Search results

1 – 10 of 93
Open Access
Book part
Publication date: 30 November 2023

Pedro Pineda

I historically compare changes in institutional frameworks creating academic positions linked to temporary employment by analyzing university employment statistics in Chile…

Abstract

I historically compare changes in institutional frameworks creating academic positions linked to temporary employment by analyzing university employment statistics in Chile, Colombia, Germany, and the USA. I find that temporary academic positions were institutionalized through the creation of previously inexistent academic categories called a contrata in Chile, de cátedra in Colombia, “junior professor” without tenure in Germany and “postdoc” in the USA; used in higher education and employment laws since 1989, 1992, 2002, and 1974, respectively. Under institutional frameworks demanding the maximization of students and research, universities have increasingly contracted academics through temporary contracts under rationales that differ between regions. In Colombia and Chile, public university leaders and owners of private universities contract such teaching positions to expand student numbers through lowering costs. In Germany and the USA, employment insecurity is mostly driven by temporary scientific positions under a main rationale of scientific expansion. The share of temporary positions has increased exponentially in Colombia and Germany in recent decades, whereas in the USA there has only been an increase since 2012. Moreover, in Chile, the share of permanent positions has decreased since 2012. The common trend is one of isomorphism of vertical academic structures sharing a pyramidal form, with a wide base of academics working under conditions of contractual insecurity. Such trends follow a rationale for maximization of student numbers as well as administration, and scientific production that is in tension with prioritizing wellbeing and improvement of academics’ working conditions. Yet, in these environments, the institution of tenure in the USA and recent Chilean regulations on accreditation represent mechanisms counteracting precarious employment.

Details

University Collegiality and the Erosion of Faculty Authority
Type: Book
ISBN: 978-1-80455-814-0

Keywords

Open Access
Book part
Publication date: 9 December 2021

Alex Stedmon and Daniel Paul

In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson

Abstract

In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson, 2015). Traditionally, such security domains are often focussed on mainstream public safety within crowded spaces and border controls, through to identifying suspicious behaviours, hostile reconnaissance and implementing counter-terrorism initiatives. More recently, with growing insecurity around the world, organisations have looked to improve their security risk management frameworks, developing concepts which originated in the health and safety field to deal with more pressing risks such as terrorist acts, abduction and piracy (Paul, 2018). In these instances, security is usually the specific responsibility of frontline personnel with defined roles and responsibilities operating in accordance with organisational protocols (Saikayasit, Stedmon, Lawson, & Fussey, 2012; Stedmon, Saikayasit, Lawson, & Fussey, 2013). However, understanding the knowledge that frontline security workers might possess and use requires sensitive investigation in equally sensitive security domains.

This chapter considers how to investigate knowledge elicitation in these sensitive security domains and underlying ethics in research design that supports and protects the nature of investigation and end-users alike. This chapter also discusses the criteria used for ensuring trustworthiness as well as assessing the relative merits of the range of methods adopted.

Open Access
Book part
Publication date: 9 December 2021

Daniel Paul and Alex Stedmon

In recent years, there has been a growing dialogue around community-based and systems-based approaches to security risk management through the introduction of top-down and…

Abstract

In recent years, there has been a growing dialogue around community-based and systems-based approaches to security risk management through the introduction of top-down and bottom-up knowledge acquisition. In essence, this relates to knowledge elicited from academic experts, or security subject-matter experts, practitioner experts, or field workers themselves and how much these disparate sources of knowledge may converge or diverge. In many ways, this represents a classic tension between organisational and procedural perspectives of knowledge management (i.e. top-down) versus more pragmatic and experience focussed perspectives (i.e. bottom-up).

This chapter considers these approaches and argues that a more consistent approach needs to address the conflict between procedures and experience, help convert field experience into knowledge, and ultimately provide effective training that is relevant to those heading out into demanding work situations. Ultimately, ethics and method are intricately bound together in whichever approach is taken and the security of both staff and at-risk populations depends upon correctly managing the balance between systems and communities.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Book part
Publication date: 2 August 2022

Christopher Ansell, Eva Sørensen and Jacob Torfing

This chapter insists that evaluation of the process and results of cocreation is a precondition for continuous improvement and helps maintain support from external sponsors and…

Abstract

This chapter insists that evaluation of the process and results of cocreation is a precondition for continuous improvement and helps maintain support from external sponsors and funders. The main benefits of systematic evaluation of cocreation are learning and legitimacy rather than control and allocation. The chapter scrutinizes the two most common evaluation tools, formative and summative evaluation, and finds that they both fail to appreciate the emergent character of cocreation processes. The solution to this problem is to supplement formative and summative evaluation with developmental evaluation, which prompts the participating actors to engage in a critical interrogation of what they are doing, the reasons for doing it, and the results they achieve. Finally, the chapter explains how the commitment of developmental evaluation to using real-time data in the evaluation of change theories can be pursued through a collective impact strategy.

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 16 October 2020

Abstract

Details

Gender and the Violence(s) of War and Armed Conflict: More Dangerous to Be a Woman?
Type: Book
ISBN: 978-1-78769-115-5

Open Access
Book part
Publication date: 9 December 2021

Abstract

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Open Access
Book part
Publication date: 9 December 2021

Alfonso Alfonsi and Maresa Berliri

This chapter, based on a sociological approach, addresses the ethical issues of surveillance research from the perspective of the profound transformations that science and…

Abstract

This chapter, based on a sociological approach, addresses the ethical issues of surveillance research from the perspective of the profound transformations that science and innovation are undergoing, as part of a broader shift from modern to post-modern society, affecting also other major social institutions (such as government, religion, family, and public administration). The change occurring in the science and technology system is characterised by diminishing authority, uncertainty about internal mechanisms and standards, and a declining and increasingly difficult access to resources. Such changes, also related to globalisation and new digital technologies, have transformed the way research is conducted and disseminated. Research is now more open and its results more easily accessible to citizens.

Scientific research is also put under increased public scrutiny, while, at the same time, public distrust and disaffection towards science is rising. In such a context, it is more important than ever to make sure that research activities are not compromised by fraudulent and unethical practices. The legitimate expectations of citizens to enjoy their rights, including the ability to protect their private sphere, are growing. Scientific and technological development is deeply interrelated with the widespread awareness of these rights and the possibility of exercising them, but it produces also new risks, while a widespread sense of insecurity increases. The digital revolution, while improving people’s quality of life, offers at the same time new opportunities for crime and terrorism, which in turn has produced a demand to strengthen security systems through increasingly advanced and intrusive surveillance technologies. Misconduct in the field of surveillance may not only undermine the quality of research, but also further impair society’s trust in research and science as well as in the State and its institutions.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Book part
Publication date: 1 December 2022

Clemens Striebing

Purpose: This study examines the relationship between gender, nationality, care responsibilities for children, and the psychological work climate of researchers.Basic Design:

Abstract

Purpose: This study examines the relationship between gender, nationality, care responsibilities for children, and the psychological work climate of researchers.

Basic Design: Based on a dataset of approximately 2,900 cases, the main effects of gender and nationality, their interaction effect and the interaction effects of gender with care responsibilities for minor children, and with hierarchical position are considered in relation to work climate. Dummy regressions and t-tests were performed to estimate and compare the means and regression parameters of the perceived group climate and the view of leaders as evaluated by researchers. The dataset used was taken from a full survey of employees of the Max Planck Society, which is one of Germany’s largest research organizations with over 80 facilities and institutes in various disciplines and a focus on basic research.

Results: Gender differences concerning the evaluation of the work climate are particularly pronounced among doctoral candidates and researchers who have a non-EU nationality. Gender gaps increasingly level out with each successive career step. Additionally, a main effect of gender and a weak interaction of gender and care responsibility for minor children was supported by the data. A main effect of nationality on work climate ratings was found but could not be meaningfully interpreted.

Interpretation and Relevance: The interaction effect between gender and the position of a researcher can be interpreted as being a product of the filtering mechanism of the research system. With this interpretation, the results of the study can plausibly be explained in the light of previous research that concludes that female researchers face higher career hurdles than male researchers.

Details

Diversity and Discrimination in Research Organizations
Type: Book
ISBN: 978-1-80117-959-1

Keywords

Open Access
Book part
Publication date: 30 April 2019

S. J. Oswald A. J. Mascarenhas

Rights and duties are involved in every area of business and markets, and society and governments. Most often, rights and duties involve serious ethical and moral issues of…

Abstract

Executive Summary

Rights and duties are involved in every area of business and markets, and society and governments. Most often, rights and duties involve serious ethical and moral issues of conflict. A good theory of the ethics of rights and duties, obligations, and responsibilities will empower us to understand the impact of our actions on various stakeholders. Additionally, a deep understanding of rights and duties could help us to analyze better the impact of our executive actions on various stakeholders and, in particular, to fathom the damaging effects of rights and duties violated by the man-made current financial crisis when seen from an ethical and moral point of view. Our coverage on the ethics of corporate rights and duties will comprise of two parts: Part 1: The Nature of Corporate Business Rights and Duties, and Part 2: Respecting Corporate Rights and Duties. The chapter will feature Newcomb Wellesley Hohfeld’s framework of legal interests such as claims, privileges, power, and immunity and its various applications to contemporary market and corporate executive situations. We illustrate the theory of rights and duties using several cases from the current turbulent markets.

Details

Corporate Ethics for Turbulent Markets
Type: Book
ISBN: 978-1-78756-192-2

Access

Only Open Access

Year

Content type

Book part (93)
1 – 10 of 93