SlideShare a Scribd company logo
1 of 8
Supervision in the  Network Society connecticon or panopticon? ? Neil Ballantyne
Aims of supervision (Kadushin, 2002) Adapted by: McKenna, Thom, Howard & Williams (2008) . Administrative Provision of oversight of and accountability for practice Development and maintenance of competence Safety system for the service Educational Professional & educational development Reflection on practice Application of theory to practice Foster innovative and creative practice Clarification of role and relationships Clarification of the therapeutic relationship Increased beneficial outcome for service users Supportive Empowerment Encouragement Support Management of the emotional effects of the work Provision of a safe place to explore ethical and safety issues Management of wider organisational or team issues Promotion of job satisfaction Management of stress and prevention of “burn out” Enhancing welfare and well-being
Sociological perspectives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The panopticon ,[object Object],[object Object],[object Object],[object Object],[object Object]
The connecticon (Rennie & Mason, 2004) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Supervision technology examples Surveillant Reflective Keystroke capture Online evidence base CCTV monitoring Audio/video case capture GPS monitoring of movements Online discussion groups Internet use filtering & monitoring Specialist knowledge networks Call monitoring Tele & video conferencing Electronic case recording
Technology implementation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Some issues ,[object Object],[object Object],[object Object],[object Object],[email_address]

More Related Content

Viewers also liked

Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Bodyspacesociety Blog
 
FULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT INFULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT INClaire Cross
 
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...GNWP
 
Mobile Phones, a Girl’s Best Friend?: How the Mobile Phone Industry Legitimi...
Mobile Phones, a Girl’s Best Friend?:  How the Mobile Phone Industry Legitimi...Mobile Phones, a Girl’s Best Friend?:  How the Mobile Phone Industry Legitimi...
Mobile Phones, a Girl’s Best Friend?: How the Mobile Phone Industry Legitimi...Jacqueline Vickery
 
UN Security Council Res 1325 on Women, Peace and Security advocacy study
UN Security Council Res 1325 on Women, Peace and Security advocacy studyUN Security Council Res 1325 on Women, Peace and Security advocacy study
UN Security Council Res 1325 on Women, Peace and Security advocacy studyGry Tina Tinde
 
Sexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in WarSexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in Warcarla
 
Privacy in the age of surveillance
Privacy in the age of surveillance Privacy in the age of surveillance
Privacy in the age of surveillance Cristina Costa
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillancecfeutlinske
 
Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and futureblogzilla
 
Coaching Culture 2010
Coaching Culture 2010Coaching Culture 2010
Coaching Culture 2010Z Hoeben
 
Gender, disaster and conflict
Gender, disaster and conflictGender, disaster and conflict
Gender, disaster and conflictRanjani K.Murthy
 
United Nations Peacekeeping
United Nations PeacekeepingUnited Nations Peacekeeping
United Nations PeacekeepingHayley Alderman
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance SocietyKaren Moxley
 

Viewers also liked (13)

Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
 
FULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT INFULL DISS FOR TURN IT IN
FULL DISS FOR TURN IT IN
 
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
Implementing UNSCR 1325 on Women and Peace and Security: Strengthening the CS...
 
Mobile Phones, a Girl’s Best Friend?: How the Mobile Phone Industry Legitimi...
Mobile Phones, a Girl’s Best Friend?:  How the Mobile Phone Industry Legitimi...Mobile Phones, a Girl’s Best Friend?:  How the Mobile Phone Industry Legitimi...
Mobile Phones, a Girl’s Best Friend?: How the Mobile Phone Industry Legitimi...
 
UN Security Council Res 1325 on Women, Peace and Security advocacy study
UN Security Council Res 1325 on Women, Peace and Security advocacy studyUN Security Council Res 1325 on Women, Peace and Security advocacy study
UN Security Council Res 1325 on Women, Peace and Security advocacy study
 
Sexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in WarSexual Violence Against Women and Girls in War
Sexual Violence Against Women and Girls in War
 
Privacy in the age of surveillance
Privacy in the age of surveillance Privacy in the age of surveillance
Privacy in the age of surveillance
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and future
 
Coaching Culture 2010
Coaching Culture 2010Coaching Culture 2010
Coaching Culture 2010
 
Gender, disaster and conflict
Gender, disaster and conflictGender, disaster and conflict
Gender, disaster and conflict
 
United Nations Peacekeeping
United Nations PeacekeepingUnited Nations Peacekeeping
United Nations Peacekeeping
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 

Similar to Supervision in the network society

Using technology to enhance clinical supervision
Using technology to enhance clinical supervisionUsing technology to enhance clinical supervision
Using technology to enhance clinical supervisionEdina Renfro-Michel
 
Implementing Best Practices.pptx
Implementing Best Practices.pptxImplementing Best Practices.pptx
Implementing Best Practices.pptxdamilolasunmola
 
Towards a Structured Information Security Awareness Programme
Towards a Structured Information Security Awareness ProgrammeTowards a Structured Information Security Awareness Programme
Towards a Structured Information Security Awareness Programmetulipbiru64
 
3. Implications For Organizational Structure, Culture And Management
3. Implications For Organizational Structure, Culture And Management3. Implications For Organizational Structure, Culture And Management
3. Implications For Organizational Structure, Culture And Managementmctripletwo
 
3. Implications For Organizational Structure, Culture And Management
3. Implications For Organizational Structure, Culture And Management3. Implications For Organizational Structure, Culture And Management
3. Implications For Organizational Structure, Culture And Managementmctripletwo
 
Emergent Learning Networks: Collaboration 2005 Q
Emergent Learning Networks: Collaboration 2005 QEmergent Learning Networks: Collaboration 2005 Q
Emergent Learning Networks: Collaboration 2005 QVideoguy
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxdamilolasunmola
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can ChantellPantoja184
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
Dave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO InsightsDave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO Insightsciso_insights
 
Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...Plan de Calidad para el SNS
 
ICT Quality Assurance
ICT Quality AssuranceICT Quality Assurance
ICT Quality AssuranceAshley Tan
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Research presentation - vijal doshi
Research presentation - vijal doshiResearch presentation - vijal doshi
Research presentation - vijal doshivijald
 
IDAS and the Accounting Professional
IDAS and the Accounting ProfessionalIDAS and the Accounting Professional
IDAS and the Accounting ProfessionalMicheal Axelsen
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Karlos Svoboda
 
Technolody Acceptance Model
Technolody Acceptance ModelTechnolody Acceptance Model
Technolody Acceptance ModelKimberly Thomas
 

Similar to Supervision in the network society (20)

Using technology to enhance clinical supervision
Using technology to enhance clinical supervisionUsing technology to enhance clinical supervision
Using technology to enhance clinical supervision
 
Implementing Best Practices.pptx
Implementing Best Practices.pptxImplementing Best Practices.pptx
Implementing Best Practices.pptx
 
Towards a Structured Information Security Awareness Programme
Towards a Structured Information Security Awareness ProgrammeTowards a Structured Information Security Awareness Programme
Towards a Structured Information Security Awareness Programme
 
3. Implications For Organizational Structure, Culture And Management
3. Implications For Organizational Structure, Culture And Management3. Implications For Organizational Structure, Culture And Management
3. Implications For Organizational Structure, Culture And Management
 
3. Implications For Organizational Structure, Culture And Management
3. Implications For Organizational Structure, Culture And Management3. Implications For Organizational Structure, Culture And Management
3. Implications For Organizational Structure, Culture And Management
 
Emergent Learning Networks: Collaboration 2005 Q
Emergent Learning Networks: Collaboration 2005 QEmergent Learning Networks: Collaboration 2005 Q
Emergent Learning Networks: Collaboration 2005 Q
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Dave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO InsightsDave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO Insights
 
Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...
 
ICT Quality Assurance
ICT Quality AssuranceICT Quality Assurance
ICT Quality Assurance
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Knowledge Agenda
Knowledge Agenda Knowledge Agenda
Knowledge Agenda
 
Research presentation - vijal doshi
Research presentation - vijal doshiResearch presentation - vijal doshi
Research presentation - vijal doshi
 
IDAS and the Accounting Professional
IDAS and the Accounting ProfessionalIDAS and the Accounting Professional
IDAS and the Accounting Professional
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
 
Technolody Acceptance Model
Technolody Acceptance ModelTechnolody Acceptance Model
Technolody Acceptance Model
 
CETI Driver for change
CETI Driver for changeCETI Driver for change
CETI Driver for change
 

Recently uploaded

Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 

Recently uploaded (20)

Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 

Supervision in the network society

  • 1. Supervision in the Network Society connecticon or panopticon? ? Neil Ballantyne
  • 2. Aims of supervision (Kadushin, 2002) Adapted by: McKenna, Thom, Howard & Williams (2008) . Administrative Provision of oversight of and accountability for practice Development and maintenance of competence Safety system for the service Educational Professional & educational development Reflection on practice Application of theory to practice Foster innovative and creative practice Clarification of role and relationships Clarification of the therapeutic relationship Increased beneficial outcome for service users Supportive Empowerment Encouragement Support Management of the emotional effects of the work Provision of a safe place to explore ethical and safety issues Management of wider organisational or team issues Promotion of job satisfaction Management of stress and prevention of “burn out” Enhancing welfare and well-being
  • 3.
  • 4.
  • 5.
  • 6. Supervision technology examples Surveillant Reflective Keystroke capture Online evidence base CCTV monitoring Audio/video case capture GPS monitoring of movements Online discussion groups Internet use filtering & monitoring Specialist knowledge networks Call monitoring Tele & video conferencing Electronic case recording
  • 7.
  • 8.