Search results

1 – 10 of 24
Open Access
Book part
Publication date: 9 December 2021

Kevin Macnish

This short chapter is an introduction to my 2018 book: The Ethics of Surveillance: An Introduction (Macnish, 2018). It is provided at the start of this PRO-RES collection of…

Abstract

This short chapter is an introduction to my 2018 book: The Ethics of Surveillance: An Introduction (Macnish, 2018). It is provided at the start of this PRO-RES collection of essays because it anticipates and supplements the range of issues covered in this collection and lays out some of the fundamental considerations necessary to ensure if surveillance must be conducted, it will be done as ethically as possible.

When is surveillance justified? We can largely agree that there are cases in which surveillance seems, at least prima facie, to be morally correct: police tracking a suspected mass murderer, domestic state security tracking a spy network, or a spouse uncovering partner’s infidelity. At the same time, there are other cases in which surveillance seems clearly not to be justified: the mass surveillance practices of the East German Stasi, an employer watching over an employee to ensure that they do not spend too long in the toilet, or a voyeur watching the subject of his lust undress night after night.

As an introductory text, my book does not seek to provide a list of necessary and sufficient conditions for ethical surveillance. What it does provide is an overview of the current thinking in surveillance ethics, looking at a range of proposed arguments about these questions, and how those arguments might play out in a variety of applied settings. It hence provides a useful and accessible volume for policymakers wishing to rapidly get up to speed on developments in surveillance and the accompanying ethical discussions.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Book part
Publication date: 9 December 2021

Abstract

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Abstract

Details

Video Games Crime and Next-Gen Deviance
Type: Book
ISBN: 978-1-83867-450-2

Open Access
Article
Publication date: 5 August 2019

Charles Ishengoma Kato

This paper aims to examine the legal challenges to electronic banking and initiatives taken to address them in Tanzania. It is based on the results of a comparative analysis of…

14543

Abstract

Purpose

This paper aims to examine the legal challenges to electronic banking and initiatives taken to address them in Tanzania. It is based on the results of a comparative analysis of policies and laws of other countries from which Tanzania can pick a leaf on how to deal with challenges brought by information and communication technology-induced innovations in the banking sector.

Design/methodology/approach

The study upon which this paper is based employed comparative analysis methods by analysing different policies and laws of Tanzania in line with attendant laws of other jurisdictions such as the USA, Malaysia, South Africa, Rwanda and Kenya and international instruments in a bid to establish the best practice pertaining to controlling and containing legal challenges brought by developments in electronic banking.

Findings

This paper confirms that, the prevailing laws guiding electronic banking in Tanzania do not adequately address the challenges the banks and customers face during electronic banking transactions. Thus, there is a need to amend the Tanzanian laws guiding this sector to put in place legislation capable of facilitating the development of electronic banking whilst addressing the associated challenges the users encounter.

Originality/value

This paper underscores the value of amending existing or enacting new laws in line with the development of technology/innovation to protect consumers in nascent electronic banking of the country. Moreover, it advocates for the development of innovation in banking sector should not be left to grow without amending/enacting laws that will promote its development and at the same time protect the users to avoid far-reaching and often unpleasant implications.

Open Access
Article
Publication date: 25 April 2023

Ognjen Arandjelović

The remarkable increase of sophistication of artificial intelligence in recent years has already led to its widespread use in martial applications, the potential of so-called…

Abstract

Purpose

The remarkable increase of sophistication of artificial intelligence in recent years has already led to its widespread use in martial applications, the potential of so-called “killer robots” ceasing to be a subject of fiction. The purpose of this paper is to re-examine the consequences of the availability of lethal autonomous robots (LARs) on global peace.

Design/methodology/approach

Virtually without exception, the aforementioned potential of LARs has generated fear, as evidenced by a mounting number of academic articles calling for the ban on their development and deployment. An analysis of the existing ethical objections to LARs is used as a vehicle for their critique and the advancement of an alternative.

Findings

The presented analysis shows the contemporary thought to be deficient in philosophical rigour, these deficiencies leading to a different view, one favourable to the development of LARs.

Originality/value

The emergent thesis is that LARs can in fact be a force for peace, leading to fewer and less deadly wars.

Details

Journal of Ethics in Entrepreneurship and Technology, vol. 3 no. 1
Type: Research Article
ISSN: 2633-7436

Keywords

Open Access
Book part
Publication date: 2 August 2022

Christopher Ansell, Eva Sørensen and Jacob Torfing

This chapter draws out lessons regarding how the diagnosis of urgent problems, the formation of ambitious and visionary goals, and the participation of stakeholders with critical…

Abstract

This chapter draws out lessons regarding how the diagnosis of urgent problems, the formation of ambitious and visionary goals, and the participation of stakeholders with critical innovation assets stimulate the cocreation of innovative solutions that promote the SDGs (Sustainable Development Goals), and how changemakers can lead and manage cocreated innovation processes. It considers the initiation of innovation processes and the design and testing of innovative solutions as well as the upscaling and diffusion of new successful products, processes and organizational forms. Finally, it identifies several common pitfalls that are important for changemakers to avoid, including an assumption of the necessity for heroic leadership, failure to include relevant actors, overly strict and detailed plans and procedures, and inability to integrate newcomers.

Details

Co-Creation for Sustainability
Type: Book
ISBN: 978-1-80043-798-2

Keywords

Open Access
Book part
Publication date: 30 April 2019

S. J. Oswald A. J. Mascarenhas

Rights and duties are involved in every area of business and markets, and society and governments. Most often, rights and duties involve serious ethical and moral issues of…

Abstract

Executive Summary

Rights and duties are involved in every area of business and markets, and society and governments. Most often, rights and duties involve serious ethical and moral issues of conflict. A good theory of the ethics of rights and duties, obligations, and responsibilities will empower us to understand the impact of our actions on various stakeholders. Additionally, a deep understanding of rights and duties could help us to analyze better the impact of our executive actions on various stakeholders and, in particular, to fathom the damaging effects of rights and duties violated by the man-made current financial crisis when seen from an ethical and moral point of view. Our coverage on the ethics of corporate rights and duties will comprise of two parts: Part 1: The Nature of Corporate Business Rights and Duties, and Part 2: Respecting Corporate Rights and Duties. The chapter will feature Newcomb Wellesley Hohfeld’s framework of legal interests such as claims, privileges, power, and immunity and its various applications to contemporary market and corporate executive situations. We illustrate the theory of rights and duties using several cases from the current turbulent markets.

Details

Corporate Ethics for Turbulent Markets
Type: Book
ISBN: 978-1-78756-192-2

Open Access
Article
Publication date: 9 November 2021

Zareef Mohammed

Data breaches are an increasing phenomenon in today's digital society. Despite the preparations an organization must take to prevent a data breach, it is still necessary to…

3708

Abstract

Purpose

Data breaches are an increasing phenomenon in today's digital society. Despite the preparations an organization must take to prevent a data breach, it is still necessary to develop strategies in the event of a data breach. This paper explores the key recovery areas necessary for data breach recovery.

Design/methodology/approach

Stakeholder theory and three recovery areas (customer, employee and process recovery) are proposed as necessary theoretical lens to study data breach recovery. Three data breach cases (Anthem, Equifax, and Citrix) were presented to provide merit to the argument of the proposed theoretical foundations of stakeholder theory and recovery areas for data breach recovery research.

Findings

Insights from these cases reveal four areas of recovery are necessary for data breach recovery – customer recovery, employee recovery, process recovery and regulatory recovery.

Originality/value

These areas are presented in the data recovery areas model and are necessary for: (1) organizations to focus on these areas when resolving data breaches and (2) future data breach recovery researchers in developing their research in the field.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 25 August 2022

Lelia Cristina Díaz-Pérez, Ana Laura Quintanar-Reséndiz, Graciela Vázquez-Álvarez and Rubén Vázquez-Medina

Based on this holistic model, the authors propose and analyze seven key issues related to the admissibility of digital media in cross-border trials considering four Latin American…

1274

Abstract

Purpose

Based on this holistic model, the authors propose and analyze seven key issues related to the admissibility of digital media in cross-border trials considering four Latin American countries.

Design/methodology/approach

The authors apply the modeling process of the soft systems methodology by Checkland in order to develop a holistic model focused on human situation problems involving digital media and information technology devices or systems.

Findings

The authors discuss the status of the identified key issues in each country and offer a perspective on the integration of cross-border work analyzing the contribution of these key issues to the collaboration between countries criminal cases or the use of foreign digital artifacts in domestic trials.

Research limitations/implications

In this study, the authors assumed that the problems of official interaction between agencies of different countries are considered solved. However, for future studies or research, the authors recommend that these issues can be considered as relevant, since they are related to cross-border cooperation topics that will necessarily require unavoidable official arrangements, agreements and formalities.

Practical implications

This work is aimed at defining and analyzing the key issues that can contribute to the application of current techniques and methodologies in digital forensics as a tool to support the legal framework of each country, considering cross-border trials. Finally, the authors highlight the implications of this study lie in the identification and analysis of the key issues that must be considered for digital forensics as a support tool for the admissibility of digital evidence in cross-border trials.

Social implications

The authors consider that digital forensic will have high demand in cross-border trials, and it will depend on the people mobility between the countries considered in this study.

Originality/value

This paper shows that the soft systems methodology allows elaborating a holistic model focused on social problems involving digital media and informatics devices.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 26 November 2021

Kristina Gyllensten and Marianne Torner

The aim of this study was to explore the organizational and social prerequisites for employees' participative and rule-compliant information security behaviour in Swedish nuclear…

1533

Abstract

Purpose

The aim of this study was to explore the organizational and social prerequisites for employees' participative and rule-compliant information security behaviour in Swedish nuclear power production and its related industry. These industries are high-risk activities that must be meticulously secured. Protecting the information security in the related organizations is an essential aspect of this.

Design/methodology/approach

Individual in-depth interviews were conducted with 24 employees in two organizations within the nuclear power industry in Sweden.

Findings

We found that prerequisites for employees' participative and rule-compliant information security behaviour could be categorized into structural, social and individual aspects. Structural aspects included well-adapted rules, knowledge support and resources. Social aspects included a supportive organizational culture, collaboration and adequate resources, and individual aspects included individual responsibility.

Originality/value

The qualitative approach of the study provided comprehensive descriptions of the identified preconditions. The results may thus enable organizations to better promote conditions important for information security in a high-risk industry.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

1 – 10 of 24