Ethical Issues in Covert, Security and Surveillance Research.

The ebook edition of this title is Open Access and freely available to read online. Ethical Issues in Covert, Security and Surveillance Researchshowcases that it is only when the integrity of research is carefully pursued can users of the evidence produced be assured of its value and its ethical cre...

Full description

Saved in:
Bibliographic Details
Superior document:Advances in Research Ethics and Integrity Series ; v.8
:
TeilnehmendeR:
Place / Publishing House:Bingley : : Emerald Publishing Limited,, 2021.
©2022.
Year of Publication:2021
Edition:1st ed.
Language:English
Series:Advances in Research Ethics and Integrity Series
Online Access:
Physical Description:1 online resource (241 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 11412nam a22004933i 4500
001 5006808792
003 MiAaPQ
005 20240229073845.0
006 m o d |
007 cr cnu||||||||
008 240229s2021 xx o ||||0 eng d
020 |a 9781802624113  |q (electronic bk.) 
020 |z 9781802624144 
035 |a (MiAaPQ)5006808792 
035 |a (Au-PeEL)EBL6808792 
035 |a (OCoLC)1289523094 
040 |a MiAaPQ  |b eng  |e rda  |e pn  |c MiAaPQ  |d MiAaPQ 
050 4 |a H1-99 
082 0 |a 174 
100 1 |a Iphofen, Ron. 
245 1 0 |a Ethical Issues in Covert, Security and Surveillance Research. 
250 |a 1st ed. 
264 1 |a Bingley :  |b Emerald Publishing Limited,  |c 2021. 
264 4 |c ©2022. 
300 |a 1 online resource (241 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Advances in Research Ethics and Integrity Series ;  |v v.8 
505 0 |a Intro -- Half Title Page -- Series Editor Page -- Title Page -- Copyright Page -- Contents -- About the Editors -- About the Contributors -- About the Series Editor -- Series Preface -- Acknowledgements -- Introduction: Ethical Issues in Covert, Security and Surveillance Research -- Introduction -- Being Covert -- Restricting Informed Consent -- Covert Studies -- Intrusiveness -- This Volume -- References -- Chapter 1: Surveillance Ethics: An Introduction to an Introduction -- Introduction -- Section One -- Section Two -- Conclusion -- References -- Chapter 2: Science, Ethics, and Responsible Research - The Case of Surveillance -- Introduction -- Surveillance in the Context of Post-modern Society -- Social Subjectivity and the Emerging Demands for Security and Autonomy -- Understandings of Surveillance -- Social Costs of Surveillance and Societal Trust -- Towards Responsible Surveillance -- References -- Chapter 3: Research Is Not a Private Matter -- Privacy -- Information Privacy: Consent and Control -- The Limits of Privacy -- Research without Consent -- Ethical Research: The Duties of Researchers -- References -- Chapter 4: Covert Research Ethics -- Introduction -- The Moderate Defence of the Grounds for Covert Research -- Lying Must Be an Exception -- Overt and Covert Research Are Not Clearly Distinguishable -- Informing Subjects Is Sometimes Really Impossible -- Informed Consent Can Never Cover Everything That Happens in the Field -- Sometimes the Most Important Things Are Learned through Unintentional Covert Research -- Informed Consent Inevitably Concerns Only the Initial Research Design -- A Covert Method May Be the Most Suitable Way of Getting Into the Field -- It Is Not Always the Researcher Who Chooses to Hide His/Her Identity -- Sometimes Asking for Subjects' Consent Is Impractical or Inappropriate. 
505 8 |a Autoethnography and Online Research: Two Research Methodologies That Are Difficult to Reconcile with Overt Research -- The Risk of Causing Harm with Qualitative Research Is Very Limited -- Covert Research Must Always Be Considered as a Kind of Last Resort -- The Superiority of Situated Ethics -- The Radical Approach -- Conclusions -- References -- Chapter 5: Taking Shortcuts: Correlation, Not Causation, and the Moral Problems It Brings -- Introduction -- Legitimacy -- Embedding of Persistent Outliers and Bias -- Predicting the Future on the Strength of the Past -- Conclusion -- References -- Chapter 6: The Big Data World: Benefits, Threats and Ethical Challenges -- The Era of Big Data and the 'Datafication' of Society -- Big Data as an Enabler of Growth but Harbinger of Ethical Challenges -- The Continuity (Or Not) of Data Science Research Ethics with Social and Behavioural Science Research Ethics -- Big Data and Its Impact on Privacy -- Human Dignity at Risk Due to the 'Creep Factor' of Big Data -- New Types of Stigmatisation and Manipulation of Civil Rights in the 'Group Privacy' Landscape -- The 'Sharing the Wealth' Model and the 'Personal Data Store' Approach for Balancing Big Data Exploitation and Data Protection -- A Critical Perspective on the 'Notice and Consent' Model and on the Role of Transparency in the Evolving World of Big Data Analytics -- Discrimination, Social Cooling, Big Data Divide and Social Sorting -- Social Cooling as a Side Effect of Big Data -- Big Data Divide -- Big Data from the Public Sector Perspective -- Big Data for Public Use -- Dataveillance, Big Data Governance and Legislation -- Data Ownership -- Conclusions -- References -- Chapter 7: Health Data, Public Interest, and Surveillance for Non-health-Related Purposes -- Introduction -- The UK Legal Framework for the Use of Health Data -- Background and Legal Context. 
505 8 |a Health Surveillance Using Health Data -- Additional Requirements -- Other Statutory Disclosures: Health Protection -- Surveillance/Research Distinction -- Non-health Surveillance Using Health Data -- Disclosure to Home Office Under MOU -- Protecting the Social Legitimacy of Health Data Sharing Through Institutional Design -- Can Demographic Information Be Subject to a Duty of Confidence? -- Legislative Purpose and (Social) Legitimacy -- The Law and Judicial Control -- Room for Conflicting Legislative Purposes to Broaden the Use of Disclosure Powers -- Limits to the Ability to Scrutinise the Merits of Individual Decisions -- Judicial Review Is a Retrospective Solution Only -- The Way Forward: Expanding the Remit of the Independent Advisory Board -- Conclusion -- References -- Chapter 8: Privacy and Security: German Perspectives, European Trends and Ethical Implications -- Introduction - The Relevance of Privacy in Germany and in Europe -- German Experiences of Security Agencies Collecting Excessive Information on Citizens -- Data Protection and Privacy: The 1983 German Census Case -- Privacy and the Current State of Technological Development -- Transparency, Accountability and Data Protection -- Privacy and Security - New Synergies? -- Towards European Legal and Ethical Standards for the Protection of the Citizens' Privacy? -- References -- Chapter 9: A Framework for Reviewing Dual Use Research -- Introduction -- A Framework for Defining Accountability and Responsibility in Research -- Research Integrity -- Research Governance -- Role of RECs/IRBs -- Dual Use Research of Concern -- Conclusion -- References -- Chapter 10: Security Risk Management in Hostile Environments: Community-based and Systems-based Approaches -- Introduction -- Approaches to Security Risk Management -- Community-based, Bottom-up Approach -- Systems-based, Top-down Approach. 
505 8 |a Relationship between Top-down and Bottom-up Approaches -- Conflict of Knowledge between Top-down and Bottom-up Approaches -- Conflict between Procedures and Experience -- Field Experience is Not Converted into Knowledge -- Training is Ineffective at Improving Staff Security -- Knowledge Management in Security -- Conclusion -- References -- Chapter 11: Conducting Ethical Research in Sensitive Security Domains: Understanding Threats and the Importance of Building Trust -- Introduction: Research in Sensitive Domains -- Deductive and Inductive Reasoning -- Developing an Ethical Research Approach -- Conducting Knowledge Elicitation -- Knowledge Elicitation Methods -- Communicating Knowledge Back to End-users and Stakeholders -- Establishing the Trustworthiness of Qualitative Data -- Credibility -- Transferability -- Dependability -- Confirmability -- Towards an Integrated Understanding of Ethical Research in Sensitive Security Domains -- Conclusion -- References -- Chapter 12: Covert Aspects of Surveillance and the Ethical Issues They Raise -- Introduction -- Case Study 1 - Covert Surveillance of Activist Groups by Undercover Police: The 'Spycops' Scandal -- Issues Raised During the UCPI -- Undercover Surveillance and Human Rights -- Other Harms of Undercover Surveillance -- The Proportionality of Political Intelligence Gathering by Undercover Police -- 'Domestic Extremists' as the New 'Subversives' -- Case Study 2 - ΛNØM and Operation Trojan Shield -- ANOM -- 'Laundering' Surveillance -- The Rights and Wrongs of Encryption and Decryption -- Case Study 3 - Surveillance, Education and Emotional AI -- Governance of Education Technology in Schools -- AI and EdTech -- Discussion -- References -- Guidance Notes for Reviewers and Policymakers on Covert, Deceptive and Surveillance Research -- Preamble -- Part A. 
505 8 |a Guidance for Reviewers on Covert, Surveillance and/or Deceptive Research -- (1) Do Not Assume These Research Approaches to be Inherently Unethical -- (2) Do Not Treat Covert, Deceptive and/or Surveillance Research 'Approaches' as a Set of Homogeneous Practices -- (3) Consider the Vital Role of 'Context' -- (4) Engage in a Full Examination of the Approach -- (5) Be Aware of the 'Methods' Available to Engage in Covert and/or Surveillance Research -- (6) Consider How the Growth of Data Analytics Has Implications for the Degree of Covert and/or Surveillance Research Made Possible -- (7) Consider the Range of Advice and Guidance Available to Help in Assessing the Ethics of Any Proposal Containing Covert and/or Surveillance Research -- (8) Consider in Detail How 'Standard' Ethical Research Principles, Such As Anonymity, Confidentiality and Consent, Are To Be Managed -- (9) Consider the Public Interest -- (10) Ensure You Are as Informed as Possible by the Available Literature and Illustrative Case Studies So That You Can Give Careful Consideration to the 'Promises' Made By Any Research That Is Covert, That Requires Surveillance and/or Entails Significant and Ethically 'Risky' Deception -- Part B -- Guidance for Policymakers on Covert, Deceptive and Surveillance Research -- (1) Do Not Assume Covert, Deceptive and/or Surveillance Research To Be Inherently Unethical -- (2) Do Not Treat Covert, Deceptive and/or Surveillance Research 'Approaches' as a Set of Homogeneous Practices -- (3) Deceptive Research Practices Cover a Variety of Approaches That Must Be Understood before Deciding to Use or Not Use Such Results -- (4) Policymakers Should Consider the Vital Role of 'Context' -- (5) Engage in a Full Examination of the Detailed Approach Used in the Research. 
505 8 |a (6) Be Open and Transparent If Research Using Covert, Deceptive or Surveillance Methods Was Used to Inform Policy. 
520 |a The ebook edition of this title is Open Access and freely available to read online. Ethical Issues in Covert, Security and Surveillance Researchshowcases that it is only when the integrity of research is carefully pursued can users of the evidence produced be assured of its value and its ethical credentials. 
588 |a Description based on publisher supplied metadata and other sources. 
590 |a Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.  
655 4 |a Electronic books. 
700 1 |a O'Mathúna, Dónal. 
776 0 8 |i Print version:  |a Iphofen, Ron  |t Ethical Issues in Covert, Security and Surveillance Research  |d Bingley : Emerald Publishing Limited,c2021  |z 9781802624144 
797 2 |a ProQuest (Firm) 
830 0 |a Advances in Research Ethics and Integrity Series 
856 4 0 |u https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6808792  |z Click to View