SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Legal, social,
ethical,
cultural and
economic
issues
1. Information, values
and beliefs
We need to recognise the relationship between
information, values and beliefs
•How was information constructed in the past?
•How do we filter information?
•How do our values and beliefs affect how we access,
use and store information?
• How does information construct our identity? Eg
Facebook: audiences, surveillance
Information bias
– In the past, information tended to reflect white
heterosexual, able bodied researchers who rarely reflected
on how their own identities impacted research (Berger and
Kitzinger, 1999)
– Information tends to reflect the author, even if the word ‘I’
has been avoided in the writing
– Information can also reflect the interests of funders and
governments
– Information is never free from bias
2. Economic issues
•It costs to store information and this can impact how long
you have access to studies
•Research also costs which means when there are cuts to funding, the quality of
research is affected. Researchers might also present research in a way that gives
them more political influence and more funding. They might also find themselves
paid to prove changes in practice
• A good example to this are boot camps as an ‘effective’ intervention
•Multi-Systematic Reviews work well as a check for practitioners as they review
all studies (but can be biased towards scientific methods)
Economic issues cont’d
• Other costs on information include but are not limited to:
• Technology
• Money talks: media, marketing, corporations
• Business vs free speech eg Google and China
• Training
3. Cultural issues
Cultural (broad definition) considerations centre around
how information is:
•transmitted
•collected
•used
•disseminated
Cultural politics: Prejudice, discrimination and racism
can be perpetuated by information
Comparative colonialisms (1980) (Cram 2002)COLONIALISM
MANIFESTED BY:
POLITICAL COLONIALISM SCIENTIFIC/RESEARCH
COLONIALISM
1. Removal of
Wealth
Exportation of raw materials
and wealth from colonies for
the purpose of “processing” it
into manufactured wealth
and/or goods.
Exporting raw data from a
community for the purpose of
“processing” it into
manufactured goods (i.e.,
books, articles, wealth, etc.)
2. Right of Access Colonial Power believes it
has the right of access and
use for its own benefit
anything belonging to the
colonised people.
Scientist believes s/he has
unlimited right of access to
any data source and any
information belonging to the
subject population.
3. External Power
Base
The centre of power and
control over the colonised is
located outside the colony
itself.
The centre of knowledge and
information about a people or
community is located outside
of
the community or people
themselves.
Cultural challenges to
the Scientific method
– I am aware some quarters of the academic world will demand
proof and corroborate evidence . I have none other than the
fact that I am Samoan (Wendt, 1984)
– Whoever controls research, controls knowledge (Maaka, 1999)
– If the information of knowledge that comes out of the project
is misused, it is them, not the study investigators who have to
return to those communities and face the consequences”
(Crengle and McCreanor, 2006)
Treaty implications
1.Partnership
refers to an ongoing relationship between those who have information
and others
Participation
a principle which emphasises positive Mäori involvement in all
decisions around information use
Protection
the principle whereby the Crown is obliged to actively protect Mäori
interests, including information
Information and the Treaty
of Waitangi (Professional
competencies)
Beliefs:
1. Commitment to Te Tiriti o
Waitangi
1. Supporting Maori rights, authority
and status
2. Ensuring cultural safety
3. Self-determination by Maori to own
pathways of healing
Professional competencies
cont’d
Knowledge:
1. Knowledge of Te Tiriti o
Waitangi
2. Describe social and historical
factors affecting Maori
1. Understand rights of tangata
whenua
2. Can describe impact of colonisation
3. Can describe social and economic
factors affecting Maori
Feminist perspectives
Feminist perspectives questions socialisation and power
structures. It is an approach that is primarily about
experience and empowerment. It analyses the cultural
and class assumptions that may influence information
about women. It explores how information is used and
dissemination that often perpetuates oppression and
inequity. It alerts us to marginalisation or anthologising
of all minority (not just women) groups’ experience and
challenges assumptions.
Implications for
information use etc
• Partnership, protection and participation
• Motivation for and selection of questions carefully
chosen
• Purpose is critical and political
• Research is non-hierarchical
• Herstory(womyn’s stories ) are important
• Share power in the methods and analysis
• The importance of acknowledging bias
Disability and
information
– Social model of disability
– Who is a “knower”?
– Who are the experts? No homogenous group
– Lived experience of disability
– Researchers often come from a sympathy point
of view
– Research must transform and is “emancipatory”
– Enabling not disabling
Implications for
information use etc
•Make sure it doesn't discriminate further
•Power of words, verbatim useful in research and writing
•Recruitment in research; a consumer group can’t speak for
all
•Ask: is disabled researcher powerful?
•Move beyond medical models of anaylsis to what really
matters
Gay community
– Queer research 10 years old
– Gay/lesbian/transgender traditionally framed through
Western eyes of pathology
– Suppressed history
– Language important eg transgender is transported from
dominant culture
– Have reclaimed label
– Strong political, cultural and social group
Ethnic communities
• Traditionally research done “on” ethnic groups
• Information gleaned from research findings: Who
owns the findings?
• It is ethically responsible to give feedback
“Repeatedly in my research I have met people
participating in research previously and not receiving
feedback about the outcomes. This experience
frequently makes people reluctant to be involved in
other research” (Oliver, 1996.
4. Ethical issues
– Codes of Ethics (DAPAANZ, NZAC, NZCCA, Ara Taiohi)
– Power to manipulate and transform information
– Use of names, faces etc
– Consent process
– Accessibility-web design etc
– Can we trust sources? Can we advise clients based on
information we gather?
Ethics: what is right and correct
Often an objective set of criteria (Code of Ethics)
Information moves faster than rules can be formulated to
govern it, how information is used may be left up to you with
the guidance of your personal ethics
Informed consent
• Two central aspects:
- Disclosure & free consent.
• Origins of informed consent.
• Informed consent requires a consent that is competent,
knowing, and voluntary (Gillick 1985)
• The process of informed consent:
- ongoing.
- Includes a discussion of the limits of confidentiality.
- Organisational examples of ‘your health information, your
rights’
Are there limits to confidentiality?
Limits to confidentiality
are…..
• Harm to self
• Harm to others
• Harm from others
• Children/elderly
• Court orders
• Confidentiality is discussed at the beginning and
reviewed/reminded regularly (if required)
• Eg: confidentiality forms in agencies
Duty to warn/protect –
over-rides confidentiality
•Self
•Others
•From others
How do we decide on this?
5. Social issues
Rate of technological advances
Information (especially technology) to lift people out of poverty
Implications for the increase use of Social Media eg Twitter, Facebook
Media and personal invasion etc
Social construction of information
Sociology of how information is disseminated eg, whose interest is being served?
Consider
• How has the internet contributed to the democratization of
knowledge production?
• Should internet access in third world countries take priority over
wealth creation?
• How does the speed of information contribute to strengthening or
challenging of the social order? Eg Arab Spring
• Does filtering or monitoring software on computers assist with the
social good or is it invasive ?
6. Legal issues
– Code of Rights
– Privacy Act (and Health Information Privacy Code )
– Release of Information
– Copyright
a. Code of Rights (1996)
•Legislation includes provision of rules around information:
confidentiality, informed consent
•Code should be displayed in all health and disability agencies
•Provision of a Disability Commissioner and Health and
Disability Advocates
b. The Privacy Act (1993)
• The Act is primarily concerned with good personal information handling practices
• The Act contains twelve information privacy principles dealing with collecting,
holding, use & disclosure of personal information & assigning unique identifiers
• The principles give individuals the right to access personal information and to
request correction of it
• The Privacy Act provided for provision of a Privacy Commissioner
12 principles
Principle 1, Principle 2, Principle 3 & Principle 4 govern the
collection of personal information. This includes the
reasons why personal information may be collected,
where it may be collected from and how it is collected
Principle 5 governs the way personal information is
stored. It is designed to protect personal information
from unauthorised use or disclosure
Principle 6 gives individuals the right to access information
about themselves
Principle 7 gives individuals the right to correct information
about themselves.
Principle 8, Principle 9, Principle 10 and Principle 11
place restrictions on how people & organisations can use or
disclose personal information. These include ensuring
information is accurate & up-to-date, & that it isn’t
improperly disclosed
Principle 12
governs how “unique identifiers” – such as IRD numbers,
bank client numbers, driver’s licence and passport numbers –
can be used.
c. Health Information
Privacy Code (1994)
– This code sets specific rules for agencies in the health
sector to better ensure the protection of individual
privacy. The code addresses the health information
collected, used, held and disclosed by health agencies.
(i)Legal requirements for
collecting and using
information
Consent
Ethics approval for research
•Copyright Rules at a glance:
Copyright law defines "fair use" for copying for the purpose
of criticism, review, news reporting, research or private
study.
Covered by WelTec licence
Plagarism
• Plagiarism rules at a glance:
Wrongful appropriation," "close imitation," or "purloining
and publication" of another authors "language, thoughts,
ideas, or expressions," and the representation of them as
one's own original work

Weitere ähnliche Inhalte

Was ist angesagt?

Welcome to the Library!
Welcome to the Library!Welcome to the Library!
Welcome to the Library!KatyKavanagh
 
Cj 4111 serial killers1
Cj 4111 serial killers1Cj 4111 serial killers1
Cj 4111 serial killers1Traciwm
 
Presentation to BA(Hons) Primary Education
Presentation to BA(Hons) Primary EducationPresentation to BA(Hons) Primary Education
Presentation to BA(Hons) Primary EducationClare McCluskey Dean
 
Information Seeking Theories And Models
Information Seeking Theories And ModelsInformation Seeking Theories And Models
Information Seeking Theories And Modelsguestab667e
 
ASIST 2013 Panel: Altmetrics at Mendeley
ASIST 2013 Panel: Altmetrics at MendeleyASIST 2013 Panel: Altmetrics at Mendeley
ASIST 2013 Panel: Altmetrics at MendeleyWilliam Gunn
 
Invisible web
Invisible webInvisible web
Invisible webpflugi
 
Rebuilding the 7 Pillars: a new approach to an old model. USTLG may2011
Rebuilding the 7 Pillars: a new approach to an old model. USTLG may2011Rebuilding the 7 Pillars: a new approach to an old model. USTLG may2011
Rebuilding the 7 Pillars: a new approach to an old model. USTLG may2011nmjb
 
Information Seeking Information Literacy
Information Seeking  Information LiteracyInformation Seeking  Information Literacy
Information Seeking Information LiteracyJohan Koren
 
Macro source study
Macro source studyMacro source study
Macro source studymarklstevens
 
Presentation Timo Kouwenhoven FIATIFTA
Presentation Timo Kouwenhoven FIATIFTAPresentation Timo Kouwenhoven FIATIFTA
Presentation Timo Kouwenhoven FIATIFTATimo Kouwenhoven
 

Was ist angesagt? (11)

Welcome to the Library!
Welcome to the Library!Welcome to the Library!
Welcome to the Library!
 
Cj 4111 serial killers1
Cj 4111 serial killers1Cj 4111 serial killers1
Cj 4111 serial killers1
 
Presentation to BA(Hons) Primary Education
Presentation to BA(Hons) Primary EducationPresentation to BA(Hons) Primary Education
Presentation to BA(Hons) Primary Education
 
Information Seeking Theories And Models
Information Seeking Theories And ModelsInformation Seeking Theories And Models
Information Seeking Theories And Models
 
ASIST 2013 Panel: Altmetrics at Mendeley
ASIST 2013 Panel: Altmetrics at MendeleyASIST 2013 Panel: Altmetrics at Mendeley
ASIST 2013 Panel: Altmetrics at Mendeley
 
Invisible web
Invisible webInvisible web
Invisible web
 
Rebuilding the 7 Pillars: a new approach to an old model. USTLG may2011
Rebuilding the 7 Pillars: a new approach to an old model. USTLG may2011Rebuilding the 7 Pillars: a new approach to an old model. USTLG may2011
Rebuilding the 7 Pillars: a new approach to an old model. USTLG may2011
 
Information Seeking Information Literacy
Information Seeking  Information LiteracyInformation Seeking  Information Literacy
Information Seeking Information Literacy
 
Macro source study
Macro source studyMacro source study
Macro source study
 
Presentation Timo Kouwenhoven FIATIFTA
Presentation Timo Kouwenhoven FIATIFTAPresentation Timo Kouwenhoven FIATIFTA
Presentation Timo Kouwenhoven FIATIFTA
 
Information literacy
Information literacyInformation literacy
Information literacy
 

Andere mochten auch

Storing information
Storing informationStoring information
Storing informationFiona Beals
 
Accessing information
Accessing informationAccessing information
Accessing informationFiona Beals
 
49529779 7419c cross-cultural-management-systems-and-practices
49529779 7419c cross-cultural-management-systems-and-practices49529779 7419c cross-cultural-management-systems-and-practices
49529779 7419c cross-cultural-management-systems-and-practicesLloyd Soans
 
Management in action copy
Management in action   copyManagement in action   copy
Management in action copySoumya Sahoo
 

Andere mochten auch (6)

Storing information
Storing informationStoring information
Storing information
 
Accessing information
Accessing informationAccessing information
Accessing information
 
Powerpoint 1
Powerpoint 1Powerpoint 1
Powerpoint 1
 
49529779 7419c cross-cultural-management-systems-and-practices
49529779 7419c cross-cultural-management-systems-and-practices49529779 7419c cross-cultural-management-systems-and-practices
49529779 7419c cross-cultural-management-systems-and-practices
 
Bc5116 01
Bc5116 01Bc5116 01
Bc5116 01
 
Management in action copy
Management in action   copyManagement in action   copy
Management in action copy
 

Ähnlich wie Ethics of Information

IFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptxIFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptxEyalClyne
 
Ethics for artificial intelligence, machine learning and automated decision m...
Ethics for artificial intelligence, machine learning and automated decision m...Ethics for artificial intelligence, machine learning and automated decision m...
Ethics for artificial intelligence, machine learning and automated decision m...Steven Finlay
 
Ethics of research
Ethics of researchEthics of research
Ethics of researchasmamaqsood4
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerCharleston Conference
 
Lecture 7-research ethics and engaging culture.pptx
Lecture 7-research ethics and engaging culture.pptxLecture 7-research ethics and engaging culture.pptx
Lecture 7-research ethics and engaging culture.pptxXiaolanDeng1
 
Research methodology ethical issues in research an assignment
Research methodology  ethical issues in research   an assignmentResearch methodology  ethical issues in research   an assignment
Research methodology ethical issues in research an assignmentMaiJoy
 
Chp 02 - Socio informatics - morality and the law (shared)
Chp 02 -  Socio informatics - morality and the law (shared) Chp 02 -  Socio informatics - morality and the law (shared)
Chp 02 - Socio informatics - morality and the law (shared) YUSRA FERNANDO
 
INTRODUCTION LECTURE_RESEARCH DESIGN AND METHODOLOGY.pptx
INTRODUCTION LECTURE_RESEARCH DESIGN AND METHODOLOGY.pptxINTRODUCTION LECTURE_RESEARCH DESIGN AND METHODOLOGY.pptx
INTRODUCTION LECTURE_RESEARCH DESIGN AND METHODOLOGY.pptxAkwasiOwusu6
 
UKSG Conference 2016 Breakout Session - The new research data environment: im...
UKSG Conference 2016 Breakout Session - The new research data environment: im...UKSG Conference 2016 Breakout Session - The new research data environment: im...
UKSG Conference 2016 Breakout Session - The new research data environment: im...UKSG: connecting the knowledge community
 
FSCI Sharing sensitive data
FSCI Sharing sensitive dataFSCI Sharing sensitive data
FSCI Sharing sensitive dataARDC
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and EnterpriseRaymond Gao
 
EMPHNET-PHE Course: Module02: ethical principles and theories and the core pr...
EMPHNET-PHE Course: Module02: ethical principles and theories and the core pr...EMPHNET-PHE Course: Module02: ethical principles and theories and the core pr...
EMPHNET-PHE Course: Module02: ethical principles and theories and the core pr...Dr Ghaiath Hussein
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its useNoriha Nori
 
Internet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 TutorialInternet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 TutorialKa_Kinder
 

Ähnlich wie Ethics of Information (20)

IFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptxIFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptx
 
Ethics for artificial intelligence, machine learning and automated decision m...
Ethics for artificial intelligence, machine learning and automated decision m...Ethics for artificial intelligence, machine learning and automated decision m...
Ethics for artificial intelligence, machine learning and automated decision m...
 
Ethics of research
Ethics of researchEthics of research
Ethics of research
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
 
Chapter5
Chapter5Chapter5
Chapter5
 
Lecture 7-research ethics and engaging culture.pptx
Lecture 7-research ethics and engaging culture.pptxLecture 7-research ethics and engaging culture.pptx
Lecture 7-research ethics and engaging culture.pptx
 
Research methodology ethical issues in research an assignment
Research methodology  ethical issues in research   an assignmentResearch methodology  ethical issues in research   an assignment
Research methodology ethical issues in research an assignment
 
Research Ethics.ppt
Research Ethics.pptResearch Ethics.ppt
Research Ethics.ppt
 
Ethics revised 2013
Ethics revised 2013Ethics revised 2013
Ethics revised 2013
 
Chp 02 - Socio informatics - morality and the law (shared)
Chp 02 -  Socio informatics - morality and the law (shared) Chp 02 -  Socio informatics - morality and the law (shared)
Chp 02 - Socio informatics - morality and the law (shared)
 
INTRODUCTION LECTURE_RESEARCH DESIGN AND METHODOLOGY.pptx
INTRODUCTION LECTURE_RESEARCH DESIGN AND METHODOLOGY.pptxINTRODUCTION LECTURE_RESEARCH DESIGN AND METHODOLOGY.pptx
INTRODUCTION LECTURE_RESEARCH DESIGN AND METHODOLOGY.pptx
 
UKSG Conference 2016 Breakout Session - The new research data environment: im...
UKSG Conference 2016 Breakout Session - The new research data environment: im...UKSG Conference 2016 Breakout Session - The new research data environment: im...
UKSG Conference 2016 Breakout Session - The new research data environment: im...
 
Ethics in Research
Ethics in Research Ethics in Research
Ethics in Research
 
FSCI Sharing sensitive data
FSCI Sharing sensitive dataFSCI Sharing sensitive data
FSCI Sharing sensitive data
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
EMPHNET-PHE Course: Module02: ethical principles and theories and the core pr...
EMPHNET-PHE Course: Module02: ethical principles and theories and the core pr...EMPHNET-PHE Course: Module02: ethical principles and theories and the core pr...
EMPHNET-PHE Course: Module02: ethical principles and theories and the core pr...
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its use
 
Ethicsofresearch
EthicsofresearchEthicsofresearch
Ethicsofresearch
 
Research ethics
Research  ethicsResearch  ethics
Research ethics
 
Internet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 TutorialInternet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 Tutorial
 

Mehr von Fiona Beals

Challenging classical divides
Challenging classical dividesChallenging classical divides
Challenging classical dividesFiona Beals
 
Introduction to Research Methods in the Social Services 09
Introduction to Research Methods in the Social Services 09Introduction to Research Methods in the Social Services 09
Introduction to Research Methods in the Social Services 09Fiona Beals
 
Introduction to Research Methods in the Social Services 08
Introduction to Research Methods in the Social Services 08Introduction to Research Methods in the Social Services 08
Introduction to Research Methods in the Social Services 08Fiona Beals
 
Introduction to Research Methods in the Social Services 07
Introduction to Research Methods in the Social Services 07Introduction to Research Methods in the Social Services 07
Introduction to Research Methods in the Social Services 07Fiona Beals
 
Introduction to Research Methods in the Social Services 06
Introduction to Research Methods in the Social Services 06Introduction to Research Methods in the Social Services 06
Introduction to Research Methods in the Social Services 06Fiona Beals
 
Introduction to Research Methods in the Social Services 05
Introduction to Research Methods in the Social Services 05Introduction to Research Methods in the Social Services 05
Introduction to Research Methods in the Social Services 05Fiona Beals
 
Introduction to Research Methods in the Social Services 04
Introduction to Research Methods in the Social Services 04Introduction to Research Methods in the Social Services 04
Introduction to Research Methods in the Social Services 04Fiona Beals
 
Introduction to Research Methods in the Social Services 03
Introduction to Research Methods in the Social Services 03Introduction to Research Methods in the Social Services 03
Introduction to Research Methods in the Social Services 03Fiona Beals
 
Introduction to Research Methods in the Social Services 02
Introduction to Research Methods in the Social Services 02Introduction to Research Methods in the Social Services 02
Introduction to Research Methods in the Social Services 02Fiona Beals
 
Introduction to Research Methods in the Social Services 01
Introduction to Research Methods in the Social Services 01Introduction to Research Methods in the Social Services 01
Introduction to Research Methods in the Social Services 01Fiona Beals
 
He aro mātanga kaupapa
He aro mātanga kaupapaHe aro mātanga kaupapa
He aro mātanga kaupapaFiona Beals
 
Implementing te tiriti o waitangi v2
Implementing te tiriti o waitangi v2Implementing te tiriti o waitangi v2
Implementing te tiriti o waitangi v2Fiona Beals
 
Depression cyberbullying
Depression cyberbullyingDepression cyberbullying
Depression cyberbullyingFiona Beals
 
Video game addiction
Video game addictionVideo game addiction
Video game addictionFiona Beals
 
Child poverty monitor presentation template2016 v2 (1)
Child poverty monitor presentation template2016 v2 (1)Child poverty monitor presentation template2016 v2 (1)
Child poverty monitor presentation template2016 v2 (1)Fiona Beals
 
Reading research
Reading researchReading research
Reading researchFiona Beals
 
Alternative education
Alternative educationAlternative education
Alternative educationFiona Beals
 
Getting legit with your information
Getting legit with your informationGetting legit with your information
Getting legit with your informationFiona Beals
 
E ating the media lunch
E ating the media lunchE ating the media lunch
E ating the media lunchFiona Beals
 

Mehr von Fiona Beals (20)

Challenging classical divides
Challenging classical dividesChallenging classical divides
Challenging classical divides
 
Introduction to Research Methods in the Social Services 09
Introduction to Research Methods in the Social Services 09Introduction to Research Methods in the Social Services 09
Introduction to Research Methods in the Social Services 09
 
Introduction to Research Methods in the Social Services 08
Introduction to Research Methods in the Social Services 08Introduction to Research Methods in the Social Services 08
Introduction to Research Methods in the Social Services 08
 
Introduction to Research Methods in the Social Services 07
Introduction to Research Methods in the Social Services 07Introduction to Research Methods in the Social Services 07
Introduction to Research Methods in the Social Services 07
 
Introduction to Research Methods in the Social Services 06
Introduction to Research Methods in the Social Services 06Introduction to Research Methods in the Social Services 06
Introduction to Research Methods in the Social Services 06
 
Introduction to Research Methods in the Social Services 05
Introduction to Research Methods in the Social Services 05Introduction to Research Methods in the Social Services 05
Introduction to Research Methods in the Social Services 05
 
Introduction to Research Methods in the Social Services 04
Introduction to Research Methods in the Social Services 04Introduction to Research Methods in the Social Services 04
Introduction to Research Methods in the Social Services 04
 
Introduction to Research Methods in the Social Services 03
Introduction to Research Methods in the Social Services 03Introduction to Research Methods in the Social Services 03
Introduction to Research Methods in the Social Services 03
 
Introduction to Research Methods in the Social Services 02
Introduction to Research Methods in the Social Services 02Introduction to Research Methods in the Social Services 02
Introduction to Research Methods in the Social Services 02
 
Introduction to Research Methods in the Social Services 01
Introduction to Research Methods in the Social Services 01Introduction to Research Methods in the Social Services 01
Introduction to Research Methods in the Social Services 01
 
He aro mātanga kaupapa
He aro mātanga kaupapaHe aro mātanga kaupapa
He aro mātanga kaupapa
 
Implementing te tiriti o waitangi v2
Implementing te tiriti o waitangi v2Implementing te tiriti o waitangi v2
Implementing te tiriti o waitangi v2
 
Depression cyberbullying
Depression cyberbullyingDepression cyberbullying
Depression cyberbullying
 
Video game addiction
Video game addictionVideo game addiction
Video game addiction
 
Child poverty monitor presentation template2016 v2 (1)
Child poverty monitor presentation template2016 v2 (1)Child poverty monitor presentation template2016 v2 (1)
Child poverty monitor presentation template2016 v2 (1)
 
Reading research
Reading researchReading research
Reading research
 
Alternative education
Alternative educationAlternative education
Alternative education
 
Getting legit with your information
Getting legit with your informationGetting legit with your information
Getting legit with your information
 
Lesson 04
Lesson 04Lesson 04
Lesson 04
 
E ating the media lunch
E ating the media lunchE ating the media lunch
E ating the media lunch
 

Kürzlich hochgeladen

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 

Kürzlich hochgeladen (20)

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

Ethics of Information

  • 2. 1. Information, values and beliefs We need to recognise the relationship between information, values and beliefs •How was information constructed in the past? •How do we filter information? •How do our values and beliefs affect how we access, use and store information? • How does information construct our identity? Eg Facebook: audiences, surveillance
  • 3. Information bias – In the past, information tended to reflect white heterosexual, able bodied researchers who rarely reflected on how their own identities impacted research (Berger and Kitzinger, 1999) – Information tends to reflect the author, even if the word ‘I’ has been avoided in the writing – Information can also reflect the interests of funders and governments – Information is never free from bias
  • 4. 2. Economic issues •It costs to store information and this can impact how long you have access to studies •Research also costs which means when there are cuts to funding, the quality of research is affected. Researchers might also present research in a way that gives them more political influence and more funding. They might also find themselves paid to prove changes in practice • A good example to this are boot camps as an ‘effective’ intervention •Multi-Systematic Reviews work well as a check for practitioners as they review all studies (but can be biased towards scientific methods)
  • 5. Economic issues cont’d • Other costs on information include but are not limited to: • Technology • Money talks: media, marketing, corporations • Business vs free speech eg Google and China • Training
  • 6. 3. Cultural issues Cultural (broad definition) considerations centre around how information is: •transmitted •collected •used •disseminated Cultural politics: Prejudice, discrimination and racism can be perpetuated by information
  • 7. Comparative colonialisms (1980) (Cram 2002)COLONIALISM MANIFESTED BY: POLITICAL COLONIALISM SCIENTIFIC/RESEARCH COLONIALISM 1. Removal of Wealth Exportation of raw materials and wealth from colonies for the purpose of “processing” it into manufactured wealth and/or goods. Exporting raw data from a community for the purpose of “processing” it into manufactured goods (i.e., books, articles, wealth, etc.) 2. Right of Access Colonial Power believes it has the right of access and use for its own benefit anything belonging to the colonised people. Scientist believes s/he has unlimited right of access to any data source and any information belonging to the subject population. 3. External Power Base The centre of power and control over the colonised is located outside the colony itself. The centre of knowledge and information about a people or community is located outside of the community or people themselves.
  • 8. Cultural challenges to the Scientific method – I am aware some quarters of the academic world will demand proof and corroborate evidence . I have none other than the fact that I am Samoan (Wendt, 1984) – Whoever controls research, controls knowledge (Maaka, 1999) – If the information of knowledge that comes out of the project is misused, it is them, not the study investigators who have to return to those communities and face the consequences” (Crengle and McCreanor, 2006)
  • 9. Treaty implications 1.Partnership refers to an ongoing relationship between those who have information and others Participation a principle which emphasises positive Mäori involvement in all decisions around information use Protection the principle whereby the Crown is obliged to actively protect Mäori interests, including information
  • 10. Information and the Treaty of Waitangi (Professional competencies) Beliefs: 1. Commitment to Te Tiriti o Waitangi 1. Supporting Maori rights, authority and status 2. Ensuring cultural safety 3. Self-determination by Maori to own pathways of healing
  • 11. Professional competencies cont’d Knowledge: 1. Knowledge of Te Tiriti o Waitangi 2. Describe social and historical factors affecting Maori 1. Understand rights of tangata whenua 2. Can describe impact of colonisation 3. Can describe social and economic factors affecting Maori
  • 12. Feminist perspectives Feminist perspectives questions socialisation and power structures. It is an approach that is primarily about experience and empowerment. It analyses the cultural and class assumptions that may influence information about women. It explores how information is used and dissemination that often perpetuates oppression and inequity. It alerts us to marginalisation or anthologising of all minority (not just women) groups’ experience and challenges assumptions.
  • 13. Implications for information use etc • Partnership, protection and participation • Motivation for and selection of questions carefully chosen • Purpose is critical and political • Research is non-hierarchical • Herstory(womyn’s stories ) are important • Share power in the methods and analysis • The importance of acknowledging bias
  • 14. Disability and information – Social model of disability – Who is a “knower”? – Who are the experts? No homogenous group – Lived experience of disability – Researchers often come from a sympathy point of view – Research must transform and is “emancipatory” – Enabling not disabling
  • 15. Implications for information use etc •Make sure it doesn't discriminate further •Power of words, verbatim useful in research and writing •Recruitment in research; a consumer group can’t speak for all •Ask: is disabled researcher powerful? •Move beyond medical models of anaylsis to what really matters
  • 16. Gay community – Queer research 10 years old – Gay/lesbian/transgender traditionally framed through Western eyes of pathology – Suppressed history – Language important eg transgender is transported from dominant culture – Have reclaimed label – Strong political, cultural and social group
  • 17. Ethnic communities • Traditionally research done “on” ethnic groups • Information gleaned from research findings: Who owns the findings? • It is ethically responsible to give feedback “Repeatedly in my research I have met people participating in research previously and not receiving feedback about the outcomes. This experience frequently makes people reluctant to be involved in other research” (Oliver, 1996.
  • 18. 4. Ethical issues – Codes of Ethics (DAPAANZ, NZAC, NZCCA, Ara Taiohi) – Power to manipulate and transform information – Use of names, faces etc – Consent process – Accessibility-web design etc – Can we trust sources? Can we advise clients based on information we gather?
  • 19. Ethics: what is right and correct Often an objective set of criteria (Code of Ethics) Information moves faster than rules can be formulated to govern it, how information is used may be left up to you with the guidance of your personal ethics
  • 20. Informed consent • Two central aspects: - Disclosure & free consent. • Origins of informed consent. • Informed consent requires a consent that is competent, knowing, and voluntary (Gillick 1985) • The process of informed consent: - ongoing. - Includes a discussion of the limits of confidentiality. - Organisational examples of ‘your health information, your rights’
  • 21. Are there limits to confidentiality?
  • 22. Limits to confidentiality are….. • Harm to self • Harm to others • Harm from others • Children/elderly • Court orders • Confidentiality is discussed at the beginning and reviewed/reminded regularly (if required) • Eg: confidentiality forms in agencies
  • 23. Duty to warn/protect – over-rides confidentiality •Self •Others •From others How do we decide on this?
  • 24. 5. Social issues Rate of technological advances Information (especially technology) to lift people out of poverty Implications for the increase use of Social Media eg Twitter, Facebook Media and personal invasion etc Social construction of information Sociology of how information is disseminated eg, whose interest is being served?
  • 25. Consider • How has the internet contributed to the democratization of knowledge production? • Should internet access in third world countries take priority over wealth creation? • How does the speed of information contribute to strengthening or challenging of the social order? Eg Arab Spring • Does filtering or monitoring software on computers assist with the social good or is it invasive ?
  • 26. 6. Legal issues – Code of Rights – Privacy Act (and Health Information Privacy Code ) – Release of Information – Copyright
  • 27. a. Code of Rights (1996) •Legislation includes provision of rules around information: confidentiality, informed consent •Code should be displayed in all health and disability agencies •Provision of a Disability Commissioner and Health and Disability Advocates
  • 28. b. The Privacy Act (1993) • The Act is primarily concerned with good personal information handling practices • The Act contains twelve information privacy principles dealing with collecting, holding, use & disclosure of personal information & assigning unique identifiers • The principles give individuals the right to access personal information and to request correction of it • The Privacy Act provided for provision of a Privacy Commissioner
  • 29. 12 principles Principle 1, Principle 2, Principle 3 & Principle 4 govern the collection of personal information. This includes the reasons why personal information may be collected, where it may be collected from and how it is collected Principle 5 governs the way personal information is stored. It is designed to protect personal information from unauthorised use or disclosure Principle 6 gives individuals the right to access information about themselves
  • 30. Principle 7 gives individuals the right to correct information about themselves. Principle 8, Principle 9, Principle 10 and Principle 11 place restrictions on how people & organisations can use or disclose personal information. These include ensuring information is accurate & up-to-date, & that it isn’t improperly disclosed Principle 12 governs how “unique identifiers” – such as IRD numbers, bank client numbers, driver’s licence and passport numbers – can be used.
  • 31. c. Health Information Privacy Code (1994) – This code sets specific rules for agencies in the health sector to better ensure the protection of individual privacy. The code addresses the health information collected, used, held and disclosed by health agencies.
  • 32. (i)Legal requirements for collecting and using information Consent Ethics approval for research •Copyright Rules at a glance: Copyright law defines "fair use" for copying for the purpose of criticism, review, news reporting, research or private study. Covered by WelTec licence
  • 33. Plagarism • Plagiarism rules at a glance: Wrongful appropriation," "close imitation," or "purloining and publication" of another authors "language, thoughts, ideas, or expressions," and the representation of them as one's own original work

Hinweis der Redaktion

  1. Whanau Ora
  2. Whanau Ora