Search results
1 – 10 of 12Large-scale data analytics have raised a number of ethical concerns. Many of these were introduced in a seminal paper by boyd and Crawford and have been developed since by others…
Abstract
Large-scale data analytics have raised a number of ethical concerns. Many of these were introduced in a seminal paper by boyd and Crawford and have been developed since by others (boyd & Crawford, 2012; Lagoze, 2014; Martin, 2015; Mittelstadt, Allo, Taddeo, Wachter, & Floridi, 2016). One such concern which is frequently recognised but under-analysed is the focus on correlation of data rather than on the causative relationship between data and results. Advocates of this approach dismiss the need for an understanding of causation, holding instead that the correlation of data is sufficient to meet our needs. In crude terms, this position holds that we no longer need to know why X+Y=Z. Merely acknowledging that the pattern exists is enough.
In this chapter, the author explores the ethical implications and challenges surrounding a focus on correlation over causation. In particular, the author focusses on questions of legitimacy of data collection, the embedding of persistent bias, and the implications of future predictions. Such concerns are vital for understanding the ethical implications of, for example, the collection and use of ‘big data’ or the covert access to ‘secondary’ information ostensibly ‘publicly available’. The author’s conclusion is that by failing to consider causation, the short-term benefits of speed and cost may be countered by ethically problematic scenarios in both the short and long term.
Details
Keywords
John E. Tyler, Evan Absher, Kathleen Garman and Anthony Luppino
This chapter demonstrates that social business models do not meaningfully prioritize or impose accountability to “social good” over other purposes in ways that (a) best protect…
Abstract
This chapter demonstrates that social business models do not meaningfully prioritize or impose accountability to “social good” over other purposes in ways that (a) best protect against owners changing their minds or entry of new owners with different priorities and (b) enable reliable accountability over time and across circumstances. This chapter further suggests a model – a “social primacy company” – that actually prioritizes “social good” and meaningful accountability to it. This chapter thus clarifies circumstances under which existing models might be most useful and are not particularly useful, especially as investors, entrepreneurs, employees, regulators, and others pursue shared, common understandings about purposes, priorities, and accountability.
Details
Keywords
Radhlinah Aulin, Åsa Ek and Christofer Edling
This paper will examine the unsafe work practices that are plaguing the construction industry. Statistics show that four out of five of all workplace accidents are attributed to…
Abstract
Purpose
This paper will examine the unsafe work practices that are plaguing the construction industry. Statistics show that four out of five of all workplace accidents are attributed to unsafe behaviour. Research studies have sought to understand worker self-protection. For example, it is difficult to make predictions of conditions that influenced worker’s behaviour to act unsafely or safely in a given work situation. It is evident there is a gap in the literature in this area of research, most notably failing to understand the underlying “why” factors. The aim of the study is to identify and examine the proximate set of contributing factors most likely to have an influence on workers’ decisions about participation in unsafe behaviour.
Design/Methodology/Approach
To perform the study, questionnaires were adopted, and 225 construction workers from 9 construction companies participated in the study.
Findings
Results showed that both underlying organisational factors and individual factors could affect the risk aversion among construction workers. The paper also highlights measures to create a safe work environment to minimise unsafe behaviour among construction workers. Results from the study are important to help organisation to systematically plan for a good working environment.
Research limitations
As the results were based only from the questionnaires, a deeper understanding behind the workers’ responses was not probed.
Practical implications
Construction companies should work at several organisational levels at the same time. It is necessary to include levels such as individual, group, workplace and management levels, thus taking a system perspective on risk behaviour and safety.
Details
Keywords
Ron Iphofen and Dónal O'Mathúna
In light of the many crises and catastrophes faced in the modern world, policymakers frequently make claims to be ‘following the science’ or being ‘governed by the data’. Yet…
Abstract
In light of the many crises and catastrophes faced in the modern world, policymakers frequently make claims to be ‘following the science’ or being ‘governed by the data’. Yet, conflict based on inequalities continue to fuel dissatisfaction with the decisions and actions of authorities. Research into public security may require surveillance and covert observations, all of which are subject to major ethical challenges. Any neat distinction between covert and overt research is difficult to maintain given the variety of definitions used for all the terms addressed here. Covert research may be ethically justified and is not necessarily deceptive. In any case, deception may be ethical if engaged in for the ‘right’ reasons. Modern research sites and innovative research methods may enhance opportunities for covert work. In all surveillance and covert work, care must be taken about how consent is managed, how observed subjects are protected and harm to all involved minimised in all situations.
Details
Keywords
Andrew M. Jefferson and Samantha Jeffries
The chapters in this book show that it is possible to conduct studies on the intersections between gender, criminalization, imprisonment, and human rights in Southeast Asia. In…
Abstract
The chapters in this book show that it is possible to conduct studies on the intersections between gender, criminalization, imprisonment, and human rights in Southeast Asia. In this conclusion, we draw out the implications of this emerging scholarship. More specifically, we critically examine how common talk about “individual needs” risks blinding criminal justice reformers to the structural, gendered dynamics that render people criminalizable and imprisonable. We explore the potential of the concept of participation to strengthen understandings and activism around gendered harms, and grapple with the thorny issue of for whom we speak. We advocate for cross-cultural understandings, developed in collaboration and through partnership, to productively challenge the ethnocentrism of criminology and propel truly transformative agendas. Three steps are identified to decenter research and activism: Scholars and activists must acknowledge the risks of attending to need while not attending to the drivers of need; resist the temptation to operate only within the limits defined by the authorities, the state, the academy, or agencies set up to protect; and generate “home grown,” counter-hegemonic solutions that push back against the tendency to universalize, colonize and deny difference.
Details
Keywords
Briony Anderson and Mark A. Wood
This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…
Abstract
This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.
Details