73 research outputs found

    A Model For Improving Ethics In Construction Materials And Products Supply Chain Using Blockchain

    Get PDF
    There are countless materials and products that make up a building, including cladding, glazing, roofing, floors, ceilings, systems, etc., and the hidden and fragmented structure of the supply chain makes it highly vulnerable to several forms of ethical breaches at different tiers. Consumers also are increasingly concerned about where the products they are buying come from, highlighting important areas of concern that include the ethical, environmental, and social issues. Whereas current research identifies digitalization as a key part of providing transparency and increasing fairness in supply chains, and blockchain technology is lauded as having the potential to deliver this. However, while there has been a growing emphasis on ethics in construction in recent years, and an increase in studies around blockchain, there remains a paucity of studies related to how blockchain may help to improve the environmental and social dimensions of ethics in construction supply chains. A gap that this study fills through a holistic triple bottom line (TBL) approach. To achieve this, the study aims to develop and validate a model for improving ethics in construction materials and products supply chains (CMPSC) following the TBL construct using blockchain technology. The study also explores the current state of ethics in the CMPSC and the implementations of blockchain for ethics and applies the learnings to develop a conceptual model to improve environmental, social and business ethics in the CMPSC using blockchain. The model was then refined and validated via a dual-phase validation protocol consisting of expert interviews and focus group discussions. A total of 30 participants participated in this study, this comprised of 16 construction industry supply chain professionals, 10 professionals in the ethics/ sustainability in construction and 4 blockchain technology experts. NVivo 12 was utilised to thematically analyse both the interviews and the focus group data. This approach was utilised to investigate the data from both a data-driven perspective (a perspective based on coding in an inductive way); and from the research question perspective (to check if the data is consistent with the research questions and if it provides sufficient information). The 30 interviews resulted in 4 high-level themes, 15 mid-level themes and 28 low-level themes, with the total number of codes within the themes being 721. The analysis of the focus group data resulted in 3 high-level themes and 10 mid-level themes, bringing the total number of codes within all themes to 74. Results from this study revealed that the effectiveness of current ethical measures in the CMPSC has been limited due to weak implementation and compliance, the inability of the government to play its role, and the outright denial of unethical practises within supply chains. Results also show that even though greater emphasis is placed on the business component of ethics while the environmental or social component may only receive as much attention if it can be monetised or if it is demanded; nonetheless, the current state of ethics in the CMPSC remains weak across the three dimensions examined. Further results show that while blockchain may help improve ethics in the CMPSC, in addition to the transparency and digitization that technology provides, the need for education and the upholding of personal ethical values by supply chain players are key to the success of both current and new ethical supply chain initiatives. Individuals must first be made ethically aware in order to act ethically; only then may the implementation of a technological tool prosper. The main contribution of this study to knowledge is the development of a model for improving ethics in the CMPSC within the TBL construct through blockchain technology. The model developed in this study provides practical clarity on how blockchain may be implemented within fragmented supply chains and a significant understanding of a socio-technical approach to addressing the issue of ethics within construction supply chains. It also has a vital role in helping the intended users and actors improve their knowledge of the technology and how blockchain can help to improve ethics in the CMPSC and also understand their roles and responsibilities on the network, thereby providing a framework and prerequisite guidance for the Blockchain-as-a-Service (BaaS) providers in the development of the computer model (blockchain network). The findings of this thesis demonstrate new insights and contribute to the existing body of knowledge by further advancing the discussion on the role of the blockchain in the construction industry

    Electronic Evidence and Electronic Signatures

    Get PDF
    In this updated edition of the well-established practitioner text, Stephen Mason and Daniel Seng have brought together a team of experts in the field to provide an exhaustive treatment of electronic evidence and electronic signatures. This fifth edition continues to follow the tradition in English evidence text books by basing the text on the law of England and Wales, with appropriate citations of relevant case law and legislation from other jurisdictions. Stephen Mason (of the Middle Temple, Barrister) is a leading authority on electronic evidence and electronic signatures, having advised global corporations and governments on these topics. He is also the editor of International Electronic Evidence (British Institute of International and Comparative Law 2008), and he founded the innovative international open access journal Digital Evidence and Electronic Signatures Law Review in 2004. Daniel Seng (Associate Professor, National University of Singapore) is the Director of the Centre for Technology, Robotics, AI and the Law (TRAIL). He teaches and researches information technology law and evidence law. Daniel was previously a partner and head of the technology practice at Messrs Rajah & Tann. He is also an active consultant to the World Intellectual Property Organization, where he has researched, delivered papers and published monographs on copyright exceptions for academic institutions, music copyright in the Asia Pacific and the liability of Internet intermediaries

    Becoming a Platform in Europe

    Get PDF
    Emerging out of the collaborative work conducted within the Working Group “Mechanisms to activate and support the collaborative economy” of the COST Action “From Sharing to Caring: Examining Socio-Technical Aspects of the Collaborative Economy”, the book questions the varied set of organizational forms collected under the label of “collaborative” or “sharing” economy —ranging from grassroots peer-to-peer solidarity initiatives to corporate owned platforms— from the perspective of what is known as the European social values: respect for human dignity and human rights (including those of minorities), freedom, democracy, equality, and the rule of law. Therefore, the edited collection focuses on the governance of such economic activities, and how they organize labour, cooperation and social life. From individual motivations to participating, to platform use by local groups, until platform design in its political as well as technological dimensions, the book provides a comparative overview and critical discussion on the processes, narratives and organizational models at play in the collaborative economy. On such a basis, the volume offers tools, suggestions and visions for the future that may inform the designing of policies, technologies, and business models in Europe

    Cyber-Physical Threat Intelligence for Critical Infrastructures Security

    Get PDF
    Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI). This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors. Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well

    Data justice and the right to the city

    Get PDF

    Digital behaviours and cognitions of individuals convicted of online child pornography offences

    Get PDF
    BACKGROUND: Modern Child Sexual Exploitation Material (CSEM) offences predominantly occur within a technological ecosystem. The behaviours and cognitions of CSEM offenders influence, and are influenced by, their choice of facilitative technologies that form that ecosystem. OBJECTIVES: This thesis will review the prior research on cognitive distortions present in and technology usage by CSEM offenders, and present a new theory, Lawless Space Theory (LST), to explain those interactions. The cognitions and technical behaviours of previously convicted CSEM offenders will be examined in a psychosocial context and recommendations for deterrence, investigative, and treatment efforts made. PARTICIPANTS AND SETTING: Data was collected using an online survey collected from two samples, one from a reference population of the general public (n=524) and one from a population of previously convicted CSEM offenders (n=78), both of which were composed of adults living in the United States. METHODS: Two reviews were conducted using a PRISMA methodology - a systematic review of the cognitive distortions of CSEM offenders and an integrative review of their technology usage. A theoretical basis for LST was developed, and then seven investigations of the survey data were conducted evaluating the public’s endorsement of lawless spaces; the public’s perceptions of CSEM offenders; the self-perceptions of CSEM offenders; the suicidality of the offender sample; the use of technology and countermeasures by the offender sample; the collecting and viewing behaviours of the offender sample; and the idiographic profiles of the offender sample. RESULTS: The reviews found that the endorsement of traditional child contact offender cognitive distortions by CSEM offenders was low, and that they continued to use technology beyond its normative lifecycle. LST was developed to explain these behaviours, and the view of the Internet as generally lawless was endorsed by the reference and offender samples. The public sample showed biased beliefs that generally overestimated the prevalence of, and risk associated with, CSEM offending when compared to the offender sample. Offenders were found to have viewed investigators as having a lack of understanding and compassion, and they exhibited very high suicidal ideation following their interaction with law enforcement. Offenders exhibited similar technical abilities and lower technophilia than the reference sample, chose technologies to both reduce psychological strain and for utility purposes, and many exhibited cyclic deletions of their collections as part of a guilt/shame cycle. CONCLUSIONS AND IMPLICATIONS: Understanding CSEM offenders’ technological behaviours and cognitions can inform more effective investigative, deterrence, and treatment efforts. Law enforcement showing compassion during investigations may generate more full disclosures while facilitating offender engagement with resources to reduce suicidality. Deterrence efforts focused on establishing capable guardianship and reducing perceived lawlessness provide the potential to reduce offending. Treatment of criminogenic needs for the majority of CSEM offenders is not supported by evidence, but non-criminogenic treatment warrants broader consideration

    Electronic Evidence and Electronic Signatures

    Get PDF
    In this updated edition of the well-established practitioner text, Stephen Mason and Daniel Seng have brought together a team of experts in the field to provide an exhaustive treatment of electronic evidence and electronic signatures. This fifth edition continues to follow the tradition in English evidence text books by basing the text on the law of England and Wales, with appropriate citations of relevant case law and legislation from other jurisdictions. Stephen Mason (of the Middle Temple, Barrister) is a leading authority on electronic evidence and electronic signatures, having advised global corporations and governments on these topics. He is also the editor of International Electronic Evidence, and he founded the innovative international open access journal Digital Evidence and Electronic Signatures Law Review in 2004. Daniel Seng (Associate Professor, National University of Singapore) is the Director of the Centre for Technology, Robotics, AI and the Law (TRAIL). He teaches and researches information technology law and evidence law. Daniel was previously a partner and head of the technology practice at Messrs Rajah & Tann. He is also an active consultant to the World Intellectual Property Organization, where he has researched, delivered papers and published monographs on copyright exceptions for academic institutions, music copyright in the Asia Pacific and the liability of Internet intermediaries

    Handbook on Social Protection Systems

    Get PDF
    This exciting and innovative Handbook provides readers with a comprehensive and globally relevant overview of the instruments, actors and design features of social protection systems, as well as their application and impacts in practice. It is the first book that centres around system building globally, a theme that has gained political importance yet has received relatively little attention in academia.illustrato
    • 

    corecore