5,076 research outputs found
Recommended from our members
Online behavioural tracking in Internet gambling research: ethical and methodological issues
In contrast to offline gambling, the use of online behavioural tracking presents an opportunity for researchers in the social sciences to examine the actual and real-time behaviour engaged in by gamblers. If gaming companies can use behavioural tracking to learn more about their clientele, there is no reason why researchers could not adopt the same practice in carrying out their research. After examining why the online medium is a good place to conduct research with online gamblers, the paper examines the (i) methodological issues in online gambling research, (ii) behavioural tracking tools in online gambling, (iii) the ethics of online data collection by the gambling industry, (iv) ethical issues in online behavioural tracking research, and (v) implications of online behavioural tracking for problem gambling screening criteria. In the main, the most salient problems that online researchers in the gambling studies field are likely to face concern ethical issues (informed consent, deception, public versus private spaces, lurking). Despite such ethical dilemmas, these are not insurmountable and can be remedied if careful thought and rationale is provided
A review of research ethics in internet-based research
Internet-based research methods can include; on-line surveys, web page content analysis, videoconferencing for on-line focus groups and/ or interviews, analysis of âeâ conversations through social networking sites, email, chat rooms, discussion boards and/ or blogs. Over the last ten years an upsurge in Internet Based Research (IBR) has led to increased interest in IBR and research ethics. Here we present some ethical guidelines for IBR whilst at the same time accepting that it would be unrealistic to expect that any single set of guidelines can cover all ethical situations concerning IBR). There is simply too much diversity across internet cultures, values and modes of operation for that to be the case. Perhaps the most useful solution to the complex challenges of IRB lies with a form of ânegotiated ethicsâ, a situated approach grounded in the specifics of the online community, the methodology and the research question(s). This does not mean an âanything goesâ relativist approach, rather an open, pluralistic policy in relation to IBR ethical issues (Ess, 2009; AoIR, 2002)
Trolling in asynchronous computer-mediated communication: From user discussions to academic definitions
Whilst computer-mediated communication (CMC) can benefit users by providing quick and easy communication between those separated by time and space, it can also provide varying degrees of anonymity that may encourage a sense of impunity and freedom from being held accountable for
inappropriate online behaviour. As such, CMC is a fertile ground for studying impoliteness, whether it occurs in response to perceived threat (flaming), or as an end in its own right (trolling). Currently, first and secondorder
definitions of terms such as im/politeness (Brown and Levinson 1987; Bousfield 2008; Culpeper 2008; Terkourafi 2008), in-civility (Lakoff 2005), rudeness (Beebe 1995, Kienpointner 1997, 2008), and etiquette (Coulmas 1992), are subject to much discussion and debate, yet the CMC
phenomenon of trolling is not adequately captured by any of these terms. Following Bousfield (in press), Culpeper (2010) and others, this paper suggests that a definition of trolling should be informed first and foremost
by user discussions. Taking examples from a 172-million-word, asynchronous CMC corpus, four interrelated conditions of aggression, deception, disruption, and success are discussed. Finally, a working definition of trolling
is presented
Recommended from our members
Ethical issues surrounding e-gambling data collection
Online gambling data collection is becoming a focus of interest for various stakeholders in the online gaming industry, since it is relevant for advertising, attracting new players, exploring new markets and trying out new products. Mark Griffiths, of Nottingham Trent University, and Monica Whitty, of the University of Leicester, give an overview of some of the ethical issues raised by data collection in the gaming industry and research undertaken in the gambling studies field
An In-Depth Look into Cybercrime
Cybercrime is an increasing area of study in the field of criminology. With the advancement of technology and the growing use of social media, people are connected all over the world more than they have ever been before. It is not the invention of new crimes but technology has allowed old crimes to be committed through a new medium. This paper explores the realm of cyberspace and how old crimes are being committed in new ways by different countries and people
Optimal Timing in Dynamic and Robust Attacker Engagement During Advanced Persistent Threats
Advanced persistent threats (APTs) are stealthy attacks which make use of
social engineering and deception to give adversaries insider access to
networked systems. Against APTs, active defense technologies aim to create and
exploit information asymmetry for defenders. In this paper, we study a scenario
in which a powerful defender uses honeynets for active defense in order to
observe an attacker who has penetrated the network. Rather than immediately
eject the attacker, the defender may elect to gather information. We introduce
an undiscounted, infinite-horizon Markov decision process on a continuous state
space in order to model the defender's problem. We find a threshold of
information that the defender should gather about the attacker before ejecting
him. Then we study the robustness of this policy using a Stackelberg game.
Finally, we simulate the policy for a conceptual network. Our results provide a
quantitative foundation for studying optimal timing for attacker engagement in
network defense.Comment: Submitted to the 2019 Intl. Symp. Modeling and Optimization in
Mobile, Ad Hoc, and Wireless Nets. (WiOpt
CORRUPTION, FRAUD AND INTERNAL CONTROL
The economic crunch created a specific context for activity and profitability failing. The corruption is more and more common in our days. In the same time, the amount of money lost by businesses and the public sector to larger frauds increased last year to unthinkable limits. The shareholders expect the directors to take care to protect their companyâs assets. This is why the financial controller has a very important role in each organization. The techniques to detect corruption or a fraud are developing every year. Thus, the introduction of computerized accounting has created the opportunities to conduct very comprehensive tests at relatively little cost. However, the fraudsters became more and more clever, and the controllers are responsible for the prevention and detection of fraud. The procedures that controllers should adopt with regard to fraud depend on the risk that fraud could occur and remain undetected and also the risk of that fraud impairing the truth and fairness of the statement.corruption; fraud; internal control; internal audit; business fraud
- âŠ