80,973 research outputs found

    Bringing Oversight Review in Line with Online Research

    Get PDF
    The purpose of an oversight structure or institution is to protect human subjects from research that would pose unacceptable dangers or deny human rights. Review boards provide an independent assessment of research proposals. This additional level of scrutiny is meant to provide an additional level of protection for human subjects. However, oversight of human subject research, as currently carried out in the bureaucratic, rule-based, clinically-biased American system, is too cumbersome with regard to online research. In addition, it is not conducive to the training of ethical Internet researchers. Internet research differs from traditional human subject research in many ways, and the oversight rules governing traditional research do not easily relate to the complexities of conducting research online. Online researchers do not oppose the foundational principles of non-maleficence (avoiding harm) and autonomy, nor do they reject the ideals of informed consent and confidentiality, nevertheless, they face practical dilemmas in attempting to follow these principles and apply these ideals in the various Internet domains. The current oversight system is ill-equipped to assist. A conservative response to this problem of fit might entail adjustments to the oversight system that, in the case of the American system, would entail modifications to the Common Rule and Institutional Review Boards (IRBs). I will argue in this paper, instead, that re-structuring is needed to allow more oversight authority for Internet researchers. I will utilize Consequentialism and Virtue Ethics in making this case

    Magna Carta College : review for educational oversight by the Quality Assurance Agency for Higher Education

    Get PDF

    Experts and evidence in deliberation: scrutinising the role of witnesses and evidence in mini-publics, a case study

    Get PDF
    Experts hold a prominent position in guiding and shaping policy-making; however, the nature of expert input to decision-making is a topic of public debate. A key aspect of deliberative processes such as citizens’ juries is the provision of information to participants, usually from expert witnesses. However, there is currently little guidance on some of the challenges that organisers and advocates of citizens’ juries must consider regarding expert involvement, including the role of the witness, issues around witness identification and selection, the format of evidence provision, the evidence itself, and how these factors affect the experience of the participants and the witnesses. Here, we explore these issues through detailed case study of three citizens’ juries on onshore wind farm development in Scotland, including interviews with the witnesses involved. This is complemented by examining a cohort of mini-publics held on energy and the environment topics, and, where possible, discussion with the program organisers. We identify a series of issues and sensitivities that can compromise the effectiveness and fairness of the evidence-giving in mini-publics, for the participants, the witnesses and the organisers. We recommend approaches and areas for future work to address these challenges. This is the first time that the ways of involving witnesses in such processes have been so comprehensively examined, and is timely given the increasing interest in democratic innovations such as mini-publics and the current discourse concerning experts

    Designing digital public services

    Get PDF

    Cross Border Data Flows: Could Foreign Protectionism Hurt U.S. Jobs?: Hearing Before the Subcomm. On Commerce, Mfg. & Trade of the H. Comm. on Energy & Commerce, 113th Cong., Sept. 17, 2014 (Statement of Laura K. Donohue)

    Get PDF
    Documents released over the past year detailing the National Security Agency’s telephony metadata collection program and interception of international content under the Foreign Intelligence Surveillance Act (FISA) directly implicated U.S. high technology companies in government surveillance. The result was an immediate, and detrimental, impact on U.S. firms, the economy, and U.S. national security. The first Snowden documents, printed June 5, 2013, revealed that the U.S. government had served orders on Verizon, directing the company to turn over telephony metadata under Section 215 of the USA PATRIOT Act. The following day, The Guardian published classified slides detailing how the NSA had intercepted international content under Section 702 of the FISA Amendments Act. The type of information obtained ranged from E-mail, video and voice chat, videos, photos, and stored data, to Voice over Internet Protocol, file transfers, video conferencing, notifications of target activity, and online social networking details. The companies involved read like a who’s who of U.S. Internet giants: Microsoft, Yahoo, Google, Facebook, PalTalk, YouTube, Skype, AOL, and Apple. More articles highlighting the extent to which the NSA had become embedded in the U.S. high tech industry followed. In September 2013 ProPublica and the New York Times revealed that the NSA had enjoyed considerable success in cracking commonly-used cryptography. The following month the Washington Post reported that the NSA, without the consent of the companies involved, had obtained millions of customers’ address book data: in one day alone, some 444,743 email addresses from Yahoo, 105,068 from Hotmail, 82,857 from Facebook, 33,697 from Gmail, and 22,881 from other providers. The extent of upstream collection stunned the public – as did slides demonstrating how the NSA had bypassed the companies’ encryption, intercepting data as it transferred between the public Internet and the Google cloud. Further documents suggested that the NSA had helped to promote encryption standards for which it already held the key or whose vulnerabilities the NSA understood but not taken steps to address. Beyond this, press reports indicated that the NSA had at times posed as U.S. companies—without their knowledge—in order to gain access to foreign targets. In November 2013 Der Spiegel reported that the NSA and the United Kingdom’s Government Communications Headquarters (GCHQ) had created bogus versions of Slashdot and LinkedIn, so that when employees from the telecommunications firm Belgacom tried to access the sites from corporate computers, their requests were diverted to the replica sites that then injected malware into their machines. As a result of growing public awareness of these programs, U.S. companies have lost revenues, even as non-U.S. firms have benefited. In addition, numerous countries, concerned about consumer privacy as well as the penetration of U.S. surveillance efforts in the political sphere, have accelerated localization initiatives, begun restricting U.S. companies’ access to local markets, and introduced new privacy protections—with implications for the future of Internet governance and U.S. economic growth. These effects raise attendant concerns about U.S. national security. Congress has an opportunity to redress the current situation in at least three ways. First, and most importantly, reform of the Foreign Intelligence Surveillance Act would provide for greater restrictions on NSA surveillance. Second, new domestic legislation could extend better protections to consumer privacy. These shifts would allow U.S. industry legitimately to claim a change in circumstance, which would help them to gain competitive ground. Third, the integration of economic concerns at a programmatic level within the national security infrastructure would help to ensure that economic matters remain central to national security determinations in the future

    Fourteen Years of Education and Public Outreach for the Swift Gamma-ray Burst Explorer Mission

    Full text link
    The Sonoma State University (SSU) Education and Public Outreach (E/PO) group leads the Swift Education and Public Outreach program. For Swift, we have previously implemented broad efforts that have contributed to NASA's Science Mission Directorate E/PO portfolio across many outcome areas. Our current focus is on highly-leveraged and demonstrably successful activities, including the wide-reaching Astrophysics Educator Ambassador program, and our popular websites: Epo's Chronicles and the Gamma-ray Burst (GRB) Skymap. We also make major contributions working collaboratively through the Astrophysics Science Education and Public Outreach Forum (SEPOF) on activities such as the on-line educator professional development course NASA's Multiwavelength Universe. Past activities have included the development of many successful education units including the GEMS Invisible Universe guide, the Gamma-ray Burst Educator's guide, and the Newton's Laws Poster set; informal activities including support for the International Year of Astronomy, the development of a toolkit about supernovae for the amateur astronomers in the Night Sky Network, and the Swift paper instrument and glider models.Comment: 7th Huntsville Gamma-Ray Burst Symposium, GRB 2013: paper 42 in eConf Proceedings C130414

    Institutional audit : University of Greenwich

    Get PDF

    Institutional audit : University of Ulster

    Get PDF

    The Fund's Capacity Development Strategy: Better Policies Through Stronger Institutions

    Get PDF
    This paper outlines reforms to increase the effectiveness of the Fund's capacity development (CD) program. It builds on the 2008 and 2011 reviews of technical assistance (TA) and the 2008 review of training, which set in motion important changes to make CD more valuable to member countries
    • …
    corecore