Search results
1 – 10 of 16Ron Iphofen, Simon E. Kolstoe, Kevin Macnish, Paul Spicker and Dónal O'Mathúna
Mark Taylor and Richard Kirkham
A policy of surveillance which interferes with the fundamental right to a private life requires credible justification and a supportive evidence base. The authority for such…
Abstract
A policy of surveillance which interferes with the fundamental right to a private life requires credible justification and a supportive evidence base. The authority for such interference should be clearly detailed in law, overseen by a transparent process and not left to the vagaries of administrative discretion. If a state surveils those it governs and claims the interference to be in the public interest, then the evidence base on which that claim stands and the operative conception of public interest should be subject to critical examination. Unfortunately, there is an inconsistency in the regulatory burden associated with access to confidential patient information for non-health-related surveillance purposes and access for health-related surveillance or research purposes. This inconsistency represents a systemic weakness to inform or challenge an evidence-based policy of non-health-related surveillance. This inconsistency is unjustified and undermines the qualities recognised to be necessary to maintain a trustworthy confidential public health service. Taking the withdrawn Memorandum of Understanding (MoU) between NHS Digital and the Home Office as a worked example, this chapter demonstrates how the capacity of the law to constrain the arbitrary or unwarranted exercise of power through judicial review is not sufficient to level the playing field. The authors recommend ‘levelling up’ in procedural oversight, and adopting independent mechanisms equivalent to those adopted for establishing the operative conceptions of public interest in the context of health research to non-health-related surveillance purposes.
Details
Keywords
Covert research has a mixed reputation within the scientific community. Some are unsure of its moral worth, others would proscribe it entirely. This reputation stems largely from…
Abstract
Covert research has a mixed reputation within the scientific community. Some are unsure of its moral worth, others would proscribe it entirely. This reputation stems largely from a lack of knowledge about the reasons for choosing the covert method. In this chapter, these reasons will be reconstructed in detail and all the elements that will allow one to judge the level of ethicality of covert research will be laid out for the reader. In particular, the chapter will answer the following questions: What harms can result from covert research to the subjects participating in the research? Is covert research necessarily deceptive? In which cases is it ethically permissible for a researcher to deceive? What is the scientific added value of the covert research, that is, what does covert research discover that overt research does not? What are the risks to researchers acting undercover? Finally, some suggestions will be offered to research ethics reviewers to help in their appraisal of covert research.
Details
Keywords
In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson…
Abstract
In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson, 2015). Traditionally, such security domains are often focussed on mainstream public safety within crowded spaces and border controls, through to identifying suspicious behaviours, hostile reconnaissance and implementing counter-terrorism initiatives. More recently, with growing insecurity around the world, organisations have looked to improve their security risk management frameworks, developing concepts which originated in the health and safety field to deal with more pressing risks such as terrorist acts, abduction and piracy (Paul, 2018). In these instances, security is usually the specific responsibility of frontline personnel with defined roles and responsibilities operating in accordance with organisational protocols (Saikayasit, Stedmon, Lawson, & Fussey, 2012; Stedmon, Saikayasit, Lawson, & Fussey, 2013). However, understanding the knowledge that frontline security workers might possess and use requires sensitive investigation in equally sensitive security domains.
This chapter considers how to investigate knowledge elicitation in these sensitive security domains and underlying ethics in research design that supports and protects the nature of investigation and end-users alike. This chapter also discusses the criteria used for ensuring trustworthiness as well as assessing the relative merits of the range of methods adopted.
Details
Keywords
Alfonso Alfonsi and Maresa Berliri
This chapter, based on a sociological approach, addresses the ethical issues of surveillance research from the perspective of the profound transformations that science and…
Abstract
This chapter, based on a sociological approach, addresses the ethical issues of surveillance research from the perspective of the profound transformations that science and innovation are undergoing, as part of a broader shift from modern to post-modern society, affecting also other major social institutions (such as government, religion, family, and public administration). The change occurring in the science and technology system is characterised by diminishing authority, uncertainty about internal mechanisms and standards, and a declining and increasingly difficult access to resources. Such changes, also related to globalisation and new digital technologies, have transformed the way research is conducted and disseminated. Research is now more open and its results more easily accessible to citizens.
Scientific research is also put under increased public scrutiny, while, at the same time, public distrust and disaffection towards science is rising. In such a context, it is more important than ever to make sure that research activities are not compromised by fraudulent and unethical practices. The legitimate expectations of citizens to enjoy their rights, including the ability to protect their private sphere, are growing. Scientific and technological development is deeply interrelated with the widespread awareness of these rights and the possibility of exercising them, but it produces also new risks, while a widespread sense of insecurity increases. The digital revolution, while improving people’s quality of life, offers at the same time new opportunities for crime and terrorism, which in turn has produced a demand to strengthen security systems through increasingly advanced and intrusive surveillance technologies. Misconduct in the field of surveillance may not only undermine the quality of research, but also further impair society’s trust in research and science as well as in the State and its institutions.
Details
Keywords
Ron Iphofen and Dónal O'Mathúna
In light of the many crises and catastrophes faced in the modern world, policymakers frequently make claims to be ‘following the science’ or being ‘governed by the data’. Yet…
Abstract
In light of the many crises and catastrophes faced in the modern world, policymakers frequently make claims to be ‘following the science’ or being ‘governed by the data’. Yet, conflict based on inequalities continue to fuel dissatisfaction with the decisions and actions of authorities. Research into public security may require surveillance and covert observations, all of which are subject to major ethical challenges. Any neat distinction between covert and overt research is difficult to maintain given the variety of definitions used for all the terms addressed here. Covert research may be ethically justified and is not necessarily deceptive. In any case, deception may be ethical if engaged in for the ‘right’ reasons. Modern research sites and innovative research methods may enhance opportunities for covert work. In all surveillance and covert work, care must be taken about how consent is managed, how observed subjects are protected and harm to all involved minimised in all situations.
Details
Keywords
Since the European Union’s (EU) Charter of Fundamental Rights became binding in 2009, data protection has attained the status of a fundamental right (Article 8) throughout the EU…
Abstract
Since the European Union’s (EU) Charter of Fundamental Rights became binding in 2009, data protection has attained the status of a fundamental right (Article 8) throughout the EU. This chapter discusses the relevance of data protection in the context of security. It shows that data protection has been of particular relevance in the German context – not only against the backdrop of rapidly evolving information technology, but also of the historical experiences with political regimes collecting information in order to oppress citizens.
Details
Keywords
This short chapter is an introduction to my 2018 book: The Ethics of Surveillance: An Introduction (Macnish, 2018). It is provided at the start of this PRO-RES collection of…
Abstract
This short chapter is an introduction to my 2018 book: The Ethics of Surveillance: An Introduction (Macnish, 2018). It is provided at the start of this PRO-RES collection of essays because it anticipates and supplements the range of issues covered in this collection and lays out some of the fundamental considerations necessary to ensure if surveillance must be conducted, it will be done as ethically as possible.
When is surveillance justified? We can largely agree that there are cases in which surveillance seems, at least prima facie, to be morally correct: police tracking a suspected mass murderer, domestic state security tracking a spy network, or a spouse uncovering partner’s infidelity. At the same time, there are other cases in which surveillance seems clearly not to be justified: the mass surveillance practices of the East German Stasi, an employer watching over an employee to ensure that they do not spend too long in the toilet, or a voyeur watching the subject of his lust undress night after night.
As an introductory text, my book does not seek to provide a list of necessary and sufficient conditions for ethical surveillance. What it does provide is an overview of the current thinking in surveillance ethics, looking at a range of proposed arguments about these questions, and how those arguments might play out in a variety of applied settings. It hence provides a useful and accessible volume for policymakers wishing to rapidly get up to speed on developments in surveillance and the accompanying ethical discussions.
Details
Keywords
‘Dual use research’ is research with results that can potentially cause harm as well as benefits. Harm can be to people, animals or the environment. For most research, harms can…
Abstract
‘Dual use research’ is research with results that can potentially cause harm as well as benefits. Harm can be to people, animals or the environment. For most research, harms can be difficult to predict and quantify, so in this sense almost all research could be seen as having dual use potential. This chapter will present a framework for reviewing dual use research by justifying why the responsibility for approving and conducting research does not sit with Research Ethics Committees (RECs) alone. By mapping out the wider research landscape, it will be argued that both responsibility and accountability for dual use research sits on the shoulders of broader governance structures that reflect the philosophical and political aspirations of society as a whole. RECs are certainly still important for identifying potential ‘dual use research of concern’, and perhaps teasing out some of the details that may be hidden within research plans or projects, but in a well-functioning system should never be the sole gate keepers that determine which research should, and should not, be allowed to proceed.
Details