scholarly journals ‘Google wants to know your location’: The ethical challenges of fieldwork in the digital age

2018 ◽  
Vol 14 (4) ◽  
pp. 1-17 ◽  
Author(s):  
Sebastian van Baalen

Information communications technologies (ICTs) like laptops, smartphones and portable storage devices facilitate travel, communication and documentation for researchers who conduct fieldwork. But despite increasing awareness about the ethical complications associated with using ICTs among journalists and humanitarians, there are few reflections on digital security among researchers. This article seeks to raise awareness of this important question by outlining three sets of ethical challenges related to digital security that may arise during the course of field research. These ethical challenges relate to (i) informed consent and confidentiality, (ii) collecting, transferring and storing sensitive data, and (iii) maintaining the personal security and integrity of the researcher. To help academics reflect on and mitigate these risks, the article underscores the importance of digital risk assessments and develops ten basic guidelines for field research in the digital age.

Author(s):  
Anna Magdalena Elsner

Ethical issues arising in the practice of psychotherapy, such as confidentiality, boundaries in the therapeutic relationship, and informed consent, figure prominently in a range of twentieth-century literary texts that portray psychotherapy. This chapter analyzes the portrayal of these conflicts, but also stresses that they are often marginal to the overall plot structures of these narratives and that literary depictions of psychotherapy are often vague or even inaccurate concerning key characteristics of psychotherapeutic practice. Focusing on examples that either illustrate professionalism and the absence of ethical challenges in psychotherapy, or take up the ethical reservations that fueled anti-Freudianism or the anti-psychiatry movement, the chapter proposes that selected literary depictions of psychotherapy can play a key role in sensitizing therapists to the complex make-up of ethical dilemmas as well as illustrating the cultural and historical contexts of these dilemmas.


2020 ◽  
Vol 20 (1) ◽  
pp. 23-40
Author(s):  
Bustami Bustami ◽  
Rio Laksamana ◽  
Zuliana Rofiqoh

Only a few institutions are professionals in managing waqf in West Kalimantan Province. Baitulmaal Munzalan Indonesia Foundation (BMI) is present as one solution for people who want to donate their fund’s waqf through money in the industrial revolution 4.0 era. Having only been established for three years, BIM has managed to raise funds cash waqf of Rp. 2.9 billion. This paper aims to explain the strategies and constraints faced by BMI in collecting endowment funds through money in the digital age. By using the type of field research and data collection techniques through observation, interviews, and Focus Grup Discussion (FGD), there are two research results in this paper. First, the strategies used by BMI in developing cash waqf in the digital age are companies through social media (Facebook pages and Instagram) and tablig. Kampanye through social media is the most dominant strategy used by BMI and has enormous potential. Secondly, the obstacle felt by BMI in managing and developing cash waqf is negative perceptions from the community (external obstacle). Based on the results of this study, the authors argue that marketing through social media not only has positive implications for for-profit institutions but also non-profit institutions such as BMI in collecting and managing cash waqf in Indonesia.


Author(s):  
Markus Göransson

This chapter looks into Markus Göransson's reports from Tajikistan. It demonstrates how the mere use of the word “interview” could scare cautious non-elite research participants in violent and/or illiberal contexts away. It recounts Göransson's field research while being equipped with literature-based knowledge on how to conduct oral history interviews and secure the informed consent of interlocutors. The chapter explains how Göransson gathered data ad hoc, in informal, private, and often group settings, requiring flexibility and creativity on his behalf and a willingness to relinquish control of the process to some extent. It points out the deep affinities between the states' disciplining techniques and scientific research method.


Author(s):  
Kijpokin Kasemsap

This chapter aims to master web mining and Information Retrieval (IR) in the digital age, thus describing the overviews of web mining and web usage mining; the significance of web mining in the digital age; the overview of IR; the concept of Collaborative Information Retrieval (CIR); the evaluation of IR systems; and the significance of IR in the digital age. Web mining can contribute to the increase in profits by selling more products and by minimizing costs. Web mining is the application of data mining techniques to discover the interesting patterns from web data in order to better serve the needs of web-based multifaceted applications. Mining web data can improve the personalization, create the selling opportunities, and lead to more profitable relationships with customers in global business. Web mining techniques can be applied with the effective analysis of the clearly understood business needs and requirements. Web mining builds the detailed customer profiles based on the transactional data. Web mining is used to create the personalized search engines which can recognize the individuals' search queries by analyzing and profiling the web user's search behavior. IR is the process of obtaining relevant information from a collection of informational resources. IR has considerably changed with the expansion of the Internet and the advent of modern and inexpensive graphical user interfaces and mass storage devices. The effective IR system, including an active indexing system, not only decreases the chances that information will be misfiled but also expedites the retrieval of information. Regarding IR utilization, the resulting time-saving benefit increases office efficiency and productivity while decreasing stress and anxiety. Most IR systems provide the advanced searching capabilities that allow users to create the sophisticated queries. The chapter argues that applying web mining and IR has the potential to enhance organizational performance and reach strategic goals in the digital age.


2009 ◽  
Vol 110 (3) ◽  
pp. 480-486 ◽  
Author(s):  
David B. Waisel ◽  
Giulia Lamiani ◽  
Norma J. Sandrock ◽  
Robert Pascucci ◽  
Robert D. Truog ◽  
...  

Background Categorizing difficulties anesthesiologists have in obtaining informed consent may influence education, performance, and research. This study investigated the trainees' perspectives and educational needs through a qualitative analysis of narratives. Methods The Program to Enhance Relational and Communication Skills-Anesthesia used professional actors to teach communication skills and relational abilities associated with informed consent. Before attending the program, participants wrote about a challenging informed consent experience. Narratives were analyzed by two researchers following the principles of grounded theory. The researchers independently read the narratives and marked key words and phrases to identify reoccurring challenges described by anesthesiologists. Through rereading of the narratives and discussion, the two researchers reached consensus on the challenges that arose and calculated their frequency. Results Analysis of the 39 narratives led to the identification of three types of challenges facing anesthesiologists in obtaining informed consent. Ethical challenges included patient wishes not honored, conflict between patient and family wishes and medical judgment, patient decision-making capacity, and upholding professional standards. Practical challenges included the amount of information to provide, communication barriers, and time limitations. Relational challenges included questions about trainee competence, mistrust associated with previous negative experiences, and misunderstandings between physician and patient or family. Conclusions The ethical, practical, and relational challenges in obtaining informed consent colored trainees' views of patient care and affected their interactions with patients. Using participant narratives personalizes education and motivates participants. The richness of narratives may help anesthesiologists to appreciate the qualitative aspects of informed consent.


2020 ◽  
Vol 20 (3) ◽  
pp. 281-291
Author(s):  
Martha Montero-Sieburth

PurposeArgued is the need for: (1) a clearer interpretation of procedural ethics guidelines; (2) the identification and development of ethical field case study models which can be incorporated into university ethics teaching; (3) an understanding of the vulnerabilities of researchers and participants as reflected in the researchers' positionality and reflexivity and (4) ethnographic monitoring as a participant-friendly and participatory ethics methodology.Design/methodology/approachThis article, drawn from the author's four-decade trajectory of collective ethnographic research, addresses the ethical challenges and dilemmas encountered by researchers when conducting ethnographic research, particularly with vulnerable migrant women and youth.FindingsThe author addresses dilemmas in field research resulting from different interpretations of ethics and emphasizes the need for researchers to be critically aware of their own vulnerabilities and those of migrants to avoid unethical practices in validating the context(s), language(s), culture and political landscape of their study.Research limitations/implicationsThe author presents case studies from the US and the Netherlands, underlining her positionality and reflexivity and revisits Dell Hymes' ethnographic monitoring approach as a participant-friendly, bottom-up methodology which enables researchers to co-construct knowledge with participants and leads to participatory ethics.Practical implicationsShe presents case studies from the US and the Netherlands underlining her positionality and reflexivity and revisits Dell Hymes’ ethnographic monitoring approach as a participant-friendly, bottom up methodology which enables researchers to co-construct knowledge with participants and engage in participatory ethics.Social implicationsFinally, she proposes guidelines for the ethical conduct of research with migrant populations that contribute to the broader methodological debates currently taking place in qualitative migration research.Originality/valueExpected from this reading is the legacy that as a qualitative migration researcher one can after 4 decades of research leave behind as caveats and considerations in working with vulnerable migrants and the ethical dilemmas and challenges that need to be overcome.


2020 ◽  
Vol 2020 ◽  
pp. 1-9 ◽  
Author(s):  
Bahman A. Sassani (Sarrafpour) ◽  
Mohammed Alkorbi ◽  
Noreen Jamil ◽  
M. Asif Naeem ◽  
Farhaan Mirza

Sensitive data need to be protected from being stolen and read by unauthorized persons regardless of whether the data are stored in hard drives, flash memory, laptops, desktops, and other storage devices. In an enterprise environment where sensitive data is stored on storage devices, such as financial or military data, encryption is used in the storage device to ensure data confidentiality. Nowadays, the SSD-based NAND storage devices are favored over HDD and SSHD to store data because they offer increased performance and reduced access latency to the client. In this paper, the performance of different symmetric encryption algorithms is evaluated on HDD, SSHD, and SSD-based NAND MLC flash memory using two different storage encryption software. Based on the experiments we carried out, Advanced Encryption Standard (AES) algorithm on HDD outperforms Serpent and Twofish algorithms in terms of random read speed and write speed (both sequentially and randomly), whereas Twofish algorithm is slightly faster than AES in sequential reading on SSHD and SSD-based NAND MLC flash memory. By conducting full range of evaluative tests across HDD, SSHD, and SSD, our experimental results can give better idea for the storage consumers to determine which kind of storage device and encryption algorithm is suitable for their purposes. This will give them an opportunity to continuously achieve the best performance of the storage device and secure their sensitive data.


Sign in / Sign up

Export Citation Format

Share Document