Search results

1 – 10 of 377
Open Access
Book part
Publication date: 9 December 2021

Kevin Macnish

This short chapter is an introduction to my 2018 book: The Ethics of Surveillance: An Introduction (Macnish, 2018). It is provided at the start of this PRO-RES collection of…

Abstract

This short chapter is an introduction to my 2018 book: The Ethics of Surveillance: An Introduction (Macnish, 2018). It is provided at the start of this PRO-RES collection of essays because it anticipates and supplements the range of issues covered in this collection and lays out some of the fundamental considerations necessary to ensure if surveillance must be conducted, it will be done as ethically as possible.

When is surveillance justified? We can largely agree that there are cases in which surveillance seems, at least prima facie, to be morally correct: police tracking a suspected mass murderer, domestic state security tracking a spy network, or a spouse uncovering partner’s infidelity. At the same time, there are other cases in which surveillance seems clearly not to be justified: the mass surveillance practices of the East German Stasi, an employer watching over an employee to ensure that they do not spend too long in the toilet, or a voyeur watching the subject of his lust undress night after night.

As an introductory text, my book does not seek to provide a list of necessary and sufficient conditions for ethical surveillance. What it does provide is an overview of the current thinking in surveillance ethics, looking at a range of proposed arguments about these questions, and how those arguments might play out in a variety of applied settings. It hence provides a useful and accessible volume for policymakers wishing to rapidly get up to speed on developments in surveillance and the accompanying ethical discussions.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Article
Publication date: 7 December 2021

Simisola Akintoye, George Ogoh, Zoi Krokida, Juliana Nnadi and Damian Eke

Digital contact tracing technologies are critical to the fight against COVID-19 in many countries including the UK. However, a number of ethical, legal and socio-economic concerns…

1098

Abstract

Purpose

Digital contact tracing technologies are critical to the fight against COVID-19 in many countries including the UK. However, a number of ethical, legal and socio-economic concerns that can affect uptake of the app have been raised. The purpose of this research is to explore the perceptions of the UK digital contact tracing app in the Black, Asian and Minority Ethnic (BAME) community in Leicester and how this can affect its deployment and implementation.

Design/methodology/approach

Data was collected through virtual focus groups in Leicester, UK. A total of 28 participants were recruited for the study. All participants are members of the BAME community, and data was thematically analysed with NVivo 11.

Findings

A majority of the participants were unwilling to download and use the app owing to legal and ethical concerns. A minority were willing to use the app based on the need to protect public health. There was a general understanding that lack of uptake will negatively affect the fight against COVID-19 in BAME communities and an acknowledgement of the need for the government to rebuild trust through transparency and development of regulatory safeguards to enhance privacy and prevent misuse.

Originality/value

To the best of the authors’ knowledge, the research makes original contributions being the first robust study conducted to explore perceptions of marginalised communities, particularly BAME which may be adversely impacted by the deployment of the app. By exploring community-based perceptions, this study further contributes to the emerging citizens’ perceptions on digital contact tracing which is crucial to the effectiveness and the development of an efficient, community-specific response to public attitudes towards the app. The findings can also help the development of responsible innovation approaches that balances the competing interests of digital health interventions with the needs and expectations of the BAME community in the UK.

Details

Journal of Information, Communication and Ethics in Society, vol. 19 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Open Access
Article
Publication date: 9 February 2023

Gunnar Lindqvist and Joakim Kävrestad

The purpose of this paper is to identify whether there is a lower willingness to report a crime if a victim must hand in their mobile phone as evidence. If that is the case, the…

Abstract

Purpose

The purpose of this paper is to identify whether there is a lower willingness to report a crime if a victim must hand in their mobile phone as evidence. If that is the case, the research seeks to examine whether privacy concerns and lower willingness correlate with one another and thereby investigate whether privacy concerns could lead to fewer crimes being reported and resolved.

Design/methodology/approach

A mobile phone survey was distributed to 400 Swedish adults to identify their hypothetical willingness to report certain crimes with and without handing in their mobile phones as evidence. The results were then analysed using inferential statistics.

Findings

The result suggests that there is no meaningful correlation between privacy attitudes and willingness to report crime when the handover of a mobile phone is necessary. The results of this study however show a significant lower willingness to report crimes when the mobile phone must be handed in.

Research limitations/implications

Because the chosen target group were Swedish adults, the research results may lack generalisability for other demographics. Therefore, researchers are encouraged to test other demographics.

Originality/value

This paper’s contribution is the novel exploration of attitudes and behaviours regarding the combination of privacy, digital forensics, mobile phones and crime reportage. This research effort examined the problematic situation that can arise for victims of crime, the invasion of privacy when providing evidence by handing in a mobile phone to the police’s forensic unit for examination.

Details

Information & Computer Security, vol. 31 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 18 March 2020

Abdulfatah Ali Belgasem-Hussain and Yousof Ibrahim Hussaien

The purpose of this paper is to shed light on and introduce the ethics of earnings management (EM) to researchers and students in the academic community in light of Kohlberg’s…

11568

Abstract

Purpose

The purpose of this paper is to shed light on and introduce the ethics of earnings management (EM) to researchers and students in the academic community in light of Kohlberg’s theory.

Design/methodology/approach

The paper contextualises and analyses the relevant literature to provide insights around the key concepts of the issue of ethics of EM. Therefore, theoretical approach has been adopted by reviewing the literature using a descriptive method. The study suggests relevance of the theory of moral development and reasoning by Kohlberg (1969) as an approach in the process of exploring the background and the reasons behind ethics of managers regarding EM. This theory helps to explain how individuals demonstrate and justify a sense of right or wrong. Thus, the paper is a literature review concluded with a proposed conceptual framework.

Findings

The paper provides conceptual insights about the ethics of EM, and it proposes a link between manager’s ethics regarding the phenomenon of EM and the framework of moral reasoning theory by Kohlberg (1969).

Originality/value

The importance and implications of Kohlberg’s theory, in terms of EM, resides within the fact that the theory is concerned with questions about how one ought to act – being as it acknowledges the well-known ethical theories. The work of Kohlberg can be classified as a descriptive analysis to the extent that it attempts to describe individuals’ moral development. This integration of normative and descriptive ethics, in turn, enables the theory to be used to explore managers’ moral reasoning in a more helpful way.

Details

Journal of Financial Crime, vol. 30 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 1 April 2024

Rob Elkington, Robyn Ruttenberg-Rozen and Nadia Worthington

This paper aims to explore virtual simulations, merging artificial intelligence with real-world simulations, supporting Canadian armed forces (CAF) junior military leaders (JMLs…

99

Abstract

Purpose

This paper aims to explore virtual simulations, merging artificial intelligence with real-world simulations, supporting Canadian armed forces (CAF) junior military leaders (JMLs) leadership development. Our research questions are: (1) How do virtual simulations support CAF junior military leadership development within a globalized and complex environment in the 21st century? (2) Could virtual simulations support a leadership culture change through efficacious “soft skills” training? In this paper, we explore the efficacy of virtual simulations for enhancing or developing leadership in JMLs in the CAF through a four-day pilot project with twenty JMLs (n = 20).

Design/methodology/approach

To assess the efficacy of virtual simulations for leadership development, we designed and studied a four-day leadership workshop for JMLs in the CAF using several virtual artificial intelligence leadership role-play simulations developed by McGraw Hill in their smart book textbook (Manning & Curtis, 2022) and several non-virtual in-class simulations for comparison. We selected four twenty to thirty-minute virtual role-play simulations that synergized with the in-person morning leadership workshop. We facilitated the three-hour leadership workshops and virtual/in-class simulations over four consecutive days. We emulated the ELESS model (De Freitas & Routledge, 2013) to assess soft and leadership skills.

Findings

The participants (JMLs) reported beneficial learning utility associated with the virtual simulations. Participants also expressed that further utility might be leveraged through virtual simulations incorporating greater complexity with multiple potential outcomes. They also suggested that leadership simulations designed around military situations would prove highly beneficial, something that was outside of the scope of this small pilot project.

Research limitations/implications

Since this phase of our research is a pilot project, we secured a small amount of funding to test our hypothesis that simulations enhance leadership development for JMLs. These funding limitations resulted in several constraints in the research, such as the availability of virtual simulations articulating leadership from a military perspective. However, we believed the assigned organizational leadership simulations in the McGraw Hill Smart Book ecosystem would approximate generic leadership situations enough to test the hypothesis with the JMLs. As a pilot project, our sample size was relatively small (n = 20 JMLs) since participation was voluntary amidst a busy spring season for the JMLs. Since this is a pilot project, we suggest that twenty JMLs are an adequate sampling to test the hypothesis that simulations enhance JML leadership development. We will expand the sample size in the next phase of our research as we work with the CAF to expand the pool of participants to at least forty JML participants (n = 40). We also plan to secure further funding to collaborate with subject matter experts to design virtual simulations based on Canadian military leadership scenarios.

Practical implications

The CAF host robust simulations capabilities for combat training, but have not exploited the potential training and analytical capacity of virtual leadership simulations for leadership development within the CAF. We believe that virtual simulations provide an opportunity for the CAF to effect desired culture change through leadership development that leverages the substantial pedagogical benefits of simulations.

Social implications

The CAF encountered several detrimental leadership scandals that eroded the reputational capital of the CAF. In the current geo-political climate of an expanding North American Treaty Organization (NATO) and threats from several international actors, the CAF seeks to expand its capabilities by adding and enhancing its human capital. However, the CAF currently experiences a significant gap in its human capital aspirations. There is a unanimous consensus that the endemic traditional culture of the CAF, as expressed in the recent explosive leadership scandals, is a deterrent to recruitment and thus weakens the CAF’s capability. The CAF targets leadership development with new leadership paradigms as pivotal to culture change. The CAF suggests that by enhancing leadership development in the CAF the new cadre of leadership will change the culture of the CAF and thereby enhance the reputational capital of the CAF. It is believed that this rejuvenated culture will lead to greater recruitment and retention, leading to a strengthened military. A strengthened military is important to provide effective support and protection for the Canadian people in these volatile and uncertain times. This expanded capacity will enable the CAF to address external military threats more effectively and also the increasing operations other than war (OOTW), such as the military support of long-term care facilities during COVID-19 or the military’s support in fighting record wildfires and the military’s support in climate change related disasters such as flooding.

Originality/value

The satisfaction measures indicated by the participants are typical evaluative measures of leadership development (Noe, 2023). These satisfaction ratings do not, however, indicate whether training has produced a change in behaviour (Brown, 2022). The implications of these outcomes for leadership education are that role-player simulations are useful leadership education and development tools because they provide a theatre of practice in which mistakes are not detrimental and serve as learning moments (Moore, 2012; Piro and O’Callaghan, 2021; Riotto, 2021). Further, the importance of role-player simulations that closely approximate the sector where leadership is experienced and practiced is perceived to enhance the experience. While the CAF invest in combat related simulations, but leadership development simulations are not as evident in the training and development array. This study seeks to assess their potential value as a leadership development tool within the wider context of character development as a leadership competency.

Details

Journal of Leadership Education, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1552-9045

Keywords

Open Access
Article
Publication date: 12 January 2021

Eva Davidsson and Martin Stigmar

Previous research has pointed to a lack of studies concerning supervision training courses. Consequently, the literature has little to suggest, and the research field is…

Abstract

Purpose

Previous research has pointed to a lack of studies concerning supervision training courses. Consequently, the literature has little to suggest, and the research field is underexplored, so questions around the content and design of supervision training courses remain unanswered and need to be addressed systematically. The main aim of the present study is to explore and map whether shared content and design exist in supervisor training courses across different vocations.

Design/methodology/approach

A syllabus analysis is used in order to investigate characteristic features in supervisor training courses related to the professions of dentist, doctor, psychologist, police officer and teacher.

Findings

The results point to the existence of shared content in the different courses, such as an emphasis on learning and supervision theories, feedback, ethics, assessment and communication. Furthermore, the results conclude similarities in design of the courses, such as a problem-based approach, seminars, lectures and homework. Thus, there are common theoretical approaches to important supervisory competences.

Practical implications

Our results intend to offer possibilities to learn from different professions when improving supervisor training courses but may also constitute a starting point for developing a shared model of interprofessional supervisor competences. Furthermore, the results may support possible cooperation in interprofessional courses. This could include arranging interprofessional courses, where one part is shared for participants from the included professions and another part is profession-specific.

Originality/value

We seek to contribute to the research field of supervision at workplaces with knowledge and ideas about how to learn from different professions when developing and improving supervisor training courses.

Details

Education + Training, vol. 63 no. 4
Type: Research Article
ISSN: 0040-0912

Keywords

Open Access
Book part
Publication date: 9 December 2021

Abstract

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Open Access
Book part
Publication date: 9 December 2021

David J. Harper, Darren Ellis and Ian Tucker

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented…

Abstract

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented which highlight different types of surveillance and different ethical concerns. The first case concerns the use of undercover police to infiltrate political activist groups over a 40-year period in the UK. The second case study examines a joint operation by US and Australian law enforcement agencies: the FBI’s operation Trojan Shield and the AFP’s Operation Ironside. This involved distributing encrypted phone handsets to serious criminal organisations which included a ‘backdoor’ secretly sending encrypted copies of all messages to law enforcement. The third case study analyses the use of emotional artificial intelligence systems in educational digital learning platforms for children where technology companies collect, store and use intrusive personal data in an opaque manner. The authors discuss similarities and differences in the ethical questions raised by these cases, for example, the involvement of the state versus private corporations, the kinds of information gathered and how it is used.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Article
Publication date: 6 October 2023

Mary S. Mangai, Tyanai Masiya and Galaletsang Masemola

This paper aims to explore police perspectives on community engagement strategies within the context of crime prevention in South Africa, focusing on Johannesburg metropolitan…

Abstract

Purpose

This paper aims to explore police perspectives on community engagement strategies within the context of crime prevention in South Africa, focusing on Johannesburg metropolitan police stations. The study’s objective is to scrutinise the effectiveness and challenges of community policing strategies.

Design/methodology/approach

Through a qualitative research approach, this study conducted unstructured interviews with station commanders and visible policing officers across 10 Johannesburg metropolitan police stations.

Findings

The findings reveal that community policing strategies, such as community–policing forums, sector policing, street patrollers and social media utilisation, can effectively engage communities as partners in crime prevention. However, certain challenges such as resource limitations and difficulties in policing-specific regions, were also identified.

Originality/value

This study contributes to the broader understanding of community–policing partnerships and the practical implications of community–policing strategies in South Africa, suggesting areas for improvement and adaptation to the unique South African context. This knowledge can help optimise efforts to foster stronger relationships between police and communities, bolster public trust and ultimately improve crime prevention outcomes.

Details

Safer Communities, vol. 23 no. 1
Type: Research Article
ISSN: 1757-8043

Keywords

Open Access
Book part
Publication date: 4 June 2021

Anne Cheung

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual…

Abstract

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual concerned. Intuitively, it is tempting to condemn doxing as a crude form of cyber violence that weaponizes personal data. When it is used as a strategy of resistance by the powerless to hold the powerful accountable, however, a more nuanced understanding is called for. This chapter focuses on the doxing phenomenon in Hong Kong, where doxing incidents against police officers and their family members have skyrocketed since 2019 (a 75-fold increase over 2018). It contends that doxing for political purposes is closely related to digital vigilantism, signifying a loss of confidence in the ruling authority and a yearning for an alternative form of justice. The chapter therefore argues that public interest should be recognized as a legal defense in doxing cases when those discharging or entrusted with public duty are the targets. Equally, it is important to confine the categories of personal data disclosed to information necessary to reveal the alleged wrongdoer or wrongdoing. Only in this way can a fair balance be struck between privacy, freedom of expression, and public interest.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 10 of 377