recognition of such absences be translated into analysis that is practically relevant? The volume explores the absent and missing in debates about science and security. Through a range of case studies, including biological and chemical weapons control, science journalism, nanotechnology research and neuroethics, the contributors explore how matters become absent, ignored or forgotten and the implications of this for ethics, policy and society. The Introduction chapter \"Sensing Absence\" sets out the overall argument for the book.","internal_url":"https://www.academia.edu/17090947/Sensing_Absence_How_to_See_What_Isnt_There_in_the_Study_of_Science_and_Security","translated_internal_url":"","created_at":"2015-10-21T03:12:00.148-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":39334078,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/39334078/thumbnails/1.jpg","file_name":"Rappert_Introduction.pdf","download_url":"https://www.academia.edu/attachments/39334078/download_file","bulk_download_file_name":"Sensing_Absence_How_to_See_What_Isnt_The.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/39334078/Rappert_Introduction-libre.pdf?1445425097=\u0026response-content-disposition=attachment%3B+filename%3DSensing_Absence_How_to_See_What_Isnt_The.pdf\u0026Expires=1743668354\u0026Signature=ft~Xnt~fT-AIFtGGQtHmcZ2bJtYdyNOGqpvj19NmC35Pu7fkS3~nJPeDy09L4C-YvGoA~tTj6grOChn~TLOymhxctJ~nWoW2d7IVQ9NmM9ek4qrDaXpxFEPoFbHWlmh5GIbruFwC1Wz3YCmWJnMTaq~W4TDatVs5tLmykD7Hh~r-4JB~P5uYNDgnRy6-BiaBWbSzrWcay2fxlkWqrmgyxuWaFgYOrYsuO7UrclcGWB571Y601zitZqUU1F2Jw5sgHqJzxf40UZP9cTF0JU3T3ZBcUmFh9~7EtmZcRH5buA-D~3sWWlkzvYZusLBALtMACAlaReKNDWtIFaKaeAikdw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Sensing_Absence_How_to_See_What_Isnt_There_in_the_Study_of_Science_and_Security","translated_slug":"","page_count":35,"language":"en","content_type":"Work","summary":"We all, in everyday life, routinely ignore far more things than we pay attention to. This is no less the case in the science policy-making process, thus making the processes by which some matters become salient or absent open to empirical and theoretical investigation. In this respect, the edited volume \"Absence in Science, Security and Policy\" addresses two main questions: how can people and institutions concerned with the ethical, legal and social implications of science and medicine become more mindful about the implications they are not addressing? How can the recognition of such absences be translated into analysis that is practically relevant? The volume explores the absent and missing in debates about science and security. Through a range of case studies, including biological and chemical weapons control, science journalism, nanotechnology research and neuroethics, the contributors explore how matters become absent, ignored or forgotten and the implications of this for ethics, policy and society. The Introduction chapter \"Sensing Absence\" sets out the overall argument for the book.","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":39334078,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/39334078/thumbnails/1.jpg","file_name":"Rappert_Introduction.pdf","download_url":"https://www.academia.edu/attachments/39334078/download_file","bulk_download_file_name":"Sensing_Absence_How_to_See_What_Isnt_The.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/39334078/Rappert_Introduction-libre.pdf?1445425097=\u0026response-content-disposition=attachment%3B+filename%3DSensing_Absence_How_to_See_What_Isnt_The.pdf\u0026Expires=1743668354\u0026Signature=ft~Xnt~fT-AIFtGGQtHmcZ2bJtYdyNOGqpvj19NmC35Pu7fkS3~nJPeDy09L4C-YvGoA~tTj6grOChn~TLOymhxctJ~nWoW2d7IVQ9NmM9ek4qrDaXpxFEPoFbHWlmh5GIbruFwC1Wz3YCmWJnMTaq~W4TDatVs5tLmykD7Hh~r-4JB~P5uYNDgnRy6-BiaBWbSzrWcay2fxlkWqrmgyxuWaFgYOrYsuO7UrclcGWB571Y601zitZqUU1F2Jw5sgHqJzxf40UZP9cTF0JU3T3ZBcUmFh9~7EtmZcRH5buA-D~3sWWlkzvYZusLBALtMACAlaReKNDWtIFaKaeAikdw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":54424,"name":"science and technology studies (STS)","url":"https://www.academia.edu/Documents/in/science_and_technology_studies_STS_"},{"id":177340,"name":"Absence","url":"https://www.academia.edu/Documents/in/Absence"},{"id":808459,"name":"Presence/absence","url":"https://www.academia.edu/Documents/in/Presence_absence"},{"id":979537,"name":"Security Threat Groups","url":"https://www.academia.edu/Documents/in/Security_Threat_Groups"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-17090947-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="16406498"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/16406498/Present_Absences_Hauntings_and_Whirlwinds_in_Graphy"><img alt="Research paper thumbnail of Present Absences: Hauntings and Whirlwinds in -Graphy." class="work-thumbnail" src="https://attachments.academia-assets.com/38979765/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/16406498/Present_Absences_Hauntings_and_Whirlwinds_in_Graphy">Present Absences: Hauntings and Whirlwinds in -Graphy.</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Whether it pertains to what is not considered, what cannot be determined, what is not allowed to ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Whether it pertains to what is not considered, what cannot be determined, what is not allowed to be known, or what is deliberately concealed, absences figure as the constant shadows of what is made present by social research. This article explores the relation between what is presented and what is not by treating it first as a vexing conundrum for representation and then as a vehicle for understanding. The matters under examination include what is written about the social world as well as the methods of writing employed. This article seeks an orientation towards both aspects that attends to the binds, contradictions, and possibilities of depicting what is missing. That involves addressing how authors labor to render absences present, the criteria for assessment, as well as the metaphors that guide activities.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="2001a15547ffcca842357f72f82fc6b0" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":38979765,"asset_id":16406498,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/38979765/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="16406498"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="16406498"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 16406498; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=16406498]").text(description); $(".js-view-count[data-work-id=16406498]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 16406498; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='16406498']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "2001a15547ffcca842357f72f82fc6b0" } } $('.js-work-strip[data-work-id=16406498]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":16406498,"title":"Present Absences: Hauntings and Whirlwinds in -Graphy.","translated_title":"","metadata":{"abstract":"Whether it pertains to what is not considered, what cannot be determined, what is not allowed to be known, or what is deliberately concealed, absences figure as the constant shadows of what is made present by social research. This article explores the relation between what is presented and what is not by treating it first as a vexing conundrum for representation and then as a vehicle for understanding. The matters under examination include what is written about the social world as well as the methods of writing employed. This article seeks an orientation towards both aspects that attends to the binds, contradictions, and possibilities of depicting what is missing. That involves addressing how authors labor to render absences present, the criteria for assessment, as well as the metaphors that guide activities. ","ai_title_tag":"Exploring Absences in Social Research"},"translated_abstract":"Whether it pertains to what is not considered, what cannot be determined, what is not allowed to be known, or what is deliberately concealed, absences figure as the constant shadows of what is made present by social research. This article explores the relation between what is presented and what is not by treating it first as a vexing conundrum for representation and then as a vehicle for understanding. The matters under examination include what is written about the social world as well as the methods of writing employed. This article seeks an orientation towards both aspects that attends to the binds, contradictions, and possibilities of depicting what is missing. That involves addressing how authors labor to render absences present, the criteria for assessment, as well as the metaphors that guide activities. ","internal_url":"https://www.academia.edu/16406498/Present_Absences_Hauntings_and_Whirlwinds_in_Graphy","translated_internal_url":"","created_at":"2015-10-02T09:18:36.439-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":5109393,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[],"downloadable_attachments":[{"id":38979765,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/38979765/thumbnails/1.jpg","file_name":"Final_Rappert.pdf","download_url":"https://www.academia.edu/attachments/38979765/download_file","bulk_download_file_name":"Present_Absences_Hauntings_and_Whirlwind.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/38979765/Final_Rappert-libre.pdf?1443802567=\u0026response-content-disposition=attachment%3B+filename%3DPresent_Absences_Hauntings_and_Whirlwind.pdf\u0026Expires=1743575528\u0026Signature=fsX1DmUS~0DkBNbs5zNie62n-Dwb8GFZk7Mqdl0H3omIYUnhRgkRoU-QBU9uHVojD37BJhS8W5y1uvaHEntYf6IjsxpKvgGUCN49AUH55rWPskzNlz4WTCx2zG~E4J-lr1q3uSU3POUtfWRPV~ggbsgteAv6SfO2YZezCipJRdb2Q4UyRaDKJUrKkx3HoTlyGqFxrJvvPSH48p~Chq6RT9xcYW1p~WbbYl1nsv8MWWD2CErAXQoFHFS9lrd7iqSSznUA5IJlWSjVNhBxA~g6lMXOjF1hzv96ij0mpxY5Q4fu607DM0gFERaaZNPz7wRChlxrip11lK8O0sjgtMtKKw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Present_Absences_Hauntings_and_Whirlwinds_in_Graphy","translated_slug":"","page_count":16,"language":"en","content_type":"Work","summary":"Whether it pertains to what is not considered, what cannot be determined, what is not allowed to be known, or what is deliberately concealed, absences figure as the constant shadows of what is made present by social research. This article explores the relation between what is presented and what is not by treating it first as a vexing conundrum for representation and then as a vehicle for understanding. The matters under examination include what is written about the social world as well as the methods of writing employed. This article seeks an orientation towards both aspects that attends to the binds, contradictions, and possibilities of depicting what is missing. That involves addressing how authors labor to render absences present, the criteria for assessment, as well as the metaphors that guide activities. ","owner":{"id":5109393,"first_name":"Brian","middle_initials":"","last_name":"Rappert","page_name":"BrianRappert","domain_name":"exeter","created_at":"2013-08-11T23:37:04.771-07:00","display_name":"Brian Rappert","url":"https://exeter.academia.edu/BrianRappert"},"attachments":[{"id":38979765,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/38979765/thumbnails/1.jpg","file_name":"Final_Rappert.pdf","download_url":"https://www.academia.edu/attachments/38979765/download_file","bulk_download_file_name":"Present_Absences_Hauntings_and_Whirlwind.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/38979765/Final_Rappert-libre.pdf?1443802567=\u0026response-content-disposition=attachment%3B+filename%3DPresent_Absences_Hauntings_and_Whirlwind.pdf\u0026Expires=1743575528\u0026Signature=fsX1DmUS~0DkBNbs5zNie62n-Dwb8GFZk7Mqdl0H3omIYUnhRgkRoU-QBU9uHVojD37BJhS8W5y1uvaHEntYf6IjsxpKvgGUCN49AUH55rWPskzNlz4WTCx2zG~E4J-lr1q3uSU3POUtfWRPV~ggbsgteAv6SfO2YZezCipJRdb2Q4UyRaDKJUrKkx3HoTlyGqFxrJvvPSH48p~Chq6RT9xcYW1p~WbbYl1nsv8MWWD2CErAXQoFHFS9lrd7iqSSznUA5IJlWSjVNhBxA~g6lMXOjF1hzv96ij0mpxY5Q4fu607DM0gFERaaZNPz7wRChlxrip11lK8O0sjgtMtKKw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":14787,"name":"Reflexivity (Sociology)","url":"https://www.academia.edu/Documents/in/Reflexivity_Sociology_"},{"id":808459,"name":"Presence/absence","url":"https://www.academia.edu/Documents/in/Presence_absence"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-16406498-figures'); } }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="4248236" id="articleschapters"><div class="js-work-strip profile--work_container" data-work-id="19575640"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/19575640/Why_Project_Coast_Still_Matters"><img alt="Research paper thumbnail of Why Project Coast Still Matters" class="work-thumbnail" src="https://attachments.academia-assets.com/40707091/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/19575640/Why_Project_Coast_Still_Matters">Why Project Coast Still Matters</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://sun.academia.edu/KathrynSmith">Kathryn Smith</a>, <a class="" data-click-track="profile-work-strip-authors" href="https://issafrica.academia.edu/ChandreGould">Chandre Gould</a>, and <a class="" data-click-track="profile-work-strip-authors" href="https://exeter.academia.edu/BrianRappert">Brian Rappert</a></span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">A disciplinary hearing of the Health Professions Council of South Africa (HPCSA) recently found D...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">A disciplinary hearing of the Health Professions Council of South Africa (HPCSA) recently found Dr Wouter Basson guilty of unethical<br />conduct for work he did as head of the apartheid state's chemical and biologlcal warfare programme. On Wednesday, 26 November, the HPCSA will begin hearing arguments relating to Basson's<br />sentencing. Why does this matter? And why Is It equally Important that Basson receive an appropriate sanction from the HPCSA?</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="ae2a335d0855d8641503ec6b286250e8" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":40707091,"asset_id":19575640,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/40707091/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="19575640"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="19575640"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 19575640; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=19575640]").text(description); $(".js-view-count[data-work-id=19575640]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 19575640; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='19575640']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "ae2a335d0855d8641503ec6b286250e8" } } $('.js-work-strip[data-work-id=19575640]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":19575640,"title":"Why Project Coast Still Matters","translated_title":"","metadata":{"abstract":"A disciplinary hearing of the Health Professions Council of South Africa (HPCSA) recently found Dr Wouter Basson guilty of unethical\nconduct for work he did as head of the apartheid state's chemical and biologlcal warfare programme. On Wednesday, 26 November, the HPCSA will begin hearing arguments relating to Basson's\nsentencing. Why does this matter? And why Is It equally Important that Basson receive an appropriate sanction from the HPCSA?","ai_title_tag":"Project Coast: The Need for Accountability"},"translated_abstract":"A disciplinary hearing of the Health Professions Council of South Africa (HPCSA) recently found Dr Wouter Basson guilty of unethical\nconduct for work he did as head of the apartheid state's chemical and biologlcal warfare programme. On Wednesday, 26 November, the HPCSA will begin hearing arguments relating to Basson's\nsentencing. Why does this matter? And why Is It equally Important that Basson receive an appropriate sanction from the HPCSA?","internal_url":"https://www.academia.edu/19575640/Why_Project_Coast_Still_Matters","translated_internal_url":"","created_at":"2015-12-09T04:13:37.004-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":3375165,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[{"id":11851302,"work_id":19575640,"tagging_user_id":3375165,"tagged_user_id":9103917,"co_author_invite_id":null,"email":"g***d@mweb.co.za","affiliation":"Institute for Security Studies and Sciences-Po","display_order":0,"name":"Chandre Gould","title":"Why Project Coast Still Matters"},{"id":11851303,"work_id":19575640,"tagging_user_id":3375165,"tagged_user_id":5109393,"co_author_invite_id":null,"email":"B***t@ex.ac.uk","affiliation":"University of Exeter","display_order":4194304,"name":"Brian Rappert","title":"Why Project Coast Still Matters"},{"id":11851304,"work_id":19575640,"tagging_user_id":3375165,"tagged_user_id":null,"co_author_invite_id":2783936,"email":"v***e@nelsonmandela.org","display_order":6291456,"name":"Verne Harris","title":"Why Project Coast Still Matters"}],"downloadable_attachments":[{"id":40707091,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/40707091/thumbnails/1.jpg","file_name":"ISS_Africa___Why_Project_Coast_still_matters.pdf","download_url":"https://www.academia.edu/attachments/40707091/download_file","bulk_download_file_name":"Why_Project_Coast_Still_Matters.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/40707091/ISS_Africa___Why_Project_Coast_still_matters-libre.pdf?1449662988=\u0026response-content-disposition=attachment%3B+filename%3DWhy_Project_Coast_Still_Matters.pdf\u0026Expires=1743561379\u0026Signature=c~hE6~UY92akp4xBGvXkwdi0NE8xj5jJJU2OWUk0SyfWPwL~-c5S5Aaeumj5vdchZAoh1479sG0ktVXynJigJsxbLx76j0Zz-P1Am4jJJl3jUf6wRUW7YUzyXm2gfsFVrq-eux2ZXDdeQEv9Y~AymyQc8uM3kQmsjC7BmRoGShO56MnDXdPJ0IsQQ7oYTbv12pUORhD-kn7-nwmgonljVw7dNq0nKwlRH-fS2AxaeaW0B0KbnQwS5m-Qn6wwnQzYXiHD3ZsQobAyutZY71f2N02zDoQjmNWBP-Iyq3kqtfHZ~omSka2ajqs9PvkJ-ARCgv95Gz-ZF1FEObMcljv5ag__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Why_Project_Coast_Still_Matters","translated_slug":"","page_count":4,"language":"en","content_type":"Work","summary":"A disciplinary hearing of the Health Professions Council of South Africa (HPCSA) recently found Dr Wouter Basson guilty of unethical\nconduct for work he did as head of the apartheid state's chemical and biologlcal warfare programme. On Wednesday, 26 November, the HPCSA will begin hearing arguments relating to Basson's\nsentencing. Why does this matter? And why Is It equally Important that Basson receive an appropriate sanction from the HPCSA?","owner":{"id":3375165,"first_name":"Kathryn","middle_initials":null,"last_name":"Smith","page_name":"KathrynSmith","domain_name":"sun","created_at":"2013-02-26T00:07:54.463-08:00","display_name":"Kathryn Smith","url":"https://sun.academia.edu/KathrynSmith"},"attachments":[{"id":40707091,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/40707091/thumbnails/1.jpg","file_name":"ISS_Africa___Why_Project_Coast_still_matters.pdf","download_url":"https://www.academia.edu/attachments/40707091/download_file","bulk_download_file_name":"Why_Project_Coast_Still_Matters.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/40707091/ISS_Africa___Why_Project_Coast_still_matters-libre.pdf?1449662988=\u0026response-content-disposition=attachment%3B+filename%3DWhy_Project_Coast_Still_Matters.pdf\u0026Expires=1743561379\u0026Signature=c~hE6~UY92akp4xBGvXkwdi0NE8xj5jJJU2OWUk0SyfWPwL~-c5S5Aaeumj5vdchZAoh1479sG0ktVXynJigJsxbLx76j0Zz-P1Am4jJJl3jUf6wRUW7YUzyXm2gfsFVrq-eux2ZXDdeQEv9Y~AymyQc8uM3kQmsjC7BmRoGShO56MnDXdPJ0IsQQ7oYTbv12pUORhD-kn7-nwmgonljVw7dNq0nKwlRH-fS2AxaeaW0B0KbnQwS5m-Qn6wwnQzYXiHD3ZsQobAyutZY71f2N02zDoQjmNWBP-Iyq3kqtfHZ~omSka2ajqs9PvkJ-ARCgv95Gz-ZF1FEObMcljv5ag__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":5040,"name":"South African Politics and Society","url":"https://www.academia.edu/Documents/in/South_African_Politics_and_Society"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":6662,"name":"Secrecy","url":"https://www.academia.edu/Documents/in/Secrecy"},{"id":9435,"name":"Medical Ethics","url":"https://www.academia.edu/Documents/in/Medical_Ethics"},{"id":9730,"name":"Apartheid","url":"https://www.academia.edu/Documents/in/Apartheid"},{"id":61866,"name":"South Africa","url":"https://www.academia.edu/Documents/in/South_Africa"},{"id":141088,"name":"Chemical Biological Weapons","url":"https://www.academia.edu/Documents/in/Chemical_Biological_Weapons"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (false) { Aedu.setUpFigureCarousel('profile-work-19575640-figures'); } }); </script> <div class="js-work-strip profile--work_container" data-work-id="19575523"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/19575523/The_Presence_of_the_Past_Re_Engaging_the_Legacy_of_South_Africas_Chemical_and_Biological_Weapons_Programme"><img alt="Research paper thumbnail of The Presence of the Past: Re-Engaging the Legacy of South Africa's Chemical and Biological Weapons Programme" class="work-thumbnail" src="https://attachments.academia-assets.com/40707000/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/19575523/The_Presence_of_the_Past_Re_Engaging_the_Legacy_of_South_Africas_Chemical_and_Biological_Weapons_Programme">The Presence of the Past: Re-Engaging the Legacy of South Africa's Chemical and Biological Weapons Programme</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://sun.academia.edu/KathrynSmith">Kathryn Smith</a>, <a class="" data-click-track="profile-work-strip-authors" href="https://issafrica.academia.edu/ChandreGould">Chandre Gould</a>, and <a class="" data-click-track="profile-work-strip-authors" href="https://exeter.academia.edu/BrianRappert">Brian Rappert</a></span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Why is it important that a disciplinary hearing of the Health Professions Council of South Africa...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Why is it important that a disciplinary hearing of the Health Professions Council of South Africa (HPC) recently found Dr Wouter Basson guilty of unethical conduct in relation to the work he did as head of the apartheid state's chemical and biological warfare programme? And why is it equally important that Basson receive an appropriate sanction from the HPC? Answers to these questions are suggested by a visit to the vast laboratory complex that was the home of military front company Roodeplaat Research Laboratories until 1993.</span></div><div class="wp-workCard_item"><div class="carousel-container carousel-container--sm" id="profile-work-19575523-figures"><div class="prev-slide-container js-prev-button-container"><button aria-label="Previous" class="carousel-navigation-button js-profile-work-19575523-figures-prev"><span class="material-symbols-outlined" style="font-size: 24px" translate="no">arrow_back_ios</span></button></div><div class="slides-container js-slides-container"><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/49141390/figure-1-cc-exeseg-hito-arc-ex-rrl-facility-at-roodeplaat-by"><img alt="(cc) EXESEG) (hito: / /creativecommons.org/licenses/by-ncsa/4.0/) ARC [ex RRL] facility at Roodeplaat 2014 by Kathryn Smith is licensed under a Creative Commons Attribution-NonCommercialShareAlike 4.0 International License (http: //creativecommons.org/licenses/by-nc-sa/4.0/). Based on a work at htto://www.nelsonmandela.org/ (http: //www.nelsonmandela.org/). Permissions beyond the scope of this license may be available at http://www. issafrica.org/ (hito://www. issafrica.org/) " class="figure-slide-image" src="https://figures.academia-assets.com/40707000/figure_001.jpg" /></a></figure><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/49141393/figure-2-co-exer-http-arc-ex-rrl-facility-at-roodeplaat-by"><img alt="(co) EXER (http: //creativecommons.org/licenses/by-ne-sa/4.0/) ARC [ex RRL] facility at Roodeplaat 2014 by Kathryn Smith is licensed under a Creative Commons Attribution-NonCommercialShareAlike 4.0 International License (http: //creativecommons.org/licenses/by-nc-sa/4.0/). Based on a work at htto://www.nelsonmandela.org/ (http: //www.nelsonmandela.org/). Permissions beyond the scope of this license may be available at hito://www.issafrica.org/ (htto: //www. issafrica.org/) The cages that once held a gorilla, baboons, rats and dogs lie in varied stages of disrepair in the basement and on a nearby farm. " class="figure-slide-image" src="https://figures.academia-assets.com/40707000/figure_002.jpg" /></a></figure><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/49141397/figure-3-cc-exer-tip-arc-ex-rrl-facility-at-roodeplaat-by"><img alt="(cc) EXER (tip: //creativecommons.org/licenses/by-nc-sa/4.0/} ARC [ex RRL] facility at Roodeplaat 2014 by Kathryn Smith is licensed under a Creative Commons Attribution-NonCommercialShareAlike 4.0 International License (http: //creativecommons.org/licenses/by-ne-sa/4.0/). Based on a work at hito://www.nelsonmandela.org/ (http: //www.nelsonmandela.org/). Permissions beyond the scope of this license may be available at http://www. issafrica.org/ (http://www. issafrica.org/) " class="figure-slide-image" src="https://figures.academia-assets.com/40707000/figure_003.jpg" /></a></figure><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/49141402/figure-4-so-why-bring-it-up-again-why-now-why-do-we-need-to"><img alt="So, why bring it up again? Why now? Why do we need to remember this? {ntip./ / crealivecommons.org/ licenses/ by-nc-sa/4.U/ } ARC [ex RRL] facility at Roodeplaat 2014 by Kathryn Smith is licensed under a Creative Commons Attribution-NonCommercialShareAlike 4.0 International License (http: //creativecommons.org/licenses/by-nc-sa/4.0/). Based on a work at http: //www.nelsonmandela.org/ (http: //www.nelsonmandela.org/). Permissions beyond the scope of this license may be available at http://www. issafrica.org/ (http://www. issafrica.org/) " class="figure-slide-image" src="https://figures.academia-assets.com/40707000/figure_004.jpg" /></a></figure><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/49141406/figure-5-cc-exrreeer-nttp-rc-ex-rrl-facility-at-roodeplaat"><img alt="(cc) EXRREEER) (nttp: / /creativecommons.org/licenses/ by-nc-sa/4.Q0/} \RC (ex RRL) facility at Roodeplaat 2014 by Kathryn Smith is licensed under a Creative Commons Attribution NonCommercialShareAlike 4.0 International License tp: / /creativecommons.org/licenses/by-nc-sa/4.0/). ;ased on a work at http: //www.nelsonmandela.org/ (http: //www.nelsonmandela.org/). ermissions beyond the scope of this license may be available at http://www. issafrica.org/ (http://www. issatrica.org/) " class="figure-slide-image" src="https://figures.academia-assets.com/40707000/figure_005.jpg" /></a></figure><figure class="figure-slide-container"><a href="https://www.academia.edu/figures/49141410/figure-6-cc-eariesegm-nitto-arc-ex-rrl-facility-at"><img alt="(cc) EARIESEGM) (Nitto: / /creativecommons.org/licenses/ by ncsa/ 4.0/7] ARC (ex RRL) facility at Roodeplaat 2014 by Kathryn Smith is licensed under a Creative Commons Attribution NonCommercialShareAlike 4.0 International license http: //creativecommons.org/licenses/by-nc-sa/4.0/). 3ased on a work at http://www.nelsonmandela.org/ (hito: //www.nelsonmandela.org/). -ermissions beyond the scope of this license may be available at htip://www. issafrica.org/ (http://www. issafrica.org/) " class="figure-slide-image" src="https://figures.academia-assets.com/40707000/figure_006.jpg" /></a></figure></div><div class="next-slide-container js-next-button-container"><button aria-label="Next" class="carousel-navigation-button js-profile-work-19575523-figures-next"><span class="material-symbols-outlined" style="font-size: 24px" translate="no">arrow_forward_ios</span></button></div></div></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="6306b392c0c4193114b8017cf1177fd8" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":40707000,"asset_id":19575523,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/40707000/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="19575523"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="19575523"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 19575523; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=19575523]").text(description); $(".js-view-count[data-work-id=19575523]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 19575523; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='19575523']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "6306b392c0c4193114b8017cf1177fd8" } } $('.js-work-strip[data-work-id=19575523]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":19575523,"title":"The Presence of the Past: Re-Engaging the Legacy of South Africa's Chemical and Biological Weapons Programme","translated_title":"","metadata":{"abstract":"Why is it important that a disciplinary hearing of the Health Professions Council of South Africa (HPC) recently found Dr Wouter Basson guilty of unethical conduct in relation to the work he did as head of the apartheid state's chemical and biological warfare programme? And why is it equally important that Basson receive an appropriate sanction from the HPC? Answers to these questions are suggested by a visit to the vast laboratory complex that was the home of military front company Roodeplaat Research Laboratories until 1993."},"translated_abstract":"Why is it important that a disciplinary hearing of the Health Professions Council of South Africa (HPC) recently found Dr Wouter Basson guilty of unethical conduct in relation to the work he did as head of the apartheid state's chemical and biological warfare programme? And why is it equally important that Basson receive an appropriate sanction from the HPC? Answers to these questions are suggested by a visit to the vast laboratory complex that was the home of military front company Roodeplaat Research Laboratories until 1993.","internal_url":"https://www.academia.edu/19575523/The_Presence_of_the_Past_Re_Engaging_the_Legacy_of_South_Africas_Chemical_and_Biological_Weapons_Programme","translated_internal_url":"","created_at":"2015-12-09T04:07:21.865-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":3375165,"coauthors_can_edit":true,"document_type":"other","co_author_tags":[{"id":11851198,"work_id":19575523,"tagging_user_id":3375165,"tagged_user_id":9103917,"co_author_invite_id":null,"email":"g***d@mweb.co.za","affiliation":"Institute for Security Studies and Sciences-Po","display_order":0,"name":"Chandre Gould","title":"The Presence of the Past: Re-Engaging the Legacy of South Africa's Chemical and Biological Weapons Programme"},{"id":11851199,"work_id":19575523,"tagging_user_id":3375165,"tagged_user_id":5109393,"co_author_invite_id":null,"email":"B***t@ex.ac.uk","affiliation":"University of Exeter","display_order":4194304,"name":"Brian Rappert","title":"The Presence of the Past: Re-Engaging the Legacy of South Africa's Chemical and Biological Weapons Programme"},{"id":11851200,"work_id":19575523,"tagging_user_id":3375165,"tagged_user_id":null,"co_author_invite_id":2783936,"email":"v***e@nelsonmandela.org","display_order":6291456,"name":"Verne Harris","title":"The Presence of the Past: Re-Engaging the Legacy of South Africa's Chemical and Biological Weapons Programme"}],"downloadable_attachments":[{"id":40707000,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/40707000/thumbnails/1.jpg","file_name":"The_presence_of_the_past__re-engaging_t...pdf","download_url":"https://www.academia.edu/attachments/40707000/download_file","bulk_download_file_name":"The_Presence_of_the_Past_Re_Engaging_the.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/40707000/The_presence_of_the_past__re-engaging_t..-libre.pdf?1449662538=\u0026response-content-disposition=attachment%3B+filename%3DThe_Presence_of_the_Past_Re_Engaging_the.pdf\u0026Expires=1743561380\u0026Signature=d5JUYS5vFF~Bk8AKPg-UgJwIEJEHCmXD28MnzqiCo5TznHNy5u7-Udlbdfcj9kOeXH54xRr1jVTyw8ddGBtBH-m8ATvTCxBiSQPN0nOofuAfnz7MceWy8Uo8w3t8s5tAsvB3QWqVClPfFvaKAWrR0bhAnpNtgyoLzFmnbL2JXK95vJGjYJOkd3c-v37zrQWYJZWAXfrRcr19Nl03n33Joxp5Mb-KiLn5~PfMaOL3MeY4AYKoCcWgQkpBG6sOlTETbaCxTmIYujWNyMbm3ktRkHarU85eGXZuFFke~za3UcoTtCqqXx4dFvC2zLTfocSK3PVeb1XO4iq4ZweElH8MJQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"The_Presence_of_the_Past_Re_Engaging_the_Legacy_of_South_Africas_Chemical_and_Biological_Weapons_Programme","translated_slug":"","page_count":6,"language":"en","content_type":"Work","summary":"Why is it important that a disciplinary hearing of the Health Professions Council of South Africa (HPC) recently found Dr Wouter Basson guilty of unethical conduct in relation to the work he did as head of the apartheid state's chemical and biological warfare programme? And why is it equally important that Basson receive an appropriate sanction from the HPC? Answers to these questions are suggested by a visit to the vast laboratory complex that was the home of military front company Roodeplaat Research Laboratories until 1993.","owner":{"id":3375165,"first_name":"Kathryn","middle_initials":null,"last_name":"Smith","page_name":"KathrynSmith","domain_name":"sun","created_at":"2013-02-26T00:07:54.463-08:00","display_name":"Kathryn Smith","url":"https://sun.academia.edu/KathrynSmith"},"attachments":[{"id":40707000,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/40707000/thumbnails/1.jpg","file_name":"The_presence_of_the_past__re-engaging_t...pdf","download_url":"https://www.academia.edu/attachments/40707000/download_file","bulk_download_file_name":"The_Presence_of_the_Past_Re_Engaging_the.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/40707000/The_presence_of_the_past__re-engaging_t..-libre.pdf?1449662538=\u0026response-content-disposition=attachment%3B+filename%3DThe_Presence_of_the_Past_Re_Engaging_the.pdf\u0026Expires=1743561380\u0026Signature=d5JUYS5vFF~Bk8AKPg-UgJwIEJEHCmXD28MnzqiCo5TznHNy5u7-Udlbdfcj9kOeXH54xRr1jVTyw8ddGBtBH-m8ATvTCxBiSQPN0nOofuAfnz7MceWy8Uo8w3t8s5tAsvB3QWqVClPfFvaKAWrR0bhAnpNtgyoLzFmnbL2JXK95vJGjYJOkd3c-v37zrQWYJZWAXfrRcr19Nl03n33Joxp5Mb-KiLn5~PfMaOL3MeY4AYKoCcWgQkpBG6sOlTETbaCxTmIYujWNyMbm3ktRkHarU85eGXZuFFke~za3UcoTtCqqXx4dFvC2zLTfocSK3PVeb1XO4iq4ZweElH8MJQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":1589,"name":"Photography","url":"https://www.academia.edu/Documents/in/Photography"},{"id":3987,"name":"History and Memory","url":"https://www.academia.edu/Documents/in/History_and_Memory"},{"id":5040,"name":"South African Politics and Society","url":"https://www.academia.edu/Documents/in/South_African_Politics_and_Society"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":6662,"name":"Secrecy","url":"https://www.academia.edu/Documents/in/Secrecy"},{"id":9730,"name":"Apartheid","url":"https://www.academia.edu/Documents/in/Apartheid"},{"id":61866,"name":"South Africa","url":"https://www.academia.edu/Documents/in/South_Africa"},{"id":141088,"name":"Chemical Biological Weapons","url":"https://www.academia.edu/Documents/in/Chemical_Biological_Weapons"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") if (true) { Aedu.setUpFigureCarousel('profile-work-19575523-figures'); } }); </script> </div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/google_contacts-0dfb882d836b94dbcb4a2d123d6933fc9533eda5be911641f20b4eb428429600.js"], function() { // from javascript_helper.rb $('.js-google-connect-button').click(function(e) { e.preventDefault(); GoogleContacts.authorize_and_show_contacts(); Aedu.Dismissibles.recordClickthrough("WowProfileImportContactsPrompt"); }); $('.js-update-biography-button').click(function(e) { e.preventDefault(); Aedu.Dismissibles.recordClickthrough("UpdateUserBiographyPrompt"); $.ajax({ url: $r.api_v0_profiles_update_about_path({ subdomain_param: 'api', about: "", }), type: 'PUT', success: function(response) { location.reload(); } }); }); $('.js-work-creator-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_document_path({ source: encodeURIComponent(""), }); }); $('.js-video-upload-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_video_path({ source: encodeURIComponent(""), }); }); $('.js-do-this-later-button').click(function() { $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("WowProfileImportContactsPrompt"); }); $('.js-update-biography-do-this-later-button').click(function(){ $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("UpdateUserBiographyPrompt"); }); $('.wow-profile-mentions-upsell--close').click(function(){ $('.wow-profile-mentions-upsell--panel').hide(); Aedu.Dismissibles.recordDismissal("WowProfileMentionsUpsell"); }); $('.wow-profile-mentions-upsell--button').click(function(){ Aedu.Dismissibles.recordClickthrough("WowProfileMentionsUpsell"); }); new WowProfile.SocialRedesignUserWorks({ initialWorksOffset: 20, allWorksOffset: 20, maxSections: 3 }) }); </script> </div></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile_edit-5ea339ee107c863779f560dd7275595239fed73f1a13d279d2b599a28c0ecd33.js","https://a.academia-assets.com/assets/add_coauthor-22174b608f9cb871d03443cafa7feac496fb50d7df2d66a53f5ee3c04ba67f53.js","https://a.academia-assets.com/assets/tab-dcac0130902f0cc2d8cb403714dd47454f11fc6fb0e99ae6a0827b06613abc20.js","https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js"], function() { // from javascript_helper.rb window.ae = window.ae || {}; window.ae.WowProfile = window.ae.WowProfile || {}; if(Aedu.User.current && Aedu.User.current.id === $viewedUser.id) { window.ae.WowProfile.current_user_edit = {}; new WowProfileEdit.EditUploadView({ el: '.js-edit-upload-button-wrapper', model: window.$current_user, }); new AddCoauthor.AddCoauthorsController(); } var userInfoView = new WowProfile.SocialRedesignUserInfo({ recaptcha_key: "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB" }); WowProfile.router = new WowProfile.Router({ userInfoView: userInfoView }); Backbone.history.start({ pushState: true, root: "/" + $viewedUser.page_name }); new WowProfile.UserWorksNav() }); </script> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; } .sign-in-with-apple-button > div { margin: 0 auto; / This centers the Apple-rendered button horizontally }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span ="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "1da92247cff866188ef6e34993d226053f2becbe013f564ce1c87ea87efffc79", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="AB2r6OdOXdTvNuvz33uoXxhocggJApVB3VR1pd4baPXmNX2Qu96tm3iAH88r-eXA1yipulKYF8ezziwiNBHAbg" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://exeter.academia.edu/BrianRappert" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="OTJs5AgCMlCqfoV0v3X6jKE2rAH5dh7Rd2n6kdxcqkHfGrqcVJLCHz3IcUhL97cTbnZ3s6LsnFcZ86MWNlYC2g" autocomplete="off" /><p>Enter the email address you signed up with and we'll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account? <a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style="width:100%;"><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg> <strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/hc/en-us"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg> <strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style="width:100%;"><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia ©2025</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>