Lecture 2 - Ethics and Legal Issues
Lecture 2 - Ethics and Legal Issues
Lecture 2
Getting started, resources, ethics and
legal issues
Topics
Selecting a problem
Reviewing the literature
Reading a journal article
Ethics working with adults
Ethics working with children
Legal issues of IT
Selecting a problem
Look at published research:
Gives you a good background
May suggest a hypothesis
Selecting a problem
Observe
You may hear of disagreements
You may notice gaps in knowledge
You may have an idea of a solution
Plagiarism
You will carry out a literature review
and as part of this give credit to
other people whose work you are
mentioning
To quote other peoples work without
referencing is regarded as cheating
or plagiarism this is a serious
offence and can lead to disciplinary
proceedings
Abstract
Brief description of the entire paper
a kind of executive summary
Between 150 and 250 words
Describes the problem under
investigation and the purpose of the
study and mentions the key findings
Introduction
Introduction to the problem
Sets the current work into the wider
context
Tries to get the readers interest to
continue reading
Tries to justify the importance of the
current work
Background/Literature Review
A review of the current state of the
art in the subject
A review of the key results that set
the context of the current work
Highlighting areas of disagreement
or gaps in knowledge which justify
the current work
The purpose and rationale for the
study
Method
Describes how the study was
conducted
Procedures implemented
Selection of participants
Choice of materials/software etc
Known limitations
Controls and/or precautions
Format of data to collect
Results
Summarise data and analysis used
Clear statement of variables
measured, controlled or eliminated
Presentation of results in a clear
style using graphs or charts if
appropriate
No explanation of the results at this
time
Discussion
Restatement of the intentions of the
study and the actual outcomes
Discussion of the findings from the
results with clarification of any
outstanding issues
Relationship with previous work
Criticism of the present study
Implications for future work
Ethics
All research carried out as part of
your MSc must get ethical approval
This is usually very straightforward
even in the case where you are
asking people to take part in your
research as participants
The only real problem occurs if you
want children as your participants
Ethical approval
You will submit a form asking for
ethical approval to the Ethics
Committee at the university
You submit the form at the same
time as your proposal document
You cannot proceed with your
project until you have received
approval
Ethical approval
We are mainly concerned that the
work that you carry out is safe and
that in the case of human
participants you are complying with
certain key requirements:
Informed consent
Voluntary and can withdraw
Confidentiality & anonymity
Minimise risk
Legal Issues
Data Protection
Privacy
Freedom of Information
Internet issues
Computer misuse
Warning
The material covered here will only
be at a very superficial level
Please note that there are also
differences between English and
Scots law
Data Protection
The Data Protection Act 1984 and
1998 is concerned with the
information held about a person:
Its accuracy or completeness
Its unauthorised use
Its use by a person for an
unintended purpose
Data Protection
The act introduced 8 data protection
principles:
1.Personal data shall be processed
fairly and lawfully (usually requiring
consent)
2.Personal data shall be obtained
only for specific and lawful
purposes
Data Protection
3. Personal data shall be adequate,
relevant and not excessive in
relation to its purpose
4. Personal data shall be accurate
and kept up to date
5. Personal data shall not be kept for
longer than is necessary
Data Protection
6. Personal data shall be processed
in accordance with the rights of the
data subjects
7. The data controller must take
precautions against unauthorised
processing and data loss
8. Personal data must not be
transferred outside the EU without
an adequate level of protection
Privacy
This concerns access to personal
communications by interception,
caching etc.
Recent concerns over the use of
modern means of communication
(blogs, texting, email etc.) led to a
new act in 2000
Regulation of Investigating
Powers Act 2000 (RIPA)
Grants certain agencies the power
to demand data and encryption
keys from employers, ISP etc.
Data can be obtained without
consent or knowledge
Agencies with these powers now
quite extensive (Local Authorities)
Internet issues
With the use of the internet for
commerce and communication so
much of what we do now crosses
national boundaries
The ISP is often seen as the
mechanism for this communication
and is held responsible to a greater
or lesser extent
ISP EU position
In the EU the ISP can be seen to fit
into 1 of 3 roles which carry
different levels of responsibility:
Conduit merely a pipeline
Caching acts as a store
Hosting store and access
ISP in the US have better protection
Criminal Law
With the use of the internet it is
possible to obey the law in one
country while breaking it in another
Country B
web site
contents
illegal
Criminal Law
Country A (where no law has been
broken) is unlikely to extradite a
person to Country B
The person concerned may be
advised never to visit Country B!
It is probably pointless trying to raise
an action in Country B unless the
perpetrator has a legal presence
there
Spam
These issues are highlighted particularly
in the case of spam
In Europe a spammer has to get your
permission to send you unsolicited
advertising
In the US you have to instruct the
spammer not to send it
Most spam therefore comes from the US