Search results

1 – 10 of over 2000
Book part
Publication date: 1 September 2016

Aaron Z. Pitluck

Although markets are intensely social, stock markets are peculiar in that they are normatively anonymous spaces. Anonymity is a difficult-to-achieve social accomplishment in which…

Abstract

Purpose

Although markets are intensely social, stock markets are peculiar in that they are normatively anonymous spaces. Anonymity is a difficult-to-achieve social accomplishment in which material identity information is successfully stripped from participants. The academic literature is conflicted regarding the degree to which equity markets are anonymous and how this influences traders’ behavior.

Methodology/approach

Based on focused, tape-recorded ethnographic interviews, this chapter investigates the work practices of professional investors and brokers to describe the conditions under which brokers veil or reveal investors’ identities to their competitors, and thereby shed light on how anonymity is socially produced (or eroded) in global stock markets.

Findings

The social structure of brokered financial markets places brokers in the awkward situation of sitting in an information-poor structural location for so-called “fundamental information” while being paid to share information with professional investors who sit in an information-rich structural location. A resolution to this material and social dilemma is that brokers can erode the market’s anonymity by gifting identity information (“order flow”) – the previous, prospective, or pending trades of their clients’ competitors – thereby providing traders a competitive advantage. They share identity information in three types of performances: transparent relationships, masked relationships, and the transformation of illicit material identity information into licit and sharable “fundamental” information. Each performance partly erodes transaction-level and market-level anonymity while simultaneously partially supporting anonymity.

Practical implications

Laws and regulations requiring brokers’ confidentiality of their clients’ trades are easily and systematically eluded. Policy makers and regulators may opt to respond by increasing surveillance and mechanization of brokers’ work so as to promote a normatively anonymous market. Alternatively, they may opt to question the value of promoting and policing anonymity in financial markets by revising insider trading regulations.

Originality/value

Even well-regulated markets are semi-anonymous spaces due to the systematic exposure of investors’ identities to competitors by their shared brokers on a daily basis. This finding provides an additional explanation for how professional investors can imitate one another (“herd”) as well as why subpopulations of investors often trade so similarly to one another.

Details

The Economics of Ecology, Exchange, and Adaptation: Anthropological Explorations
Type: Book
ISBN: 978-1-78635-227-9

Keywords

Book part
Publication date: 29 November 2012

Andrew Lepone, Reuben Segara and Brad Wong

This study investigates whether broker anonymity impairs the ability of the market to detect informed trading in the lead up to takeover announcements. Our research represents the…

Abstract

This study investigates whether broker anonymity impairs the ability of the market to detect informed trading in the lead up to takeover announcements. Our research represents the first study in this area to analyse the effects of broker anonymity in the context of significant information asymmetry. Results indicate that informed traders are less detected, and therefore better off when broker identifiers are concealed. This finding has important policy implications for exchange officials deciding whether or not to reveal broker identifiers surrounding trades, especially considering that almost all prior research suggests that broker anonymity is correlated with improved liquidity.

Details

Transparency and Governance in a Global World
Type: Book
ISBN: 978-1-78052-764-2

Keywords

Book part
Publication date: 12 December 2017

Matthew L. Williams, Pete Burnap, Luke Sloan, Curtis Jessop and Hayley Lepps

Some researchers consider most social media communications as public, and posts from networks such as Twitter are routinely harvested and published without anonymization and…

Abstract

Some researchers consider most social media communications as public, and posts from networks such as Twitter are routinely harvested and published without anonymization and without direct consent from users. In this chapter, we argue that researchers must move beyond the permissions granted by ‘legal’ accounts of the use of these new forms of data (e.g., Terms and Conditions) to a more nuanced and reflexive ethical approach that puts user expectations, safety, and privacy rights center stage. Through two projects, we present qualitative and quantitative data that illustrate social media users’ views on the use of their data by researchers. Over four in five report expecting to be asked for their consent and nine in ten expect anonymity ahead of publication of their Twitter posts. Given the unique nature of this online public environment and what we know about users’ views pertaining to informed consent, anonymity, and harm, we conclude researchers seeking to embark on social media research should conduct a risk assessment to determine likely privacy infringement and potential user harm from publishing user content.

Details

The Ethics of Online Research
Type: Book
ISBN: 978-1-78714-486-6

Keywords

Book part
Publication date: 10 January 2007

Kristen H. Perry

Current practice, reified through typical IRB guidelines, has its roots in traditional positivist frameworks about research. The positivist research paradigm is traceable back to…

Abstract

Current practice, reified through typical IRB guidelines, has its roots in traditional positivist frameworks about research. The positivist research paradigm is traceable back to Enlightenment epistemologies, which emphasized the fact-based, value-free nature of knowledge (Christians, 2000; Cunningham & Fitzgerald, 1996; Howe & Moses, 1999; Muchmore, 2000). Christians (2000) suggests that researchers who were grounded in positivist approaches used utilitarian perspectives on research ethics. The utilitarian approach suggested that a single set of moral considerations could guide all inquiry; these considerations were outlined in a generally accepted code of ethics that emphasized informed consent, privacy/confidentiality, and accuracy, and that opposed deception in research. Many of these conventions were codified in national legislation in the USA beginning in 1974, in response to several experiments that had mistreated research participants (Hecht, 1995; UCRIHS, 2004). According to Christians (2000), ‘Three principles, published in what became known as the Belmont Report, were said to constitute the moral standards for research involving human subjects: respect for persons, beneficence, and justice’ (p. 140). These principles were intended to ensure that people participated in research voluntarily and anonymously; that researchers protected the well-being of their participants; and that both the benefits and the burdens of research be distributed equitably (Christians, 2000). This legislation established requirements for IRBs that would review and monitor federally funded research conducted by universities and other institutions. Most universities and other research-conducting institutions have since expanded the purview of their IRBs to monitor all institutional research – not just that which is federally funded (Hecht, 1995).

Details

Methodological Developments in Ethnography
Type: Book
ISBN: 978-1-84950-500-0

Abstract

Details

The Cryopolitics of Reproduction on Ice: A New Scandinavian Ice Age
Type: Book
ISBN: 978-1-83867-043-6

Book part
Publication date: 5 June 2020

Angela Stephanie Mazzetti

In this chapter, the author explores the ethical challenge of preserving participant anonymity when using visual methods in ethnographic research. Referring to her own…

Abstract

In this chapter, the author explores the ethical challenge of preserving participant anonymity when using visual methods in ethnographic research. Referring to her own ethnographic study in post-conflict Northern Ireland, the author explores how social, cultural, and political contexts may accentuate the need to preserve anonymity. The author discusses her rationale for opting not to use photographs in this context and puts forward the case for using participant-produced drawings as an alternative to photographs. Drawings accomplish similar rich benefits as photographs but may ameliorate the ethical challenges inherent in photographic work of maintaining participant anonymity.

Details

Ethics and Integrity in Visual Research Methods
Type: Book
ISBN: 978-1-78769-420-0

Keywords

Book part
Publication date: 8 February 2016

Jennifer S. Hendricks

Derek Parfit’s non-identity problem calls into question the claims of both the state and individuals when they purport to act for the benefit of future children. This paper…

Abstract

Derek Parfit’s non-identity problem calls into question the claims of both the state and individuals when they purport to act for the benefit of future children. This paper discusses how adoption of the non-identity argument as a legal argument could affect reproductive and family policy, demonstrating that it undermines the child-centric approach to assigning legal parentage. The paper concludes, however, that these non-identity problems can be solved by the expected value approach, which demonstrates that efforts to benefit future people can be logically coherent even if those efforts also affect the genetic identities of the future people.

Book part
Publication date: 12 December 2017

Leanne Townsend and Claire Wallace

Over the past decade, the number of people engaging with social media has grown rapidly. This means that social media platforms such as Twitter and Facebook are potentially good…

Abstract

Over the past decade, the number of people engaging with social media has grown rapidly. This means that social media platforms such as Twitter and Facebook are potentially good sources of rich, naturally occurring data. As a result, a growing number of researchers are utilizing these platforms for the collection of data on any number of topics. To date, no consistent approach to the ethics of using social media data has been provided to researchers in this sphere. This chapter presents research that has developed an ethics framework for the use of researchers working with social media data. The chapter also presents the framework itself and guidance on how to use the framework when conducting social media research. A full report can be accessed on: http://www.abdn.ac.uk/socsci/research/new-europe-centre/information-societies-projects-225.php

Details

The Ethics of Online Research
Type: Book
ISBN: 978-1-78714-486-6

Keywords

Book part
Publication date: 4 November 2021

Abigail Shabtay

This chapter explores ethical issues related to the use of drama-based methods in child and youth-focussed research projects. It begins by outlining some of the reasons for…

Abstract

This chapter explores ethical issues related to the use of drama-based methods in child and youth-focussed research projects. It begins by outlining some of the reasons for utilising drama-based research methods in projects that examine children’s perspectives and lived experiences. The chapter proceeds to discuss specific methods of drama-based inquiry including ethnodrama, ethnotheatre, reader’s theatre, play-building, devised theatre and collective creation. The sections draw on examples from recent drama-based research projects to highlight some of the key ethical considerations in drama-based research with children and young people, including specific issues surrounding representation, transparency, physical risks, power dynamics, consent, confidentiality, anonymity and reciprocity. The author shares her experiences of navigating some of the tricky ethical challenges involved in a recent participatory play-building project in Canada, providing some suggestions to help researchers in the field become better prepared to use and assess these methods and approaches in research with children and young people.

Details

Ethics and Integrity in Research with Children and Young People
Type: Book
ISBN: 978-1-80043-401-1

Keywords

Open Access
Book part
Publication date: 4 June 2021

Briony Anderson and Mark A. Wood

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…

Abstract

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 10 of over 2000