203 research outputs found

    Cultivating reflexive research practice when using participants’ photographs as research data

    Get PDF
    This chapter reflects on a study exploring the development of a feminist consciousness. During the interviews participants were invited to share photographs that were significant to their feminist becoming. Various ethical and methodological challenges arose through the use of visual data, in particular the ethics of the interpretation and dissemination of participants’ personal photographs. Both issues were highlighted and addressed through reflexive research practice, which exposed how the researcher’s reaction to and feelings about the photographs impacted upon how they were interpreted and shared. Reflexivity demands that researchers interrogate their research choices and is essential for ethical and rigorous research. This chapter argues that visual methods, whilst posing new ethical challenges, can enhance the reflexive research practice necessary for responding to and navigating its challenges

    Ethical dilemmas in researching sensitive issues online: lessons from the study of British disability dissent networks

    Get PDF
    This paper presents an unconventional approach to the resolution of the key ethical dilemmas raised by the study of politically charged personal content posted on social media. In particular, this study suggests that Internet research ethics should remain informed by the disciplinary perspectives of those who study online communities. Hence, Internet scholars must build on established ethical practices from their respective disciplines in such a way as to address these ‘human-centred’ ethical issues. A ‘medium-cloaked’ strategy towards data anonymization was adopted for this study of the comments posted on the Facebook pages of UK disability rights groups. Key themes were typically conveyed without the disclosure of personally identifiable information and direct quotes were only used if they could not be located using a search engine. The rationale for such an approach is elucidated in order to identify the limitations in the ways in which such ethical issues are dealt with in existing guidelines in this area. The paper suggests that the automatic categorization of disabled people and others experiencing disadvantage as ‘vulnerable groups’ in many of these protocols might further disempower these stakeholders through the omission of their personal stories from relevant scholarship. A more nuanced approach towards the protection of user privacy is advocated; one that allows for the use of direct quotes when it is unlikely to prove harmful to the user but also sets out to provide the maximum level of anonymity possible for those who divulge sensitive information in these semi-public spaces

    Perspectives on privacy in the use of online systems

    Get PDF
    Human-Computer Interaction looks to better understand the relationship between people and computers. Our work considers this relationship in the context of privacy and the privacy expectations users have when using online systems. While many surveys suggest the public care about this subject, users often act in a manner perceived contrary to their claims; a notion termed the ‘Privacy Paradox’. However, research suggests privacy is inherently subjective and contextual, leading us to question: do users actually define ‘private online behaviour’ in the same manner as those who study the topic? Although our exploratory survey found a general intersection between participants’ perceptions and those in existing literature, opinions differed in several key areas. For example, we found users often conceptualise protection in less-technical terms and are prone to conflating privacy and security. We believe that when we expand our analyses to the general public, we will see an even greater disparity between privacy perceptions. Through this research we look to inform the development of systems and privacy-protective tools that users can actually appreciate

    Co-designing Cards on Social Issues for Creating Educational Games

    Get PDF
    This paper presents a participatory methodology to design cards on social issues with the purpose to democratise knowledge among co-designers on the learning content of educational games. Situated on the topic of everyday sexism, the methodology has been developed through an iterative process involving two collaborative workshops, two iterations of card design and a feedback survey. Extracting findings from the workshops and the feedback gathered on the co- designed cards, this paper presents insights that could be used to inform similar studies using cards to inspire and foster reflection on social issues

    Microbial and Chemical Characterization of Underwater Fresh Water Springs in the Dead Sea

    Get PDF
    Due to its extreme salinity and high Mg concentration the Dead Sea is characterized by a very low density of cells most of which are Archaea. We discovered several underwater fresh to brackish water springs in the Dead Sea harboring dense microbial communities. We provide the first characterization of these communities, discuss their possible origin, hydrochemical environment, energetic resources and the putative biogeochemical pathways they are mediating. Pyrosequencing of the 16S rRNA gene and community fingerprinting methods showed that the spring community originates from the Dead Sea sediments and not from the aquifer. Furthermore, it suggested that there is a dense Archaeal community in the shoreline pore water of the lake. Sequences of bacterial sulfate reducers, nitrifiers iron oxidizers and iron reducers were identified as well. Analysis of white and green biofilms suggested that sulfide oxidation through chemolitotrophy and phototrophy is highly significant. Hyperspectral analysis showed a tight association between abundant green sulfur bacteria and cyanobacteria in the green biofilms. Together, our findings show that the Dead Sea floor harbors diverse microbial communities, part of which is not known from other hypersaline environments. Analysis of the water’s chemistry shows evidence of microbial activity along the path and suggests that the springs supply nitrogen, phosphorus and organic matter to the microbial communities in the Dead Sea. The underwater springs are a newly recognized water source for the Dead Sea. Their input of microorganisms and nutrients needs to be considered in the assessment of possible impact of dilution events of the lake surface waters, such as those that will occur in the future due to the intended establishment of the Red Sea−Dead Sea water conduit

    Nothing Lasts Forever: Environmental Discourses on the Collapse of Past Societies

    Get PDF
    The study of the collapse of past societies raises many questions for the theory and practice of archaeology. Interest in collapse extends as well into the natural sciences and environmental and sustainability policy. Despite a range of approaches to collapse, the predominant paradigm is environmental collapse, which I argue obscures recognition of the dynamic role of social processes that lie at the heart of human communities. These environmental discourses, together with confusion over terminology and the concepts of collapse, have created widespread aporia about collapse and resulted in the creation of mixed messages about complex historical and social processes

    Privacy enhancing technologies (PETs) for connected vehicles in smart cities

    Get PDF
    This is an accepted manuscript of an article published by Wiley in Transactions on Emerging Telecommunications Technologies, available online: https://doi.org/10.1002/ett.4173 The accepted version of the publication may differ from the final published version.Many Experts believe that the Internet of Things (IoT) is a new revolution in technology that has brought many benefits for our organizations, businesses, and industries. However, information security and privacy protection are important challenges particularly for smart vehicles in smart cities that have attracted the attention of experts in this domain. Privacy Enhancing Technologies (PETs) endeavor to mitigate the risk of privacy invasions, but the literature lacks a thorough review of the approaches and techniques that support individuals' privacy in the connection between smart vehicles and smart cities. This gap has stimulated us to conduct this research with the main goal of reviewing recent privacy-enhancing technologies, approaches, taxonomy, challenges, and solutions on the application of PETs for smart vehicles in smart cities. The significant aspect of this study originates from the inclusion of data-oriented and process-oriented privacy protection. This research also identifies limitations of existing PETs, complementary technologies, and potential research directions.Published onlin
    corecore