TY - GEN
T1 - A refined ethical impact assessment tool and a case study of its application
AU - Bailey, Michael
AU - Kenneally, Erin
AU - Dittrich, David
PY - 2012
Y1 - 2012
N2 - Research of or involving Information and Communications Technology (ICT) presents a wide variety of ethical challenges and the relative immaturity of ethical decision making in the ICT research community has prompted calls for additional research and guidance. The Menlo report, a revisiting of the seminal Belmont report, seeks to bring clarity to this arena by articulating a basic set of ethical principles for ICT research. However the gap between such principles and actionable guidance for the ethical conduct of ICT research is large. In previous work we sought to bridge this gap through the construction of an ethical impact assessment (EIA) tool that provided a set of guiding questions to help researchers understand how to apply the Menlo principles. While a useful tool, experiences in the intervening years have caused us to rethink and expand the EIA. In this paper we: (i) discuss the various challenges encountered in applying the original EIA, (ii) present a new EIA framework that represents our evolved understanding, and (iii) retrospectively apply this EIA to an ethically challenging, original study in ICTR.
AB - Research of or involving Information and Communications Technology (ICT) presents a wide variety of ethical challenges and the relative immaturity of ethical decision making in the ICT research community has prompted calls for additional research and guidance. The Menlo report, a revisiting of the seminal Belmont report, seeks to bring clarity to this arena by articulating a basic set of ethical principles for ICT research. However the gap between such principles and actionable guidance for the ethical conduct of ICT research is large. In previous work we sought to bridge this gap through the construction of an ethical impact assessment (EIA) tool that provided a set of guiding questions to help researchers understand how to apply the Menlo principles. While a useful tool, experiences in the intervening years have caused us to rethink and expand the EIA. In this paper we: (i) discuss the various challenges encountered in applying the original EIA, (ii) present a new EIA framework that represents our evolved understanding, and (iii) retrospectively apply this EIA to an ethically challenging, original study in ICTR.
UR - http://www.scopus.com/inward/record.url?scp=84868370112&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84868370112&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-34638-5_10
DO - 10.1007/978-3-642-34638-5_10
M3 - Conference contribution
AN - SCOPUS:84868370112
SN - 9783642346378
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 112
EP - 123
BT - Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Revised Selected Papers
PB - Springer
T2 - 16th International Conference on Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, FC 2012 Workshops - USEC and WECSR 2012
Y2 - 2 March 2012 through 2 March 2012
ER -