Search results
1 – 10 of over 2000Although markets are intensely social, stock markets are peculiar in that they are normatively anonymous spaces. Anonymity is a difficult-to-achieve social accomplishment in which…
Abstract
Purpose
Although markets are intensely social, stock markets are peculiar in that they are normatively anonymous spaces. Anonymity is a difficult-to-achieve social accomplishment in which material identity information is successfully stripped from participants. The academic literature is conflicted regarding the degree to which equity markets are anonymous and how this influences traders’ behavior.
Methodology/approach
Based on focused, tape-recorded ethnographic interviews, this chapter investigates the work practices of professional investors and brokers to describe the conditions under which brokers veil or reveal investors’ identities to their competitors, and thereby shed light on how anonymity is socially produced (or eroded) in global stock markets.
Findings
The social structure of brokered financial markets places brokers in the awkward situation of sitting in an information-poor structural location for so-called “fundamental information” while being paid to share information with professional investors who sit in an information-rich structural location. A resolution to this material and social dilemma is that brokers can erode the market’s anonymity by gifting identity information (“order flow”) – the previous, prospective, or pending trades of their clients’ competitors – thereby providing traders a competitive advantage. They share identity information in three types of performances: transparent relationships, masked relationships, and the transformation of illicit material identity information into licit and sharable “fundamental” information. Each performance partly erodes transaction-level and market-level anonymity while simultaneously partially supporting anonymity.
Practical implications
Laws and regulations requiring brokers’ confidentiality of their clients’ trades are easily and systematically eluded. Policy makers and regulators may opt to respond by increasing surveillance and mechanization of brokers’ work so as to promote a normatively anonymous market. Alternatively, they may opt to question the value of promoting and policing anonymity in financial markets by revising insider trading regulations.
Originality/value
Even well-regulated markets are semi-anonymous spaces due to the systematic exposure of investors’ identities to competitors by their shared brokers on a daily basis. This finding provides an additional explanation for how professional investors can imitate one another (“herd”) as well as why subpopulations of investors often trade so similarly to one another.
Details
Keywords
Andrew Lepone, Reuben Segara and Brad Wong
This study investigates whether broker anonymity impairs the ability of the market to detect informed trading in the lead up to takeover announcements. Our research represents the…
Abstract
This study investigates whether broker anonymity impairs the ability of the market to detect informed trading in the lead up to takeover announcements. Our research represents the first study in this area to analyse the effects of broker anonymity in the context of significant information asymmetry. Results indicate that informed traders are less detected, and therefore better off when broker identifiers are concealed. This finding has important policy implications for exchange officials deciding whether or not to reveal broker identifiers surrounding trades, especially considering that almost all prior research suggests that broker anonymity is correlated with improved liquidity.
Details
Keywords
Matthew L. Williams, Pete Burnap, Luke Sloan, Curtis Jessop and Hayley Lepps
Some researchers consider most social media communications as public, and posts from networks such as Twitter are routinely harvested and published without anonymization and…
Abstract
Some researchers consider most social media communications as public, and posts from networks such as Twitter are routinely harvested and published without anonymization and without direct consent from users. In this chapter, we argue that researchers must move beyond the permissions granted by ‘legal’ accounts of the use of these new forms of data (e.g., Terms and Conditions) to a more nuanced and reflexive ethical approach that puts user expectations, safety, and privacy rights center stage. Through two projects, we present qualitative and quantitative data that illustrate social media users’ views on the use of their data by researchers. Over four in five report expecting to be asked for their consent and nine in ten expect anonymity ahead of publication of their Twitter posts. Given the unique nature of this online public environment and what we know about users’ views pertaining to informed consent, anonymity, and harm, we conclude researchers seeking to embark on social media research should conduct a risk assessment to determine likely privacy infringement and potential user harm from publishing user content.
Details
Keywords
Current practice, reified through typical IRB guidelines, has its roots in traditional positivist frameworks about research. The positivist research paradigm is traceable back to…
Abstract
Current practice, reified through typical IRB guidelines, has its roots in traditional positivist frameworks about research. The positivist research paradigm is traceable back to Enlightenment epistemologies, which emphasized the fact-based, value-free nature of knowledge (Christians, 2000; Cunningham & Fitzgerald, 1996; Howe & Moses, 1999; Muchmore, 2000). Christians (2000) suggests that researchers who were grounded in positivist approaches used utilitarian perspectives on research ethics. The utilitarian approach suggested that a single set of moral considerations could guide all inquiry; these considerations were outlined in a generally accepted code of ethics that emphasized informed consent, privacy/confidentiality, and accuracy, and that opposed deception in research. Many of these conventions were codified in national legislation in the USA beginning in 1974, in response to several experiments that had mistreated research participants (Hecht, 1995; UCRIHS, 2004). According to Christians (2000), ‘Three principles, published in what became known as the Belmont Report, were said to constitute the moral standards for research involving human subjects: respect for persons, beneficence, and justice’ (p. 140). These principles were intended to ensure that people participated in research voluntarily and anonymously; that researchers protected the well-being of their participants; and that both the benefits and the burdens of research be distributed equitably (Christians, 2000). This legislation established requirements for IRBs that would review and monitor federally funded research conducted by universities and other institutions. Most universities and other research-conducting institutions have since expanded the purview of their IRBs to monitor all institutional research – not just that which is federally funded (Hecht, 1995).
Charlotte Kroløkke, Thomas Søbirk Petersen, Janne Rothmar Herrmann, Anna Sofie Bach, Stine Willum Adrian, Rune Klingenberg and Michael Nebeling Petersen
In this chapter, the author explores the ethical challenge of preserving participant anonymity when using visual methods in ethnographic research. Referring to her own…
Abstract
In this chapter, the author explores the ethical challenge of preserving participant anonymity when using visual methods in ethnographic research. Referring to her own ethnographic study in post-conflict Northern Ireland, the author explores how social, cultural, and political contexts may accentuate the need to preserve anonymity. The author discusses her rationale for opting not to use photographs in this context and puts forward the case for using participant-produced drawings as an alternative to photographs. Drawings accomplish similar rich benefits as photographs but may ameliorate the ethical challenges inherent in photographic work of maintaining participant anonymity.
Details
Keywords
Derek Parfit’s non-identity problem calls into question the claims of both the state and individuals when they purport to act for the benefit of future children. This paper…
Abstract
Derek Parfit’s non-identity problem calls into question the claims of both the state and individuals when they purport to act for the benefit of future children. This paper discusses how adoption of the non-identity argument as a legal argument could affect reproductive and family policy, demonstrating that it undermines the child-centric approach to assigning legal parentage. The paper concludes, however, that these non-identity problems can be solved by the expected value approach, which demonstrates that efforts to benefit future people can be logically coherent even if those efforts also affect the genetic identities of the future people.
Details
Keywords
Leanne Townsend and Claire Wallace
Over the past decade, the number of people engaging with social media has grown rapidly. This means that social media platforms such as Twitter and Facebook are potentially good…
Abstract
Over the past decade, the number of people engaging with social media has grown rapidly. This means that social media platforms such as Twitter and Facebook are potentially good sources of rich, naturally occurring data. As a result, a growing number of researchers are utilizing these platforms for the collection of data on any number of topics. To date, no consistent approach to the ethics of using social media data has been provided to researchers in this sphere. This chapter presents research that has developed an ethics framework for the use of researchers working with social media data. The chapter also presents the framework itself and guidance on how to use the framework when conducting social media research. A full report can be accessed on: http://www.abdn.ac.uk/socsci/research/new-europe-centre/information-societies-projects-225.php
Details
Keywords
This chapter explores ethical issues related to the use of drama-based methods in child and youth-focussed research projects. It begins by outlining some of the reasons for…
Abstract
This chapter explores ethical issues related to the use of drama-based methods in child and youth-focussed research projects. It begins by outlining some of the reasons for utilising drama-based research methods in projects that examine children’s perspectives and lived experiences. The chapter proceeds to discuss specific methods of drama-based inquiry including ethnodrama, ethnotheatre, reader’s theatre, play-building, devised theatre and collective creation. The sections draw on examples from recent drama-based research projects to highlight some of the key ethical considerations in drama-based research with children and young people, including specific issues surrounding representation, transparency, physical risks, power dynamics, consent, confidentiality, anonymity and reciprocity. The author shares her experiences of navigating some of the tricky ethical challenges involved in a recent participatory play-building project in Canada, providing some suggestions to help researchers in the field become better prepared to use and assess these methods and approaches in research with children and young people.
Details
Keywords
Briony Anderson and Mark A. Wood
This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…
Abstract
This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.
Details