{"title":"A Framework for Reviewing Dual Use Research","authors":"S. Kolstoe","doi":"10.1108/s2398-601820210000008010","DOIUrl":"https://doi.org/10.1108/s2398-601820210000008010","url":null,"abstract":"‘Dual use research’ is research with results that can potentially cause harm as well as benefits. Harm can be to people, animals or the environment. For most research, harms can be difficult to predict and quantify, so in this sense almost all research could be seen as having dual use potential. This chapter will present a framework for reviewing dual use research by justifying why the responsibility for approving and conducting research does not sit with Research Ethics Committees (RECs) alone. By mapping out the wider research landscape, it will be argued that both responsibility and accountability for dual use research sits on the shoulders of broader governance structures that reflect the philo-sophical and political aspirations of society as a whole. RECs are certainly still important for identifying potential ‘dual use research of concern’, and perhaps teasing out some of the details that may be hidden within research plans or projects, but in a well-functioning system should never be the sole gate keepers that determine which research should, and should not, be allowed to proceed.","PeriodicalId":138074,"journal":{"name":"Ethical Issues in Covert, Security and Surveillance Research","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126482989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ethical Issues in Covert, Security and Surveillance Research","authors":"R. Iphofen, D. O’Mathúna","doi":"10.1108/s2398-601820210000008001","DOIUrl":"https://doi.org/10.1108/s2398-601820210000008001","url":null,"abstract":"","PeriodicalId":138074,"journal":{"name":"Ethical Issues in Covert, Security and Surveillance Research","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114674818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Covert Aspects of Surveillance and the Ethical Issues They Raise","authors":"D. Harper, D. Ellis, I. Tucker","doi":"10.1108/s2398-601820210000008013","DOIUrl":"https://doi.org/10.1108/s2398-601820210000008013","url":null,"abstract":"This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented which highlight different types of surveillance and different ethical concerns. The first case concerns the use of undercover police to infiltrate political activist groups over a 40-year period in the UK. The second case study examines a joint operation by US and Australian law enforcement agencies: the FBI’s operation Trojan Shield and the AFP’s Operation Ironside. This involved distributing encrypted phone handsets to serious criminal organisations which included a ‘backdoor’ secretly sending encrypted copies of all messages to law enforcement. The third case study analyses the use of emotional artificial intelligence systems in educational digital learning platforms for children where technology companies collect, store and use intrusive personal data in an opaque manner. The authors discuss similarities and differences in the ethical questions raised by these cases, for example, the involvement of the state versus private corporations, the kinds of information gathered and how it is used.","PeriodicalId":138074,"journal":{"name":"Ethical Issues in Covert, Security and Surveillance Research","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133943463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Risk Management in Hostile Environments: Community-based and Systems-based Approaches","authors":"Daniel Paul, A. Stedmon","doi":"10.1108/s2398-601820210000008011","DOIUrl":"https://doi.org/10.1108/s2398-601820210000008011","url":null,"abstract":"In recent years, there has been a growing dialogue around community-based and systems-based approaches to security risk management through the introduction of top-down and bottom-up knowledge acquisition. In essence, this relates to knowledge elicited from academic experts, or security subject-matter experts, practitioner experts, or field workers themselves and how much these disparate sources of knowledge may converge or diverge. In many ways, this represents a classic tension between organisational and procedural perspectives of knowledge management (i.e. top-down) versus more pragmatic and experience focussed perspectives (i.e. bottom-up). This chapter considers these approaches and argues that a more consistent approach needs to address the conflict between procedures and experience, help convert field experience into knowledge, and ultimately provide effective training that is relevant to those heading out into demanding work situations. Ultimately, ethics and method are intricately bound together in whichever approach is taken and the security of both staff and at-risk populations depends upon correctly managing the balance between systems and communities.","PeriodicalId":138074,"journal":{"name":"Ethical Issues in Covert, Security and Surveillance Research","volume":"520 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116194547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Iphofen, S. Kolstoe, Kevin Macnish, P. Spicker, D. O’Mathúna
{"title":"Guidance Notes for Reviewers and Policymakers on Covert, Deceptive and Surveillance Research","authors":"R. Iphofen, S. Kolstoe, Kevin Macnish, P. Spicker, D. O’Mathúna","doi":"10.1108/s2398-601820210000008014","DOIUrl":"https://doi.org/10.1108/s2398-601820210000008014","url":null,"abstract":"Covert research is research which has not been declared to research participants or subjects. Surveillance research is a form of covert research which involves undeclared monitoring of a subject’s actions and/or their data which may or may not be personal. Deceptive research is research whose nature has been misrepresented to the subject; it may be covert, but more usually it is not. Deception may form an element in any research approach. Covert, surveillance and deceptive research are often treated as raising similar ethical concerns, but they are different kinds of activity. Each category of research includes variable forms of data gathering, analysis and reporting, and therefore raises a variety of ethical issues, some distinct and some overlapping.","PeriodicalId":138074,"journal":{"name":"Ethical Issues in Covert, Security and Surveillance Research","volume":"360 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133717671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}