Research and inquiry group presentation
Download
1 / 25

Research and Enquiry - Scenario 5 - PowerPoint PPT Presentation


  • 530 Views
  • Uploaded on

group presentation

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Research and Enquiry - Scenario 5' - Lisa_Faye


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Research and inquiry group presentation l.jpg

Researchand InquiryGroup Presentation

Jonathan Dalgliesh , Lisa FayeNajiaHaimd, Cheryl Manalo

& Charlotte Wong


Slide2 l.jpg

Scenario 5

Increasingly we live in a surveillance society that governments justify by claiming it keeps communities safe by combating the threat of terrorism. Assume you are a researcher working for the Mayor of a metropolitan city. Design a research approach that identifies the relevant issues so that they might be discussed at a community meeting of residents.Position –EpistemologicalCritical and Post-structuralist / Feminist


City of sydney l.jpg

http://www.cityofsydney.nsw.gov.au/AboutSydney/Maps.asp

City of Sydney

Boundaries includes:

The Rocks & Circular Quay

Centennial Park

Erskineville

Annandale

Rushcutter’s Bay


Narrow down research area and focus upon sydney city cbd l.jpg
Narrow down research area and focus uponSydney City / CBD

http://www.cityofsydney.nsw.gov.au/AboutSydney/documents/CBDDisabledAccess/catz_da_access_maps.pdf


What is terrorism l.jpg
What is terrorism?

‘The use of methods to induce terror, especially the use of violence to achieve political ends.’

Source: Macquarie Dictionary

‘Terrorism is understood as a type of violence. Many definitions highlight the experience of terror or fear as the proximate aim of that violence nor terror is inflicted for its own sake, but rather for the sake of a further aim such as coercion, or some more specific political objective.’

Source: Stanford Encyclopaedia of Philosophy


Background on close circuit television cctv l.jpg
Background on Close Circuit Television (CCTV)

Post 9/11 surveillance development shaped democratic processes which increasingly justify governments to increase surveillance in the interest of national security.

Source – Haggerty & Samatas (2010)

)

In 2005, ex-Prime Minister Howard visited London post the second of two bomb attacks on the public transport system, announcing:

“I think of all the things I have taken out of the few days that I have been in London, none has been more powerful than the huge value of surveillance cameras.”

He also subsequently offered in an interview about CCTVs that they are:

“ a real plus in catching people” and

“in certain circumstances....act as a deterrent”

Source – Brew (2005, p.1)


Background on cctv l.jpg
Background on CCTV

QLD State Minister for Transport and Main Roads,

Paul Lucas declared that what must be

understood is that CCTVs

do not provide a prior warning and do nothing to prevent the terrorist attack from taking place in the first place.

CCTV footage assists afterterrorists have struck.


Background on cctv8 l.jpg
Background on CCTV

Annual operating costs of selected CCTV systems as at 2003:

Source – Wilson and Sutton (2003).


Background on cctv9 l.jpg
Background on CCTV

Additionally , identifiable hidden costs of maintaining CCTV include:

  • lighting upgrades

  • signage

  • removal of visual obstructions (such as trees)

  • vandal resistance

  • training of staff to operate the cameras

  • ongoing maintenance

  • auditing and evaluation the surveillance system.

    Source – Brew (2005, p.4)


Street surveillance l.jpg
Street Surveillance

What policies already exist for street surveillance in the city of Sydney:

Street Safety Camera Program

http://www.cityofsydney.nsw.gov.au/community/safety/streetsafetycameraprogram.asp#cameralocations

Street Safety Camera Program – Code Of Ethics

(21 pages)

http://www.cityofsydney.nsw.gov.au/community/documents/safety/streetsafetyprogramcodeofpracticejune2010.pdf


Cctvs l.jpg
CCTVs

How many CCTV cameras are located in the Sydney CBD area?

280

Source:http://www.cityofsydney.nsw.gov.au/community/safety/streetsafetycameraprogram.asp#CameraLocations


Background on cctv12 l.jpg
Background on CCTV

CCTV privacy fears raised

(BBC footage):

http://news.bbc.co.uk/player/nol/newsid_6670000/newsid_6673500/6673565.stm?bw=nb&mp=wm&news=1&ms3=6&ms_javascript=true&bbcws=2


Research question l.jpg
Research question....???

Is street surveillance effective in the City of Sydney in combating terrorism?


If we were presenting these research perspectives l.jpg
If we were presenting these research perspectives

Positivist-objective

Interpretive-subjective

Epistemological approach

  • Testable, objective truth which is verifiable from the data

  • Approaches – scientific, correlation

    approach, quantitative data

  • Method – surveys

  • Data - statistically analysed

Epistemological approach

  • Truth is partial and relative, researcher is engaged subjectively

  • Approaches - ethnography

  • Method- narratives via audio / video recordings

  • Data-words/film which requires interpretation



Critical theory16 l.jpg
Critical Theory

Epistemological Position

  • Knowledge is located in a social and cultural contexts and imbued with power.

  • Researcher seeks to uncover/understand social inequalities and act to eliminate them.

  • Researcher is actively engaged with the world, and seeks to change it.

  • Truth is partial, relative and imbued with power


Critical theory17 l.jpg
Critical Theory

Approaches

  • Participatory action research

  • Critical ethnography

  • Appreciative enquiry

    Methods

  • Interviews, observations etc – must also involve some form of social action

    Data

  • Data involves words and actions, requires interpretation and reflection


Post structuralist feminist l.jpg
Post-structuralist / feminist


Post structuralist feminist19 l.jpg
Post-structuralist / feminist

Epistemological Position

  • Knowledge is inherently culture-bound, discursive and imbued with (productive) power.

  • Researcher seeks to disrupt assumptions about world, in order to critique power relations.

  • Researcher and the world are constructed and constituted by discourse.

  • Truth (s) is multiple, partial, perspective and can only be known through discourse


Post structuralist feminist20 l.jpg
Post-structuralist / feminist

Approaches

  • Deconstruction Foucauldian archeology and genealogy

    Methods

  • Interviews, observations, etc – treated as texts, discursive and semiotic analysis of texts

    Data

  • Data involves words or images and requires deconstruction


Ethical research l.jpg
Ethical Research

Unlike Galton who unethically used children for research purposes and whilst Thorndike used chickens...

our research methods will in no way endanger human life nor harm animals.

Nisbet (2005, p.29-31)


Ethical research22 l.jpg
Ethical Research

Principles which need to guide social research include ‘informed consent’, ‘privacy’, ‘confidentiality’ and ‘anonymity’.

Bulmer in Ramcharan & Cutcliffe(2001, p. 359)


The research debate l.jpg
The research debate

As a researcher working for the mayor of a metropolitan city - who is funding the study?

Council

Yates (2004, p.31) discusses the issues surrounding research in that funding can start to define research practices – in terms of what can be done and then including what is counted as legitimate research.


Conclusion l.jpg
Conclusion

http://www.youtube.com/watch?v=Z4rBDUJTnNU

GeorgeOrwell's 1949 novel called ‘1984’

depicts a totalitarian government

bent on total manipulation of its citizens.


References edit l.jpg
References (edit)

  • British Broadcasting Corporation 2010, CCTV Privacy fears raised, BBCTV, viewed 4 October 2010, <http://news.bbc.co.uk/player/nol/newsid_6670000/newsid_6673500/6673565.stm?bw=nb&mp=wm&news=1&ms3=6&ms_javascript=true&bbcws=2>.

  • Brew, N. 2005, An overview of the effectiveness of closed circuit television (CCTV) surveillance,Commonwealth of Australia, viewed 1 October 2010, <http://www.aph.gov.au/library/pubs/m/2005-06/06rn14.htm>.

  • City of Sydney 2010, City of Sydney Local Government Area, The Council of the City of Sydney, viewed 4 October 2010, <http://www.cityofsydney.nsw.gov.au/AboutSydney/Maps.asp>.

  • City of Sydney 2010, Sydney CBD Access Map, The Council of the City of Sydney, viewed 4 October 2010, <http://www.cityofsydney.nsw.gov.au/AboutSydney/documents/CBDDisabledAccess/catz_da_access_maps.pdf>.

  • City of Sydney 2010, Street Safety Camera Program, The Council of the City of Sydney, viewed 4 October 2010, <http://www.cityofsydney.nsw.gov.au/community/safety/streetsafetycameraprogram.asp#cameralocations>.

  • City of Sydney 2010, Street Safety Camera Program Code of Practice 2010, The Council of the City of Sydney, viewed 4 October 2010, <http://www.cityofsydney.nsw.gov.au/community/documents/safety/streetsafetyprogramcodeofpracticejune2010.pdf>.

    Haggerty & Samatas (2010)

  • MisterMaxHeadroom2008, 1984 George Orwell Movie Trailer 1984, video recording, viewed 4 September 2010, <http://www.youtube.com/watch?v=Z4rBDUJTnNU>.

  • Nisbet, J. 2005, ‘What is educational research? Changing perspectives through the 20th century’, Research Papers in Education, vol. 20, no. 1, pp. 25-44.

  • Ramcharan, P. & Cutcliffe , J.R. 2001, ‘Judging the ethics of qualitative research: considering the ‘ethics as process’ model, Health and Social Care in the Community, vol. 9, no. 6 , pp. 358-366.

    Wilson, D. & Sutton, A. 2003, ‘Open-Street CCTV in Australia’, Trends & Issues, no. 271, Australian Institute of Criminology’.

  • Yates, L. 2004, What does good educational research look like? Situating a field and its practices, Open University Press, Maidenhead and New York, Chapter 1, pp. 15-35.


ad