content
stringlengths
71
484k
url
stringlengths
13
5.97k
Confidentiality is the protection of personal information. Confidentiality means keeping a client’s information between you and the patient, and not telling others including friends and family. (Learning, n.d.). For example, the information about a child suffering from Cystic Fibrosis should not be disclosed to anyone other than the child and his/her parents. Confidentiality involves restricting patient’s information and not disclosing personal data of patients indiscriminately. For example, telling friends and talking about patients in a place where information can be overheard or leaving patients information lying around is a breach of confidentiality. Information that could be considered ‘confidential’ include name, date of birth, height, weight, medical history and so on. Data Protection are measures taken to ensure confidentiality of patients. Methods of data protection include using encrypted connections, using passwords, locking and securing files manually and so on. There are some principles to data protection; personal data must be processed fairly and lawfully; must be processed for specific purposes; must be adequate, relevant and not excessive; must not be kept for longer than necessary; must be processed in accordance with the rights of data subjects; must be processed by appropriate security and must not be transferred without adequate protection (NHS). Methods of data protection include using data encryption-converting data into a form that ensures that unwanted and unauthorised people are not allowed to see or use it, updating computer software regularly, performing regular maintenance checks for viruses and malwares to prevent information from being stolen, carrying out data deduplication regularly which is the process of removing unnecessary data copied into different parts of the computer thereby making information less accessible to outsiders and most importantly keeping important or sensitive information away from patients. In regards to data protection and patients, there are various factors to be considered ranging from age to legal obligation. For example, in children or young people, the parent is sought to make decisions for them because of their incapacity to make legal and logical appropriately. This means that patient should be informed honestly about why their information is being taken and why it is necessary, information should only be shared with people other than the patient unless absolutely appropriate and necessary, information collected from patient should be collected concisely and kept appropriately only when required, information should be inputted correctly and cross checked to prevent errors and misconceptions: duplicate copies should not be kept unless absolutely necessary, information should be processed with the permission of the patient and should be protected with maximum security. The Caldicott Principles ensure maximum data protection. There are six criterions to the Caldicott principle that applies to the handling of patient-identifiable information (National Archives , n.d.). The Caldicott principle proposes that: information should justify the purpose of every proposed use or transmission; should not be used unless it is absolutely necessary; information should be as minimal as necessary; access to the information should be on a strict need-to-know basis; everyone with access to it should be aware of their responsibilities and understand and comply with the law. The Freedom of Information gives the user the right to access recorded information held by organisations. Anyone can request information – there are no restrictions on your age, nationality or where you live (GOV.UK). The Act that enforces this is called the Freedom of Information Act and it is aimed at “[making] provision for the disclosure of information held by public authorities or by persons providing services for them and to amend the Data Protection Act 1998 and the Public Records Act 1958; and for connected purposes” (Wikipedia, n.d.). However, there are some exceptions to the Freedom of Information Act which means information cannot be provided to the public in cases where it is clearly stated in The Freedom of Information Act, limited in number and if it is used where some harm might be caused if the information is released to the public (Archives, n.d.). This could affect the treatment of the patient is being affected by the information being withheld by this act. Although it is very useful, the exemptions provide a downside which means that sometimes information which could be useful to the patient may be held back. Working Code of Ethics are a set of rules and regulations that must be following in a working environment with regards to a patient. In hospitals the working ethics include: treating patients as individuals, respecting people’s confidentiality, collaborating with patients in care, ensuring that consent is gained, maintaining clear professional boundaries, sharing information with colleagues to ensure the patient is treated adequately, working with the patient effectively as part of a team and keeping clear and accurate records about the patient (Goldsmith, 2011). The working code of ethics ensures that the patients are provided with utmost care and attention. Together with data protection they improve confidentiality and ensures that the patients are listened to, with their concerns and preferences respected. For example, in older people, maintaining their dignity and respecting their rights and choices is very essential to their well being so there is a great deal of pressure on people who care for them to make improvements in their treatment and care. In conclusion, the confidentiality of the patient is ensured through data protection which may involve the use of passwords or encryption and following the Caldicott Principles. Also, the Freedom of Information Act makes information which may be relevant to the patient available thereby increasing efficiency of treatment provided while The Working Code of Ethics provides maximum care and support to the patient by taking into consideration their choices and preferences so that they can get back to perfect health.
https://essayreaders.com/essay-on-confidentiality/
About the Course Creating and maintaining clear professional and personal boundaries and respecting confidentiality protects both students and teachers, and creates a sense of safety and clarity that allows for a positive learning experience for all. Between a teacher and student, clear boundaries are essential so that learning can happen and patterns are not triggered. Facilitated by Bill McMillan and Monica Simms, this course covers: - What boundaries and confidentiality are and why they are necessary when teaching Ren Xue/Yuan Gong. - Specific examples of boundaries and confidentiality in a Ren Xue/Yuan Gong class. - Patterns that may cause us to cross boundaries or breach confidentiality, and how to resolve them. - Situations when it is necessary to break confidentiality, and how to do so in a good way. Time to complete: about 3 hours. About the Instructors Monica Simms worked as a psychotherapist in private practice for 35 years, working with individuals and couples. She spent 20 years volunteering for her local rape crisis center where she trained interns, worked with staff and acted as a clinical consultant. In 2011, she started to study REN XUE and Qigong and incorporate it into her work. She has completed the six years of teacher training and enjoys teaching in the growing community her classes are creating in Arcata, California. Bill McMillan lives in Santa Barbara, California. He retired as a Marriage and Family Therapist after twenty-five years of working with adolescents, adults, and veterans, with an emphasis on family systems, trauma, grief and recovery. His training includes Level II Certification as an Eye Movement Desensitization and Reprocessing therapist, Hospice training and Family Mediation. He completed the six-year REN XUE Teacher Training and has been teaching a variety of classes since 2013.
https://learnrenxue.org/courses/boundaries-and-confidentiality/
Mindsoup Counselling Service is committed to providing the following standards required to practice Counselling in the UK, in association with Clients, Colleagues and Associate Companies. These ethical and moral expectations and requirements are in line with those of the British Association for Counselling and Psychotherapy (www.BACP.co.uk). Mindsoup Counselling Service provides good quality of care by: Maintaining Competent Practice: Keeping updated on research, Continued Professional Development ( minimum of 30 hours per year) Teaching and training on theories applied, and attending supervision to maintain and enhance delivery of theories, ensuring that work is kept on track, with the ability as a Counsellor to be self-reflective, willing to consider alternative methods and be mindful of competence. Keeping Trust and Respect: Respecting Clients right to be self-governing, by allowing Clients to be accurately informed of services offered, information given, protection of privacy and confidentiality in line with required boundaries. This also includes the Counsellor to expose any deemed conflict of interest and a commitment to no manipulation to all. Fitness to Practice: Ensuring Self Care is maintained at all times, and being able to refrain from Counselling if not well or unforeseen circumstances. If things go wrong: Being able to provide and respect the correct Complaints procedure, initially to be addressed with Mindsoup Counselling Service and then, if required the BACP as the governing body. (The BACP @ www.BACP.co.uk/complaints.) Responsibilities: Mindsoup has full Professional Indemnity Insurance and recognised qualifications and belongs to the Governing body for Counselling and Psychotherapy, meeting all their criteria to be an Individual Member. Also ensuring provision of adequate information for Clients, Service Users and associate Businesses Referrals / working with a Team: If at any time a Client / Business needs to be referred to an alternative Counsellor (i.e. due to conflict of interest or requirement of Therapy in a specialised area, outside of the remit offered at Mindsoup) Mindsoup is committed to being able to supply and guide Clients to appropriate referrals Recognising Equality and Diversity: Respecting human rights and dignity; providing fair and impartial treatment to all.
http://www.mindsoup.co.uk/company-statement/
A Bank Reception Volunteer role is required to assist the busy reception at our hospice in Guildford, Christopher’s to cover for holidays and sickness. The volunteer needs to have good availability during weekdays, a friendly, approachable manner providing a warm welcome to everyone visiting the hospice but maintaining boundaries and confidentiality and complying with Covid safety guidelines. Location: Christopher’s, Old Portsmouth Road, Artington, Guildford GU3 1LP Time: Cover during sickness and holidays Monday to Friday 9am to 1pm and 1pm to 5pm Duties and key responsibilities You will be covering for our regular volunteer receptionists when they are on leave or unwell. Reception volunteers duties and key responsibilities are: - To greet families and visitors personally and appropriately at the reception area. - To ensure the staff sign in and out of the fire register - To ensure all families and visitors sign in and wait in reception until collected by member of staff - To receive telephone calls via the computerised switchboard, maintain politeness and confidentiality at all times. Answering queries and forwarding calls as appropriate. - To take telephone messages and pass on messages by email. - To undertake various administrative tasks and assist with ad-hoc tasks. - To ensure Covid safety measures are complied with by visitors to the hospice Essential Skills and Experience - Basic computer skills – previous use of MS Outlook, Word and Excel. - A warm, friendly and approachable manner - Telephone experience - Dependable and punctual - Preferred weekly availability with the possible shifts of 9am-1pm or 1pm to 5pm.
https://www.shootingstar.org.uk/reception-volunteer-2/
Maintaining professional boundaries Keeping the balance right in nurse-patient relationships is vital to protect yourself, your patients and avoid burn out. Maintaining professional boundaries is vital, says health coach Mandy Day-Calder A trusting relationship is fundamental for effective nursing practice. Patients need to feel safe in your care and have faith that you will act in their best interest at all times. You will see your patients at their most vulnerable, physically and emotionally. Their barriers will be down and they may share intimate feelings. Your role, as stated in the Nursing and Midwifery Council code, is to hold back these emotions, act with integrity and maintain clear professional boundaries at all times. Protection All relationships need boundaries, which help define what is expected and what is acceptable. As well as protecting patients and the public, maintaining professional boundaries is vital for a nurse if you want to avoid burnout and enjoy a lengthy career. Most patients do not choose to enter a nurse-patient relationship – they do so because they need care and attention. Regardless of the circumstances, patients expect nurses to care for them in a compassionate manner, protect them from harm and provide information and advice. Within the varied scope of nursing, the exact nature of boundaries may vary. It is normal, for example, for community nurses to visit a patient’s home, but this would be unacceptable for a nurse working on a hospital ward. You should assess what is expected of you within your scope of practice and ensure the relationships you form are therapeutic in nature. Self-awareness There have been several high-profile media cases where nurses have clearly overstepped the limits of their professional interactions. But boundaries can sometimes be breached in subtler ways. A patient may ask questions about your family, for example, and you end up revealing more about your personal life than is appropriate. Although many patients enjoy social interaction or even banter with healthcare staff, the responsibility is on you to maintain the balance of emotional closeness and professional distance. It is a good idea to get into the habit of looking at your relationships and asking yourself honestly: - How is your work-life balance? The more you are able to relax when off-duty, the more refreshed you will be at work. - Are you giving equal care to all your patients? It is likely you will have more in common with some patients than others, but you must avoid showing favouritism. - Do you have colleagues, friends or family you can confide in? Your patients may express interest in your life but it isn’t appropriate to ask them for personal advice. - Are you respecting privacy? Do not share your mobile number, or ‘friend’ or follow patients on social media. If you are not acting in your patients’ best interest, you need to take a step back and examine your intentions. This can be challenging and requires a high level of honesty and self-awareness, yet failing to do so can result in an abuse of trust and can even put patients’ safety and wellbeing in danger.
https://rcni.com/nursing-standard/careers/career-advice/maintaining-professional-boundaries-61286
Action in Africa strives to Educate, Inspire, and Empower people in Uganda by focusing on education and community development. Their goal is to provide sustained education, allowing individuals to reach their untapped potential and incite economic growth by becoming the next leaders, innovators, and entrepreneurs in their country. Action in Africa are searching for a caring, experienced social worker to provide case management support and advocacy for children and adults of the Nakuwadde community. Working hours are: Monday-Friday from the hours of 10:00am-7:00pm. Conducting home visits with all students and women who attend programming at The Center. Keeping well documented notes of all meetings and home visits. Providing follow up support and subsequent visits as needed. Communicating regularly with children’s parents and providing a safe, loving environment where children feel comfortable expressing needs and concerns. Liaising with the LC chairman and local schools to ensure children’s needs are being met. Communicating regularly with Action in Africa staff to ensure management is updated on current happenings and the well-being of community members. Advocating for the overall wellbeing of all individuals. Maintaining appropriate levels of confidentiality and treating individuals with respect at all times. Must have a bachelor’s degree, preferably in social work, counseling or a related field. Must have at least two years of work experience working as a Social Worker, Counselor or in a related field. Must be comfortable with children - experience working with children with special needs an asset. Must be comfortable speaking in English and Luganda, and working on a computer. Must be dependable, responsible, and organized. Must be a self-starter who is willing to take initiative and can work independently.
http://www.staffableafrica.com/community-outreach-specialist
Ethical and professional principles The personnel , suppliers and business partners of Iwamet sp. z o. o. shall display considerable professional and personal ethics and implement correct ethical and professional principles by means of: - respecting knowledge and experience of persons from the industry, - observing principles of profession-related loyalty, - not using – for one’s own needs – exact copies of other people’s work without obtaining their permission, - expressing different opinions in a cultured way, not to offend the individual, - expressing professional opinions only when it is based on professional knowledge, - maintaining confidentiality of all information which has been submitted in confidence by the employer, client or a public person, - undertaking only such jobs which one is sufficiently qualified to do, - informing the employer about any eventuality which may pose an obstacle or threat in the implementation of an assigned task, - signing only documents which relate to work carried out personally or works which one is directly supervising, - striving to maintain one’s professional qualifications at an appropriate level, - protecting the integrity and honour of the profession in one’s professional activity and counteracting the reduction in its esteem and authority, - thorough verification of the information submitted to the clients and superiors, - meeting deadlines and promises, - admitting one’s mistakes and striving to repair them, - absolute adherence to safety guidelines within a workplace, - performing one’s responsibilities while paying attention to the environmental safety, health, the good of the public, as well as the occupational health and safety principles, - taking a decisive stand at the right place and time (if colleagues breach the provisions of this code), - maintaining objectivity in the assessment of one’s colleagues – not acting to the detriment of the colleagues, - reacting to attempts of corruption and dishonesty and thus not seeking material benefits and not offering such benefits to third party personnel - non-performance of competitive activities, in particular cooperation with companies competitive to IWAMET, i.e. those whose interests collide with the interests of IWAMET (conflict of interest) - financial responsibility in the meaning of scrupulous and transparent management and protection of the company’s finances (wherever applicable) - protection of intellectual property - informing the supervisors about any violations of this Ethical Code Upholding rectitude as the principle value, the personnel, suppliers and business partners at Iwamet Sp. z o. o. shall perform their responsibilities, provide services in an honest way, taking full advantage of their qualifications, skills and predilections, while, at the same time, implementing relevant legal provisions, standards and technical specifications, as well as internal company regulations which form the basis of the activities performed.
https://iwamet.com/quality/the-code-of-ethics
Clients and their carers should be adequately informed about the nature of the services being offered. Practitioners should obtain adequately informed consent from the carers or those legally responsible for the child and clients and respect their right to choose whether to continue or withdraw from therapy. Keeping The Trust - The practice of play and creative arts therapies depends on gaining and honouring the trust of clients. Keeping trust requires: - Attentiveness to the quality of listening and respect offered to clients - Culturally appropriate ways of communicating that are courteous and clear respect for privacy and dignity - Respect for privacy and dignity Careful attention to client consent and confidentiality Specific issues covered below are: Informing Clients Consent Practitioners should ensure that services are normally delivered on the basis of the client’s explicit consent. Reliance on implicit consent is more vulnerable to misunderstandings and is best avoided unless there are sound reasons for doing so. Overriding a client’s known wishes or consent is a serious matter that requires commensurate justification. Practitioners should be prepared to be readily accountable to clients, carers, colleagues and their professional body, such as PTUK, if they override a client’s known wishes. Risk Situations Situations in which clients pose a risk of causing serious harm to themselves or others are particularly challenging for the practitioner. These are situations in which the practitioner should be alert to the possibility of conflicting responsibilities between those concerning their client, other people who may be significantly affected, and society generally. Resolving conflicting responsibilities may require due consideration of the context in which the service is being provided. Consultation on Risk Consultation with a supervisor or experienced practitioner is strongly recommended, whenever this would not cause undue delay. In all cases, the aim should be to ensure for the client a good quality of care that is as respectful of the client’s capacity for self determination and their trust as circumstances permit. Commitments Practitioners should be clear about any commitment to be available to clients and colleagues and honour these commitments. Providing Information to Clients & Carers Practitioners should normally be willing to respond to their client’s and carers’ requests for information about the way that they are working and any assessment that they may have made. This professional requirement does not apply if it is considered that imparting this information would be detrimental to the client or inconsistent with the therapeutic approach previously agreed with the client. Clients and those legally responsible for them may have legal rights to this information and these need to be taken into account. Intrusion of Personal Views Practitioners should not allow their professional relationships with clients to be prejudiced by any personal views they may hold about lifestyle, gender, age, disability, race, sexual orientation, beliefs or culture. Protection Against Abuse Practitioners must not abuse their client’s trust in order to gain sexual, emotional, financial or any other kind of personal advantage. Sexual relations with clients and carers are prohibited. ‘Sexual relations include intercourse, any other type of sexual activity or sexualised behaviour. Practitioners should think carefully about, and exercise considerable caution before, entering into personal or business relationships with former clients, their carers or those legally responsible for them and should expect to be professionally accountable if the relationship becomes detrimental to the client or the standing of the profession. Confidentiality Respecting client confidentiality is a fundamental requirement for keeping trust. The professional management of confidentiality concerns the protection of personally identifiable and sensitive information from unauthorised disclosure. Disclosure may be authorised by client consent or the law. Any disclosures should be undertaken in ways that best protect the client’s trust. Practitioners should be willing to be accountable to their clients and to their profession for their management of confidentiality in general and particularly for any disclosures made without their client’s consent. Special Considerations in Working With Children Working with young people requires specific ethical awareness and competence. The practitioner is required to consider and assess the balance between young peoples’ dependence on adults and carers and their progressive development towards acting independently. Working with children and young people requires careful consideration of issues concerning their capacity to give consent to receiving any service independently of someone with parental or legal responsibilities and the management of confidences disclosed by clients.
https://playtherapy.org/keeping-trust/
HELP OTHERS, MAKE A DIFFERENCE, SAVE A LIFE. At the McNabb Center, our mission is "Improving the lives of the people we serve." Do you see yourself as a part of this life-changing work? If so, we are currently seeking a qualified and motivated professional for the following position: Outpatient Co-Occurring Case Manager SUMMARY - Outpatient Co-Occurring Case Manager 1) Service Delivery - Clients will be offered quality care. a) Completes screening, orientation, and intakes into programming. b) Provides evidence-based therapeutic interventions as appropriate. c) Introduce clients to various recovery modalities, including but not limited to the 12-Step model. d) Refers clients for and/or coordinates care with medication assisted treatment (MAT) providers when appropriate. e) Develops and updates client treatment plan. Uses the plan as a living document to coordinate the delivery of services throughout the clients' participation in the program. Ensures client achieves goals and objectives or modifies plan as appropriate. f) Facilitates random drug screens with clients. 2) Professionalism - Maintains regular contact with referral sources and collaborates as needed regarding client care. a) Works closely with community partners and other Center programming to coordinate client care. b) Networks with other wraparound services as needed to ensure clients' needs are being met. c) Meets with supervisor on a consistent basis to address identified concerns. d) Maintains up-to-date resource manual with available resources. 3) Documentation - Completes all documentation in compliance with Center standards and practices. a) Completes clinical documentation in all systems (TNWITS, Centricity, etc.) to ensure compliance with payer source standards. b) Maintains clinical and administrative compliance within all Center P&P, federal confidentiality (including 42CFR part 2), and CARF guidelines. c) Completes assessments per Center and ASAM standards. d) Bases treatment decisions on a clinical framework and effectively establishes and documents medical necessity for the appropriate level of care. e) Effectively manages admissions and discharges; makes referrals for clients and/or family members as appropriate. f) Demonstrates a comprehensive and integrated service plan; client record clearly communicates the plan. 4) Teamwork - Works in a multi-disciplinary team to meet the needs of clients and help support team members. a) Attends Treatment Team meetings; gives and receives positive feedback with team members. b) Demonstrates a consideration and concern for fellow workers and promotes harmonious relationships and attitudes. c) Coordinates with referral sources on client's progress as appropriate. d) Communicates directly and approaches conflict with a problem-solving, win/win approach. e) Demonstrates respect for cultural differences. 5) Productivity/Administrative/Census Management - Completes administrative tasks in a timely manner. a) Provides direct clinical care to clients at a minimum of 70% hours worked. b) Meets monthly productivity targets for client contacts. c) Completes accurate time sheet prior to deadline each pay period. d) Keep up-to-date attendance roster for client contacts and services rendered. e) Implements assignments given by supervisor by established deadlines. f) Completes additional job duties as assigned. . This position requires utilizing a personal dependable vehicle to conduct Center business. Maintaining a dependable vehicle and certified driver status is a condition of employment. REQUIREMENTS - Outpatient Co-Occurring Case Manager Education/Knowledge: Must have a Bachelor's degree in a health-related field of counseling, psychology, social work, criminal justice, addiction, women's studies or a behavioral science field with course work or experience in the areas of cultural diversity, substance abuse, physical and sexual abuse. Knowledge of social casework, human behavior and characteristics of women from diverse backgrounds and experiences, addiction and general knowledge of mental health and co-occurring disorders is essential. Knowledge of 12 step programs, assessment, diagnosis, treatment planning, and aftercare planning is preferred. Knowledge of trauma-informed care/practices is preferred. LADAC or other relevant license or license-eligible with willingness to obtain. Experience: Experience working 1:1 with adults suffering from substance use and/or co-occurring disorders is preferred. Computer experience and working with electronic medical records is preferred. Skills: Case Manager must be able exercise sound judgment and effective decision making, ability to set boundaries, aptitude for empathic listening, flexibility, willingness, and adaptability to working with diverse populations. Must have the ability to communicate effectively and possess good time management and organizational skills. Case Manager must be able to work independently and in a team setting, while adhering to federal confidentiality laws and accepted standards and guidelines. Must be able to initiate and maintain clinical relationships and interact appropriately with referral sources and other community partners. Applicants should possess the ability to relate to individuals and families of varied ethnic and cultural backgrounds, ages, educational levels, and economic circumstances with respect and dignity. Excellent verbal, written, and computer skills are necessary in order to work effectively and collaboratively with clients, collaborating agencies, and community professionals, as well as maintaining proper documentation. Clinical staff members must possess reliable transportation, the ability to acquire an F endorsement on driver's license, and transport clients. Physical: Ability to work independently within non-structured hours is essential. Exposure to biological hazards. Hearing of normal and soft tones as well as close eye work. Valid driver's license. Lifting up to 50 lbs. Pushing/pulling up to 150 lbs. Frequent sitting, standing, walking, bending, stooping, and reaching. To ensure the safety of the clients and staff, this position requires certification in and adequate implementation of verbal and physical de-escalation techniques (Handle with Care) that include a wide range of bodily movements including but not limited to grasping, holding another person, going down on knees, running, and walking. Compensation: Starting salary for this position is approximately $15.78 /hr based on relevant experience and education. The McNabb Center (www.mcnabbcenter.org) is a premier not-for-profit provider of behavioral health services. The Center provides quality care and serves all ages in a continuum of prevention, early intervention, social, co-occurring, addiction, outpatient, and crisis services. MC is an EOE. MC conducts background checks, driver's license record, degree verification, and drug screens at hire. Employment is contingent upon clean drug screen, background check, and driving record. Additionally, certain programs are subject to TB Screening and/or testing. Bilingual applicants are encouraged to apply.
https://mcnabbcenter.e3applicants.com/careers/Case-Manager-Outpatient-CoOccurring-3396
CapRisk is an independent consulting firm offering a unique combination of actuarial and business consulting services, assisting clients with local, national, and international interests. Our Practice is built on the "no surprises" principle of providing consistent, reliable work coupled with value-driven service and delivered in a timely, cost-effective manner. We offer our clients personalized service and proven expertise across a full range of actuarial and business consulting services. We invest in research and systems to ensure we continue to deliver quality service, effectively and efficiently. Our diverse capabilities continue to grow by expanding our areas of expertise, improving our tools and resources, and listening attentatively to our clients in order to provide what you need, when and how you need it. Our expertise is derived from a unique combination of professional experience and qualifications coupled with personalized service that has helped establish our consulting niche within the insurance industry. Our collective experiences serve to better equip us to fashion more focused and more meaningful consulting efforts to in turn address the specific risk management and insurance-related business objectives of our clients. Our Mission is to serve our clients as a leader in actuarial risk and insurance related business consulting services. We will accomplish this mission through careful attention to the needs of our Clients, Colleagues, and Communities. Our Values begin with recognizing that the client always comes first and avoiding potential conflicts of interest. Respecting the confidentiality of data and information. Always being truthful with clients, associates, and colleagues. Respecting the dignity, well-being, and rights of all individuals. Keeping our promises and not promising what we cannot deliver. Always striving to do our best and be our best in our profession and in our community. As the world of business risk and insurance changes often, please continue to check www.CapRiskGroup.com for updates to your area(s) of interest on our website.
http://capriskgroup.com/2.html
The Las Positas College Child Development Center does not discriminate on the basis of sex, sexual orientation, gender, ethnic group identification, race, ancestry, national origin, religion, color, or physical disability in determining which children are served. Confidentiality The use or disclosure of financial or other information concerning children or families will be limited to purposes directly connected to the program. No other use of this information may be made without parent’s prior written consent. Parents shall have access to all information contained in their own child’s individual folder. We highly expect parents and staff to help maintain confidentiality for all children enrolled in the program. Our Standards of Experience for Children - Being intellectually engaged and challenged - Applying developing skills in purposeful ways - Developing confidence in their own intellectual powers - Establishing a school culture of respect, confidentiality, and diversity collaboration - Celebrating extended conversations/interactions with adults and peers - Taking initiative/responsibility; making choices - Generating questions/predictions/hypotheses - Sustaining involved investigations of worthwhile topics - Overcoming obstacles and set-backs - Helping others to find out about and understand things better - Making suggestions to others - Feeling a sense of belonging to a community in the school - Promoting sensitivity for the child’s competency through consistent and dependable care, small group size and nurturing primary care – giving teachers - Respecting children’s choices in their play, work, creations, and self – expression - Finding time to interact with and scaffold for children to support their development and augment their play - Embracing their culture and those of their peers Our Quality Care Practices for Families The LPC Child Development Center Staff have the responsibility to ensure that the center is a safe, secure, comfortable, and engaging place for children, their parents and the ECD students to be themselves. To achieve this goal, staff will: Treat children, parents, families and each other with respect, compassion, and empathy. Maintain a working environment that promotes health and safety. Model cooperation and honest open communication. Maintain a learning environment that is natural, consistent, dependable and flexible. Promote self – esteem through responsive interactions and positive guidance. Include children’s and families’ ideas and values in our planning. For more information please contact: Front Desk (925) 424-1560 Fax: (925) 373-6912 Angela Lopez Director, Child Development Center (925) 424-1575 [email protected] License # 013420889 Located in Building 2300 at the northwest edge between the P.E. Complex and Science Buildings.
http://www.laspositascollege.edu/childcenter/model.php
Promotes awareness of coping with aggression in the workplace while maintaining your safety. Learning outcomes - Understand how to implement security measures at work. - Know basic procedures for keeping safe. - Understand the importance of reporting and recording. - Know how to control situations through nonphysical intervention. Course content - Violence in the workplace. - Basic procedures for keeping safe. - Reporting all incidents. - Respecting personal boundaries - Effective communication. - Strategies for defusing and containing aggression. - Non-physical intervention.
http://www.redcrier.com/course-list-training-outcomes/coping-with-aggression-in-the-workplace/
Confidentiality is an inevitable pillar of the history of the physician-patient relationship. Misunderstanding of this principle not only causes harm to sanctity of the medical profession, but also can damage the quality of the therapeutic relationship, and more broadly public health. The keystone of this negative effect is the potential harm to the patients’ trust and confidence. Generally, the Western school tends to agree that respecting patient confidentiality is essentially desirable. Islam also respects and emphasizes confidentiality, and has general and some specific recommendations about the importance of secrecy and concealment of people’s secrets. Overall, despite strong agreement about the importance of the principle, some ethical theories do not insist on maintaining confidentiality under any circumstance. This paper is an attempt to describe the importance of confidentiality in the medical profession considering the approach of both absolutists and relativists in practice.Absolutists believe that the intrinsic desirability of implementing the principle of confidentiality in all cases is the same and without any exception, but the issue is about not giving just priority to other conflicting moral values.Additionally, the absolutists believe that breaching this principle in practice cannot be permissible due to some serious long-term and mostly hidden complications such as patients’ failure or delay to seek medical assistance or advice and/or withholding important information and so forth. Overall, according to empirical evidence and rational considerations, adherence to absolute confidentiality seems more desirable to absolutists. Unlike absolutists, in relativists’ concept of confidentiality, insisting on maintaining the secret will not be allowed in certain cases, and those cases are considered exceptions of the rule of confidentiality.The most important reasons for falling into the wrong orientation of relative confidentiality seem to be precipitance to attain the desired result, poor communication skills, ignorance of the consequences, and being headstrong.
http://ijme.tums.ac.ir/browse.php?a_id=5276&slc_lang=en
Which of the Following is True About Relationships? Which of these statements is true about relationships in general? People often reveal their worst side to their closest friends. However, healthy relationships do not focus on what the other person needs from you. Instead, they focus on how they can benefit the other person. Here are some ways you can ensure that you and your partner are happy and healthy together. Read on to find out how to make a lasting impression on your partner. We wish you all the best! Honesty It could be that your partner is not feeling valued or important and they are having difficulty communicating with you. Perhaps they need more from your relationship, but don’t know how to approach your partner about it. If this sounds like your relationship, here are some tips to improve your communication. Sometimes your partner may not realize they need more communication. You might need to look into education and self-soothing if this is the case. Be patient with your self. Honesty is hard to practice, and you may become frustrated when you don’t know how to express yourself. It is important to develop a habit of listening and understanding your partner’s words. It will make it easier to communicate and help move the conversation forward. Even if you’re not perfect at it, practicing will make the process easier. Your partner may misunderstand what you are saying if you can’t express your feelings clearly. It is also important to be open with your partner. You can save your partner grief by telling a little white lie. However, if you’re constantly hiding things, your relationship might suffer. If you hide things to protect your partner, it can also be detrimental to your relationship. Honesty will allow you to feel more freedom and comfort. It will help your relationship to function at its best. It is important to be truthful in all you say and do. Being honest with your partner is vital for a healthy relationship. When you are completely honest, you won’t be accused of being untrustworthy, and you’ll be able to trust your partner more. It can also improve your self-esteem and mental health. A University of Houston study found that people who feel secure with their partners feel they are worthy of love. It’s crucial to be honest in relationships so that both you and your partner can be yourself. It is important to be honest with your partner in order to have a healthy relationship. Honesty requires you to be patient and pushy, but it’s also important to be open. It will encourage your partner to be more honest with you. They will feel better about their relationship and themselves. The two of you will feel much closer if you’re open with each other. You can encourage your partner to be honest and communicate your thoughts and feelings in the future. Being honest in relationships will help your mental health and your physical health. Not being honest can affect your memory and cause stress. Your body releases cortisol within ten minutes of lying. Cortisol is a stress hormone that causes your memory to race 100 miles an hour. It also decreases white blood cells, which fight off illness. You can start practicing honesty by practicing this daily. It’s good for your health, but it may not be the best way to make your relationship work. Trust is vital for long-term relationships and marriages. Without trust in your partner, your marriage will be unable to function. You won’t take risks, give birth, or trust another person if you are constantly worried about your partner’s safety. You don’t have to tell the truth every time. Being honest doesn’t mean being dishonest. Instead, being truthful will build trust over time. People trust each other unless they know otherwise. But cheating is not only damaging, but also very difficult to repair. You must be honest with your partner and not cheat. Your chances of a happy relationship will increase if you are more honest and trustworthy. If you want to know more about how to improve your communication in relationships, contact a Psychologist-Matchmaker in Chicago, Dr. Kate Wachs. She is the founder of The Relationship Center, which offers counseling and introduction services. Being honest can cut out guesswork in relationships. It can make you more vulnerable and bring your partner closer to yourself. It can also help you to build a strong bond. By being honest with your partner, you’ll build a stronger bond and a more satisfying relationship. Cheating is the same. Your partner should be able to understand your feelings. They will appreciate your honesty and openness. You’ll be glad you did. Respecting boundaries The first step to setting healthy boundaries in your relationship is to decide what these boundaries are. What does respecting your boundaries mean to you? Are you satisfied with your partner’s commitment? Or is it draining you? Do you feel ready to give up your happiness and needs to maintain a healthy relationship with your partner? The answer to these questions can be found in the way you communicate your boundaries. Unacceptable behavior is not acceptable because you are “so busy”. Respect your partner’s boundaries is the second step. It is easy to get out of control and go against your partner’s boundaries. This behavior eventually becomes routine. If your partner does the same, don’t be upset. Instead, respect their boundaries and be the best friend you can be. You’ll both be happier if your boundaries are upheld. Respect is an important gift, so treat your partner with the utmost respect. It’s not easy to set boundaries. In reality, it’s best to discuss them in person. Emails and text messages are too easily misinterpreted, shared, or reinterpreted. It is not common to define boundaries clearly. Because people read each others’ body language and communicate through eye contact, boundaries are often not clearly defined. If the boundaries aren’t made clear or a clear cut, they may be misunderstood or diffused. A healthy relationship requires you to set boundaries. Discuss your expectations with your partner and establish boundaries based on your mutual needs. A healthy relationship can grow into something more substantial than if boundaries aren’t in place. Overstepping your boundaries can lead to conflict, hurt feelings and unhappy relationships. Therefore, you should never underestimate the importance of boundaries. Setting and respecting boundaries is an important part of having healthy relationships. Don’t be afraid to establish them, as it’s important to protect your emotional sovereignty and hold yourself accountable for the way you treat others. It’s never easy to say no to someone you care about. Be clear in communicating your wishes and confident in your decision. Remember that boundaries are not set in stone. Make sure that your partner is clear about your preferences and intentions in order to respect your boundaries. To build emotional intimacy in your relationships, it is important to have healthy boundaries. Unhealthy boundaries can lead to miscommunication, trustlessness, and codependency. Unhealthy boundaries could indicate identity and self-worth problems. If you are constantly pleasing your partner, it could be a sign that you are creating a situation that is resentful and causes resentment. If your partner doesn’t respect your boundaries, it could be a sign you don’t know what you want from a relationship. Setting boundaries in relationships is crucial for maintaining a healthy relationship. Boundaries can help you feel happy. Boundaries protect you from the bad behavior of others. By recognizing and respecting the limits, you can create a more fulfilling relationship and a more satisfying one. The benefits of respecting boundaries are both emotional and physical. Respecting your partner’s needs and limits will make you feel better. Your relationship will be healthier and more enjoyable if you have a better understanding of your partner. Boundaries are essential for healthy relationships. However, they are also crucial for creating a positive environment. Boundaries establish expectations and prevent conflicts. When relationships are healthy, boundaries are the foundation for trust and safety. Setting boundaries is a skill that you must practice. And if you have never had to do so before, it’s time to do so. It may not be easy to discuss your boundaries with your partner, but practicing makes perfect.
https://royalpitch.com/which-of-the-following-is-true-about-relationships/
When it comes to ethical decisions, there are no answers, there are only decisions. – Mel Gray and Jill Gibbons A number of ethical issues and dilemmas can arise during home visits. The intimacy of an ongoing relationship in someone's home, with no other professionals present, can lead to confusing situations. Ethical dilemmas are gray areas where there is no legal mandate. These issues are best handled by having agency policies in place and through the creation of additional policies when new situations arise. Supervisors should review applicable program policies and have open discussions with home visitors regarding their experiences during home visits. This information and support will help home visitors handle situations as they arise while sustaining their relationships with the family. (See Ethical Considerations for Home Visiting in the Home Visitor’s Online Handbook.) Confidentiality During an initial meeting, it is important to establish what information (if any) will be kept confidential between the home visitor and the family and what will be shared with others in the agency and under what circumstances. Home visitors must be very clear that they are required to report child abuse or neglect, including domestic violence or use of illegal drugs by anyone in the home. It is also important to discuss the agency's policy on keeping family health information confidential and only disclosing personally identifiable health information with written parental permission. Professional Boundaries The term “boundary” refers to the differences between a professional and personal relationship with someone. Boundaries are frequently discussed in home-based programs because the very nature of being in someone's home every week fosters an intimacy that can be like friendship. Reflective supervision can be extremely helpful as home visitors explore their relationship with individual families. However, setting boundaries is such a pervasive issue in home-based programs that staff and Policy Councils often establish guidelines. Home visitors may become genuinely fond of a family, live in the same community, and disclose information on more of a friendship level than a professional one. In small communities, home visitors may have known the family all their lives or even be related to them, as happens in some very small, rural programs. Their behavior may be determined to some extent by their desire to be liked by the family. Your agency should consider the community it serves and set policies about self-disclosure or maintaining a professional role during home visits. There may be times of crisis, such as when a family member needs transportation to an emergency room or when there is no food in the house and the food banks are closed, that will tempt home visitors to provide cash or services that are completely outside of their regular services. Again, your agency needs to develop protocols for these kinds of events. Home visitors may also be tempted to give a family their private phone number. Your agency should have a policy on this point as well. The family may invite the home visitor to dinner or a birthday party. Home visitors may run into families at school or community events or at the grocery store. Reflective supervision and agency policies can help home visitors know how to respond in these situations. The blurring or crossing of professional and personal boundaries can also arise between a supervisor and a home visitor, as well as a supervisor and a family. It is important to acknowledge when boundaries have been compromised and to take action. Here are some principles for establishing, maintaining, and repairing professional boundaries: - Start with the standards. The HSPPS require staff to comply with program confidentiality policies, according to 45 CFR §1302.90(c)(iv). - Understand the value and importance of professional boundaries. Professional boundaries protect the well-being of children, families, and staff. They define the work that staff and families or supervisors and home visitors do together, honor the differences in their roles, and preserve the objectivity of staff. - Acknowledge that boundaries can be fuzzy. Although professional boundaries are vital, they are not always clear — to children, families, staff, or supervisors. Supervisors and home visitors have a responsibility to define boundaries. In relationship-based work, it can be challenging to recognize and maintain them. - Start with the personal. Many people have trouble setting boundaries, even at home. Consider how you define and maintain boundaries in your personal life. - Celebrate your profession. The supervisors and home visitors in Early Head Start programs are knowledgeable, skilled professionals. By setting and maintaining boundaries, you honor your expertise and the value of your work. - Define roles early and often. The supervisor and home visitor in a program are colleagues and may be friends. Together, they need to articulate their professional boundaries. Bridging Cultural Gaps Many differences in values, beliefs, and customs may emerge when the home visitor and the family are from different cultures. Ideally, these differences lead to mutual learning, discussion, and negotiation with an eye toward a shared goal, such as supporting the child's learning. Some cultural differences, however, present ethical dilemmas. A common example is the American emphasis on individual autonomy, which contradicts the other cultures’ emphasis on valuing the group over the individual. One culture's etiquette may require them to offer something to eat or drink — and that the guest accept. For example, an Early Head Start home visitor may bring a snack and use it to share nutrition information. The home visitor may resist accepting tea or coffee out of a concern for hot drinks near little children. These differences can be discussed, and home visiting services can be delivered in a culturally competent and respectful manner. Perhaps the home visitor could accept a glass of water instead. An ongoing challenge for home visitors is how to address various cultural beliefs on the use of spanking as a discipline measure. There is increasing and overwhelming evidence that harsh emotional and physical discipline methods (e.g., verbal shaming, spanking) are harmful to children's social, emotional, and cognitive development. Although it may appear to work in the moment, it is not effective in teaching self-control in the long term. Home visitors must walk a delicate line as they develop a relationship with parents based on respect, including respect for a family's cultural beliefs, while sharing information on harsh punishment. This is a good topic for staff training and meetings. Home visitors may particularly benefit from opportunities to role-play this difficult topic. Read more:
https://eclkc.ohs.acf.hhs.gov/human-resources/home-visitor-supervisors-handbook/ethical-considerations-home-visiting
You - as a ward clerk, receptionist or administrative assistant - are vital to the effective running of a unit in any healthcare setting. You have to deal with disgruntled people, know your legal boundaries and have exceptional communication skills. So isn’t it about time you were supported with education to help you perform what is becoming an ever more difficult job? Attend this conference and learn about: - What can you legally say on the phone? - What are the risks to you personally if you incorrectly label or file patient records? - How to respond calmly to patient complaints - Practical ways of de-escalating aggressive behaviour - Where do you start and stop? - Knowing your boundaries - Getting off the stress merry-go-round 9:00AM REGISTRATION FOR DAY ONE 9:00 Dr Vivien LaneHealthcare Is Changing - How Will This Affect You? Major changes in health are underway. This will be affecting you now but more so in the future. The patient is increasingly in the centre of care around which the inter-disciplinary team moves. Effective coordination of this is critical. This may cause a re-think of the way work is done. As you hold an essential place in the health team this introductory session will consider what these changes will look like and what it could mean to you in the future. Includes: - What has changed in healthcare recently and what is on the horizon? - Why is there now more of an emphasis on the patient? - How will these changes affect you working within healthcare setting? 9:45 Dr Vivien LaneCXR, CT or CTPA? A Basic Guide to Health Literacy When you first worked in this role you may have wondered where you were with all the different medical terms and abbreviations used. Understanding medical terminology and the use of abbreviations can be utterly confounding but are essential. Ignorance is not bliss in this fast paced environment. This session demonstrates how basic knowledge and an understanding of medical terms matter. Includes: 10:30 MORNING TEA 11:00 Di AdamsonThe Art of Assertive Communication We all have problems getting our point across at times. However, there are likely to be constant barriers that may prevent your voice from being heard. These barriers can cause undue stress to you as well as significantly affect a patient who may be quite unwell. This session will give you information about how to communicate assertively and not cross the line into aggressive behaviour. It will be highly interactive. Includes: - How does poor communication cause stress and confusion? What is the cost? - What are the barriers to being assertive? - Why being assertive is the key to feeling valued - Understanding the difference between being assertive and being aggressive - The art of speaking up - how to have those difficult conversations - Realistic scenarios to practice being assertive 11:45 Di AdamsonDrama, Drama, Drama - Avoiding Workplace Gossip Gossiping is bad news and creates a situation where no one wins. At some point, perhaps even rumours or lies can be involved. Small comments and opinions can form a power trip and often leave others feeling isolated and unhappy. This session will discuss the importance of staying out of workplace drama and how to maintain and set high standards when you believe people are being gossips. Topics include: - Why gossip? - Is there such a thing as ‘good’ gossip? - If you are the target of hostility and workplace gossip what should you do? - How to easily manage gossip situations - How to not take home the stresses of workplace drama or issues 12:30 Di Adamson‘Listen Up’: How to Deal with Complaints No matter how good the provision of care or service, there will always be someone who is not satisfied. Conversely, if healthcare is under par complaints are justified and will give a health provider an opportunity to address a problem about which they were not previously aware. In your position, you may be the first person to receive the complaint. How you respond at this early stage has important ramifications. This session arms you with insights into the appropriate management of complaints. Includes: - First line response - what to say and do initially - How to know when to offer support - should you apologise? - Reading the signs - when to listen, when to speak - How to remain calm - appropriate use of language - Follow up documentation and other actions required 1:15PM LUNCH BREAK 2:00 Frances LalicPrivacy and Confidentiality - No Shades of Grey There are legal boundaries concerning privacy and confidentiality in healthcare. Transgressing these boundaries may cause unnecessary exposure to risk. This session will inform you clearly of the law in regard to privacy and confidentiality. It will consider: - An overview of the legal principles governing privacy and confidentiality - What legal information you need to know about handling a patient's confidential information - What is the legal scope of practice relating to these areas? 3:00 AFTERNOON TEA 3:15 Frances LalicWhat Happens When Things Go Wrong? - A Discussion of Legal Case Studies and Scenarios Whilst the importance of respecting privacy standards and patient confidentiality is acknowledged, complex situations can arise that may leave you confused and unsure of your legal situation. This final session of day one will open up discussion by using a range of highly relatable case studies and scenarios to help you think through tricky situations. Includes: - ‘To say or not to say?’ - What information can be given over the phone? - Communication via technology e.g. emails - what can be sent? - What to do if you suspect a patient has an incorrect label - do you change it? is an incident report needed? - What happens if paperwork goes missing? What if it’s confidential? - Examples of workplace ethical dilemmas - Does acting on your personal ethical decision-making threaten your job? 4:30 CLOSE OF DAY ONE OF PROGRAM Day Two 9:00AM COMMENCEMENT OF DAY TWO 9:00 Fiona De SousaInfection Prevention and Control - Everyone’s Concern Do you think you are immune to the multi-resistant organisms that can plague a hospital? Are you sure you aren’t passing on bacteria to other staff members or patients? The chain of infection is not just related to direct contact with a patient but also other staff and the general environment. This session gives you an essential update on basic infection prevention standards in healthcare settings and includes: - What is an infection? - A guide to basic hand hygiene after touching a patient or a patient's surroundings - Hygiene before eating and arriving or leaving work - what you need to do - Basic hygiene after touching patient folders - suggested hand hygiene - Equipment within the office - is it clean? - VRE swab on phones - what may it reveal! 9:45 Elaine FordBoundaries - Where Should I Draw the Line? In your workplace, boundaries are invisible lines that somehow you need to be aware of. If you step over them, you do so at your peril. Yet, a lack of clear, established boundaries can leave many feeling overwhelmed and lead to role confusion. This session will look at boundaries and why they are important. Questions to be answered include: - Why is maintaining boundaries with patients, other staff and members of the public so important? - What are the consequences of breaching them? - How do I know a boundary has been crossed? - Examples of healthy boundaries v unhealthy boundaries - How to set up and maintain strong boundaries 10:30 MORNING TEA 11:00 Elaine FordDe-escalating Aggression and Violence Unfortunately, aggression and violence in the healthcare setting is increasing. Within the workplace patients and residents may behave erratically as a result of their medical condition. You may be the first person that faces the stressed and aggressive person. In order to keep yourself safe, it is very important that you are aware of the skills needed to de-escalate a situation and reduce a person's level of agitation or aggression. This session explores methods and insights that help to prevent workplace aggression. Includes: - How to deal with aggression? - What strategies are useful to de-escalate aggression? - Use of body language and language - what matters? - How to reduce potential harm to yourself or others - Who to seek help from if exposed to danger - When might it be time to call a “code grey”? 11:45 Mike SmithSafe Use of Language in the Workplace The appropriate use of language is imperative in healthcare. It can shape, make or break interactions with patients, colleagues and members of the public. The sheer amount of communication expected of you means that this is a prerequisite to your skill set. This session looks at the power of words and will consider: - What is considered ‘safe’ use of language in healthcare settings? - How important is tone? - What is inappropriate language and what must be avoided at all times? - Multicultural considerations - key elements for success 12:30 Mike SmithKeep Calm and … Don’t Sweat the Small Stuff Constant stress is to be avoided for the sake of your health. Constant pressure can lead to blame and hostility and ultimately conflict between staff members. Learn to stop, survive and thrive in a conflict driven situation. This session will highlight: - How to not let things get under your skin - Avoiding unnecessary conflict - What are the key ingredients to resolving a conflictual situation? - How to develop your own mindset and keep calm 1:15PM LUNCH BREAK 2:00 Samantha FaithfullTime Management and Interruptions - Go Away! The pressure is on - get more done and then some - and then - there are those pesky emails that just keep on coming … and the incessant Interruptions. This session looks at principles of time management and how not managing your time is not an option. Includes: - Tips on managing a diary - prioritising and documentation - What to do when people are always interrupting you - Saying no! 2:45 Samantha FaithfullDebriefing After Critical Incidents Occasionally, you may be involved in a stressful or unexpectedly traumatic event whilst at work. This may not be easy to deal with and may require critical incidence stress debriefing. This session will discuss what such a debrief entails and when it is effective. As well, these principles of debriefing after a crisis can be adapted to everyday small stresses to prevent them from building up into big ones! Includes: - How to prevent the critical incident causing undue stress - When to know that you may need some debriefing support - An opportunity to constructively de-brief as a group 3:30 AFTERNOON TEA 3:45 Dr Judy LovasA Relaxation and Mindfulness Workshop Let's face it! Stress is unavoidable in a busy healthcare setting. This session offers you practical, evidence based ways to deal with stress and improve your health. You will learn: - What is relaxation and mindfulness? - What research supports their efficacy? - How to become more focussed at work and home - Deep diaphragmatic breathing 4:30 CLOSE OF DAY TWO OF PROGRAM The Goal Need for Program The central role that Ward Clerks, Receptionists or Administrative Assistants have in ensuring a unit functions well is becoming more evident. It is also becoming more difficult. This is due to a range of complex reasons which include: the fast turn around of acutely unwell patients, the rapid turnover of staff; the constant changes to policies and procedures; and risk management practices. As well, the shift of focus towards patient centred care requires staff to work in inter-disciplinary teams which creates further issues. All of these changes result in a need for formal educational support that is ongoing. A conference that provides such support will fill an important gap in the knowledge and skills required to confidently perform this role.Purpose of Program This conference provides wards clerks, reception staff and other administrative or clerical assistants working in healthcare settings, essential knowledge and skills to better perform the increasing duties and responsibilities required of the role.Your learning outcomes:
https://www.healthcarelink.com.au/cpd/index.php?post_permalink=1&post_id=ward-clerks-receptionists-and-administrative-assistants-conference/530
The Minnesota Chippewa Tribe Human Services Division will ensure that all staff adhere to Ethical Standards. The Human Services staff are expected to uphold the Mission Statement and the ethics standards below in the delivery of services to clients and in all program related activities. The Human Services staff will maintain an organizational climate that supports ethical behavior. The Human Services Division is committed to respecting, improving, and maintaining the well-being of each client. This shall be accomplished by establishing and providing a professional relationship with each client; acknowledging the client's autonomy, values, and cultural identity. Services will be delivered with dignity and confidentiality. The Human Services Division staff shall maintain high professional standards. Staff members are expected to abide by confidentiality within the division and to demonstrate accountability at all times. The Human Services Division staff are expected to use appropriate lines of communication within and outside the division. The Human Services Division staff are expected to maintain clear boundaries between their own personal statements, beliefs, or actions and those of the division. The Human Services Division shall create a climate that supports ethical practices. The mission of the Human Services Division of the Minnesota Chippewa Tribe is to provide a circle of quality services to elders, families and children within the tribal community by promoting self-sufficiency through health, wellness, employment, education, cultural identity, advocacy and training.
http://mnchippewatribe.org/codeofethics.html
MSN Mentor Training Day topics include: - What is ‘mentoring’? - The aim or goal of mentoring - Motivation for being a mentor - Roles and responsibilities of a mentor - The phases of a mentoring relationship - Conversation styles and developing trust - Communicating and respecting boundaries - The practice of confidentiality - Self-care, support and development for mentors - Pathways for mentors - where and who to mentor To find out more or register, visit Eventbrite. This subsidised training event was made possible thanks to the generous support of Port Waratah Coal Services.
https://www.mentorsupportnetwork.com.au/events/mentor-training-day-march-2021-1
Michelle Zelli came from an abusive background and suffered until about 20 years ago when her own personal development journey started. While working with one of her coaches, she learned about boundaries and up until that time, she didn’t even know what boundaries were! Today, she speaks and coaches about the importance of having boundaries. Can’t Watch? No Problem. Below we cover the highlights of her discussion with Jairek Robbins on this topic. Q: What are boundaries? While I cannot remember the definition I was given 20 years ago, it is important to note that I practice having boundaries. Boundaries are like a muscle, you’ve got to use it if you want it to grow strong. To me, boundaries are how we show up to the world and how we want our needs, our wants and our beliefs to be met by other people and the world at large. An example I like to use is that we keep our side of the street clean using boundaries, and if somebody is on the other side chucking junk into our side of the street, we go out with our tools to put a stop to that. Q: How do you know you have healthy boundaries in your life? If your life is full of drama, if you are resentful, if you say yes when you mean no, if you are scared of how saying no will impact your relationship with the other person, then you don’t have healthy boundaries. Boundaries are key to having healthy, functional relationships with the people around us. Related: TIME: How It Can Completely Rock or Ruin Your Business and Relationships Q: What types of boundaries exist? Let me split these into two. The first category are the boundaries around the life you live. These include things like sexual boundaries, relational boundaries, physical boundaries, financial boundaries, promotional boundaries, and so on. Regarding the types of boundaries, there are rigid boundaries, soft boundaries and there are flexible boundaries. There could be a few others, but I will just stay with those three. When somebody has rigid boundaries, chances are they push people away. If they have soft boundaries, they are like a doormat and let people do whatever they want with them. Such people can get resentful, but as long as they don’t take responsibility for what is happening, then they will remain with soft boundaries. At the other end of the spectrum is the diva personality that rigidly enforces their boundaries (it’s either my way or the highway) but then they don’t respect the boundaries of others. We want to be at a flexible 5 or 6 out of 10, and that’s called a flexible boundary. Here, you know what you want, you know what you need and you show up in the world with these clear in your mind. You also know what your deal breakers are, but the problem is that a lot of people don’t even know how they feel about different situations. That is where one has to go back to the basics and learn who they are and what they stand for. Q: What should boundaries feel like? Rather than set boundaries when we are angry or pissed off, we should set boundaries while we are calm, respectful and honest so that the boundaries reflect those attributes. Q: What tips can help one set their boundaries? First, figure out how you feel about something. For example, if you feel ashamed, it probably means that you crossed your own boundary. Be curious and get specific about why you are feeling the way you are. Usually, you are angry because your needs aren’t being met, so start by identifying the specific need that isn’t being met, and how you want it met. Get the need met by communicating kindly, calmly and respectfully. As you examine how you feel, don’t judge yourself because this will block honest inquiry into what’s going on. Don’t expect to be brilliant at setting and maintaining boundaries. Rehearse them and keep fine-tuning. You may be required to compromise at some point or even pivot, but maintain the general course you have set. Pay attention to tonality while communicating your boundaries. For example, don’t sound irritated or commanding while telling your spouse to pick up their socks. Instead, speak politely and let them know it would mean a lot to you if they picked up their socks so that the space is tidy and organized. Q: Why are boundaries within a family setting so hard to implement? True, boundaries within a family setting can be so challenging because there is a kind of blueprint that you have grown up with (this is how we operate around here). However, you have to be kind, calm and reasonable while insisting that the personal boundaries have to be respected regardless. Q: Talk about internal boundaries? I have coached tens of thousands of people, and in that time, I am yet to find someone who is good at maintaining external boundaries while being poor at internal or self-boundaries. So, the first thing that we need to do is show up for ourselves by setting internal boundaries. How much can I spend on a night out? What is the maximum amount of money I can lend a friend? Who can I lend my car and under what conditions? How much time do I allow myself to entertain negative thoughts? Ultimately, internal boundaries are about self-discipline. You are showing up with integrity for yourself. For example, many people make sure they keep their promises to others, but they forget to keep their own promises to themselves. That’s not self-discipline. Q: Where does one start on the journey to having boundaries? That’s hard to say, because there is no one-size-fits-all approach to this. However, a good place to start would be to find out what aspects of your life you are resentful or angry about, especially with yourself. Start interrogating why you feel that way and identify what boundaries you can establish in order to turn things around. For example, if you feel resentful because you keep accepting to help others and you end up with your own tasks undone, then set boundaries to limit how often you say yes. Q: How do you set boundaries when your partner is having an affair and you want them back? Won’t the boundaries push them away? That is a serious dilemma right there. But, a starting point to look at the situation is that the other person hasn’t put in the effort to uphold your boundaries and you now have a big decision to make on whether you will stand up for your values or set them aside and support the values of the other person. The fear of losing that person is eroding your self-esteem and your sense of self-confidence, your self-love and self-care. It would be helpful if you reaffirmed your boundaries and decided to take care of yourself, because ultimately, if the person stays and doesn’t respect your boundaries then you will feel a lot worse than if the person were not there. Q: If a boundary is crossed, should people have a pre-arranged way of how to react or respond to such an “infraction”? First of all, I recommend putting your cards on the table by letting the other person know what is important to you. Get clear about what the deal-breakers are. Now we talked about flexibility, and there is room for it once you think a boundary has been crossed. For example, it may be okay for you to change a specific boundary in that moment if the circumstances under which it was crossed are understandable. Q:You mentioned that there’s a lot of videos you’ve put up on YouTube for people to learn about this. Where else can they engage with you? They can obviously find me on Instagram (@michellezelli). You can also find me on Facebook where I have a personal page and a coaching page. Like the coaching page (Michelle Zelli) and you’ll find lots of stuff you can learn from. Q: What are your closing remarks in terms of what people can do to start moving in the right direction on the subject of boundaries? Right now, what is that one relationship that you feel angry or resentful about in this moment? Pick just one and then get clear on where your needs aren’t being met in that relationship. Thereafter, start to work out how you can put in place some boundaries so that your needs can start being met. Communicate in a kind, honest way with an open body posture so that your message will be well received. Do the same for your internal boundaries and as you get better at respecting your self-boundaries, you will find it easier to implement boundaries in your interactions with others. To Your Success,
https://jairekrobbins.com/creating-boundaries-interview-with-michelle-zelli/
The elbow is a complex joint formed by the articulation of three bones –the humerus, radius and ulna. The elbow joint helps in bending or straightening of the arm to 180 degrees and assists in lifting or moving objects. The bones of the elbow are supported by - Ligaments and tendons - Muscles - Nerves - Blood vessels Bones and Joints of the elbow joint The elbow joint is formed at the junction of three bones: - The Humerus (upper arm bone) forms the upper portion of the joint. The lower end of the humerus divides in to two bony protrusions known as the medial and lateral epicondyles which can be felt on either side of the elbow joint. - The Ulna is the larger bone of the forearm located on the inner surface of the joint. The curved shape of the ulna articulates with the humerus. - The Radius is the smaller bone of the forearm situated on the outer surface of the joint. The head of the radius is circular and hollow which allows movement with the humerus. The connection between the ulna and radius helps the forearm to rotate. The elbow consists of three joints from articulation of the three bones namely: - Humero-ulnar joint is formed between the humerus and ulna and allows flexion and extension of the arm. - Humero-radial joint is formed between the radius and humerus, and allows movements like flexion, extension, supination and pronation. - Radio-ulnar joint is formed between ulna and radius bones, and allows rotation of the lower arm. Articular cartilage lines the articulating regions of the humerus, radius and ulna. It is a thin, tough, flexible, and slippery surface that acts as a shock absorber and cushion to reduce friction between the bones. The cartilage is lubricated by synovial fluid, which further enables the smooth movement of the bones. Muscles of the Elbow Joint There are several muscles extending across the elbow joint that help in various movements. These include the following: - Biceps brachii: upper arm muscle enabling flexion of the arm - Triceps brachii: muscle in the back of the upper arm that extends the arm and fixes the elbow during fine movements - Brachialis: upper arm muscle beneath the biceps which flexes the elbow towards the body - Brachioradialis: forearm muscle that flexes, straightens and pulls the arm at the elbow - Pronator teres: this muscle extends from the humeral head, across the elbow, and towards the ulna, and helps to turn the palm facing backward - Extensor carpi radialis brevis: forearm muscle that helps in movement of the hand - Extensor digitorum: forearm muscle that helps in movement of the fingers Elbow joint ligaments and tendons The elbow joint is supported by ligaments and tendons, which provide stability to the joint. Ligaments are a group of firm tissues that connect bones to other bones. The most important ligaments of the elbow joint are the: - Medial or ulnar collateral ligament: comprised of triangular bands of tissue on the inner side of the elbow joint. - Lateral or radial collateral ligament: a thin band of tissue on the outer side of the elbow joint. Together, the medial and lateral ligaments are the main source of stability and hold the humerus and ulna tightly in place during movement of the arm. - Annular ligament: These are a group of fibers that surrounds the radial head, and holds the ulna and radius tightly in place during movement of the arm. The ligaments around a joint combine to form a joint capsule that contains synovial fluid. Any injury to these ligaments can lead to instability of the elbow joint. Tendons are bands of connective tissue fibers that connect muscle to bone. The various tendons which surround the elbow joint include - Biceps tendon: attaches the biceps muscle to the radius, allowing the elbow to bend - Triceps tendon: attaches the triceps muscle to the ulna, allowing the elbow to straighten Nerves of the elbow joint The main nerves of the elbow joint are the ulnar, radial and median nerves. These nerves transfer signals from the brain to the muscles that aid in elbow movements. They also carry the sensory signals like touch, pain, and temperature back to the brain. Any injury or damage to these nerves causes pain, weakness or joint instability. Blood Vessels Arteries are blood vessels that carry oxygen-pure blood from the heart to the hand. The main artery of the elbow is the brachial artery that travels across the inside of the elbow and divides into two small branches below the elbow to form the ulnar and the radial artery.
https://www.doctordawson.com/elbow-anatomy.html
Covered in 4.5: -A nerve in your elbow creates the shooting pain you feel when you hit your “funny bone” -180 degrees of extension between the ulna and the humerus is what’s considered “normal” -People with hyperextension can extend more than 180 degrees between the ulna and humerus -This is dangerous if you’re putting weight on your hands and arms (because it creates bone-on-bone contact) -More women than men will have hyperextension of the elbow (although it can show up in both genders) -Ask hyper-extenders to micro-bend their elbow and engage muscularly -Cues about the elbow crease (and which direction it should face) don’t work very well in a yoga classroom, since we’re all so wildly different Please come to this video prepared to simply rest -- and breathe. Set aside some quiet time for yourself (10 minutes or so) and lie down in a space where you can rest fully. Just absorb, and relax. Enjoy! Covered in 5.2: -The diaphragm separates the thoracic cavity (your heart) and the abdominal cavity (your organs) -The diaphragm has attachments on the lumbar spine AND the psoas -The superior side of the diaphragm attaches the to fascia of the heart (the pericardium) and the lungs (the two ...
https://brettlarkinyoga.vhx.tv/packages/yoga-teacher-training-material-fall-2017/videos/ytt-4-5
The elbow, in essence, is a joint formed by the union of three major bones supported by ligaments. Connected to the bones by tendons, muscles move those bones in several ways. The bones that create the elbow are: - Humerus: This long bone extends from the shoulder socket and joins the radius and ulna to form the elbow. - Radius: This forearm bone runs from the elbow to the thumb side of the wrist. - Ulna: This forearm bone runs from the elbow to the “pinkie” side of the wrist. The elbow can move in three ways based on slight variations in the positions of the heads of the three bones. The first is the large hinge action that is used in most movements of the arms, such as holding bags of groceries or doing bicep curls. The other movements are so small that the untrained eye rarely notices the changes in position, but they are important for motor function of the hand and wrist. Inside and outside the elbow joint, there are points where tendons attach. These tendons allow for wrist and hand movements. For example, they allow the hand to rotate. The elbow bones are held together primarily by fibrous tissue known as ligaments. The ulnar collateral ligament, or UCL, on the inner side of the joint closest to the body is the primary stabilizer. This thick triangle-shaped band connects the head of the humerus to the heads of the ulna and radius. The UCL can be torn or completely ruptured, which would cause severe pain on the inside of the elbow, a popping noise, swelling, and bruising. Injuries to the UCL are common among baseball pitchers, football quarterbacks, ice hockey players, and racquet sport players due to the type of motion these sports involve. The other ligament in the elbow is the radial collateral ligament. Located on the outside of the elbow, it prevents excessive extension of the elbow. Bone fractures are among the most common short-term injuries of the elbow as it is a common point of contact during high-impact collisions such as automobile accidents, falls, and sport injuries. The radius and ulna—the bones of the forearm—are also commonly broken. These fractures are often healed with casts to immobilize the bone, but compound fractures (multiple breaks) may require the surgical implantation of pins and plates, and other types of reinforcement with surgical hardware. Another common fracture occurs at the heads of the ulna, radius, and humerus at the elbow. Although a break here is not always a complete fracture, it can cause swelling and extreme pain.
https://www.healthline.com/human-body-maps/elbow-bones/male
MULTIPLE DEGREE OF FREEDOM PROSTHETIC ELBOW JOINT: DESIGN OF A PROSTHETIC ELBOW JOINT WITH FLUID JOINT MEMBRANE SAC TO ENABLE MORE FLUID ROTATIONAL MOVEMENT Current prosthetic designs have limitations with properly representing the full range of motion that a human elbow provides. The structure of the biological elbow was analyzed to assess how it produces the flexion/extension and pronation/supination movement. The humerus and ulna have a hinge joint relationship, the humerus acts as a concave cylinder and the ulna acts as a convex cylinder, and the radius and ulna have a pivot joint relationship, the radius rotates around the ulna on a single axis. The joint cavity is responsible for flexion/extension and pronation/supination and also provides lubrication and strength of the elbow joint. A new design of a prosthetic elbow joint was created to mimic human elbow movements. The design uses a ball-and-socket socket joint that allows for flexion/extension and pronation/supination movement while incorporating a hydrogel lining to provide lubrication and restriction of pronation/supination to not go beyond human capacity. This joint was designed to be assembled from the back to the front; the socket has a cap on the outside that would allow for the ball to be inserted inside the socket and the cap be placed onto the socket. Once the final design and assembly process was completed, analysis of the design was performed to determine whether the design would be functional and reliable. The analysis concluded that the design and the material chosen for the design would not result in fracture and would also result in a large factor of safety, thus indicating that the prosthetic joint would not be easily damaged. Further research and development of this prosthetic elbow joint could be performed to allow it to be interchangeable with hinge joints that are currently used. Future work will include further research on the hydrogel lubricant, further analysis of the design and possible design modifications to allow for use in current practices and to account for the weak points in the current design. In summary, a successful redesign of the elbow joint prosthetic that provides low friction flexion/extension as well as pronation/supination movement will better serve the needs of individuals with amputation.
https://keep.lib.asu.edu/search?f%5B0%5D=linked_agents%3ASchool%20of%20Human%20Evolution%20%26%20Social%20Change
Your elbow joint or shoulder joint is where three bones in your arm meet: your upper arm bone (humerus) and the two bones in your forearm (radius and ulna). It is a combination hinge and pivot joint. The hinge part of the joint lets the arm bend and straighten; the pivot part lets the lower arm twist and rotate. At the upper end of the ulna is the olecranon, the bony point of the elbow that can easily be felt beneath the skin. On the inner and outer sides of the elbow, thicker ligaments (collateral ligaments) hold the elbow joint together and prevent dislocation. The ligament on the inside of the elbow is the ulnar collateral ligament (UCL). It runs from the inner side of the humerus to the inner side of the ulna, and must withstand extreme stresses as it stabilizes the elbow during overhand throwing. Several muscles, nerves, and tendons (connective tissues between muscles and bones) cross at the elbow. The flexor/pronator muscles of the forearm and wrist begin at the elbow, and are also important stabilizers of the elbow during throwing. The ulnar nerve crosses behind the elbow. It controls the muscles of the hand and provides sensation to the small and ring fingers. Cause & Symptoms Cause Elbow and shoulder injuries in throwers are usually the result of overuse and repetitive high stresses. In many cases, pain will resolve when the athlete stops throwing. It is uncommon for many of these injuries to occur in non-throwers. In baseball pitchers, rate of injury is highly related to the number of pitches thrown, the number of innings pitched, and the number of months spent pitching each year. Taller and heavier pitchers, pitchers who throw with higher velocity, and those who participate in showcases are also at higher risk of injury. Pitchers who throw with arm pain or while fatigued have the highest rate of injury. Symptoms Most of these conditions initially cause pain during or after throwing. They will often limit the ability to throw or decrease throwing velocity. In the case of ulnar neuritis, the athlete will frequently experience numbness and tingling of the elbow, forearm, or hand as described above. Diagnosis Medical History The medical history portion of the initial doctor visit includes discussion about the athlete’s general medical health, symptoms and when they first began, and the nature and frequency of athletic participation. Physical Examination During the physical examination, the doctor will check the range of motion, strength, and stability of the elbow. He or she may also evaluate the athlete’s shoulder. The doctor will assess elbow range of motion, muscle bulk, and appearance, and will compare the injured elbow with the opposite side. In some cases, sensation and individual muscle strength will be assessed. The doctor will ask the athlete to identify the area of greatest pain, and will frequently use direct pressure over several distinct areas to try to pinpoint the exact location of the pain. To recreate the stresses placed on the elbow during throwing, the doctor will perform the valgus stress test. During this test, the doctor holds the arm still and applies pressure against the side of the elbow. If the elbow is loose or if this test causes pain, it is considered a positive test. Other specialized physical examination maneuvers may be necessary, as well. The results of these tests help the WBJ physician decide if additional testing or imaging of the elbow is necessary. Imaging Tests X-rays. This imaging test creates clear pictures of dense structures, like bone. X-rays will often show stress fractures, bone spurs, and other abnormalities. Computed tomography (CT) scans. These scans are not typically used to help diagnose problems in throwers’ elbows. CT scans provide a three-dimensional image of bony structures, and can be very helpful in defining bone spurs or other bony disorders that may limit motion or cause pain. Magnetic resonance imaging (MRI) scans. This test provides an excellent view of the soft tissues of the elbow, and can help your doctor distinguish between ligament and tendon disorders that often cause the same symptoms and physical examination findings. MRI scans can also help determine the severity of an injury, such as whether a ligament is mildly damaged or completely torn. MRI is also useful in identifying a stress fracture that is not visible in an x-ray image.
http://www.glorthopedics.com/throwing-injuries/
Fractures of the olecranon are classically the result of fall on the elbow with eccentric triceps contraction. These range from small extra-articular fragments to intra-articular comminuted fractures that may be associated with elbow dislocations. Fractures of the proximal ulna are higher energy injuries and are associated with injuries to the proximal radio-ulnar joint; the radial head and the coronoid process; thus representing instability of either the elbow or the proximal radio-ulnar joint (Monteggia fracture dislocation). Commonly used classifications include Bado type based on direction of radial head replacement or Jupiter’ based on level of fracture of the ulna. These fractures are usually operative and require an anatomic fixation to allow for optimal outcome. Olecranon fractures are sustained secondary to a fall, usually on a flexed elbow; while proximal ulna fractures result from high-energy injuries including motor vehicle accidents or fall from height. The patient presents with pain and swelling with inability to extend the elbow; and a palpable defect at the fracture site in cases of displaced fractures. Swelling and ecchymosis (especially in the older patient on blood thinners) may make palpation of the defect difficult. Abrasions and wounds must be carefully evaluated to rule out an open fracture due to the superficial location of the proximal ulna. Distal neuro-vascular checks are important with higher energy injuries, with attention to ulnar and posterior interosseous nerves. Radiographs include an Antero-Posterior view; lateral view and oblique views if the radial head fracture is suspected. A CT scan is recommended for complex fractures to delineate the presence of a coronoid fracture or radial head fracture morphology to assist in treatment planning. If the elbow is dislocated, as may happen with high energy proximal ulna fractures, a closed reduction should be performed and the elbow splinted prior to further radiographic workup. Non-operative treatment is indicated for non-displaced or minimally displaced (<2-3mm) olecranon fractures; or those in medically unstable patients where the risk of surgery will outweigh the benefits. The patient’ arm is placed in a long arm splint initially and is maintained for 1-2 weeks for pain control and then followed by protected range of motion with an elbow-hinged brace for 6-8 weeks. In displaced fractures, fibrous union will allow functional range in low demand patients. Overall, this treatment option is suboptimal for displaced fractures and will result in weakness of extension and difficulty with overhead activities. Intra-articular displacement or step-off of >2mm. Loss of active elbow extension (as tested with gravity eliminated) implying loss of extensor mechanism. Proximal ulna or olecranon fractures associated with elbow instability; and/or radial head or coronoid fractures which may require fixation. Tension band wiring using two parallel K-wires and circlage or figure of eight wires (or sutures) passed through a bone tunnel distally is indicated for simple transverse intra-articular fractures and avulsion fractures (Figure 1). An intramedullary screw (6.5 or 7.3mm cancellous screw) may also be used in lieu of K-wires and is biomechanically superior, but screw head prominence may be an issue. Tension Band wiring for olecranon fracture. Plating is best indicated for comminuted or oblique fracture patterns; the plate can be a one third tubular plate for simple fracture patterns (Figure 2); or a reconstruction type plate or pre-contoured locking plate for comminuted ones. Olecranon fracture fixed with a hook plate, a one-third tubular plate contoured to the bone and fixed with small fragment screws. This is amenable for simpler fractures patterns of the olecranon and not recommended for proximal ulna higher energy fractures. Newer implants include olecranon nail which can be used for simpler fracture patterns as well. For proximal ulna fractures, use of stronger implants, like commercially available pre-contoured plates with a proximal curve that goes around the olecranon and allows for increased proximal fixation are recommended to minimize chances of failure. Reconstruction type plates may also be used and contoured by the surgeon to fix the proximal ulna (Figure 3). Proximal ulna fracture fixed using a pre-contoured locking plate with radial head replacement. Note the use of additional mini-fragment plates to allow fixation of smaller fragments not captured by the larger plate. This technique aids in the reduction while supplementing fixation strength. Excision of smaller fragments (up to 40%) with tendon advancement is reserved for patients with limited function and may have little or no advantage over non-operative care. The patient can be positioned supine with the arm across the chest; lateral or prone with the elbow flexed over a padded post. The position used is dependent on various factors including surgeon experience; presence of other injuries precluding certain positions, for example a spine injury may necessitate prone or supine position; the need for other concurrent surgeries like bilateral elbow fractures or acetabulum fractures may be performed in the prone position. I personally prefer the lateral position which allows easy access to the proximal ulna and extension to medial or lateral side as needed (Figure 4). A tourniquet applied to the upper arm is usually out of the surgical field; however, a sterile one may be used based on surgeon preference. Patient in lateral position with arm flexed over a post. Note the plastic bag which allows for sterility of the hand and acts as a receptacle for irrigation fluid and any dropped instruments. The incision is curved radially to avoid the point of the elbow. Surgical repair involves a posterior approach with the incision curved radially around the olecranon process to avoid painful scarring on the point of the elbow. For proximal ulna fractures, extended access may be needed to address radial head or coronoid fractures. Raising a flap underneath the fascia either laterally (Kocher interval between the ECU and Anconeus muscles) to approach the radial head or medially (sub-muscularly around the ulna) for the coronoid will allow access for fixation or replacement. Once the exposure is completed, the fracture is cleared of in-folded periosteum and blood clots so the fracture ends can be visualized as well as the elbow joint. The articular surface is inspected for injuries and any depression or cartilage loss. Once the fracture pattern is understood, one can reduce the olecranon fracture using a pointed reduction clamp placed through a drill hole distally if needed and use k-wires for initial fixation. If the tension band technique is being used, the K-Wires should be inserted such that they are parallel and engage the anterior cortex distal to the olecranon. This will minimize the chances of them backing out and becoming prominent. The circlage or figure of eight wire is passed through a transverse drill hole distally and then around the base of the K-wires. Holding the elbow in extension these are tightened using one or two knots (Figure 2). The elbow is ranged to confirm adequate fixation. The same technique is used for suture (usually double strand of #5 ethibond or fiberwire); to facilitate passage of suture or wire through the triceps tendon proximally a cannula (angiocath) may be used. If a plate is used, the initial K-wires must be inserted from either side of the midline of the olecranon to make room for the plate. The triceps tendon is split longitudinally in the midline without compromising its insertion to allow the plate to sit on bone. It is important to assess the plate position on the bone clinically and fluoroscopically before insertion of screws. The first screw inserted is usually the proximal one which goes across the fracture and may engage the anterior cortex similar to the K-wires or go into the canal to allow compression of the fracture as well as ‘uck’ the plate to the bone. Distal screws are then inserted with the fracture reduced and compressed if fracture pattern is amenable. In proximal ulna fractures, similar techniques as above may be used, however, a few additional steps are required. Use of lag screws for intervening fracture fragments is useful in converting a complex fracture pattern to a simpler one. The coronoid process is fixed using either a screw or a suture passed from the capsule at the base and through drill holes in the ulna and then tied over a bony bridge over the subcutaneous surface or the plate. The plate is now affixed to the bone to regain length and alignment. Finally, the radial head is addressed for fixation or replacement as needed. For radial head fractures, presence of three or more fragments is an indication for radial head replacement; others can be fixed using mini-fragment or pre-contoured locking plates. These plates should be placed in the safe arc of motion to prevent impingement on the radio-ulna joint. Some authors advocate radial head surgery prior to ulna fixation; however, in my practice, I prefer to regain the ulna length and alignment first to help with the radial head. If a locking plate is used, proximal fixation may be enhanced using locking screws, especially when near the joint and inserted unicortical. Distally, the bone quality in the diaphysis is sufficient for cortical screws and allow compression of the plate to the bone. Fluoroscopy is useful in assessing reduction and hardware placement. Once fixation is complete the elbow should be taken through a range of motion to assess fracture fixation and elbow joint stability. A lateral position with arm over the post allows easy exposure and extending it will help when doing the reduction. Use of a plastic bag (mayo stand cover) for the hand will provide a sterile cover, and a collection bag for irrigation fluid. When marking the incision, also write out radial (R) and ulna (U) on the skin to aid with intra-operative orientation. Articular impaction must be identified and elevated using the trochlea as a template; bone grafting (cancellous allograft; or bone graft substitutes) behind it and/or mini fragment screws are used to hold the reduction. In complex, comminuted fractures, use of additional mini-fragment plates will help in reducing small fragments to build up each segment and aid in overall reduction. If the radial head is not reduced; check the ulna reduction; the most common reason is mal-reduction including shortening which may preclude the radial head from going back into the joint. In the elderly patients with olecranon fractures, use of supplemental suture passed through the triceps tendon proximally and plate/bone distally will aid in the fixation and reduce failure rates from ‘pullout’ of the bone from the screws proximally due to the triceps contraction. The most common complication after olecranon fractures is hardware prominence which may necessitate removal. Wound breakdown secondary to the superficial position of the plate or wires also contributes to the problem. For higher energy injuries, restriction of range of motion at the elbow and proximal forearm may be minimized by early range of motion and stable fixation. Non-union and implant failure may be seen in comminuted fractures with bone loss or inadequate reduction and fixation. The arm is splinted for 7-10 days to allow for soft tissue healing and range of motion at the elbow is allowed after that time; physical therapy is helpful as well. Weight bearing after simple ulna fractures is allowed if needed for use of assistive devices for ambulation. Complex fracture patterns including Monteggia fractures should be maintained non-weight bearing for 6 weeks or till healing is seen. By 6 weeks, the patient is allowed most activities, once radiographic healing is noted. Return to impact exercises is restricted till bony union is completed, usually 3-4 months or longer (up to 6 months) in highly comminuted proximal ulna fractures with radial head involvement. The expected range of motion is dependent on the severity of injury, the quality of the fixation, the post-operative rehabilitation and most patients tend to regain a functional range of motion. The outcome of Monteggia fractures is not as good as those with olecranon fractures and a higher incidence of non-union, restriction of range of motion, development of heterotopic ossification, especially when associated with elbow dislocation. Ring, D. “Monteggia Fractures”. Orthop Clin North Am. vol. 44. 2013. pp. 59-66. Olecranon and proximal ulna fractures span a wide spectrum of injuries and require treatment for repair and early range of motion. Most of these are intra-articular injuries and an anatomic reduction is important. Evaluation of associated injuries including those to the radial head and coronoid and addressing them at the same time will minimize the common complications of elbow and forearm stiffness.
https://www.psychiatryadvisor.com/home/decision-support-in-medicine/shoulder-and-elbow/fractures-of-the-olecranon-and-proximal-ulna/
The bony anatomy of the elbow joint requires a brief description to lay the framework for the collateral ligaments of the elbow. Three bony structures create multiple articulations within the elbow complex. The three bony structures include the distal humerus, proximal radius, and proximal ulna. The distal humerus contains two main structures, the trochlea, and the capitellum. The medial epicondyle of the humerus provides a site of connection for ligamentous and muscular structures. The proximal ulna also has two articulations, the greater and lesser sigmoid notches. The trochlea and greater sigmoid notch have 180 degrees of articular contact during the elbow range of motion (ROM). The lesser sigmoid notch articulates with the radius at the proximal radioulnar joint. The radial head and capitellum form the raidiocapitellar joint. The radial head allows for pronation and supination of the elbow. The MCL has three ligamentous portions: the anterior bundle (AMCL), the posterior bundle, and the transverse ligament (Cooper ligament). The AMCL and posterior bundle originate from the medial epicondyle of the distal humerus, on the posterior side of the elbow; this creates ligamentous tension with elbow flexion. The insertion site of the AMCL is the sublime tubercle on the coronoid process of the ulna, and the posterior bundle inserts on at the medial olecranon of the ulna. The transverse ligament originates from the olecranon process inserts on the sublime tubercle of the ulna. As mentioned, the MCL acts as a primary stabilizer of the elbow, but specifically during valgus stress. For this reason, the MCL is the most commonly injured ligament in overhead throwing athletes; this is due to the mechanics of throwing motion that cause extreme valgus stress at high velocities. The anterior and posterior bundles provide reciprocal function, as the anterior portion is tight in extension, and the posterior portion is tight in flexion. During flexion of the elbow, the MCL also limits internal rotation. The MCL also functions as a restraint in posteromedial rotatory instability, specifically the AMCL. Further evaluating the MCL and the specifics of valgus stress, the MCL provides one-third of the valgus restraint in extension, and one half in 90 degrees of elbow flexion. The MCL coincides with the flexor and pronator forearm musculature in dynamic stability. The LCL contains four ligamentous portions: the lateral ulnar collateral ligament (LUCL), radial collateral ligament (RCL), annular ligament, and accessory collateral ligament. The LUCL and RCL originate from the inferior surface of the lateral epicondyle of the humerus. These two ligaments provide consistent tension through elbow ROM. The LUCL inserts at the proximal ulna and the RCL attached to the annular ligament. The annular ligament wraps around the radial head and attaches to the anterior snd posterior margins of the lesser sigmoid notch of the proximal ulna. The RCL and annular ligaments provide stabilization for the radial head. The accessory collateral ligament runs from the medial portion of the supinator crest (on the proximal ulna) and attaches to the inferior portion of the annular ligament. The LCL functions to primarily resist posterolateral rotatory instability, and to a lesser extent, the LCL resists varus stress. The ulnohumeral joint provides the majority of stability when the elbow is under varus stress application; the LCL resists just 10% of varus stress. Within the LCL unit, the LUCL appears to be the primary stabilizer, but the entire four-ligament complex is required to provide radiohumeral, radioulnar, and ulnohumeral joint stability. The extensor forearm musculature coincides with the LCL ligament to provide stability with dynamic motion. the LCL is most vulnerable in the supinated position. The elbow joint develops in three phases, the homogenous interzone, three-layered interzones, and cavitation. Chondrogenic areas are termed homogenous interzone around six weeks, and cartilaginous development increase via appositional growth. Homogenous zones convert into three-layered interzones at seven weeks. Mesenchymal tissue will condense into a fibrous capsule, and vascular mesenchyme becomes incorporated into the joint as synovial mesenchyme. This synovial mesenchyme will form the synovial tissue as well as the intracapsular ligaments. Cavitation, occurring at eight weeks, is when the articular cavity will form. Cavitation is initially independent of movement, but articular motion is necessary for full differentiation and development of the cavity. There is a discrepancy when the collateral ligaments are first visible. Studies have demonstrated visualization of the collateral ligaments in as early as 56 days in a 31 mm fetus. Yet other studies mention requiring fetuses of 270mm or larger for visualization of the collateral ligaments. Merida-Velasco et al. found that during week 12, vascular canals became apparent in the humerus, trochlear notch of the ulna, and radial head. It was at this time that the lateral ligaments began to develop into small densities of the outer aspect of the articular capsule. The elbow joint receives its blood supply from peri-articular anastomoses. Specifically, the brachial, deep brachial, ulnar, and radial arteries have collateral and recurrent branches to provide continuous blood flow. Superior collateral branches include superior collateral, inferior ulnar, and radial collateral arteries. The inferior collateral branches include the anterior and posterior ulnar recurrent arteries, the recurrent interosseous artery, and the radial recurrent artery. The venous outflow is provided by the radial, ulnar, basilic, and brachial veins. Specifically, the blood supply to the medial collateral ligament is unknown. A descriptive laboratory study utilizing 18 fresh-frozen male cadaveric elbows injected 60 mL of India ink into the brachial artery of each elbow. The proximal MCL consistently exhibited dense blood supply, while the distal MCL was hypovascular. The authors also found a possible contribution to the proximal MCL from the medial epicondyle. An artery from the flexor/pronator musculature also consistently provided blood to the proximal MCL. The average length of vascular penetration was 49% for the entire MCL. The study concluded there is a difference in vascular supply between the proximal and distal MCL. They suggested that the hypovascularity of the distal MCL may result in a lack of appropriate healing capacity, and MCL injuries may differ in a progression based on the location of the injury (proximal vs. distal). Superficial cubital lymph nodes and deep cubital lymph nodes are located above the medial epicondyle at the elbow. The superficial cubital nodes receive lymph from the medial side of the hand and forearm, while the deep cubital nodes drain the elbow joint itself. The lymph from these nodes eventually reaches the axillary lymph nodes bilaterally. The lymph from the left will enter the thoracic duct and lymph from the right will enter the right lymphatic duct. The elbow joint receives branches of the median, radial, and musculocutaneous nerves anteriorly. Posteriorly the elbow joint is supplied by the ulnar nerve. The median nerve branches into small sections that innervate the anteromedial epicondyle, where the MCL originates. The ulnar nerve supplies the posteromedial part of the elbow capsules, also in the neighborhood of the medial epicondyle and the olecranon. Branches from the radial nerve supply the posterolateral region of the elbow capsule, which is the location of the LCL. The MCL works with the medial flexor musculature to resist valgus stress. Medial flexor musculature includes the flexor carpi ulnaris, flexor carpi radialis, flexor digitorum superficialis, and pronator teres. The LCL works with the extensor forearm musculature to resist varus forces. The extensor muscles include the extensor carpi ulnaris, extensor digitorum communis, extensor carpi radialis brevis and longus, and the anconeus. The anconeus is of significant importance because it provides major dynamic constraint to posterolateral rotatory instability and varus stresses, two functions that are also provided by the LCL. A study examining cadaveric specimens looked at specific ligaments of the MCL (anterior bundle, posterior bundle, and transverse ligament). Specifically, they focused on the transverse ligament and its relationship with the anterior ligament. The majority of the transverse ligament continues to the distal half of the anterior ligament, and less common variants included transverse ligaments that traveled the entire anterior ligament. There is minimal variation with the anterior and posterior bundles. Of note, while the most common insertion site for the anterior bundle of the MCL is the sublime tubercle, variations have been found. Studies have found anterior bundle insertion only 1 mm away from the joint line. Other studies have found the insertion of the anterior bundle to be 3 mm more distal. This distal insertion has clinical relevance because it creates a small recess on arthrograms, which simulates a partial undersurface tear of the anterior bundle. An accessory or "extra bundle" ligament belonging to the MCL was also present in a quarter of examined specimens found in one study. The addition of this ligament creates an MCL comprised of four ligaments. The extra-bundle ligament originates from the posteromedial aspect of the capsule and inserts on the transverse bundle. The transverse bundle itself has a variation of a fanlike distribution with insertions onto the anterior bundle and coronoid; this creates a strong oblique pattern on imaging. Posterolateral rotatory instability (PLRI) occurs secondary to a traumatic or iatrogenic injury to the LCL, which is the most common recurrent instability of the elbow. The radial head frequently subluxes, which creates lateral elbow pain and mechanical issues while the elbow is in flexion and supination, and a load is applied. While conservative treatment such as physical therapy and activity modification should be trialed, nonoperative management of PLRI is typically ineffective. Surgical treatment is necessary to restabilize the joint in patients with persistent and symptomatic instability that causes pain or functional impairment. In acute, simple dislocation, closed reduction under general anesthesia is suggested. If the lateral elbow is stable past 30 degrees of extension, the patient wears a dynamic brace for six weeks. However, if after the closed reduction, the lateral elbow is still unstable before 30 degrees extension, ligament repair is necessary. Chronic and symptomatic PLRI requires surgical intervention, as mentioned. The pivot shift test is performed on a supine patient, with the forearm hypersupinated. Valgus stress, along with an axial load, is then applied to the elbow while moving the elbow form extension to flexion. A positive-shift test on a conscious patient is with patient apprehension. In a sedated patient (under general anesthesia), this test is positive with subluxation or dislocation of the elbow, typically occurring between 30 to 45 degrees of flexion. Low-grade PLRI (subluxation) is treated with LCL imbrication via arthroscopic or open technique. Severe PLRI (dislocation) requires LCL reconstruction with graft use. Results after reconstruction show good to excellent results in 85% of patients. Recurrent instability has been seen even after surgical intervention, in up to as many of 25% of patients after medium to long-term follow-up. MCL injury is more common, and especially seen in overhead throwers such as pitchers. For painful, symptomatic MCL injuries, reconstruction is a reliable treatment method for correction. Surgery is indicated after nonoperative treatment has been exhausted. Surgical treatment for the MCL is one of the most well known in the sports world and is dubbed "Tommy John surgery" after pitcher Tommy John was successfully treated using the following technique. The docking technique is most commonly performed. Advantages include minimizing injury to the flexor/pronator musculature, avoidance of the ulnar nerve, providing an optimal location for graft tensioning, and minimizing the amount of bone removed from the medial epicondyle. Surgical treatment utilizes autograft, most commonly from the palmaris longus. Other graft options include gracilis, semitendinosus, toe extensor, plantaris, patellar tendon, and Achilles autografts. This injury that was once deemed a career-ending injury for major league baseball pitchers now shows an astounding 83% return to sport after UCL reconstruction. The collateral ligaments and their significant responsibility in maintaining elbow function make it pivotal for physicians to diagnose injuries properly. Whether the MCL or LCL injury at the elbow, a history, physical exam, imaging, and exhausted conservative treatments prior to surgery is the generalized outline of patient care. Medial elbow injuries are amongst the most common in sports. Elbow injuries are the most common cause of time loss (over ten days) in collegiate pitchers, Upper extremity injuries account for 45% of all injuries in the NCAA, and 7-8% of these injuries belong to the elbow. Specifically pertaining to baseball, 97% of pitchers elbow pain is on the medial side of the elbow . A patient history determining the location of the pain, how long the pain has been present, the exact point in motion where the patient experiences the injury is imperative in diagnosing MCL injury. If present in an athlete, they may complain of decreased performance, such as throwing velocity or stamina. Patients might also site issues of numbness and tingling in the ulnar distribution pattern since the chronic UCL injuries are associated with ulnar neuropathy. Physical exam should check for the palmaris longus muscle if surgery is required; this requires the patient to flex the wrist with opposing the first and fifth digits.
https://www.statpearls.com/kb/viewarticle/101404/
Radial head fractures are common injuries, occurring in about 20 percent of all acute elbow injuries. They are more frequent in women than in men and occur most often between 30 and 40 years of age. Approximately 10 percent of all elbow dislocations involve a fracture of the radial head. As the upper arm bone (humerus) and the ulna return to their normal alignment, a piece of the radial head bone could be chipped off (fractured). Symptoms - Pain on the outside of the elbow - Swelling in the elbow joint - Difficulty in bending or straightening the elbow accompanied by pain - Inability or difficulty in turning the forearm (palm up to palm down or vice versa) Treatment Radial head fractures are classified according to the degree of displacement (movement from the normal position). Type I Fractures Type I fractures are generally small, like cracks, and the bone pieces remain fitted together. - The fracture may not be visible on initial X-rays, but can usually be seen if the X-ray is taken three weeks after the injury. - Nonsurgical treatment involves using a splint or sling for a few days, followed by early motion. - If too much motion is attempted too quickly, the bones may shift and become displaced. Type II Fractures Type II fractures are slightly displaced and involve a larger piece of bone. - If displacement is minimal, splinting for one to two weeks, followed by range of motion exercises, is usually successful. - Small fragments may be surgically removed. - If the fragment is large and can be fitted back to the bone, the orthopaedic surgeon will first attempt to fix it with pins or screws. If this is not possible, however, the surgeon will remove the broken pieces or the radial head. - For older, less active individuals, the surgeon may simply remove the broken piece, or perhaps the entire radial head. - The surgeon will also correct any other soft-tissue injury, such as a torn ligament. Type III Fractures Type III fractures have multiple broken pieces of bone, which cannot be fitted back together for healing. - Usually, there is also significant damage to the joint and ligaments. - Surgery is always required to remove the broken bits of bone, including the radial head, and repair the soft-tissue damage. - Early movement to stretch and bend the elbow is necessary to avoid stiffness. - A prosthesis (artificial radial head) can be used to prevent deformity if elbow instability is severe. Even the simplest of fractures will probably result in some loss of extension in the elbow. Regardless of the type of fracture or the treatment used, physical therapy will be needed before resuming full activities.
http://www.axis-hospital-croatia.com/all-conditions-list/radial-head-fracture/
Synovial joints enable the body a remarkable range of activities. Each movement at a synovial joint outcomes from the contraction or relaxation of the muscles that are attached to the bones on either side of the articulation. The level and also form of motion that have the right to be created at a synovial joint is established by its structural kind. While the ball-and-socket joint provides the greatest variety of movement at an individual joint, in other regions of the body, numerous joints might work-related together to produce a particular motion. Overall, each kind of synovial joint is vital to carry out the body via its good adaptability and also mobility. Tright here are many type of kinds of activity that deserve to take place at synovial joints (Table 9.1). Movement kinds are generally paired, with one directly opposing the various other. Body movements are always defined in relation to the anatomical place of the body: upideal stance, through top limbs to the side of body and palms dealing with forward. Refer to Figure 9.5.1 as you go via this section. You are watching: The movement during which the knees or elbows are bent to decrease the angle of the joints External Website Watch this video to learn about anatomical motions. What motions involve enhancing or decreasing the angle of the foot at the ankle? Figure 9.5.1 – Movements of the Body, Part 1: Synovial joints offer the body many means in which to move. (a)–(b) Flexion and expansion movements are in the sagittal (anterior–posterior) plane of activity. These movements take area at the shoulder, hip, elbow, knee, wrist, metacarpophalangeal, metatarsophalangeal, and also interphalangeal joints. (c)–(d) Anterior bfinishing of the head or vertebral column is flexion, while any type of posterior-going motion is extension. (e) Abduction and adduction are activities of the limbs, hand, fingers, or toes in the coronal (medial–lateral) plane of movement. Moving the limb or hand laterally ameans from the body, or spanalysis the fingers or toes, is abduction. Adduction brings the limb or hand also toward or across the midline of the body, or brings the fingers or toes together. Circumduction is the movement of the limb, hand also, or fingers in a circular pattern, using the sequential combination of flexion, adduction, extension, and abduction movements. Adduction/abduction and also circumduction take location at the shoulder, hip, wrist, metacarpophalangeal, and metatarsophalangeal joints. (f) Turning of the head side to side or twisting of the body is rotation. Medial and lateral rotation of the top limb at the shoulder or lower limb at the hip involves turning the anterior surface of the limb towards the midline of the body (medial or inner rotation) or amethod from the midline (lateral or external rotation). Figure 9.5.2 – Movements of the Body, Part 2: (g) Supination of the forearm turns the hand to the palm forward place in which the radius and also ulna are parallel, while forearm pronation transforms the hand also to the palm backward position in which the radius crosses over the ulna to form an “X.” (h) Dorsiflexion of the foot at the ankle joint moves the top of the foot toward the leg, while plantar flexion lifts the heel and points the toes. (i) Eversion of the foot moves the bottom (sole) of the foot amethod from the midline of the body, while foot inversion faces the sole towards the midline. (j) Protractivity of the mandible pushes the chin forward, and also retraction pulls the chin earlier. (k) Depression of the mandible lutz-heilmann.infos the mouth, while elevation closes it. (l) Opplace of the thumb brings the tip of the thumb right into contact with the pointer of the fingers of the very same hand and replace brings the thumb back alongside the index finger. Flexion and Extension Flexion and also extension are activities that take area within the sagittal airplane and involve anterior or posterior activities of the body or limbs. For the vertebral column, flexion (anterior flexion) is an anterior (forward) bfinishing of the neck or body, while expansion involves a posterior-directed motion, such as straightening from a flexed position or bfinishing backward. Lateral flexion is the bfinishing of the neck or body towards the ideal or left side. These motions of the vertebral column involve both the symphysis joint developed by each intervertebral disc, and also the airplane form of synovial joint formed in between the inferior articular procedures of one vertebra and also the remarkable articular processes of the next lower vertebra. In the limbs, flexion decreases the angle in between the bones (bending of the joint), while extension boosts the angle and straigh10s the joint. For the upper limb, all anterior activities are flexion and also all posterior activities are expansion. These encompass anterior-posterior movements of the arm at the shoulder, the forearm at the elbow, the hand also at the wrist, and also the fingers at the metacarpophalangeal and interphalangeal joints. For the thumb, expansion moves the thumb amethod from the palm of the hand, within the same plane as the palm, while flexion brings the thumb earlier against the index finger or into the palm. These activities take area at the first carpometacarpal joint. In the lower limb, bringing the thigh forward and also upward is flexion at the hip joint, while any kind of posterior-going motion of the thigh is extension. Note that extension of the thigh past the anatomical (standing) place is significantly restricted by the ligaments that support the hip joint. Knee flexion is the bending of the knee to lug the foot toward the posterior thigh, and also extension is the straightening of the knee. Flexion and expansion motions are seen at the hinge, condyloid, saddle, and also ball-and-socket joints of the limbs (view Figure 9.5.1a-d). Hyperextension is the abnormal or too much extension of a joint beyond its normal variety of movement, hence leading to injury. Similarly, hyperflexion is too much flexion at a joint. Hyperextension injuries are prevalent at hinge joints such as the knee or elbow. In situations of “whiplash” in which the head is suddenly moved backward and also then forward, a patient might experience both hyperexpansion and hyperflexion of the cervical region.Abduction and Adduction Abduction and adduction activities happen within the coronal plane and also involve medial-lateral motions of the limbs, fingers, toes, or thumb. Abduction moves the limb laterally amethod from the midline of the body, while adduction is the opposing motion that brings the limb towards the body or throughout the midline. For example, abduction is elevating the arm at the shoulder joint, relocating it laterally ameans from the body, while adduction brings the arm down to the side of the body. Similarly, abduction and adduction at the wrist moves the hand away from or towards the midline of the body. Spreading the fingers or toes apart is also abduction, while bringing the fingers or toes together is adduction. For the thumb, abduction is the anterior activity that brings the thumb to a 90° perpendicular place, pointing directly out from the palm. Adduction moves the thumb back to the anatomical place, next to the index finger. Abduction and also adduction activities are seen at condyloid, saddle, and ball-and-socket joints (see Figure 9.5.1e).Circumduction Circumduction is the activity of a body area in a circular manner, in which one finish of the body area being relocated remains relatively stationary while the various other finish describes a circle. It requires the sequential combicountry of flexion, adduction, expansion, and also abduction at a joint. This kind of movement is uncovered at biaxial condyloid and also saddle joints, and at multiaxial ball-and-sockets joints (see Figure 9.5.1e).Rotation Rotation deserve to happen within the vertebral column, at a pivot joint, or at a ball-and-socket joint. Rotation of the neck or body is the twisting motion created by the summation of the little rotational activities easily accessible in between adjacent vertebrae. At a pivot joint, one bone rotates in relation to another bone. This is a uniaxial joint, and also for this reason rotation is the just motion allowed at a pivot joint. For example, at the atlantoaxial joint, the initially cervical (C1) vertebra (atlas) rotates approximately the dens, the upward projection from the second cervical (C2) vertebra (axis). This allows the head to turn from side to side as when shaking the head “no.” The proximal radioulnar joint is a pivot joint formed by the head of the radius and its articulation with the ulna. This joint permits for the radius to rotate alengthy its size in the time of procountry and also supination motions of the forearm. Rotation can likewise take place at the ball-and-socket joints of the shoulder and also hip. Here, the humerus and also femur turn about their long axis, which moves the anterior surface of the arm or thigh either toward or away from the midline of the body. Movement that brings the anterior surconfront of the limb toward the midline of the body is called medial (internal) rotation. Conversely, rotation of the limb so that the anterior surchallenge moves ameans from the midline is lateral (external) rotation (view Figure 9.5.1f). Be sure to distinguish medial and lateral rotation, which can only happen at the multiaxial shoulder and also hip joints, from circumduction, which can occur at either biaxial or multiaxial joints.Supination and also Pronation Supination and procountry are activities of the forearm. In the anatomical position, the upper limb is held alongside the body with the palm encountering forward. This is the supinated position of the forearm. In this place, the radius and ulna are parallel to each other. When the palm of the hand encounters backward, the forearm is in the pronated position, and also the radius and ulna type an X-form. Supination and pronation are the activities of the forearm that go in between these two positions. Pronation is the activity that moves the forearm from the supinated (anatomical) place to the pronated (palm backward) position. This motion is developed by rotation of the radius at the proximal radioulnar joint, accompanied by movement of the radius at the distal radioulnar joint. The proximal radioulnar joint is a pivot joint that enables for rotation of the head of the radius. Due to the fact that of the slight curvature of the shaft of the radius, this rotation causes the distal end of the radius to cross over the distal ulna at the distal radioulnar joint. This crossing over brings the radius and also ulna into an X-shape position. Supination is the oppowebsite motion, in which rotation of the radius retransforms the bones to their parallel positions and also moves the palm to the anterior encountering (supinated) place. It helps to remember that supicountry is the activity you use as soon as scooping up soup through a spoon (view Figure 9.5.2g).Dorsiflexion and Plantar Flexion Dorsiflexion and also plantar flexion are activities at the ankle joint, which is a hinge joint. Lifting the front of the foot, so that the top of the foot moves towards the anterior leg is dorsiflexion, while lifting the heel of the foot from the ground or pointing the toes downward is plantar flexion. These are the just motions obtainable at the ankle joint (view Figure 9.5.2h).Invariation and also Eversion Inversion and also evariation are facility motions that involve the multiple airplane joints among the tarsal bones of the posterior foot (intertarsal joints) and thus are not motions that take area at the ankle joint. Inversion is the turning of the foot to angle the bottom of the foot toward the midline, while eversion turns the bottom of the foot away from the midline. The foot has a greater selection of invariation than eversion motion. These are vital movements that aid to stabilize the foot as soon as walking or running on an unalso surconfront and also aid in the quick side-to-side changes in direction provided throughout active sports such as basketround, racquetround, or soccer (check out Figure 9.5.2i).Protractivity and Retraction Protraction and also retraction are anterior-posterior motions of the scapula or mandible. Protractivity of the scapula occurs once the shoulder is moved forward, as once pushing versus somepoint or throwing a round. Retraction is the opposite movement, through the scapula being pulled posteriorly and also medially, towards the vertebral column. For the mandible, protractivity occurs when the reduced jaw is pumelted forward, to stick out the chin, while retraction pulls the lower jaw backward. (See Figure 9.5.2j.)Depression and also Elevation Depression and elevation are downward and upward activities of the scapula or mandible. The upward activity of the scapula and shoulder is elevation, while a downward movement is depression. These activities are offered to shrug your shoulders. Similarly, elevation of the mandible is the upward movement of the lower jaw supplied to close the mouth or bite on something, and depression is the downward activity that produces lutz-heilmann.infoing of the mouth (view Figure 9.5.2k).Excursion Excursion is the side to side movement of the mandible. Lateral excursion moves the mandible amethod from the midline, toward either the right or left side. Medial excursion returns the mandible to its relaxing position at the midline.Superior Rotation and Inferior Rotation Superior and also inferior rotation are motions of the scapula and are characterized by the direction of activity of the glenoid cavity. These movements involve rotation of the scapula around a suggest inferior to the scapular spine and also are produced by combinations of muscles acting on the scapula. During remarkable rotation, the glenoid cavity moves upward as the medial finish of the scapular spine moves downward. This is a very vital movement that contributes to upper limb abduction. Without remarkable rotation of the scapula, the better tubercle of the humerus would certainly hit the acromion of the scapula, for this reason staying clear of any type of abduction of the arm above shoulder elevation. Superior rotation of the scapula is therefore required for full abduction of the top limb. Superior rotation is likewise supplied without arm abduction as soon as carrying a hefty fill with your hand also or on your shoulder. You can feel this rotation when you pick up a pack, such as a hefty book bag and carry it on only one shoulder. To boost its weight-bearing assistance for the bag, the shoulder lifts as the scapula superiorly rotates. Inferior rotation occurs during limb adduction and entails the downward motion of the glenoid cavity via upward motion of the medial end of the scapular spine. See more: Why Was The Antiwar Movement Especially Strong At Colleges ?A Opposition is the thumb movement that brings the tip of the thumb in call via the guideline of a finger. This motion is created at the initially carpometacarpal joint, which is a saddle joint developed in between the trapezium carpal bone and also the first metacarpal bone. Thumb opposition is developed by a combination of flexion and also abduction of the thumb at this joint. Returning the thumb to its anatomical place next to the index finger is dubbed reposition (watch Figure 9.5.2l).
https://lutz-heilmann.info/the-movement-during-which-the-knees-or-elbows-are-bent-to-decrease-the-angle-of-the-joints/
Elbow instability refers to a laxity in the elbow joint that may cause the joint to catch, pop, or slide out of place during certain arm movements. It most often occurs as a result of an injury — typically, an elbow dislocation. The instability associated with elbow injury is called acute elbow instability whereas the instability that is presented over a period and occurs, again and again, is called recurrent/chronic. Relevant Anatomy of Elbow The elbow joint has three bony articulations: ulnohumeral, radiocapitellar, and proximal radioulnar. Stability of the elbow is maintained by these bony articulations, capsuloligamentous and musculotendinous structures. At the extremes of motion, specifically at less than 20° and greater than 120° of elbow flexion bony stabilizers are most important, while the lateral and medial ligamentous complexes are the primary stabilizers throughout the remainder of the motion arc. [see the list of stabilizers given below] The lateral ligament complex is Y-shaped and is comprised of four ligaments - The radial collateral ligament (RCL) - Lateral ulnar collateral ligament (LUCL) - Accessory ligament - Annular ligament The lateral ulnar collateral ligament is deemed to be the most important restraint to varus stress, though other parts are also considered to play an important role. The inherent stability of the elbow relies on a combination of bony articulations and soft tissue restraints. The coronoid is the most important stabilizer to anterior and posterior translation. It forms a buttress against posterior dislocation of the ulna on the humerus. It also provides attachment to the anterior medial collateral ligament, the middle third of the anterior capsule and the deep head of the brachialis. The medial collateral ligament (MCL) complex has three components: the anterior, the posterior and transverse bands. The anterior band is the most important restraint to elbow valgus and the posterior band is the primary restraint to pronation of the ulna on the humerus. Stabilizers of the elbow The elbow has both static and dynamic stabilizers Static Stabilizers Primary Stabilizers - Ulnohumeral articulation - Medial collateral ligament - Lateral collateral ligament Secondary Stabilizers - Radial head - The common flexor and extensor origins - The capsule. Dynamic stabilizers - The muscles that cross the elbow joint - Anconeus- preventing postero¬lateral rotational displacement of the elbow - Triceps – posterior - Brachialis – anteromedial - An elbow with its three primary constraints intact will be stable. If the coronoid process is fractured or lost, the radial head becomes a critical stabilizer. - Normal elbow carrying angle: males: 5-10 degrees; females: 10-15 degrees - Normal range of motion: 0-150 degrees flexion/extension, 80 degrees supination, 80 degrees pronation - Functional range of motion of the elbow: 30-130 degrees of flexion/extension and 50 degrees of pronation and 50 degrees of supination. - In full extension, 60% of axial load is transmitted through the radiocapitellar joint Acute Elbow Instability Acute elbow instability usually develops after injuries involving the bony or ligamentous stabilizers of the joint. Usually, it is associated with dislocation or fracture-dislocation of the elbow but can occur after isolated valgus or varus overloading can also be leading to ligament ruptures. Untreated, acute instability may lead to chronic instability. The injuries of the elbow especially those associated with dislocation need to be managed well to avoid the lingering instability. Severe injuries are evident. Injuries of lesser degree will be revealed by bruising and swelling on the medial or lateral aspect of the elbow, suggesting an acute injury to the underlying structures. Tenderness to palpation will further suggest injury. Further, the range of motion is documented and stress tests are if the severity of the injury allows. Crepitus during movement is may suggest an osteochondral fragment or fracture. A neurovascular examination must also be performed. Imaging Plain x-rays [AP, lateral and oblique views] should be done. Presence of bony injuries should be noted. If bony injuries are not visualized, draw a line drawn through the long axis of the radius. In a well contained joint, should intersect the capitellum on all views. Computed Tomography is useful for further assessment of fractures in terrible triad injuries Treatment The injuries should be treated depending on the nature of the injury. After the fractures or dislocations have been treated, the limb should be assessed for post-treatment elbow stability. Any instability should be documented and contemplated whether treatment is required or just rehabilitation would take care of the instability. Few of injuries are discussed below After closed reduction has been performed the elbow is examined and plain radiographs are taken. If the elbow is stable through the full range of motion and a congruent reduction is seen on x-rays, the patient is given a broad arm sling for comfort and is encouraged to mobilize the elbow. Surgery is seldom necessary in the management of a simple posterior dislocation. The indications for surgery include - Failure to obtain and maintain a congruent reduction - Persistent instability of the elbow joint requiring immobilization beyond 30–45° of flexion - Suspected entrapment of intra-articular fragments or the median nerve in the joint. In acute elbow instability, ligament repair may be undertaken for the indications. The hinged external fixator is used most commonly as a secondary device to protect surgically repaired or healing structures while permitting and assisting proper kinematic motion. The three primary indications are: (1) persistent instability in association with an acute fracture-dislocation despite attempted ligament repair and fracture fixation or radial head replacement, or both; (2) gross acute instability in a patient who is not a candidate for surgery; and (3) delayed treatment (approximately four weeks or more after the time of injury) of a dislocated and stiff elbow. In most cases, the patient has one or more of the following features: - High-energy injury - Previous failed attempts at reduction or surgical repair of the dislocation - Multidirectional instability on examination after attempted or achieved reduction - Concomitant fracture of the radial head or the coronoid process, or both (the terrible triad of the elbow). Chronic or Recurrent Elbow Instability The lateral collateral ligament is the essential lesion leading to elbow instability. This insufficiency gives rise to recurrent posterolateral rotatory instability which is the most common type of chronic elbow instability. Types of Chronic or Recurrent Elbow Instability There are three different types of recurrent elbow instability. Posterolateral rotatory instability There is an injury to the lateral collateral ligament complex resulting in looseness of the joint. It is the most common type of recurrent elbow instability. It may develop following trauma, as a result of a previous surgery, or longstanding elbow deformity. Valgus instability There is an injury to the ulnar collateral ligament, which is a soft tissue structure located on the inside of the elbow. Valgus instability is most often caused by repetitive stress as seen in overhead athletes as in baseball pitchers. It may also be caused by trauma resulting in medial disruption. Varus posteromedial rotatory instability There is an injury of the lateral collateral ligament complex along with the fracture of the coronoid portion of the ulna bone on the inside of the elbow. Varus posteromedial rotatory instability is usually caused by a traumatic event. As the posterolateral rotatory instability is the most common type of instability, it is the instability being discussed in detail hence further. Posterolateral Rotatory Instability Pathoanatomy of Chronic Elbow Instability Instability of elbow is a spectrum of presentation, at the farther end of which is dislocation of the elbow. Elbow instability occurs due to disruption of soft tissue or bony stabilization. In a usual course, it usually begins on the lateral side of the elbow, often initiated by trauma and progresses to the medial side in three stages. It can be classified into the following stages Stage 1 the lateral collateral ligament is partially or completely torn. There is posterolateral rotatory subluxation of the elbow, which can reduce spontaneously Stage 2 Stage 2 also involves additional disruption anteriorly and posteriorly. It may result in incomplete posterolateral dislocation of the elbow. This subluxation can be reduced with the use of minimal force or by the patient manipulating his or her own elbow. Stage 3 It is further subdivided into three parts. Type 3A All or the soft tissues around and including the posterior part of the medial collateral ligament are disrupted, leaving only the important anterior band (the anterior medial collateral ligament) intact. This permits posterior dislocation by a posterolateral rotatory mechanism. The elbow pivots on the intact anterior band of the medial collateral ligament. The reduction can be achieved by gentle manipulation. This stage is mostly seen in the fractures of the radial head and coronoid process. Type 3B The entire medial collateral complex is disrupted. Varus, valgus, and rotatory instability are all present following reduction. Type 3C The instability is so severe that the elbow can dislocate even when it is immobilized in a cast in 90 degrees of flexion. This degree of instability means that the entire distal aspect of the humerus has been stripped of soft tissues. Thus, the dislocation is the final stage of three sequential stages of elbow instability resulting from posterolateral ulnohumeral rotatory subluxation, with the soft-tissue disruption that progresses from the lateral to the medial side. This is also known as the circle of Horri. Clinical Presentation Most of the patients would have a preceding history of trauma. Sometimes the problem is quite obvious, as the patient is able to demonstrate the instability but it may be more subtle. Sometimes the patient has noticed only pain and discomfort and is not aware of instability. Additional symptoms include painful catching, slippage, or clicking with flexion and extension. A feeling of slippage of the joint in and out of place may be reported by the patient. The patient usually presents with pain, mechanical symptoms or a decreased level of performance in sporting activities. There may be a history of recurrent elbow subluxation or dislocations, with each subsequent dislocation requiring less force. B The symptoms are usually produced in the extension half of the arc of motion with the forearm in supination. Apprehension sign These can be demonstrated in two ways. - The patient performs a floor push up with the elbow fully supinated. - The patient pushes up on the arms of a chair to stand, again with the elbow fully supinated. In both tests, a subjective feeling of apprehension, instability or frank dislocation is considered positive for posterolateral rotatory instability. Pivot-shift maneuver It is also known as posterolateral rotatory instability test. The patient is positioned supine on the examination table with the arms overhead, the shoulder in full external rotation to stabilize the shoulder joint and the forearm in full supination. From the extended and supinated position, the examiner brings the arm from extension to flexion, a valgus stress is placed on the elbow and the forearm is allowed to be less supinated. This allows the forearm to pivot around the anterior bundle of the medial ulnar collateral ligament and results in a reduction of the elbow joint as the triceps becomes taught at around 40° of elbow flexion, often causing an audible or palpable clunk. Apprehension during the lateral pivot shift maneuver is often considered to be a positive test even without frank instability Varus stress-testing may suggest a lateral collateral ligament insufficiency. Imaging X-rays An anterior-posterior and a true lateral view should be obtained on every patient. The congruency of the joint is noted. On anteroposterior radiographs or there is a slight widening of the radiohumeral joint. On lateral radiographs, the radial head may appear to be situated posterior to the capitellum. Lateral ligament laxity can be identified on the true lateral view from the “tilt sign” which is a subtle widening of the trochlea/trochlear notch interval. Fluoroscopy Fluoroscopy allows the surgeon to observe any joint space widening in real time, whilst a varus or valgus force is applied to the elbow. CT/MRI These are important in assessing assess fractures and intra-articular fragments. MRI may help to identify ligamentous and cartilaginous injuries. Arthroscopy In some instances, when the presentation does not suggest the injury or the findings on the physical examination are not convincing, or when there is a possibility of an intra-articular lesion, arthroscopic examination of the elbow may be helpful. Arthroscopy will reveal the laxity of the radiohumeral joint and thus confirm the lesion. An arthroscopic evaluation of the ulnohumeral joint can demonstrate joint space widening during varus/valgus and rotational stresses. Normal elbow the olecranon– trochlea articulation will open enough to allow a probe medially and laterally. In posterolateral rotatory instability, the arthroscope can be introduced between the trochlea and trochlear notch. Base on arthroscopy, the instability can be divided into three groups. - Isolated posterolateral rotatory instability – requires a lateral repair or reconstruction. - Posterolateral rotatory instability combined with medial instability – requires a global reconstruction. - Posterolateral rotatory instability with joint degeneration – Needs consideration of the joint stability and its articular surface. Management of Posterolateral rotatory instability The broken ligament does not become stable over time, except possibly when a patient is seen in the very early stages. Therefore a recurrent problem requires a surgical construction. The reconstruction should be isometric, extracapsular and anatomical, using an autogenous graft from hamstring graft or palmaris longus tendon. After repair, the elbow is placed in 70 to 80 degrees of flexion with the forearm in full pronation. The arm is held in this position for ten to fourteen days, and then the patient is permitted protected motion in a hinged brace for two to six weeks, with flexion allowed as tolerated. After six weeks, the patient may remove the hinged splint for sedentary activities, but otherwise, the splint is worn for most activities and is discontinues at the end of an additional six weeks. In the setting of chronic dislocations and secondary surgery, comminution, malunion and bone loss may make the coronoid fracture irreparable. In this situation, an osteochondral graft may be required. References - S. Bell. Elbow instability, mechanism, and management. Current Orthopaedics, 22 (2008), pp. 90-103 - S.W. O’Driscoll, J.B. Jupiter, G.J. King, R.N. Hotchkiss, B.F. Morrey. The unstable elbow. J Bone Joint Surg Am, 82 (2000), pp. 724-725 - D.T. Leonello, I.J. Galley, G.I. Bain, C.D. Carter. Brachialis muscle anatomy. A study in cadavers.J Bone Joint Surg Am, 89 (2007), pp. 1293-1297 - L.M. Reichel, G.S. Milam, S.E. Sitton, M.C. Curry, T.L. Mehlhoff. Elbow lateral collateral ligament injuries. J Hand Surg Am, 38 (2013), pp. 184-201 - J.A. Hall, M.D. McKeePosterolateral rotatory instability of the elbow following radial head resection.J Bone Joint Surg Am, 87 (2005), pp. 1571-1579. - B.P.H. Lee, L.H.Y. TeoSurgical reconstruction for posterolateral rotatory instability of the elbow. J Shoulder Elbow Surg, 12 (2003), pp. 476-479 - B.S. Kim, K.H. Park, H.S. Song, S.Y. ParkLigamentous repair of acute lateral collateral ligament rupture of the elbow. J Shoulder Elbow Surg, 22 (2013), pp. 1469-1473 - K.-Y. Lin, P.-H. Shen, C.-H. Lee, R.-Y. Pan, L.-C. Lin, H.-C. Shen. Functional outcomes of surgical reconstruction for posterolateral rotatory instability of the elbow.Injury, 43 (2012), pp. 1657-1661.
https://boneandspine.com/elbow-instability/
Ligaments are bands of tough elastic connective tissue, that contain strong collagen fibres, around your joints. They connect bones together, give your joints support and limit your movement. This ensures that the bones in your joints don’t twist too much or move too far apart and become dislocated. The ligaments around your bones and joints aren’t the only ligaments in your body. There are also ligaments which keep your internal organs in place. People often confuse ligaments with tendons, which connect muscle to bone. The most common ligaments found in your body are: Knee ligaments There are four important ligaments connecting your upper leg (thigh bone or femur) and your lower leg (shin bone or tibia): - Anterior cruciate ligament The anterior cruciate ligament is located towards the front of your knee. It controls the forward movement and the rotation of your shinbone. - Posterior cruciate ligament The posterior cruciate ligament is situated towards the back of your knee. It controls the backward movement of your shinbone. - Medial cruciate ligament The medial cruciate ligament is situated inside your knee. It gives the interior of your knee stability. - Lateral collateral ligament The lateral collateral ligament is situated outside your knee. It gives the outside of your knee stability. Elbow ligaments - Ulnar collateral ligament The ulnar collateral ligament connects the bone in your upper arm (humerus) to the bone on the ulnar side of your forearm. When your palms are facing the sky, the ulna side is the inside of your forearm. - Radial collateral ligament The radial collateral ligament also connects the bone in your humerus to the outer forearm bone (radius) and extends to the ulna for additional support. - The annular ligament The annular ligament circles the top of your radius and holds it against the ulna. Shoulder ligaments The ligaments in your shoulder connect your humerus to your shoulder blade (scapula) and the collarbone to the top of your scapula. Ankle ligaments - Anterior talofibular ligament The anterior talofibular ligament connects the thin bone on the outside of your shinbone (fibula) and the bone between your heel and shinbone (talus). - Posterior talofibular ligament The posterior talofibular ligament also connects your fibula and talus but runs along the back of your ankle. - Calcaneofibular ligament The calcaneofibular ligament connects the fibula to your heel bone. - Deltoid ligament The deltoid ligament complex is situated on the inside part of your ankle. It connects the tibia to the talus on the inside of your foot along with the navicular bone for additional support. Your ligaments are maintain stability in your body by connecting your bones, supporting your joints and keeping your internal organs in place. Each ligament has a particular function in enabling and limiting certain movements. If you push the ligament’s limits, it can get hurt and your body’s movement will be impaired for quite some time. Contact Trifocus Fitness Academy To learn more about how the body works internally, we really recommend that you do an accredited exercise science course such as the one that we offer. Follow this link for more information.
https://trifocusfitnessacademy.co.za/blog/what-are-ligaments-and-what-do-they-do/
Written by , Ryerson University. Photo credit: AP Photo/Rahmat Gul. Originally published in The Conversation. Taliban fighters stand guard at a checkpoint in Kabul, Afghanistan, on Aug. 18, 2021. In 2007, the United States military began using a small, handheld device to collect and match the iris, fingerprint and facial scans of over 1.5 million Afghans against a database of biometric data. The device, known as Handheld Interagency Identity Detection Equipment (HIIDE), was initially developed by the U.S. government as a means to locate insurgents and other wanted individuals. Over time, for the sake of efficiency, the system came to include the data of Afghans assisting the U.S. during the war. Today, HIIDE provides access to a database of biometric and biographic data, including of those who aided coalition forces. Military equipment and devices — including the collected data — are speculated to have been captured by the Taliban, who have taken over Afghanistan. This development is the latest in many incidents that exemplify why governments and international organizations cannot yet securely collect and use biometric data in conflict zones and in their crisis responses. Building biometric databases Biometric data, or simply biometrics, are unique physical or behavioural characteristics that can be used to identify a person. These include facial features, voice patterns, fingerprints or iris features. Often described as the most secure method of verifying an individual’s identity, biometric data are being used by governments and organizations to verify and grant citizens and clients access to personal information, finances and accounts. According to a 2007 presentation by the U.S. Army’s Biometrics Task Force, HIIDE collected and matched fingerprints, iris images, facial photos and biographical contextual data of persons of interest against an internal database. In a May 2021 report, anthropologist Nina Toft Djanegara illustrates how the collection and use of biometrics by the U.S. military in Iraq set the precedent for similar efforts in Afghanistan. There, the “U.S. Army Commander’s Guide to Biometrics in Afghanistan” advised officials to “be creative and persistent in their efforts to enrol as many Afghans as possible.” The guide recognized that people may hesitate to provide their personal information and therefore, officials should “frame biometric enrolment as a matter of ‘protecting their people.’” Inspired by the U.S. biometrics system, the Afghan government began work to establish a national ID card, collecting biometric data from university students, soldiers and passport and driver license applications. Although it remains uncertain at this time whether the Taliban has captured HIIDE and if it can access the aforementioned biometric information of individuals, the risk to those whose data is stored on the system is high. In 2016 and 2017, the Taliban stopped passenger buses across the country to conduct biometric checks of all passengers to determine whether there were government officials on the bus. These stops sometimes resulted in hostage situations and executions carried out by the Taliban. Placing people at increased risk We are familiar with biometric technology through mobile features like Apple’s Touch ID or Samsung’s fingerprint scanner, or by engaging with facial recognition systems while passing through international borders. For many people located in conflict zones or rely on humanitarian aid in the Middle East, Asia and Africa, biometrics are presented as a secure measure for accessing resources and services to fulfil their most basic needs. In 2002, the United Nations High Commissioner for Refugees (UNHCR) introduced iris-recognition technology during the repatriation of more than 1.5 million Afghan refugees from Pakistan. The technology was used to identify individuals who sought funds “more than once.” If the algorithm matched a new entry to a pre-existing iris record, the claimant was refused aid. The UNHCR was so confident in the use of biometrics that it altogether decided not to allow disputes from refugees. From March to October 2002, 396,000 false claimants were turned away from receiving aid. However, as communications scholar Mirca Madianou argues, iris recognition has an error rate of two to three per cent, suggesting that roughly 11,800 claimants out of the alleged false claimants were wrongly denied aid. Additionally, since 2018, the UNHCR has collected biometric data from Rohingya refugees. However, reports recently emerged that the UNHCR shared this data with the government of Bangladesh, who subsequently shared it with the Myanmar government to identify individuals for possible repatriation (all without the Rohingya’s consent). The Rohingya, like the Afghan refugees, were instructed to register their biometrics to receive and access aid in conflict areas. In 2007, as the U.S. government was introducing HIIDE in Afghanistan, U.S. Marine Corps were walling off Fallujah in Iraq to supposedly deny insurgents freedom of movement. To get into Fallujah, individuals would require a badge, obtained by exchanging their biometric data. After the U.S. retreated from Iraq in 2020, the database remained in place, including all the biometric data of those who worked on bases. Protecting privacy over time Registering in a biometric database means trusting not just the current organization requesting the data but any future organization that may come into power or have access to the data. Additionally, the collection and use of biometric data in conflict zones and crisis response present heightened risks for already vulnerable groups. While collecting biometric data is useful in specific contexts, this must be done carefully. Ensuring the security and privacy of those who could be most at risk and those who are likely to be compromised or made vulnerable is critical. If security and privacy cannot be ensured, then biometric data collection and use should not be deployed in conflict zones and crisis response.
https://torontomuresearch.com/the-taliban-may-have-access-to-the-biometric-data-of-civilians-who-helped-the-u-s-military/
ICPR2020 Announcement: Conference will be Virtual. Mobile devices are nowadays widely employed by people all over the world, with almost 3 billion users interacting with smartphones or tablets in their daily life. Such devices are not anymore used for personal communication only, but also for a variety of other applications, ranging from accessing the Internet, storing personal data, making payments, and gaining access to restricted services or areas. With the rise of the Internet of Things, a growth trend similar to the one characterizing mobile devices in the recent past is now observed for wearable devices such as smartwatch and activity trackers, that is, smart electronic devices equipped with micro-controllers which can be incorporated into clothing or worn on the body as implants or accessories. Given the types of data must such devices can capture, process, and store, proper secure mechanisms are needed to avoid potentially harmful threats related to security and privacy loss. It is therefore of paramount importance to design workable and effective solutions to implement automatic recognition systems within mobile and wearable devices, with biometric systems certainly representing the most interesting alternative to achieve this goal. The present workshop will highlight the recent developments in the evolving areas of mobile and wearable biometric recognition systems. We invite submissions from all areas of computer science and pattern recognition relevant for, or applied to, mobile and wearable biometric recognition. Topics of interest include, but are not limited to: - Physical biometrics (fingerprint, face, iris, vein, etc.) - Behavioral biometrics (signature, keystroke, gait, etc.) - Cognitive biometrics (ECG, PPG, EDA, EEG, etc.) - Attacks at biometric systems - Biometric template protection schemes - Multibiometric recognition systems - Machine Learning with limited computational resources - User interface design - Database collection The 1st IAPR TC4 International Workshop on Mobile and Wearable Biometrics Workshop will be held on January 11, 2021 in Milan, Italy, as a satellite event of the 25th International Conference on Pattern Recognition (ICPR 2020). The workshop is supported by the IAPR TC-4. The authors of selected papers will be invited to submit extended versions of their works to a Special Issue hosted by Pattern Recognition Letters (PRL), with paper submissions planned for September 2021.
http://wmb2020.iapr-tc4.org/
Has COVID-19 moved the needle on security vs convenience? Jun 17, 2020 In the final article in our Lost in Transaction: The impact of COVID-19 on consumer payment trends series, we ask whether consumer attitudes to security and frictionless checkouts has been affected. As we have discussed in previous articles, COVID-19 has made an identifiable impact on the way consumers are going about making payments. Some of these changes have been enforced by the physical challenges of coping with day-to-day life during the pandemic; a greater reliance on eCommerce while shops are closed and the move to contactless payments for in-store payments being the most obvious. But might COVID-19 also be having a psychological impact on how and when consumers make payments? Has there been a change in attitude when it comes to choosing a payment method and the preferences when it comes to the checkout experience? And if so will this shift be permanent? In order to answer these questions, we surveyed 8,000 consumers from the US, UK, Canada, Germany, Austria, Italy, and Bulgaria on how COVID-19 has altered their priorities when selecting a payment method, as well as their physical habits. Other data from this research can be found here. For the significant majority, COVID-19 has had an effect The first major takeaway from the research in this regard is that COVID-19 has made a tangible impact on consumers’ priorities when making a payment. When asked whether any determining factors they might consider when selecting a payment method had become more important to them since the pandemic’s outbreak, only 16% of consumers said that their attitudes had not been affected in any way. This percentage was higher in the UK (22%), Germany (26%), and Austria (24%), but was significantly lower elsewhere. In the US, only 12% of consumers said they were unaffected; 88% said that their attitudes to payments had been affected in some way. Q: Which of the following have become more important to you since the start of the COVID-19 outbreak? Security is valued more than convenience When we take a closer look at which priorities are more significantly affected, a clear pattern emerges across every country surveyed. Security is the factor that has grown in importance for the majority of people, followed by the potential associated costs of making a transaction. Over one third (34%) of consumers said that protection against loss from fraud had become more important to them following the outbreak and close to the same number (32%) said that ensuring their financial data was kept secure from fraudsters was a growing concern. This second concern has become more important for a greater number of consumers in Canada (40%) and the US (36%). The convenience of online payments has become a more pressing priority for some consumers, including the speed of completion (for 21% of consumers) and the ease of the checkout user experience (for 17% of consumers). However, in every country the percentage of consumers that said this was a growing concern was lower than the percentage that were more focused on security. The imbalance between security and convenience To further explore whether consumers were more focused on better security or an improved user experience, we asked survey respondents whether they thought the current balance between the two (sometimes competing) factors matched their expectations when paying via an online checkout. The overwhelming majority said that the balance struck at the moment was not correct; only 18% of consumers agreed that the balance between security, convenience, and fraud protection was satisfactory. 82% that said they were not satisfied, and only 5% said that this was because they wanted a more frictionless checkout experience even if this increased the probability of fraud. Over three quarters (76%) of consumers said that they would be in favour of tightening current security protocols, even if it meant compromising on the convenience of the checkout experience. 25% of consumers were in favour of doing this minimally, but over half of all the consumers surveyed said that now they would accept whatever security measures would be needed to eradicate fraud, even if this had a severely detrimental impact on the checkout experience. This percentage was consistent across all countries, with only the US (48%) falling marginally short of half of all consumers. Q: When weighing up convenience vs. security of financial data when making a purchase online, what element of risk would you be willing to accept? A role for alternative payments So it is clear that for consumers overall, security is the greater priority over convenience, and that this trend has been enhanced by COVID-19. And this is reflected in many consumer attitudes to the security of payments generally, beginning with the perceived risk associated with eCommerce. 56% of consumers say that they accept there is a risk of being a victim of fraud if they shop online (only 18% do not accept this), and 48% say that they are more concerned about being a victim of fraud than they were a year go (only 21% say that they are not more concerned). Only a third of consumers (34%) are more confident in the security of online payments than card-present payments. But it is not true that this focus on security automatically means convenience has to be compromised. 48% of consumers said they did not feel comfortable entering their financial details online to pay on an unknown website, but 68% said that they were more likely to shop with businesses where their financial details had already been securely stored. Diversifying the payment methods available in the checkout is another way businesses can cater to these consumers that do not feel safe entering their financial details and that prioritise safety over convenience. Payment methods where the consumer’s financial details are not shared with the merchant are particularly favoured; 75% of consumers said they were more comfortable using a digital wallet to make a payment online and 56% said they felt more comfortable using a prepaid card or voucher where their financial details were not shared. Is biometrics the answer to security vs. convenience? One further security improvement worth considering is the introduction of biometric payment authentication, particularly when it comes to mCommerce. But while there is some support for this more convenient (and arguably more secure) method of payment verification, consumers are still somewhat concerned that this level of security is not strong enough to protect their financial data. Although 53% of consumers do think that biometric authentication makes payments more secure, 41% say they trust manual passwords more than biometrics and 59% say they feel anxious when they aren’t asked to provide a password when making a payment. So as online businesses continue to develop their mCommerce platform, educating consumers on the security, as well as the convenience, benefits of biometric authentication will be imperative. Next steps As we begin to emerge on the other side of the pandemic, businesses will be desperate to reclaim much of the commercial ground they may have lost throughout the first half of the year. But while making the shopping experience as frictionless as possible might initially appear to be a sure-fire way to boost sales, a slick shopping experience that leaves the customer concerned about the security of their financial data will have the opposite effect. eCommerce and mCommerce businesses have long sought-after the most convenient user experience, but with consumers now being more focused than ever on the security of their financial data this will be easier said than done. But there are solutions, including promoting alternative payment methods where financial details are not shared, and biometric authentication. Understanding how these can shift the perception of security vs. convenience in the eyes of consumers is vital.
https://www.paysafe.com/de-en/paysafe-insights/has-covid-19-moved-the-needle-on-security-vs-convenience/
BioSP™ (Biometric Services Platform) is a modular, open platform used to enable a biometric system with advanced biometric data processing and management functionality in a web services architecture. It provides workflow, data management and formatting, and other important utilities for large-scale biometric systems. BioSP is well suited for applications that require the collection of biometrics throughout a distributed network, and subsequent aggregation, analysis, processing, distribution, matching, and sharing of data with other system components. BioSP is modular, programmable, scalable, and secure, capable of managing all aspects of transaction workflow including messaging, submissions, responses, and logging. BioSP makes extensive use of open-source components and is Jakarta EE-compliant. Applications Features and functionality Security BioSP is a secure system, with three mechanisms applied to securing data, communications, and access: - User data access is provided by BioSP Logical Access module. This allows for both UI-level security and specific data security based on individual user groups and roles within the system. - BioSP utilizes Hibernate technology to abstract the database communication; therefore, it can take full advantage of both Microsoft and Oracle database security and encryption of data at rest. For example, Oracle provides Transparent Data Encryption (TDE) in their 11G product; this ties the data within the database to either a software-based private key or a specific piece of hardware (HSM). Thus, in the event the data is stolen, it is useless without this private key. - All communication to and from the BioSP server supports both SSL encryption as well as WS-Security. These two technologies prevent both man-in-the-middle and malicious client attacks. Scalability BioSP is a scalable and flexible system. Depending on the environment wherein it operates, there are five different areas were the system can scale: - BioSP employs load balancing functionality available through a Jakarta EE container application such as Apache Tomcat or Oracle WebLogic. This allows for both increased performance, since the processing is spread over multiple machines, and increased application uptime; if one server fails, another server would automatically take the additional traffic. - BioSP runs in a Java Virtual Machine (JVM), so it can take advantage of multi-core processing. - BioSP utilizes an open source workflow engine from Apache called ODE based on BPEL, which can be run in a separate application server from the business process logic. This allows for increased performance and throughput. - BioSP has the ability to execute certain highly specialized biometric processing algorithms outside of the JVM, such as fingerprint matching algorithms. This allows these algorithms to be tuned to the specific operating system and processor on which they are executed, for maximum performance. Also, these algorithms communicate to the JVM through queuing mechanisms, which allows multiple algorithms to execute on separate machines in parallel. - BioSP uses Hibernate technology to abstract the database from the JVM; therefore, it can run on multiple database platforms such as Oracle and Microsoft SQL Server. This allows full use of Microsoft and Oracle database scalability features such as replication, mass storage, and disaster recovery. Auditing Audit trails are implemented with BioSP Logical Access and Event Manager. Logical Access provides support for security services in BioSP. It provides authentication and role-based authorization features. Logical Access deals with the following entities: Users, Roles, and Resources. A user can have multiple roles. A role can access a set of resources that are secured. These secured resources can be data within BioSP, user interface components of BioSP, or any custom defined resources. Log Manager provides services to record and monitor business events in BioSP. The logs can be categorized based on types and monitored separately. The basic functions performed by LogManager are: 1) add a log 2) find logs based on criteria 3) associate a new log with a previously existing parent log. Role-based user and group resource access and passwords BioSP offers improved resource access control. Features in the UI and services provided by the BioSP server can be viewed as resources. Access to these resources by users can be configured. BioSP supports the concept of roles. A user with a given role is given permission to access a resource in a specific manner. For example, a user may be assigned to a role that allows them to see a list of transactions but not to see the individual NIST fields in the transactions. Another user may have permission to see the transactions and their contents but not to edit them. BioSP supports the concept of groups. A group is a logical grouping of users. This allows BioSP to support functionality such as dividing users into groups. Groups are independent of roles; a user can have multiple roles and belong to multiple groups. Other security-related features provided are: - Improved searching, sorting, and filtering of transactions, including searching, sorting and filtering based on submitting agency - Creation of users and groups that can see all transactions for a given agency or group - Denying access to a view based on user’s access permission - Role based access to transaction field viewing - Prevention of password reuse - Minimum password age before change is allowed - Forced password change after a specified number days - Account disabling after a specified number of failed logins for a specified number minutes. - Account locking after a specified number days of inactivity BioSP Modules BioSP offers many advanced biometric capabilities, available through independent, service-oriented software modules. Each BioSP module performs a discrete set of functions, including biometric authentication, search, and duplicate checking, centralized image and data analysis and processing, data formatting and transcoding, and image quality assurance and reporting. The modules interact with each other via web services. Core BioSP Core provides the central infrastructure services shared across BioSP modules and business processes. Core is required to run other BioSP modules, which may be added and modified incrementally as business needs evolve. Components of the Core include the Web Services engine, security, Business Process Execution Language (BPEL) engine, email support, job scheduler, user management, logical access control, search services, document storage, and logging. BioSP uses BPEL to allow for quick scripting of biometric-centric use cases. BPEL is an open, standardized scripting language that orchestrates services, operations, and criteria to automate business processes defined in XML. Lower-level operations defined in BioSP modules are aggregated in BPEL scripts to form composite services. These composites enable synchronous and asynchronous processing of transactions and data to meet the requirements of a wide variety of use case scenarios. Workflow Manager BioSP Workflow Manager allows stateful processing workflow that involves user interaction, such as approvals, reviews, or edits. The workflow is scripted using BPEL, which allows it to be easily modified to many use cases. Each state of the workflow can have a different owner, and history is tracked over the lifecycle. Workflow Manager also allows for manual adjudication of tasks. The operator is presented with task input data, they are prompted for a decision, and the task output data is saved and used to finish the overall workflow. Transaction Manager BioSP Transaction Manager provides services for building transaction workflows between multiple disparate systems, including enrollment clients and other back-end systems. It is driven by BPEL workflow definitions and is highly configurable, managing both receipt of submissions and processing of responses from distributed sources. Store-and-forward requirements for standards-based communication with local, state, federal, and international government agencies are addressed with Transaction Manager. Transaction Manager provides broadcast capabilities, whereby a single input transaction may be distributed to multiple external systems upon submission. In turn, Transaction Manager consolidates responses from multiple external systems that relate to a single, original submission, and manages this consolidation until all responses have been received for a given transaction. Subject Manager BioSP Subject Manager provides services for managing and archiving subject identity data, both biographic and biometric, as well as custom metadata. Subject Manager manages the server side of biometric enrollment processes, the collection of biometric samples (images or templates) and biographic data for credentialing, biometric identification, or biometric verification. It provides support for finger, face, palm, iris, and scar/mark/tattoo images. Subject Manager receives enrollment data and populates its data stores and search indexes, providing services for managing new and existing identities, including create, delete, retrieve, and update of subject data. Subjects, or identities, are archived in the subject manager data store and indexes for field- or contextual-based searching. Biometrics are stored in image or template form for integration with internal or external matching systems and other business processes requiring biometrics. Subject Manager offers a browser-based interface for viewing and searching subject entry content. Format Manager Format Manager can build these data structures from the raw biometric and textual metadata or it can parse one type of data structure and convert it to another. Examples of this formatting include: - Creation of ANSI/NIST, FBI EFTS, DoD EBTS, PIV, or ICAO data structures from raw enrollment data - Creation of card personalization requests according to vendor-specific formats - Conversion between FBI EFTS and DOD EBTS - Conversion between Interpol ANSI/NIST and a specific country format - Conversion between binary ANSI/NIST and the XML variant of the standard - Conversion of ANSI/NIST Type-4 or Type-14 finger image records to ICAO DG3 format, ISO/IEC 19794, INCITS 378/381 or FIPS 201 (images or templates) - Conversion of ANSI/NIST Type-10 records to ICAO format (ISO/IEC 19794-5) or FIPS 201 format (ANSI/INCITS 385) - Conversion of WSQ and JPEG 2000 images to JPEG for easy viewing in a browser - Conversion of fingerprint transactions to fingerprint card images in PDF format Data is parsed from input transactions in preparation for processing of the data depending on the business rules for a particular workflow. Data from one transaction may be transformed to create another, single transaction. Data may be edited and repackaged in the same or different formats. A single transaction may also be used to create multiple, differently-formatted results. Multiple inputs may also be merged into a single transaction. Finally, data from disparate sources, be it other transactions, other data files, databases, or text, may be used to create a new transaction. Biometric Identification BioSP Biometric Identification module provides several biometric matching services, including one-to-one and one-to-many matching for authentication/verification, identification, and duplicate checking. Matching algorithms from Aware or third-parties may be integrated or called using BioSP BPEL services. Multiple matchers can be integrated. With its abstracted Web-services based API, it enables users to use a single implementation and set of instructions with multiple matchers. One-to-one matching compares one or more biometric templates submitted to the matcher with corresponding templates stored in the database, leading to verification of an individual’s claimed identity. Common use cases include physical and logical access control applications and match-on-server based biometric verification prior to credential issuance. One-to-many matching is used to compare a set of biometrics with a gallery of subjects with the goal of determining an identity. Inbound biometric data is enrolled to matcher galleries, which are collections of biometric data. Biometric Identification module supports the matching of standard compliant fingerprint templates (ISO/IEC 19794-2 or ANSI/INCITS 378). Multi-sample fusion requires all matching algorithms to report scores on a common unit of measurement. The Biometric Identification Module ensures that all matchers report scores in a consistent manner. The scores returned from matchers are level set within the Biometric Identification Module and are directly related to the occurrence of an input subject (or probe) falsely matching a member of the current gallery. This is formally referred to as the False MatchRate (FMR). BioSP returns the FMR value which ranges from 0 to any positive value but is realistically limited to scores between 0.0 and 200.0. Once the FMRscores are calculated. the Biometric Identification Module can fuse the match scores across biometrics. Report Manager BioSP Report Manager and associated modules provide biometric data collection, statistical analysis, and customizable reporting by processing and presenting data generated by Format Manager and the Fingerprint Analyzer, Facial Analyzer, and Iris Analyzer modules. Biometric transactions are analyzed for image quality problems and non-conformance errors, and the resulting data is made available for users to retrieve, organize, and visualize in the form of custom, graphical reports. The reports can be used to identify and troubleshoot enrollment problems, quantify environmental factors, and perform general system performance monitoring and improvements. All raw data collected for each subject and component (e.g. all ten fingers in a slap/plain impression) is aggregated and processed into OLAP cubes according to selectable parameters. Custom reports are presented that can summarize data in such a way as to enable informed decision making. For example, data might be presented that measures biometric image quality as a function of capture hardware device or operator, and presents summarizing statistics such as averages and standard deviations with automatically identified outliers. A capture device shown to yield average quality scores that are low to a statistically significant degree could indicate that the device is working improperly. Similarly, an operator requiring additional training might be identified. Finally, environmental effects such as humidity or temperature could be correlated to image quality. Output report formats include PDF, comma-separated value (.csv), HTML, and XML/XSL. Creating a new report Designing a new report Modifying a report with filters Displaying a report Fingerprint Analyzer BioSP Fingerprint Analyzer module provides services for complex fingerprint processing tasks and workflows. Quality assessment, segmentation, compression, decompression, and other processing tools are provided by this module. Some of the functions performed by this module are as follows: - Compression ratio calculation - Images noise reduction - Left/right hand identification - WSQ, JP2 or JP2L compression and decompression - Insertion of binary or text comments into images during compression and decompression - Transcoding of JP2, JP2L images to WSQ - Downsampling of fingerprint images - Segmentation and cropping of single fingers from slap images - Calculation of NIST and Aware QualityCheck scores - Sequence checking with match and non-match checking - Light, dark, and invalid image detection Face Analyzer BioSP Face Analyzer module is designed for remote, web-based submission of facial images for compliance analysis against standards-based or custom profiles. Profiles contain values that must be attained in order for a facial image to be considered in compliance with a standard (e.g. ISO/IEC 19794-5 for e-passports). Users submit electronic facial images individually or in batches via an easy-to-use web interface or web service call. They are presented with results in real time, including pass or fail, and descriptions of problems in the case of a failure. Compliant images generated by the module may be stored in BioSP for integration with other systems (e.g. CMS), returned to the user, or both. See PreFace for more details about Face Analyzer capabilities. Iris Analyzer BioSP Iris Analyzer performs centralized iris image segmentation and quality scoring using IrisCheck libraries. Quality vectors and scores are defined according to the international biometric iris image quality standard ISO/IEC 29794-6. See IrisCheck for more details about Iris Analyzer capabilities. Configuration Manager BioSP Configuration Manager performs centralized management of client enrollment application configuration, enabling a high degree of automation of client software distribution and maintenance. Software updates are automatically downloaded from BioSP to remote clients, and take into account local client configuration and conditions, such as capture hardware model and version. Access to software updates is securely controlled. Document Server BioSP Document Server performs customizable PDF document generation from submitted biometric images and data transactions. It performs layout of biometric images, biographic data, and other data such as barcodes into documents according to configurable layout design files. Biometric data transactions are submitted to Document Server, which returns a PDF representation of the images and data according to the prescribed layout file. Document Server incorporates Aware’s AccuPrint™, an FBI-certified software product for creation of printed documents containing fingerprint images.
https://www.aware.com/biometrics/biometric-services-platform-biosp/
Earlier this week the Supreme Courtruled that law enforcement must obtain a warrant to search a suspect’s cellphone. Law enforcement argued that no current law makes a distinction between cellphones and the pocket litter (wallets, cigarette packs) which police have always been permitted to search when arresting a suspect, but Chief Justice John Roberts rejected this argument, saying, “That is like saying a ride on horseback is materially indistinguishable from a flight to the moon,” adding: . “Modern cell phones, as a category, implicate privacy concerns far beyond those implicated by the search of a cigarette pack, a wallet or a purse.” Roberts acknowledged that requiring police to seek a warrant could impede some investigations but “privacy comes at a cost,” he said. - - New approach to balancing security and privacy Online identification and authentication keeps transactions secure on the Internet, but this also has implications for your privacy. Disclosing more personal information than needed online when, say, you log in to your bank Web site may simplify the bank’s security at the cost of your privacy. Now, thanks to research by the EU-funded project Attribute-based Credentials for Trust, or ABC4Trust, there is a new approach that keeps systems secure and protects your identity. - - Improved performance of facial recognition software Who is that stranger in your social media photo? A click on the face reveals the name in seconds, almost as soon as you can identify your best friend. While that handy app is not quite ready for your smart phone, researchers are racing to develop reliable methods to match one person’s photo from millions of images for a variety of applications. - - Drone surveillance raises legal, ethical concerns The use of drones for domestic security purposes, surveillance of citizens, and putative criminals and organizations raises many legal and ethical concerns particularly with regard to the Fourth Amendment to the U.S. Constitution, Council of Europe instruments, and the EU Data Protection Framework. Experts suggest that the rise of drones for surveillance and other applications highlights particular challenges to civil liberties and tensions between these and national security and justice concerns. - - Snowden revelations spur a surge in encrypted e-mail services The Edward Snowden revelations about National Security Agency(N.S.A) surveillance programs have fueled a surge of new e-mail encryption services. “A lot of people were upset with those revelations, and that coalesced into this effort,” said the co-developer of a new encrypted e-mail service which launched last Friday. The company notes that its servers are based in Switzerland, making it more difficult for U.S. law enforcement to reach them. - - Wisconsin silent about cell phone tracking by state police The Wisconsin Department of Justice(DOJ) is refusing to acknowledge that it has deployed Stingray technology to track Wisconsin residents’ cellphones, despite reports claiming the state has used the technology during previous investigations. The state also denied a public records request made in April seeking details on how often Stingray technology is used, how data is stored and shared, and how often warrants are obtained. - - Virginia lawmakers mull limiting police use of license plate readers Some Virginia lawmakers are planning to propose legislation which will limit the police use of license plate readers (LPRs). The state currently has no laws restricting how police collect or store license plate data gathered by LPRs. Last year, then-Attorney General Ken Cuccinelli said he believed Virginia State Police should be restricted from capturing and storing license plate data outside of a specific, ongoing criminal investigation, but for now, police departments across the state have adopted their own measures. - - Using biometrics to protect India’s one billion people raises security, privacy concerns The cutting edge of biometric identification — using fingerprints or eye scans to confirm a person’s identity – is not at the FBI or the Department of Homeland Security. It is in India. India’s Aadhaar program, operated by the Unique Identification Authority of India (UIDAI) and created to confirm the identities of citizens who collect government benefits, has amassed fingerprint and iris data on 500 million people. It is the biggest biometric database in the world, twice as big as that of the FBI. It can verify one million identities per hour, each one taking about thirty seconds. The program unnerves some privacy advocates with its Orwellian overtones. - - Businesses looking to bolster cybersecurity Since the recent data breaches at retailers Target and Neiman Marcus, in which hackers stole millions of customers’ credit and debit card information, consumers have been urging card providers to offer better secure payment processors. Legislators have introduced the Data Security Act of 2014 to establish uniform requirements for businesses to protect and secure consumers’ electronic data. The bill will replace the many different, and often conflicting, state laws that govern data security and notification standards in the event of a data breach. - - Adoption of battlefield surveillance system in urban settings raises privacy concerns More cities are adopting an aerial surveillance system first developed for the military. The surveillance cameras, fitted on a small plane, can record a 25-square-mile area for up to six hours, and cost less than the price of a police helicopter. The system also has the capability of watching 10,000 times the area that a police helicopter could watch. Privacy advocates are concerned. “There are an infinite number of surveillance technologies that would help solve crimes, but there are reasons that we don’t do those things, or shouldn’t be doing those things,” said one of them. - - How the Heartbleed bug reveals a flaw in online security The Heartbleed bug – which infects an extremely widespread piece of software called OpenSSL — has potentially exposed the personal and financial data of millions of people stored online has also exposed a hole in the way some security software is developed and used. The Heartbleed bug represents a massive failure of risk analysis. OpenSSL’s design prioritizes performance over security, which probably no longer makes sense. But the bigger failure in risk analysis lies with the organizations which use OpenSSL and other software like it. A huge array of businesses, including very large IT businesses with the resources to act, did not take any steps in advance to mitigate the losses. They could have chosen to fund a replacement using more secure technologies, and they could have chosen to fund better auditing and testing of OpenSSL so that bugs such as this are caught before deployment. They didn’t do either, so they — and now we — wear the consequences, which likely far exceed the costs of mitigation. - - Measuring smartphone malware infection rates Researchers show that infection rates in Android devices at around 0.25 percent are significantly higher than the previous independent estimate. They also developed a technique to identify devices infected with previously unknown malware. - - Protecting personal data on smartphone Social networking and the instantaneous sharing of information have revolutionized the way we communicate. Our mobile phones are able to automatically obtain information such as our current location and activities. This information can be easily collected and analyzed to expose our private life. What is even more malicious is that the personal data contained in our smartphones can be disclosed via installed applications without our being informed. - - Quantum cryptography to help us keep our secrets secret In the history of secret communication, the most brilliant efforts of code-makers have been matched time and again by the ingenuity of code-breakers. Sometimes we can even see it coming. We already know that one of today’s most widely used encryption systems, RSA, will become insecure once a quantum computer is built. An article in Nature reviewing developments in quantum cryptography describes how we can keep our secrets secret even when faced with the double challenge of mistrust and manipulation.
http://www.homelandsecuritynewswire.com/topics/privacy?page=8
This post is part of a series about how Hinduism views pain and suffering. Today, we’ll look at When Religion Becomes A Hindrance, Rather than A Help: Although religion can be a positive resource for some, there are times when religious coping can be ineffective. For Hindus, a first potential challenge may be the feeling of passivity or fatalism that may arise because of karma (karma = the principle that determines the unfolding of events, based on how a person has lived). A patient can feel hopeless or unable to change things because he feels that things are fixed by karma. Hindu traditions counter this by saying that a person can start in the present moment and go forward, living his life in a positive way by following dharma (dharma = sacred duty). If a patient currently experiences pain, change can occur by attending to present appropriate action. If one’s present state is a consequence of what has gone before, the urgency of responsible and appropriate action becomes greater, not less. Acceptance can be misunderstood as passivity. Hindu traditions do advise a focus on appropriate action, rather than outcome, but this doesn’t mean inaction, “avoid attachment to inaction.” People with pain can be encouraged to actively manage their pain and continue to seek improvement, but become detached from the outcome of these efforts. Lastly, there can be a risk of feeling that one is failing the test of pain and suffering, that one isn’t succeeding in achieving an even disposition. However, the religious practices of Hindus teach trying one’s best. Detachment can even be sought from the degree one achieves detachment; that is, a person can attempt to be less concerned about his success or failure to be detached. The process of trying is important, rather than a focus on a final goal of being detached. Patience with oneself is encouraged. Patients can also try to learn as much as possible from their current situation, including their apparent failures. It would be important to note that any one Hindu may be at any stage of spiritual growth with respect to viewing her physical pain and suffering as Hindu traditions teach. A person may or may not even be using his religious resources for support to cope with pain. The level of religious coping may change across time, for example, as aspects of a person’s illness change, including severity of pain, and as the availability of other resources changes. As in any religion, there would probably be only a small minority of Hindus who wouldn’t struggle with some aspect of their experience of pain or for whom acceptance is easy and unchanging; however, many strive to be faithful to their own religious tradition.
http://www.howtocopewithpain.org/blog/92/what-hinduism-can-offer-to-help-with-your-pain-part-4/
This series, Living Beyond Ordinary, is about being courageous, vulnerable and pushing past limitations to create an extraordinary life with full self expression and an open heart. This past year has been filled with many big changes in my life. Change causes growth, and these paintings reflect my journey of taking a huge leap into the unknown, really getting to know myself, and finding balance with mind, body and soul. Through life’s challenges, we get to choose to see it as lessons and opportunities, or dreadful circumstance. For this reason, I chose a playful and colorful theme by incorporating dancers and circus performers to emphasize the joy of being alive and experiencing our physical and emotional strength and grace. Metaphorically, I used symbols and animals to help tell this story of growth and awaking. It is a dreamy narrative that I think we all can relate to in some way…it is not just my story, but a story of what it means to be human. Through trusting, having courage and being vulnerable, we discover our own truths and have the experience of being known, and through this we have the ability to shine our light brightly into the world. Contemporary artist, Sarah Goodnough, is endlessly inspired by the human spirit and the splendor of nature. She lives in Oregon, both in the lively city of Portland, and the quaint coastal town of Astoria, located at the mouth of the Columbia River. She finds the dichotomy between big city vibrancy and culture and small town friendliness and scenic beauty, to be a great balance for her artistic imagination. Born and raised in Massillon Ohio, Goodnough moved to Portland in 1997, after graduating from Miami University of Ohio, with a Bachelors degree in Mass Communications. Pursuing and creating art her entire life, she is primarily a self-taught artist with some schooling in fine arts. Goodnough made the choice to follow her dream and seek out an art and design career after her move to Portland. Goodnough’s work celebrates life. Her artistic style is expressive, using vibrant color, strong composition, and layered texture. She paints abstracted viewscapes pulling real life scenes into redefined realities of wonder and brilliance. Astoria, Oregon’s rich salmon fishing history, and the fascinating life cycle of salmon, is the source for her Salmon Series. The dramatic riverscape of Astoria also influences many of Goodnough’s paintings, as seen in her Boat and Bridge Series and riverwalk tree and house paintings. Goodnough creates in a variety of mediums; painting in oils, acrylics and watercolor. Additionally, she works with pastels, blockprints, mosaics, and photography. She frequently uses photography taken from her daily walks and world travels as reference and inspiration for her paintings. She enjoys combining the texture, line and form captured from life and her photos to create new and different realities in paint and mixed media. By playing with color, pattern, composition and texture, she produces vibrant and unique work that is sensitive to mood and emotion. I think all of us have felt disconnected from our family, friends, nature, environment or God at different times in our lives. We struggle to stay connected, as we work to achieve and maintain a way of living that creates balance for our lives. Finding an equilibrium is a unique experience for each of us. I have discovered that I reconnect with my surroundings and stay true to my inner compass through creating art. I choose to depict in my work the natural beauty of the world. I also draw upon the internal beauty and positive human spirit that dwells within each of us. I believe in staying present to life and to take each day as a gift, rather than focusing on thoughts that can burden and entrap us. This is the message I want to convey to the world around me. How often have you looked at a piece of art and quietly asked yourself, “What does it mean?” Maybe even on a subconscious level, because our brains are wired to find order and meaning in everything. An image can speak to people on many different levels, perhaps meaning something totally different than what the artist originally intended. The image becomes something that transcends the artist. It becomes universal; something “meant” for everyone, interpreted by their own unique and individual life experience… that to me is the magic of art. I find that I often think how my life experiences and thoughts can be translated into art. Sometimes it is inspired by a discovery about a person, an experience in nature, or even a thought or pervading feeling that intrigues me. I automatically think about how I would translate it visually. My latest work will continue its focus on the Pacific Northwest-viewscapes and subjects from nature that are a reflection of this area. As a transplant to this area, I am continually awed and inspired by the grandeur of the Northwest. My grand artistic goal is to visually explode concepts that teach, inspire or uplift the viewer. I want to empower others to be their best, and to follow their dreams for who they want to be in the world; to make personal choices that leave them feeling inspired, alive, and living an exemplary life beyond the ordinary.
http://www.modernvillagallery.com/artists-2/sarah-goodnough/nggallery/page/2
This material prepared for the Ecological Society Green Salvation. Sierra Perez-Sparks is a Masters student at Harvard University and studies democratization, social movements and food politics. She is especially interested in urban bias within post-Soviet states. Ms. Perez-Sparks also translates news for the website WatchingAmerica.com. In April 2011, head of the Kazakhstani Department of Regulation and Control of Forestry and Protected Areas Kairat Ustemirov announced that the government would lease national parklands for 49 years, primarily for the development of eco-tourism and related infrastructural needs (1). No doubt eager businessmen looking to capitalize on Kazakhstan’s mountainous regions and a government in times of global economic hardship welcome developments of this ilk, and indeed Mr. Ustemirov stated that a number of projects already were underway. However, how the leasing of these lands will impact Kazakhs today and in future decades constitutes a completely different matter. While it is uncertain that the people would even see the revenue from leased lands, it is even more uncertain what unintended ramifications the populace and local eco-systems would encounter as a result of development. Moreover, these concerns say nothing about the tremendous threat that accompanies any sale of public land to the privatized, for-profit sector—the threat against the social fabric. To understand how privatizing the environment endangers the strength and robustness of a people, one must first agree that the value of nature exceeds its weight in gold. Yet, it is easiest to place value on the environment when we consider it in terms of natural resources. The markets straightforwardly monetized, for example, the 421,700 metric tons of copper extracted from Kazakhstan’s deposits in 2008 (2). Recently the China Development Bank signed a memorandum of understanding that added $1.5 billion to its existing $2.7 billion loan to Kazakhmys, a natural resources group, for the development of major copper projects in Kazakhstan (3). Although one rarely associates smartphones, for which copper is used to construct its circuitry, with desert eco-systems and rupestrian whirlpools, nature indeed provides the raw materials necessary to construct such a feat of human ingenuity. Beyond the strictest definition of natural resources, one quite simply can calculate the value of nature based on various forms of outdoor entertainment. Sport hunting, snowmobiling and skiing are just a few of the popular activities that relocate the human from the urban environment to a liminal setting where industry meets the natural order. In Colorado, the number one ski destination in the United States, the skiing industry generates an estimated $2 billion of revenue each year (4). For many Coloradans, global warming threatens one’s livelihood in addition to one’s surroundings because, as countries the world over keenly understand, a thriving eco-tourism sector supplies a critical stream of revenue. It is hard to fault a properly managed eco-tourism business, i.e. when eco-tourism is in actuality eco-friendly, and it perhaps strikes the happiest medium between the profit from and preservation of nature. Sustainable interaction with the environment simultaneously pleases man on two levels, satisfying his commercial desires and soothing his spiritual concern for his surroundings. Certainly not all projects achieve this balance. For example, Almaty’s Kok Tobe, a commercialized mountaintop park, features an impressive vista of the city and the Tien Shan mountains in addition to an appalling zoological garden. The management of Kok Tobe unwisely pairs the caged animals with descriptive placards that only seem to accentuate the unnaturalness of the animals’ habitat and diet. Far too often, as seen in this particular example, eco-tourism values nature primarily in terms of dollars and cents, and prioritizes the consumer over the inheritance of the public. The inheritance of the public is our Earth; it is our environment and our commons. These spaces are a “living legacy”—a cultural resource that pays political, ecological and emotional dividends (5). In its Cultural Resource Management Guide, the U.S. National Park Service identifies cultural resources as a “unique medium” that has “the ability to connect one generation to another…an inherent capacity to mold and reinforce our identities as social creatures” (6). One observes the manifestation of this social connection in the footsteps that have trodden the Appalachian Trail over the course of nearly a century, or in the unobstructed forest pathways that have been cleared by an Almaty mountain man after a heavy storm. Ancestors and descendants alike can appreciate the same slopes and ravines. Freely accessible public space strengthens the social fabric, not only by passing down a shared cultural identity from generation to generation, but also by providing the opportunity for people to interact independently outside the realm of controlling forces such as economic markets or particular administrations. In this way one appraises a truly precious and renewable natural resource, nature’s buttress against social frailty. Conversely, the absence of this buttress engenders a displaced public insofar as privatizing public lands effectively evicts people from their inherited lands. Protecting public lands merits the attention of each and every citizen, especially because those who ostensibly steward the inheritance of the public frequently squander it. History and current practice demonstrate that governments too often cede public lands. And once the land departs from the public trust, the public becomes weaker—an especially undesirable consequence for democracies. However, there are instances of the public reacquiring lost lands and in this we can see greater returns over a longer period of time than in the initial sale of the land. One such example is the White Mountain National Forest. In 1867, New Hampshire Governor Harriman sold the region primarily to logging companies, which in turn disastrously mismanaged the land so that within the course of a few decades the “resounding [public] outcry” spurred the government to action (7). In 1911, the U.S. Congress passed the Weeks Act, which authorized the use of federal funding to purchase forestland for the purpose of conserving it, and in 1914 the U.S. government began to buy back the White Mountains. Now, the White Mountain National Forest spans nearly 800,000 acres, attracts approximately 7 million domestic and international visitors a year, and constitutes one of New England’s richest natural resources (8). Of course, such a happy ending cannot be guaranteed for all formerly public lands, and one simply wonders about the future of Kazakhstan’s national parks, which are now being leased for 49 years. Will the lands be mismanaged? And will this spread the desertification of Kazakhstan to the verdancy of the collective? As Kazakhstan pushes into the future, developing its many different kinds of resources, the country can decide which type of natural resource to prioritize. Unfortunately, the dazzling process of converting nature into money limits one’s understanding of its resources, and in consequence one tragically ignores an invaluable source of wealth. Though the temptation of riches is great, the advantages of building a vibrant democracy are greater. August, 2011 —————————— 1. “Национальные парки Казахстана сдадут в аренду на 49 лет.” Актау–Бизнес. 21 April 2011. http://www.aktau-business.com/2011/04/21/parki.html (10 July 2011). 2. Levine, Richard, and Wallace, Glenn. “Countries of the Baltic, the Caucasus, the Central Asia and the Eurasia Regions.” 2008 Minerals Yearbook. December 2010. http://minerals.usgs.gov/minerals/pubs/country/2008/myb3-2008-aj-am-bo-en-gg-kg-kz-lg-lh-md-rs-ti-tx-uz.pdf (15 July 2011). 3. “Kazakhmys signs MoU to get funding for copper project in Kazakhstan.” Energy Business Review. 14 June 2011. http://mineralsandmaterials.energy-business-review.com/news/kazakhmys-signs-mou-to-get-funding-for-copper-project-in-kazakhstan-140611 (26 July 2011). 4. Irani, Daraius, Ross, Kim, Ruth, Matthias, et al. “Economic Impacts of Climate Change on Colorado.” July 2008. http://www.cier.umd.edu/climateadaptation/Colorado%20Economic%20Impacts%20of%20Climate%20Change.pdf (15 July 2011). 5. “National Park Service-28: Cultural Resource Management Guideline.” August 2001. http://www.cr.nps.gov/history/online_books/nps28/28chap1.htm (20 June 2011). 6. Ibid. 7. “History of the White Mountain.” http://www.fs.fed.us/r9/forests/white_mountain/about/history/index.php (10 July 2011). 8. Ibid.
http://esgrs.org/?p=15554
Marcia Wegman lives in Iowa City, IA. She has worked in multiple media, including intaglio printmaking (which she studied for her MFA at the University of Iowa), oil, watercolor, collage, and paper making. Her landscapes of the Midwest capture the spirit of Iowa. In addition to pastoral pastels, she also paints abstract landscapes on Yupo. They convey a feeling rather than the exact details of a location. The layering of long brushstrokes fractures the landscape and rebuilds it in new and exciting ways. Vision: Inner & Outer "Painting pastel landscapes and painting acrylic abstracts are two very different processes. With the pastel landscapes I am working from photographs I have taken of the Iowa land and sky in all seasons. The abstracts come from an inner vision using my imagination, sense of playfulness and experimentation. My love of and connection to nature is the underlying inspiration for both styles. I am a passionate gardener with a large decorative garden area surrounding my home. The garden becomes my outdoor canvas from spring through fall with potted plants to observe and care for during the winter months. These varied forms, colors, rhythms, and textures of nature find their way into the abstract paintings. Observation of Iowa's rolling crop fields, farms, rivers, lakes, woodlands and roadside grass and wildflowers gives me limitless possibilities to compose with light, color, texture, and forms into exciting compositions with the hope the viewer will share my love of the beauty of this state of Iowa." -Marcia Catalogue Coming soon!
https://www.gildedpeargallery.com/vision-inner-outer.html
Dimitrina Stamboldjiev Kutriansky’s style can best be characterized as “romantic naturalism,” an expression of her desire to capture and convey the inherent beauty that can be found within the seemingly ordinary corners of the natural world, while also creating a strong sense of place and atmosphere. In her work, Dimitrina draws upon frequent intimate interactions with nature, as well as upon her extensive study of the landscape paintings from the Hudson River School and the Peredvizhniki (the Russian realist art movement known as “The Wanderers”). Born in Sofia, Bulgaria, Dimitrina immigrated to America when her father was sent by the Bulgarian Orthodox Church to serve as a priest in the Midwest. She was awarded full-tuition scholarships for both her bachelors and masters degrees, obtaining the latter from the University of Iowa, where she studied directly under Mauricio Lasansky, one of the “Fathers of 20th Century Printmaking.” This training in printmaking is reflected in her painting style, which is characterized by her unique use of line, value, and varied edges. Dimitrina is a member of the International Guild of Realism (IGOR), the American Artists Professional League (AAPL), the Pastel Society of America, and the Oil Painters of America and a Founding Member of Heartland Art Club. Her artwork has been featured in multiple publications and websites, including the book “Strokes of Genius 7: Depth, Dimension, and Space” and the blog “Empty Easel.” Her work was juried into AAPL’s Grand National Exhibition at the Salmagundi Club and IGOR’s Winter Salon, and she was named a Finalist in both the 12th and 14th International ARC Salons. Artist Statement Nature is an inexhaustible source of inspiration that awakens the soul to deeper feelings of wonderment, allowing us to cultivate our perceptions about the beauty of our existence. By studying the distinctive details that blend into a harmonious whole, we can transcend the mundane and become aware of our unity with nature. The experience of encountering this truth is the essence of our humanity. Landscape painting aims to reunite us with the world, for without the keen observation of nature, our environment becomes desultory, our lives perfunctory. Viewing works that reflect this beauty becomes a transformative experience for the observer, who is invited to marvel at nature’s unique diversity and lyricism. Characterized by a profound passion for the natural world, my art expresses the beauty inherent in the seemingly ordinary: in every roadside weed, blade of grass, shallow puddle, and mossy rock. Many today experience a kind of visual indifference, as humanity’s progressive alienation increasingly obscures our connection to nature. By rediscovering the ordinary, we rediscover ourselves: we reaffirm our ideals, which enable us to transcend the ordinary and free us from the burdens of our rushed, technology-driven lives, lifting our spirits, triggering our imaginations, and inspiring us to strive for a gentler, more humane world.
https://www.theartbeacon.com/dimitrina-kutriansky/
He describes beauty as a state of being, and of becoming – not of “having” – and refers to the traditional Chinese perspective that beauty is part of the essence of a thing. He notes that it is from society’s devotion to consumption that beauty becomes a something one attempts to have rather than to be. Thus, he elevates beauty from a cosmetic and manipulated product and restores it to the nature of things aligned with their essence. The author appears to have been inspired by nature and infused with wisdom of contemplation, and is able to convey that inspiration to the reader. Highly recommended.
http://keltria.org/hengehap/HH87/HH87-Reviews-WayOfBeauty.html
These were the words of the Barana community member, Justina Mane. She was speaking to Wansolwara at the launch of the Barana Community Nature Heritage Park project, including the Environment and Resilient Resource Center in July this year. The launch at a rural community on the outskirts of Honiara, the capital of the Solomon Islands, served as an occasion to reflect on the damage caused by years of clearing trees for homes and gardens— trees once considered sacred, and recognised as integral to the Lungga river system. The river was the lifeblood of the community — a source of clean water and food such as fish, prawns, eels and crabs. Due to the pressures of a growing population, the demands of modern society, and the lure of the dollar, traditional wisdom and knowledge were ignored, and the river’s surrounding vegetation removed to clear land. In time, the river began to shrink noticeably. The water quality declined and the food that it provided dwindled. The community, who had always lived close to nature, were affected physically and mentally. Major concerns were over water shortage, forest clearing and deforestation such as logging and unmanaged milling on the upper Lungga and Mataniko rivers as direct threats to the village’s water sources. For an emotional Mane, the Barana community project was a reminder not to take the environment for granted, but to treasure and nurture it in the way of their ancestors. The environment provided physical and psychological sustenance — not only was it a source of food, but also tied up with culture and tradition. “The times of our ancestors were different. Now there are significant changes in how we live and how we treat the environment,” Mane said. The project was a partnership between the Barana community and the Secretariat of the Pacific Regional Environment Program (SPREP). Under its Pacific Ecosystem-based Adaptation to Climate Change (PEBACC) project, SPREP has provided $US123,300 ($F270,738) over three years, earmarked for 5000 hectares of forest area on Mount Austin, which hosts one of the largest water catchments supplying water not only to the Barana community but to the wider Honiara city. The Barana Community Nature Heritage Park project involves reforestation to reduce the risks of flooding, replanting the watershed areas to reduce soil erosion, identifying and implementing sustainable land-use management activities, land-use mapping, development of eco-tourism and nature-based income-generation activities. Environment and Resilient Resource Centre The Environment and Resilient Resource Centre, based on traditional designs, will serve as a space for creating awareness about the importance of good environmental practices and the role of ecosystems and biodiversity in community resilience. The earmarked area includes a number of World War II viewpoints and battle sites, which makes it an important part of the heritage of greater Honiara, with potential for tourism. “This project will help us undo some of the damage to the environment. It is encouraging to know that we can save our environment —that we can enjoy what our ancestors had enjoyed,” Mane said. At the launch was 10-year-old Marina Mane, who represents the future generation. Her generation will face the full brunt of the environmental degradation and fallout from climate change unless actions are taken to mitigate the effects. “My name is Marina and I am very happy that you all helped build this resilience center to plant trees for my future,” she said at the event. Marina’s traditional attire during the opening ceremony—a grass skirt and beads made of tree bark, and shell money from sea shells—was representative of her community’s ties to their land and the marine environment. The project aims to educate and empower the future generation as the future custodians of the environment. Standing next to Marina was a community elder Evangeline Kuva, also donned in a grass skirt with traditional painting on her face. She indicated she had seen better days as far as their environment was concerned. “I never thought this would happen to our community, however, I am happy that this initiative has come to my village, to help us,” she said. Both Marina and Evangeline welcomed guests at the launch with big smiles, hugs, and looks of relief on their faces. Speaking in the local Guadalcanal dialect, their words reflected the desperation of a community feeling the impacts of their natural environment changing right before their eyes. It is the small communities in the country that pay the highest price for a national economic base primarily sustained by the exploitation of natural resources. The Solomon Islands’ Ministry of Environment website states that while forestry, mining, fisheries and agricultural are vital for growth, they pose a threat to biodiversity, cause pollution, and are responsible for coastal degradation. The foreign companies engaged in such projects benefit the most while the communities suffer the impacts of a damaged environment. Logging impact According to a report released by the Global Witness last year titled, ‘Paradise Lost: How China can help the Solomon Islands protect its forests’, logging, while a major source of foreign exchange, has caused major environmental and social problems, as well as corruption. The report highlighted that the rate of logging in the Solomon Islands was four times over the ‘sustainable yield’, and rife with transfer pricing, misreporting and tax avoidance. “The economy is heavily dependent on the forestry sector, and yet the country’s forests continue to disappear fast. The Solomon Islands’ authorities are well aware that, without change, the country’s timber trade will soon slow to a trickle with nothing left to log and barely any timber to trade,” the report stated. “The first step to prevent this from happening is to make sure that — at a very minimum — logging companies in the Solomon Islands comply with the country’s laws.” The report said the Solomon Islands exported an astonishing 19 times more timber than was sustainable, yet despite this, the rate of logging was still increasing. The Solomon Islands is China’s second-biggest source of tropical logs after Papua New Guinea, according to the report, despite the fact that the Solomon Islands is only twice as big as Beijing. The report stated the Solomon Islands exported more than 3 million cubic metres of logs in 2017. “Our estimate of sustainability is the most recent we can find, and comes from a report commissioned by the Secretariat of the Pacific Community,” the report said. Tree planting project The Barana community tree replanting project is seen as a push back against the system. Before the project was established, the community faced water shortages, with logging on the upper Lungga and Mataniko rivers a direct threat to the community’s major supply source. The project aims to protect the land used for community gardening and a water catchment that supplies Honiara residents. Barana community member and event organiser, Melinda Kii, said simple developments such as the resilient center and nature park could change lives. “The Barana community is happy to host this milestone initiative that connects us to the national, regional and international discussions on climate change,” said Melinda. “We are very fortunate to participate in this initiative. It gives all generations a chance to listen, learn and practice under one common global agenda — climate change.” Kii shared an old Barana saying: tabu kavi la lania ke ta bochana visa meke rasana usa meke tambe na ovo (don’t cut that lania tree because lightning will strike, the rain will fall and the river will flood). Flooding is indeed a grim reality facing the community. SPREP director general Kosi Latu, a guest at the event, said the project spoke of many interlinking issues in conservation, community resilience, and natural solutions such as replanting to revive river systems and the eco-system as whole. “Improving livelihoods by providing renewable energy and a source of clean water are important for the future generations. That’s what this project is about,” he said. “It’s not about infrastructure. It’s about going back to nature and to then traditions and practices of past generations. We’re reviving them and demonstrating their benefits.” The Barana community nature park is the first of its kind in the Solomon Islands. It empowers the community to fight back rather than to be the victims. The success of the project is crucial for similar parks across an archipelago facing devastation from decades of environmental degradation.
https://infopacific.org/2019/12/logging-the-life-out-of-lungga/
Biodiversity Values Assessment The Intergovernmental Science-Policy Platform on Biodiversity and Ecosystem Services (IPBES) is the scientific assessment process for the Convention on Biological Diversity, equivalent to the Intergovernmental Panel on Climate Change (IPCC). It has prepared a special report on the many ways of understanding the values of biodiversity, ranging from material to spiritual and including Indigenous world-views. The Summary for Policy-Makers (SPM) issued 1 August 2022 gives its important messages. These are very close to the concerns of the International Environment Forum to bring together scientific and spiritual perspectives. The question addressed is how we value nature. At one extreme nature is seen only as a resource to be exploited to make money, like cutting down the trees in a forest for timber. Then there are people who believe they are part of nature, for whom a tree may be their ancestor, and if they must cut a tree they render thanks and ask for forgiveness. For others a tree might be a source of beauty or a metaphor for a fruitful life. One important observation in the report is that, even when such alternative values are documented and shown to be important to many people, they are almost never taken into account in decision-making, which is often dominated by economic decisions that ignore other values. The report suggests ways to address this. It is significant that the IPBES, as an official international scientific assessment body answerable to governments, has recognized and explored these intangible values of nature, and asked how they can all be taken into account in decision-making for sustainability. It is an exploration of the relationships between humans and nature, an issue that has also been addressed by the Bahá’í International Community in its 2022 statement One Planet, One Habitation. We have posted on the IEF website in Biodiversity Values Assessment the essential parts of the SPM, including the ten Key Messages of the report with their explanations, as well as the headlines of the Background Messages. These are grouped as: A. Understanding the diverse values of nature; B. Measuring and making visible the values of nature; C. Leveraging the diverse values of nature for transformative change towards sustainability; and D. Embedding the values of nature for transformative decision-making for sustainability. There are also two boxes in the SPM of particular interest to IEF: A values perspective on justice and power; and Pathways that contribute to just and sustainable futures and that prioritize distinct underlying values of nature. We have also prepared this material as a Study Guide 134 slide presentation in pdf (10 mb) for those who may wish to study it together.
https://iefworld.org/index.php/node/1310
Browning over-exaggerates the features and beauty of the nature of England almost making them come alive with her use of personification. The poem is very descriptive and also plays on all the five senses. She shows the sense of taste with the use of the word ‘sweeter’ in line 12, ‘ Made sweeter for the step upon the grass’ and also line 20, ‘Fed full of noises by invisible streams,’ the sense of hearing is shown using the word ‘noises.’ Browning also used the repetition to give the reader a sense of continuity. She shows that nature is evergreen and will be omnipresent in this world. This can be seen with the repetition of words like ‘the’ and ‘and’. How do the poets present the natural world in Plath’s “Manor Garden” and Hughes’ “Thistles”? Nature is shown to be overwhelming in Sylvia Plath’s poem “ The Manor Garden”. Plath uses nature as a platform to discuss the speaker’s insecurities about reproduction. Also, she is able to instantly set the stagnant atmosphere in which she takes the readers on a journey. Plath’s use of language to describe nature affects the readers by portraying nature in a negative light. ------------------------------------------------- Differences and Similarities Between Coleridge and Wordsworth Concerning People's Relationship to Nature Although Wordsworth and Coleridge are both romantic poets, they describe nature in different ways. Coleridge underlines the tragic, supernatural and sublime aspect of nature, while Wordsworth uses anecdotes of everyday life and underlines the serene aspect of nature. In order to imply a connection between nature and the human mind, Wordsworth uses the technique of identification and comparison whereas Coleridge does the opposite in "The Ancient Mariner" and "Kubla Khan". Both admire nature's healing strength and hope that their children will grow up in a natural environment instead of growing up in cities. For Wordsworth nature seems to sympathise with the love and suffering of the persona. Major Themes The Power of Nature Shelley discusses the power of both seen and unseen nature throughout his entire canon. This is primarily how critics have come to classify the bard as a "Romantic." Due to Shelley's fervid defense of a godless universe, he often turned to the sheer majestic power of the natural world. In the place of religious doctrine he wanted substantiated evidence of reality. Related Poems: • "Mutability" • "Hymn to Intellectual Beauty" • "Mont Blanc" • "Ozymandias" • "Ode to the West Wind" • "To a Skylark" • "Adonais" Atheism The theme of a godless universe cannot be separated from Shelley’s continuous reference to the inspiration he received from Nature. The Solitari Reaper and I Wandered a Lonely as a Cloud. Two poem talk about beauty. Wordsworth again express beauty in its natural form. He also stated that beauty is not only visible but can be felt by all of our senses. Below two poems that I will discuss in this paper. Saito’s Argument in “Appreciating Nature on Its Own Terms” Saito’s argument is based upon how we appreciate and view nature on its own terms. Her argument on appreciating nature is separated into many different sub-arguments throughout her paper against the landscape view and the associationist view. I will be discussing and explaining Saito’s view on appropriate aesthetic appreciation by providing examples from her work. Firstly, Saito introduces the differences between nature aesthetics and art aesthetics. When we view and appreciate art, we have a visual experience with the artwork because the viewers can distinguish what the artist is attempting to produce. Wordsworth’s conveying of ideas which were fundamental to the Romantic era depicts his poetry as being influenced to a great extent. Being one with nature is explored by Wordsworth’s in his revealing poem titled ‘The Daffodils’. From the very first line of his renowned masterpiece Wordsworth captivates his audience with the simile “I wandered lonely as a cloud”. The comparison of his self to an incredibly isolated aspect of nature is made use of to set the overarching tone of the poem from the beginning. Furthermore, this comparison makes obvious to the responder that he considers himself to be one with nature. In the numerous poems by Robert Frost, his use of nature shows symbolism to the deeper meaning of his poems. “The Road Not Taken”, “My November Guest”, “Mending Wall”, and “Stopping by Woods on a Snowy Evening” all contain examples of Frost’s exceptional use of imagery. Symbolism is described as words, objects, or events that have a meaning larger than their definition and/or “an artistic movement in the late 19th century that tried to express abstract or mystical ideas through the symbolic use of images” (Princeton, “Symbolism” 1). The implantation of symbols acts as a guide for the audience, moving their eyes across the page with each customary inclusion. The known is much more comfortable for a person to encounter in poetry, rather than something unseen or unusual. In the opening line of the poem, MacCraig provides the reader with a simile, comparing the ___________________ to _____________________________. This description is also oxymoronic as lightning is described as ‘tame’, whereas is nature lightning is often wild, explosive and threatening. By comparing ‘straws’ to ‘tame lightnings’, MacCraig gives the impression ………………………………………………… Another descriptive device is given in the run-on line in relation to the straws which ‘ hang …………………..’ which suggests that …………………………………… . In the second line of the first line a simile is used again ‘green as glass’. Here the poet is describing ……………………………………………. What is poetry? One could argue that poetry can serve any number of purposes to a reader including a release of emotions, an exercise of the imagination, or pure and simple entertainment. But one of the most important functions of poetry, at least as viewed by many poets themselves, is that of a lesson on the natural world, life, or human nature, with the poet himself behaving as a teacher or prophet. Many of Robert Frost’s poems focus on the idea of man learning from nature through observations and experiences. His poem, “Mending Wall,” is an excellent example of such a poem.
https://www.antiessays.com/free-essays/Nature-Emily-Dickinsons-Poem-12349.html
Grace in the face of oppression. I thought I would try writing from inside the feeling of oppression. Of course as soon as I write these words, I remember the meditation advice to “look for the feeling of oppression, where is it located, does it have any real substance of its own?” I’m going to do that now for a moment… Really, the question is “what is the self that is feeling the oppression?” It has been suggested, that the energy required to maintain even a temporary sense of permanency of that self, is enormous. That is my experience. When I sit still, breathe, and look for that self, I find it is merely a construct of mind held loosely together by a collection of memories of temporary state and experience. As I step into a seat of awareness to witness that construct, I can see beside it the reservoir of energy that is the source of all creative response in the moment. Much of that energy must be directed to maintain a sense of solidity to that “self,” the one that feels oppression. Allowing that idea of “Kabir,” who at one moment feels inside of oppression, to drift easily in the mind, not as the prison or source of awareness, but rather as an object within awareness, I can see more the dynamic nature of that self. That self ceases to be a conditional constraint through which creative energy must flow, obeying all of those “laws” of past experience and emotional state. Instead, Kabir becomes a fluid condition, much more easily mixed and melded with the flow of creative energy and response to what is arising. It’s funny, I initiated this thread as a way of confronting a certain sense of despair (above called “oppression”). My initial thought had been to reach out to a friend for a sense of connection as a way of responding to the discomfort. Glancing quickly at my thread of text messages to see if anyone would catch my eye I found that (reflecting now) the sense of discomfort actually drove me away from those familiar names of friends. Rather than connection, I felt separation, as though there was not love for me there in those names, and simultaneously that I had no fullness and only need to bring to them anyway. Feeling no love in connection, I thought I would try writing as a way of offering something into the reciprocity of the world. Funny that it took just one sentence to remember to look inward rather than out, for the source of connection. Better still that it took but a moment (literally less than three minutes between the third and fourth paragraphs above) to find the fullness of that connection inside. Inside the fullness of awareness, the entire kosmos arises. I’m told that both the awareness and the arising Kosmos can be found to be one. I smile to myself now, won’t that be something to discover? For now I’m still practicing at the level of simply realizing awareness as the ground of itself, rather than Kabir as the source of awareness. For now it is enough to realize all of time and space simply arising in awareness. Of course I digress. What is this feeling of oppression I referred to? Where does that come from, and how does it come to be a character in this story? I think the sun must’ve come out for a moment here today. Mostly though, in the course of my experience from morning until now, clouds and cold and gray have held sway. Just after 4 PM, nervous system aflutter, as I turned to share these words, I was coming out of about 90 minutes of online research. The wise advice of my friend Dave, some time ago now, was to get out of the house, and actually visit a residential care facility so that I could start to put a face on that very real possible avenue for my future to be. I have been moving in that direction with some diligence, in parallel to many other tasks and opportunities. It has revealed questions I didn’t know that I had – am I looking for “Adult Residential Facilities”? Skill Nursing Facilities? Assisted Living Facilities? All of the above? What does it take to visit them? Which ones take the Medi-Cal that will provide the funding for such residency? And on and on and on… So I opened the 10 tabs in my browser that I hoped would help further guide my search. 10 tabs turned into 20, state ratings visible only up to 2014, warnings of opacity, a focus on elderly and little mention of disability, and after 90 minutes I had an overwhelming and even frightening five-page checklist, a slight handful of personal questions, and a sense of enormity and danger. This path of assessing possible care, and finding the way through is certainly no easy task, not for this humble servant, and I imagine not so for many others. Tomorrow I will make some calls, both to advocacy groups as well as potential providers, and I will find my way to visiting a few facilities this week. Coming out of the research however – getting in as deep as I did today – left me with a feeling of having been abused. The weight of our care system felt as though it rested firmly across my body, the system itself disabled and paralyzed. As I described this, I remember a similar feeling just days after I was injured, paralyzed in November 2002. I was in the hospital, filled with morphine. I was lying in bed, and the memory I have is that of calling out to my brother Ira (http://www.wtlrecovery.com) to explain to him that I had a corpse lying on top of me and that I couldn’t move. The feeling this afternoon was a similar sense of disorienting oppression. There is much that is “unfortunate” about our world today. (Earlier today I reviewed this trailer for my dear friend Katie’s upcoming film – I encourage you to consider participating in funding her project.) There is much that is unfortunate about our world today. Often the “Self” that we find ourselves in lies paralyzed beneath the oppressive weight of the conditions of death and decay. As Otto Scharmer describes in his book “Leading from the Emerging Future,” these conditions of death and decay can be found in our separations from one another, from nature, and from ourselves. This loss of connection that leaves us paralyzed, droning on in ignore(ance) of the urgency for our need to respond, drives us deeper into an overwhelming sense of disorienting oppression. I guess what I find myself able to write here is a direct response to that feeling of depression. We, humanity, are not some static and eternal self. We are fleeting construct of the evolutionary mind. We have been shaped by the emotions of our environmental context, and the stories we have told ourselves and one another over time. Humanity today, like all species ever, is a temporary state. That spark of awareness within each of us, that endless well of creative force, the conversation we create in our minds and with one another now, that is the living awareness. That living awareness, both the witness of itself, and the emerging dance of constructs, is the force that meets this evolutionary moment, transcendent, earthly, and powerful, and carries through it our deepest and longest held aspirations for love and care and connection. Love and care and connection, and beauty, and grace, when we can set aside a moment, that identification with a momentary reaction to eternity, these are the things that pour out of us. Really, that was the greater tone of my day today. I don’t know if it was sunny out, not because I was depressed and turned inward, but in fact because I was engaged and focused on love and care and connection and beauty and grace. Caitlin, making accommodations for our brother Greg who is still healing from his cold, rose early today after a late night to come to my service. We stirred around 7:30 this morning and like the loving trooper that she is, she came and got me up, fed me breakfast with a smile, a loving caress, and her bright mind. She left me to my weekly review of tasks and projects and the energy of getting organized. I ran payroll for my care team, a simple clerical errand online that always refreshes my sense of gratitude. I turned my attention to reading, a regular part of my Sunday routine – today, a story of one of my favorite Tibetan figures, an article from Dave about the importance of wisdom for treating loneliness in senior living facilities, (I queued that for later study, and also queued the Musing Mind podcast as a possible future engagement before moving on), I read a moving article from my friend Spring, and an exquisite poem from her friend (which I immediately added to my list of random email signatures.) Fresh with the nutrients of new insight, I turned my attention to the other sacred Sunday activity – that of clearing my inbox of informal and friendly correspondence. I learned of the passing of basketball star, Kobe Bryant — the fourth and least personal death to which I’ve been exposed in the last 48 hours. I was reminded of this special Internet phenomenon by an email shared in memory of one of those passed, and was introduced to this ancient wanderer. I was privileged to read the words and correspond with not fewer than 10 really wonderful people who have come through my life at one point or another. It was from that wellspring of love and care and connection and beauty and grace that I moved into position under the weight of the world. I am further along now the task of finding my way to a better understanding and greater capacity to move gracefully into a formal care facility if that is to be my next home. It is in no small part thanks to the encouraging words of my friend Dave, and the connection to that community of friends who managed to find their way into my inbox, text threads, and memories, that I have the strength to meet these uncertain and challenging tasks. It is in no small part thanks to the grace of having received the teachings of meditation that I can find within myself that profound well of creative source to walk through the wilderness of our human illusion, and bring forth an offering of love and care in connection to you dear friend, wherever you are. I have run long today, thank you for your attention if you have made it this far.
https://www.kabirkadre.com/grace-in-the-face-of-oppression/
Each of us, whether biologically male or female, has a choice about the extent to which they express empowering feminine qualities. Sadly, for many of us, feminine qualities have been derogated. As a result, we have diminished their importance in our lives and even repressed them. This means that we cannot give them full expression, which undermines our ability to reach our potential. We may not even consciously realize that this has occurred. But balanced incorporation of both masculine and feminine qualities is key to full engagement in life. Consider the following seven empowering feminine qualities, and how they are expressed in your life. Do they enrich your experience or are they showing up with dysfunction? 1) Consort: This quality shows up in the archetypes of the dancer, virgin, or concubine. Those who emulate beauty for beauty’s sake. It pertains to decoration, grace, and vulnerability. It is the extent to which you can trust enough to be tender, delicate, and allowing. This yang feminine energy is defined by appreciation and the state of being responsive and yielding. The yin masculine qualities of assertion and initiation provide balance. In its detriment, innocent appreciation and sharing of beauty are lost and manipulation occurs. When you are sensitive to this exchange, a true partnership can be achieved. 2) Creator: The ultimate archetypal expression is motherhood, but it includes the artist and the innovator. It comprises the journey itself to birth, the inspiration, and incubation. And as well, the laboring process of exploration, composition, and discovery. The end product is appreciated for what it is. This is in contrast to the more masculine qualities of goal attainment, destination, or ambition. Providing space for creation adds richness to life that is lost when focusing on the outcome alone. In its fall, the individual becomes a slave to their passion and over-attached to what is created. The benefit of synchronizing with this genesis is that it allows you to live in the moment. 3) Intuit: This is epitomized by the archetype of priestess, shaman, or seer. These are people who are sensitive and attuned to the flow of the path. Others operate more through masculine logical and analytical outcomes. It is an exploration of the vibrations of spirit. In its fall, disconnect from this internal wisdom means that we live out of alignment with the flow of life without connecting with fateful experiences and encounters that are meant to be. This empowering feminine gift is a greater connection to innate inner wisdom. 4) Nurturer: The many forms of nourishment are epitomized by roles such as a nurse, teacher, caretaker, or homemaker. It incorporates sustenance and warm succor. This is in juxtaposition to the masculine drive for resources. It brings an authoritative knowing and patience for what is needed to best support and guide another’s development and to give life. In its fall, this becomes autocratic. Another danger is that the process is externalized such that we excel at applying these elements for others and are not so good at using them for ourselves. The blessing bestowed is that of feeling loved. 5) Connector: This ability is demonstrated by matchmakers and team leaders. Those who can inspire in such a way that the whole becomes more than a sum of the parts. There is the gift of relating, and being part of a network, or social hub. The connection comes from cooperation and community. This is in balance with more masculine stoic competition and stark independence. In its fall, it is dependence stemming from fear or targeted toward personal gain rather than the benefit of the whole. This shows up in the banal triviality of gossiping or manipulation. The blessing it bestows is the ability to witness that all is one. 6) Emphatic: This empowering feminine quality shows up commonly in healing professions such as dentistry, veterinary, therapy or medical practice. Support is provided through an ability to relate without judgment, to share compassion and understanding without requiring something in return. It includes giving through providing receptive space and presence which contrasts with masculine rationality. In its fall, it shifts to martyrdom and demand for something in return for purported sacrifice. Another risk is over-emotionality. The advantage is the deep purpose that making a difference on a human level provides. 7) Empress: This is seen in the role of queen and matriarch. It comprises steadfastness and collective unyielding resistance. This is in contrast to masculine direct physical aggression and individual adventure. It is a force of nature that can appear dispassionate, but the emotional connection to a people actually provides the strength for what needs to be done. In its fall, there might be resistance to new ideas and change, or mistakenly standing for things that do not benefit the generation. The gift here is the leadership that can be relied upon. The empowering feminine qualities associated with the Consort, the Creator, the Intuit, the Nurturer, the Connector, the Emphatic, and the Empress are essential to our quality of life. When masculine is emphasized output dominates. However, taking the time to express elements from these empowering feminine qualities reconnects us with life itself.
http://myspirecoaching.com/blog/empowering-feminine-qualities/
Living in sacred connection is living in connection with the flow of love, with the healing life-force in our hearts. When we meet life from this fullness and openness of heart a sacred connection occurs with another and nature. We trust our inner guidance, we trust life and we let life live through us. We are guided by the beauty of what we deeply love and cherish. What has disconnected us from living from a deep trust, openness, love and gratitude and inner connection? What has cut us off from the healing life-force in our hearts? What are the obstacles to love? The answer is pain and our responses to pain. When we first identified ourselves with a painful feeling or an experience we began to cut ourselves off from the flow of love; we began to experience ourselves as separate and began to develop our protective mechanism to keep us from feeling pain. When we are in pain, we are cut off from our source, from the flow of love and we feel we need to protect and defend ourselves. Through the repetition of painful experiences we took on certain self-sabotaging beliefs that shape our lives, our hearts, the way life-force flows through us and the way we experience our every moment. There comes a moment when being lived by our protective mechanisms and compensatory identities is more painful than to let in the experience of our unveiled, unprocessed grief into our heart. We find ourselves in a place where the desire for freedom, healing and deep love is greater than the fear of our own grief. That moment is a blessing and the beginning of healing our lives. Once we allow ourselves to feel the grief that began at the moment we lost connection with our essential nature, with our original innocence, we are opening the bridge back to our wholeness and to the sacred connection with ourselves, with another, with the source. The moment we allow ourselves to feel our unveiled, naked, direct experience and meet it with unconditional presence healing begins. The deep ancient holding in our heart and body begins to dissipate as our grief is felt, given space to be, digested and integrated. It is like a wave of energy that needs to be simply run through us. Our unfelt grievances are like veils obstructing our radiant true nature, our radiant open heart. They make us forget who we are as they make us feel small, inadequate, unlovable, unsupported, separate, isolated, abandoned, unworthy, guilty, ashamed, not enough, to mention a few. By giving permission and space to the arrested moments from the past, to the heart movements that never were allowed, we are freeing the stuck energy and reclaiming our life energy. We are reclaiming pieces of self into the whole. Often the cognitive part of us has understanding, yet the tissues of our body have not yet released the charge of a painful experience. As we fully contact the body sensations and feelings in the present moment we are able to open into new possibilities. The healing reveals itself as we are able to stay with our experience in its unmediated arising. Falling deeper into our own ground of being, uncovering our inner resources, allows us to meet everything and anything and transmute it back into love. In its essence our heart only longs to return to its own wholeness, to its own original innocence. Safe and clear container allows the heart and the body to release the old holding, open into deeper tenderness and love. We offer them an experience that was missing in the first place, that was the primary cause and condition that created the structures of defense and protection in order to not feel the devastation, the abandonment, the loss and the rejection. Our self-sabotaging beliefs gradually dismantle through a new felt-sense experience of love, of one’s sacredness. A newly discovered sacred connection within ourselves has potency to soften and release our original coping mechanisms and trauma imprints opening space to radical forgiveness and healing. Healing is a journey back into our sacred connection, it is a journey from defended into undefended living, freeing ourselves from conditioned ways of being and opening space to respond to life with love and allow deeper guidance to enter our heart. Our pain becomes a sacred wound that is the gateway to healing. As we release our past and reconnect to the flow of love inside of our heart, we reconnect the body with the spirit in the here and now. We re-member our own true nature and expand our heart’s capacity to love and be loved. Every moment is calling the heart to open, to soften its edges and let love be known, shared, exchanged in sacred communion. As we lean into the unknown, we catch the glimpses of the Great Mystery in its pure unfolding. Through the reconnection of spirit and body we rest in our fundamental goodness, knowing Love in our inner most being. We are in direct contact with the sacred, with the essential beauty of all existence. As our inner being begins to thrive, our relationships and our whole life thrive as well. The essence of existence, love, moves us into deeper understanding, compassion and peace. The more we live in sacred connection, life becomes a constant invitation to expand beyond self-imposed limitations and to follow the divine inspiration and unfold in our own myth. We simply rest in eternal embrace of love, we rest in the intimacy of hearts open. The seeking ceases, we are home.
http://www.fully-alive.net/living-in-sacred-connection/
Benna Holden is a New York City-based artist with a passion for Abstract Expressionism. Drawing inspiration from her surroundings and emotions, Benna's work is a reflection of the connection between nature and spirit. Rather than re-create a landscape on a canvas, she aims to express its essence. By deconstructing and transforming nature, Benna creates uncluttered, pastoral images to inspire wonder and contemplation. Her bold use of color and texture vibrates with a tactile motion and energy that allows viewers to cast their own imagination and be transfixed by its impression. Benna's practice of making these paintings arises out of a desire to achieve peace and simplicity in her life. She is drawn to the meditative effect the beach horizon gives her and the feeling that she is part of something greater than herself. As a master of abstract seascapes, Benna captures the ceaseless beauty of the shoreline. "Water is the most powerful force on Earth because it is the essence of life. It can humble us in the wake of a storm, provide us with endless energy and is necessary for our survival." Benna studied at the Art Students League in New York and her work is owned by public and private collectors throughout the United States.
https://art-section.com/benna-holden/
Artist Leanne Hamilton’s paintings are alive with the beauty and flowing gracefulness of undersea flora and fauna. Visit her website to see more. In my Abundance series I am focusing on the opulence of nature—the outrageous beauty in color and texture of the natural underwater world. For this series, I drew my inspiration from our local aquarium, but also from my outdoor goldfish pond. The compositions are about movement and flow of fish, water and sometimes kelp. The feng shui principle of flow and movement, as opposed to stagnation, is thought to encourage abundance energies to be drawn into your space, and I felt this connection with the fish. Previous bodies of work have focused on birds in flight, balloons or butterflies. My interests vary with time, and without warning. I find I change subject and interest or come back to a familiar subject in a new way. I have, however, always preferred the natural world in its various forms as my starting point. I derive great energy from nature; it is a constant, daily source of rejuvenation and inspiration for me. Having said that, I do not paint directly from life as I once did. I now prefer to construct my own reality with little attempt to paint it as it is. I use my own photographic reference material (often a handful of photographs from the same or unrelated scenes) to assemble an image to my liking. I construct my painting to express the energy I am trying to convey. I often incorporate floating subjects, such as birds soaring over a landscape, butterflies leaving a tree en masse, or a cluster of balloons approaching the sun. These are things I construct into my interpreted reality. I create my Abundance series on large square or vertically orientated canvases, 5 feet high by 3 feet wide. This is a common landscape orientation in many eastern cultures, and it allows me to create a sense of depth by keeping the lower half of the canvas dark and the upper half light, like sunlight hitting the top of the water. I focus on the play of light and how the colors change with light. The brushwork is alla prima as this gives it great energy and visual interest close up as well as compositional impact from afar. My initial inspiration and creative drive come from my meditations and spiritual life. I have come to see the various floating or swimming elements in my work as often representing the energy signature of a landscape, or the feeling I have about it. I do not just paint a series of rolling hills to view, but also the soaring birds above it. The birds convey the uplifting feeling, the healing or an impending change as the case may be. In my Abundance series the smooth sailing fish in their beautifully abundant environment make me feel serene and beautifully cared for. It’s my hope that these energies are expressed to the viewer and that they can experience it, too. Artist Leanne Hamilton invites you to follow her on Facebook and Instagram.
https://www.artsyshark.com/2018/09/10/featured-artist-leanne-hamilton/
Although religion can be a positive resource for some, there are times when religious coping can be ineffective. For Hindus, a first potential challenge may be the feeling of passivity or fatalism that may arise because of karma (karma = the principle that determines the unfolding of events, based on how a person has lived). A patient can feel hopeless or unable to change things because he feels that things are fixed by karma. Acceptance can be misunderstood as passivity. Hindu traditions do advise a focus on appropriate action, rather than outcome, but this doesn’t mean inaction, “avoid attachment to inaction.” People with pain can be encouraged to actively manage their pain and continue to seek improvement, but become detached from the outcome of these efforts. Lastly, there can be a risk of feeling that one is failing the test of pain and suffering, that one isn’t succeeding in achieving an even disposition. However, the religious practices of Hindus teach trying one’s best. Detachment can even be sought from the degree one achieves detachment; that is, a person can attempt to be less concerned about his success or failure to be detached. The process of trying is important, rather than a focus on a final goal of being detached. Patience with oneself is encouraged. Patients can also try to learn as much as possible from their current situation, including their apparent failures. It would be important to note that any one Hindu may be at any stage of spiritual growth with respect to viewing her physical pain and suffering as Hindu traditions teach. A person may or may not even be using his religious resources for support to cope with pain. The level of religious coping may change across time, for example, as aspects of a person’s illness change, including severity of pain, and as the availability of other resources changes. As in any religion, there would probably be only a small minority of Hindus who wouldn’t struggle with some aspect of their experience of pain or for whom acceptance is easy and unchanging; however, many strive to be faithful to their own religious tradition.
http://www.howtocopewithpain.org/blog/92/what-hinduism-can-offer-to-help-with-your-pain-part-4/
Horses are always seen as a symbol of freedom. Their beauty, strength and elegance are seen as a source of inspiration, especially for those who seek strength within themselves. However, we should note that the horses are also sensitive, as if they could feel everything around them. Therefore, when riding, try to be aware of the wind in your face and the nature around you. Connecting to yourself will give you the feeling you are free!
https://www.colouredbrush.com/horses
- This event has passed. Regional Training on “Indigenous Peoples’ Self-government and Democracy” November 8 @ 10:00 am - November 18 @ 5:00 pm BMT Course Content 1. Self-reflection (Where are we coming from? Where are we now? Where are we leading to and predicting our future? – understanding our past, present situation and future.) 2. Learning about concept and idea of “Indigenous Self-government and Democracy” (Self-determination, Autonomy, Self-government/Self-governance, Pluralism, Federalism, Subsidiarity, Liberal-democratic governance, Communitarian Governance, Party Politics and Indigenous Peoples in Mainstream Politics etc.) 3. Identifying grounding values and guiding principles of Indigenous Self-government 4. Deepening the understanding (reading and discussing the case studies, joint exercise: applying assessment criteria to case studies. 5. Re-assessment (re-assessing the situation using new concepts, ideas, innovations and criteria for good self-government) 6. Envisioning our future (what we want? How could the self-determination of our peoples and communities look like? 7. Assessing possibilities for change. How can this be achieved: developing a strategy)?
https://aippnet.org/event/regional-training-indigenous-peoples-self-government-democracy/
26836 Indigenous Nation Building & Governance3cp There are course requisites for this subject. See access conditions. Postgraduate Description This subject examines the development challenges faced by contemporary Indigenous nations throughout the world. The subject is built upon extensive North American and Australian research that finds that political self-governance is a more important factor to Indigenous nations being able to achieve their economic and community development goals than any other factor. Indigenous nations or communities working to put in place the necessary institutional and strategic foundations to achieve sustainable self-governance – nations that are Indigenous nation building (or rebuilding) – are those able to achieve their self-determined goals. Using case studies and research from Australia and North America on what is working and what is not working to promote the social, political, cultural and economic strengthening of Indigenous nations, this subject reviews Indigenous nation building (INB) and the challenges it faces in Australia. Students engage with leading Australian and international Indigenous nation building theorists and Indigenous community practitioners to explore Indigenous nation building as a governance and community planning tool for Aboriginal and Torres Strait Islander nations and communities. Detailed subject description.
https://handbook.uts.edu.au/subjects/26836.html
The Indigenous Nationhood Movement is a peoples’ movement for Indigenous nationhood, resurgence, and decolonization. We are a vast circle of people connected through commitments to principled action supporting Indigenous nations in advancing and asserting our nationhood, raising up traditional governments, and reclaiming and reoccupying our homelands. The circle is open to everyone: we are not a political organization, group, or political party—and we are not affiliated with any such groups. We honour and respect the diversity of our nations, laws, governance structures and autonomy, and we invite all people to join in building collective power in our communities. All proceeds from the sale of INM t-shirts will go to supporting INM campaigns, community actions, and restocking t-shirts and merchandise.
https://indigenousnationhoodmovement.bigcartel.com/about
Special Issue on Judicial Self-Governance in Europe The last issue of volume 19 is devoted to the topic of judicial self-governance in Europe. Under the auspices of our very own inimitable David Kosař – who has assembled a fantastic crew of scholars – we present to you no less than twenty papers that will redefine this highly topical and under-researched topic. Together, these papers challenge traditional paradigms, open new horizons, and provide a significant contribution to the fields of comparative public law and judicial studies. It will no doubt become the point of reference for students of judicial self-governance in decades to come. While the unprecedented rise of the decision-making power of courts has been exhaustively addressed, the increasing power of judges to run their own affairs, that is, the rise of judicial self-governance, has attracted far less attention so far. In Europe, bodies such as the Venice Commission, the European Network of Councils for the Judiciary, the Consultative Council of European Judges as well as the European Commission issue guidelines and develop good practices regarding judicial councils. Even both European transnational courts have started to engage with domestic judicial design. The CJEU made a huge leap into this area in the Portuguese Judges case (Associação Sindical dos Juízes Portugueses) and, after the Celmer prequel, virtually every EU law scholar is now awaiting the CJEU’s judgments concerning the controversial Polish judicial reforms. The ECtHR has judicialized domestic judicial politics quite some time ago, but the recent two Grand Chamber judgments in Denisov v. Ukraine and Ramos Nunes de Carvalho e Sá v Portugal have raised the stakes to a whole new level. Legal scholars have been somewhat lagging behind these developments. This special issue fills this gap. It provides a thorough understanding of the nature, scope and impact of judicial self-governance in 14 European jurisdictions (CJEU, Czechia, ECtHR, France, Germany, Ireland, Italy, the Netherlands, Poland, Romania, Slovakia, Slovenia, Spain, and Turkey) as well as five horizontal articles that address cross-cutting questions. The guest editor David Kosař opens the special issue by presenting the questions that undergird the whole special issue. He demonstrates that, despite significant efforts by transnational bodies, both the forms and rationales of judicial self-governance vary significantly across Europe. This variety, in fact, informs the way in which this special issue groups together different countries. Our first stop is the countries that can be considered the early-birds of judicial self-governance – France, Italy and Turkey. Antoine Vauchez carefully traces down how judicial self-governance fares in the country where the fear of the “gouvernement des juges” has haunted the political imaginary for more than two centuries. Simone Benvenuti and Davide Paris show how Consiglio Superiore della Magistratura, arguably the best Italian institutional export product, operates in its original setting. They argue that the success of the Italian High Council of the Judiciary has depended on many endogenous and exogenous factors. Başak Çalı and Betül Durmuş provide a fascinating account of the development of judicial self-governance in Turkey, which experimented with many diverse forms of judicial governance as part of a larger trajectory of constitutional politics. Most Central and Eastern European countries have a more recent history with judicial councils, having established them during the accession process to the European Union. Both Slovakia and Romania are prime examples that followed closely the Euro-Model of judicial council, advocated by the European Commission and the Council of Europe. However, each of these two countries has struggled to cope with the new model. Bianca Selejan-Gutan explains that the Superior Council of Magistracy strengthened corporatist features of the Romanian judiciary. Samuel Spáč, Katarína Šipulová and Marína Urbániková argue that, with help of politicians, judges used their powers to capture the Judicial Council of the Slovak Republic. The next group of cases covers jurisdictions that have recently moved from the traditional model of judicial governance with the central role of the Ministry of Justice, but have not embraced the idea of a strong judicial council based on the Euro-template. Aida Torres Pérez shows how the selection of judicial members of the General Council of the Judiciary by politicians contributes to the politicization of the Spanish judiciary. Elaine Mak explains how the new public management theories of governance transformed the Dutch judiciary institutionally as well as mentally. But these transformations are incomparable to the frontal assault on the judicial branch and the judicial self-governance in Poland, as Anna Śledzińska-Simon attests. The 2017 package of judicial reforms pushed by the Law and Justice Party through Sejm not only altered the mode of electing its judicial members of the National Council of the Judiciary, but also concentrated the power over the judiciary in the hands of the executive branch. The remaining two jurisdictions in this group show that in smaller countries personal relations and informal networks play a more important role than the institutional design. Patrick O’Brien argues that judicial independence and judicial self-governance in Ireland depend on the support of politicians and a culture of mutual respect. Matej Avbelj demonstrates how the remnants of the communist totalitarian past and the dense formal and informal networks in a relatively small Slovenian legal and political community have been used to manipulate the legal system of judicial self-governance. The remaining two domestic jurisdictions represent the “black sheep” that have so far resisted the introduction of any form of a judicial council. But contrary to general wisdom, both Germany and Czechia show significant structures of judicial self-governance. Fabian Wittreck rebuts the myth that Germany is a persistent objector to judicial self-governance. while Adam Blisa, Tereza Papoušková and Marína Urbániková argue that judicial self-governance cannot be conflated with judicial councils as Czech judges have increasingly found ways to have a say in many issues of judicial governance. Finally, this special issue analyses judicial self-governance beyond the state. Başak Çalı and Stewart Cunningham show that the scope of judicial self-governance at the ECtHR is highly variable. While the current practices of judicial self-governance promote legitimacy and judicial independence, they are weaker in fostering transparency and accountability. Christoph Krenn traces the development of the governance model of the Court of Justice of the European Union, which builds heavily on the International Court of Justice template. He argues that this has led to communal judicial self-governance, which has fostered professionalism and strengthened loyalty of the CJEU’s judges and advocates general towards the institution. And as if that’s not enough, the last few papers of this special issue cover horizontal questions that run throughout the contributions from the different jurisdictions. Adam Blisa and David Kosař argue that court presidents are a missing piece in judicial governance. They conceptualize the powers of court presidents, create the Court Presidents Power Index, and identify the contingent circumstances that affect to what extent court presidents may exploit their powers in practice. Samuel Spáč focuses on the selection of judges in the age of judicial self-governance and tracks the increasing involvement of judges in selecting their peers. Katarína Šipulová and Marína Urbániková draw a novel concept map of factors influencing public confidence in the judiciary and offer a unique view on the relationship between judicial councils and the level of public confidence in courts. Hubert Smekal and Nino Tsereteli draw attention to judicial self-governance at international courts and provide a unique analysis of selection, promotion and removal of international court judges. Finally, Shai Dothan moves from the institutional design issues to the actual behavior of judges on the international bench. Building on insights from the judicial behavior literature he analyses how international judges act together as a group.
http://www.germanlawjournal.com/special-issue
Acknowledging Indigenous Laws and Legal Orders Indigenous laws and legal orders are the first original laws of the land we now call "Canada" and have been in existence since time immemorial. However, the imposition of western colonial law(s), legal systems and policies upon Indigenous Peoples and Nations has had significant impact upon our ability to govern, maintain peace and social order within Indigenous societies. Indigenous governance structures are based in ceremonial lodges and spiritual laws stemming from the connection Indigenous Peoples have with the land. The banning of ceremonies under early Canadian legislation such as the 1884 Indian Act interrupted the transmission of Indigenous laws and legal orders to people within Indigenous Nations. This disruption of Indigenous governance structures can be seen in the inter-generational traumas of addictions, mental health and health issues that Indigenous peoples are encountering in their communities, in their over-representation in the criminal justice system and in the high percentage of Indigenous children in care. Discourse on Indigenous legal orders are beginning to make their way into law schools, law practice(s) and the courts, which is helpful in facilitating discussion on a meaningful Nation to Nation relationship. It should be pointed out that Indigenous laws and legal orders are separate and distinct from common and civil law traditions that are taught in university law schools. I would even go so far as to say that Indigenous law is distinguishable from "Aboriginal Law" which is the source of law derived through the courts' interpretation of colonial legal instruments under common and civil law such as The Royal Proclamation of 1763, the British North American Act and the Canadian Constitution as they relate to "Aboriginal" people. Towards the end of my legal studies, the concept of 'Indigenous laws and legal orders' started to gain traction within the law school and legal practice environment. Fortunately, this discourse on Indigenous legal orders is beginning to make its way into more law schools, law practices and the courts, which gives the discussion about 'alternative' Indigenous processes more consideration. The release of the Truth and Reconciliation Commission's Calls to Action in 2015, alongside the Canadian government's endorsement of the United Nations Declaration on the Rights of Indigenous Peoples in 2016 have provided the necessary momentum to begin thinking...
https://ca.vlex.com/vid/envisioning-an-indigenous-jurisdictional-693826173
Worldwide indigenous peoples and ethnic minorities suffer disproportionally from economic, social and political marginalization and human rights violations, including poor access to water and sanitation services. As custodians of fragile marine and terrestrial ecosystems their role in equitable and sustainable water management is essential. Indigenous Peoples Globally indigenous peoples maintain unique social, economic and political systems shaped by languages, cultural practices, religious beliefs and knowledge systems that are distinct to the dominant society. Many indigenous peoples’ determination to sustain and develop their societies as sovereign peoples and long historical connection to specific territories, frequently biodiversity hot-spots, gives them an exceptional position as custodians of some of our most important and fragile ecosystems. Image: Imran Kadir. Goal Both UNDP and SIWI consider the realization of human rights key to a sustainable and equitable allocation, management and use of our global water resources. Given that indigenous peoples are among the politically, socially and economically marginalized groups globally, suffering disproportionately from human rights abuses and poverty, strengthening the knowledge about and position of indigenous peoples in water governance processes is a central goal to the WGF. Historically indigenous peoples have faced systemic discrimination and exclusion from political and economic power, and they continue to face the consequences of this marginalisation. Despite constituting only 5% of the global population indigenous peoples make up 15% of people living in poverty and they disproportionally suffer from illiteracy, disease, infant and maternal mortality and have a shorter life expectancy. Even if accurate data about indigenous peoples’ access to water and sanitation services is scarce, research shows indigenous peoples systematically have lower levels of access than the rest of the population. The absence of systematic information on indigenous peoples’ health, income, and access to services is to a great extent a consequence of many countries refusing to officially recognize their indigenous peoples. But even in countries where they are recognised, indigenous peoples generally face barriers to equal participation in democratic processes and decision-making influencing their lives and livelihoods. As a consequence of lacking understanding and recognition of indigenous peoples’ institutions, governance systems and worldviews water and sanitation have proven to be less effective and sustainable in rural indigenous peoples’ communities. Some of the main challenges have been: - Clashes with cultural preferences and views on health leading to rejection of solutions - Failure to acknowledging local knowledge about environmental conditions causing malfunctioning services - Imposition of new and non-sustainable water governance organisations which become inactive due to lack of legitimacy and capacities - Incomplete infrastructure due to absence of control and monitoring It is estimated that more than 5,000 distinct indigenous peoples remain today, comprising approximately 370 million individuals, living in more than 90 countries and in all inhabited continents. Most of the indigenous peoples live in developing countries, but there are also several peoples in the US, Australia, Canada and New Zealand. As a result of many indigenous peoples’ historical connection to specific territories and that they often maintain lifestyles that to a large extent depend on the local environment they tend to have deep knowledge of the natural resources, including the water resources, in the areas where they live. Complex systems of water harvesting, conservation and management have often been developed in parallel with conflict resolution mechanisms rooted in indigenous peoples’ collective responsibility to protect the water resources for future generations. As indigenous peoples’ relationship to water often is strongly connected to the spiritual world, with water seen as a sentient being, their management systems look to balance immediate and future human needs with those of plants, animals and spirits based on traditional ecological knowledge and principles and practices. By recognising and including indigenous peoples’ knowledge, practices and institutions sustainable and culturally appropriate water services and conservation and management systems can be developed. WGF strives to: - Contribute to the knowledge about the links between indigenous peoples’ rights and sustainable and equitable water governance through applied research - Facilitate dialogues and increase the awareness about indigenous peoples and water by linking actors and building partnerships - Support improved water governance and programming by developing and promoting intercultural approaches - Provide technical support to development actors on the implementation of respectful and inclusive water governance processes. Based on the participatory research of the project Towards Transcultural Transparency, carried out in collaboration with the MDG-F and URACCAN, WGF has formulated recommendations on how rural WASH projects can effectively integrate an intercultural approach with the aim of generating more sustainable and cost-effective sanitation and water services, designed and operated in a way that meets the needs and aspirations of indigenous peoples. The recommendations are currently being brought to test in the GoAL WASH project in Paraguay in collaboration with the Institute for Indigenous Peoples. During 2014 WGF conducted a global mapping of water conflicts between industrial water users and indigenous peoples. The results of the mapping was presented in a World Water Week seminar co-convened with the International Work Group for Indigenous Affairs. Currently cases of successful collaboration between industry and indigenous peoples are being explored. Learn more:
https://www.watergovernance.org/focus-area-post/indigenous-people/
Sweden is seen as a forerunner in environmental and ecological policy. This book examines policies and strategies for ecologically rational governance, and uses the Swedish case study to ask if it is possible to move from a traditional environmental policy to a broad, integrated pursuit of sustainable development, as illustrated through the ‘Sustainable Sweden’ programme. The study begins by looking at the spatial dimensions of ecological governance, and goes on to consider the integration and effectiveness of sustainable development policies. It analyses the tension between democracy and sustainable development, which has a broader relevance beyond the Swedish model, to other nation states as well as the European Union as a whole. You do not have access to this book on JSTOR. Try logging in through your institution for access. Log in to your personal account or through your institution. The (re)discovery of the tragedy of the commons raised a normative question that has haunted students and practitioners of politics ever since: ‘How are we to govern ourselves so as to value democracy and individual autonomy and still retain the integrity of the commons?’The question implies that the latter – interpreted as ecological sustainability – may prove a formidable challenge to presently existing democratic systems of governance. Practical political answers addressing the full spectrum of sustainable development, and in particular its ecological aspects, are now emerging. Sweden provides an interesting case of development from environmental policy towards ecological governance. In his... Space is of central concern to rational ecological governance. Environmental problems and resource management issues cross the man-made scales of local, regional or national governments. The question thus becomes how ‘to negotiate a better fit’ in responding to very complex ecological challenges (Pritchard Jr. et al. 1998: 30 f.). Elinor Ostrom’s answer in her now classicGoverning the Commonsis twofold. The underlying principle in her model of stable, ecosystem-based governance is one of congruence between a natural ecosystem and the unit of governance for that system. Regimes for the use and management of natural resources must thus haveclearly... From the early nineteenth century onwards, the dominant political view of time was one of continuous ‘progress’ with the state at the centre of change (Ekengren 1998: 30). Thislinearconception of time is, however, just one possible view. Political time can also be seen as (series of) distincteventsor as connectedpointsthat have special meaning or importance. One can furthermore view political time ascyclical, with events recurring in a predictable fashion. The budgetary process is a prime example. Governments set strict timetables that bind the procedure step by step, and the organisation level by level, in... Yesterday’s environmental problems were rather tangible in spatial and temporal terms. Often easily detectable causes and effects made them relatively simple to manage. The up-stream polluter could be forced to compensate the down-stream victim. However, the causes and effects of modern environmental problems are increasingly difficult to delimit in time and space. Catchment eutrophication, long-range transport of air pollution, thinning of the ozone layer, and global warming are examples of this growing diffuseness of environmental problems. Resource use decisions are increasingly made under conditions of uncertainty. There is thus a growing need to ground rational ecological governance in scientific knowledge... The first decades of environmental policy in Sweden were characterised by an amalgamation of different governmental units dealing with aspects of the environmental issue into a recognisablesectoralpolicy domain. This was how SEPA came to be a specialised agency, whose mission was to prevent or mitigate the effects on the environment of different socio-economic activities. Top priorities were to clean up and prevent pollution, and help in creating a system of constraints against undue exploitation of valuable natural environments. The guiding normative principle was one of ‘balancing interests’; the environment was seen as one societal interest that should be... As pointed out in Chapter 1, this book builds on the normative argument that ecologically rational governance must strive for sustainabilitywithinthe limits set by democracy and individual autonomy. The relationship among these values is quite complex. On the one hand, effective and in the longer term successful ecological governance relies on quite radical changes in present values and behaviour in the direction of substantial restrictions on individual autonomy of choice. This could be used as an argument for constraints on democratic participation in order to prevent political conflicts and ease the introduction and implementation of radical measures (see... The preceding chapters analysed what Sweden has done, and how far that country has come, in creating structures and processes of governance for the sustainability of the commons and the autonomy of the individual within the limits of democracy. One conclusion is that while the logic of ecological rationality may seem attractive in terms of sustainability and autonomy when laid out as an ideal type, its practical implementation will most certainly involve conflicts and compromises on both accounts. Compared to historic patterns of resource management and behaviour, ecological governance for sustainability implies ‘winners’ and ‘losers’ in terms of individual autonomy... At the heart of this study of Sweden and its efforts to create structures and processes for ecologically rational governance has been the political dilemma posed by sustainable development. Taking as my point of departure the normative question of ‘How are we to govern ourselves so as to value democracy and individual autonomy and still retain the integrity of the commons?’ and by measuring the empirical evidence of Sweden’s ecological reforms against several criteria for rationally ecological governance, I have sought to answer the following question:To what extent do policy measures taken in Sweden to achieve ecologically sustainable development... Processing your request...
http://slave2.omega.jstor.org/stable/j.ctt155j62b
I specialize in providing policy development, governance and dispute resolution services to Indigenous peoples, communities and Nations. About the Mediator As Vice President of Castlemain's Governance & Policy practice area, I assist Indigenous communities and Nation to manage complex decision-making processes and develop the necessary policies and tools that support proactive, coordinated and effective governance. This work has included supporting large scale decision-making processes that advance self-governance and self-determination, to designing and implementing community engagement processes that reduce conflict around key issues within communities. I am proud to have partnered with dozens of communities across Canada to advance their policy and Nation-building goals. Prior to joining Castlemain in 2012, I worked as an Evaluation Analyst at Indigenous and Northern Affairs Canada where I supported departmental evaluations of policies related to comprehensive lands claims and self-government agreements. In addition to my work with Indigenous communities, I have experience mediating civil disputes including small claims and employment matters. I hold a BA in Political Science from the University of British Columbia and a MA in Dispute Resolution from the University of Victoria.
https://www.mediatebc.com/find-a-mediator/civil-roster/297
This article argues that there needs to be a conceptual shift in how we understand the constitutional framework of government in Australia. Fundamental to this shift is an understanding that Indigenous governance exists and is practiced at various levels in the Australian polity, and that the formal institutions of the Australian state already accommodate Indigenous governance in various forms, albeit implicitly. Australia’s experience of federalism means that it is well placed to make this shift in understanding. The shift must occur as Commonwealth and state Indigenous policies are, ultimately, only as strong as the framework of governance that supports them. In 2005, the Federal Government implemented a new Indigenous policy, abolishing the Aboriginal and Torres Strait Islander Commission (hereafter ATSIC), and transferring to mainstream government departments the responsibility for the delivery of services to Indigenous communities. The Aboriginal and Torres Strait Islander Commission Act 1989 (Cth) (hereafter ATSIC Act) established an Indigenous governance structure through which Indigenous representatives played a key role in Commonwealth Government decisions about service delivery and resource allocation to Indigenous communities. ATSIC was made up of national and regional representatives chosen through a system of elections. This organisational structure was an express recognition that decision-making about government services to communities required the involvement of Indigenous peoples at the highest levels. The current policy abolishes this system of representation and avoids any mention of Indigenous governance. Instead, the current policy follows the Federal Government’s guiding principle of ‘practical reconciliation’, which advocates a focus on practical measures to alleviate Indigenous disadvantage. The article argues that to achieve practical results, government policies must consider how best to facilitate the inevitable exercise of Indigenous governance at the national, regional and local levels. ATSIC was one attempt at such facilitation. In the face of the abolition of ATSIC, this article draws attention to the continuing importance of Indigenous governance in Australia’s constitutional framework. The article emphasises a distinction between the formal constitutional arrangements for government and their practical implementation. The distinction is captured, broadly, in the difference between government and governance. The article does not focus on the need for a formal recognition of Indigenous government within the Constitution, although this may be an important part of any strategy to ensure Indigenous governance is properly accounted for in government law and policy. Instead, the article makes a case for law makers to recognise that Indigenous governance is already a constitutional reality in Australia and, as such, that it must be accounted for in developing laws to protect and maintain Indigenous social, cultural, and political rights. The argument is based on a broad concept of Australia’s constitutional framework. It is concerned with how the relationships between groups and institutions operate within the laws of the nation, and not only how the Commonwealth Constitution implements a formal framework for those laws. The article draws on two theoretical arguments and one practical argument to substantiate the claim that Indigenous governance needs to be taken seriously as a part of the constitutional framework of the Australian state. First, the article draws on the theory of legal pluralism. Legal pluralism rejects the formal hierarchy of legal relations derived from a single authority. As a theoretical approach to the place of law in society, it focuses on the practical reality that society is constituted of co-existing communities with allegiances to laws other than those of the central government. It argues for the formal legal system to reflect the normative relations that develop in the interaction of the different laws, customs and systems of governing of these communities. Second, the article argues that the political legitimacy of the society as a whole is enhanced when the political integrity of different social groups within the society is recognised. The article draws on a strand of liberal and communitarian philosophy, which makes the case for formally recognising community, as well as individual interests in the political framework of the state. Third, the article accepts that, in practical terms, supporting the governance mechanisms of different groups in society is, in itself, a measure to improve the social and economic conditions of those groups. This was a key finding of the Harvard Project on American Indian Development which identified the quality of governance structures as one of the key indicators for successful development and economic well-being within Indigenous communities. In Part 2, the article explains the concept of ‘Indigenous governance’ as it is used in the article, and how the treatment of Indigenous governance differs from the work of others writing on Indigenous rights. In particular, it explains how the focus on ‘governance’ differs from a focus on sovereignty, self-government and self-determination. In Part 3, the article discusses how Indigenous governance relates to the concept of federalism, which is a mechanism for sharing political power already recognised in the Australian Constitution. In Part 4, the article demonstrates how Indigenous governance is already an important consideration, albeit implicitly, in the development of government law and policy, and in the determination of Australia’s formal legal framework in the courts. The problem is that recognition occurs only in response to specific claims or when the formal constitutional arrangements fail to achieve the desired recognition of Indigenous rights. In Part 5, the article describes the theoretical case for formal recognition of Indigenous governance, drawing on theorists from political liberalism. In Part 6, the article identifies key issues for which the state must take some responsibility to ensure the effective exercise of Indigenous governance; namely, processes for determining membership of Indigenous communities, mechanisms for resolving disputes within Indigenous communities, and adequate control of resources. In defining Indigenous governance, ‘governance’ needs to be distinguished from ‘government’. Etymologically, governance and government come from the Greek verb ‘to pilot or steer’, and both terms refer to systems of organisation. Government, as I use it, refers to official institutions established under the Constitution of the nation. Governance has broader connotations. Michel Foucault described governance as ‘the conduct of conduct’. Mitchell Dean has interpreted this to be describing ‘the more or less deliberate attempts by all sorts of bodies and actors to shape the behaviour of themselves and others in complex ways’. In the context of theories of third world development, Göran Hydén provides a similar definition for governance, focusing on control over the making of political rules: ‘governance is the stewardship of formal and informal political rules of the game. Governance refers to those measures that involve setting the rules for the exercise of power and settling conflicts over such rules’. As such, governance can be applied to the regulation of a wide range of entities, including countries, organisations, communities and even individuals, as is evident in its use in ‘self-governance’, ‘community governance’, ‘corporate governance’ and ‘global governance’. In a study of the many uses of the term ‘governance’, Anne Kjaer has noted that common to all uses of governance is a ‘focus on institutions and institutional change’. One of the attractions of the concept of ‘governance’ in the context of Indigenous political rights is that its distinction from government in itself suggests a concern with institutional change, and with improving the accountability of mainstream government through a broader focus on its interactions with social and cultural communities as autonomous political entities. Jan Kooiman usefully divides governance into three modes: self-governance, co-governance and hierarchical governance. Self-governance is ‘the capacity of social entities to govern themselves autonomously’. Co-governance means utilising organised forms of interactions, such as collaboration and co-ordination, for governing purposes. Hierarchical governance is bureaucratic government with control coming from the top. Indigenous governance relates particularly to the first two modes of governance. In terms of self-governance, the primary questions in relation to Indigenous governance are how can, and how should, the state facilitate the autonomy and effectiveness of Indigenous governance in the relationship between Indigenous communities and mainstream government? Co-governance is reflected in some of the mechanisms for the interaction between Indigenous communities and the state such as, in the native title context, Indigenous Land Use Agreements (ILUAs). Paul McHugh describes the emergence of Indigenous governance as a stage in the development of Indigenous claims against the state in common law countries. The 1970s and 1980s were times in which Indigenous rights were established, and the 1990s was a time when common law countries had to determine what these new rights meant for Indigenous self-determination. McHugh states that the concept of ‘governance’ has generally been limited to describing processes internal to Indigenous communities and, in particular, how they managed their new rights for themselves. Diane Smith suggests that governance has a wider role than that attributed to it by McHugh. She points out that since the 1980s when the term first emerged, it has been transferred into bureaucratic thinking and government policy making without a clear articulation of its meaning. According to Smith, ‘governance’ has also been incorporated into the Indigenous policy agenda, taking a place alongside ‘self-determination’, ‘self-government’ and ‘sovereignty’. Evidently, ‘governance’ is a term employed in many different ways and there is no consensus on its scope when employed to describe the political aspirations of Indigenous Australians. In this article, Indigenous governance is used to refer to the decisions Indigenous communities make individually or collectively about how they might govern themselves regardless of their formal rights. Indigenous governance describes the way Indigenous peoples observe and practice their own laws independently of any obligations they have under mainstream law. It is also about how Indigenous people negotiate the intersection of their own laws and the rights and obligations they have under the central legal system. So defined, the article suggests that Indigenous governance has been a live constitutional issue from the time of first European settlement in Australia. At the same time, the article dissociates governance from the concepts of ‘self-government’, ‘selfdetermination’ and ‘sovereignty’ on the basis that its existence and scope is not dependent on the attribution of formal legal or constitutional rights. These simple ideas about Indigenous governance harbour enormous variations when applied to the circumstances of Indigenous communities as a result of differences in geography, culture, demography, and the socio-economic position of these communities. This article does not address these complexities in the application of the concept. It is pitched at a more abstract level, making a case for rethinking the institutions of the state and their practical operation. One of the difficulties of any academic writing on Indigenous political rights is whether or not the existence of autonomous self-governing Indigenous communities can be assumed or needs to be established. From an Indigenous perspective, the existence of separate Indigenous societies is, of course, selfevident. From a non-Indigenous perspective, the existence of a separate society is a matter of definition to be established against a set of criteria. In writing about Indigenous governance, the statements of Indigenous peoples as to who they are, what are their laws and where is their country can either be accepted at face value, and the consideration of Indigenous governance move to the structural requirements for the successful co-existence of Indigenous and non-Indigenous peoples; or there can be an attempt to understand Indigenous governance from a non-Indigenous perspective to aid interaction between Indigenous and non-Indigenous peoples. In line with the latter approach the Centre for Aboriginal Economic Policy Research (hereafter CAEPR) currently has a major research project examining Indigenous community governance. The project is an ambitious attempt to establish a clear concept of governance, and to understand Indigenous community organisation and law in terms of governance. The danger of such a project is that to define Indigenous governance may be to impose external criteria on the nature of Indigenous society, and thus to limit Indigenous control over issues of governance. There may also be a danger, from a political perspective, that non-Indigenous research into Indigenous governance is viewed as a form of verification of Indigenous governance. As I discuss in Part 4, Aboriginal identity and corresponding claims to self-governance must necessarily be self-determined. The state has no role in establishing the criteria for judging the existence of Indigenous societies. The article acknowledges, however, that the state has a role in assisting Indigenous people to establish the mechanisms for determining disputes between themselves and mechanisms to assist their interactions with others. It is for this purpose that non-Indigenous research and government inquiries into Indigenous governance and customary law are of importance. The focus on the formal recognition of Indigenous rights through the courts has meant that ‘sovereignty’ and ‘self-determination’ are the terms most commonly used to describe Indigenous community aspirations for legal and political recognition. Sovereignty is both a legal condition and a political aspiration. Legally, it is both an attribute of statehood in international law, and an expression of the supremacy of parliament in making laws. As a political concept, it can be asserted as the basis for political control within a state as a matter of fact, whether or not this control is recognised in law. As both a legal and a political concept, sovereignty is established as an abstract claim. It relies on (legal) declarations and (political) assertions, which might or might not marry with lived experience. Indigenous sovereignty has both a legal and a political dimention. It challenges the legal basis of the British assertion of sovereignty in Australia in 1788, and it expresses an allegiance to an alternative source of law. The law’s capacity to recognise another sovereign entity is limited by the origin and extent of the law’s own authority. In the concept of native title, the law managed a limited recognition of rights derived from Indigenous law without acknowledging Indigenous sovereignty. However, native title law created a different barrier to the legal recognition of Indigenous governance. Native title is derived only from the laws of pre-sovereignty Indigenous communities.22 Commonly, if a native title claim fails for want of traditional connection to the land, claimants continue to maintain their claims to the land according to their laws. Some commentators have criticised the law, and the High Court in Mabo in particular, for side-stepping the issue of Indigenous sovereignty in its recognition of native title. Henry Reynolds argues that native title rights must find their authority in a continuing sovereignty, and once this is acknowledged, sovereignty is capable of supporting other rights recognisable in the common law such as a right to self-government. It is common for claims for the recognition of Indigenous governance to begin with the substantiation of a formal legal case for recognition such as Reynolds’. This article does not rely on the substantiation of this case, though it acknowledges that the practical and political case for recognising Indigenous governance provides a powerful case for formal recognition of Indigenous government as well. There have been attempts in the academic literature to give the concept of sovereignty a life beyond its connection to legal authority. Valerie Kerruish argues that the assertion of an exclusive non-Indigenous sovereignty in Mabo is only necessary because of the limited association of sovereignty with the category of colonial law. She suggests that such juridical representations of sovereignty are linked to a conservative politics. She proposes that there is a need in Australia ‘to attend to … a fantastic and reconciliatory moment in the idea of sovereignty’. In Achieving Social Justice, Larissa Behrendt explores what Indigenous Australians are referring to when they make a claim to sovereignty. She concludes that at the heart of the claim to sovereignty is a claim for ‘the recognition of the uniqueness of individual identity and history’. As such, sovereignty is not so much the basis for a claim to rights, but a claim to be freely allowed to express and live out a different form of existence. Steven Curry argues that if Indigenous peoples have a common culture and the ability to act in common, then they ‘must be seen as capable of exercising sovereignty’. Curry argues further that although this sovereignty is limited by competing interests, it entails a positive idea of ‘fashioning a society that promotes one’s interests’. Brennan, Behrendt, Strelein and Williams describe sovereignty as being ‘about the power and authority to govern’. They suggest that, defined as such, it need not be limited to predetermined abstract formulations, and that Indigenous peoples can reclaim the term. For example, the National Aboriginal and Islander Health Organisation stated in 1983: Sovereignty can be demonstrated as Aboriginal people controlling all aspects of their lives and destiny … . It is Aborigines doing things as Aboriginal people, controlling those aspects of our existence which are Aboriginal. These include our culture, our economy, our social lives and our indigenous political institutions. Although there is significant rhetorical force in reclaiming the concept of sovereignty, its political force may be compromised by its formal legal limits. The concept of Indigenous governance avoids this problem. Taiaiake Alfred is more critical of the usefulness of the concept of sovereignty for Indigenous peoples. He argues that sovereignty ought to be abandoned as a concept to advance Indigenous claims because it is an ‘exclusionary concept rooted in an adversarial and coercive Western notion of power’. There is considerable force in Alfred’s critique. Reclaiming a concept which is rooted in non-Indigenous claims to ultimate legal authority is to begin a discussion of political rights from a position of profound disadvantage. The concept of ‘governance’ is not so specifically located and is better suited to the political claims of Indigenous peoples. Like sovereignty, ‘self- determination’ and ‘self-government’ are linked to an official legal status. There is extensive literature on the international right of Indigenous people to self-determination, which arises under the draft United Nations Declaration on the Rights of Indigenous Peoples. Like sovereignty, there have been attempts to reclaim the concept of self-determination. The former ATSI Social Justice Commissioner, William Jonas, stated in 2002, ‘[s]elf-determination … can be articulated through the restructuring and renewal of existing relations between Indigenous organisations and government to create arrangements to reflect and support a diversity of Indigenous circumstances’. Similarly, in explaining the connotations of sovereignty, Brennan, Gunn and Williams explain how, in its broadest sense, Indigenous sovereignty is a necessary manifestation of the exercise of self–government: ‘[it] describes [Indigenous people’s] capacity across the range of political, social and economic life’. The concept of ‘governance’ does not require recognition of Indigenous sovereignty, legally or politically, to have effect. The difference here is similar to the difference between a constitutional doctrine of a separation of powers that, on the one hand, formally defines the relationship between the executive, the legislature and the courts and, on the other hand, describes the substantive difference in their functions. The difference in functions limits government power regardless of the formal status of the separation of powers doctrine. Likewise, Indigenous governance exists regardless of the cut and thrust of legal declaration and political recognition of selfgovernment. While non-Indigenous courts might reject legal claims to Indigenous sovereignty, and while governments might reject the existence of Indigenous selfgovernment for the purposes of negotiating Indigenous-specific rights, Indigenous governance continues to exist and to be practiced by Indigenous communities, and as such must be acknowledged by governments in the decisions they make about the allocation of resources to Indigenous communities. The focus in this article on Indigenous governance instead of sovereignty and self-government is similar to the shift in thinking Noel Pearson has urged in his campaign against passive welfare. Pearson frames the problem of welfare dependence as a problem of a loss of responsibility within Indigenous communities as a result of integration into the white fella economy. He argues that the free market economy has replaced Indigenous economies, and as the most disadvantaged people within the free market economy, Indigenous people have become dependent on others to make their way. He claims that Indigenous economies of subsistence were based on the values of responsibility and reciprocity, and that these values must be reinstated to break the cycle of welfare dependency. Pearson uses the distinction between the market and Indigenous economies to promote particular values and to drive a particular policy response to the problem of Indigenous poverty. This article takes Pearson’s distinction between Indigenous and non-Indigenous economies to a higher level of abstraction. It presents the interaction of Indigenous peoples with non-Indigenous legal and social systems as an exercise of governance. According to the framework suggested in this article, Pearson’s call to ‘take responsibility’ could, therefore, be framed as a call to reinstate Indigenous governance. In the early 1980s, John Griffiths described the existence of more than one legal order within a social field as ‘legal pluralism’. Griffiths contrasted ‘strong legal pluralism’, in which the different legal orders are autonomous within the same social field, and ‘weak legal pluralism’ in which there is a degree of diversity among social and culture groups that are all ultimately governed by a single law. Legal pluralism offers a useful framework for the discussion of Indigenous governance because it emphasises the system of laws and regulation that really governs the behaviour of groups, regardless of the formal legal position. The federal nature of the Commonwealth Constitution is an example of legal pluralism. The Commonwealth and the states both have the power to make, administer and interpret the law within the same social field. However, federalism remains a weak form of legal pluralism as both arms of the federation remain components of a single legal order. Nevertheless, because of the experience of pluralism in Australia derived from the division of sovereignty between the Commonwealth and the states, there is a familiarity with sharing power and responsibility over the resources of the state at the highest level. Even at a time when the balance of power in the Australian federation seems highly skewed in favour of the Commonwealth, the Commonwealth and state governments retain individual responsibility for some policy areas, and share responsibility for others. That is, regardless of the formal interpretation of the extent of Commonwealth legislative power vis-à-vis the states, in practice the states remain vital service providers in Australia, and effective government is a joint enterprise of the Commonwealth and the states. Federalism is most commonly associated with the arrangement of government institutions within nation-states. Federations share certain structural features, such as a distribution of legislative powers in a constitution, a sharing of power that cannot be amended unilaterally by one sphere of government, a degree of fiscal autonomy within each sphere of government, and an independent judiciary. Some theorists attribute to federalism a broader meaning, drawing a distinction between Federal Government and federalism in order to open federalism up to a wider set of circumstances. Eghosa Osaghae states that federalism is a philosophy ‘according to which relations between two or more groups are organised on the basis of a combination of the principles of centralisation, noncentralisation and power sharing’. Although at the level of the nation-state, the most common motivation for federating is to join separate political entities into a union, federalism can equally be a force of decentralisation. Christine Fletcher has argued, that ‘[o]ne of the principles of federalism is that it allows regional communities … to determine what types of political, social, cultural and economic institutions they prefer’. So conceived, federalism is a theory of organisation of great relevance to Indigenous governance. Like the former Australian colonies, Indigenous peoples desire a national and a local identity. They desire, in Dicey’s terms, ‘union’ but not ‘unity’ with the state. James Tully has also used the concept of federalism to capture the balance between dependence and independence of peoples within a single territory: [F]ree and equal peoples [can] mutually recognise the autonomy and sovereignty of each other in certain spheres and share jurisdictions in others without incorporation or subordination. This is a form of treaty federalism.46 Like the Australian states, the identity of Indigenous communities is territorially based. They are governed by distinct laws and they exercise a degree of autonomy from the central government. Of course, Indigenous communities approach a possible federal relationship with the Commonwealth and state governments from a very different position. For the colonies, federation was a move towards greater centralisation. Prior to federation, the colonies were recognised self-governing entities. Indigenous communities do not have official recognition of their independent status as self-governing entities. On the contrary, Australian law has disavowed this status. For Indigenous communities, then, federalism is relevant as a mechanism for recognising their self-governing status, and as a basis for decentralising. Although federalism offers the potential for a new relationship between Indigenous communities and the Australian state, the current federal framework also serves to complicate Indigenous and non-Indigenous relationships. Under Australia’s federal system, responsibility for Indigenous affairs has shifted throughout the first 100 years of federation. The states were initially solely responsible for Indigenous policy within their boundaries. In 1967, the Federal Government became an additional site for law and policy initiatives aimed at Indigenous communities. In recent times there has been a high degree of cooperation between the states and the Commonwealth. There are a variety of joint bodies which control federal financial relations. The central body is the Premiers’ Conference, out of which has evolved the Special Premiers’ Conference and the Council of Australian Governments (CoAG). CoAG was established in 1992 to achieve ‘an integrated, efficient, national economy and a single national market’. In relation to Indigenous policy, CoAG has been concerned ‘to get better results for people on the ground through more effective use of government expenditure. This will require governments to work together better at all levels across agencies and jurisdictions’. CoAG has facilitated general policy statements regarding reconciliation and the provision of services and support to Indigenous communities. In 2002, it also established a number of projects, ‘CoAG Indigenous trials’, which delivered government resources directly to selected communities for various purposes. This brief analysis of the evolution of federal relations generally, and in relation to Indigenous policy making in particular, highlights the difficulty of defining a coherent interface for the recognition of Indigenous governance in Australia. On the other hand, it demonstrates the potential within a federal structure to develop flexible co-operative arrangements. This is reflected in the aims of the CoAG Indigenous trials, which are directed ‘to improve the way governments interact with each other and with communities to deliver more effective responses to the needs of indigenous Australians. The lessons learnt from these cooperative approaches will be able to be applied more broadly’. From an Indigenous perspective, having a single government with which to negotiate rights has advantages when the claim to rights is a single claim over the whole of the state. For example, in New Zealand, the treaty of Waitangi is a comprehensive agreement between the Maori peoples and the government of New Zealand. It is a compact between two governments covering the whole of New Zealand. In Canada, most treaties have been negotiated jointly with the federal and provincial governments. On the other hand, when claims are regional there may be advantages in dealing with a government operating within a narrower regional and jurisdictional base. This has occurred in Australia in relation to land claimed by the Pitjantjatjara people in the north of South Australia. Indigenous communities need to be aware of the advantages and disadvantages of dealing with the different levels of government, and when they should be dealing with both levels simultaneously through such bodies as CoAG. In Australia, the Commonwealth Parliament is the dominant law-making body and any valid Commonwealth legislative scheme cannot be overturned by a hostile state government. Despite the pre-eminence of Commonwealth laws under s109 of the Constitution, there are still advantages in negotiating self-government arrangements directly with state governments. Most of the land over which agreements will apply is controlled by state law, including freehold titles, pastoral leases, and Aboriginal and other reserve lands. Dealing with particular state governments allows for regional variations to be maintained. In Commonwealth and state law and policy, there already exists a degree of recognition of Indigenous governance. In this section, the article gives examples of the recognition of Indigenous governance outside of formal constitutional arrangements. The examples of mainstream recognition of governance in this section demonstrate how Indigenous governance has always been recognised in the development of Indigenous law and policy despite limitations in formal constitutional arrangements. It also shows that although there is an implicit reliance on Indigenous governance structures for the delivery of services in the government’s current Indigenous policy, the failure to acknowledge this reliance means the role of Indigenous communities and organisations is left inadequately defined. The non-Indigenous colonisation of Australia was marked by a radical and violent disregard of the interests of Aboriginal people. This is well documented by historians of the colonial period, and has also been recognised by Australian courts. Importantly for the subsequent development of the institutions of government in Australia, colonisation proceeded on the premise that, for legal purposes, the continent was unoccupied and that British sovereignty and institutions of government could be wholly imported to Australia and immediately become the sole source of legal rights within the territory. This perception of the legal basis of colonisation affected the types of legal recognition afforded to Indigenous Australians. Throughout the 20th century there were a wide range of policy responses to the presence of Indigenous peoples in Australia. Until the early decades of the century, there was a widespread belief that Aboriginal people would simply die out, removing any requirement for their special accommodation. When this did not occur, from the 1930s, state governments implemented policies of absorbing Indigenous Australians into the wider Australian community. In 1937, the Commonwealth and the states agreed to a policy of absorbing all non-‘full blood’ Aboriginal people into the wider population. In 1957 the policy was extended to all Aboriginal people. During the period of assimilation, much Aboriginal political action, and political action on behalf of Aboriginal people, was directed at the achievement of equal rights within the laws of the Commonwealth and the states. This action was symbolised most publicly in the Freedom Ride of 1965 in Western NSW, and in the pastoral workers’ strike at the Newcastle Waters and Wave Hill cattle stations in the Northern Territory. There were also some claims for the recognition of Aboriginal government and other Indigenous-specific rights during this period, though they tended to be isolated and ultimately unrewarded. From the 1970s, the state and Commonwealth governments recognised the reality of Indigenous governance through a variety of legislative mechanisms, including legislation creating Indigenous corporations, land councils, and local government councils. States have also reserved or granted lands to Indigenous communities to provide them with the opportunity to pursue their traditional practices. Also, from the 1970s Aboriginal peoples pursued the possibility of entering a treaty or agreement with the Federal Government. There was considerable support for the idea within the Fraser Coalition Government from 1975–1983, and within the Hawke Labor Government which followed. The most active treaty campaign occurred around the time of the bi-centenary in 1988. The campaign culminated in the Prime Minister committing to a treaty in a speech at the Barunga Festival in the Northern Territory, but a treaty was never concluded. One of the most significant government initiatives in the 1970s was the establishment of a series of national Indigenous representative bodies, first the Department of Aboriginal Affairs and the National Aboriginal Consultative Committee (hereafter NACC) under the Whitlam Labor Government, then the National Aboriginal Conference (hereafter NAC) under the Fraser Coalition Government. In 1989, the NAC was replaced by ATSIC under the Hawke Labor Government. The ATSIC Act established a comprehensive governance model for Indigenous peoples, linking regions through a national representative body and, from 1999, providing a framework for determining community representation through the ATSIC election process. The ATSIC Act was a direct recognition of the existence of Indigenous governance and was an attempt to enhance it through providing a legislative framework for its expression. It provided a national platform for Indigenous governance. The ATSIC Chairperson was a senior bureaucrat in the Department of Immigration, Multicultural and Indigenous Affairs (hereafter DIMIA) who commanded a media presence and had the resources to run media and education campaigns on important Indigenous issues. On the other hand, because ATSIC’s representative structures, powers, and funding were all the creation of statute and relied on the financial support of the Federal Government, ATSIC was constrained in its ability to implement a more radical agenda in opposition to Commonwealth Indigenous policies. There have been a number of reviews of ATSIC, including in 2002–3, a review commissioned by the Minister for DIMIA. Despite this review commending the strength of many aspects of ATSIC’s work, the Government decided to abolish ATSIC in 2004 and to implement an Indigenous policy focussing on service delivery rather than governance. Under the new policy DIMIA retains an important coordinating role: The vision is of a whole-of-government approach which can inspire innovative national approaches to the delivery of services to Indigenous Australians, but which are responsive to the distinctive needs of particular communities. It requires committed implementation. The approach will not overcome the legacy of disadvantage overnight. Indigenous issues are far too complex for that. But it does have the potential to bring about generational change.70 The current Commonwealth Indigenous policy is concerned primarily with the accountability of mainstream agencies in the efficient delivery of services: The Government faced the facts and introduced major reforms to Indigenous affairs. Abolishing ATSIC, dealing directly with local communities through Shared Responsibility Agreements, cutting red tape and making mainstream agencies accountable, is … the beginning of a new era.71 Although the new policy abolishes Indigenous regional governance, it continues to recognise the importance of community consultation in determining the allocation of resources. ‘We will talk directly with and respond to Indigenous communities, finding flexible solutions through the principle of shared responsibility, to the problems they identify as critical to their future’. To facilitate the necessary community consultation, the new policy replaces the ATSIC Board with an unelected National Indigenous Council (hereafter NIC) to advise the Minister, and replaces ATSIC regional commissioners with representatives from government departments responsible for Indigenous programs. The representatives operate through Indigenous Coordination Centres (hereafter ICCs), which are located in the former ATSIC regions and act as ‘shop fronts’ for the delivery of services. The current policy recognises that the decisions about allocation of resources must still be made by the Indigenous communities who are supposed to benefit from the resources. In the most part, Indigenous community input in decision making occurs through direct consultation and agreement making between government departments and communities: In keeping with the Government’s desire to engage at the community level, the new bodies [the NIC and the ICCs] are to act as the interface between communities and governments. They will help articulate community views and provide a framework for contributing to Regional Partnership Agreements. … We want communities to tell us how they could best be represented and we are seeing diverse and flexible arrangements emerge as a consequence.74 At the centre of the government’s new approach to Indigenous policy there are two types of agreement: Shared Responsibility Agreements (hereafter SRAs) and Regional Partnership Agreements (hereafter RPAs). RPAs are designed to meet ‘regional needs and priorities’. The first RPA with the Ngaanjatjarra peoples in the Gibson Desert, central Western Australia was completed in August 2005. SRAs are agreements with individual communities. There are currently about 1300 such agreements across Australia. To date, SRAs have focused on single issues with individual communities. They have been criticised for being ad hoc and for making basic services, which are the responsibility of government to provide, the subject matter of agreements. Furthermore, although the SRAs have the appearance of targeting community needs, the different levels of resources, knowledge and power between government departments and individual communities is such that communities are in a weak negotiating position. There is a conscious shift in focus in the current policy away from the express recognition of Indigenous governance. The existence of self-governing communities capable of negotiating agreements is assumed in the policy. Also, there is no consideration given to what communities constitute a region for the purpose of entering RPAs. These assumptions beg the question, what is the framework within which communities operate, and what is the state’s responsibility to facilitate this framework? It may be that the policy will only work when it expressly acknowledges the authority of Indigenous communities to make decisions. If so, there may be an inevitable move back to a policy not dissimilar to the one it purports to overturn. A number of decisions of the Supreme Court of NSW in the early 19th century held that Aboriginal law governed certain disputes between Aboriginal peoples. These cases were soon overturned in the decisions of Attorney-General v Brown and Cooper v Stuart, which held that Australia was a settled colony and that the only sovereign power in the colony was derived from the British Crown. The impact of the sovereignty of the Crown was illustrated dramatically in the courts in the decision of Milirpum v Nabalco, in which Blackburn J held that the law did not recognise the land rights of the Yolgnu people despite the evident strength of the system of Yolgnu laws which underpinned those rights. Blackburn J acknowledged that the British Crown had the capacity to recognise pre-existing Indigenous property rights, but held that the relationship of the Yolgnu to their land was not based on notions of ‘property’ recognised in the common law or any other law.82 In 1979, Paul Coe brought an action ‘on behalf of the aboriginal community and nation of Australia’ challenging the legal orthodoxy of Brown and Cooper v Stuart. The Statement of Claim challenged the British Crown’s sovereignty over Australia on the basis that it was ‘contrary to the existing rights, privileges, interests, claims and entitlements of the aboriginal people’. Although the claim failed, Jacobs and Murphy JJ acknowledged that there was uncertainty about the means by which sovereignty had entered Australia, and held that the question was justiciable. Gibbs and Aickin JJ held that the validity of the British Crown’s claims to sovereignty in Australia were acts of state that could not be challenged in the courts and that Coe’s claim was therefore vexatious. Jacobs J agreed with Gibbs and Aickin JJ on this point, but joined with Murphy J in dissent to hold that the High Court or the Privy Council had never finally determined whether sovereignty had entered Australia under the doctrine of settlement or conquest, and that the question was justiciable as it might affect the extent of Aboriginal rights. Mabo confirmed that British sovereignty entered the Australian territory as a consequence of occupation or settlement and that the British Crown became the sole sovereign power in the territory from the time of the assertion of sovereignty, but unlike Milirpum, Mabo held that the common law in a settled colony was capable of recognising property rights that were based on a different system of laws. From one perspective, Mabo simply recognised what was selfevident – that Indigenous peoples had pre-existing rights to land based on their own laws that required recognition by the state as a matter of law. Most Australian governments had already recognised land rights through various legislative instruments such as state and Commonwealth land rights acts, legislation creating Aboriginal reserves, and through various legislative schemes designed to protect important places and important rights of Aboriginal peoples and empowering Aboriginal organisations to purchase and invest in land. From another perspective, Mabo represented an important shift in the constitutional framework of government in Australia. As Justice Gummow put it in Wik Peoples v Queensland: To the extent that the common law is to be understood as the ultimate constitutional foundation in Australia, there was a perceptible shift in that foundation away from what had been understood at federation.88 The ‘shift’ Gummow J refers to here is the belated recognition that Indigenous people had pre-existing and continuing rights under their own system of laws. Implicit in the decision was a recognition of the continuance of Aboriginal law in mainland Australia. The construction of native title rights in Mabo assumes the existence of a whole range of existing and functioning Indigenous governance arrangements. It assumes that there are distinct communities with rules for determining such things as the membership of the community, the boundaries of the community’s traditional country, and who can speak for the community in bringing an action. It also assumes that once a claim has been made, there are existing organisational structures within Aboriginal communities capable of managing native title. Mabo is significant not only for the extent of the legal rights it recognised, but also for its acceptance of a system of Aboriginal governance that must be acknowledged and taken seriously by the law. The distinction between the recognition of legal rights and the underlying system of laws is evident in the jurisprudence on Indigenous land rights that has followed Mabo. The Native Title Act 1993 (Cth) was intended to reflect the extent of recognition of Indigenous land rights in Mabo. But what it recognised was the extent of the legal recognition of Indigenous land rights, and not the system of Indigenous governance that underpins it. Focusing on native title as a question of legal rights, the Native Title Act established a formal process for claiming these rights. The claims process in the National Native Title Tribunal and the Federal Court is non-Indigenous in design. It constructs land issues as a conflict of rights to be resolved through a process of dispute resolution in courts and tribunals rather than as an issue of governance to be resolved through negotiation. Although the native title process resulted in a limited recognition of native title rights, the process itself has been remarkable for invigorating Indigenous governance mechanisms. Once the nature and extent of native title rights was clarified by the High Court, agreement making between Indigenous and non-Indigenous groups with an interest in land became the focus of the native title regime. Indigenous Land Use Agreements (hereafter ILUAs) rely on an underlying framework of Indigenous governance. Successful claimants are required to form a corporate entity, a Prescribed Body Corporate (hereafter PBC), to manage their native title. The PBCs regime has led to a range of issues related to effective Indigenous governance, including whether corporate structures are appropriate structures for Indigenous communities to manage their rights and interests. The preparation of claims has required Indigenous communities to reflect on their connections to country, to organise community representation, and to determine the extent of their traditional country in consultation with adjoining communities. This has led to cooperation in the lodging of joint claims, or on occasions, has provoked intra-Indigenous disputes. The underlying framework of Indigenous governance that Mabo assumes and enlivens is relevant not only to the management of native title, but also to the management of a wide range of other cultural and economic interests in Indigenous communities, and as a basis for negotiating with state and Commonwealth governments over protection and facilitation of these interests. In fact, one of the great hopes for native title is that it will consolidate existing Indigenous governance structures and provide a stronger economic and land base for communities to interact with government institutions and other interest groups in the Australian community. In the previous section, the reality of Indigenous governance was shown to have been recognised in various ways in Commonwealth and state government law and policy and in the courts. However, the recognition has been piecemeal and reactive, limited to recognising responses to claims of right, or to when governments have tried to determine the best and most efficient model for the allocation of resources. In this section, the article argues that as a matter of political theory, more is required of governments than this reactive approach to recognising Indigenous governance. Although Indigenous governance exists regardless of its official recognition, it remains central to claims for such recognition (just as the different functions of the institutions of government are central to the doctrine of the separation of powers). Furthermore, if the status of Indigenous governance is acknowledged in the formal institutions of government it will eliminate the distracting politics that pits Indigenous and non-Indigenous interests against each other. The focus of policy debate can then be directed to the institutional requirements to allow Indigenous and non-Indigenous interests to co-exist effectively. It is common for post-colonial states to recognise Indigenous-specific land, cultural and political rights to some extent. There are many explanations as to the bases for these rights. One explanation is that the rights derive from the position of Indigenous peoples as the first peoples in the nation. However, priority is an insecure basis for differential rights. There are often good reasons for recognising a more recent interest over an interest established earlier in time. One reason is that a more recent interest is more immediate, direct, and intense, and the person with the interest will suffer the greater harm or injustice from having the interest denied. This is reflected in the legal principle of adverse possession, in which a person’s possession or use of land is recognised as a stronger form of right than a prior title to the land. Native title rights are an example of rights which draw their strength from a prior claim of right, but which remain vulnerable to extinguishment by subsequent interests in land. Sovereignty is based solely on the principle of priority. For Kelsen, authority derives from the first law or constitution. It is this justification of sovereignty which makes the claim of exclusive non-Indigenous sovereignty in Australia so weak from an Indigenous perspective. It can only be maintained by denying the existence of prior Indigenous sovereignties. Another explanation for the basis of Indigenous-specific rights is the inherent difference between Indigenous and non-Indigenous peoples in Australia. A single law derived from a particular socio-cultural perspective is not able to accommodate the extent of these differences. This argument is vulnerable to the fact that differences come and go, and change in nature. There are also powerful reasons in many circumstances to enforce equal rights in the face of an assertion of difference. For example, where an asserted difference is unreasonably harmful to others, there are good reasons for curtailing a person’s freedom to exercise the difference. It is not only the presence but the nature of Indigenous difference that makes it the location of differential rights. Obviously, without difference there is no need for differential rights. But there also needs to be a reason why one person’s difference is more worthy of recognition than another person’s. In relation to Indigenous difference, Will Kymlicka emphasises the importance of its prior existence. But as argued above, priority by itself does not provide an adequate basis for differential rights. A better explanation is the deep association of Indigenous peoples with the land. Indigenous difference involves a different way of experiencing the world and of organising a place in it. The engagement of Indigenous Australians with each other and with others is necessarily shaped by this difference. Another explanation for Indigenous rights is as a response to the perceived historical injustice of Indigenous dispossession in the process of non-Indigenous colonisation. A violation of rights in the past, it is argued, requires reparation in the present. The philosopher Jeremy Waldron has argued strongly against this explanation for currently existing rights on the basis that there is a necessary disjuncture between the past and the present. Only present relationships and conditions can determine what is the just reparation for a continuing wrong. If reparation is based on past conditions, it will simply result in harm to people with competing interests in the present. In Postcolonial Liberalism, Duncan Ivison argues that Waldron does not fully appreciate the nature of the claim to reparation for past wrongs. The wrong, according to Ivison, is not the denial of specific rights, but a denial of ‘just terms of association’. The injustice is the continuing failure to perceive an alternative conception of rights, and their cultural and political expression, or as this article frames it, a failure to recognise Indigenous governance. Liberal theorists have traditionally had trouble recognising a plurality of political rights within the state because special rights for one group affect the freedom and equality of others in the same community. However, there is now a body of theory among liberals and communitarians making a strong case for rights to self-government among Indigenous peoples within the nation-state. Kymlicka has argued that recognising special rights for Indigenous peoples is consistent with liberalism because equal participation within a single political community entails a recognition of group difference and cultural affiliations. Expanding the liberal paradigm to acknowledge cultural difference allows citizens a fuller and more equal participation in the political, economic, and cultural life of the state because meaningful decision making derives from a person’s particular cultural context. The case for the recognition of Indigenous cultural affiliations is particularly strong. Unlike those who enter a political community from outside, Indigenous peoples have had no choice whether or not to join the political community. Duncan Ivison has extended the recognition of Indigenous political rights within the liberal paradigm still further. In Postcolonial Liberalism, Ivison equates the role of participation in the political institutions of society with a sense of ‘being at home’. His challenge to liberals is to accommodate complex cultural and political differences within the conception of public reason, so that key liberal values can work for people who have not experienced their benefits. His challenge to non-liberals, including Indigenous peoples who might be sceptical about the role of the state and its institutions, is to trust in the possibility of feeling at home through participation in the political institutions of society despite previous experiences of alienation. Whereas Kymlicka and Ivison take the perspective of the non-Indigenous liberal seeking an ethical engagement with and accommodation of Indigenous peoples, Tully approaches the question of constitutionalism from the perspective of Indigenous peoples. From the Indigenous perspective there is no question of the existence of cultural difference, and the need for political recognition of this difference. It is central to the Indigenous experience of life in the nation. From the Indigenous perspective pluralism exists, and the question is why we fail to recognise and protect it. He writes: ‘A just form of constitution must begin with the full mutual recognition of the different cultures of its citizens’. Mutual recognition occurs through dialogue and what emerges are conventions for coexistence rather than comprehensive rules. Faced with the reality of Indigenous governance and the theoretical case for recognising it within the constitutional order of the state, what is the appropriate way to recognise Indigenous governance? The answer depends on one’s understanding of the role of the institutions of government in society. Constitutional government can be understood narrowly as a means of curtailing the power of lawmakers. So understood, Parliament should only make laws to maintain order. Broader issues of the relations between cultural groups should be determined outside of the institutions of government. If one conceives of constitutional government in this way, the role of representatives might be limited to a narrow range of decisions that affect all citizens equally, and might not include the determination of questions of culture, identity or social diversity. In such a government, recognising differential rights, and providing for the protection and facilitation of autonomous self-governing groups is unlikely to be perceived as the role of the state. This is so regardless of the strength of a group’s identity and the degree of their difference, and regardless of the ethical and political force of their claims to self-governance. Only if there were some constitutional requirement for recognition would there be any obligation to recognise governance mechanisms outside those established by the state. This narrow understanding of constitutional government emerges from the work of Thomas Hobbes and John Locke among others. It dominated the formation of Australian political institutions at the time of federation, and resulted in a Constitution with no substantive recognition of Aboriginal people and their rights. It is also highly influential on the present Government’s Indigenous policy. Alternatively, constitutions can be viewed as a means of empowering representatives to improve society through the institutions of government. This requires a more active and interventionist role for government in the shaping of society, and more creative approaches to law making. If one understands constitutional government to be the location for the determination of questions of culture and rights, there is an incentive to investigate any means by which existing institutions, such as parliament, can better conduct and manage these debates and contests. With this understanding of constitutional government, any means by which consideration of questions of culture and rights can be improved will be embraced. The broader understanding of constitutional government is linked to a rejuvenation of the concept of politics among theorists reflecting on questions of diversity within liberal political institutions, such as Kymlicka, Iris Young, and Anne Phillips, 116 and in work reflecting on the political theory of Carl Schmitt.117 This broader understanding of constitutional government suggests the state ought to take positive steps to facilitate Indigenous governance. Although it is likely to be Indigenous Australians who lead the case for the recognition of Indigenous governance, the whole of the political community will determine the nature and shape of any official recognition. Therefore, in discussing the merits of Indigenous institutions of self-government, there must be a focus on how it can work within the constitutional framework of government for all Australians. The Federal Government’s recognition of its responsibility for the maintenance of Indigenous communities and institutions is evident in its continued support for the native title regime, and other legislative schemes aimed at protecting the rights of Indigenous peoples. It is also evident in the assumptions about the existence of Indigenous self-governing communities in the Federal Government’s current policy for providing services to Indigenous communities. The Federal Government’s current policy may differ from the approach under the ATSIC Act in its method of recognising, supporting, and enhancing Indigenous governance, but not in its reliance on Indigenous governance for the effective implementation of its policy. In the last section, the article identifies a number of issues for which the state must take some responsibility to ensure the effective exercise of Indigenous governance, and ultimately, to ensure the success of any policy aimed at the economic and cultural well-being of Indigenous communities in Australia. Most claims for the recognition of Indigenous interests, be it sovereignty, selfdetermination, rights to land, or the protection of other socio-economic or cultural rights, seek entrenchment of the interests in a formal instrument of government. The benefit of such formal recognition is that the interests are then protected by the law. In relation to Indigenous governance, there are several problems with such formal recognition. First, as discussed above, recognition in a non-Indigenous instrument of government is in conflict with the degree of independence inherent in the concept of Indigenous governance. Second, Indigenous governance defies simple definition. The requirements of Indigenous governance differ in different contexts and at different levels. At the level of the community, Indigenous governance might require a recognition of customary law and customary decision making processes. At the level of the nation, it may require the recognition of Indigenous administrative structures to determine questions such as membership or resource allocation. This article has argued that there needs to be a conceptual shift in how we understand the constitutional framework of government. Fundamental to that shift is an understanding that Indigenous governance exists and is practiced at various levels in the Australian polity. With this shift comes a recognition that the formal institutions of the state already accommodate Indigenous governance in various forms, albeit implicitly. If this shift in understanding occurs, there can be a renewed focus on the practical steps that need to be taken to assist Indigenous communities in Australia. There is nothing wrong with the Federal Government’s focus on ‘practical reconciliation’ per se, what makes it objectionable is that it imposes policy responses that react to a problem constructed as one of Indigenous ‘disadvantage’. The concept of disadvantage reduces the difference of Indigenous Australians to a matter of economics, and reduces the solution to effective mainstream resource allocation. The Commonwealth’s current Indigenous policy avoids any mention of Indigenous governance. Indigenous involvement on the ground is framed as purely administrative, through Indigenous Coordination Centres. Established as administrative bodies, these Centres remain undefined in terms of their membership and their decision making functions. Once they are recognised for what they surely must be, instruments of Indigenous governance, a number of issues about their constitution and role must be confronted: how is their membership determined? What is the extent of their control and decision-making power over the resources allocated to Indigenous programs? How are they to be held accountable for decisions they make, and to whom are they accountable? In this last section, the article explains how these questions are of fundamental importance to any Indigenous policy that properly accounts for Indigenous governance. Paradoxically, if the Government takes seriously the need to recognise and facilitate Indigenous governance, it will want a stake in the criteria for membership in Indigenous communities. The paradox arises because taking Indigenous governance seriously requires giving up a certain amount of decision making power over the provision of resources and services. Since resources are limited, and the government is obliged to provide for all its citizens, a government will only be prepared to relinquish some control over resources if it is confident that the power will go into the right hands. Membership of the Australian community at the levels of the Commonwealth and the states is defined by the entitlement to participate in rights associated with community membership, and most importantly, by the right to vote. The right to vote is granted, first, as a consequence of membership of the Australian community, and second, as a consequence of having an identified place of residence in Australia. Other rights to inclusion are often derivative of the right to vote. For example, to obtain a driver’s licence in NSW, a person requires evidence of their residential address and an important source of evidence of a person’s address is their inclusion on the electoral roll. The criteria for membership in Indigenous communities are distinct from the criteria for membership of the Australian community. Most Indigenous Australians no longer live on their traditional lands and have no clear geographical or regional distinction from non-Indigenous people. Membership is primarily a question of identity. One of the major constitutional challenges in relation to Indigenous governance is to establish criteria for Indigenous identity. Using native title as an example, a person can have native title rights through association with a community regardless of his or her own personal disconnection from land. In Mabo, Brennan J stated: [S]o long as the people remain as an identifiable community, the members of whom are identified by one another as members of that community living under its laws and customs, the communal native title survives to be enjoyed by the members according to the rights and interests to which they are respectively entitled under the traditionally based laws and customs, as currently acknowledged and observed. In Ward v Western Australia, the Full Court of the Federal Court held that people could be adopted into or ‘grown up’ in communities and still be part of the community for the purposes of determining native title rights. At the national level, Indigenous peoples also express a ‘national’ identity, which distinguishes them as a group from other groups in the nation. Most broadly conceived, Indigenous national identity is based on a common experience of being colonised peoples. Indigenous national identity is formally recognised in several instruments of the state, among others: until 1967, in s51(xxvi) of the Constitution; in the Native Title Act 1993 (Cth), the Aboriginal and Torres Strait Islander Heritage Protection Act 1984 (Cth), the ATSI Act 2005 (Cth) (hereafter ATSI Act). The most comprehensive formal expression of the national identity of Indigenous Australians was of course the ATSIC Act which was in place from 1989–2005, and established an electoral process for choosing Indigenous leaders at the national level. The Federal Government’s current Indigenous policy recognises a national Indigenous political identity in the National Indigenous Council. There are two related issues surrounding the determination of Indigenous identity for the purpose of determining inclusion within Indigenous communities; first, the respective roles of the state and Commonwealth governments and Indigenous communities themselves in determining the criteria for Indigenous identity, and second, who should resolve cases of disputed identity, institutions of the state or the community? In the 1990s there were two challenges to the eligibility of people running for office in ATSIC regional council elections, and the Federal Court was called upon to consider who satisfied this definition. In both cases, a petition was presented under clause 2 of schedule 4 of the ATSIC Act seeking declarations that the respondents were not qualified to run for election and therefore not eligible to be elected to a Regional Council established by the ATSIC Act because none of them was an satisfied the definition of ‘Aboriginal person’ under the ATSIC Act. The Federal Court found itself in the position of having to determine who was an ‘Aboriginal person’ under the Act because the question of identity was raised in relation to the statutory right. In Shaw v Wolf, Merkel J agreed with Drummond J in Gibbs v Capewell that there were three aspects to the definition of an Aboriginal person: descent from peoples of the Aboriginal race, self-identification as Aboriginal, and community recognition. Merkel J was at pains to give a broad meaning to descent; one that recognised that sociological context had a significant influence on self-identification and on community recognition in the determination of descent, and did not rely on biology or genetics alone. Nonetheless, it would seem impossible for identity to be completely divorced from a concept of genealogical or biological descent in the context of Commonwealth legislation relating to Aboriginal peoples, since the Commonwealth power to make laws for Aboriginal Australians is itself based squarely on the concept of racial difference. In Commonwealth v Tasmania, Brennan J recognised that in the concept of race, the role of biology was open to question. However, he concluded that it remained a key characteristic in racial categorisation. The role of race is reinforced at the Commonwealth level by the fact that the constitutional power to make laws with respect to Indigenous Australians is on the basis of race. This risks reducing Indigenous difference to an issue of biology, ignoring the substantive differences of culture and political expression. This may be a constraint on the capacity of the Commonwealth Constitution to support an effective legislative regime for Indigenous governance, for it means that the Commonwealth is limited to policy initiatives based on the concept of racial difference. Although within this category of difference the Commonwealth has broad scope for policy making, it is uncertain whether it could legislate for an Aboriginal people defined in broader terms than that of race under s51(xxvi) of the Constitution. More importantly, the existence of race as the discriminator between Indigenous and non-Indigenous Australians pre-judges and limits the complex issue of identity. The fact that non-Indigenous governments have a stake in issues relating to Indigenous governance carries with it the responsibility to ensure that there are adequate mechanisms for the resolution of disputes. Currently, the non-Indigenous courts are the only bodies established to fulfil this role. On many issues, however, the courts are not an appropriate body to resolve disputes on issues relating to Indigenous governance. For example, the use of courts to make decisions about inclusion in Indigenous communities raises obvious problems of legitimacy. Justice Merkel of the Federal Court raised such concerns in Shaw v Wolf. While recognising the Court’s obligation to determine the question of eligibility to run for ATSIC elections, Merkel J was clearly uncomfortable with his role in determining a question which was at the heart of Aboriginal self-identity and self-government. Merkel J concluded his judgment with the observation that: It is unfortunate that the determination of a person’s Aboriginal identity, a highly personal matter, has been left by a Parliament that is not representative of Aboriginal people to be determined by a Court which is also not representative of Aboriginal people. Whilst many would say that this is an inevitable incident of political and legal life in Australia, I do not accept that that must always be necessarily so. It is to be hoped that one day if questions such as those that have arisen in the present case are again required to be determined that that determination might be made by independently constituted bodies or tribunals which are representative of Aboriginal people. One of the lessons from Shaw v Wolf is that when Indigenous governance is formally recognised in legislation, there is a greater likelihood that the state will be involved in determinations of questions of community membership, culture, and rights. This is an important consideration when determining the extent of state recognition and protection of Indigenous governance. If legislation were considered to establish a regional framework for Indigenous governance, serious consideration should also be given to establishing an independently constituted Indigenous body for the resolution of disputes arising under that act. This is particularly the case for issues relating to membership of the community and interpretation of customary law. In creating such a body, it is necessary to balance the needs of the community and the needs of the state in the resolution procedures. Among other things, the state retains an overarching obligation to protect the interests of those affected by Indigenous rights, and more generally, an obligation to protect the human rights of all people in the community. Also, there is a need to determine the grounds for appealing or reviewing the decisions of the Indigenous dispute resolution body to state or federal courts. In 2001, the Acting Minister for Finance and Administration, Senator Rod Kemp, commissioned the Commonwealth Grants Commission (hereafter CGC) to develop methods of calculating the relative needs of Indigenous Australians in different regions for the purpose of determining the allocation of Commonwealth funds to Indigenous and mainstream programs. The Terms of Reference of the inquiry sought a funding model that could be used to determine the relative need of Indigenous peoples in different regions, based purely on levels of disadvantage, and without any recognition of Indigenous governance. The data relied on was largely statistical information (from the 1996 Census data) and not information from Indigenous communities. Not surprisingly, the Commission concluded that ‘it was difficult to construct suitable regional indexes because the available data was not comprehensive and up-to-date’. It also found that mainstream services were not widely accessed by Indigenous Australians and did not meet their needs. If the funding needs of Indigenous communities is understood not only to be a response to mainstream disadvantage, and the determination of need is understood not only to be the responsibility of mainstream governments, but of mainstream governments in partnership with Indigenous communities, new approaches to addressing Indigenous financial needs emerge. In fact, in its analysis, the CGC understood the importance of Indigenous governance without naming it as such. In its conclusions, it discussed the need to ‘recognise the importance of capacity building within Indigenous communities’, and the need to establish ‘effective partnerships between service providers and Indigenous people’. Clearly, a degree of financial independence is necessary for effective Indigenous governance. The greater reliance Indigenous communities have on government financial assistance, the less autonomous they will be. The changing relationship between the Commonwealth and the states in Australia demonstrates the importance of financial independence for effective governance. As a result of an imbalance in the financial relations between the Commonwealth and the states, the states are subordinate both in terms of the ambition they can bring to their legislative programs, and in terms of their ability to bargain with the Commonwealth over the terms and conditions of programs which are within the control of both the Commonwealth and the states. Aboriginal communities are highly dependent on Commonwealth and state funding. This puts them in a weak institutional position and hampers effective Indigenous governance. Government funding for Indigenous programs comes from several sources: mainstream Commonwealth and state government department funding; Commonwealth specific purpose payments to fund Commonwealth programs; and state and local government funding for Indigenous-specific programs. Under the constitutions of the Commonwealth and the states funding for Indigenous programs must be made out of the Consolidated Revenue Fund. There is a wide power of appropriation at both the Commonwealth and state levels for this purpose. The constitutional categorisation of Indigenous people according to race under s51(xxvi) may limit the amount of control that can be ceded to Indigenous communities over money appropriated for Indigenous programs. In particular, the Commonwealth may not be able to allocate money to Indigenous communities for purposes that are not Indigenous-specific, such as funding a local organisation which is defined in terms of its location rather than the identity of its constituents. ATSIC was often the target of criticism about the failure of Indigenous policy at the national level. There was a general perception that a great deal of money was devoted to Indigenous-specific programs under ATSIC’s control, without adequate results. In fact, a majority of ATSIC’s budget was allocated directly to established programs with no discretion in the Commission in relation to the allocation. Also, of the funds that the Commission controlled, most was allocated to agencies established under other legislative schemes with their own regulatory authorities responsible for ensuring that organisations met their statutory obligations such as community councils, medical services, legal services, housing co-ops, and social, cultural and sporting bodies. Spending by ATSIC was subject to the usual processes of accountability that apply to public sector spending: senate estimates, scrutiny of the auditor general, and parliamentary committees. In addition, ATSIC was subject to review by the Office of Evaluation and Audit (hereafter OEA), an independent statutory body established under Part 4B of the ATSIC Act 1989 (and continues under the ATSI Act 2005), to report directly to the Minister on spending on Indigenous programs. In 1996, the Commonwealth appointed a Special Auditor to examine the financial documentation of ATSIC-funded Indigenous organisations. The Australian National Audit Office commented that ‘no other Commonwealth agency has a position equivalent to the Director of OEA … and with such strong independent reporting powers’. Despite the level of scrutiny of ATSIC spending and a reasonably positive report from the Australian National Audit Office, criticisms of ATSIC spending remained until its demise. An obvious lesson from the ATSIC experience for future Indigenous governance initiatives is the need to have clear lines of responsibility for servicing Indigenous programs. The size of the ATSIC budget suggested that it carried greater responsibility for the provision of basic services to Indigenous communities than was actually the case. In future, Indigenous Australians might be well advised to accept responsibility only for discretionary funding that is allocated to them, and leave non-discretionary funding to be made through mainstream government departments. There is a considerable literature on the importance of land for Indigenous rights and economic development in Australia. Since the 1970s, state and territory land rights legislation has been responsible for the return of vast areas of land to Indigenous community ownership. This land has created an important economic and cultural foundation for Indigenous communities. For example, the NSW Aboriginal Land Council (hereafter NSWALC) buys, manages and invests in land for Aboriginal people. It has made purchases of land worth in excess of $1 billion, and has a self-sustaining land fund for further purchases, and for the administration of land on behalf of local communities in NSW. Unlike ATSIC, the NSWALC does not rely on an appropriation from consolidated revenue, and thus has been able to maintain a greater level of autonomy than ATSIC from the influence of Commonwealth and state governments. Despite the success of statutory bodies such as the NSWALC, attempts to increase the economic self-sufficiency of Indigenous communities have not broken the considerable reliance of communities on state and Commonwealth financial support. It was hoped that the recognition of native title in Mabo might provide a new economic base for Indigenous communities from which they could negotiate the terms of non-Indigenous use of native title land. However, much of this economic potential has been lost due to the interpretation of the nature and strength of native title rights in comparison with other rights to the land. For example, the High Court has limited the potential to claim native title rights over minerals. It is because Indigenous communities remain heavily reliant on Commonwealth and state funding that legal protection of their autonomous existence in Commonwealth and state laws and/or constitutions remains an important focus of those advocating for Indigenous rights. Since, as this article has argued, Indigenous governance is part of Australia’s constitutional framework, mainstream governments must account for it in their relations with Indigenous Australians. There is good sense in formally recognising and facilitating Indigenous governance in the Commonwealth Constitution so that law and policy is targeted appropriately at the points of contact between the different types and levels of government in Australia. Regardless of any formal recognition, Indigenous policy in Australia will be more successful if it acknowledges the importance of Indigenous governance to the proper functioning of Indigenous communities. If the Federal Government is committed to the social, cultural and economic well-being of Indigenous Australians, it must be drawn on the governance practices of Indigenous communities as a central source of knowledge on what is the nature and extent of Indigenous need. This article has argued that the recognition of Indigenous governance is necessary not only to maximise Indigenous policy outcomes, but also to establish healthy and sustainable constitutional arrangements. The Australian constitutional order is well positioned for the type of recognition of Indigenous governance called for here. The Commonwealth Constitution already shares the power to govern between two levels of government. Although there are, and will always be, difficult issues in relation to the effective division of responsibilities and allocation of resources between the levels of government, the unequivocal position of the Commonwealth and the states as governing entities means that they have no choice but to negotiate with each other on these questions. The recent experience of Australian federalism has been marked by an increased emphasis on cooperation between Commonwealth and state governments. A new federalism in the relationship between Indigenous communities and state and Commonwealth governments could benefit from the experience of the State/Commonwealth federal relationship. There is uncertainty at the heart of the Government’s current Indigenous policy. On the one hand, the government is promoting a system of agreement making with Indigenous communities and even with groups of communities within a region, but on the other hand, it is not recognising the role of Indigenous governance in this agreement making process. Whatever its faults, ATSIC contained the core attributes necessary for a framework of Indigenous governance. The demise of ATSIC has given way to a new philosophy which sees governance as a distraction from successfully providing resources to Indigenous communities. This new approach seems certain to fail unless adequate support is provided to facilitate the governance capabilities of the Indigenous communities with which the government enters into agreements. Ultimately, ‘Shared Responsibility Agreements’ or ‘Regional Partnership Agreements’ are only as strong as the framework of governance which supports them. * Senior Lecturer, Division of Law, Macquarie University. My sincere thanks to George Williams and the anonymous referees of the Sydnew Law Review for their extensive comments on earlier drafts of this article. The article contributes to an Australian Research Council funded project on Regional Governance and Indigenous communities that the Jumbunna Indigenous House of Learning, University of Technology Sydney, and the Gilbert and Tobin Centre of Public Law, University of New South Wales, have undertaken in partnership with Reconciliation Australia. The system of electing representatives under the ATSIC Act was introduced in 1990. For an analysis of ATSIC and its representative structure prior to its abolition, see the Department of Immigration, Multicultural and Indigenous Affairs, In the Hands of the Regions – A New ATSIC: A Report of the Aboriginal and Torres Strait Islander Commission (2003) (hereafter In the Hands of the Regions). See also the Senate Select Committee on the Administration of Indigenous Affairs, After ATSIC – Life in the Mainstream? (2005). This inquiry, initiated by the Australian Democrats in the Senate, was highly critical of the decision to abolish ATSIC. On the theory of legal pluralism, see generally, John Griffiths, ‘What is Legal Pluralism’ (1986) 24 JLP 1. See also William Connolly, The Ethos of Pluralization (1995). Stephen Cornell, Catherine Curtis & Miriam Jorgensen, ‘The Concept of Governance and its Implications for First Nations’, Joint Occasional Papers on Native Affairs, No 2004–02: <http:/ /www.jopna.net/pubs/jopna_2004-02_Governance.pdf> (24 July 2006). The Harvard Project on American Indian Economic Development (hereafter the ‘Harvard Project’) was founded by Stephen Cornell and Joseph Kalt at Harvard University in 1987. The Project aims to understand and foster the conditions under which sustained development can be achieved among American Indian nations. Anne Kjær, Governance (2004) at 3. Similarly, Anne Kjær distinguishes government from governance on the grounds that government was limited to ‘the exercise of power by political leaders’. Id at 1. Michel Foucault, ‘The Subject and the Power’ in Hubert Dreyfus & Paul Rabinow, Michel Foucault: Beyond Structuralism and Hermeneutics (1982) at 220–221. Mitchell Dean, ‘Notes on the Concept of Governance’ presentation at Macquarie University, 11 August 2005. Göran Hydén, ‘Governance and the Reconstitution of Political Order’ in Richard Joseph (ed), State, Conflict and Democracy in Africa (1999). Kjær, above n4 at 7. Jan Kooiman, Governing as Governance (2003) at 77–132. Id at 78. Paul McHugh, Aboriginal Societies and the Common Law (2004). McHugh’s analysis is of Indigenous peoples in North America and Australasia. Id at 427–428. Diane Smith, ‘Researching Australian Indigenous Governance: A Methodological and Conceptual Framework: Working Paper No 2’ (Centre for Aboriginal Economic Policy Research, 2005) at 8. Ibid. These variations are the focus of the Centre for Aboriginal Economic Policy Research research into Indigenous community governance. See generally, Smith, above n14. For example, in international law, a ‘state’ must have a population, a territory, a government, and the ability to engage in diplomatic or foreign relations. These two types of sovereignty are often referred to as ‘external’ and ‘internal’ sovereignty. See, for example, Coe v Commonwealth (No 1) HCA 68; (1979) 24 ALR 118; Coe v Commonwealth (No 2) HCA 42; (1993) 118 ALR 193. See, for example, Mick Dodson, ‘Sovereignty’ (2002) 4 Balayi: Culture, Law and Colonialism 13; Marcia Langton, ‘The Nations of Australia’, speech given at the Alfred Deakin Lecture, 20 May 2001; Michael Mansell, ‘Towards Aboriginal Sovereignty: Aboriginal Provisional Government’ (1994) 13 Social Alternatives 16; Paul Coe, ‘The Struggle for Aboriginal Sovereignty’ (1994) 13 Social Alternatives 19. New South Wales v The Commonwealth HCA 58; (1975) 135 CLR 337 at 388 (Gibbs J); Mabo (No 2) v Queensland (No 2) (1992) 175 CLR 31–32 (Brennan J) (hereafter Mabo); 95 (Deane & Gaudron JJ). For a critique of the High Court’s acceptance of the Act of state doctrine, see Stewart Motha, ‘The Sovereign Event in a Nation’s Law’ (2002) 13 Law and Critique 311; Peter Fitzpatrick, ‘No Higher Duty: Mabo and the Failure of Legal Foundation’ (2002) 13 Law & Crit 233–252. Yorta Yorta Members of the Aboriginal Community v Victoria HCA 58; (2002) 214 CLR 422 at 445–447 (Gleeson CJ, Gummow & Hayne JJ). Henry Reynolds, Aboriginal Sovereignty (1996) at 1–15. Valerie Kerruish, ‘At the Court of the Strange God’ (2002) 13 Law & Crit 271 at 274. Id at 271. Larissa Behrendt, Achieving Social Justice (2003) at 96. See also Sean Brennan, Brenda Gunn & George Williams, ‘ “Sovereignty” and its Relevance to Treaty-Making Between Indigenous Peoples’ and Australian Governments’ SydLawRw 15; (2004) 26 Syd LR 307. Steven Curry, Indigenous Sovereignty and the Democratic Project (2004) at 148. Ibid. Sean Brennan, Larissa Behrendt, Lisa Strelein & George Williams, Treaty (2005) at 71. National Aboriginal and Islander Health Organisation, Sovereignty (1983) quoted in Larissa Behrendt, above n26 at 100. Taiaiake Alfred, Peace, Power, Righteousness: An Indigenous Manifesto (1999) at 59. United Nations Document 45/1994. For a discussion of the draft declaration, see Chidi Oguamanam, ‘Indigenous People and International Law: The Making of a Regime’ (2004) 30 Queen’s Law Journal 348; Erica-Irene Daes, ‘The Concepts of Self-Determination and the Autonomy of Indigenous Peoples’ in the Draft United National Declaration on the Rights of Indigenous Peoples (2001) 14 St Thomas LR 259; Hannah McGlade, ‘Not Invited to the Negotiation Table: The Native Title Amendment Act 1998 (Cth) and Indigenous Peoples’ Right to Political Participation and Self-Determination Under International Law’ (2000) 1 Balayi: Culture, Law and Colonialism 97. William Jonas, ‘Community Justice, Law and Governance: A Rights Perspective’, speech given at the Indigenous Governance Conference, Canberra, 3–5 April 2002: <http:// www.hreoc.gov.au/speeches/social_justice/community_justice.html> (3 May 2006). Brennan et al, above n26 at 314. See also Brennan et al, above n29 at 72–74. Noel Pearson, Our Right to Take Responsibility (2000) at 13–14. Id at 27–31. Griffiths, above n2 at 38. In Australia, see the Commonwealth Constitution, s51 and ss106–109. The Supreme Court of Canada declared this principle when considering the constitutionality of unilateral secession by Quebec. See In the Matter of Section 53 of the Supreme Court Act, RSC, 1985. S–26 2 SCR 217. Russell Mathews, Revenue Sharing in Federal Systems (1980). Preston King, The Federal Solution and Federation (1982); see also Kenneth Wheare, Federal Government (1963). Eghosa Osaghae, ‘Federalism in Comparative Perspective’ (1997) 16 Politeia 1 at 1. Christine Fletcher, Trapped in Civil Society: Aborigines and Federalism in Australia (1996) at . See also Fletcher, Does Federalism Safeguard Indigenous Rights? (1999); Eghosa Osaghae, ‘A Reassessment of Federalism as a Degree of Decentralization’ (1990) 20 Publius: The Journal of Federalism 83–98. For the value of viewing questions of constitutionalism from the perspective of the struggles of Indigenous peoples, see James Tully, Strange Multiplicity: Constitutionalism in the Age of Diversity (1995). Albert Dicey, Introduction to the Study of the Law of the Constitution (1st ed 1885, 10th ed 1959) at 141. James Tully, ‘The Struggles of Indigenous Peoples for and of Freedom’ in Duncan Ivison, Paul Patton & Will Sanders, Political Theory and the Rights of Indigenous Peoples (2000) at 52. The Commonwealth Constitution was amended to enable the Commonwealth Parliament to make special laws for Indigenous Australians. Martin Painter, Collaborative Federalism (1998) at 44. Australian Government, CoAG Indigenous Trials: <http://www.indigenous.gov.au/coag/ about.html> (3 May 2006). Ibid. CoAG Communiqué, 5 April 2002: <http://www.coag.gov.au/meetings/050402/index.htm# reconciliation> (16 October 2005). At Senate Estimates Committee reviews, it has been revealed that, despite regular promises, no system of evaluation has been established for these trials and that it is not clear who is responsible for creating and implementing the evaluations – separate government departments or the newly formed Office for Indigenous Policy Coordination (hereafter ‘OIPC’) which was established in the wake of the abolition of ATSIC. See, ‘CoAG: A Black Hole of Govt Approach’ National Indigenous Times (10 Nov 2005). The Nunavut Treaty covered the eastern part of the Canadian North West Territories, was on federal land and the negotiations were with the Federal Government alone. The new territory of Nunavut came into being on 1 April, 1999 after negotiations which, according to the Canadian Human Rights Commission, began in 1971: <http://www.chrc-ccdp.ca/publications/1999_ar/ page8-en.asp> (9 August 2006). The negotiations led to the passing of the Pitjantjatjara Land Rights Act 1981 (SA). See Heather McRae, Garth Nettheim, Laura Beacroft & Luke McNamara, Indigenous Legal Issues: Commentary and Materials (3rd ed, 2003) at 220–222. For example, the Native Title Act 1993 (Cth) withstood a challenge to its validity by the Western Australian State government in 1995. See Western Australia v Commonwealth HCA 47; (1995) 183 CLR 373. The Western Australian State Government had passed an act which purported to extinguish native title and replace with with a statutory right. The legislation was held to be inconsistent with the Native Title Act 1993 (Cth) under s109 of the Constitution and therefore to be inoperative. There are considerable differences in the recognition afforded to Indigenous land rights in state grants. For example, the High Court has held that pastoral leases in Qld, WA and NSW all have different impacts on native title rights. Compare Wik Peoples v Queensland (1996) 187 CLR 1; Anderson v Wilson (2002) 213 CLR 401; and Ward v Western Australia (2002) 213 CLR 1. There are also different ways and different extents to which Indigenous lands are protected under state legislative schemes. For example, all states except Western Australia have passed some form of land rights legislation. See, for example Bain Attwood, Telling the Truth about Aboriginal History (2005); Henry Reynolds, The Other Side of the Frontier: An Interpretation of the Aboriginal Response to the Invasion and Settlement of Australia (1st ed, 1981); Lyndall Ryan, Aboriginal Tasmanians (1st ed, 1981); Raymond Evans, Kay Saunders & Kathryn Cronin, Race Relations in Queensland: A History of Exclusion, Exploitation and Extermination (1st ed, 1988). Most famously in Mabo, above n21. In Nulyarimma v Thompson FCA 1192; (1999) 165 ALR 621, Justice Crispin of the Supreme Court of the ACT provided a sweeping history of violence against Aboriginal peoples in the colonial period. Native title claims in the Federal Court have given rise to further judicial pronouncements on the impact of colonisation in regions throughout Australia. See, for example Yorta Yorta Aboriginal Community v Victoria, above n22 (Olney J); Ward v Western Australia, above n55 (Lee J). Mabo, above n21 at 38–42 (Brennan J), 101–103 (Deane & Gaudron JJ). See generally Peter Russell, Recognising Aboriginal Title: the Case and Indigenous Resistance to English-Settler Colonialism (2005) at chapter 5. Royal Commission into Aboriginal Deaths in Custody: National Report (1991) at 510. In fact, policies of removing children for the purpose of assimilation occurred much earlier than this. The Human Rights and Equal Opportunity Report, Bringing Them Home, concluded that in the period from 1910 to 1970, between 10–30 per cent of Indigenous children were forcibly removed from their families and communities: Human Rights and Equal Opportunity Commission, Bringing Them Home: Report of the National Inquiry into the Separation of Aboriginal and Torres Strait Islander Children from their Families (1997) (hereafter Bringing Them Home) at chapter 2. For a history of Indigenous claims and policy responses in Australia up to the 1970s, see Heather Goodall, Invasion to Embassy: Land in Aboriginal Politics in New South Wales 1770–1972 (1996). Aboriginal and Torres Strait Islander Commission, As a Matter of Fact: Answering the Myths and Misconceptions about Indigenous Australians (1999) at 10 (hereafter As a Matter of Fact). See Ann Curthoys, Freedom Ride: A Freedom Rider Remembers (2002). See, for example William Deane, ‘Some signposts from Daguragu’ (1997) 8 Public LR 15; Bain Attwood, ‘The Articulation of ‘land rights’ in Australia: The Case of Wave Hill’ (2000) 44 Social Analysis 3. In 1927, Fred Maynard wrote to the NSW Premier, Jack Lang, with a claim for land for Indigenous peoples and for control of Aboriginal affairs to be transferred to a board of management ‘comprised of capable, educated aboriginals under a chairman appointed by the Government.’ Letter dated 3 October 1927, reproduced in Bain Attwood & Andrew Markus, The Struggle for Aboriginal Rights: A Documentary History (1999) at 66–67. In 1935 Aboriginal people in South Australia requested that a Board of Management be appointed, which would include an Aboriginal representative. In 1938, a request was made of the Commonwealth Government to appoint a Commonwealth Ministry for Aboriginal Affairs. It was suggested that an advisory board of six persons, three of them Aboriginal, be established to advise the minister: see Attwood & Markus, The Struggle for Aboriginal Rights at 39. Aboriginal Councils and Associations Act 1976 (Cth). A Bill to repeal this Act, the Corporations (Aboriginal and Torres Strait Islander) Bill 2005 (Cth), is currently before the Commonwealth Parliament. Such as the Aboriginal Land Rights Act 1983 (NSW); Aboriginal Land Act 1991 (Qld); Aboriginal Lands Act 1995 (Tas); Aboriginal Lands Trust Act 1966 (SA); Aboriginal Lands Act 1991 (Vic). Western Australia does not have Aboriginal land rights legislation. For a review and discussion of these and other legislative schemes, see Frith Way with Simeon Beckett, ‘Land Holding and Governance Structures under Australian Land Rights Legislation’, Discussion Paper 4 in Garth Nettheim, Gary Meyers & Donna Craig, Australian Research Council Collaborative Research Project, Governance Structures for Indigenous Australians On and Off Native Title Lands (1998). See, for example Local Government Act 1993 (NT); Local Government (Community Government Areas) Act 2004 (Qld). The most recent momentum for a treaty surrounded the work of the Council for Aboriginal Reconciliation in the 1990s. One of the chairs of the Council for Reconciliation, Patrick Dodson, advocated a treaty in a series of public lectures at this time. See, for example Patrick Dodson, ‘Beyond the Mourning Gate – Dealing with Unfinished Business’ (2000). Since 2000, there has been continued academic interest in the notion of a Treaty, but the political momentum seems absent at the present time. See, for example Brennan et al, above n29; Marcia Langton, Lisa Palmer, Maureen Tehan & Kathryn Shain, Honour Among Nations? Treaties and Agreements with Indigenous People (2004). In the Hands of the Regions, above n1. Peter Shergold, Secretary, Department of the Prime Minister and Cabinet quoted in Department of Immigration and Multicultural and Indigenous Affairs, New Arrangements in Indigenous Affairs (2005): <http://www.oipc.gov.au/About_OIPC/new_arrangements.asp> (14 December 2005). Senator Amanda Vanstone, Press Release (11 July 2005). Senator Amanda Vanstone, ATSIC Now History – A Better Future Ahead for Indigenous Australians Press Release (24 March 2005). Office of Indigenous Policy Coordination: <http://www.oipc.gov.au/About_OIPC/ Indigenous_ Affairs_Arrangements/4Administration.asp> (14 December 2005). Senator Amanda Vanstone, ‘Minister Accounces New Indigenous Representation Arrangements’ Press Release (29 June 2005). Office of Indigenous Policy Coordination: <http://www.oipc.gov.au/About_OIPC/ Indigenous_ Affairs_Arrangements/7IndigenousRegionalRepresentation.asp> (14 December 2005). ‘Regional Partnership Agreements’: <http://www.indigenous.gov.au/rpa/wa/warpanov0501.pdf.> (12 December 2005). The figure of 1300 communities is taken from Australians for Native Title and Reconciliation, ‘Shared Responsibility Agreements – A Critique’: <http://www.antar.org.au//index.php? option=com_content & task=view & id=96 & Itemid=105> (9 August 2006). Australians for Native Title and Reconciliation, ‘Shared Responsibility Agreements – A Critique’: <http://www.antar.org.au/shared_resp_agreemts.html> at 12 December 2005. 1829; R v Murrell and Bummaree, Supreme Court of New South Wales, Forbes CJ, 5 February 1836, published in Sydney Herald, 8 February 1836; R v Bonjon, Supreme Court of New South Wales, Willis J, 16 September 1841, published in Port Phillip Patriot, 20 September 1841. See also R v Ballard, R v Murrell and R v Bonjon AILR 27. See R v Ballard or Barrett, Supreme Court of New South Wales, Forbes CJ, 21 April 1829, published in Sydney Gazette, 23 April Attorney-General (NSW) v Brown (1847) 1 Legge 312; Cooper v Stuart UKLawRpAC 7; (1889) 14 App Cas 286. Milirpum v Nabalco Pty Ltd (1971) 17 FLR 141 (hereafter Milirpum). Id at 272–73 (Blackburn J). Section 1A of the Amended Statement of Claim in Coe v Commonwealth, above n19, reproduced in the judgment of Gibbs J at 120. Section 3B of amended statement of claim in Coe v Commonwealth, above n19, reproduced in the judgment of Gibbs J at 121. Coe v Commonwealth, (No 1), above n19 at 136 (Jacobs J). Mabo, above n21 at 32–42 (Brennan J), at 95–99 (Deane & Gaudron JJ). Id at 86–95 (Deane & Gaudron JJ). Wik Peoples v Queensland, above n55 at 182 (Gummow J). See Jeremy Webber, ‘Beyond Regret: Mabo’s Implications for Australian Constitutionalism’ in Duncan Ivison et al, above n46; Lisa Strelein, ‘Conceptualising Native Title’ (2001) 23 Syd LR . In particular, under ss55–57 of the Native Title Act 1993 (Cth), a successful native title claimant group must register as a ‘Prescribed Body Corporate’ to manage its native title interest. The main cases were Wik Peoples v Queensland, above n55; Fejo v Northern Territory HCA 58; (1998) 195 CLR 96; Ward v Western Australia, above n55, Commonwealth v Yarmirr (2001) 208 CLR 1; Yorta Yorta Aboriginal Community v Victoria, above n22. Native Title Act 1993 (Cth) at ss55–57. See generally Christos Mantziaris & David Martin, Native Title Corporations: A Legal and Anthropological Analysis (2000). For example, the Noongar peoples have registered a joint native title claim over most of the South-West corner of the Western Australian State. National Native Title Tribunal, ‘Noongar People Lodge United Native Title Claim in South West WA’ Press Release (10 September 2003): <http://www.nntt.gov.au/media/1063172786_2824.html> (15 December 2005). See generally Diane Smith & Julie Finlayson (eds), Fighting Over Country (1997). Brennan et al, above n29 at chapter 6. See, for example the United States of America, Canada, South Africa, Norway, and New Zealand. See, for example Iris Young, Justice and the Politics of Difference (1990). Will Kymlicka, Multicultural Citizenship: A Liberal Theory of Minority Rights (1995). See, for example Fred Myers, Pintupi Country, Pintupi Self: Sentiment, Place and Politics Among Western Desert Aboriginies (1986); Deborah Rose, Nourishing Terrains: Australian Aboriginal Views of Landscape and Wilderness (1996); Helen Verran, ‘Re-imagining Land Ownership in Australia’ (1998) 1 Postcolonial Studies 237; Stephen Muecke, Kim Benterrak & Paddy Roe, Reading the Country: An Introduction to Nomadology (1984); Alexander Reilly, ‘Cartography, Property and the Aesthetics of Place: Mapping Native Title in Australia’ (2004) 34 Studies in Law, Politics and Society 221. See generally, Janna Thompson, Taking Responsibility for the Past: Reparation and Historical Injustice (2002). Jeremy Waldron, ‘Superseding Historic Injustice’ (1992) 103 Ethics 4. Duncan Ivison, Postcolonial Liberalism (2002) at 100. For an analysis of the limitations of liberal theory in this regard, see id at 14–48. Will Kymlicka, Liberalism, Community and Culture (1989) at 135. Id at 151–152. Kymlicka, above n99 at 86. Ivison, above n103 at 103. Id at 16–23. See, for example Patrick Dodson, above n68; Mudrooroo, Us Mob : History, Culture, Struggle: An Introduction to Indigenous Australia (1995); Alice Nannup, Lauren Marsh & Stephen Kinnane, When the Pelican Laughed (1992). James Tully, above n44 at 8. Ivison, above n103 at 80–81. See Thomas Hobbes, Leviathan (1996); John Locke, Two Treatise of Government (1988). Kymlicka, above n99; above n105. Iris Young, above n98. Anne Phillips, Politics of Presence (1995). A body of literature has recently picked up on the work of Carl Schmitt arguing for a return to the political, by which is meant, the return of more radical and conflicting ideas in political discussion. See for example, Chantal Mouffe, Democratic Paradox (2000); John McCormick, Carl Schmitt’s Critique of Liberalism: Against Politics as Technology (1997); Jacques Derrida, Politics of Friendship (1997). Membership is defined in terms of ‘citizenship’. See Commonwealth Electoral Act 1918 (Cth) s99A. See, for example Parliamentary Electorates and Elections Act 1912 (Cth), Part III ‘Qualification of Electors’; Commonwealth Electoral Act 1918 (Cth), Part VII. There is a special provision for ‘itinerant electors’ in the Commonwealth Electoral Act who can apply to be on the electoral role in a particular state despite not satisfying the residence requirement. See Commonwealth Electoral Act 1918 (Cth), s96. Road Transport (Driver Licensing) Regulation 1999 (NSW) s16(1)(b). Mabo, above n21 at 61. Western Australia v Ward, above n55 at 379 (Beaumont & von Doussa JJ). Shaw v Wolf FCA 389; (1998) 83 FCR 113; Gibbs v Capewell, Australian Electoral Commission and Minister for Aboriginal and Islander Affairs (1995) 128 ALR 577. Ibid. Shaw v Wolf, above n123 at 117–122. Commonwealth Constitution s51(xxvi). See Brennan J in Commonwealth v Tasmania HCA 21; (1983) 158 CLR 1 at 253: ‘ “Race” is not a term of art; it is not a precise concept: see Ealing London Borough Council v Race Relations Board per (Lord Simon of Glaisdale). There is, of course, a biological element in the concept. The UNESCO studies on race and racial discrimination reveal some difficulty in giving a precise definition even to this element.’ See Loretta De Plevitz & Larry Croft, ‘Aboriginality Under the Microscope: The Biological Descent Test in Australian Law’ (2003) 3 QUTLJT 104. Shaw v Wolf, above n123. Id at 137. Commonwealth Grants Commission, Report on Indigenous Funding 2001 (2001) at xv. Id at xv. Id at xviii. Mathews, above n40. ATSIC programs fell into this category of funding. Commonwealth Constitution s81. See Combet v Commonwealth (2005) 221 ALR 621; Attorney General Victoria: Ex rel Dale v Commonwealth HCA 30; (1945) 71 CLR 237. ATSIC, As a Matter of Fact, above n61 at 20. The audit cleared 95 per cent of organisations for further funding. Where there were problems, it was generally the lack of experience in managing finance, and the size of the organisations that was the cause. Ibid. Id at 26. Larissa Behrendt, ‘Indigenous Self-determination : Rethinking the Relationship Between Rights and Economic Development’ UNSWLawJl 70; (2001) 24 UNSWLJ 850; Sean Sexton, ‘Law, Empowerment and Economic Rationalism’ (1996) 3 Aboriginal Law Bulletin 12; Jo Altman, ‘Economic Development and Indigenous Australia: Contestations over Property, Institutions and Ideology’: <http://www.anu.edu.au/caepr/Publications/topical/Altman_Economic_Development_2004.pdf (15 December 2005). See generally, Aboriginal Land Rights (Northern Territory) Act 1976 (Cth); Pitjantjatjara Land Rights Act 1981 (SA); Maralinga Tjarutja Land Rights Act 1984 (SA); Aboriginal Land Rights Act 1983 (NSW); Aboriginal Land Grant (Jervis Bay Territory) Act 1986 (Cth); Aboriginal Land Act 1970 (Vic); Aboriginal Land Act 1991 (Qld); Aboriginal Lands Act 1995 (Tas). For a discussion of lands rights administration in New South Wales, including the role of the NSWALC, see Linda Pearson, ‘Aboriginal Land Rights Legislation in New South Wales’ (1993) 10 Environmental and Planning Law Journal 398; Meredith Wilkie, Aboriginal Land Rights in NSW (1985). See for example, Richard Bartlett, ‘The Proprietary Nature of Native Title’ (1998) 6 APLJ 77; Noel Pearson, ‘From Remnant Title to Social Justice’ (1993) 65(4) Aust Q 179; Lisa Strelein, ‘Conceptualising Native Title’ SydLawRw 4; (2001) 23 Syd LR 95. See generally, Fejo v Northern Territory, above n91; Ward v Western Australia, above n55; Commonwealth v Yarmirr, above n91; Yorta Yorta Aboriginal Community v Victoria, above n22. Ward v Western Australia, above n55 at 184–5 (Gleeson CJ, Gaudron, Gummow & Hayne JJ), 244–245 (Kirby J). AustLII:
http://www5.austlii.edu.au/au/journals/SydLawRw/2006/20.html
Kirsty Gover received her JSD from NYU School of Law in 2008. She went on to become a senior lecturer at the University of Melbourne in 2009. Her research and publications address the law, policy and political theory of indigenous rights, institutions and jurisdiction. She is interested in the role played by ‘indigeneity’ in the constitutionalism of settler societies, and in the importance of indigenous concepts of law and politics in settler state political theory and international law. Dr. Gover is the author of Tribal Constitutionalism: States, Tribes and the Governance of Membership (Oxford University Press 2010). She is currently working on a book entitled: When Tribalism meets Liberalism: Political Theory and International Law (Oxford University Press, 2014), examining the ways in which indigenous self-governance influences the development of international law and international legal theory by altering the behaviours of states. Dr Gover is a graduate of New York University (NYU) JSD Doctoral Program, where she was an Institute for International Law and Justice (IJIL) Graduate Scholar and New Zealand Top Achiever Doctoral Fellow. She is Co-Director (with Mark McMillan) of Melbourne Law School’s Indigenous Peoples in International and Comparative Law Research Program, and Chair of the Staff Equity and Diversity Committee.
https://www.iilj.org/iilj-alumni/kirsty-gover/
Everson, Michelle (2012) A technology of expertise: EU financial services agencies. LSE 'Europe in Question' discussion paper series (49/2012). The London School of Economics and Political Science, London. | | | PDF | Download (807kB) | Preview Abstract The collapse of Lehman Brothers in 2008 ushered in a financial crisis whose ramifications are still being felt. Within the EU, collapse not only led to a change in regulatory rhetoric, emphasising the need to secure the stability of EU money markets, but also to a significant widening and deepening of technocratic supervisory structures for European financial services. This paper accordingly investigates the newly established European System for Financial Supervision and, in particular, semi-autonomous EU agencies for banking, insurance and securities, for its ability to provide robust regulation and supervision within Europe. However, it analyses this increase in technocratic governance at supranational level in light of the worrying question of whether it has undermined capacity for political action within Europe. At a time when readily-apparent failings in established technocratic governance in Europe (monetary union) have led only to more technocratisation (proposed fiscal union), perhaps to the point of systemic collapse, the general European trend to expertled and evidence-based supervision must be doubted; not simply because it has failed on its own terms, but also because it has established a technology of expertise, or dominant rationality, which further encourages abdication of political responsibility for economic crisis.
http://eprints.lse.ac.uk/53203/
A town in Mexico recently celebrated seven years since kicking out the corrupt narco government and reverting back to an indigenous form of self-governance. In the town of Cherán, in Michoacán, Mexico, a system of traditional indigenous law-enforcement and accountability continues to guide the people. In early 2011, residents of Cherán created armed militias to fight off illegal logging and drug cartels in their community. The community kicked out politicians and police accused of ties to the drug cartels and began a new system of governance based on Purhépecha traditions. On April 15 of this year, Cherán celebrated seven years since their revolt against what they call “the narco government”. The people marked the seventh year of self-governance by naming third Council of Elders. Will the 2nd Amendment Be Destroyed By the Biden Admin? “The narco government included a wide variety of characters, including cartel thugs or “sicarios” working alongside illegal loggers who conspired to ravish Cherán’s forests and anyone who got in their way. Cherán lost over 50 community members between 2007 and 2011. Many of those simply disappeared, never to be seen again. When Cherán rose up, the local mayor, his cabinet, and all the local police fled the community and left community members to fend for themselves. This and many other details that would come to light during first months of the uprising exposed the collusion of local politicians and the police with organized crime and the very violent and illicit logging activity.” Once the corrupt police and politicians left, the community collected the weapons, vehicles, and uniforms and established their own “ronda comunitaria” or community guard. When the uprising first began you might see elderly women with sticks defending the community. These days the community guard is mostly young men and women with professional weapons. Seven years later and Cherán has one of the lowest levels of violence in all of Mexico. Quite an accomplishment while living in the violent state of Michoacán. “[Cherán’s] main achievement has been peace. It has the lowest homicide rate in all of Michoacán – and maybe all of Mexico outside of [the south-eastern state of] Yucatán, ” Benjamín Fernández, a sociologist at the Centre for Research and Higher Studies in Social Anthropology (Ciesas), told The Guardian. “The only thing the parties have done is divide us,” said Salvador Ceja, Cherán’s communal lands commissioner. “Not just here – in the entire country.” Shortly after the uprising, all cell phone, television, and radio service were reportedly shut off, disconnecting the people from the rest of the world. In this space, the people of Cherán came together to organize nightly “fogatas’, or campfire barricades, which became the central meeting points for organizing. During this process the community came to a consensus and agreed to return to their traditional forms of self-governance using a collective decision making process that continues today. “The fogatas met every night during the uprising,” TV Cheran reported. “Each fogata would send proposals and a representative to neighborhood assemblies and then to community assemblies. The fogata element of the communal government in Cherán was the only new element.” The neighborhood assemblies and the larger general assembly are examples of traditional forms of self-governance that were practiced in Cherán 40 years earlier. However, over time political parties and external forms of governance were forced on the people. While the community guard is by no means a perfect institution it does offer benefits to the locals that were not available under the police or cartels. Local business owners are no longer forced to pay several hundred dollars a month to criminals. The community guard is accountable to the town assembly and chosen by the people. This model is closer to traditional indigenous governance systems than what we are used to seeing in most modern cities. However, it offers a window into a different possibility that awaits for those individuals and communities that are willing to take their lives and their governance, back into their own hands. When the people are forced to either accept violence or defend their homes, it seems obvious they will organize and fight. Courtesy of The Free Thought Project Derrick Broze is an activist, investigative journalist, public speaker, and author based in Houston, Texas. He is the founder of The Conscious Resistance Network and the co-author of The Conscious Resistance trilogy with fellow TFTP writer John Vibes. Broze’s work focuses on surveillance technology, indigenous struggles, and generally uncovering the lies and omissions of the corporate media. Your Daily Briefing: Fight Online Censorship! Get the news Google and Facebook don't want you to see: Sign up for DC Dirty Laundry's daily briefing and do your own thinking!
https://dcdirtylaundry.com/city-kicked-out-their-cops-and-politicians-7-years-ago-and-now-they-have-the-lowest-crime-in-mexico/
- This event has passed. Intermediate Indigenous Business and Economic Development | In Person Overview Building effective economic policy will help achieve more successful, sustainable, and self-determined economic activity. In this program, fundamental issues of governance, such as the creation of culturally appropriate governmental institutions and the role of Indigenous leaders in effectively planning, creating, and promoting economic policy for self-determined Indigenous development will be examined. Having determined these foundations, the program will shift focus to the realities of doing business with Indigenous communities, Indigenous-owned companies and institutions, and individual Indigenous entrepreneurs. This program fulfills the requirements for the Certificate of Indigenous Leadership, Governance, and Management Excellence. What does the program offer? Review of the Harvard Project on American Indian Economic Development Nation-building: tools, policies, and leadership for Indigenous governments Rethinking Indigenous economic policy; insights and implications Case study presentations of “Best Practices” in Indigenous economic policy and Indigenous governance made by invited representatives Taking steps towards Nation-building: asserting self-governance, building institutions, setting strategic direction, and taking action through strong leadership Separating politics and business – a community necessity Community economics model from an Indigenous perspective All aspects of community economic development and business planning Financing Indigenous economic ventures Who should register? First Nations, Métis, and Inuit economic development corporations and officers Leaders responsible for the political and economic future of their Nation – executive, legislative, and programmatic Leaders who are in the forefront, developing a local economy by assisting businesses and economic development in their communities, organizations, and commercial enterprises Anyone interested in Indigenous business and economic development opportunities This program prioritizes Indigenous learners, and those working for Indigenous communities and organizations. Financial aid available, please apply online through the registration process.
https://www.aptncommunity.ca/event/intermediate-indigenous-business-and-economic-development-in-person/
The central government building in Pristina, Kosovo, is made almost entirely of glass. A former bank, it was renovated after the violent Serbian conflict in 1999 to symbolize Kosovo’s hopes for economic prosperity and transparent governance. But the view from the northwest side reflects a different reality: A row of run-down and decaying residences stand testament to a long history of political repression. This image contains both the hope and the challenge of Kosovo’s future. I observed these contradictions two summers ago—as preparations for an independent future first began—when I was fortunate enough to work for a development organization in Kosovo. Despite the many challenges of post-conflict reconstruction, Kosovo’s committed leaders and democratic spirit persuaded me that this tiny nation could thrive. On Sunday, Kosovo’s hopes became a reality as the mountainous, predominately ethnic-Albanian enclave became the latest in a long line of Balkan states to assert its independence from Serbian rule. Already, the news has created division among members of the world community: The United States and most major European nations, including 20 members of the European Union, have endorsed Kosovo’s sovereignty. Meanwhile, nations with significant separatist movements of their own, including Russia, have sided with Serbia and refused to recognize the split. Perhaps most significantly, Serbian President Boris Tadic announced that he will use diplomatic but not violent means to maintain his country’s territorial integrity. In rhetoric that deviates from the obstinate declarations of past Serbian leaders, this subtle concession to Kosovo’s self-governance is a hopeful sign for stability in the region. This is not Kosovo’s first taste of self-determination. The territory enjoyed some nominal autonomy as a Serbian province in the Yugoslav Federation, at times maintaining independent governing bodies and heads of state. When Yugoslavia dissolved into internal strife in the early 1990s, Kosovo publicly declared independence for the first time. That declaration, recognized only by neighboring Albania, helped spur repression in the region that culminated with ethnic cleansing directed by Serbia’s ultra-nationalist leader Slobodan Milosevic. After NATO intervention put an end to conflict in Kosovo in 1999, the territory became a United Nations Protectorate. Despite embracing a democratic interim constitution and suppressing widespread violence under U.N. care, it continues to be plagued by political corruption, ethnic tension, and stunted economic growth. Yet even with abundant barriers to a stable, multi-ethnic state, I found a vast reservoir of political will among shop owners, students, members of Parliament, and unemployed persons alike. It is this spirit that makes me confident of Kosovo’s ability to overcome the challenges of being an independent state. Kosovo’s largely grassroots effort in democratic governance is sustained by the commitment and tireless work of citizens, elected officials, and NGOs. Members of Parliament are not life-long politicians, but doctors, teachers, lawyers, and human-rights activists, each with a unique story about the dehumanizing effects of political repression. And as self-governance takes root, a new generation of Kosovars is preparing to lead: Nearly every college student I encountered was studying law or political science. This dedication to democracy has also extended past formal political institutions. A growing group of NGOs have developed government oversight capabilities, and in these community organizations, I frequently encountered Serbs and Albanians working together. Though unemployment is high in Kosovo, citizens maintain an unwavering commitment to meeting the conditions of European Union membership. In my conversations with both Serb civil-society leaders and Albanian party officials, the potential to participate in international economic and political alliances reliably outweighed bitterness about the past. In fact, the most striking sentiment I found among leaders and citizens alike was a desire to come to terms with the past by moving forward together—a sentiment that was echoed on Sunday by Prime Minster Hashim Thaçi as he reaffirmed Kosovo’s commitment to creating a multi-ethnic, non-discriminatory state. Independence will not be easy. The government will need to intensify its commitment to collecting small arms and disbanding violent groups. It must redouble its effort to return property and guarantee safe return for its displaced ethnic-Serbian citizens.Though institutional development will move this nation forward, the strength of its citizens’ commitment to pluralist democracy will determine its success. A nation of contradictions, Kosovo has seen some of the worst violence in Europe since World War II and still bears the scars of ethnic cleansing. Yet on Sunday it devoted itself to peaceful progress, democratic governance, and meaningful reconciliation. If the conciliatory text of Kosovo’s Declaration of Independence is any indication, the nation has a difficult but promising future ahead. Bridget Fahey is a fourth-year in the College majoring in political science.
https://chicagomaroon.com:443/article/2008/2/19/hope-for-kosovo/
Dark energy makes up nearly three-fourths of the universe, driving its accelerating expansion, but the substance is still mysterious to scientists that study it. In upcoming years, NASA has plans to investigate this powerful force with the new WFIRST-AFTA mission and a strong role in the European Space Agency's Euclid mission. "NASA has plans for a robust dark energy portfolio over the next decade," Jason Rhodes of the NASA Jet Propulsion Laboratory said during a news conference at the April meeting of the American Physics Society in Savannah, Georgia. [See amazing photos from a dark energy camera] 'A tripod of science' NASA's proposed Wide-Field Infrared Survey Telescope-Astrophysics Focused Telescope Assets, or WFIRST-AFTA, will use five probes to perform three complimentary surveys in its search to clarify the nature of dark energy. "WFIRST-AFTA is a survey mission to make the most precise measurements on the influence of dark energy and dark matter on the universe," Neil Gehrels, WFIRST project scientist of NASA's Goddard Space Flight Center, told Space.com by email. Type Ia supernovas are thought to form from the explosion of a white dwarf star. Because these powerful detonations all share similar brightness that can be viewed in distant galaxies, they are regarded as "standard candles" of cosmology. Recording how dim a supernova appears provides an indication of their distance. WFIRST-AFTA will survey nearly 3,000 Type Ia supernovas to determine how rapidly they are moving away from the Milky Way due to the expansion of the universe. Scientists think dark energy drives this expansion. "We can trace out how the universe is expanding more rapidly in the current epoch than earlier in the history of the universe and use that to constrain models of dark energy," Gehrels said. An artist's rendition of the proposed WFIRST-AFTA mission, which will study dark energy, extrasolar planets and objects in the near-infrared. The telescope will also perform a High Latitude Imaging Survey to determine the effects of dark matter structures on the light from distant galaxies. Einstein predicted — and scientists have subsequently confirmed—that massive structures bend the light coming from objects behind them, serving as a gravitational lens. Astronomers have used such natural telescopes formed by features such as massive galaxies to study objects throughout the universe. Dark matter works the same way, bending the light from galaxies that sit behind it. By searching for small distortions of galactic shapes, WFIRST-AFTA will allow scientists to determine the dark matter distribution along the lines of sight. The third dark energy survey planned for WFIRST-AFTA will study baryonic acoustic oscillations, or BAOs. Ripples of sound waves left over from the early universe grew into the larger structures of the universe over time. Accurately measuring the position and distance of a hundred million galaxies will map these disturbances to determine the evolution of dark energy over time. The three complimentary surveys combine to provide a broad portrait of dark energy. "The combined power of all these probes will give the best understanding of dark energy in the current universe and how it evolved with time as the universe expanded," Gehrels said. "WFIRST-AFTA is the only observatory, space or ground based, that combines all of these probes." Proposed to launch in the mid-2020s, WFIRST-AFTA is not searching solely for information about dark energy. Instead, it combines what Gehrels calls "a tripod of science." The telescope will also image planets outside the solar system and perform near-infrared surveys. Euclid In addition to its own mission, NASA will participate in the European Space Agency's Euclid mission. Last year, NASA nominated 40 American scientists to join the 14 American scientists already part of the international Euclid Consortium, the team responsible for the science, data production and instruments for the mission. NASA will also provide 16 infrared detectors for the telescope. An artist's view shows three different potential methods of forming Type 1a supernovae, the 'standard candles' used to measure the expansion of the universe. The first two panels show a white dwarf in a binary system accumulating matter from its larger companion. The panel on the right shows two white dwarfs colliding, a possible third scenario. Euclid's goal is to understand the nature of dark energy and its role in the expansion of the universe. To do so, it plans to use two complimentary probes to study the phenomenon. The first probe will study weak gravitational lensing, while the second will examine BAOs. Orbiting at the second Lagrangian point, Euclid will use two instruments to study a wide region of the sky free from the contaminating light from the solar system and the galaxy. It will also observe two "Euclid Deep Fields" of the early universe. [8 Baffling Astronomy Mysteries] Of the approximately 10 billion sources Euclid intends to observe, more than 1 billion will be studied for weak lensing, while tens of millions of galaxies will be measured for clustering caused by BAOs. "WFIRST-AFTA and Euclid will make complimentary observations, with WFIRST-AFTA observing fainter galaxies and Euclid observing more sky," Gehrels said. "The combined data set will be much larger and more accurate than any other BAO measurement." When combined with ground-based observations over a variety of wavelengths, the new observations that WFIRST-AFTA and Euclid will obtain should provide significant insights into dark energy and the expansion of the universe. "The best constraints on dark energy in the 2020s will come from a combination of Euclid, WFIRST and ground-based data," Rhodes said. Follow us @Spacedotcom, Facebook and Google+. Original article on Space.com.
https://www.huffpost.com/entry/nasa-dark-energy_n_5437168?utm_hp_ref=science
The spin of the Milky Way’s galactic bar has slowed by about a quarter since its formation, a new study has found. Despite astrophysicists having... New data on speed in which Universe is expanding Determining how rapidly the Universe is expanding is key to our cosmic fate, however, the current data is conflicting with previous estimates. The mysterious origins of solar-mass black holes Scientists led by the KIPMU have established the origins of solar-mass black holes and their connection to dark matter. Astrophysicists use stellar kinematics to investigate dark matter distribution A team of researchers have investigated the strength of dark matter scattered across the smallest galaxies in the Universe using stellar kinematics. New theory suggests the existence of a fifth dimension could explain dark matter Theoretical physicists speculate that the existence of a fifth dimension could solve many open questions in physics. Scientists suggest newly detected X-ray emissions from neutron stars could be evidence of axions As published in Physical Review Letters, evidence of long-sought hypothetical particles, known as axions, could be found in X-ray emissions. Astrophysicists mitigate gravitational lensing using self-calibration methods Scientists from the University of Texas at Dallas, USA, have demonstrated the first use of self-calibration to remove contamination from gravitational lensing signals, paving... Cosmologists successfully measure the amount of matter in the Universe A team led by scientists at the University of California, Riverside (UCR), USA, has precisely measured the total amount of matter in the Universe. As... Early Universe cosmology: theoretical models and observational data Mairi Sakellariadou, Professor of Theoretical Physics at King’s College London, discusses her research into early Universe cosmology. Professor Mairi Sakellariadou’s research into theoretical physics and... Mimicking antideuteron production in space at CERN Caitlin Magee of Innovation News Network speaks to Luciano Musa, senior physicist at CERN, about his latest work mimicking antideuteron production. Deuterium is one of... Searching for mysterious dark matter particles and the mass of neutrinos Solving the common puzzles of cosmology, dark matter particles, and the mass of neutrinos using sensitive experiments requires continuous technological progress and, in particular,... Technology in relativistic heavy ion collider physics research Professor John W Harris, from Yale University’s Wright Laboratory, outlines the development of accelerator technologies and the evolution in relativistic heavy ion collider physics... New material can mix matter with light A team of researchers at Freie Universität Berlin, Universität Hamburg, and Universidade Federaldo Ceará have developed a new material, demonstrating that they can mix... Astrophysicists have created the largest 3D map of the Universe The Sloan Digital Sky Survey (SDSS) has published a comprehensive analysis of the largest three-dimensional map of the Universe, revealing that six billion years... CEA – dark matter and dark energy shape the Universe Nathalie Palanque-Delabrouille explains how the Dark Energy Spectroscopic Instrument (DESI) will be able to address several of the most challenging questions of cosmology and... CERN, LHCb, Syracuse University and the search for New Physics Physicists from Syracuse University, working at the CERN Large Hadron Collider (LHC), discuss their involvement in the LHCb experiment and the search for evidence... The connection between galaxy size and dark matter Based on satellite galaxy simulations, scientist have made a stronger connection between the size of galaxies and the dark matter halos that surround them. Large... Studying the origin of cosmic rays for a new view of the high-energy sky The University of Maryland’s Department of Physics explores the high-energy universe with the HAWC Gamma Ray Observatory. One of the great mysteries of the last...
https://www.innovationnewsnetwork.com/tag/dark-matter/
First image of 'bridge' captured by Canadian astrophysicists. April 17, 2017, 9:45 p.m. Renaissance man Leonardo da Vinci once remarked: "Realize that everything connects to everything else." Now scientists are beginning to prove just how widely applicable this profound claim truly is. Researchers at the University of Waterloo in Canada have used a technique called weak gravitational lensing to capture the first visual representation of dark matter — that theoretical, seemingly invisible stuff that might make up as much as 84 percent of the universe. The image reveals what appears to be a "dark matter bridge" connecting two distant galaxies, a finding that could corroborate theories that imagine dark matter as a sort of cosmic web linking together galaxies across the universe, reports Wired. Gravitational lensing is an effect that causes the images of distant galaxies to warp slightly under the influence of some large mass. For instance, astronomers can become cued to the presence of black holes because of their strong lensing effect. The question that University of Waterloo researchers wondered was: Could the same technique be used to reveal the presence of dark matter bridges? It turns out, the answer is yes. The team constructed a composite image of more than 23,000 galaxy pairs that were spotted 4.5 billion light-years away. The dark matter bridges were most apparent between systems less than 40 million light-years apart. "For decades, researchers have been predicting the existence of dark matter filaments between galaxies that act like a web-like superstructure connecting galaxies together," explained Mike Hudson, a professor of astronomy at the University of Waterloo, in the journal Monthly Notices of the Royal Astronomical Society. "This image moves us beyond predictions to something we can see and measure." The existence of dark matter was first proposed to explain the rapid rotation rates of galaxies. If galaxies were only built from visible matter, then their gravitational force wouldn't be strong enough to hold them together while spinning so fast. So, theorists proposed, there must exist large quantities of invisible matter to compensate for the gravitational deficit of the visible matter. From this, astrophysicists have imagined a universe teeming with fine threads of this mysterious dark stuff, threads that may act as a sort of "cosmic scaffolding" that coordinate some of the large-scale movements of the heavens. To actually be able to "see" some of these dark matter bridges is profound indeed. The technique could be refined to more accurately map the distribution of dark matter throughout the universe, and perhaps eventually reveal clues about its mysterious design. The first image of a dark matter bridge has been captured by Canadian astrophysicists.
https://www.mnn.com/earth-matters/space/stories/cosmic-web-dark-matter-bridges-link-galaxies-across-universe
(Inside Science) – The universe is teeming with galaxies, but gravity distorts our view of them. Astrophysicists with the ongoing Dark Energy Survey have now collected giant catalogs of the distorted shapes of 24 million distant galaxies, making it possible to probe the underlying structure of the rapidly expanding universe. Dark Energy Survey scientists investigated the "cosmic web" of galaxies at least as big as the Milky Way — as well as the surrounding hidden clumps of dark matter. They presented their research findings on April 17 at a meeting of the American Physical Society in Salt Lake City. Dark matter cannot be seen directly, but just as an animal can infer the existence of a predator upon seeing its shadow, astrophysicists infer the distribution of dark matter by detecting its gravitational effects. According to Einstein's relativity theory, a massive object can warp the fabric of space-time, bending the light rays emanating from background galaxies and magnifying and stretching their images around them. There is between five and six times as much dark matter as regular matter, which includes galaxies, stars, nebulae and planets. But, a web of dark matter clumps fills the universe, implying that the "cosmic lenses" it creates can be found in every direction if you look deep enough. The lensing effects are extremely tiny, but collect enough images and scientists can run statistical studies on them. Astronomers from the survey have done just that. They sifted through millions of gigabytes of data and produced a preliminary map of the locations of 24 million galaxies, indicating which regions are densely packed with galaxies, each containing hundreds of billions of stars. "I can't describe how amazing this map is," said Michael Troxel, an astrophysicist at the University of Manchester, in the U.K. and member of the collaboration. Troxel and his colleagues are now at work using this detailed map of distorted galaxies to reconstruct the universe's dark matter scaffolding. In the process, they plan to construct the largest map of the dark matter distribution ever made. They aim to complete the project by the end of 2016. Their five-year survey, which began in 2013, uses a 570-megapixel camera mounted on the Blanco 4-meter telescope in the mountains of northern Chile. The collaboration includes more than 400 scientists from seven countries. By the end, it will have mapped out one-eighth of the entire night sky. In addition to studying the distribution of galaxies, Troxel and his colleagues also compared their map with measurements of the radiation left behind by the Big Bang, called the cosmic microwave background, which is measured by the South Pole Telescope and the Planck satellite. This allows the scientists to examine the connections between the early universe and the galaxies they see today. In particular, they seek to measure the universe's expansion rate as precisely as possible. True to its name, the Dark Energy Survey is being used to determine how mysterious "dark energy" is accelerating that expansion. So far, Troxel said, their findings are consistent with those of other astrophysicists obtained with Planck. But they're still concerned about uncertainties that could bias their conclusions. "We don't control the weather or the atmosphere," said New York University astrophysicist Boris Leistedt, another collaboration member. It's critical to control for these effects and make sure our data aren't affected by them, he said. His colleague, Ravi Gupta at Argonne National Laboratory, agrees. "This new era of precision cosmology presents new challenges," he said. Gupta studies not galaxies but supernovae, the explosions of dying stars, which the sensitive survey's camera also pick up. Since they understand how bright these explosions should look, every time they see a supernova go off, they can estimate how far away it is, and this gives them another probe of the expanding universe. Gupta and his team have recently observed dozens of "super-luminous" supernovae, up to 100 times brighter than the more common variety. They can be seen tens of millions of light-years away, and he hopes to use them to examine the expanding universe even deeper in its past. "Their ongoing challenge will be to calibrate their measurements and reduce their systematic uncertainties," said Shirley Ho, a Carnegie Mellon University astrophysicist not affiliated with the collaboration. She looks forward to the publication of the survey's large first-year data set and map, "which will be exciting for us to work with," she said. "The Dark Energy Survey scientists are among the first to constrain cosmology by correlating their gravitational lensing with the cosmic microwave background. That's really cool," Ho added.
https://www.insidescience.org/news/astrophysicists-probe-expansion-universe
Leading physicists convene in Tucson for conference on gravity More than three dozen leading physicists and astrophysicists will convene in Tucson for the conference, "Rethinking Gravity: from the Planck scale to the size of the Universe," Jan. 22 - 24, 2007. Scientists will meet at the Tucson Marriott University Park, 880 E. Second St., to discuss their common goal -- to probe and test gravity at all scales, from the subatomic level to the entire universe. It's believed to be the first meeting on the topic to draw scientists from so many diverse research fields. "Scientists have understood for several decades that Einstein's theory of gravity, which describes our universe at astronomical scales, is incompatible with quantum field theories, which describe phenomena at atomic scales," physicist Dimitrios Psaltis of The University of Arizona, a conference organizer, said. "Despite numerous efforts, scientists have yet to come up with a satisfactory quantum theory of gravity. "But our quest has become intensely exciting for two reasons," Psaltis said. "First, new ideas are challenging our previous notions of how the gravitational force works and pervades spacetime itself. And second, it is astonishing to realize that even though most of these ideas were unheard of a mere decade ago, they can be tested using present-day astronomical and cosmological observations," Psaltis said. "It is this exciting interplay of new theoretical ideas and new experimental tests that has ignited new interest in this field." Perhaps the most exciting new concept about gravity to emerge in the past decade is that the universe contains extra dimensions that can be detected only by gravitational force, Psaltis said. Other new ideas aim to explain the single most unexpected result of modern cosmological observations: the existence of a mysterious energy field that permeates the entire universe and accounts for three-quarters of all its energy -- so-called "dark energy." Another new line of theory attempts to explain "one of the deep mysteries of physics," Psaltis said: "Namely, why the gravitational force is so much weaker than the other fundamental forces, including the electromagnetic force which holds atoms and molecules together, or the strong force which holds nuclei together." Conference participants will discuss how modern technologies have opened the way to test the predictions of Einstein's theory in different contexts: - Astronomers are using the Hubble Space Telescope and powerful new ground-based telescopes to study supernovae in distant galaxies for a more accurate grasp of the "cosmological constant." Einstein added this term to his equations for general relativity, and scientists now believe that it describes the energy density of empty space. Nicholas Suntzeff of Texas A & M University will talk about dark energy with supernovae. The WMAP satellite (Wilkinson Microwave Anistropy Probe) has allowed astronomers to map the cosmic microwave background for stunning evidence that most of the universe is made up of mysterious dark energy. Eiichiro Komatsu of the University of Texas will talk about WMAP. - Modern ideas of gravity that go beyond general relativity predict deviations from Newtonian gravitational law at sub-millimeter distances. (A millimeter is 1/25 of an inch). Eric Adelberger of the University of Washington will present the latest findings from experiments on gravity at these miniscule distances. - Several current and planned NASA missions aim to test Einstein's theories in regimes that have never been observed before. Stanford University's Francis Everitt will discuss what to expect when scientists get first results from Gravity Probe B in a few months. Craig Hogan of the University of Washington will brief participants on the status of LISA, a planned space mission that will detect gravitational waves from supermassive blackholes. Nicholas White, director of the Astrophysics Science Division at NASA's Goddard Space Flight Center, will discuss NASA's "Beyond Einstein" initiative for the next two decades. The program involves building and launching several space missions that will test Einstein's theory of gravity in different astrophysical settings. - Recent results from several high-precision experiments that are testing the most fundamental aspects of Einstein's theory. Alan Kostelecky of Indiana University and Tom Murphy of the University of California-San Diego will discuss current limits on violations of such axioms as the Lorenz symmetry and the Equivalence Principle. Professor James Peebles of Princeton University will give a public talk for the UA Steward Observatory Evening Lecture Series at 7:30 p.m. Monday, Jan. 22. Peebles' talk, "The Expanding Universe," will be in the Steward Observatory lecture hall, room N210. "We have convincing evidence that our universe is expanding from a much hotter, denser state," Peebles said. "I will describe what is meant by the expansion of the universe, how people arrived at the evidence that this expansion really is happening, and some of the open questions still to be solved, notably the natures of the dark matter and dark energy that dominate the mass of the universe." Others to attend the conference include Clifford Will of Washington University, St. Louis, and Cliff Burgess of the Perimeter Institute, McMaster University. Will has led an international effort to test Einstein's theory of general relativity for the past three decades, and his book on the subject, "Theory and Experiments in Gravitational Physics," is the bible in the field. Burgess, one of the leading theorists studying the idea that the universe may contain extra dimensions that can be sensed only by gravity, is noted for his ability to explain the ideas in non-technical terms. "The most important aspect of this conference is that it brings together, for the first time, all these researchers from many difference research fields," Psaltis said. "New ideas born from different branches of physics -- high energy physics and cosmology, for example -- and many new experiments that involve very different physical systems and techniques that include table-top experiments, laser ranging with the moon, and gravity wave and other cosmological observations provide an unprecedented opportunity to test and understand the fundamental aspects of Einstein's theory of gravity."
https://phys.org/news/2007-01-physicists-convene-tucson-conference-gravity.html
More than three dozen leading physicists and astrophysicists will convene in Tucson for the conference, "Rethinking Gravity: from the Planck scale to the size of the Universe," Jan. 22 - 24, 2007. Scientists will meet at the Tucson Marriott University Park, 880 E. Second St., to discuss their common goal -- to probe and test gravity at all scales, from the subatomic level to the entire universe. It's believed to be the first meeting on the topic to draw scientists from so many diverse research fields. "Scientists have understood for several decades that Einstein's theory of gravity, which describes our universe at astronomical scales, is incompatible with quantum field theories, which describe phenomena at atomic scales," physicist Dimitrios Psaltis of The University of Arizona, a conference organizer, said. "Despite numerous efforts, scientists have yet to come up with a satisfactory quantum theory of gravity. "But our quest has become intensely exciting for two reasons," Psaltis said. "First, new ideas are challenging our previous notions of how the gravitational force works and pervades spacetime itself. And second, it is astonishing to realize that even though most of these ideas were unheard of a mere decade ago, they can be tested using present-day astronomical and cosmological observations," Psaltis said. "It is this exciting interplay of new theoretical ideas and new experimental tests that has ignited new interest in this field." Perhaps the most exciting new concept about gravity to emerge in the past decade is that the universe contains extra dimensions that can be detected only by gravitational force, Psaltis said. Other new ideas aim to explain the single most unexpected result of modern cosmological observations: the existence of a mysterious energy field that permeates the entire universe and accounts for three-quarters of all its energy -- so-called "dark energy." Another new line of theory attempts to explain "one of the deep mysteries of physics," Psaltis said: "Namely, why the gravitational force is so much weaker than the other fundamental forces, including the electromagnetic force which holds atoms and molecules together, or the strong force which holds nuclei together." Conference participants will discuss how modern technologies have opened the way to test the predictions of Einstein's theory in different contexts: - Astronomers are using the Hubble Space Telescope and powerful new ground-based telescopes to study supernovae in distant galaxies for a more accurate grasp of the "cosmological constant." Einstein added this term to his equations for general relativity, and scientists now believe that it describes the energy density of empty space. Nicholas Suntzeff of Texas A & M University will talk about dark energy with supernovae. The WMAP satellite (Wilkinson Microwave Anistropy Probe) has allowed astronomers to map the cosmic microwave background for stunning evidence that most of the universe is made up of mysterious dark energy. Eiichiro Komatsu of the University of Texas will talk about WMAP. - Modern ideas of gravity that go beyond general relativity predict deviations from Newtonian gravitational law at sub-millimeter distances. (A millimeter is 1/25 of an inch). Eric Adelberger of the University of Washington will present the latest findings from experiments on gravity at these miniscule distances. - Several current and planned NASA missions aim to test Einstein's theories in regimes that have never been observed before. Stanford University's Francis Everitt will discuss what to expect when scientists get first results from Gravity Probe B in a few months. Craig Hogan of the University of Washington will brief participants on the status of LISA, a planned space mission that will detect gravitational waves from supermassive blackholes. Nicholas White, director of the Astrophysics Science Division at NASA's Goddard Space Flight Center, will discuss NASA's "Beyond Einstein" initiative for the next two decades. The program involves building and launching several space missions that will test Einstein's theory of gravity in different astrophysical settings. - Recent results from several high-precision experiments that are testing the most fundamental aspects of Einstein's theory. Alan Kostelecky of Indiana University and Tom Murphy of the University of California-San Diego will discuss current limits on violations of such axioms as the Lorenz symmetry and the Equivalence Principle. Professor James Peebles of Princeton University will give a public talk for the UA Steward Observatory Evening Lecture Series at 7:30 p.m. Monday, Jan. 22. Peebles' talk, "The Expanding Universe," will be in the Steward Observatory lecture hall, room N210. "We have convincing evidence that our universe is expanding from a much hotter, denser state," Peebles said. "I will describe what is meant by the expansion of the universe, how people arrived at the evidence that this expansion really is happening, and some of the open questions still to be solved, notably the natures of the dark matter and dark energy that dominate the mass of the universe." Others to attend the conference include Clifford Will of Washington University, St. Louis, and Cliff Burgess of the Perimeter Institute, McMaster University. Will has led an international effort to test Einstein's theory of general relativity for the past three decades, and his book on the subject, "Theory and Experiments in Gravitational Physics," is the bible in the field. Burgess, one of the leading theorists studying the idea that the universe may contain extra dimensions that can be sensed only by gravity, is noted for his ability to explain the ideas in non-technical terms. "The most important aspect of this conference is that it brings together, for the first time, all these researchers from many difference research fields," Psaltis said. "New ideas born from different branches of physics -- high energy physics and cosmology, for example -- and many new experiments that involve very different physical systems and techniques that include table-top experiments, laser ranging with the moon, and gravity wave and other cosmological observations provide an unprecedented opportunity to test and understand the fundamental aspects of Einstein's theory of gravity."
https://phys.org/news/2007-01-physicists-convene-tucson-conference-gravity.html
From the tiniest fraction of a second after the Big Bang to the evolution of stars and galaxies over 13.8 billion years, ESA’s Planck space telescope has provided new insight into the history of our Universe. Although science observations are now complete, the legacy of the Planck mission lives on. Planck was launched in 2009 and spent 4.5 years scanning the sky to study the evolution of cosmic matter over time. Tomorrow, the Low Frequency Instrument will be switched off, having completed its science operations on 3 October. Planck’s High Frequency Instrument already ended its observations in January 2012, after a total of five all-sky surveys had been completed with both instruments. With some operational procedures to still take place, the spacecraft will finally be switched off next week. The most precise view of our Universe Earlier this year, cosmologists working on the Planck data delivered the most precise image of the cosmic microwave background – CMB, the relic radiation from the Big Bang that was imprinted on the sky when the Universe was only 380 000 years old. The CMB is the most accurate snapshot of the matter distribution in the early Universe. It shows tiny temperature fluctuations that correspond to regions of slightly different densities at very early times, representing the seeds of all future structure, the stars and galaxies of today. “Planck has delivered the most precise all-sky image of the CMB that is enabling us to test a huge variety of models of the origin and evolution of the cosmos,” says Jan Tauber, ESA’s Planck project scientist. “But long and meticulous work was required before we could start exploiting this wealth of cosmological information, since the CMB is hidden behind foreground glare including emissions from material within our own Galaxy, as well as from other galaxies and galaxy clusters.” For example, Planck has made the most extensive catalogue of the largest galaxy clusters, the most massive building blocks in our Universe. Planck has also identified the densest and coldest clumps of matter in our Galaxy, cool reservoirs of material from which new stars may be born in the future. But these are only two examples of the wide range of information that the Planck data archive has provided. New cosmic recipe Looking beyond the Milky Way and across cosmic history, Planck has redefined the relative proportions of the Universe’s constituent ingredients. Normal matter that makes up stars and galaxies contributes just 4.9% of the mass/energy density of the Universe. Dark matter, to date detected only indirectly by its gravitational influence on galaxies and galaxy clusters, is found to make up 26.8%, more than previous estimates. Conversely, dark energy, a mysterious force thought to be responsible for accelerating the expansion of the Universe, accounts for 68.3%, less than previously thought. The data also provided a new value for the age of the Universe: 13.8 billion years. Continue reading below Clues to the evolution of cosmic matter During these 13.8 billion years, light from the Big Bang crossing the Universe towards the Earth has encountered and interacted with cosmic structures that have formed since. One type of interaction results in gravitational lensing, the bending of light by massive objects like galaxy clusters. Just as light rays passing through a glass lens are bent and distort the image behind it, so the deflected CMB photons result in additional tiny distortions in the background CMB pattern. Astronomers were able to extract a map of this gravitational lensing effect covering the whole sky for the first time from the Planck data, providing a new way to probe the evolution of structure in the Universe over time. Additional insight into the formation of cosmic matter is also provided when the CMB photons encounter hot gas permeating galaxy clusters: the energy of the photons are modified in a characteristic way that allows scientists to identify galaxy clusters in detailed multicolour measurements of the CMB. Furthermore, this effect provides a way to detect faint filaments of gas that might connect one cluster to another. In the early Universe, filaments of gaseous matter pervaded the cosmos in a giant web, with clusters eventually forming at the densest nodes. Much of this tenuous, filamentary gas remains undetected, but cosmologists expect that it could be found between interacting galaxy clusters, where the filaments are compressed and heated up, making them easier to spot. Coming soon While the focus of the mission’s results has until now been on creating the most precise map of the CMB, Planck cosmologists are working hard to look even further back in time, to extract the details of the very first moments of the Universe’s existence. Less than a billionth of a billionth of a billionth of a second after it began, the Universe is thought to have undergone a rapid expansion called inflation. Scientists believe that during inflation, quantum fluctuations should have created a sea of so-called gravitational waves, which would be imprinted in a component of the CMB that is polarised – like the light we can see using polarised glasses. Finding such a signal in the CMB would provide confirmation of the inflation scenario, but in order to do this, cosmologists must complete an even more accurate removal of complex foreground contaminations that include polarised emission from our own Galaxy. “We could not be more satisfied with Planck’s performance and the results that it has achieved so far, but we are also eager to see what the polarisation data will tell us – next year will definitely be exciting for Planck,” adds Dr Tauber. More information On 21 October, Planck will burn the last of its fuel to ensure its long-term stable parking orbit is maintained. On 23 October, the spacecraft will finally be switched off. News stories will be published on the ESA Portal on both occasions. Read a more in-depth account of Planck’s key science highlights on ESA’s Science & Technology website on the following themes: Planck's cosmology Cosmic structure Through the Milky Way For further information, please contact:
http://m.esa.int/Our_Activities/Space_Science/Planck/Celebrating_the_legacy_of_ESA_s_Planck_mission
Three years ago, two teams of astronomers rocked the scientific world by finding evidence that the expansion of the universe is accelerating rather than slowing down as had generally been expected because of the gravitational attraction between the matter within it. According to these groups, the brightnesses of supernovae (massive exploding stars) they observed in remote galaxies require a universe filled with a strange kind of dark energy that causes it to accelerate increasingly faster into the infinite future. The concept of dark energy was first postulated by Einstein (who called it 'the cosmological constant'). But Einstein later referred to this idea as his greater scientific blunder since it spoilt the simplicity and elegance of his General Theory of Relativity. Since then, the cosmological constant has had a controversial history. The great Cambridge astronomer Sir Arthur Stanley Eddington was convinced of its existence, arguing that the cosmological constant distinguished between the vast size of the observable universe and the tiny scales of subatomic particles. But to most theoretical physicists the cosmological constant has seemed utterly mysterious and unnecessary, and many have been reluctant to accept the results of the supernovae teams. Now, a team of 27 astronomers led by Professor George Efstathiou of the University of Cambridge has published strong evidence for the existence of dark energy using an entirely different technique. They used the clustering pattern of 250,000 galaxies in a large volume of the universe surveyed with the Anglo-Australian Telescope at Siding Spring in New South Wales, Australia. By comparing the structure in the universe now, some 15 billion years after the Big Bang, with structure observed in the cosmic microwave background radiation, which preserved information about what the universe was like when it was only 300,000 years old, the Anglo-Australian team could apply a simple geometrical test to elucidate the composition of the universe. Their results show that the universe is full of dark energy, completely consistent with the earlier supernovae results. "It seems that Einstein did not made a blunder after all -- dark energy appears to exist and to dominate over more conventional types of matter" says Professor Efstathiou. "An explanation of the dark energy may involve String Theory, extra dimensions or even what happened before the Big Bang. At present nobody knows. The ball is now firmly in the theorists court."
https://spaceflightnow.com/news/n0203/22expansion/
Hubble confirms cosmic acceleration with distorted galaxies A comprehensive analysis of distorted galaxies from the most ambitious cosmic survey ever undertaken by the Hubble Space Telescope has confirmed the mysterious cosmic acceleration. It has also provided the equivalent of a 3D map of part of the Universe. A group of astronomers, led by Tim Schrabback of Leiden Observatory, conducted an intensive study of more than 446 000 galaxies within the Cosmological Evolution Survey (COSMOS) field. COSMOS is the largest survey conducted with Hubble, which photographed 575 slightly overlapping views of the same part of the Universe using its Advanced Camera for Surveys. In total, the survey took nearly 1000 hours of observations. In addition to the Hubble data, the researchers used ground-based observations to assign distances to 194 000 of the galaxies. "The sheer number of galaxies included in this type of analysis is unprecedented, but more important is the wealth of information we could obtain about the invisible structures in the Universe from this exceptional dataset," says team member Patrick Simon from Edinburgh University. According to theory, the invisible Universe consists of dark matter and dark energy. It is not known what either component is; yet astronomers believe that they exist because of their effects on the motion of celestial objects. Dark matter contributes more gravity to the Universe on smaller scales, while dark energy resists gravity on the larger scales. In the new analysis, the astronomers ‘weighed’ the large-scale matter distribution in space. This information is encoded in the distorted shapes of distant galaxies, a phenomenon referred to as ‘weak gravitational lensing’. The team’s new algorithms improve the standard method and measures galaxy shapes to an unprecedented precision. The meticulous detail and scale of this study has confirmed that the Universe is accelerated by an additional, mysterious component: the dark energy. Only a handful of other such independent confirmations exist. "Dark energy affects our measurements for two reasons. First, when it is present, galaxy clusters grow more slowly. Secondly, it changes the way the Universe expands, leading to more distant galaxies that are more efficiently lensed. Our analysis is sensitive to both effects," says team member Benjamin Joachimi, University of Bonn. This study is leading to a clearer map of this part of the Universe. "With more accurate information about the distances to the galaxies, we can measure the distribution of the matter between them and us more accurately," says team member Jan Hartlap, University of Bonn. "Before, most of the studies were done in 2D, like taking a chest X-ray. Our study is more like a 3D reconstruction of the skeleton from a CT scan," says William High from Harvard University, another team member. The astronomers specifically chose the COSMOS survey because it is thought to be a representative sample of the Universe. The results of the study will be published in an upcoming issue of Astronomy and Astrophysics. Astronomers will one day be able to apply these techniques to wider areas of the sky, forming a clearer picture of what is truly out there. Notes for editors: The Hubble Space Telescope is a project of international co-operation between ESA and NASA. Tim Schrabback of Leiden University led the international team of astronomers in this study. Other collaborators included: J. Hartlap (University of Bonn), B. Joachimi (University of Bonn), M. Kilbinger (IAP), P. Simon (University of Edinburgh), K. Benabed (IAP), M. Bradac (UCDavis), T. Eifler (University of Bonn), T. Erben (University of Bonn), C. Fassnacht (University of California, Davis), F.W. High (Harvard), S. Hilbert (MPA), H. Hildebrandt (Leiden Observatory), H. Hoekstra (Leiden Observatory), K. Kuijken (Leiden Observatory), P. Marshall (KIPAC), Y. Mellier (IAP), E. Morganson (KIPAC), P. Schneider (University of Bonn), E. Semboloni (University of Bonn), L. Van Waerbeke (UBC) and M. Velander (Leiden Observatory). Links View an image of the COSMOS field. Download the paper Evidence for the accelerated expansion of the Universe from weak lensing tomography with COSMOS.
http://www.esa.int/Our_Activities/Space_Science/Hubble_confirms_cosmic_acceleration_with_distorted_galaxies
invisible, and presently unknown, form. | Dark Energy is closely related to the idea of a Cosmological Constant introduced by Einstein over 80 years ago, but most astronomers, including Einstein himself, have always strongly doubted its reality. However, in the past 5 years several independent groups of astronomers have amassed evidence suggesting that Dark Energy exists and could well dominate the total energy of the Universe. Dark Energy only affects the properties of the Universe over very large distances and the observations which are sensitive to its presence, in particular studies of exploding stars in distant galaxies, are all close to the limit of current capabilities. Astronomers have therefore been keen to exploit many different tests and Dr. Ian Browne makes the point that "the new gravitational lens test is based on completely different physical arguments to the previous ones and so provides independent evidence in support of Dark Energy". When a quasar is gravitationally lensed by an intervening galaxy two or more images of the quasar are produced but they are hard to recognise as the images are less than one thousandth of a degree apart. The team therefore employed several of the world's most powerful radio telescope arrays to make radio pictures of thousands of distant quasars. Professor Peter Wilkinson points out that "we chose to use radio telescopes for our survey since they can pick out details many times finer than optical ones, even the Hubble Space Telescope". The census showed that about one out of every 700 distant quasars is lensed by a foreground galaxy. To calculate the fraction of the energy in the Universe which is Dark Energy Manchester's Dr. Kyu-Hyun Chae combined the gravitational lens statistics with the latest results on the numbers and types of galaxies in the Universe made with optical telescopes. The result which emerged is that around two thirds of the Universe's energy appears to be Dark Energy. The remaining third is made up of Dark Matter, whose form is presently unknown, and "ordinary" matter which makes up the stars and planets. For both of these forms of matter gravity acts as normal and attracts. In contrast Dark Energy has long-range anti-gravity properties and now appears to be causing the expansion of the universe to accelerate, rather than slow down as would be expected if gravity was the dominant force. While astronomers have no idea about what Dark Energy might be, these new results add to their growing confidence that it is real. Contact information: Dr. Ian Browne: University of Manchester, Jodrell Bank Observatory Telephone: UK (0)1477-572615 Email: [email protected] Professor Peter Wilkinson: University of Manchester, Jodrell Bank Observatory Telephone: UK (0)1477-572602 Email: [email protected] Professor Roger Blandford: California Institute of Technology, Dept of Astronomy Telephone: USA 626-395-4200 Email: [email protected] Dr. Kyu-Hyun Chae: University of Manchester, Jodrell Bank Observatory Telephone: UK (0)1477-572635 Email: [email protected] Information: Gravitational Lensing and the CLASS survey Galaxies, bend the paths of light (or radio waves) and can act as distorting lenses focussing the light from a more distant object e.g. a quasar, lying behind the lens. The first such gravitational lens was discovered by a team led by a Jodrell Bank astronomer Dennis Walsh in 1979. A brief illustrated introduction to gravitational lensing can be found at: http://www.jb.man.ac.uk/booklet/GravitationalLenses.html The gravitational lens survey referred to in the main text is called CLASS, which is an acronym for the Cosmic Lens All Sky Survey. A description of the survey and a montage of the radio images of all the CLASS gravitational lenses can be found at http://www.jb.man.ac.uk/research/gravlens/class/class.html The idea underlying CLASS was to make radio maps of very many distant radio sources looking for evidence of the splittings and distortions characteristic of gravitational lensing. Three major radio telescopes which were used in turn to make the census are: The Very Large Array (NRAO) in Socorro NM USA with each offering a unique combination of resolution and observing speed. The VLA (lowest resolution, highest speed) made the initial survey; MERLIN (higher resolution - similar to that of the Hubble Space Telescope) followed up promising candidates: the VLBA (highest resolution) followed up the candidates not ruled out by MERLIN. After this systematic sifting process the identification of the survivors as gravitational lenses was almost certain. However we then observed each of the survivors in the optical and infra-red bands with the Hubble Space Telescope; this invariably revealed the lensing galaxy and hence confirmed that we had indeed found a lens. By adopting such a rigorous protocol, which took many years follow through, the observing team is confident that the likelihood of any lenses being overlooked is small. Eventually CLASS found 22 cases of lensing, about 1 for every 700 radio sources examined. Full details of the CLASS survey are about to be published in the Monthly Notices of the Royal Astronomical Society and have just become publicly available on: http://xxx.soton.ac.uk/abs/astro-ph/?0211073 Dark Matter, Dark Energy and the Flatness of Space Dark Matter: is matter with normal gravitational properties but which does not emit sufficient electromagnetic radiation to be observed directly in any type of telescope. Large amounts normal matter (in the form of stars or hydrogen gas) in galaxies and clusters of galaxies, are seen to be moving so fast that they would escape, unless there is up to ten times more gravity than that of the normal matter itself. This additional gravity is ascribed to Dark Matter but what it consists of is currently unknown. Astronomers now favour the idea that the Dark Matter must be in the form of sub-atomic particles which do not interact strongly with normal matter. Searches for such particles are underway at many laboratories throughout the world. More about Dark Matter: Dark Energy: Einstein's General Theory of Relativity also allows for the existence of Dark Energy (also called the Cosmological Constant). This is a property of empty space that causes the universe to expand more and more rapidly. Unlike Dark Matter, whose effects can be seen within a single galaxy, Dark Energy only shows up in observations which probe significant fractions of the observable Universe. The accelerating expansion of space was discovered in the last few years by observations of distant supernovae but the observations are difficult and open to other interpretations. More about Dark Energy and the searches for it: The Flatness of Space: The General Theory of Relativity is based on the idea that matter and energy cause space to become curved. In curved space geometry works differently to normal flat (Euclidean) geometry: the angles of a triangle don't add up to 180 degrees. Einstein showed that the curvature of the entire universe depends on the amount of matter and energy in it. If the amount of matter/energy is just right, space is flat, and traditional school geometry does apply. Recent observations of the Cosmic Microwave Background Radiation (CMBR), which effectively measure the angles of a triangle, are showing that space is indeed flat. Both Dark Matter and Dark Energy contribute to the flatness of the universe but there is not enough Dark Matter to make the universe flat, so the CMBR results provide additional evidence that there must be a contribution from Dark Energy. Up-to-date information ("A New Picture of the Early Universe") on the results from a UK telescope (the Very Small Array) studying the CMBR can be found at: http://www.jb.man.ac.uk/news/vsa" The Importance of the New Gravitational Lensing Test Claims for new physical phenomena, such as Dark Energy, require very strong evidence to back them up. Since all the previously reported observations are close to the limit of current observational capabilities and depend on various assumptions about the properties of the Universe, it is vital to find new and independent ways to look for the effects of Dark Energy. The statistics of gravitational lensing provides such a test. The basis of the calculation is that the probability of a distant radio source being lensed by an intervening galaxy depends on the volume of the observable Universe and hence on the amount of Dark Energy. The lensing probability increases rapidly as the fraction of Dark Energy in the Universe increases. While additional results and assumptions are needed to infer the Dark Energy content, these are different and independent from those required by the other methods. The New Lensing Calculation Dr Kyu-Hyun Chae made a detailed analysis of lens statistics based on the final results from the 10-year CLASS census for gravitational lenses and the latest results on the numbers of galaxies in the Universe made with optical telescopes. In particular Dr. Chae noticed that the lensing cross-sections of galaxies (or, effective lens sizes) measured by the image splittings were smaller than previously thought, and consequently required a large amount of Dark Energy in the Universe for the observed rate of multiple image splittings to be compatible with the measured numbers and types of galaxies in the nearby universe. The new calculations now agree with the other methods, as a result of including much more extensive data: i.e. Dr. Chae's calculations assume that the average number of distant galaxies per unit volume of space is the same as that found locally. It is possible that the number of galaxies is less at high redshift but this would only serve to increase the amount of Dark Energy implied by the new results. It is also possible that the lens survey has missed some cases of lensing - but more lenses would again only increase the implied Dark Energy content. Our results therefore add strong, and completely independent support for a Universe dominated by Dark Energy (constituting about 70% of the energy in the Universe).
http://www.jb.man.ac.uk/news/2002/darkenergy/
Researchers say dark energy may be responsible for mysterious experimental signals Cambridge University Physicists Suspect Dark Energy May Confuse Results XENON1T experiment, a series of underground vats of xenon that are used to search for dark matter. Dark matter and dark energy are two of the most discussed problems in modern physics. Two darkness are placeholder names for the mysterious something which seem to influence the behavior of the universe and everything in it. Dark matter refers to the seemingly invisible mass that makes itself felt only due to gravitational effects. Dark energy refers to the as-yet unexplained cause of the accelerating expansion of the universe. It is believed that dark matter makes up about 27% of the universe, and dark energy 68%. according to NASA… Physicists have several ideas to explain dark matter: axions, WIMP, SIMP and primordial black holes, to name a few. But dark energy is much more mysterious, and now the team of researchers working on the XENON1T data says the unexpected excess in activity could be due to this unknown force, rather than any dark matter candidate. The team’s research was published this week in Physical Review D. The XENON1T experiment, buried beneath the Apennines in Italy, is tuned to stay as far away from any noise as possible. It consists of tanks of liquid xenon, which ignites upon interaction with a passing particle. As previously reported by Gizmodo, in June 2020, the XENON1T team reported that the project is seeing more interactions than it should be under the Standard Model of physics, which means it might detect theoretical subatomic particles like axions – or something might be wrong with experiment. “Such excesses are often by fluke, but from time to time they can also lead to fundamental discoveries,” said Luca Vizinelli, a researcher at the Frascati National Laboratories in Italy and co-author of the study at the University of Cambridge. release… “We investigated a model in which this signal could be associated with dark energy rather than the dark matter that the experiment was originally designed to detect.” G / O Media can get a commission “First we need to know that this was not just an accident,” added Vizinelli. “If XENON1T really saw something, you would expect to see a similar excess again in future experiments, but this time with a much stronger signal.” Despite the fact that dark energy makes up a significant part of the universe, it has not yet been identified. Many models suggest that there may be a fifth force beyond the known four known fundamental forces in the universe, one that is latent until you get to some of the largest-scale phenomena. how an ever faster expansion of the universe… Axions emanating from the Sun seemed like a possible explanation for the excess signal, but there were gaps in the idea, as it would require rethinking what we know about stars. “Even our sun would not agree with the best theoretical models and experiments as it does now,” said one researcher. said to Gizmodo last year… Part of the problem finding dark energy are “chameleon particles” (also known as solar axions or solar chameleons), named for their theoretical ability to change mass depending on the amount of matter around them. This would increase the mass of the particles when passing through a dense object such as Earth and will reduce their force on the surrounding masses, since New Atlas explained in 2019… A recent research group has built a model that uses chameleon screening to explore how dark energy behaves on scales much larger than the dense local universe. “Our chameleon shielding stops the production of dark energy particles in very dense objects, avoiding the problems faced by solar axions,” said lead author Sunny Vagnozzi, a cosmologist at the Kavli Institute of Cosmology in Cambridge, at the university. release… “It also allows us to separate what happens in the local very dense universe from what happens on the largest scales, where the density is extremely low.” The model allowed the team to understand how XENON1T would behave if dark energy was produced in the magnetically strong region of the Sun. Their calculations showed that dark energy can be detected using the XENON1T. Since the surplus was first discovered, the XENON1T team “tried in every way to destroy it,” as one researcher put it. told The New York Times… The persistence of the signal causes both bewilderment and excitement. “The authors offer an exciting and interesting opportunity to expand the scope of dark matter detection experiments towards the direct detection of dark energy,” Zara Baghdasaryan, a physicist at the University of California, Berkeley, who is not associated with a recent article, told Gizmodo by email. “A case study of excess XENON1T is definitely not convincing and we need to wait for more data from other experiments to test the validity of the solar chameleon idea.” The next generation XENON1T, dubbed XENONnT, is about to pass its first experimental tests. later this year… We hope that the experiment updates will remove any noise and help physicists figure out exactly what is wrong with the underground detector. Read more: What is dark matter and why has no one found it yet?
https://newsquick24.com/gadgets-news/researchers-say-dark-energy-may-be-responsible-for-mysterious-experimental-signals/
Internet of Things (IoT) applications are increasing in diversity and number due to the falling cost of sensors, micro-electromechanical devices, routers, and the decreasing size and increased capabilities of micro-controllers and the virtual machines that run on them. These advances are fueling excitement around many emergent applications for the IoT. But we should be concerned about using IoT applications in critical infrastructure systems, particularly those involving any: - Telecommunications grid - water supply chain - electrical power system - road transportation system - railway transportation system - air transportation network - public safety service - healthcare system In any of these applications, certain failures could lead to serious injury and death (including on a large scale). An IoT application incorporates sensors, cameras, social media feeds and various cyberphysical devices. These inputs are transmitted over wired and wireless communications to an aggregation point, where processors apply various algorithms to make decisions, and then send control signals to actuators associated with devices in the implementation. Each one of these represents a failure point, and in critical infrastructure systems, such a failure can lead to catastrophe. Moreover, interactions (both planned and unplanned) between critical and non-critical systems in the IoT create problems for design engineers. These problems arise from differences in domain vocabulary, standards harmonization and confusion and unwanted emergent behaviors. These interacting, dynamic, cross-domain IoT ecosystems also create the potential for increased threat vectors, new vulnerabilities and tragedy. For example, consider an application to provide seamless tracking of a container of critical medical supplies (or even transplant organs) from a large hospital to a rural hospital far away. The container starts in the large hospital, then is transferred to an ambulance, which travels the roadways to an airport. The container is then transferred to a flight, and, upon landing, to a train, then to another ambulance, and finally arrives at the rural hospital. During its travels, the container has to cross through many different IoT ecosystems, each complying with different standards (e.g. railway, highway, airport, hospital) and perform handoffs through a variety of communications links (including airborne where communication is usually forbidden). Imagine the engineering difficulties in building this application in a way that patient’s lives are not put at risk. There is another problem in these complex, multi-domain IoT systems. Connectivity through handheld devices, smart homes, smart cars and wireless-enabled devices increases attack surface for hackers to exploit. In fact, vulnerabilities in critical infrastructure systems have already been reported. For example, there are known vulnerabilities in certain smart power meters, and in older SCADA systems that control many of the critical infrastructure systems around the world. More recently, certain traffic control sensors and network-connected smart LED light bulbs were shown to be open to hacking. These vulnerabilities can be found in any of the ecosystems in the aforementioned scenario — automotive systems, railway transportation systems, even in-flight systems. In fact, these vulnerabilities can be found just about everywhere, even in home appliances. So imagine another tragic scenario: a hacked refrigerator’s software interacts with mom’s cellphone, interacting with an app and installing a security exploit that can be propagated to other applications with which the cell phone interacts. Mom enters her automobile and the cell phone in her purse interacts with the vehicle’s operator interface software, which downloads the new software, including the defect. Unfortunately, the software defect causes an interaction problem (e.g. a deadlock) that leads to a failure in the software-controlled safety system during a crash, leading to tragedy. Engineering safe IoT systems for critical infrastructure involves anticipating these scenarios. It also requires a comprehensive approach involving selecting the correct engineering lifecycle model and associated processes, embracing process discipline and standards compliance, understanding complex interactions and selecting the right tools for use throughout the systems lifecycle. These activities describe the licensed Professional Engineer. In fact, we would need licensed Control Systems, Electrical, Computer and, Software Engineers to build these IoT critical infrastructure systems. And depending on the domain, other licensed engineers will need to be involved (e.g. power, nuclear, civil). Why licensed engineers? Most importantly, we know that they have demonstrated a certain level of competence and will be aware of the kinds of complex problems that face IoT systems designers. Licensing also raises the level of professionalism and contributes to a system of accountability, which increases public trust and confidence. We should demand no less than this level of assurance when dealing with critical infrastructure systems, especially given the complexities of multi-domain IoT ecosystems. For More Information The author is working with the National Institute of Standards and Technology to build a database of to categorize sensor failure incidents for use by IoT researchers and systems builders. Please contact the author at [email protected] if you would like to contribute data to the project. —————– Phillip Laplante, CSDP, P.E., Ph.D., is Chairman of the NCEES Software PE Exam Committee.
https://insight.ieeeusa.org/articles/critical-infrastructure-and-the-iot-a-licensing-perspective/
The U.S. Food and Drug Administration (FDA) recently announced that it is moving forward on efforts to strengthen the cybersecurity of medical devices. While pacemakers, defibrillators, and insulin pumps seem like unlikely targets for hackers, a security breach could have drastic consequences. According to the FDA, its concerns about cybersecurity vulnerabilities include malware infections on network-connected medical devices or computers, smartphones, and tablets used to access patient data; unsecured or uncontrolled distribution of passwords; failure to provide timely security software updates and patches to medical devices and networks; and security vulnerabilities in off-the-shelf software designed to prevent unauthorized access to the device or network. Although no hacking attempts have been reported to date, researchers have recently shown how easily the security of medical devices can be compromised. Security researcher Jerome Radcliffe made headlines when he demonstrated how he could hack his own insulin pump at a 2013 security conference. Researchers at the Medical Device Security Center have also provided evidence that devices like pacemakers and defibrillators could be accessed remotely, allowing an attacker to transmit a fatal shock to a patient or shut down the device completely. Given the potential threats, the FDA recommends that medical device makers address cybersecurity as part of the design and development of a product and submit documentation to the agency about the risks identified and controls in place to address them. The guidance also proposes that manufacturers submit their plans for providing patches and updates to operating systems and medical software.
https://www.vaagelaw.com/blog/2014/october/fda-taking-steps-to-improve-cybersecurity-of-med/
By now, you’ve probably heard about Spectre and Meltdown, two vulnerabilities that were recently discovered by Jann Horn and a team from Google’s Project Zero. These are not software viruses, but hardware bugs that exploit critical design flaws in Intel, AMD, ARM and POWER chips that will impact every single computer made in the past 20 years, as stated by Amazon. To state the obvious, but because processors handle extremely sensitive data, including passwords and encryption keys, an attack on a computer chip can quickly turn into a serious security concern for computer systems of every size—including phones, laptops, desktop systems, and hyper-converged data storage systems. The following is an overview of the two hardware vulnerabilities and how it may impact you and the performance of your storage devices. Meltdown Creates Mayhem on CPU Performance Elusive Spectre Is Harder to Mitigate Spectre is slightly different from Meltdown, although it poses a similar type of threat as Meltdown in that it can exploit the processor to obtain secure application information. It affects all processors and is the more dangerous threat of the two because even though it requires more knowledge to set up, it is less understood and harder to mitigate. Spectre breaks the isolation between different applications and allows hackers to fool the applications (even the stable versions of the respective application) running on a machine to give up secret information from the Kernel module of the operating system. The Good News and the Bad News The good news is that according to the UK’s National Cyber Security Centre, no trace of Meltdown or Spectre has been detected on any machine around the globe. The bad news? These attacks are so sensitive that they are difficult to detect. Other cybersecurity experts predict that hackers will quickly develop programs to start attacking users, now that the vulnerabilities are public. The good news? Leading tech companies from Apple to Red Hat are already releasing fixes at the time of this publication. The Impact to DataCore Performance As mentioned, there is a general consensus that mitigation efforts for Meltdown and Spectre will create performance degradation. Could this impact previously published benchmark results for DataCore storage devices? The Storage Performance Council (SPC -1) leveraging Transaction Processing Performance Council (TPC) benchmark involves two components: a host running Windows or Linux generating the load and the test system. The load generator will likely be using kernel services at high frequency and as a result will incur an extra cost as a result of a mitigation. Extra resources may need to be added in order to re-create the same load. This does not invalidate previously published results since, in general, benchmarks are designed to determine the performance of the system under test rather than the load generator. In general, though, it is likely that reproducing benchmarks published by some vendors will not be possible. If the system under test is external, it could be considered a “closed” system, which means the cost of mitigation will be borne by the hosts and the storage device performance under test will not be affected. We believe that SPC-1 will continue to produce comparable and reliable indicators of storage performance, even when mitigation is applied. In other words, as vendors continue to produce SPC-1 results, we can expect SPC-1 to continue to produce a reliable indication of device performance, comparable to current and previous results—but vendors may need to use more hosts to produce their results. Key Security Takeaways In the event that a DataCore installation has been compromised, the risk of data under management being exposed currently appears to be almost zero. In order for Meltdown to gain unauthorized access, the memory needs to have a virtual address assigned to it, which is not the case for the DataCore cache. A virtual address will be assigned temporarily to individual cache buffers when performing specific operations on a snapshot, replicating data, or allocating storage to a thinly provisioned volume, but this is released as soon as the operation is complete. Given that the reported data access rate using Meltdown is up to 503KB/s, it is implausible that an attacker would be able to identify a temporary mapping and extract data in the time available. Spectre is based around manipulating the CPUs “branch prediction” to force an application to speculatively execute unintended code paths and leak private information from the application. For this to work, the attacker needs to be sharing the CPU with the application, perhaps through hyper-threading. There is currently no effective software workaround to completely protect against this type of attack. However, the information about Spectre suggests that network-based attacks are conceivable, but has not been demonstrated in practice with any reports of real-world attacks. Learn More Want to learn more about the impact of apply these patches to your DataCore-powered servers? Visit our FAQ 1671 on our support main page or contact our support team.
https://www.datacore.com/blog/what-you-need-to-know-about-spectre-meltdown-and-data-storage/
When individual vulnerabilities are exposed in a coordinated manner, the effects can lead to corporate network data breaches, destruction of cyber-physical systems, or physical harm to people. Imagine the following facility hack scenarios and the potential repercussions: • A cloud-hosted elevator control and monitoring system used for a high-rise building is hacked. The hackers push a malicious firmware update down to the on-premise elevator controller. The malware copies itself from controllers down to PLC’s across the network. Once the malware finds the fail-safe PLC, it releases its payload, removing the fail-safe programming that prevents elevators from dropping down elevator shafts. The next ride is deadly. • The 2013 Target hack was accomplished using credentials of an HVAC contractor. In this case, the hackers installed malware into the point of sale systems of Target, which allowed them to siphon off about 40 million debit and credit card accounts between Nov. 27 (the night before Black Friday) and Dec 15. It is estimated that the breach cost Target $290 million. What security measures were in place to separate and segment the IT/OT networks? Why would an HVAC contractor have access to point of sale system? Cybersecurity is not something that should be taken lightly, especially in the context of cyber-physical systems. Implementing cybersecurity strategies and having a dedicated cybersecurity expert should be a priority for all facilities. For small to medium size facilities, managed cybersecurity operation centers and cybersecurity insurance, or cybersecurity as a Service (CaaS) type offerings should be considered to gain expertise without dedicating staff. Enterprises must have a dedicated staff team to review network designs, evaluate technologies being considered for implementation, and identify risks. The following tips can help facility managers get a handle on cybersecurity best practices: • Cybersecurity is never “one size fits all” – every project has unique characteristics. • Air gaps won't stop industrial control system cyberattacks (e.g. malware such as Stuxnet's Children, Duqu, and Conficker) • MFA (multi factor authentication) basis remote access (host, system, or network) is recommended. • SSL (v1/2/3) has been deprecated by the Internet Engineering Task Force; TLS 1.2 or higher should be used. • 802.1x and SNMPv3 are recommended for any IoT devices and building systems. • The NIST 800-series, including the NIST Risk Management Framework and NIST Cybersecurity Framework, should be leveraged as implementation guidelines. • Deep Packet Inspection (DPI) is required to protect industrial control systems using OT/IoT. The next-gen firewall for industrial control systems should not only support "signature-based DPI" but also "protocol-specific DPI," such as a Modbus or BACnet DPI firewall. Internet of Things-style solutions will be installed in both new and existing facilities at a high rate over the coming decade. While promising new revenue streams, enhanced efficiencies, operational cost savings, or improved user experience, incorporation of these systems can create cybersecurity vulnerabilities at multiple levels of the technology stack. As computing power shifts outwards towards these internet-connected edge devices, cybercriminals now have additional firepower to use for creating data breaches, causing distributed denial of service attacks, hacking cyber-physical systems, or any number of information system attacks. This is especially true since many IoT devices and protocols have inherent cybersecurity vulnerabilities, or are being installed in OT networks not originally designed to be secure against this type of traffic. Therefore, facility managers must be diligent about understanding the systems and devices being placed on their network, coordinating with their IT counterparts, and creating a plan for continuous evaluation of these systems throughout their development lifecycle. The Building IoT will force IT/OT teams to evolve into Information and Operational Technologies (IOT) teams to ensure all devices on facility networks will comply with corporate IT policies, cannot tamper with cyber-physical systems, and do not endanger facility occupants. Isaac Chen is a vice president at WSP, one of the world’s leading engineering and professional services firms, with over 25 years of experience in software development and electrical and telecommunication engineering. Cory Mosiman is smart building specialist at WSP USA, researching building technologies and platforms ranging from traditional mechanical/lighting/electrical systems, to integration platforms and Building Internet of Things solutions. The authors can be reached at [email protected]. Smart Buildings: Efficient and Resilient. But Secure? Cybersecurity: Understanding Smart Building Vulnerabilities How Hackers Exploit Cybersecurity Vulnerabilities Smart Buildings and Facilities Management: 3 Applications posted on 3/15/2019 Article Use Policy Related Topics:
https://www.facilitiesnet.com/buildingautomation/article/How-Hackers-Exploit-Cybersecurity-Vulnerabilities--18317?source=next
What is the general purpose of the position? This role will support CompliancePoint’s Vulnerability Assessment and Penetration Testing Services under the larger Cybersecurity Services team. When supporting the Vulnerability and Penetration Testing Services, this position will review the results of CompliancePoint vulnerability scanning and conduct penetration testing activities which lead to the development of client-facing reports. These reports will include a summary of the activities performed, the findings of those activities, and recommendations to mitigate the vulnerabilities and risks to the organizations systems. Job Responsibilities - Assist in the creation of vulnerability scan or penetration testing systems (VM/Raspberry Pi) for off-site access - Perform penetration tests on computer systems, networks and applications - Create new testing methods to identify vulnerabilities - Pinpoint methods and entry points that attackers may use to exploit vulnerabilities or weaknesses - Perform physical security assessments of systems, servers and other network devices to identify areas that require physical protection - Search for weaknesses in common software, web applications and proprietary systems - Research, evaluate, document and discuss findings with IT teams and management - Review and provide feedback for information security fixes - Establish improvements for existing security services, including hardware, software, policies and procedures - Identify areas where improvement is needed in security education and awareness for users - Be sensitive to corporate considerations when performing testing (i.e. minimize downtime and loss of employee productivity) - Stay updated on the latest malware and security threats - Additional duties, as needed Job may require light travel to client sites and interaction with client employees, but most work will be completed remotely. Requirements To be successful in this position, the candidate must have: - Five to ten years of security-relevant IT experience - Have strong understanding of the OSI model - Knowledge of vulnerability scanning and remediation methodology - Experience with Windows, Mac, Unix, and Linux operating systems - Experience investigating security threats within corporate, datacenter and cloud environments - Comprehensive knowledge of computer security, including forensics, systems analysis and more - Knowledgeable in common cyber threat terminology and methodologies - Continuously obtaining insights into how hackers exploit the human element to gain unauthorized access to secure systems - Exceptional problem-solving skills - Communications skills to document and share your findings - Certified Ethical Hacker (CEH), Global Information Assurance Certified Penetration Tester (GPEN), Offensive Security Certified Professional (OSCP) or equivalent certification(s) strongly preferred We offer salary plus benefits package, including paid vacation and holidays, medical / dental / vision / supplemental insurance, Flexible Spending Account, gym membership package, travel reimbursement and a 401K plan with matching. Our business casual office is located in Duluth, GA. A Different Kind of Consulting & Audit Company The difference is simple — we understand the importance of compliance and risk mitigation at a procedural level. That comes from our history of successful consulting and audit engagements, including those for many Fortune 500 firms and global industry leaders. But more importantly, we understand the impact non-compliance and risk exposure can have on businesses. We collaborate with companies to design and implement strategies, processes, and procedures that help mitigate risk, reach compliance goals, protect data assets, and meet industry standards. Our Mission “Enable responsible customer interaction” Our Vision “Deliver world class services and technology helping customers manage risk within privacy, information security, and their vendor network” Interested applicants should send a copy of their resume to [email protected]. CompliancePoint, Inc. is an equal opportunity employer. Does your company use email to communicate with your prospective and current customers? If so, are your emails in compliance with the CAN-SPAM requirements?
https://www.compliancepoint.com/careers/pen-tester-and-report-writer/
Practically speaking, this refers to vulnerabilities that may exist in network systems thereby allowing hackers to again access. This is one major concern, as the intruders get access to the connected devices through the network. Further implications can be access to unauthorized and potentially confidential data that can then be used for other crimes. Unsecured open ends like open ports, USB connectors, mobile charging points, etc., are also responsible for injecting malware into IoT devices. Physical tampering of devices allows an attacker to disassemble a device and gain access to storage media and data present on that medium. Furthermore, if such a device is used for maintenance or configurations of certain control systems, access in the wrong hands can wreak havoc. Again, though, adoption of certain measures can help in prevention of physical tampering. For example, data storage should be encrypted and further made difficult to remove. Another option is to make sure only necessary external ports required for product function be allowed access. Limitation on administrative capabilities of the device can also be a counter against physical tampering. Furthermore, keeping equipment in a secure location which allows access only to authorized personnel can cut down on risk. Web interfaces are used to interact with IoT devices. While this demands simplicity for user interaction, if it is not secured there is every possibility of it being hacked. Certain issues that can certainly lead to an attacker gaining unauthorized access to a device include weak default credentials, exposure of credentials in network traffic, session management, cross-site scripting (XSS), SQL injection, etc. Countering these issues can be done in several ways. The change of default usernames and passwords must be forced during initial setups. Methods that are used for password recovery must be robust enough to not allow information leakage. Passwords must also have a policy that allows a setup of strong pass codes. Additionally, they must not be exposed in network traffic. Development of interfaces must be done in a manner such that they aren’t susceptible to XSS and SQL injection. Also, account lockouts on a specified number of failed attempts can be used. Some smart devices may be using outdated protocols and may not have been updated regularly. This is a weak point and the device can be hacked easily. The very idea behind updates from a developer are to fix bugs and vulnerabilities in the system over time. However, using un-updated software largely defeats the purpose. In fact, many smart systems that are used to control electronic items like refrigerators, air conditioners, etc., can easily fall prey to lack of software updates. Hence, the only way to be sure that system vulnerabilities are patched is via regular updates. Managing Multiple Database Roles: How Many Hats Do You Wear? Also, the use of outdated protocols can increase risk and is of serious concern. One example of such a protocol is the Session Initiation Protocol (SIP). Systems that are known to enjoy complete autonomy are often an easy target for hackers. Since these systems seldom require human intervention in their operations, they are difficult to track and also pose immense risk. For example, think of a self-driving car that can be hacked to ignore speed limits. The results clearly can be disastrous. There are at least ten known ways to attack neural networks, which happens to be the base for the working of autonomous systems. One such example is a black box attack, where inputs can be sent to an unknown system and information derived from collecting the outputs. The only way to outdo such attacks would be to develop more layered and complex systems so that they are more difficult to interpret and hack. Also, human intervention from time to time can help in patching flaws and guarding against such attacks. Dubious makers of devices as well as hackers can often track you stealthily via your use of smart devices. Such concerns are raised due to the collection of personal data that can be looked into using automated tools. These tools can then identify specific patterns that represent sensitive data. To counter this, the use of devices that come from well-known companies can potentially be a solution to such an issue. Another way to ensure safety is to see that only data required for the functioning of the device is being accessed or a limit can be set as to what extent data may be collected. Data encryption is also a protective stance to keep collected data safely and prevent misuse. IoT is here to stay and will become even larger in the coming years. Therefore, despite the vulnerabilities that exist in IoT systems and devices, the sole idea is to be cautious and controlled so that security issues are properly addressed.
https://www.pcsecurity-99.com/2019/02/11/hacking-the-iot-vulnerabilities-and-prevention-methods-techopedia/
Multiple vulnerabilities identified in Philips patient monitoring solutions could provide attackers with unauthorized access to patient data. A total of eight security issues were identified. Although they feature severity ratings of medium and low, even low-skilled hackers could exploit them, the Cybersecurity and Infrastructure Security Agency (CISA) warns in a security alert. “Successful exploitation of these vulnerabilities could result in unauthorized access, interrupted monitoring, and collection of access information and/or patient data,” CISA says. The security flaws, which were identified by researchers with ERNW as part of a larger project supervised by Germany’s Federal Office for Information Security (BSI), affect IntelliVue Patient Monitor systems, Patient Information Center iX (PIC iX) software, and PerformanceBridge Focal Point, which powers remote enablement. SecurityWeek has learned that the findings of the project, named ManiMed, will be made public in December. The discovered bugs have been described as improper neutralization of formula elements in a CSV file (CVE-2020-16214), cross-site scripting (CVE-2020-16218), improper authentication (CVE-2020-16222), improper check for certificate revocation (CVE-2020-16228), improper handling of length parameter inconsistency (CVE-2020-16224), improper validation of syntactic correctness of input (CVE-2020-16220), improper input validation (CVE-2020-16216), and exposure of resources to the wrong control sphere (CVE-2020-16212). Philips has issued an advisory regarding these vulnerabilities, confirming that a low skill level is required for exploitation. The company also explains that an attacker looking to exploit the flaws requires either “physical access to surveillance stations and patient monitors or access to the medical device network.” “There are no known public exploits available for these issues. To date, Philips has not received any reports of exploitation of these issues or of incidents from clinical use that we have been able to associate with this issue,” the company notes. Philips is currently working on new releases to fix the issues: PIC iX will be updated by end of 2020, IntelliVue versions N.00 and N.01 in Q1 of 2021, PerformanceBridge Focal Point by Q2 of 2021, and IntelliVue version M.04 by end of 2021. A certificate revocation mechanism will be implemented in 2023. Philips also recommends implementing mitigation steps: physically isolating the Philips patient monitoring network from the hospital local area network (LAN) and using the appropriate security measures to restrict access to the patient monitoring network; ensuring that the simple certificate enrollment protocol (SCEP) service is running only when needed to enroll new devices; and using a unique, long challenge password when enrolling new devices using SCEP. Furthermore, unauthorized login attempts to the PIC iX application should be prevented through physical security controls (servers should be kept in locked data centers), remote access to PIC iX servers should be granted on a must-have basis only; and login access to the bedside monitor and PIC iX application should only be granted on a role-based, least-privilege basis, to trusted users only.
http://en.hackdig.com/09/131404.htm
How businesses can improve their IT security while their employees work remotely. With each year, IT security for businesses becomes more complex as new security threats emerge and new technologies adapt to combat them. However, these threats don’t just come from new malware, viruses or exploitable software vulnerabilities. They also come from changes in human behavior. The recent shift of workers out of the office and into personal remote working locations is a significant concern. In an office environment, businesses can control most security variables, including who has physical access to the location, how the IT infrastructure is connected, and the hardware and software being used. However, when employees go home, they fall back on IT systems that were probably purchased based on cost or convenience and may not have been properly hardened to resist cyberattacks. Remote work seems to be the way of the future—certainly during the Covid-19 pandemic. Even when the pandemic subsides, it is likely many workers will continue to work remotely. Given these expectations, it’s time for businesses to prepare their employee’s remote work environments to be sufficiently secure. 1. Keep work data on work computers/systems. If your employees are handling any sensitive work data, they should work from company devices, or Remote Desktop sessions. Personal computers are often not maintained or protected effectively and often are shared among members of a household, which could result in a member mistakenly sharing or losing sensitive data. Keeping control of devices used and managing access and storage of company data is critical. 2. Deploy and manage enterprise-class Anti-Virus solution on devices Most of us who work on computers are familiar with antivirus protection and associated firewalls. The former identifies and isolates suspicious programs, while the latter prevents unauthorized files from being downloaded and installed. Unfortunately, even users who know what they are can run into trouble if they fail to update their security software, and many are known to disable firewalls in order to download a blocked file, and then fail to re-enable them. If your employees are using work computers, you can change administrative privileges to prevent them from being able to disable your security software while also managing updates remotely. 3. Keep operating systems and software up to date. One of the most common IT vulnerabilities that viruses and other malware exploit is through outdated software and operating systems. No piece of software is ever completely free of vulnerabilities, which is why software designers are constantly working to find the vulnerabilities and patch them before they can be hacked. Users often avoid running software updates, as they mean shutting down and restarting the computer. Having updates managed remotely can prevent employees from putting them off. 4. Enable multi factor authentication. Multi factor authentication is a solution that requires two different types of input from a user before allowing access to a device. There are three general forms of verification inputs: something a person knows (their password), something a person owns (like a cell phone), or something a person is (biometric data). If a user has to provide both a password and another type of identification, then a hacker can’t access the account just by cracking the password. While it’s not flawless, when it comes to effectiveness and ease of execution, it’s hard to beat multi factor authentication. 5. Use a VPN for secure network access. Like its name implies, Virtual Private Networks (VPNs) use public infrastructure to create encrypted networks that function the way a private network might. Once a VPN is established, the data that an employee shares over that network is secure. Like everything, to maintain your remote IT security, you will need to keep software and firmware up to date. 6. Set up security measures on home routers. Many home users never bother to change the default factory settings for their home routers. Employees should be instructed to take extra steps in securing their home routers, including changing the admin privileges, enabling the router firewall, and changing the password. 7. Educate your employees in phishing scams and other security threats. Almost any security precaution you take can be undone by an employee who acts carelessly or in ignorance. The stories of high-profile hacks which were enabled by someone clicking on the wrong link or opening the wrong email are seemingly endless. And as much as most of us want to believe that we would never fall for a bad phishing scam, set a weak password, or open sensitive files on our personal computers, anything can happen when someone is tired, in a rush, or simply unaware of the risks to behave with caution. Regularly train your employees in IT network security Brighton and make sure your employees understand that it is a priority for your company. The more aware your employees are knowledgeable about security, the more they will think twice before taking it lightly. Brightline can help with remote security and maintenance for your distributed workforce. For years, Brightline has enabled clients to work remotely through Remote Desktop solutions. We also secure and monitor company owned devices – whether they are at the office or home. Talk to us about the right Remote Office solutions for your business. We can help you make sure all your remote workers have the right IT security systems in place to protect your business.
https://brightlineit.com/7-it-security-tips-for-protecting-remote-workers/
Hackers can potentially infect Android devices with malware, which when installed, would provide them with "privilege escalation" to gain rooting access to devices, thanks to four new vulnerabilities, dubbed Quadrooter, identified by security researchers. Around 900 million Android devices have been left vulnerable by Quadrooter. According to security firm Check Point, hackers could potentially exploit any one of the four identified vulnerabilities to gain rooting privileges, which would then give the hackers full control over the affected device. This means that hackers would then have access to all the data and hardware of the infected device, including camera and microphone. The vulnerabilities affect Android devices of various brands, including: BlackBerry Priv, Blackphone 1 and 2,
https://www.zupyak.com/p/408080/t/900-million-android-devices-affected-by-quadrooter-security-flaws
OCR: HIPAA Security Rule Compliance Can Prevent and Mitigate Most Cyberattacks Healthcare hacking incidents have been steadily rising for a number of years. There was a 45% increase in hacking/IT incidents between 2019 and 2020, and in 2021, 66% of breaches of unsecured electronic protected health information were due to hacking and other IT incidents. A large percentage of those breaches could have been prevented if HIPAA-regulated entities were fully compliant with the HIPAA Security Rule. The Department of Health and Human Services’ Office for Civil Rights explained in its March 2022 cybersecurity newsletter that compliance with the HIPAA Security Rule will prevent or substantially mitigate most cyberattacks. Most cyberattacks on the healthcare industry are financially motivated and are conducted to steal electronic protected health information or encrypt patient data to prevent legitimate access. The initial access to healthcare networks is gained via tried and tested methods such as phishing attacks and the exploitation of known vulnerabilities and weak authentication protocols, rather than exploiting previously unknown vulnerabilities. Prevention of Phishing Phishing is one of the commonest ways that cyber actors gain a foothold in healthcare networks. Coveware’s Q2, 2021 Quarterly Ransomware Report suggests 42% of ransomware attacks in the quarter saw initial network access gained via phishing emails. Phishing attacks attempt to trick employees into visiting a malicious website and disclosing their credentials or opening a malicious file and installing malware. Anti-phishing technologies such as spam filters and web filters are key technical safeguards to prevent phishing attacks. They stop emails from being delivered from known malicious domains, scan attachments and links, and block access to known malicious websites where malware is downloaded or credentials are harvested. These tools are important technical safeguards for ensuring the confidentiality, integrity, and availability of ePHI. OCR reminded HIPAA-regulated entities that “The Security Rule requires regulated entities to implement a security awareness and training program for all workforce members,” which includes management personnel and senior executives. “A regulated entity’s training program should be an ongoing, evolving process and be flexible enough to educate workforce members on new and current cybersecurity threats (e.g., ransomware, phishing) and how to respond,” said OCR. The Security Rule also has an addressable requirement to send periodic security reminders to the workforce. OCR said one of the most effective forms of “security reminders” is phishing simulation emails. These exercises gauge the effectiveness of the training program and allow regulated entities to identify weak links and address them. Those weak leaks could be employees who have not fully understood their training or gaps in the training program. “Unfortunately, security training can fail to be effective if it is viewed by workforce members as a burdensome, “check-the-box” exercise consisting of little more than self-paced slide presentations,” suggested OCR. “Regulated entities should develop innovative ways to keep the security trainings interesting and keep workforce members engaged in understanding their roles in protecting ePHI.” Prevention of Vulnerability Exploitation Some cyberattacks exploit previously unknown vulnerabilities (zero-day attacks) but it is much more common for hackers to exploit known vulnerabilities for which patches are available or mitigations have been made public. It is the failure to patch and update operating systems promptly that allows cyber actors to take advantage of these vulnerabilities. The continued use of outdated, unsupported software and operating systems (legacy systems) is common in the healthcare industry. “Regulated entities should upgrade or replace obsolete, unsupported applications and devices (legacy systems),” said OCR. “However, if an obsolete, unsupported system cannot be upgraded or replaced, additional safeguards should be implemented or existing safeguards enhanced to mitigate known vulnerabilities until upgrade or replacement can occur (e.g., increase access restrictions, remove or restrict network access, disable unnecessary features or services” The HIPAA Security Rule requires regulated entities to implement a security management process to prevent, detect, contain, and fix security violations. A risk analysis must be conducted and risks and vulnerabilities to ePHI must be reduced to a reasonable and appropriate level. The risk analysis and risk management process should identify and address technical and non-technical vulnerabilities. To help address technical vulnerabilities, OCR recommends signing up for alerts and bulletins from CISA, OCR, the HHS Health Sector Cybersecurity Coordination Center (HC3), and participating in an information sharing and analysis center (ISAC). Vulnerability management should include regular vulnerability scans and periodic penetration tests. Eradicate Weak Cybersecurity Practices Cyber actors often exploit poor authentication practices, such as weak passwords and single-factor authentication. The 2020 Verizon Data Breach Investigations Report suggests over 80% of breaches due to hacking involved compromised or brute-forced credentials. “Regulated entities are required to verify that persons or entities seeking access to ePHI are who they claim to be by implementing authentication processes,” explained OCR. The risk of unauthorized access is higher when users access systems remotely, so additional authentication controls should be implemented, such as multi-factor authentication for remote access. Since privileged accounts provide access to a wider range of systems and data, steps should be taken to bolster the security of those accounts. “To reduce the risk of unauthorized access to privileged accounts, the regulated entity could decide that a privileged access management (PAM) system is reasonable and appropriate to implement,” suggests OCR. “A PAM system is a solution to secure, manage, control, and audit access to and use of privileged accounts and/or functions for an organization’s infrastructure. A PAM solution gives organizations control and insight into how its privileged accounts are used within its environment and thus can help detect and prevent the misuse of privileged accounts.” OCR reminds regulated entities that they are required to periodically examine the strength and effectiveness of their cybersecurity practices and increase or add security controls to reduce risk as appropriate, and also conduct periodic technical and non-technical evaluations of implemented security safeguards in response to environmental or operational changes affecting the security of ePHI.
https://www.hipaajournal.com/ocr-hipaa-security-rule-compliance-can-prevent-and-mitigate-most-cyberattacks/
Cisco has released software updates to address several critical and high severity vulnerabilities identified in various networking and security products. One of the critical flaws, with a CVSS score of 10, is an unauthorized access issue (CVE-2015-6314) affecting several Cisco standalone and modular controllers running Wireless LAN Controller (WLC) software versions 7.6.120.0 and later, 8.0 and later, and 8.1 and later. According to Cisco, a remote, unauthenticated attacker could exploit this vulnerability to modify a device’s configuration, which could lead to the device being completely compromised. Another critical unauthorized access vulnerability (CVE-2015-6323) has been found in the admin portal of devices running Cisco Identity Services Engine (ISE), a policy management platform designed for automating and enforcing security access to network resources. A remote, unauthenticated attacker who can connect to the admin portal can exploit the weakness to gain access and take control of vulnerable devices. Devices running Cisco ISE 1.1 or later, 1.2.0 prior to patch 17, 1.2.1 prior to patch 8, 1.3 prior to patch 5, and 1.4 prior to patch 4 are affected. Cisco revealed on Wednesday that ISE is also plagued by a medium severity unauthorized access flaw that allows a remote, authenticated attacker to gain access to web resources that should only be accessible to administrative users. Advisories published by Cisco on Wednesday also detail a couple of high severity vulnerabilities affecting Aironet 1800 Series Access Point devices. One of the issues is related to the existence of static credentials (CVE-2015-6336) that can be leveraged by a remote, unauthenticated attacker to log in to vulnerable devices. Cisco has pointed out that the exposed account does not have full admin privileges by default. The second high severity bug in Aironet 1800 devices can be exploited remotely by an unauthenticated attacker to cause a denial-of-service (DoS) condition on the device by sending it a specially crafted IP packet (CVE-2015-6320). All of these flaws were uncovered during internal security and quality assurance testing. Cisco says it’s not aware of any instances in which these vulnerabilities have been exploited for malicious purposes. Since there are no workarounds for any of the security holes, users are advised to install the available updates as soon as possible. After news broke that unauthorized code had been found in Juniper Networks’ ScreenOS firewall operating system, Cisco announced its intention to review its own products for similar malicious changes. In the case of Juniper, the unauthorized code found by the company introduced a backdoor and a weakness that can be exploited to decrypt VPN traffic. Reports about a backdoor in Fortinet’s FortiOS operating system emerged earlier this week, but the enterprise security vendor said the issue was an unintentional bug patched in mid-2014, not a malicious backdoor.
https://www.securityweek.com/cisco-patches-serious-flaws-networking-security-products/
The hackers behind the devastating attack against Sony Pictures Entertainment late last year exploited a previously undisclosed vulnerability in its computer systems that gave them unfettered access and enabled them to reach and attack other parts of the studio’s network. Sources familiar with the Sony investigation told Re/code the attackers took advantage of what’s known as a “Zero-Day” vulnerability as part of a campaign to destroy the studio’s corporate network. These types of vulnerabilities are known as Zero-Day because the original programmer has zero days after learning about it to patch the code before it can be exploited in an attack. These flaws are usually the result of errors made during the writing of the software, giving an attacker wider access to the rest of the software. Sometimes the errors are spotted by security researchers who collect bounty fees offered by software firms. More often, they remain undetected until an attack has occurred. Zero-Day vulnerabilities are also often sold on the black market to the highest bidder, suggesting the attackers were either well-funded or working with an entity who is, such as a nation-state. It may also bolster claims by the U.S. government that North Korea was responsible for the attack. The presence of a Zero-Day vulnerability in the investigation is a key technical detail that sheds light on how the hackers were able to get inside Sony’s network as early as September and thoroughly exploit it, undetected, until unleashing the destructive attack in late November. Details about the vulnerability are being closely held, and it’s unclear which software was compromised. The New York Times recently reported that “spear phishing” attacks involving malicious code were inserted into email attachments in September. That attack technique has been used in the past to exploit Zero-Day vulnerabilities. It would also add weight to a claim by Kevin Mandia — founder and head of Mandiant, the security firm hired to investigate the breach — that the attack was one for which neither Sony “nor other companies could have been fully prepared.” Sony suffered the worst corporate hack attack in history last fall when a group of attackers going by the name Guardians of Peace first crippled its network and then released sensitive corporate data on public file-sharing sites, including four unreleased feature films, business plans, contracts and the personal emails of top executives. Mandiant, the corporate parent of the security firm FireEye, declined to comment, as did Sony and the Federal Bureau of Investigation. Highest Bidder The tech industry has sought to control the spread of Zero-Days by paying freelance researchers to report vulnerabilities in software to the companies that create it, or to third parties. Examples include the Zero-Day initiative backed by Tipping Point, a unit of Hewlett-Packard. Last year, Google launched its own effort, Project Zero, hiring a team devoted to rooting out and fixing holes in software that touch the Internet. Often vulnerabilities remain unknown to the company that created it. When exploited by a skilled hacker, Zero-Day vulnerabilities can be useful in gaining initial access to large systems, essentially creating a beachhead that can be used to mount larger-scale intrusions, theft and the destruction of data. Information about Zero-Days is often bought and sold in underground marketplaces specializing in computer crime. The going prices can vary from as low as $5,000 to more than $250,000, and vary depending on sophistication, age and other factors. For example, a vulnerability that applies to several variants of Microsoft’s Windows operating system is worth more than a vulnerability that applies to only one. Sources familiar with the technical information declined to name the product or system exploited citing the sensitivity over the ongoing investigation. One source described the software used to exploit the weakness on Sony’s systems as “well-constructed and multi-faceted,” but not exceptionally sophisticated. Once the attackers penetrated Sony’s network, they were able to move about in what was described as a “low and slow” manner. Carefully, and over the course of several weeks, they assembled a detailed map of Sony’s corporate networks and the information to access each one. Eventually, they pilfered hundreds of gigabytes of Sony’s most sensitive business information, including the email archives of some of its most senior executives, and released them to the public. Messages purporting to be from the attackers claimed they had taken nearly 100 terabytes of data from Sony, but the files disclosed so far amount to a few hundred gigabytes. Zero-Days have figured in several high-profile attacks attributed to governments, including the U.S., Israel and China. They are now considered so important that governments with cyber-war operations guard information about them as if they were secret weapons. “They’re now considered part of a national arsenal for use in the future,” says Phil Lieberman, a security firm that helps companies manage their passwords and sign-on information. Nation-State Customers The most famous exploitation of Zero-Day vulnerabilities occurred in connection to Stuxnet attacks, a digital weapon used — allegedly by the U.S. and Israel, though never officially acknowledged — to sabotage Iran’s nuclear weapons program. In that case, a computer worm exploiting as many as four Zero-Day vulnerabilities affecting numerous versions of Windows were packaged together on USB thumb drives that were delivered to an Iranian nuclear facility by Israeli agents. By some estimates, the combination of vulnerabilities would have cost about $3 million on the black market, leading many security researchers to conclude the malware was created by a nation-state attacker, most likely the U.S. and Israel. The New York Times had first reported on the likelihood that the two nations were behind the Stuxnet attack. Last year, security research firm iSight Partners detected a group of hackers operating in Russia that had used malware to exploit Zero-Day vulnerabilities affecting several versions of Microsoft’s Windows as part of a campaign of cyber-espionage. In a 2011 attack, later attributed to China’s People’s Liberation Army, malicious code was inserted into a Microsoft Excel spreadsheet file sent to employees of RSA, the security division of storage and IT giant EMC. The hackers took advantage of a Zero-Day vulnerability in Adobe’s video and animation software Flash. The attackers aimed to steal data that might compromise RSA’s SecurID tokens, keychain devices which generate constantly changing numeric codes that serve as a second password, popular with numerous companies for securing their data. In Sony’s case, the attackers claimed to be motivated by a Sony-produced comedy feature film called “The Interview” starting Seth Rogan and James Franco, which concerns a CIA-backed plot to assassinate North Korean leader Kim Jong-un. The FBI and President Obama have said that North Korea was involved in the attack, though many security experts have questioned that finding. North Korea has officially denied any involvement. This article originally appeared on Recode.net.
https://www.vox.com/2015/1/20/11557888/heres-what-helped-sonys-hackers-break-in-zero-day-vulnerability
You may have heard about the two CPU microarchitecture vulnerabilities that were discovered by Google’s Project Zero team and independently by other researchers: Meltdown and Spectre, which affect most modern computing devices. Both attacks involve speculative execution side-channels. The Meltdown vulnerability, CVE-2017-5754, can potentially allow hackers to bypass the hardware barrier between applications and kernel or host memory. The Spectre vulnerability has two variants: CVE-2017-5753 and CVE-2017-5715. These vulnerabilities break isolation between separate applications. Either of these vulnerabilities could potentially be exploited to steal sensitive data from your devices. Is my NetModule router affected? For the newer generation of NetModule routers (NB800, NB2800, etc.), ARM based processors are used. These types are not affected by Meltdown. However, there are vulnerabilities with Spectre in some rare use cases. For the older generation of NetModule routers (NB1600, etc.), a NXP PowerPC processor is in use. Currently, NXP is investigating if this type of CPU is affected. We will inform you as soon as there is more information available but also here we assume that in case of a potential vulnerability it will affect only a limited number of rare use cases. How can you protect your NetModule router? Since the application of NetModule routers is different to standard application computers or servers, the risk of an attack is minimal. This is especially the case since these vulnerabilities target that different user applications are running on one computer which is rarely the case on a NetModule router. If you want to maximize the protection of your devices, please consider following guidelines - Do not allow any unauthorized person access to the NetModule router - Do not download any unauthorized software to the NetModule router - Only run authorized SDK scripts on the NetModule router If you take care of these measures, you can minimize the impact, which these possible vulnerabilities and others might have on your NetModule router. We are following closely this important topic. Once there are security patches available, we will provide them to you as soon as possible.
http://netmodule.com/company/news.html?entry=d44c785b-cf20-42ef-b9f2-e91989d7f5f3
The next time you are in the hospital, remember this terrifying thought: It is actually pretty easy to hack into medical equipment. Scott Erven, head of information security for Essentia Health, owner of healthcare facilities, shared his experience with Wired.com of finding out just how easy it was. Neither Erven nor Essentia responded to requests for an interview. While performing a study over a two-year period, he and his team found healthcare equipment including drug infusion pumps, Bluetooth-enabled defibrillators, digital medical records and temperature settings meant to regulate storage levels for blood and drugs, could all be remotely manipulated. “Many hospitals are unaware of the high risk associated with these devices,” Erven told Wired last month. “Even though research has been done to show the risks, healthcare organizations haven’t taken notice. They aren’t doing the testing they need to do and need to focus on assessing their risks.” He said the health care industry is just now realizing the security issues that can come from not protecting their equipment when it is connected to a network. Erven also said medical facilities may even use hardcoded passwords like “admin” and “1234.” In 2012, MIT Technology Review reported Beth Israel Deaconess Medical Center in Boston found that 664 pieces of its medical equipment were running on older Windows operating systems that hospitals were not allowed to modify or change due to potential interference with U.S. Food and Drug Administration regulatory reviews. The hospital’s chief information security officer said that led to computers acquiring malware and needing to be wiped every week, the report said. Last year, the FDA announced a cybersecurity plan for medical devices and hospital networks after it said it became aware of “vulnerabilities and incidents” including: - “Network-connected/configured medical devices infected or disabled by malware; - The presence of malware on hospital computers, smartphones and tablets, targeting mobile devices using wireless technology to access patient data, monitoring systems, and implanted patient devices; - Uncontrolled distribution of passwords, disabled passwords, hardcoded passwords for software intended for privileged device access (e.g., to administrative, technical, and maintenance personnel); - Failure to provide timely security software updates and patches to medical devices and networks and to address related vulnerabilities in older medical device models (legacy devices); - Security vulnerabilities in off-the-shelf software designed to prevent unauthorized device or network access, such as plain-text or no authentication, hard-coded passwords, documented service accounts in service manuals, and poor coding/SQL injection. But before you swear off medical procedures for good, there are things healthcare facilities can do. Many of the security solutions proposed include the ones you would normally hear: put controls in place to protect equipment from unauthorized users. However, Erven said that will only go so far, and vendors also needed to secure the devices before they sell them. The FDA also recommended putting the network through evaluations on a regular basis and devising strategies in the event certain things happen. Device makers are also creating software patches, but most sources say not enough of them are doing it yet. Cybersecurity changes quickly, so I guess we will have to wait and see if the healthcare industry can get ahead of it. Reliable, encrypted backups can really help businesses move towards being more HIPAA compliant. Have a look at what StorageCraft ShadowProtect can do for businesses in the medical field.
https://blog.storagecraft.com/yes-even-hospital-equipment-hackable/
Common web application vulnerabilities continue to confound enterprises. Here's how to defend against them and stop enabling exploits. still vexed information security professionals. It's even sadder that, six years later, these same flaws continue to stymie efforts to educate developers and mitigate vulnerabilities in web applications. OWASP revised its list of vulnerabilities in 2017. But the five common web application vulnerabilities listed below are still causing havoc, and all of them remain on the OWASP Top 10 list. This article has been updated for the next generation of web application developers, who should finally take to heart the techniques to prevent common web app exploits. The Open Web Application Security Project last revised its OWASP Top 10 list of critical web application security flaws in 2017. Sadly, the list has changed little from previous years, showing that those responsible for application design and development are still failing to address well-known and well-documented errors. Many of the most common web app vulnerabilities are so widespread that crimeware kits feature search-and-exploit tools targeting them, making it trivial for even novice attackers to exploit these flaws. In this tip, we'll look at five of the most common web application vulnerabilities and provide guidance on how enterprises can fix the original problems and combat attacks that try to exploit them. Topping the OWASP Top 10 list since 2010, injection flaws are among the most common -- and most serious -- web application vulnerabilities. There are various forms of injection attacks, including SQL, operating system, email and Lightweight Directory Access Protocol injection, and they all work by sending malicious data to an application as part of a command or query. Carefully crafted data can trick an application into executing unintended commands or accessing unauthorized data. SQL injection occurs when attackers take advantage of sites that generate SQL queries using user-supplied data without first checking to make sure it is valid. This enables an attacker to submit malicious SQL queries and pass commands directly to a database. As an example of this kind of attack, it's thought that SQL injection was used to access Sony's PlayStation database and plant unauthorized code as part of the 2011 attacks on the PlayStation Network. To prevent both injection and XSS attacks, an application should be configured to assume that all data, whether it's from a form, URL, cookie or even the application's database, has come from an untrusted source. Review every point where user-supplied data is handled and processed, and check to make sure it is validated. Validation functions need to clean any input of characters or strings that could possibly be used maliciously before passing it on to scripts and databases. Input must be checked for type, length, format and range. Developers should make use of existing security control libraries, such as OWASP's Enterprise Security API or Microsoft's Anti-Cross Site Scripting Library, instead of writing their own validation checks. Also, ensure any values accepted from the client are checked, filtered and encoded before being passed back to the user. The OWASP Top 10 list has evolved over the years, but it hasn't changed all that much. Web applications have to handle user authentication and establish sessions to keep track of each user's requests, as HTTP does not provide this capability. Unless all authentication credentials and session identifiers are protected with encryption at all times and protected against disclosure from other flaws such as XSS, an attacker can hijack an active session and assume the identity of a user. In case an attacker discovers a session where the original user has failed to log out -- walk-by attacks -- all account management functions and transactions should require reauthentication, even if the user has a valid session ID. Two-factor authentication should also be considered for high-value transactions. To uncover authentication and session management problems, enterprises can perform both code review and penetration tests. Developers can use automated code and vulnerability scanners to uncover potential security issues. Areas that often require more attention include how session identifiers are handled and the methods used for changing a user's credentials. If budgets don't stretch to cover commercial versions, there are plenty of open source and lite versions that highlight places where a closer inspection of code or processes is required. This is another flaw that stems from poor application design based on the false assumption that users will always follow the application rules. For example, if a user's account ID is shown in the page URL or in a hidden field, a malicious user may be able to guess another user's ID and resubmit the request to access their data, particularly if the ID is a predictable value. The infrastructure that supports a web application comprises a complex variety of devices and software, including servers, firewalls, databases, and OS and application software. All these elements need to be securely configured and maintained, with the application running with the least privileges necessary. Yet, many systems are never fully hardened. A primary cause of poor system administration is those responsible for managing web applications and the infrastructure that supports them have never undergone the necessary training. Providing adequate training and resources for those tasked with day-to-day network and application management is as essential as making security and privacy a priority throughout all phases of the development process. Finally, schedule a penetration test for web applications that handle sensitive data of any kind. This is a proactive method of assessing its ability to withstand an attack and finding vulnerabilities before a hacker does. These five common web application vulnerabilities have been a thorn in the side of IT security for years. They are not new and neither are the fixes for them. But until the security of web apps is prioritized, attackers seeking to commit theft, fraud and cyberespionage will all continue to take advantage of these flaws. How have you integrated the OWASP Top 10 web application vulnerabilities into your enterprise best practices?
https://searchsecurity.techtarget.com/tip/Five-common-Web-application-vulnerabilities-and-how-to-avoid-them
The 30 January the 12th CPDP international conference on Data Protection and Democracy is hosting a VIRT-EU panel entitled: Values and Ethics in Innovation for Responsible Technology in Europe. The panel is framed around the values embedded in data-intensive products and how these values shape how information is managed and classify individuals and groups. Since data protection is an integral part of citizenship, digital democracy cannot exist with data-enabled stigma and behavioral control. The panel intends therefore to address how the societal consequences should be considered engaging with products and services at the point of design to reach beyond privacy laws and embed ethical considerations that encourage moral values and capabilities in practice without undermining necessary regulations. How can data protection and GDPR properly address the societal consequences of data use? How do developers of IoT projects and services enact practices with ethical significance and consequence? How can considerations of ethics be translated into practical policy and design recommendations? How can design for speculation encourage the consideration and imagination of broader socio / economic / political / ecological implications of the new technology we make? Connected systems and the Internet of Things can be creepy, collecting data and potentially sharing it in ways that violate individual or collective privacy. Proposals to address IoT ethics often focus on the systems once they have actually been built, but the VirtEU project has been focusing instead on the communities of practice who build IoT products at the small scale — and investigating how ethical practices unfold in this community. This presentation outlines some of the tensions we have found in practice between a desire to ‘do the right thing’ and the ability to put values into practice in a product-based start-up environment. We willl present the ethical framework that we have developed to address technology development contexts, based on /virtue, capability /and /care, /and describe how we have put this framework into practice through participatory research within startup communities of practice in London and in Copenhagen, using workshops, speculative prototypes, and frameworks for Privacy and Ethical and Social Impact Assessments. This talk focuses specifically on how the related ethical concepts of virtue, capability and care have been identified in the project and how these concepts, as distinct from ethical frameworks of consequentialism that often structure legal and policy responses to ethical challenges. Drawing from fieldwork among London and Copenhagen -based IoT startups, we identify ways to connect virtue, capability and care with working practices in the connected technology field and identify how these insights can inspire more nuanced assessments of ethical impact. Alison Powellis Assistant Professor and Programme Director of the MSc in Media and Communication (Data & Society) ad she researches how people’s values influence the way technology is built, and how technological systems in turn change the way we work and live together. Irina Shklovskiis an associate professor in the Technologies in Practice and Interaction Design (IxD) research groups at the IT University of Copenhagen. Her research is positioned at the intersection of human computer interaction, information sciences, sociology and communication. persons with background in the humanities to the biggest companies. Another idea is to make companies really accountable for the harm which their actions have resulted in — ie requiring them to surrender the revenue which they have derived from the harmful use of their services or platforms. EDPS is about to announce a programme of public teleconferences and podcasts on these issues. Christian D’Cunha is the head of the Private Office of the European Data Protection Supervisor. He advises the EDPS and Assistant EDPS on legal and policy developments in the EU as well as providing support on strategic planning and communications. He has led the EDPS project on strengthening the links between the enforcement of privacy, competition and consumer law in the digital economy and society, including the setting up the Digital Clearinghouse to bring together regulators to discuss cross-cutting issues like big data mergers and unfair terms, pricing and discrimination online. He has been responsible for EDPS opinions on a range of issues, including digital ethics and the reform of the data protection framework. Javier will discuss the current landscape tools for ethical assessment of data and technology more broadly. These range from ethics canvas, frameworks and scenarios that are used to assist decision making in the design and development of systems. We will be looking at how these complement, overlap and interact with the data protection impact assessments, and assessment models that go beyond privacy, such as PESIA. My contribution to the discussion will mainly focus on the Privacy, Ethical and Social Impact Assessment (PESIA) and is coordinated with Javier’s presentation. The PESIA is an assessment framework which will proactively position self-assessment in the development process of IoT technologies. PESIA architecture follows the PIA/DPIA structure, but, unlike the PIA/DPIA, this assessment is not mainly focused on privacy issues, but is divided into three different thematic sections concerning privacy/data protection, ethical and social issues, respectively. Javier is Policy Director at Open Rights Group. Since joining ORG, Javier has worked on Open Data, including being part of an advisory group to Ministry of Justice on transposition of EU Public Sector Information Directive. He engaged in the UK Data Sharing open policy project at the UK Cabinet Office. Alessandro Mantelero is Associate Professor of Private Law at the Polytechnic University of Turin. He is Council of Europe Rapporteur on Artificial Intelligence and data protection and has served as an expert on data regulation for several national and international organizations. The VIRT-EU project works to engage the European IoT community in discussions about ethics, focusing in particular on the challenges faced by designers and developers of IoT devices in practice. As developers and designers of IoT devices face systemic challenges, many realize that they have little practice or training for dealing with ethical questions that they encounter. There is a need for tools that can help integrate the practice, training and understanding of ethical decision-making and reflection into the design process. In our research, workshops and prototyping, we have uncovered valuable and unexpected insights into the underlying needs of IoT creators in relation to ethics at this point in time. While some may expect simple checklists of ethical evaluation, instead we propose tools that lend themselves to ongoing and interventionist techniques and can take place over the course of the design process when creating connected things. Furthermore, said tools are being designed to enable and structure several steps of ethical awareness: from articulation to moral imagination to addressing value misalignments in decision-making. Through deep collaboration with our partners, we have immersed ourselves in the ethical framework of VIRTEU and used it as the foundation for our prototype-tools. Annelie Berner is a data artist, designer and researcher at the Copenhagen Institute of Interaction Design. She is interested in how to understand, think about, and interact with our digital worlds. Specially, how we can make data experiences that are aesthetic, tangible and consider all of our senses — from sight to taste. Annelie’s work has won notable honors in the Core77 Design Awards for Built Environments and Food Design, as well has having been exhibited at the World Health Organisation, Red Bull Studios NYC and the Georgia Museum of Art.
https://blogit.itu.dk/inda/2019/02/08/virt-eu-panel-at-cpdp-2019/
The public sector, the private sector and civil society organisations must steer digital society in such a way that greater focus is placed on people and values. The aim is a digital society in which no one is excluded. This report identifies five actions aimed at values-driven innovation. Over the past eighteen months, the Netherlands has started to realise the massive scale of the impact of digitalisation on society. Digitalisation is not longer essentially a reference to a collection of gadgets but has gradually been recognised as a transition process, with opportunities and risks. A key question for the future is therefore how the Netherlands should structure that transition. The most important message from the Rathenau Instituut is that government, the private sector and civil society organisations need to shape and direct the digital society in such a way that greater focus is placed on people and values. Only then can a digital society be created, in which no one is excluded. With that in mind, in this report we propose five actions. Read the five actions on the tab page 'Recommendations'. This report will show that government and many other parties have started to act on the message from Urgent Upgrade. A whole raft of social and ethical questions, for example about our understanding of algorithms and a fair data economy, are far more clearly present on the agenda than two years ago. Policy makers, regulators and civil society organisations are already developing knowledge about the new themes. In respect of privacy and security, the step has been taken from agenda shaping and policy making to actual policy implementation. Over the past eighteen months, therefore, the governance system has changed for the better. In other areas, themes have been placed on the agenda, but not yet translated into actual policy measures. Examples are the protection of democracy, understanding of algorithms and a fair, competitive data economy. A number of technologies and their related societal issues have also not yet been placed on the agenda. Examples are facial recognition, virtual and augmented reality and the possible health effects of digital technology. Various parties such as policy makers, politicians, civil society organisations, regional and local governments, professional associations and regulators recognise the importance of protecting public values. They are clearly considering the issue of what digitalisation means for their organisation, sector or practice. The key question however is how we can best manage this digital transition. Many have recognised that protecting public values and fundamental rights must be the starting point for digitalisation. This means a turnaround in the debate on the deployment and influence of digital technologies: from a focus on technology and the assumption that it will automatically lead to social progress, to a focus on the interaction between digitalisation and values. On the one hand, digitalisation is a tool for tackling social challenges while on the other hand it is a development that could compromise public values. By viewing digitalisation as a transition, the focus is placed prominently on the question ‘what type of digital society do we want to live in?’. To answer that question, an integrated approach to innovation is needed, that gives shape and direction to the digital transition and as a result to our society, from the viewpoint of public values. We propose five actions that will help policy makers, businesses and civil society organisations to reinforce the governance system. For more information read the tab page 'Recommendations'. This report is a follow-up to our report Urgent Upgrade published in February 2017, written in response to the Gerkens motion that was adopted by the Dutch Senate. That report mapped out a broad spectrum of societal and ethical aspects of digitalisation. The Netherlands has become more aware of the impact of digitalisation on society. Nonetheless, to bring about a digital transition in which people and values are the central focus, both the public and private sectors will have to develop their activities more specifically from the perspective of social challenges. And in that very area there are huge opportunities for the Netherlands and Europe. This is reflected in this report, in which we formulate five recommendations to improve the course of the digital transition (for more information read the tab page 'Recommendations'). The central thrust of these recommendations is the term socially responsible digitalisation. This must become the starting point for any business or government innovation. Any technological opportunity requires that the transition itself is embedded in society, and based on international agreements. Furthermore, the Netherlands will have to continue to invest in the position of regulators and other supervisory bodies. Important steps have already been taken in respect of cybersecurity and privacy, but such issues as discrimination, exclusion and loss of autonomy have not yet been translated into specific policy measures. The same applies for such themes as the protection of democracy, the transparency of algorithms and fair economic competition. Certain technologies and the related social issues, such as facial recognition, virtual and augmented reality and the effects of digital technology on health have not even been placed on the agenda. There is clear evidence of greater awareness and uncoordinated individual actions. What is missing is the link between social issues and innovation. In tackling the challenges facing us as a society, the public and private sector must direct digitalisation from the viewpoint of societal challenges and public values. Ethical and societal issues cannot be considered in isolation from innovation or digitalisation processes. To fulfil the ambitions of the Netherlands, for example in healthcare, in the energy transition or with regard to mobility, it is essential to link innovation to societal issues: the Netherlands must no longer view public values as the final step in an innovation process, but as a starting point. This ties in with thinking on innovation policy in terms of mission-based innovation policy or targeted innovation systems. Societal and ethical issues in digitalisation have been placed on the policy agenda, but there is still no integrated vision. A number of questions have not yet been translated into specific policy measures. A proactive agenda also calls for attention for topics that as yet barely feature on the agenda such as facial recognition, virtual and augmented reality and the possible health effects of technology. Any truly overarching agenda will also contain a vision on how to involve society (see point 5). Supervisory bodies represent a vital link when it comes to reinforcing the governance system with regard to digitalisation issues. These watchdogs have indeed become more focused on those issues. It is their role to invest in establishing knowledge and collaborating with other supervisory bodies. A number of these watchdogs have been granted new authorities or increased budgets. It is essential that we continue to monitor whether and to what extent these new powers and increased funding are sufficient. These actions of strengthening the watchdogs can be regarded as first steps. We are only just beginning to understand the true potential of digitisation. From a strategic viewpoint it is therefore vital that we continue to invest in the capabilities and capacities of the supervisory bodies. Politicians and society as a whole are becoming increasingly aware of the societal and ethical aspects of digitalisation. This has resulted in growing pressure on the private sector to tackle these issues seriously. Corporate social responsibility in the field of digitalisation calls for a proactive attitude from the private sector in recognising and indeed anticipating the societal and ethical implications of the technology they are developing. In a whole number of ways, businesses are obliged to make the effort to protect human rights. It is now up to them to shape their duty of care, in practice. In order to help set the course for innovation, individual citizens must be closely involved. They must be informed of the possibilities and risks of technology and must be able to participate in the democratic debate and political decision-making processes. It is important that we continue to encourage these three elements in any strong governance system. There must also be clear attention for the limits of the self-reliance of citizens, and their willingness to participate. Values-driven innovation means shaping innovation on the basis of shared, public values. This can only be achieved in consultation with society and that in turn calls for a vision from government. How is society influenced by digital technologies? What is the aim of this report? Does this report also deal with the National Digitalisation Strategy? The 'governance system' must be strengthened. What exactly is meant by 'governance system'? This is a follow up to the report Urgent Upgrade. What was the conclusion of that report?
https://www.rathenau.nl/en/digitale-samenleving/directed-digitalisation
The Institute of Museum Ethics maintains that ethical issues underpin all aspects of work in museums — from governance to education, registration to exhibitions, finances to operations and visitor services. Whether in day-to-day decision-making or forging an overarching mission, museum ethics are about an institution’s relationship with people — individuals and groups in the communities a museum serves as well as its staff and board members. We define museum ethics through principles related to individual and institutional behavior, such as integrity, accountability, loyalty, honesty, and responsibility. We provide the tools to identify operative ethical principles, and we keep abreast of issues in the field as well as larger societal changes in order to anticipate the emergence of circumstances that might have an impact upon ethical practice in museums. The Institute also holds that museums should encourage understanding and promote social justice. As a result, we support the exploration of how institutions can use the past to address present concerns, facilitate dialogue among diverse groups, and empower marginalized communities, locally and globally.
http://www.museumethics.org/sample-page/
1. The Committee of Ministers has noted with interest Parliamentary Assembly Recommendation 1468 (2000) on biotechnologies. 2. It recalls that in response to the Parliamentary Assembly’s Recommendations 1213 (1993) on developments in biotechnology and the consequences for agriculture, 1389 (1998) on consumer safety and food quality, 1417 (1999) on the dioxin crisis and food safety and 1425 (1999) on biotechnology and intellectual property, and in order to address the conclusions of the International Conference on Ethical Issues Arising from the Application of Biotechnology (Oviedo, 16-19 May 1999), a multidisciplinary working party (CDBI-BIOTECH) was set up. Moreover, with regard to the above-mentioned Recommendations 1389 and 1417, it recalls the grouped reply given to the Parliamentary Assembly on 21 March 2001, which was based on the opinions of CDSP, CD-P-SP, CDBI and T-AP and referred also to Recommendations 1445 (2000) (Health security for Europe's population) and 1446 (2000) (Ban on antibiotics in food production). 3. With regard to Recommendation 1468, the attention of the CD-P-SP and its relevant subordinate committees was drawn to paragraph 6 i (adopting "the precautionary principle as a common tenet of decision-making"), in compliance with the decision adopted by the Committee of Ministers on 13 July 2000. 4. Biotechnology has indeed experienced great advances in recent decades and has the potential for continued advances in fields such as medicine, biology, forestry, food and agriculture. The discovery that DNA molecules are interchangeable to a large extent among animals, plants, bacteria and other organisms and the possibility of manipulating or changing their units (genes) have given biotechnology enormous scope for applications, but have also caused serious public concern about the safety and ethical acceptability of some of the new inventions. The Committee of Ministers is following these developments closely. The expanded use of biotechnology could have environmental, societal and economic consequences. These consequences could be both positive and negative, and could be perceived as such differently by different groups in European society. 5. The Committee of Ministers fully agrees with the statement that the central reference for choices to be made must be respect for human dignity and preservation of a healthy environment. It also recalls that cultural diversity, solidarity with the disadvantaged and the involvement of civil society are shared European values as is also our responsibility towards animals and the environment. It recognises the importance of providing consumers with relevant information in order to facilitate consumer choice. 6. The Committee of Ministers notes with interest the Parliamentary Assembly’s statement that public opinion should be adequately involved in political decision-making in regard to science and technology and scientists should be encouraged to participate more in public debate. 7. It agrees with the Parliamentary Assembly on the usefulness for the steering committees concerned to take account of the precautionary principle as appropriate and on the importance of instructing the Steering Committee on Bioethics (CDBI) to undertake an evaluation, in co-operation with other competent steering committees, and other relevant organisations, of the compatibility of new technologies in medicine and biology with fundamental ethical principles and human rights and of the relevance of the principles of non-commercialisation of the human body and individual consent. 8. The Committee of Ministers has considered the Parliamentary Assembly’s request concerning the elaboration of a future convention on the use of living matter. It agrees that the approach of utilising expert discussions, in conjunction with the involvement of citizens, the Parliamentary Assembly and national ethics committees, on issues related to the use of living matter in all the member states could be a very fruitful one. It recognises the importance of transparency and dialogue with all stakeholders in evaluating the applications of biotechnology and reaffirms the importance of the pan-European dimension of the Council of Europe, whose membership encompasses both member and non-member states of the European Union, in implementing co-operation in this field. 9. It fears, however, that it may be premature, before this debate has been undertaken, to state that the ultimate goal of this activity is a binding international convention, particularly on the world level. It may be that other solutions offer a more appropriate response to the specific questions of biotechnology. At the same time the Committee of Ministers recognises the importance of the member states’ being parties to global agreements on biotechnology and trade. 10. The Committee of Ministers notes the Parliamentary Assembly’s concern regarding the patenting of biotechnological inventions. It recalls, however, that the CDBI is mainly competent in the ethical, social and legal aspects of biomedicine. 11. The Committee of Ministers, alert to the spirit of transparency and public debate advocated by the Parliamentary Assembly, believes that the idea of an open, consultative forum on biotechnologies requires further examination. Taking into account the fact that fostering dialogue would be the objective of such a forum and also the Parliamentary Assembly’s experience in organising similar events, the Assembly could envisage taking responsibility for its organisation. The forum’s conclusions could contribute to opening up new ways for possible future action.
https://assembly.coe.int/nw/xml/XRef/X2H-Xref-ViewHTML.asp?FileID=9688&lang=EN
The Cyber Valley Public Advisory Board (PAB) is an independent committee that evaluates the ethical and social implications of research projects that are supported through the Cyber Valley Research Fund. Its role is to review project proposals from Cyber Valley research groups prior to their approval by the Cyber Valley Research Fund Board (RFB). The members of the PAB have access to all funding applications and can thus see how the funds are spent. Moreover, the PAB advises the RFB and can request further information, express concerns, and engage in debate. Its members were appointed by Baden-Württemberg’s science minister Theresia Bauer. They represent a broad spectrum of relevant disciplines and backgrounds. - PAB Spokesperson - Professor of Ethics at the International Centre for Ethics in the Sciences and Humanities (IZEW), University of Tübingen. Head of the Department of Society, Culture and Technical Change - Emeritus Director of the Max Planck Institute for Biological Cybernetics in Tübingen. Head of the"Human Perception, Cognition and Action" department Cyber Valley Public Advisory Board: About us (1) Core task The Public Advisory Board (PAB) aims to promote awareness and knowledge about ethical and societal concerns related to artificial intelligence (AI). The PAB’s main task is to critically discuss and evaluate research proposals submitted by researchers from the Universities of Stuttgart and Tübingen as well as the Max Planck Institute for Intelligent Systems. This research is financed by the Cyber Valley Research Fund, which comprises funds from the Cyber Valley research consortium’s industrial partners. In particular, the PAB discusses and evaluates research proposals with regard to a) the potential social consequences of the planned research and b) implicit assumptions underlying the research. To make it easier especially for young researchers to submit proposals, the members of the PAB also consider it their task to offer support. (2) Contexts Discussions about AI take place in a context of controversy. There are points of conflict to be considered, whether in relation to a specific research proposal or to the work of the PAB in general. Applications of artificial intelligence can improve human life and the environment, but they can also carry considerable risks. In the future, science and society must rise to the challenge of ensuring that AI is beneficial to as many people as possible, and that its risks are mitigated. The responsibility for the research done in Cyber Valley lies with the individual researchers themselves. It is primarily their responsibility to recognize and assess the potential impact of their work and to develop a research culture that critically and proactively reflects consequences. It is the aim of the PAB to support and encourage researchers to develop a culture in which there is a vital awareness of the importance of the ethical and social questions posed by their research. (3) Consequences When there is a conflict between research interests and social responsibility, the PAB acts as an intermediary and helps to understand and resolve the conflict. The PAB is an interdisciplinary committee that addresses both Cyber Valley as an institution and society at large. Within the context of AI research, the PAB is an innovative platform for scientific dialogue. Its focus is on dialogue and on giving advice based on sound arguments. It has neither the mandate nor the authority and usually not the interest to hinder or prevent research but rather to promote research that is ethically and socially responsible. The Board is actively committed to supporting researchers develop the capacity for ethical argumentation and ethical action. The PAB’s aims to: - Support scientists to take part in interdisciplinary dialogue, - Encourage dialogue between science and society, and - Contribute to informed political debates on the effects of AI on society. The PAB is founded on the belief that citizens whose lives will be increasingly impacted by intelligent systems have a right to research that is ethically and socially responsible.
http://cyber-valley.de/en/public-advisory-board
What are the ethical and human rights implications of Smart Information Systems? Looking towards the future of technology, SHERPA is a project that will investigate, analyse and synthesise our understanding of the ways in which Smart Information Systems impact ethics and human rights issues. Ethics and Human Rights in Smart Information Systems Forum of the IEEE Smart World conference Join the SHERPA Network SHERPA aims to address the ethical dimensions of Smart Information Systems (artificial intelligence and big data). The SHERPA project will guide the ongoing debate and develop actionable recommendations to make sure that SIS is for the public good. SIS may yield lots of benefits, yet it raises many ethical and legal issues and it is important to achieve a balance between the advantages of SIS and the ethical issues involved. In this field of competing rights and interests this is only possible with the expertise of a large variety of stakeholders who will be consulted to gather their views on existing threats, risks and possible solutions to achieve a better balance between the potential benefits of the new technologies and their impact on ethics and human rights. Do you want to get involved and bring in your expertise? Then join the SHERPA network and fill in the provided form. You can participate in an online survey and interviews. What are Smart Information Systems? Smart Information Systems, or SIS, are the combination of artificial intelligence and big data. Why Now? Smart Information Systems have reached a level of development that wil have a significant impact on individuals and society. Some examples of these technologies include Amazon’s Alexa home assistant, Google’s search engine, AI algorithms used in Facebook and other social media. Such SIS collect and process big data and use AI for analysis and decision-making, and have the most visible potential to raise ethical issues and affect human rights. Now is the time to harness the benefits of SIS and simultaneously address their downsides. The SHERPA project is uniquely placed to guide the ongoing debate, focus it and develop actionable recommendations and advocate them to ensure that SIS promote the public good. Our Approach SHERPA aims to clarify and exemplify the ethical and human rights issues of SIS through a series of methods: Developing 10 case studies and 5 future-looking scenarios. Working closely with 45 stakeholders throughout the project to conduct both a large-scale online survey of 1,000 European Citizens and a Delphi study with 60 experts. 10 short videos to demonstrate the steps of the project. Disseminate and Communicate these findings with stakeholders and the public Latest News, Articles & Press Releases Scenarios A series of scenario studies will form the backbone of this project. Some of the central themes will be: Transportation in the future. Healthcare applications. Policing and the use of AI. Warfare applications. Identity theft and mimicking. Social Media Partners Related Projects In collaboration with a variety of stakeholders, SIENNA will identify and assess the ethical and socio-economic issues, public opinions, legal regulation and human rights implications of AI & robotics, human enhancement and human genomics. SIENNA will produce a framework for each technology that will form the basis for development of research ethics protocols, professional ethical codes, and better ethical and legal frameworks. PANELFIT aims to promote innovation and market growth while still ensuring an adequate level of privacy and security/cybersecurity for private individuals. PANELFIT main outcome are the Guidelines on the Ethical and Legal Issues of ICT Research and Innovation. These Guidelines are aimed at serving as a complete handbook on ethics and law regarding research and innovation activities in the ICT field.
https://www.project-sherpa.eu/
Hosted by the White House Office of Science and Technology Policy (OSTP), the UC Berkeley School of Information, and the Berkeley Center for Law and Technology. This workshop is the last in a series of three events co-hosted by the OSTP and academic institutions across the country in response to President Obama’s call for a review of privacy issues in the context of increased digital information and the computing power to process it. Advance registration required. The event will also be live-streamed online. About the Workshop This workshop will examine the policy and governance questions raised by the use of large and complex data sets and sophisticated analytics to fuel decision-making across all sectors of the economy, academia and government. The event will feature a series of panel discussions, a closing roundtable, and keynote address. The goal of this workshop is to broaden the policy conversation along two dimensions. First, the workshop will explore the range of values that may be challenged by the growing use of big data techniques. These values include: (1) A variety of privacy-related values, including control over both personal information and physical being, and autonomy in decision-making; (2) Anti-discrimination values, including concerns about preserving fairness in an economic and political environment shaped by the growing technological capabilities to store and analyze data; and (3) Concerns about democratic values, accountability, and social cohesion where data-driven “personalization” fosters in an increasingly fragmented society. Second, the workshop will explore the range of mechanisms — regulatory, professional, and organizational — that can help ensure these values are protected. After identifying both the values at issue and the current instruments and practices for protecting those values, participants will seek to identify gaps between the two. This initial work will inform the conversation around fostering a big data environment that allows society to benefit from the insights of big data in a manner that remains true to societal values of individual privacy, democracy, and fairness.
https://citris-uc.org/event/big-data-values-and-governance-apr-1/
This article is part of the Forum Network series on Digitalisation. The Forum Network is the place for you to debate policies that can shape the issues and challenges of our time with other experts and engaged citizens. Join for free using your email or social media accounts to share your stories, ideas and expertise in the comments! Banner image: Pawel Szvmanski Scientists have spent decades trying to unlock the mysteries of the brain, in an effort to better diagnose and treat some of the most confounding diseases and disorders. Now, thanks to groundbreaking developments in brain science and neurotechnology, they seem closer than ever before. Fueled by the convergence of neuroscience, engineering, digitalisation and artificial intelligence (AI), these technologies have tremendous potential to improve health, well-being and productivity across the globe – and their effects are already being felt. Brain computer interfaces and new imaging approaches have opened up new avenues for diagnosis, monitoring, prevention and therapy in Alzheimer’s and other neurodegenerative diseases; and brain implants are already being used to stimulate neural activity in patients suffering from Parkinson’s disease. Researchers are even working to embed neurons and brain-like structures within computer chips that could provide a new way to conduct pre-clinical tests and diagnostics. How to be Human: The Manual by Ruby Wax, Actress; Comedian; Mental Health Campaigner; Lecturer; Author These innovations could deliver far-reaching benefits – nearly 19 million people live with dementia across the OECD – but they also pose serious risks. As neurotechnologies continue to evolve, concerns have been raised around privacy, human enhancement and the regulation and marketing of direct-to-consumer devices. There are also important questions around inequalities of use and access to these technologies. Find out more about the OECD's work on dementia and read the OECD Policy Brief Renewing priority for dementia: Where do we stand? Amid this rapidly shifting landscape, governments and innovators have sought guidance on how to foster responsible innovation in neurotechnology. How can we continue to reap the benefits of these innovations, while mitigating the new risks that they present? A new set of OECD principles sets out a way forward. On 11 December 2019 we adopted the Recommendation on Responsible Innovation in Neurotechnology, the first international standard in this domain. It aims to help governments and innovators anticipate and address the various ethical, legal and social challenges raised by new neurotechnologies, while still promoting innovation in the field. The underlying aim is not to constrain technology, but to shape pathways that enable it. Governance in neurotechnology has implications across the entire innovation pipeline, from fundamental brain research and cognitive neuroscience to questions of commercialisation and marketing. At the core of the Recommendation are nine principles: - Promoting responsible innovation - Prioritising safety assessment - Promoting inclusivity - Fostering scientific collaboration - Enabling societal deliberation - Enabling capacity of oversight and advisory bodies - Safeguarding personal brain data and other information - Promoting cultures of stewardship and trust across the public and private sector - Anticipating and monitoring potential unintended use and/or misuse. Although the Recommendation is not binding, it nevertheless marks an important step forward for the 36 OECD member countries that have adopted it and the others that will soon join. Governance in neurotechnology has implications across the entire innovation pipeline, from fundamental brain research and cognitive neuroscience to questions of commercialisation and marketing. To that end, the Recommendation is aimed not only at governments, but also universities, companies and investors – all of whom play a key role in ensuring the responsible development and governance of neurotechnologies. As countries continue to accelerate investment in this field through programs such as the EU Human Brain Project, the Recommendation and the principles it outlines should help them to put societal needs front and centre. Adopted today, the #OECD Recommendation on responsible innovation in #neurotechnology will help governments and innovators address ethical, legal & societal challenges raised by novel #neurotechnologies while promoting innovation in the field ➡️ https://t.co/1KwuFO9qWE pic.twitter.com/9Nfd8sM2oy — OECD Innovation (@OECDinnovation) 11 décembre 2019 Follow the OECD on Twitter and keep up to date on how we promote better policies for better lives The Recommendation is more than an ethics statement: it also addresses economic development and innovation policy. In many ways, it can be seen as a companion to the OECD AI Principles adopted earlier this year as they both underscore the importance of innovating in a socially responsible matter – innovating for innovation’s sake is no longer enough. And, like AI, neurotechnology is a broad field with implications for sectors as diverse as gaming and advertising. The OECD Recommendation focuses on health-related neurotechnology because of its outsize potential to advance our understanding of human cognition and behaviour. How Inequalities are Driving a Global Youth Mental Health Crisis by James Da Costa, Y7 Delegate, United Kingdom Going forward, the OECD will provide a forum for exchanging information on neurotechnology policy and experiences as countries work toward implementing the Recommendation. This kind of multilateral co-operation and dialogue will be crucial as neurotechnology continues to disrupt existing practices and redraw traditional boundaries between medical therapies and consumer markets. Given the nature of economic markets, technological spillover, and global science practice, one could argue that the governance of technology actually needs to be international in order to be effective. The OECD has long been at the forefront of developing effective principles and guidance for governments and stakeholders alike – and we look forward to helping countries as they navigate and explore new frontiers in the human mind. Related Topics |Artificial Intelligence|| Health | Your comments are what make the Forum Network the unique space it is, connecting citizens, experts and policy makers in open and respectful debate. Whether you agree, disagree or have another point of view, join for free using your email or social media accounts and comment below!
https://www.oecd-forum.org/posts/57641-new-frontiers-of-the-mind-enabling-responsible-innovation-in-neurotechnology?channel_id=722-digitalisation
From 22 to 27th March 2009 an international advanced course entitled Public Communication and Applied Ethics of Nanotechnology takes place at St Edmund Hall at the University of Oxford in the UK. The course is aimed at anyone working within nanotechnology or with an interest in its public communication and ethical implications, and the organizers state that there are strong indications that "nanotechnology may well be facing a public debate similar to those which have confronted the nuclear, chemical and biotechnology industries. Public communication and engagement are essential for its responsible development". The aim of this six-day Advanced Course is to enable the participants to carry out a wide variety of public communication activities discussing the social and ethical implications of their work with confidence. The program provides leading experts in public policy, science communication, ethics, risk assessment and regulatory affairs in the nanotechnology field. In an outline of the conference aims and objectives published on the nanobio-raise.org website (Nanobiotechnology: Responsible Action on Issues in Society and Ethics) the participants of the course will acquire: knowledge of the relevant ethical, legal and social aspects of nanotechnology; skills to communicate effectively with the media and the public; an understanding of the issues involved in the public acceptance of nanotechnology. The program is available do download in pdf through the nanobio-raise link above, with Monday being dedicated to nanotechnology in food and nanobiotechnology and public perception of risk in these areas, and the Tuesday theme of "Understanding and responding to ethical, legal and societal issues" looks very interesting with Mark Cantley, a former advisor to the Directorate-general for research of the European Commission speaking about public policy development for nanotechnology. On Wednesday the theme is "Public Perceptions of Nanotechnology and Risk" looking at European surveys and risk compensation and on the final two days the theme is media training. Course Coordination is by Dr Steffi Friedrichs, Director of the Nanotechnology Industries Association , Dr David Bennett, Delft University of Technology and St Edmund's College, University of Cambridge and Ms Serene Chi, also of Delft University of Technology, The Netherlands.
https://www.fondazionebassetti.org/it/focus/2009/03/international_course_in_public.html