Search results

1 – 9 of 9
Open Access
Book part
Publication date: 4 May 2018

Syahril Efendi, Baihaqi Siregar and Heru Pranoto

Innovation in a decentralized blockchain infrastructure can be used by medicine as a prerequisite for the exchange of patient data. Developments in the medical device industry…

Abstract

Innovation in a decentralized blockchain infrastructure can be used by medicine as a prerequisite for the exchange of patient data. Developments in the medical device industry that support the technology of the internet of things and wireless sensor networks also facilitate the examination of patient medical records that no longer require visits to the practice of doctors or hospitals which in some cases takes in a considerable time. Not to mention the consideration of traffic congestion and busy routine in the work. Patients can check their healthcare concerns using only sensors such as e-Health Sensor Shield Platform which then sends recording results through the transmission line to the data lakes. However, this patient’s medical record data is very confidential and may only be accessed by certain parties only. This required the design of the concept of security in the transmission of data so that the data does not leak to parties who are not eligible. This paper attempts to provide an overview of the concept of using encryption with an asymmetric key for securing data from sensors to data lakes before forwarding to a decentralized, interconnected blockchain infrastructure.

Open Access
Book part
Publication date: 4 June 2021

Seonaid Stevenson-McCabe and Sarai Chisala-Tempelhoff

Technology-facilitated violence and abuse including image-based sexual abuse (IBSA) is a phenomenon affecting women and girls around the world. Abusers misuse technology to attack…

Abstract

Technology-facilitated violence and abuse including image-based sexual abuse (IBSA) is a phenomenon affecting women and girls around the world. Abusers misuse technology to attack victims and threaten their safety, privacy, and dignity. This abuse is gendered and a form of domestic and sexual violence. In this article, the authors compare criminal law approaches to tackling IBSA in Scotland and Malawi. We critically analyze the legislative landscape in both countries, with a view to assessing the potential for victims to seek and obtain redress for IBSA. We assess the role criminal law has to play in each jurisdiction while acknowledging the limits of criminal law alone in terms of providing redress.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 9 December 2021

Alfonso Alfonsi and Maresa Berliri

This chapter, based on a sociological approach, addresses the ethical issues of surveillance research from the perspective of the profound transformations that science and…

Abstract

This chapter, based on a sociological approach, addresses the ethical issues of surveillance research from the perspective of the profound transformations that science and innovation are undergoing, as part of a broader shift from modern to post-modern society, affecting also other major social institutions (such as government, religion, family, and public administration). The change occurring in the science and technology system is characterised by diminishing authority, uncertainty about internal mechanisms and standards, and a declining and increasingly difficult access to resources. Such changes, also related to globalisation and new digital technologies, have transformed the way research is conducted and disseminated. Research is now more open and its results more easily accessible to citizens.

Scientific research is also put under increased public scrutiny, while, at the same time, public distrust and disaffection towards science is rising. In such a context, it is more important than ever to make sure that research activities are not compromised by fraudulent and unethical practices. The legitimate expectations of citizens to enjoy their rights, including the ability to protect their private sphere, are growing. Scientific and technological development is deeply interrelated with the widespread awareness of these rights and the possibility of exercising them, but it produces also new risks, while a widespread sense of insecurity increases. The digital revolution, while improving people’s quality of life, offers at the same time new opportunities for crime and terrorism, which in turn has produced a demand to strengthen security systems through increasingly advanced and intrusive surveillance technologies. Misconduct in the field of surveillance may not only undermine the quality of research, but also further impair society’s trust in research and science as well as in the State and its institutions.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Book part
Publication date: 1 May 2019

Nils O.E. Olsson, Ali Shafqat, Emrah Arica and Andreas Økland

The purpose of this paper is to study the introduction of 3D-printing of concrete in the construction sector.

Abstract

Purpose

The purpose of this paper is to study the introduction of 3D-printing of concrete in the construction sector.

Design/Methodology/Approach

A survey was conducted to collect professional view on ongoing innovations in the construction sector, including 3D-printing. Participants were selected among the members of Norwegian networks for project and construction management research.

Findings

The survey highlighted effective leadership, collaboration with partners and industry-academia collaboration as primary enablers of innovation. Few of the respondents to the survey have used 3D-printing technologies.

Research Limitations/Implications

It is difficult to obtain representative samples in this type of research, including this study. The study can be seen as a snapshot of attitudes in the sector.

Practical Implications

3D-printing appear as a potentially interesting technology, especially for unstandardized construction components. Further work is needed to materialise the expectation for technological development in the construction sector.

Originality/Value

Most research on 3D-printing has focused on demonstrating technical potential. This study adds a practitioners’ perspective, with a large dose of pragmatism.

Details

10th Nordic Conference on Construction Economics and Organization
Type: Book
ISBN: 978-1-83867-051-1

Keywords

Open Access
Book part
Publication date: 29 November 2023

Fikria El Kaouakibi

This chapter describes the research ecosystem’s development in Qatar from 2006 until the present day, a brief history of this development, and future development plans. The…

Abstract

This chapter describes the research ecosystem’s development in Qatar from 2006 until the present day, a brief history of this development, and future development plans. The information provided is a snapshot of the entire research administration enterprise in the country and estimates the current number of employed research management and administration (RMAs). It also presents the challenges and the pivotal role of the RMAs can play in achieving the country’s strategic objective, which could increase the number and the professionalisation of RMAs in Qatar. Some recommendations highlighted here include specialising RMAs in the field of the human subject and animal research protection, research compliance, intellectual property, and commercialisation.

Details

The Emerald Handbook of Research Management and Administration Around the World
Type: Book
ISBN: 978-1-80382-701-8

Keywords

Open Access
Book part
Publication date: 4 June 2021

Eva PenzeyMoog and Danielle C. Slakoff

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this…

Abstract

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this chapter, we discuss three unique types of technological abuse: (1) financial abuse via banking websites and apps; (2) abuse via smart home devices (i.e., “Internet of Things” abuse); and (3) stalking via geo-location or GPS. We also argue pregnancy and wellness apps provide an opportunity for meaningful intervention for pregnant victims of domestic violence.

While there is no way to ensure users' safety in all situations, we argue thoughtful considerations while designing and building digital products can result in meaningful contributions to victims' safety. This chapter concludes with PenzeyMoog's (2020) “Framework for Inclusive Safety,” which is a roadmap for building technology that increases the safety of domestic violence survivors. This framework includes three key points: (1) the importance of educating technologists about domestic violence; (2) the importance of identifying possible abuse situations and designing against them; and (3) identifying user interactions that might signal abuse and offering safe interventions.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 30 April 2019

S. J. Oswald A. J. Mascarenhas

Rights and duties are involved in every area of business and markets, and society and governments. Most often, rights and duties involve serious ethical and moral issues of…

Abstract

Executive Summary

Rights and duties are involved in every area of business and markets, and society and governments. Most often, rights and duties involve serious ethical and moral issues of conflict. A good theory of the ethics of rights and duties, obligations, and responsibilities will empower us to understand the impact of our actions on various stakeholders. Additionally, a deep understanding of rights and duties could help us to analyze better the impact of our executive actions on various stakeholders and, in particular, to fathom the damaging effects of rights and duties violated by the man-made current financial crisis when seen from an ethical and moral point of view. Our coverage on the ethics of corporate rights and duties will comprise of two parts: Part 1: The Nature of Corporate Business Rights and Duties, and Part 2: Respecting Corporate Rights and Duties. The chapter will feature Newcomb Wellesley Hohfeld’s framework of legal interests such as claims, privileges, power, and immunity and its various applications to contemporary market and corporate executive situations. We illustrate the theory of rights and duties using several cases from the current turbulent markets.

Details

Corporate Ethics for Turbulent Markets
Type: Book
ISBN: 978-1-78756-192-2

Open Access
Book part
Publication date: 14 October 2021

Lisa Sugiura

Abstract

Details

The Incel Rebellion: The Rise of the Manosphere and the Virtual War Against Women
Type: Book
ISBN: 978-1-83982-257-5

Access

Only Open Access

Year

Content type

Book part (9)
1 – 9 of 9