1,240 research outputs found
Social injustice in surveillance capitalism
This is the final version of the article. Available from the publisher via the link in this record.A rapidly accelerating phase of capitalism based on asymmetrical personal data accumulation poses significant concerns for democratic societies, yet the concepts used to understand and challenge practices of dataveillance are insufficient or poorly elaborated. Against a backdrop of growing corporate power enabled by legal lethargy and the secrecy of the personal data industry, this paper makes explicit how the practices inherent to what Shoshana Zuboff calls ‘surveillance capitalism’ are threats to social justice, based on the normative principle that they prevent parity of participation in social life. This paper draws on Nancy Fraser’s theory of ‘abnormal justice’ to characterize the separation of people from their personal data and its accumulation by corporations as an economic injustice of maldistribution. This initial injustice is also the key mechanism by which further opaque but significant forms of injustice are enabled in surveillance capitalism—sociocultural misrecognition which occurs when personal data are algorithmically processed and subject to categorization, and political misrepresentation which renders people democratically voiceless, unable to challenge misuses of their data. In situating corporate dataveillance practices as a threat to social justice, this paper calls for more explicit conceptual development of the social harms of asymmetrical personal data accumulation and analytics, and more hopefully, attention to the requirements needed to recast personal data as an agent of equality rather than oppression
Injury surveillance in low-resource settings using Geospatial and Social Web technologies
This is the final version of the article. Available from BioMed Central via the DOI in this record.BACKGROUND: Extensive public health gains have benefited high-income countries in recent decades, however, citizens of low and middle-income countries (LMIC) have largely not enjoyed the same advancements. This is in part due to the fact that public health data - the foundation for public health advances - are rarely collected in many LMIC. Injury data are particularly scarce in many low-resource settings, despite the huge associated burden of morbidity and mortality. Advances in freely-accessible and easy-to-use information and communication (ICT) technology may provide the impetus for increased public health data collection in settings with limited financial and personnel resources. METHODS AND RESULTS: A pilot study was conducted at a hospital in Cape Town, South Africa to assess the utility and feasibility of using free (non-licensed), and easy-to-use Social Web and GeoWeb tools for injury surveillance in low-resource settings. Data entry, geocoding, data exploration, and data visualization were successfully conducted using these technologies, including Google Spreadsheet, Mapalist, BatchGeocode, and Google Earth. CONCLUSION: This study examined the potential for Social Web and GeoWeb technologies to contribute to public health data collection and analysis in low-resource settings through an injury surveillance pilot study conducted in Cape Town, South Africa. The success of this study illustrates the great potential for these technologies to be leveraged for public health surveillance in resource-constrained environments, given their ease-of-use and low-cost, and the sharing and collaboration capabilities they afford. The possibilities and potential limitations of these technologies are discussed in relation to the study, and to the field of public health in general.This research was funded by a Social Sciences and Humanities Research Council (SSHRC) Standard Research Grant. Additional research support for Cinnamon was provided by a SSHRC doctoral scholarship. Schuurman is also supported by career awards from the Canadian Institutes of Health Research (CIHR) and Michael Smith Foundation for Health Research (MSFHR). We are grateful to Groote Schuur Hospital in Cape Town
Deconstructing the binaries of spatial data production: Towards hybridity
types: ArticleCopyright © 2014 Canadian Association of Geographers / L' Association canadienne des géographesBinaries, the most reductive form of categorization, can be usefully invoked to characterize emerging phenomena; yet, they are widely critiqued for oversimplifying a complex world and for their use as tools of social and political influence. Through a literature review and content analysis this article traces the emergence of volunteered geographic information (VGI), and identifies the recurrent use of several related binaries to contrast this phenomenon with the conventional spatial data production activities of states and corporations. Using several key examples, these binaries are deconstructed by identifying a mismatch in how VGI is conceptualized (bottom-up, amateur, asserted) in the literature and the reality of existing VGI projects. As an alternative to a binary conceptualization of spatial data production, a different representation is put forward that more accurately depicts what is in actuality a vast, shifting, and heterogeneous landscape of spatial data production approaches. Thinking about contemporary spatial data production not as a binary but as a continuum could encourage the development of hybridities that harness the benefits of different approaches—including the oversight and quality control of conventional methods, with the speed, low cost, and distributed nature of citizen-based spatial data production.SSHR
Power of Criminal Attractors: Modeling the Pull of Activity Nodes
The spatial distribution of crime has been a long-standing interest in the field of criminology. Research in this area has shown that activity nodes and travel paths are key components that help to define patterns of offending. Little research, however, has considered the influence of activity nodes on the spatial distribution of crimes in crime neutral areas - those where crimes are more haphazardly dispersed. Further, a review of the literature has revealed a lack of research in determining the relative strength of attraction that different types of activity nodes possess based on characteristics of criminal events in their immediate surrounds. In this paper we use offenders' home locations and the locations of their crimes to define directional and distance parameters. Using these parameters we apply mathematical structures to define rules by which different models may behave to investigate the influence of activity nodes on the spatial distribution of crimes in crime neutral areas. The findings suggest an increasing likelihood of crime as a function of geometric angle and distance from an offender's home location to the site of the criminal event. Implications of the results are discussed.Crime Attractor, Directionality of Crime, Mathematical Modeling, Computational Criminology
Privacy Attitudes among Early Adopters of Emerging Health Technologies.
IntroductionAdvances in health technology such as genome sequencing and wearable sensors now allow for the collection of highly granular personal health data from individuals. It is unclear how people think about privacy in the context of these emerging health technologies. An open question is whether early adopters of these advances conceptualize privacy in different ways than non-early adopters.PurposeThis study sought to understand privacy attitudes of early adopters of emerging health technologies.MethodsTranscripts from in-depth, semi-structured interviews with early adopters of genome sequencing and health devices and apps were analyzed with a focus on participant attitudes and perceptions of privacy. Themes were extracted using inductive content analysis.ResultsAlthough interviewees were willing to share personal data to support scientific advancements, they still expressed concerns, as well as uncertainty about who has access to their data, and for what purpose. In short, they were not dismissive of privacy risks. Key privacy-related findings are organized into four themes as follows: first, personal data privacy; second, control over personal information; third, concerns about discrimination; and fourth, contributing personal data to science.ConclusionEarly adopters of emerging health technologies appear to have more complex and nuanced conceptions of privacy than might be expected based on their adoption of personal health technologies and participation in open science. Early adopters also voiced uncertainty about the privacy implications of their decisions to use new technologies and share their data for research. Though not representative of the general public, studies of early adopters can provide important insights into evolving attitudes toward privacy in the context of emerging health technologies and personal health data research
Recommended from our members
A typology of community and stakeholder engagement based on documented examples in the field of novel vector control.
BackgroundDespite broad consensus on the importance of community and stakeholder engagement (CSE) for guiding the development, regulation, field testing, and deployment of emerging vector control technologies (such as genetically engineered insects), the types of activities pursued have varied widely, as have the outcomes. We looked to previous CSE efforts for clarity about appropriate methods and goals. Our analysis yielded a typology of CSE, and related vocabulary, that describes distinctions that funders, organizers, and scholars should make when proposing or evaluating CSE.MethodsWe compiled available formal documentation of CSE projects, starting with projects mentioned in interviews with 17 key informants. Major features of these examples, including the initiators, target groups, timing, goals, and methods were identified using qualitative coding. Based on these examples, subcategories were developed for a subset of features and applied to the identified cases of CSE in the documents. Co-occurrence of subcategorized features was examined for patterns.ResultsWe identified 14 documented examples CSE projects, which were comprised of 28 distinct CSE activities. We found no clear patterns with respect to timing. However, we found that grouping examples according to whether initiators or targets could enact the immediate desired outcome could help to clarify relationships between goals, methods, and targets.ConclusionBased on this analysis, we propose a typology that distinguishes three categories of CSE: engagement to inquire -where initiators are empowered to act on information collected through engagement with target groups; engagement to influence -where initiators engage to affect the actions of already-empowered target groups; and engagement to involve -where initiators engage to delegate authority to target groups. The proposed typology can serve as a guide for establishing the goals, identifying appropriate methods, and evaluating and reporting CSE projects by directing attention to important questions to be asked well before determining who to engage and how
Pedestrian injury and human behaviour: observing road-rule violations at high-incident intersections
This is the final version of the article. Available from Public Library of Science via the DOI in this record.BACKGROUND: Human behaviour is an obvious, yet under-studied factor in pedestrian injury. Behavioural interventions that address rule violations by pedestrians and motorists could potentially reduce the frequency of pedestrian injury. In this study, a method was developed to examine road-rule non-compliance by pedestrians and motorists. The purpose of the study was to examine the potential association between violations made by pedestrians and motorists at signalized intersections, and collisions between pedestrians and motor-vehicles. The underlying hypothesis is that high-incident pedestrian intersections are likely to vary with respect to their aetiology, and thus are likely to require individualized interventions--based on the type and rate of pedestrian and motorist violation. METHODS: High-incident pedestrian injury intersections in Vancouver, Canada were identified using geographic information systems. Road-rule violations by pedestrians and motorists were documented at each incident hotspot by a team of observers at several different time periods during the day. RESULTS: Approximately 9,000 pedestrians and 18,000 vehicles were observed in total. In total for all observed intersections, over 2000 (21%) pedestrians committed one of the observed pedestrian road-crossing violations, while approximately 1000 (5.9%) drivers committed one of the observed motorist violations. Great variability in road-rule violations was observed between intersections, and also within intersections at different observation periods. CONCLUSIONS: Both motorists and pedestrians were frequently observed committing road-rule violations at signalized intersections, suggesting a potential human behavioural contribution to pedestrian injury at the study sites. These results suggest that each intersection may have unique mechanisms that contribute to pedestrian injury, and may require targeted behavioural interventions. The method described in this study provides the basis for understanding the relationship between violations and pedestrian injury risk at urban intersections. Findings could be applied to targeted prevention campaigns designed to reduce the number of pedestrian injuries at signalized intersections.A Mathematics of Information Technology and Computing Science (MITACS) Accelerate internship held by JC provided funding for this project, which was carried out in conjunction with Trauma Services at Vancouver General Hospital (VGH). Additional research support for JC was provided by a SSHRC doctoral scholarship. NS is supported by career awards from the Canadian Institutes of Health Research (CIHR) and Michael Smith Foundation for Health Research (MSFHR). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript
Recommended from our members
Disposition toward privacy and information disclosure in the context of emerging health technologies.
ObjectiveWe sought to present a model of privacy disposition and its development based on qualitative research on privacy considerations in the context of emerging health technologies.Materials and methodsWe spoke to 108 participants across 44 interviews and 9 focus groups to understand the range of ways in which individuals value (or do not value) control over their health information. Transcripts of interviews and focus groups were systematically coded and analyzed in ATLAS.ti for privacy considerations expressed by respondents.ResultsThree key findings from the qualitative data suggest a model of privacy disposition. First, participants described privacy related behavior as both contextual and habitual. Second, there are motivations for and deterrents to sharing personal information that do not fit into the analytical categories of risks and benefits. Third, philosophies of privacy, often described as attitudes toward privacy, should be classified as a subtype of motivation or deterrent.DiscussionThis qualitative analysis suggests a simple but potentially powerful conceptual model of privacy disposition, or what makes a person more or less private. Components of privacy disposition are identifiable and measurable through self-report and therefore amenable to operationalization and further quantitative inquiry.ConclusionsWe propose this model as the basis for a psychometric instrument that can be used to identify types of privacy dispositions, with potential applications in research, clinical practice, system design, and policy
Building Digital Identities: The Challenges, Risks and Opportunities of Collecting Behavioural Attributes for new Digital Identity Systems.
The provision of legal identity for all is increasingly viewed as a key mechanism for driving development goals. Behavioural attributes produced through digital interactions may have significant potential for enabling access to a legal identity for all, however the social, legal, and technical affordances and implications remain under-explored.University of Exeter and CoelitionEconomic and Social Research Council (ESRC
Evidence and future potential of mobile phone data for disease disaster management
This is the author accepted manuscript. The final version is available from Elsevier via the DOI in this record.Global health threats such as the recent Ebola and Zika virus outbreaks require rapid and robust responses to prevent, reduce and recover from disease dispersion. As part of broader big data and digital humanitarianism discourses, there is an emerging interest in data produced through mobile phone communications for enhancing the data environment in such circumstances. This paper assembles user perspectives and critically examines existing evidence and future potential of mobile phone data derived from call detail records (CDRs) and two-way short message service (SMS) platforms, for managing and responding to humanitarian disasters caused by communicable disease outbreaks. We undertake a scoping review of relevant literature and in-depth interviews with key informants to ascertain the: (i) information that can be gathered from CDRs or SMS data; (ii) phase(s) in the disease disaster management cycle when mobile data may be useful; (iii) value added over conventional approaches to data collection and transfer; (iv) barriers and enablers to use of mobile data in disaster contexts; and (v) the social and ethical challenges. Based on this evidence we develop a typology of mobile phone data sources, types, and end-uses, and a decision-tree for mobile data use, designed to enable effective use of mobile data for disease disaster management. We show that mobile data holds great potential for improving the quality, quantity and timing of selected information required for disaster management, but that testing and evaluation of the benefits, constraints and limitations of mobile data use in a wider range of mobile-user and disaster contexts is needed to fully understand its utility, validity, and limitations.A portion of this research was funded as part of the Science for Humanitarian Emergencies and Resilience (SHEAR) programme, by the UK Department for International Development (DFID), the Natural Environment Research Council (NERC) and the Economic and Social Research Council (ESRC)
- …
