Browsing by Author "Wilford, S."
Now showing 1 - 20 of 21
Results Per Page
Sort Options
Item Embargo Analysis of the relationship between Saudi Arabia parents' education and economic level parental control of internet usage(Macrotheme Capital Management, 2015) Almogbel, A.; Begg, M.; Wilford, S.Abstract This paper examined the relationship between parents’ educational level in Saudi families and the level of their control of their children’s internet usage. It also broadly Identified the impact of Saudi families’ economic level on their control of internet use by their children. . This study also tried to describe and explain the problem and its impact on the family. By analysing these two social variables, the paper clarified the conflict between conservative Islamic way of bringing children up against their exposure to the wild posibilities of internet surfing. The technological revolution continues to be a bone of contention in an Arabic speaking country where social norms are governed by tight religious teachings. The paper used the descriptive method to interpret phenomena. Several methods were used to collect data; questionnaires for younger and older participants and interviews for parents only. The study sample consisted of parents from different social backgrounds and primary school children from different parts of Riyadh. The results of this study will help policy makers to understand parental education and economic levels and how these influence children’s surfing habits. This is a preliminary scientific study for children and the Internet in Saudi Arabia to discuss these variables in detail.Item Metadata only A Dependencies Mapping Method for Personal Health Monitoring(IOS Press Ebooks, 2013) Rogerson, Simon; Wilford, S.; Fairweather, N. Ben, 1966-This chapter discusses the research undertaken in developing a comprehensive dependencies map for Personal Health Monitoring (PHM). Included is a discussion of the underlying research approach adopted and how this was operationalized. A new dependencies mapping method has been developed and this is described in detail. Illustrations of the derived tools are given using the PHM analysis undertaken. A summary of the analysis outcomes and the resulting recommendations are discussed. The chapter concludes with some suggestions of ways in which this type of data set can be used in practice to deliver fit-for-purpose PHM systems.Item Open Access The Digital Network of Networks: Regulatory Risk and Policy Challenges of Vaccine Passports(Cambridge University Press, 2021-07-12) Wilford, S.; McBride, Neil; Brooks, Laurence; Eke, Damian; Akintoye, Sinmisola; Owoseni, Adebowale; Leach, Tonii; Flick, Catherine; Fisk, Malcolm; Stacey, MartinThe extensive disruption to and digital transformation of travel administration across borders largely due to COVID-19 mean that digital vaccine passports are being developed to resume international travel and kick-start the global economy. Currently, a wide range of actors are using a variety of different approaches and technologies to develop such a system. This paper considers the techno-ethical issues raised by the digital nature of vaccine passports and the application of leading-edge technologies such as blockchain in developing and deploying them. We briefly analyse four of the most advanced systems – IBM’s Digital Health Passport “Common Pass,” the International Air Transport Association’s Travel Pass, the Linux Foundation Public Health’s COVID-19 Credentials Initiative and the Vaccination Credential Initiative (Microsoft and Oracle) – and then consider the approach being taken for the EU Digital COVID Certificate. Each of these raises a range of issues, particularly relating to the General Data Protection Regulation (GDPR) and the need for standards and due diligence in the application of innovative technologies (eg blockchain) that will directly challenge policymakers when attempting to regulate within the network of networks.Item Metadata only E-Government and Political Participation - E-Government and Privacy(Berliner Wissenschaftsverlag BWV, 2008) Wilford, S.Item Metadata only Electronic monitoring in the workplace: if people don’t care, then what is the relevance?(IGI Publishing, 2005) Stahl, Bernd Carsten, 1968-; Prior, Mary; Wilford, S.; Collins, D.Item Open Access First line steps in requirements identification for guidelines development in Responsible Research and Innovation (RRI)(Springer, 2018-01-11) Wilford, S.Responsible research and innovation (RRI) considers the impact of research and development on those who are likely to be directly or indirectly impacted by those activities, and provides a direction for the future of research practices in science and technology for the greater good. In the practical world of the lab or research group therefore, guidelines to assist researchers and scientists in the application of those RRI principles are needed. However, this paper is not concerned with the creation of guidelines themselves, but presents an RRI approach to identifying the requirements for guidelines. This is a first step that is often overlooked or presented as a fait accompli and yet it provides an essential factor in the eventual success or failure of guidelines, created for any purpose. What is required in a set of guidelines however, is not only dictated by the preferred outcome, but is also reflected in the process of its creation. Therefore, an RRI approach to identifying those requirements should also practice what the resulting RRI guidelines preach. Whilst initially developed for the production of guidelines for researchers in an EU RRI project, these approaches and principles can be applied across all disciplines when a set of guidelines need to be developed. The approach taken here, utilized several steps in its implementation. Firstly, through a review of the literature and an examination of guideline development in several research projects, a set of indicative requirements were created. A workshop/focus group with researchers from a range of disciplines, career stages and institutions led to the production of the second iteration, which then received further input from both experts in the field of RRI, philosophy and ethics. This led to the creation of the table of requirements for guidelines. By utilizing the core principles of RRI and through a critical and reflexive approach, this work presents a new technique for identifying first line steps in the creation of guidelines. The practical and flexible nature of this approach means that researchers and policy-makers are invited to use this method in their own guideline developmentItem Open Access Guidelines for Responsible Research and Innovation(De Montfort University, 2016) Wilford, S.; Fisk, Malcolm; Stahl, Bernd Carsten, 1968-Guidelines for Responsible Research and InnovationItem Open Access Information and communication technology privacy and policies within organisations : an analysis from the perspective of the individual(De Montfort University, 2004) Wilford, S.The Information Society is the result of developments in information and communication technologies (lCTs) and their ability to gather, collate and disseminate vast amounts of personal data. Privacy has therefore become an important social and ethical issue. The threats to privacy include not only the collection of personal details but also the increased use of surveillance technologies, from closed circuit television (CCTV) to email and Internet use monitoring. Individuals have been largely ignored by privacy researchers in the past. This has meant that whilst surveys have revealed some trends in attitude, they did not go far enough to discover how individuals perceive privacy and how far surveillance was seen by individuals as an invasion of their privacy. This research investigated individuals within a public sector organisation and a private sector organisation. By using a hermeneutic approach combined with the interpretive interactionism tools of Denzin (1989) the research was able to undertake a qualitative investigation of the privacy perceptions of the individual. Furthermore, differences between the approaches to privacy of a public organisation and a private organisation were analysed. This thesis explores new horizons within the field of computer ethics, and utilises qualitative research techniques not previously applied to this area of enquiry. The research techniques utilised have enabled an exploration of the lived experiences of the individuals within an organisational context. The adaptation of interpretive interactionism within the hermeneutic approach has produced findings that discovered the importance of privacy and the awareness of the participants to the issues of legislation, protection and future expectations. The research found that although the individuals studied were happy to allow certain personal information to be available, privacy within the home and within personal relationships was of critical importance. Privacy was seen as a right that all should have, and yet the scope and extent of privacy was subject to individual interpretation. Further more, the nature of privacy was seen to have changed with the use of ICTs so that there has been a paradigm shift in the focus of personal information. The perceived loss of community has led to less local knowledge about an individual's affairs, but the increases in technology have created vast databases containing huge amounts of personal information, which are accessible to many individuals and organisations but to whom the information remains impersonal.Item Metadata only Maturity, Ethics and The IS Professional: Does Age Matter When it Comes to Ethical Issue Awareness(2013) Wilford, S.; Wakunuma, KutomaItem Metadata only Middle-aged radicalisation: why are so many of Britain’s rioters in their 40s and 50s?(The Conversation, 2024-08-07) Wilford, S.NAItem Open Access A Normative Theory of the Information Society(Emerald, 2014) Wilford, S.This is a book review, no abstract.Item Metadata only Perceptions of ethics in IS: How age can affect awareness(Emerald, 2014-11-04) Wilford, S.; Wakunuma, KutomaPurpose – This aim of this paper was to highlight the awareness of ethical issues across the group of information systems (IS) professionals from a range of geographical regions. Design/methodology/approach – An initial survey was conducted that informed in-depth interviews with 26 IS professionals from across the globe. The study identified that around 70 per cent of the sample were over 50 years old. This provided an opportunity to consider age-related differences in perception regarding ethical awareness of both current and emerging technologies. Findings – The project revealed that the more mature IS professionals had a significantly higher level of awareness and perceived understanding regarding the importance of ethical issues than the younger IS professionals. Research limitations/implications – The research was limited to IS professionals and so the findings do not generalise further. Future research would be beneficial to find out if the higher level of ethical awareness is also evident across older people in general or whether it is specific to technology professionals. Practical implications – IS professionals need to be exposed to high standards and expectations of ethical behaviour from senior colleagues, as well as embedding this within technical education. Social implications – Caution with regards to youth culture and youthitisation of the workforce needs to be exerted to avoid rash decision-making and short-termism, which could undermine progress and development. A change in the view of employers to older workers will also require a change in attitudes across Western society, particularly as demographics continue to skew towards an aging population. Originality/value – This paper provides new insight into the ethical awareness of older employees and goes some way to dispel the myths surrounding stereotypes of older workers as being fearful of technology and resistant to change.Item Open Access PRECEPT-4-Justice: A bias-neutralising framework for digital forensics investigations(Elsevier, 2021-06-09) Renaud, Karen; Bongiovanni, Ivano; Wilford, S.; Irons, AlistairSoftware invisibly permeates our everyday lives: operating devices in our physical world (traffic lights and cars), effecting our business transactions and powering the vast World Wide Web. We have come to rely on such software to work correctly and efficiently. The generally accepted narrative is that any software errors that do occur can be traced back to a human operator’s mistakes. Software engineers know that this is merely a comforting illusion. Software sometimes has bugs, which might lead to erratic performance: intermittently generating errors. The software, hardware and communication infrastructure can all introduce errors, which are often challenging to isolate and correct. Anomalies that manifest are certainly not always due to an operator’s actions. When the general public and the courts believe the opposite, that errors are usually attributable to some human operator’s actions, it is entirely possible for some hapless innocent individual to be blamed for anomalies and discrepancies whose actual source is a software malfunction. This is what occurred in the Post Office Horizon IT case, where unquestioning belief in the veracity of software-generated evidence led to a decade of wrongful convictions. We will use this case as a vehicle to demonstrate the way biases can influence investigations, and to inform the development of a framework to guide and inform objective digital forensics investigations. This framework, if used, could go some way towards neutralising biases and preventing similar miscarriages of justice in the future.Item Open Access PRECEPT: A Framework for Ethical Digital Forensics Investigations.(Emerald, 2020-03-13) Ferguson, Ian; Renaud, Karen; Irons, Alastair; Wilford, S.Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics has become far more sophisticated over the years and is now able to uncover even more evidence that can be used to support prosecution of cyber criminals in a court of law. Governments, too, have embraced the ability to track suspicious individuals in the online world. Forensics investigators are driven to gather data exhaustively, being under pressure to provide law enforcement with sufficient evidence to secure a conviction. Yet, there are concerns about the ethics and justice of untrammeled investigations on a number of levels. On an organizational level, unconstrained investigations could interfere with, and damage, the organization’s right to control the disclosure of their intellectual capital. On an individual level, those being investigated could easily have their legal privacy rights violated by forensics investigations. On a societal level, there might be a sense of injustice at the perceived inequality of current practice in this domain. This paper argues the need for a practical, ethically-grounded approach to digital forensic investigations, one that acknowledges and respects the privacy rights of individuals and the intellectual capital disclosure rights of organisations, as well as acknowledging the needs of law enforcement. We derive a set of ethical guidelines, then map these onto a forensics investigation framework. We subjected the framework to expert review in two stages, refining the framework after each stage. We conclude by proposing the refined ethically-grounded digital forensics investigation framework. Our treatise is primarily UK based, but the concepts presented here have international relevance and applicability. In this paper, the lens of justice theory is used to explore the tension that exists between the needs of digital forensic investigations into cybercrimes on the one hand, and, on the other, individuals’ rights to privacy and organizations’ rights to control intellectual capital disclosure. The investigation revealed a potential inequality between the practices of digital forensics investigators and the rights of other stakeholders. That being so, the need for a more ethically-informed approach to digital forensics investigations, as a remedy, is highlighted, and a framework proposed to provide this. Our proposed ethically-informed framework for guiding digital forensics investigations suggest a way of re-establishing the equality of the stakeholders in this arena, and ensuring that the potential for a sense of injustice is reduced. Justice theory is used to highlight the difficulties in squaring the circle between the rights and expectations of all stakeholders in the digital forensics arena. The outcome is the forensics investigation guideline, PRECEpt: Privacy-Respecting EthiCal framEwork, which provides the basis for a re-aligning of the balance between the requirements and expectations of digital forensic investigators on the one hand, and individual and organizational expectations and rights, on the other.Item Open Access Protecting of Children Online in Saudi Arabia.(The International Institute for Academic Development, 2015) Almogbel, A.; Begg, M.; Wilford, S.Modern society is inundated with an array of attractive technological gadgets, most of which are used by young children. This information and technology revolution poses challenges to humanity, especially young people. However, the advent of this revolution means that people’s lives have been made easier in many different ways. Many countries and organizations in the world are concerned about the risks coming from the Internet on children, such as sexual harassment and exposure to inappropriate content like violence and sexual activities. Saudi Arabia is one of the countries in the Middle East that experiences this rapid revolution of the internet. With the increase in the number of Internet users in Saudi Arabia, especially children, and the use of social networking sites like Facebook as well as the ease of sharing photos and inappropriate content all this continues to increase the chances of children's exposure to risk is increasing.Item Metadata only Public involvement in end of life services(2012) Wilford, S.; Gandy, R.Item Open Access Responsible innovation across borders: tensions, paradoxes and possibilities(Routledge, 2014-05) Macnaghten, P.; Owen, R.; Stilgoe, J.; Wynne, B.; Azevedo, A.; de Campos, A.; Chilvers, J.; Dagnino, R.; di Giulio, G.; Frow, E.; Garvey, B.; Groves, C.; Hartley, S.; Knobel, M.; Kobayashi, E.; Lehtonnen, M.; Lezaun, J.; Mello, L.; Monteiro, M.; Pamplona, J.; Rigolin, C.; Rondani, B.; Staykova, M.; Taddei, R.; Till, C.; Tyfield, D.; Wilford, S.; Velho, L.In March 2014 a group of early career researchers and academics from São Paulo state and from the UK met at the University of Campinas to participate in a workshop on ‘Responsible Innovation and the Governance of Socially Controversial Technologies’. In this Perspective we describe key reflections and observations from the workshop discussions, paying particular attention to the discourse of responsible innovation from a cross-cultural perspective. We describe a number of important tensions, paradoxes and opportunities that emerged over the three days of the workshop.Item Open Access Responsible Research and Innovation: Using the Requirements Tool for Stakeholder Engagement in Developing a Universal Design for Learning Guidelines for Practice(MDPI, 2019-05-24) Wilford, S.Responsible research and innovation (RRI) is growing in importance, and alongside this growth is an acknowledgement that for research and innovation projects to be successful, stakeholders must be involved from the outset. When developing guidelines for practice, stakeholders will often be presented with a document to ratify rather than one to develop or revise. This gap in stakeholder engagement has been recognised and addressed by the development of the requirements tool. This tool was originally created to provide a systematic approach to the development of guidelines for the governance of RRI, but it was quickly recognised that the tool can bridge the gap and involve stakeholders from the outset, thereby increasing the likelihood of buy-in. This paper presents the second validated use of the tool that was used to inform the revision of guidelines for the introduction of a universal design for learning (UDL) at a UK University. The resulting revised guidelines for practice and their adoption by those tasked with producing them provide further evidence of the value and flexibility of the tool and its potential for its continued use in the future development or revision of guidelines.Item Open Access What is required of requirements? A first stage process towards developing guidelines for responsible research and innovation(ACM Digital Library as a special issue of the ACM SIGCAS newsletter., 2015) Wilford, S.Responsible research and innovation (RRI) considers the impact of development on stakeholders and provides a direction for the future of science and technology. Therefore, in the practical world of the lab, what is needed is a set of guidelines to assist in the application of those RRI principles. However, to ensure that any guidelines are usable and acceptable, it is important to engage with those who would actually be expected to implement them. Stakeholders are often asked to evaluate a set of guidelines or recommendations without having any say in how they are constructed, what they should look like or what they should contain. The process of stakeholder engagement in the development of a set of ‘requirements’ therefore provides insight from which a set of guidelines can be developed. In this way, acceptance is fostered through stakeholder involvment in the process, which has been built from the core principles of RRI.Item Metadata only What is ‘private’ information while online: a culture effect.(Saudi Students Clubs, 2012) Al Amri, Jehad; Fairweather, N. Ben, 1966-; Howley, Richard G.; Wilford, S.