Search results
1 – 10 of 162Kristen Thomasen and Suzie Dunn
Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse…
Abstract
Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse. Whether this be monitoring movements through stalkerware, using drones to nonconsensually film or harass, or manipulating and distributing intimate images online such as deepfakes and creepshots, invasions of privacy have become a significant form of gender-based violence. Accordingly, our normative and legal concepts of privacy must evolve to counter the harms arising from this misuse of new technology. Canada's Supreme Court recently addressed technology-facilitated violations of privacy in the context of voyeurism in R v Jarvis (2019) . The discussion of privacy in this decision appears to be a good first step toward a more equitable conceptualization of privacy protection. Building on existing privacy theories, this chapter examines what the reasoning in Jarvis might mean for “reasonable expectations of privacy” in other areas of law, and how this concept might be interpreted in response to gender-based technology-facilitated violence. The authors argue the courts in Canada and elsewhere must take the analysis in Jarvis further to fully realize a notion of privacy that protects the autonomy, dignity, and liberty of all.
Details
Keywords
Canada criminalized the nonconsensual distribution of intimate images in 2014. Lawmakers and commentators noted that this new offense would fill a legislative gap in relation to…
Abstract
Canada criminalized the nonconsensual distribution of intimate images in 2014. Lawmakers and commentators noted that this new offense would fill a legislative gap in relation to “revenge pornography,” which entails individuals (typically men) sharing intimate images of their ex-partners (typically women) online in an attempt to seek revenge or cause them harm. Feminist writers and activists categorize revenge pornography as a symptom and consequence of “rape culture,” in which sexual violence is routinely trivialized and viewed as acceptable or entertaining, and women are blamed for their sexual victimization. In this chapter, I analyze Canada's burgeoning revenge pornography case law and find that these cases support an understanding of revenge pornography as a serious form of communal, gendered, intimate partner violence, which is extremely effective at harming victims because of broader rape culture. While Canadian judges are taking revenge pornography seriously, there is some indication from the case law that they are at risk of relying on gendered reasoning and assumptions previously observed by feminists in sexual assault jurisprudence, which may have the result of bolstering rape culture, rather than contesting it.
Details
Keywords
Mark Taylor and Richard Kirkham
A policy of surveillance which interferes with the fundamental right to a private life requires credible justification and a supportive evidence base. The authority for such…
Abstract
A policy of surveillance which interferes with the fundamental right to a private life requires credible justification and a supportive evidence base. The authority for such interference should be clearly detailed in law, overseen by a transparent process and not left to the vagaries of administrative discretion. If a state surveils those it governs and claims the interference to be in the public interest, then the evidence base on which that claim stands and the operative conception of public interest should be subject to critical examination. Unfortunately, there is an inconsistency in the regulatory burden associated with access to confidential patient information for non-health-related surveillance purposes and access for health-related surveillance or research purposes. This inconsistency represents a systemic weakness to inform or challenge an evidence-based policy of non-health-related surveillance. This inconsistency is unjustified and undermines the qualities recognised to be necessary to maintain a trustworthy confidential public health service. Taking the withdrawn Memorandum of Understanding (MoU) between NHS Digital and the Home Office as a worked example, this chapter demonstrates how the capacity of the law to constrain the arbitrary or unwarranted exercise of power through judicial review is not sufficient to level the playing field. The authors recommend ‘levelling up’ in procedural oversight, and adopting independent mechanisms equivalent to those adopted for establishing the operative conceptions of public interest in the context of health research to non-health-related surveillance purposes.
Details
Keywords
This short chapter is an introduction to my 2018 book: The Ethics of Surveillance: An Introduction (Macnish, 2018). It is provided at the start of this PRO-RES collection of…
Abstract
This short chapter is an introduction to my 2018 book: The Ethics of Surveillance: An Introduction (Macnish, 2018). It is provided at the start of this PRO-RES collection of essays because it anticipates and supplements the range of issues covered in this collection and lays out some of the fundamental considerations necessary to ensure if surveillance must be conducted, it will be done as ethically as possible.
When is surveillance justified? We can largely agree that there are cases in which surveillance seems, at least prima facie, to be morally correct: police tracking a suspected mass murderer, domestic state security tracking a spy network, or a spouse uncovering partner’s infidelity. At the same time, there are other cases in which surveillance seems clearly not to be justified: the mass surveillance practices of the East German Stasi, an employer watching over an employee to ensure that they do not spend too long in the toilet, or a voyeur watching the subject of his lust undress night after night.
As an introductory text, my book does not seek to provide a list of necessary and sufficient conditions for ethical surveillance. What it does provide is an overview of the current thinking in surveillance ethics, looking at a range of proposed arguments about these questions, and how those arguments might play out in a variety of applied settings. It hence provides a useful and accessible volume for policymakers wishing to rapidly get up to speed on developments in surveillance and the accompanying ethical discussions.
Details
Keywords
Adrienne Muir, Rachel Spacey, Louise Cooke and Claire Creaser
This paper aims to consider selected results from the Arts and Humanities Research Council (AHRC)-funded “Managing Access to the internet in Public Libraries” (MAIPLE) project…
Abstract
Purpose
This paper aims to consider selected results from the Arts and Humanities Research Council (AHRC)-funded “Managing Access to the internet in Public Libraries” (MAIPLE) project, from 2012-2014. MAIPLE has explored the ways in which public library services manage use of the internet connections that they provide for the public. This included the how public library services balance their legal obligations and the needs of their communities in a public space and the ethical dilemmas that arise.
Design/methodology/approach
The researchers used a mixed-method approach involving a review of the literature, legal analysis, a questionnaire survey and case studies in five public library authorities.
Findings
UK public library services use a range of methods to regulate internet access. The research also confirms previous findings that filtering software is an ubiquitous tool for controlling access to and protecting library users from “inappropriate”, illegal and harmful internet content. There is a general, if sometimes reluctant, acceptance of filtering software as a practical tool by library staff, which seems to contrast with professional codes of ethics and attitudes in other countries. The research indicates that public library internet access will be a valued service for some time to come, but that some aspects of how public library services regulate internet access is currently managed can have socially undesirable consequences, including blocking legitimate sites and preventing users from accessing government services. Education could play a greater part in helping the general population to exercise judgement in selection of materials to view and use. This does not preclude implementing stricter controls to protect children, whilst allowing public libraries to continue providing a social good to those who are unable to otherwise participate in the digital age.
Research limitations/implications
The response to the survey was 39 per cent meaning that findings may not apply across the whole of the UK. The findings of this study are compared with and supplemented by other quantitative sources, but a strength of this study is the depth of understanding afforded by the use of case studies.
Originality/value
This paper provides both a quantitative and qualitative analysis of how internet access is managed in UK public libraries, including how library services fulfil their legal obligations and the ethical implications of how they balance their role in facilitating access to information with their perceived role as a safe and trusted environment for all members of their communities. The findings add to the international discussion on this issue and stimulate debate and policy making in the UK.
Details
Keywords
Jayden Khakurel, Helinä Melkas and Jari Porras
The purpose of this paper is to expand current knowledge about the recent trend of wearable technology to assess both its potential in the work environment and the challenges…
Abstract
Purpose
The purpose of this paper is to expand current knowledge about the recent trend of wearable technology to assess both its potential in the work environment and the challenges concerning the utilisation of wearables in the workplace.
Design/methodology/approach
After establishing exclusion and inclusion criteria, an independent systematic search of the ACM Digital Library, IEEE Xplore, ScienceDirect and Web of Science databases for relevant studies was performed. Out of a total of 359 articles, 34 met the selection criteria.
Findings
This review identifies 23 categories of wearable devices. Further categorisation of the devices based on their utilisation shows they can be used in the work environment for activities including monitoring, augmenting, assisting, delivering and tracking. The review reveals that wearable technology has the potential to increase work efficiency among employees, improve workers’ physical well-being and reduce work-related injuries. However, the review also reveals that technological, social, policy and economic challenges related to the use of wearable devices remain.
Research limitations/implications
Many studies have investigated the benefits of wearable devices for personal use, but information about the use of wearables in the work environment is limited. Further research is required in the fields of technology, social challenges, organisation strategies, policies and economics to enhance the adoption rate of wearable devices in work environments.
Originality/value
Previous studies indicate that occupational stress and injuries are detrimental to employees’ health; this paper analyses the use of wearable devices as an intervention method to monitor or prevent these problems. Introducing a categorisation framework during implementation may help identify which types of device categories are suitable and could be beneficial for specific utilisation purposes, facilitating the adoption of wearable devices in the workplace.
Details
Keywords
Ron Iphofen, Simon E. Kolstoe, Kevin Macnish, Paul Spicker and Dónal O'Mathúna
Mobile dating apps are widely used in the queer community. Whether for sexual exploration or dating, mobile and geosocial dating apps facilitate connection. But they also bring…
Abstract
Mobile dating apps are widely used in the queer community. Whether for sexual exploration or dating, mobile and geosocial dating apps facilitate connection. But they also bring attendant privacy risks. This chapter is based on original research about the ways gay and bisexual men navigate their privacy on geosocial dating apps geared toward the LGBTQI community. It argues that, contrary to the conventional wisdom that people who share semi-nude or nude photos do not care about their privacy, gay and bisexual users of geosocial dating apps care very much about their privacy and engage in complex, overlapping privacy navigation techniques when sharing photos. They share semi-nude and nude photos for a variety of reasons, but generally do so only after building organic trust with another person. Because trust can easily break down without supportive institutions, this chapter argues that law and design must help individuals protect their privacy on geosocial dating apps.
Details
Keywords
Michael Adu Kwarteng, Alex Ntsiful, Christian Nedu Osakwe and Kwame Simpe Ofori
This study proposes and validates an integrated theoretical model involving the theory of planned behavior (TPB), health belief model (HBM), personal norms and information privacy…
Abstract
Purpose
This study proposes and validates an integrated theoretical model involving the theory of planned behavior (TPB), health belief model (HBM), personal norms and information privacy to understand determinants of acceptance and resistance to the use of mobile contact tracing app (MCTA) in a pandemic situation.
Design/methodology/approach
This study draws on online surveys of 194 research respondents and uses partial least squares structural equation modeling (PL-SEM) to test the proposed theoretical model.
Findings
The study establishes that a positive attitude towards MCTA is the most important predictor of individuals' willingness to use MCTA and resistance to use MCTA. Furthermore, barriers to taking action positively influence resistance to the use of MCTA. Personal norms negatively influence resistance to the use of MCTA. Information privacy showed a negative and positive influence on willingness to use MCTA and use the resistance of MCTA, respectively, but neither was statistically significant. The authors found no significant influence of perceived vulnerability, severity, subjective norms and perceived behavioral control on either acceptance or use resistance of MCTA.
Originality/value
The study has been one of the first in the literature to propose an integrated theoretical model in the investigation of the determinants of acceptance and resistance to the use of MCTA in a single study, thereby increasing the scientific understanding of the factors that can facilitate or inhibit individuals from engaging in the use of a protection technology during a pandemic situation.
Peer review
The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-10-2021-0533
Details
Keywords
Chenglong Li, Hongxiu Li and Shaoxiong Fu
To cope with the COVID-19 pandemic, contact tracing mobile apps (CTMAs) have been developed to trace contact among infected individuals and alert people at risk of infection. To…
Abstract
Purpose
To cope with the COVID-19 pandemic, contact tracing mobile apps (CTMAs) have been developed to trace contact among infected individuals and alert people at risk of infection. To disrupt virus transmission until the majority of the population has been vaccinated, achieving the herd immunity threshold, CTMA continuance usage is essential in managing the COVID-19 pandemic. This study seeks to examine what motivates individuals to continue using CTMAs.
Design/methodology/approach
Following the coping theory, this study proposes a research model to examine CTMA continuance usage, conceptualizing opportunity appraisals (perceived usefulness and perceived distress relief), threat appraisals (privacy concerns) and secondary appraisals (perceived response efficacy) as the predictors of individuals' CTMA continuance usage during the pandemic. In the United States, an online survey was administered to 551 respondents.
Findings
The results revealed that perceived usefulness and response efficacy motivate CTMA continuance usage, while privacy concerns do not.
Originality/value
This study enriches the understanding of CTMA continuance usage during a public health crisis, and it offers practical recommendations for authorities.
Details