Search results

1 – 10 of 112
Content available
Book part
Publication date: 3 December 2018

Frederic Lemieux

Abstract

Details

Intelligence and State Surveillance in Modern Societies
Type: Book
ISBN: 978-1-78769-171-1

Content available
Book part
Publication date: 24 October 2023

Rodanthi Tzanelli

Abstract

Details

The New Spirit of Hospitality
Type: Book
ISBN: 978-1-83753-161-5

Content available
Book part
Publication date: 25 November 2019

Nathan Hulsey

Abstract

Details

Games in Everyday Life: For Play
Type: Book
ISBN: 978-1-83867-937-8

Open Access
Book part
Publication date: 9 December 2021

David J. Harper, Darren Ellis and Ian Tucker

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented…

Abstract

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented which highlight different types of surveillance and different ethical concerns. The first case concerns the use of undercover police to infiltrate political activist groups over a 40-year period in the UK. The second case study examines a joint operation by US and Australian law enforcement agencies: the FBI’s operation Trojan Shield and the AFP’s Operation Ironside. This involved distributing encrypted phone handsets to serious criminal organisations which included a ‘backdoor’ secretly sending encrypted copies of all messages to law enforcement. The third case study analyses the use of emotional artificial intelligence systems in educational digital learning platforms for children where technology companies collect, store and use intrusive personal data in an opaque manner. The authors discuss similarities and differences in the ethical questions raised by these cases, for example, the involvement of the state versus private corporations, the kinds of information gathered and how it is used.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Content available
Book part
Publication date: 23 August 2023

Julian Molina

Abstract

Details

The First British Crime Survey
Type: Book
ISBN: 978-1-80382-275-4

Content available
Book part
Publication date: 14 May 2020

Angus Nurse

Abstract

Details

The Citizen and the State
Type: Book
ISBN: 978-1-78973-040-1

Open Access
Book part
Publication date: 4 June 2021

Eva PenzeyMoog and Danielle C. Slakoff

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this…

Abstract

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this chapter, we discuss three unique types of technological abuse: (1) financial abuse via banking websites and apps; (2) abuse via smart home devices (i.e., “Internet of Things” abuse); and (3) stalking via geo-location or GPS. We also argue pregnancy and wellness apps provide an opportunity for meaningful intervention for pregnant victims of domestic violence.

While there is no way to ensure users' safety in all situations, we argue thoughtful considerations while designing and building digital products can result in meaningful contributions to victims' safety. This chapter concludes with PenzeyMoog's (2020) “Framework for Inclusive Safety,” which is a roadmap for building technology that increases the safety of domestic violence survivors. This framework includes three key points: (1) the importance of educating technologists about domestic violence; (2) the importance of identifying possible abuse situations and designing against them; and (3) identifying user interactions that might signal abuse and offering safe interventions.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 9 December 2021

Kevin Macnish

This short chapter is an introduction to my 2018 book: The Ethics of Surveillance: An Introduction (Macnish, 2018). It is provided at the start of this PRO-RES collection of…

Abstract

This short chapter is an introduction to my 2018 book: The Ethics of Surveillance: An Introduction (Macnish, 2018). It is provided at the start of this PRO-RES collection of essays because it anticipates and supplements the range of issues covered in this collection and lays out some of the fundamental considerations necessary to ensure if surveillance must be conducted, it will be done as ethically as possible.

When is surveillance justified? We can largely agree that there are cases in which surveillance seems, at least prima facie, to be morally correct: police tracking a suspected mass murderer, domestic state security tracking a spy network, or a spouse uncovering partner’s infidelity. At the same time, there are other cases in which surveillance seems clearly not to be justified: the mass surveillance practices of the East German Stasi, an employer watching over an employee to ensure that they do not spend too long in the toilet, or a voyeur watching the subject of his lust undress night after night.

As an introductory text, my book does not seek to provide a list of necessary and sufficient conditions for ethical surveillance. What it does provide is an overview of the current thinking in surveillance ethics, looking at a range of proposed arguments about these questions, and how those arguments might play out in a variety of applied settings. It hence provides a useful and accessible volume for policymakers wishing to rapidly get up to speed on developments in surveillance and the accompanying ethical discussions.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Content available
Book part
Publication date: 4 October 2022

Wei Cui

Abstract

Details

Crisis Communication in China
Type: Book
ISBN: 978-1-80117-983-6

1 – 10 of 112