Search results

1 – 10 of 12
Open Access
Book part
Publication date: 9 December 2021

Kevin Macnish

Large-scale data analytics have raised a number of ethical concerns. Many of these were introduced in a seminal paper by boyd and Crawford and have been developed since by others…

Abstract

Large-scale data analytics have raised a number of ethical concerns. Many of these were introduced in a seminal paper by boyd and Crawford and have been developed since by others (boyd & Crawford, 2012; Lagoze, 2014; Martin, 2015; Mittelstadt, Allo, Taddeo, Wachter, & Floridi, 2016). One such concern which is frequently recognised but under-analysed is the focus on correlation of data rather than on the causative relationship between data and results. Advocates of this approach dismiss the need for an understanding of causation, holding instead that the correlation of data is sufficient to meet our needs. In crude terms, this position holds that we no longer need to know why X+Y=Z. Merely acknowledging that the pattern exists is enough.

In this chapter, the author explores the ethical implications and challenges surrounding a focus on correlation over causation. In particular, the author focusses on questions of legitimacy of data collection, the embedding of persistent bias, and the implications of future predictions. Such concerns are vital for understanding the ethical implications of, for example, the collection and use of ‘big data’ or the covert access to ‘secondary’ information ostensibly ‘publicly available’. The author’s conclusion is that by failing to consider causation, the short-term benefits of speed and cost may be countered by ethically problematic scenarios in both the short and long term.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Book part
Publication date: 14 November 2017

John E. Tyler, Evan Absher, Kathleen Garman and Anthony Luppino

This chapter demonstrates that social business models do not meaningfully prioritize or impose accountability to “social good” over other purposes in ways that (a) best protect…

Abstract

This chapter demonstrates that social business models do not meaningfully prioritize or impose accountability to “social good” over other purposes in ways that (a) best protect against owners changing their minds or entry of new owners with different priorities and (b) enable reliable accountability over time and across circumstances. This chapter further suggests a model – a “social primacy company” – that actually prioritizes “social good” and meaningful accountability to it. This chapter thus clarifies circumstances under which existing models might be most useful and are not particularly useful, especially as investors, entrepreneurs, employees, regulators, and others pursue shared, common understandings about purposes, priorities, and accountability.

Open Access
Book part
Publication date: 1 May 2019

Radhlinah Aulin, Åsa Ek and Christofer Edling

This paper will examine the unsafe work practices that are plaguing the construction industry. Statistics show that four out of five of all workplace accidents are attributed to…

Abstract

Purpose

This paper will examine the unsafe work practices that are plaguing the construction industry. Statistics show that four out of five of all workplace accidents are attributed to unsafe behaviour. Research studies have sought to understand worker self-protection. For example, it is difficult to make predictions of conditions that influenced worker’s behaviour to act unsafely or safely in a given work situation. It is evident there is a gap in the literature in this area of research, most notably failing to understand the underlying “why” factors. The aim of the study is to identify and examine the proximate set of contributing factors most likely to have an influence on workers’ decisions about participation in unsafe behaviour.

Design/Methodology/Approach

To perform the study, questionnaires were adopted, and 225 construction workers from 9 construction companies participated in the study.

Findings

Results showed that both underlying organisational factors and individual factors could affect the risk aversion among construction workers. The paper also highlights measures to create a safe work environment to minimise unsafe behaviour among construction workers. Results from the study are important to help organisation to systematically plan for a good working environment.

Research limitations

As the results were based only from the questionnaires, a deeper understanding behind the workers’ responses was not probed.

Practical implications

Construction companies should work at several organisational levels at the same time. It is necessary to include levels such as individual, group, workplace and management levels, thus taking a system perspective on risk behaviour and safety.

Details

10th Nordic Conference on Construction Economics and Organization
Type: Book
ISBN: 978-1-83867-051-1

Keywords

Open Access
Book part
Publication date: 9 December 2021

Abstract

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Open Access
Book part
Publication date: 9 December 2021

Ron Iphofen and Dónal O'Mathúna

In light of the many crises and catastrophes faced in the modern world, policymakers frequently make claims to be ‘following the science’ or being ‘governed by the data’. Yet…

Abstract

In light of the many crises and catastrophes faced in the modern world, policymakers frequently make claims to be ‘following the science’ or being ‘governed by the data’. Yet, conflict based on inequalities continue to fuel dissatisfaction with the decisions and actions of authorities. Research into public security may require surveillance and covert observations, all of which are subject to major ethical challenges. Any neat distinction between covert and overt research is difficult to maintain given the variety of definitions used for all the terms addressed here. Covert research may be ethically justified and is not necessarily deceptive. In any case, deception may be ethical if engaged in for the ‘right’ reasons. Modern research sites and innovative research methods may enhance opportunities for covert work. In all surveillance and covert work, care must be taken about how consent is managed, how observed subjects are protected and harm to all involved minimised in all situations.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Book part
Publication date: 3 July 2020

Craig Kelly, Adam Lynes and Kevin Hoffin

Abstract

Details

Video Games Crime and Next-Gen Deviance
Type: Book
ISBN: 978-1-83867-450-2

Open Access

Abstract

Details

Video Games Crime and Next-Gen Deviance
Type: Book
ISBN: 978-1-83867-450-2

Open Access
Book part
Publication date: 29 March 2022

Andrew M. Jefferson and Samantha Jeffries

The chapters in this book show that it is possible to conduct studies on the intersections between gender, criminalization, imprisonment, and human rights in Southeast Asia. In…

Abstract

The chapters in this book show that it is possible to conduct studies on the intersections between gender, criminalization, imprisonment, and human rights in Southeast Asia. In this conclusion, we draw out the implications of this emerging scholarship. More specifically, we critically examine how common talk about “individual needs” risks blinding criminal justice reformers to the structural, gendered dynamics that render people criminalizable and imprisonable. We explore the potential of the concept of participation to strengthen understandings and activism around gendered harms, and grapple with the thorny issue of for whom we speak. We advocate for cross-cultural understandings, developed in collaboration and through partnership, to productively challenge the ethnocentrism of criminology and propel truly transformative agendas. Three steps are identified to decenter research and activism: Scholars and activists must acknowledge the risks of attending to need while not attending to the drivers of need; resist the temptation to operate only within the limits defined by the authorities, the state, the academy, or agencies set up to protect; and generate “home grown,” counter-hegemonic solutions that push back against the tendency to universalize, colonize and deny difference.

Details

Gender, Criminalization, Imprisonment and Human Rights in Southeast Asia
Type: Book
ISBN: 978-1-80117-287-5

Keywords

Open Access
Book part
Publication date: 4 June 2021

Briony Anderson and Mark A. Wood

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…

Abstract

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Abstract

Details

Histories of Punishment and Social Control in Ireland: Perspectives from a Periphery
Type: Book
ISBN: 978-1-80043-607-7

Access

Only Open Access

Year

Content type

Book part (12)
1 – 10 of 12