Ethical Issues in Covert, Security and Surveillance Research.

The ebook edition of this title is Open Access and freely available to read online. Ethical Issues in Covert, Security and Surveillance Researchshowcases that it is only when the integrity of research is carefully pursued can users of the evidence produced be assured of its value and its ethical cre...

Full description

Saved in:
Bibliographic Details
Superior document:Advances in Research Ethics and Integrity Series ; v.8
:
TeilnehmendeR:
Place / Publishing House:Bingley : : Emerald Publishing Limited,, 2021.
©2022.
Year of Publication:2021
Edition:1st ed.
Language:English
Series:Advances in Research Ethics and Integrity Series
Online Access:
Physical Description:1 online resource (241 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 5006808792
ctrlnum (MiAaPQ)5006808792
(Au-PeEL)EBL6808792
(OCoLC)1289523094
collection bib_alma
record_format marc
spelling Iphofen, Ron.
Ethical Issues in Covert, Security and Surveillance Research.
1st ed.
Bingley : Emerald Publishing Limited, 2021.
©2022.
1 online resource (241 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Advances in Research Ethics and Integrity Series ; v.8
Intro -- Half Title Page -- Series Editor Page -- Title Page -- Copyright Page -- Contents -- About the Editors -- About the Contributors -- About the Series Editor -- Series Preface -- Acknowledgements -- Introduction: Ethical Issues in Covert, Security and Surveillance Research -- Introduction -- Being Covert -- Restricting Informed Consent -- Covert Studies -- Intrusiveness -- This Volume -- References -- Chapter 1: Surveillance Ethics: An Introduction to an Introduction -- Introduction -- Section One -- Section Two -- Conclusion -- References -- Chapter 2: Science, Ethics, and Responsible Research - The Case of Surveillance -- Introduction -- Surveillance in the Context of Post-modern Society -- Social Subjectivity and the Emerging Demands for Security and Autonomy -- Understandings of Surveillance -- Social Costs of Surveillance and Societal Trust -- Towards Responsible Surveillance -- References -- Chapter 3: Research Is Not a Private Matter -- Privacy -- Information Privacy: Consent and Control -- The Limits of Privacy -- Research without Consent -- Ethical Research: The Duties of Researchers -- References -- Chapter 4: Covert Research Ethics -- Introduction -- The Moderate Defence of the Grounds for Covert Research -- Lying Must Be an Exception -- Overt and Covert Research Are Not Clearly Distinguishable -- Informing Subjects Is Sometimes Really Impossible -- Informed Consent Can Never Cover Everything That Happens in the Field -- Sometimes the Most Important Things Are Learned through Unintentional Covert Research -- Informed Consent Inevitably Concerns Only the Initial Research Design -- A Covert Method May Be the Most Suitable Way of Getting Into the Field -- It Is Not Always the Researcher Who Chooses to Hide His/Her Identity -- Sometimes Asking for Subjects' Consent Is Impractical or Inappropriate.
Autoethnography and Online Research: Two Research Methodologies That Are Difficult to Reconcile with Overt Research -- The Risk of Causing Harm with Qualitative Research Is Very Limited -- Covert Research Must Always Be Considered as a Kind of Last Resort -- The Superiority of Situated Ethics -- The Radical Approach -- Conclusions -- References -- Chapter 5: Taking Shortcuts: Correlation, Not Causation, and the Moral Problems It Brings -- Introduction -- Legitimacy -- Embedding of Persistent Outliers and Bias -- Predicting the Future on the Strength of the Past -- Conclusion -- References -- Chapter 6: The Big Data World: Benefits, Threats and Ethical Challenges -- The Era of Big Data and the 'Datafication' of Society -- Big Data as an Enabler of Growth but Harbinger of Ethical Challenges -- The Continuity (Or Not) of Data Science Research Ethics with Social and Behavioural Science Research Ethics -- Big Data and Its Impact on Privacy -- Human Dignity at Risk Due to the 'Creep Factor' of Big Data -- New Types of Stigmatisation and Manipulation of Civil Rights in the 'Group Privacy' Landscape -- The 'Sharing the Wealth' Model and the 'Personal Data Store' Approach for Balancing Big Data Exploitation and Data Protection -- A Critical Perspective on the 'Notice and Consent' Model and on the Role of Transparency in the Evolving World of Big Data Analytics -- Discrimination, Social Cooling, Big Data Divide and Social Sorting -- Social Cooling as a Side Effect of Big Data -- Big Data Divide -- Big Data from the Public Sector Perspective -- Big Data for Public Use -- Dataveillance, Big Data Governance and Legislation -- Data Ownership -- Conclusions -- References -- Chapter 7: Health Data, Public Interest, and Surveillance for Non-health-Related Purposes -- Introduction -- The UK Legal Framework for the Use of Health Data -- Background and Legal Context.
Health Surveillance Using Health Data -- Additional Requirements -- Other Statutory Disclosures: Health Protection -- Surveillance/Research Distinction -- Non-health Surveillance Using Health Data -- Disclosure to Home Office Under MOU -- Protecting the Social Legitimacy of Health Data Sharing Through Institutional Design -- Can Demographic Information Be Subject to a Duty of Confidence? -- Legislative Purpose and (Social) Legitimacy -- The Law and Judicial Control -- Room for Conflicting Legislative Purposes to Broaden the Use of Disclosure Powers -- Limits to the Ability to Scrutinise the Merits of Individual Decisions -- Judicial Review Is a Retrospective Solution Only -- The Way Forward: Expanding the Remit of the Independent Advisory Board -- Conclusion -- References -- Chapter 8: Privacy and Security: German Perspectives, European Trends and Ethical Implications -- Introduction - The Relevance of Privacy in Germany and in Europe -- German Experiences of Security Agencies Collecting Excessive Information on Citizens -- Data Protection and Privacy: The 1983 German Census Case -- Privacy and the Current State of Technological Development -- Transparency, Accountability and Data Protection -- Privacy and Security - New Synergies? -- Towards European Legal and Ethical Standards for the Protection of the Citizens' Privacy? -- References -- Chapter 9: A Framework for Reviewing Dual Use Research -- Introduction -- A Framework for Defining Accountability and Responsibility in Research -- Research Integrity -- Research Governance -- Role of RECs/IRBs -- Dual Use Research of Concern -- Conclusion -- References -- Chapter 10: Security Risk Management in Hostile Environments: Community-based and Systems-based Approaches -- Introduction -- Approaches to Security Risk Management -- Community-based, Bottom-up Approach -- Systems-based, Top-down Approach.
Relationship between Top-down and Bottom-up Approaches -- Conflict of Knowledge between Top-down and Bottom-up Approaches -- Conflict between Procedures and Experience -- Field Experience is Not Converted into Knowledge -- Training is Ineffective at Improving Staff Security -- Knowledge Management in Security -- Conclusion -- References -- Chapter 11: Conducting Ethical Research in Sensitive Security Domains: Understanding Threats and the Importance of Building Trust -- Introduction: Research in Sensitive Domains -- Deductive and Inductive Reasoning -- Developing an Ethical Research Approach -- Conducting Knowledge Elicitation -- Knowledge Elicitation Methods -- Communicating Knowledge Back to End-users and Stakeholders -- Establishing the Trustworthiness of Qualitative Data -- Credibility -- Transferability -- Dependability -- Confirmability -- Towards an Integrated Understanding of Ethical Research in Sensitive Security Domains -- Conclusion -- References -- Chapter 12: Covert Aspects of Surveillance and the Ethical Issues They Raise -- Introduction -- Case Study 1 - Covert Surveillance of Activist Groups by Undercover Police: The 'Spycops' Scandal -- Issues Raised During the UCPI -- Undercover Surveillance and Human Rights -- Other Harms of Undercover Surveillance -- The Proportionality of Political Intelligence Gathering by Undercover Police -- 'Domestic Extremists' as the New 'Subversives' -- Case Study 2 - ΛNØM and Operation Trojan Shield -- ANOM -- 'Laundering' Surveillance -- The Rights and Wrongs of Encryption and Decryption -- Case Study 3 - Surveillance, Education and Emotional AI -- Governance of Education Technology in Schools -- AI and EdTech -- Discussion -- References -- Guidance Notes for Reviewers and Policymakers on Covert, Deceptive and Surveillance Research -- Preamble -- Part A.
Guidance for Reviewers on Covert, Surveillance and/or Deceptive Research -- (1) Do Not Assume These Research Approaches to be Inherently Unethical -- (2) Do Not Treat Covert, Deceptive and/or Surveillance Research 'Approaches' as a Set of Homogeneous Practices -- (3) Consider the Vital Role of 'Context' -- (4) Engage in a Full Examination of the Approach -- (5) Be Aware of the 'Methods' Available to Engage in Covert and/or Surveillance Research -- (6) Consider How the Growth of Data Analytics Has Implications for the Degree of Covert and/or Surveillance Research Made Possible -- (7) Consider the Range of Advice and Guidance Available to Help in Assessing the Ethics of Any Proposal Containing Covert and/or Surveillance Research -- (8) Consider in Detail How 'Standard' Ethical Research Principles, Such As Anonymity, Confidentiality and Consent, Are To Be Managed -- (9) Consider the Public Interest -- (10) Ensure You Are as Informed as Possible by the Available Literature and Illustrative Case Studies So That You Can Give Careful Consideration to the 'Promises' Made By Any Research That Is Covert, That Requires Surveillance and/or Entails Significant and Ethically 'Risky' Deception -- Part B -- Guidance for Policymakers on Covert, Deceptive and Surveillance Research -- (1) Do Not Assume Covert, Deceptive and/or Surveillance Research To Be Inherently Unethical -- (2) Do Not Treat Covert, Deceptive and/or Surveillance Research 'Approaches' as a Set of Homogeneous Practices -- (3) Deceptive Research Practices Cover a Variety of Approaches That Must Be Understood before Deciding to Use or Not Use Such Results -- (4) Policymakers Should Consider the Vital Role of 'Context' -- (5) Engage in a Full Examination of the Detailed Approach Used in the Research.
(6) Be Open and Transparent If Research Using Covert, Deceptive or Surveillance Methods Was Used to Inform Policy.
The ebook edition of this title is Open Access and freely available to read online. Ethical Issues in Covert, Security and Surveillance Researchshowcases that it is only when the integrity of research is carefully pursued can users of the evidence produced be assured of its value and its ethical credentials.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic books.
O'Mathúna, Dónal.
Print version: Iphofen, Ron Ethical Issues in Covert, Security and Surveillance Research Bingley : Emerald Publishing Limited,c2021 9781802624144
ProQuest (Firm)
Advances in Research Ethics and Integrity Series
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6808792 Click to View
language English
format eBook
author Iphofen, Ron.
spellingShingle Iphofen, Ron.
Ethical Issues in Covert, Security and Surveillance Research.
Advances in Research Ethics and Integrity Series ;
Intro -- Half Title Page -- Series Editor Page -- Title Page -- Copyright Page -- Contents -- About the Editors -- About the Contributors -- About the Series Editor -- Series Preface -- Acknowledgements -- Introduction: Ethical Issues in Covert, Security and Surveillance Research -- Introduction -- Being Covert -- Restricting Informed Consent -- Covert Studies -- Intrusiveness -- This Volume -- References -- Chapter 1: Surveillance Ethics: An Introduction to an Introduction -- Introduction -- Section One -- Section Two -- Conclusion -- References -- Chapter 2: Science, Ethics, and Responsible Research - The Case of Surveillance -- Introduction -- Surveillance in the Context of Post-modern Society -- Social Subjectivity and the Emerging Demands for Security and Autonomy -- Understandings of Surveillance -- Social Costs of Surveillance and Societal Trust -- Towards Responsible Surveillance -- References -- Chapter 3: Research Is Not a Private Matter -- Privacy -- Information Privacy: Consent and Control -- The Limits of Privacy -- Research without Consent -- Ethical Research: The Duties of Researchers -- References -- Chapter 4: Covert Research Ethics -- Introduction -- The Moderate Defence of the Grounds for Covert Research -- Lying Must Be an Exception -- Overt and Covert Research Are Not Clearly Distinguishable -- Informing Subjects Is Sometimes Really Impossible -- Informed Consent Can Never Cover Everything That Happens in the Field -- Sometimes the Most Important Things Are Learned through Unintentional Covert Research -- Informed Consent Inevitably Concerns Only the Initial Research Design -- A Covert Method May Be the Most Suitable Way of Getting Into the Field -- It Is Not Always the Researcher Who Chooses to Hide His/Her Identity -- Sometimes Asking for Subjects' Consent Is Impractical or Inappropriate.
Autoethnography and Online Research: Two Research Methodologies That Are Difficult to Reconcile with Overt Research -- The Risk of Causing Harm with Qualitative Research Is Very Limited -- Covert Research Must Always Be Considered as a Kind of Last Resort -- The Superiority of Situated Ethics -- The Radical Approach -- Conclusions -- References -- Chapter 5: Taking Shortcuts: Correlation, Not Causation, and the Moral Problems It Brings -- Introduction -- Legitimacy -- Embedding of Persistent Outliers and Bias -- Predicting the Future on the Strength of the Past -- Conclusion -- References -- Chapter 6: The Big Data World: Benefits, Threats and Ethical Challenges -- The Era of Big Data and the 'Datafication' of Society -- Big Data as an Enabler of Growth but Harbinger of Ethical Challenges -- The Continuity (Or Not) of Data Science Research Ethics with Social and Behavioural Science Research Ethics -- Big Data and Its Impact on Privacy -- Human Dignity at Risk Due to the 'Creep Factor' of Big Data -- New Types of Stigmatisation and Manipulation of Civil Rights in the 'Group Privacy' Landscape -- The 'Sharing the Wealth' Model and the 'Personal Data Store' Approach for Balancing Big Data Exploitation and Data Protection -- A Critical Perspective on the 'Notice and Consent' Model and on the Role of Transparency in the Evolving World of Big Data Analytics -- Discrimination, Social Cooling, Big Data Divide and Social Sorting -- Social Cooling as a Side Effect of Big Data -- Big Data Divide -- Big Data from the Public Sector Perspective -- Big Data for Public Use -- Dataveillance, Big Data Governance and Legislation -- Data Ownership -- Conclusions -- References -- Chapter 7: Health Data, Public Interest, and Surveillance for Non-health-Related Purposes -- Introduction -- The UK Legal Framework for the Use of Health Data -- Background and Legal Context.
Health Surveillance Using Health Data -- Additional Requirements -- Other Statutory Disclosures: Health Protection -- Surveillance/Research Distinction -- Non-health Surveillance Using Health Data -- Disclosure to Home Office Under MOU -- Protecting the Social Legitimacy of Health Data Sharing Through Institutional Design -- Can Demographic Information Be Subject to a Duty of Confidence? -- Legislative Purpose and (Social) Legitimacy -- The Law and Judicial Control -- Room for Conflicting Legislative Purposes to Broaden the Use of Disclosure Powers -- Limits to the Ability to Scrutinise the Merits of Individual Decisions -- Judicial Review Is a Retrospective Solution Only -- The Way Forward: Expanding the Remit of the Independent Advisory Board -- Conclusion -- References -- Chapter 8: Privacy and Security: German Perspectives, European Trends and Ethical Implications -- Introduction - The Relevance of Privacy in Germany and in Europe -- German Experiences of Security Agencies Collecting Excessive Information on Citizens -- Data Protection and Privacy: The 1983 German Census Case -- Privacy and the Current State of Technological Development -- Transparency, Accountability and Data Protection -- Privacy and Security - New Synergies? -- Towards European Legal and Ethical Standards for the Protection of the Citizens' Privacy? -- References -- Chapter 9: A Framework for Reviewing Dual Use Research -- Introduction -- A Framework for Defining Accountability and Responsibility in Research -- Research Integrity -- Research Governance -- Role of RECs/IRBs -- Dual Use Research of Concern -- Conclusion -- References -- Chapter 10: Security Risk Management in Hostile Environments: Community-based and Systems-based Approaches -- Introduction -- Approaches to Security Risk Management -- Community-based, Bottom-up Approach -- Systems-based, Top-down Approach.
Relationship between Top-down and Bottom-up Approaches -- Conflict of Knowledge between Top-down and Bottom-up Approaches -- Conflict between Procedures and Experience -- Field Experience is Not Converted into Knowledge -- Training is Ineffective at Improving Staff Security -- Knowledge Management in Security -- Conclusion -- References -- Chapter 11: Conducting Ethical Research in Sensitive Security Domains: Understanding Threats and the Importance of Building Trust -- Introduction: Research in Sensitive Domains -- Deductive and Inductive Reasoning -- Developing an Ethical Research Approach -- Conducting Knowledge Elicitation -- Knowledge Elicitation Methods -- Communicating Knowledge Back to End-users and Stakeholders -- Establishing the Trustworthiness of Qualitative Data -- Credibility -- Transferability -- Dependability -- Confirmability -- Towards an Integrated Understanding of Ethical Research in Sensitive Security Domains -- Conclusion -- References -- Chapter 12: Covert Aspects of Surveillance and the Ethical Issues They Raise -- Introduction -- Case Study 1 - Covert Surveillance of Activist Groups by Undercover Police: The 'Spycops' Scandal -- Issues Raised During the UCPI -- Undercover Surveillance and Human Rights -- Other Harms of Undercover Surveillance -- The Proportionality of Political Intelligence Gathering by Undercover Police -- 'Domestic Extremists' as the New 'Subversives' -- Case Study 2 - ΛNØM and Operation Trojan Shield -- ANOM -- 'Laundering' Surveillance -- The Rights and Wrongs of Encryption and Decryption -- Case Study 3 - Surveillance, Education and Emotional AI -- Governance of Education Technology in Schools -- AI and EdTech -- Discussion -- References -- Guidance Notes for Reviewers and Policymakers on Covert, Deceptive and Surveillance Research -- Preamble -- Part A.
Guidance for Reviewers on Covert, Surveillance and/or Deceptive Research -- (1) Do Not Assume These Research Approaches to be Inherently Unethical -- (2) Do Not Treat Covert, Deceptive and/or Surveillance Research 'Approaches' as a Set of Homogeneous Practices -- (3) Consider the Vital Role of 'Context' -- (4) Engage in a Full Examination of the Approach -- (5) Be Aware of the 'Methods' Available to Engage in Covert and/or Surveillance Research -- (6) Consider How the Growth of Data Analytics Has Implications for the Degree of Covert and/or Surveillance Research Made Possible -- (7) Consider the Range of Advice and Guidance Available to Help in Assessing the Ethics of Any Proposal Containing Covert and/or Surveillance Research -- (8) Consider in Detail How 'Standard' Ethical Research Principles, Such As Anonymity, Confidentiality and Consent, Are To Be Managed -- (9) Consider the Public Interest -- (10) Ensure You Are as Informed as Possible by the Available Literature and Illustrative Case Studies So That You Can Give Careful Consideration to the 'Promises' Made By Any Research That Is Covert, That Requires Surveillance and/or Entails Significant and Ethically 'Risky' Deception -- Part B -- Guidance for Policymakers on Covert, Deceptive and Surveillance Research -- (1) Do Not Assume Covert, Deceptive and/or Surveillance Research To Be Inherently Unethical -- (2) Do Not Treat Covert, Deceptive and/or Surveillance Research 'Approaches' as a Set of Homogeneous Practices -- (3) Deceptive Research Practices Cover a Variety of Approaches That Must Be Understood before Deciding to Use or Not Use Such Results -- (4) Policymakers Should Consider the Vital Role of 'Context' -- (5) Engage in a Full Examination of the Detailed Approach Used in the Research.
(6) Be Open and Transparent If Research Using Covert, Deceptive or Surveillance Methods Was Used to Inform Policy.
author_facet Iphofen, Ron.
O'Mathúna, Dónal.
author_variant r i ri
author2 O'Mathúna, Dónal.
author2_variant d o do
author2_role TeilnehmendeR
author_sort Iphofen, Ron.
title Ethical Issues in Covert, Security and Surveillance Research.
title_full Ethical Issues in Covert, Security and Surveillance Research.
title_fullStr Ethical Issues in Covert, Security and Surveillance Research.
title_full_unstemmed Ethical Issues in Covert, Security and Surveillance Research.
title_auth Ethical Issues in Covert, Security and Surveillance Research.
title_new Ethical Issues in Covert, Security and Surveillance Research.
title_sort ethical issues in covert, security and surveillance research.
series Advances in Research Ethics and Integrity Series ;
series2 Advances in Research Ethics and Integrity Series ;
publisher Emerald Publishing Limited,
publishDate 2021
physical 1 online resource (241 pages)
edition 1st ed.
contents Intro -- Half Title Page -- Series Editor Page -- Title Page -- Copyright Page -- Contents -- About the Editors -- About the Contributors -- About the Series Editor -- Series Preface -- Acknowledgements -- Introduction: Ethical Issues in Covert, Security and Surveillance Research -- Introduction -- Being Covert -- Restricting Informed Consent -- Covert Studies -- Intrusiveness -- This Volume -- References -- Chapter 1: Surveillance Ethics: An Introduction to an Introduction -- Introduction -- Section One -- Section Two -- Conclusion -- References -- Chapter 2: Science, Ethics, and Responsible Research - The Case of Surveillance -- Introduction -- Surveillance in the Context of Post-modern Society -- Social Subjectivity and the Emerging Demands for Security and Autonomy -- Understandings of Surveillance -- Social Costs of Surveillance and Societal Trust -- Towards Responsible Surveillance -- References -- Chapter 3: Research Is Not a Private Matter -- Privacy -- Information Privacy: Consent and Control -- The Limits of Privacy -- Research without Consent -- Ethical Research: The Duties of Researchers -- References -- Chapter 4: Covert Research Ethics -- Introduction -- The Moderate Defence of the Grounds for Covert Research -- Lying Must Be an Exception -- Overt and Covert Research Are Not Clearly Distinguishable -- Informing Subjects Is Sometimes Really Impossible -- Informed Consent Can Never Cover Everything That Happens in the Field -- Sometimes the Most Important Things Are Learned through Unintentional Covert Research -- Informed Consent Inevitably Concerns Only the Initial Research Design -- A Covert Method May Be the Most Suitable Way of Getting Into the Field -- It Is Not Always the Researcher Who Chooses to Hide His/Her Identity -- Sometimes Asking for Subjects' Consent Is Impractical or Inappropriate.
Autoethnography and Online Research: Two Research Methodologies That Are Difficult to Reconcile with Overt Research -- The Risk of Causing Harm with Qualitative Research Is Very Limited -- Covert Research Must Always Be Considered as a Kind of Last Resort -- The Superiority of Situated Ethics -- The Radical Approach -- Conclusions -- References -- Chapter 5: Taking Shortcuts: Correlation, Not Causation, and the Moral Problems It Brings -- Introduction -- Legitimacy -- Embedding of Persistent Outliers and Bias -- Predicting the Future on the Strength of the Past -- Conclusion -- References -- Chapter 6: The Big Data World: Benefits, Threats and Ethical Challenges -- The Era of Big Data and the 'Datafication' of Society -- Big Data as an Enabler of Growth but Harbinger of Ethical Challenges -- The Continuity (Or Not) of Data Science Research Ethics with Social and Behavioural Science Research Ethics -- Big Data and Its Impact on Privacy -- Human Dignity at Risk Due to the 'Creep Factor' of Big Data -- New Types of Stigmatisation and Manipulation of Civil Rights in the 'Group Privacy' Landscape -- The 'Sharing the Wealth' Model and the 'Personal Data Store' Approach for Balancing Big Data Exploitation and Data Protection -- A Critical Perspective on the 'Notice and Consent' Model and on the Role of Transparency in the Evolving World of Big Data Analytics -- Discrimination, Social Cooling, Big Data Divide and Social Sorting -- Social Cooling as a Side Effect of Big Data -- Big Data Divide -- Big Data from the Public Sector Perspective -- Big Data for Public Use -- Dataveillance, Big Data Governance and Legislation -- Data Ownership -- Conclusions -- References -- Chapter 7: Health Data, Public Interest, and Surveillance for Non-health-Related Purposes -- Introduction -- The UK Legal Framework for the Use of Health Data -- Background and Legal Context.
Health Surveillance Using Health Data -- Additional Requirements -- Other Statutory Disclosures: Health Protection -- Surveillance/Research Distinction -- Non-health Surveillance Using Health Data -- Disclosure to Home Office Under MOU -- Protecting the Social Legitimacy of Health Data Sharing Through Institutional Design -- Can Demographic Information Be Subject to a Duty of Confidence? -- Legislative Purpose and (Social) Legitimacy -- The Law and Judicial Control -- Room for Conflicting Legislative Purposes to Broaden the Use of Disclosure Powers -- Limits to the Ability to Scrutinise the Merits of Individual Decisions -- Judicial Review Is a Retrospective Solution Only -- The Way Forward: Expanding the Remit of the Independent Advisory Board -- Conclusion -- References -- Chapter 8: Privacy and Security: German Perspectives, European Trends and Ethical Implications -- Introduction - The Relevance of Privacy in Germany and in Europe -- German Experiences of Security Agencies Collecting Excessive Information on Citizens -- Data Protection and Privacy: The 1983 German Census Case -- Privacy and the Current State of Technological Development -- Transparency, Accountability and Data Protection -- Privacy and Security - New Synergies? -- Towards European Legal and Ethical Standards for the Protection of the Citizens' Privacy? -- References -- Chapter 9: A Framework for Reviewing Dual Use Research -- Introduction -- A Framework for Defining Accountability and Responsibility in Research -- Research Integrity -- Research Governance -- Role of RECs/IRBs -- Dual Use Research of Concern -- Conclusion -- References -- Chapter 10: Security Risk Management in Hostile Environments: Community-based and Systems-based Approaches -- Introduction -- Approaches to Security Risk Management -- Community-based, Bottom-up Approach -- Systems-based, Top-down Approach.
Relationship between Top-down and Bottom-up Approaches -- Conflict of Knowledge between Top-down and Bottom-up Approaches -- Conflict between Procedures and Experience -- Field Experience is Not Converted into Knowledge -- Training is Ineffective at Improving Staff Security -- Knowledge Management in Security -- Conclusion -- References -- Chapter 11: Conducting Ethical Research in Sensitive Security Domains: Understanding Threats and the Importance of Building Trust -- Introduction: Research in Sensitive Domains -- Deductive and Inductive Reasoning -- Developing an Ethical Research Approach -- Conducting Knowledge Elicitation -- Knowledge Elicitation Methods -- Communicating Knowledge Back to End-users and Stakeholders -- Establishing the Trustworthiness of Qualitative Data -- Credibility -- Transferability -- Dependability -- Confirmability -- Towards an Integrated Understanding of Ethical Research in Sensitive Security Domains -- Conclusion -- References -- Chapter 12: Covert Aspects of Surveillance and the Ethical Issues They Raise -- Introduction -- Case Study 1 - Covert Surveillance of Activist Groups by Undercover Police: The 'Spycops' Scandal -- Issues Raised During the UCPI -- Undercover Surveillance and Human Rights -- Other Harms of Undercover Surveillance -- The Proportionality of Political Intelligence Gathering by Undercover Police -- 'Domestic Extremists' as the New 'Subversives' -- Case Study 2 - ΛNØM and Operation Trojan Shield -- ANOM -- 'Laundering' Surveillance -- The Rights and Wrongs of Encryption and Decryption -- Case Study 3 - Surveillance, Education and Emotional AI -- Governance of Education Technology in Schools -- AI and EdTech -- Discussion -- References -- Guidance Notes for Reviewers and Policymakers on Covert, Deceptive and Surveillance Research -- Preamble -- Part A.
Guidance for Reviewers on Covert, Surveillance and/or Deceptive Research -- (1) Do Not Assume These Research Approaches to be Inherently Unethical -- (2) Do Not Treat Covert, Deceptive and/or Surveillance Research 'Approaches' as a Set of Homogeneous Practices -- (3) Consider the Vital Role of 'Context' -- (4) Engage in a Full Examination of the Approach -- (5) Be Aware of the 'Methods' Available to Engage in Covert and/or Surveillance Research -- (6) Consider How the Growth of Data Analytics Has Implications for the Degree of Covert and/or Surveillance Research Made Possible -- (7) Consider the Range of Advice and Guidance Available to Help in Assessing the Ethics of Any Proposal Containing Covert and/or Surveillance Research -- (8) Consider in Detail How 'Standard' Ethical Research Principles, Such As Anonymity, Confidentiality and Consent, Are To Be Managed -- (9) Consider the Public Interest -- (10) Ensure You Are as Informed as Possible by the Available Literature and Illustrative Case Studies So That You Can Give Careful Consideration to the 'Promises' Made By Any Research That Is Covert, That Requires Surveillance and/or Entails Significant and Ethically 'Risky' Deception -- Part B -- Guidance for Policymakers on Covert, Deceptive and Surveillance Research -- (1) Do Not Assume Covert, Deceptive and/or Surveillance Research To Be Inherently Unethical -- (2) Do Not Treat Covert, Deceptive and/or Surveillance Research 'Approaches' as a Set of Homogeneous Practices -- (3) Deceptive Research Practices Cover a Variety of Approaches That Must Be Understood before Deciding to Use or Not Use Such Results -- (4) Policymakers Should Consider the Vital Role of 'Context' -- (5) Engage in a Full Examination of the Detailed Approach Used in the Research.
(6) Be Open and Transparent If Research Using Covert, Deceptive or Surveillance Methods Was Used to Inform Policy.
isbn 9781802624113
9781802624144
callnumber-first H - Social Science
callnumber-subject H - Social Science
callnumber-label H1-99
callnumber-sort H 11 299
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6808792
illustrated Not Illustrated
dewey-hundreds 100 - Philosophy & psychology
dewey-tens 170 - Ethics
dewey-ones 174 - Occupational ethics
dewey-full 174
dewey-sort 3174
dewey-raw 174
dewey-search 174
oclc_num 1289523094
work_keys_str_mv AT iphofenron ethicalissuesincovertsecurityandsurveillanceresearch
AT omathunadonal ethicalissuesincovertsecurityandsurveillanceresearch
status_str n
ids_txt_mv (MiAaPQ)5006808792
(Au-PeEL)EBL6808792
(OCoLC)1289523094
carrierType_str_mv cr
hierarchy_parent_title Advances in Research Ethics and Integrity Series ; v.8
is_hierarchy_title Ethical Issues in Covert, Security and Surveillance Research.
container_title Advances in Research Ethics and Integrity Series ; v.8
author2_original_writing_str_mv noLinkedField
_version_ 1792331060752678912
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>11412nam a22004933i 4500</leader><controlfield tag="001">5006808792</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20240229073845.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">240229s2021 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781802624113</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781802624144</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5006808792</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL6808792</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1289523094</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">H1-99</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">174</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Iphofen, Ron.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ethical Issues in Covert, Security and Surveillance Research.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Bingley :</subfield><subfield code="b">Emerald Publishing Limited,</subfield><subfield code="c">2021.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (241 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in Research Ethics and Integrity Series ;</subfield><subfield code="v">v.8</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Half Title Page -- Series Editor Page -- Title Page -- Copyright Page -- Contents -- About the Editors -- About the Contributors -- About the Series Editor -- Series Preface -- Acknowledgements -- Introduction: Ethical Issues in Covert, Security and Surveillance Research -- Introduction -- Being Covert -- Restricting Informed Consent -- Covert Studies -- Intrusiveness -- This Volume -- References -- Chapter 1: Surveillance Ethics: An Introduction to an Introduction -- Introduction -- Section One -- Section Two -- Conclusion -- References -- Chapter 2: Science, Ethics, and Responsible Research - The Case of Surveillance -- Introduction -- Surveillance in the Context of Post-modern Society -- Social Subjectivity and the Emerging Demands for Security and Autonomy -- Understandings of Surveillance -- Social Costs of Surveillance and Societal Trust -- Towards Responsible Surveillance -- References -- Chapter 3: Research Is Not a Private Matter -- Privacy -- Information Privacy: Consent and Control -- The Limits of Privacy -- Research without Consent -- Ethical Research: The Duties of Researchers -- References -- Chapter 4: Covert Research Ethics -- Introduction -- The Moderate Defence of the Grounds for Covert Research -- Lying Must Be an Exception -- Overt and Covert Research Are Not Clearly Distinguishable -- Informing Subjects Is Sometimes Really Impossible -- Informed Consent Can Never Cover Everything That Happens in the Field -- Sometimes the Most Important Things Are Learned through Unintentional Covert Research -- Informed Consent Inevitably Concerns Only the Initial Research Design -- A Covert Method May Be the Most Suitable Way of Getting Into the Field -- It Is Not Always the Researcher Who Chooses to Hide His/Her Identity -- Sometimes Asking for Subjects' Consent Is Impractical or Inappropriate.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Autoethnography and Online Research: Two Research Methodologies That Are Difficult to Reconcile with Overt Research -- The Risk of Causing Harm with Qualitative Research Is Very Limited -- Covert Research Must Always Be Considered as a Kind of Last Resort -- The Superiority of Situated Ethics -- The Radical Approach -- Conclusions -- References -- Chapter 5: Taking Shortcuts: Correlation, Not Causation, and the Moral Problems It Brings -- Introduction -- Legitimacy -- Embedding of Persistent Outliers and Bias -- Predicting the Future on the Strength of the Past -- Conclusion -- References -- Chapter 6: The Big Data World: Benefits, Threats and Ethical Challenges -- The Era of Big Data and the 'Datafication' of Society -- Big Data as an Enabler of Growth but Harbinger of Ethical Challenges -- The Continuity (Or Not) of Data Science Research Ethics with Social and Behavioural Science Research Ethics -- Big Data and Its Impact on Privacy -- Human Dignity at Risk Due to the 'Creep Factor' of Big Data -- New Types of Stigmatisation and Manipulation of Civil Rights in the 'Group Privacy' Landscape -- The 'Sharing the Wealth' Model and the 'Personal Data Store' Approach for Balancing Big Data Exploitation and Data Protection -- A Critical Perspective on the 'Notice and Consent' Model and on the Role of Transparency in the Evolving World of Big Data Analytics -- Discrimination, Social Cooling, Big Data Divide and Social Sorting -- Social Cooling as a Side Effect of Big Data -- Big Data Divide -- Big Data from the Public Sector Perspective -- Big Data for Public Use -- Dataveillance, Big Data Governance and Legislation -- Data Ownership -- Conclusions -- References -- Chapter 7: Health Data, Public Interest, and Surveillance for Non-health-Related Purposes -- Introduction -- The UK Legal Framework for the Use of Health Data -- Background and Legal Context.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Health Surveillance Using Health Data -- Additional Requirements -- Other Statutory Disclosures: Health Protection -- Surveillance/Research Distinction -- Non-health Surveillance Using Health Data -- Disclosure to Home Office Under MOU -- Protecting the Social Legitimacy of Health Data Sharing Through Institutional Design -- Can Demographic Information Be Subject to a Duty of Confidence? -- Legislative Purpose and (Social) Legitimacy -- The Law and Judicial Control -- Room for Conflicting Legislative Purposes to Broaden the Use of Disclosure Powers -- Limits to the Ability to Scrutinise the Merits of Individual Decisions -- Judicial Review Is a Retrospective Solution Only -- The Way Forward: Expanding the Remit of the Independent Advisory Board -- Conclusion -- References -- Chapter 8: Privacy and Security: German Perspectives, European Trends and Ethical Implications -- Introduction - The Relevance of Privacy in Germany and in Europe -- German Experiences of Security Agencies Collecting Excessive Information on Citizens -- Data Protection and Privacy: The 1983 German Census Case -- Privacy and the Current State of Technological Development -- Transparency, Accountability and Data Protection -- Privacy and Security - New Synergies? -- Towards European Legal and Ethical Standards for the Protection of the Citizens' Privacy? -- References -- Chapter 9: A Framework for Reviewing Dual Use Research -- Introduction -- A Framework for Defining Accountability and Responsibility in Research -- Research Integrity -- Research Governance -- Role of RECs/IRBs -- Dual Use Research of Concern -- Conclusion -- References -- Chapter 10: Security Risk Management in Hostile Environments: Community-based and Systems-based Approaches -- Introduction -- Approaches to Security Risk Management -- Community-based, Bottom-up Approach -- Systems-based, Top-down Approach.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Relationship between Top-down and Bottom-up Approaches -- Conflict of Knowledge between Top-down and Bottom-up Approaches -- Conflict between Procedures and Experience -- Field Experience is Not Converted into Knowledge -- Training is Ineffective at Improving Staff Security -- Knowledge Management in Security -- Conclusion -- References -- Chapter 11: Conducting Ethical Research in Sensitive Security Domains: Understanding Threats and the Importance of Building Trust -- Introduction: Research in Sensitive Domains -- Deductive and Inductive Reasoning -- Developing an Ethical Research Approach -- Conducting Knowledge Elicitation -- Knowledge Elicitation Methods -- Communicating Knowledge Back to End-users and Stakeholders -- Establishing the Trustworthiness of Qualitative Data -- Credibility -- Transferability -- Dependability -- Confirmability -- Towards an Integrated Understanding of Ethical Research in Sensitive Security Domains -- Conclusion -- References -- Chapter 12: Covert Aspects of Surveillance and the Ethical Issues They Raise -- Introduction -- Case Study 1 - Covert Surveillance of Activist Groups by Undercover Police: The 'Spycops' Scandal -- Issues Raised During the UCPI -- Undercover Surveillance and Human Rights -- Other Harms of Undercover Surveillance -- The Proportionality of Political Intelligence Gathering by Undercover Police -- 'Domestic Extremists' as the New 'Subversives' -- Case Study 2 - ΛNØM and Operation Trojan Shield -- ANOM -- 'Laundering' Surveillance -- The Rights and Wrongs of Encryption and Decryption -- Case Study 3 - Surveillance, Education and Emotional AI -- Governance of Education Technology in Schools -- AI and EdTech -- Discussion -- References -- Guidance Notes for Reviewers and Policymakers on Covert, Deceptive and Surveillance Research -- Preamble -- Part A.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Guidance for Reviewers on Covert, Surveillance and/or Deceptive Research -- (1) Do Not Assume These Research Approaches to be Inherently Unethical -- (2) Do Not Treat Covert, Deceptive and/or Surveillance Research 'Approaches' as a Set of Homogeneous Practices -- (3) Consider the Vital Role of 'Context' -- (4) Engage in a Full Examination of the Approach -- (5) Be Aware of the 'Methods' Available to Engage in Covert and/or Surveillance Research -- (6) Consider How the Growth of Data Analytics Has Implications for the Degree of Covert and/or Surveillance Research Made Possible -- (7) Consider the Range of Advice and Guidance Available to Help in Assessing the Ethics of Any Proposal Containing Covert and/or Surveillance Research -- (8) Consider in Detail How 'Standard' Ethical Research Principles, Such As Anonymity, Confidentiality and Consent, Are To Be Managed -- (9) Consider the Public Interest -- (10) Ensure You Are as Informed as Possible by the Available Literature and Illustrative Case Studies So That You Can Give Careful Consideration to the 'Promises' Made By Any Research That Is Covert, That Requires Surveillance and/or Entails Significant and Ethically 'Risky' Deception -- Part B -- Guidance for Policymakers on Covert, Deceptive and Surveillance Research -- (1) Do Not Assume Covert, Deceptive and/or Surveillance Research To Be Inherently Unethical -- (2) Do Not Treat Covert, Deceptive and/or Surveillance Research 'Approaches' as a Set of Homogeneous Practices -- (3) Deceptive Research Practices Cover a Variety of Approaches That Must Be Understood before Deciding to Use or Not Use Such Results -- (4) Policymakers Should Consider the Vital Role of 'Context' -- (5) Engage in a Full Examination of the Detailed Approach Used in the Research.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">(6) Be Open and Transparent If Research Using Covert, Deceptive or Surveillance Methods Was Used to Inform Policy.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The ebook edition of this title is Open Access and freely available to read online. Ethical Issues in Covert, Security and Surveillance Researchshowcases that it is only when the integrity of research is carefully pursued can users of the evidence produced be assured of its value and its ethical credentials.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. </subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">O'Mathúna, Dónal.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Iphofen, Ron</subfield><subfield code="t">Ethical Issues in Covert, Security and Surveillance Research</subfield><subfield code="d">Bingley : Emerald Publishing Limited,c2021</subfield><subfield code="z">9781802624144</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in Research Ethics and Integrity Series</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6808792</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>