Ethical Aspects of Employing a Weblog in Research

AUTHOR
M.J.Phythian, Dr N.B.Fairweather and Dr R.G Howley

ABSTRACT

As an instrument in an action research (AR) project to reveal the most suitable way of measuring delivery of e-government, Mick Phythian initiated and maintained a weblog. Employing an electronic medium chimed well with e-government research. The weblog in this instance also provided a ‘golden thread’ of continuity through the research, from establishment towards the end of the initial literature review, to being a promotional tool for the research, promoting best practice from academic and practitioner literature, along with hosting two questionnaires, and drawing comments from practitioners on relevant topics. The limited literature around using weblogs as research instruments focuses on describing their use in general or as research diaries. However, sufficient was found to encourage inclusion of the weblog within the ‘toolbox’ of research instruments employed. The weblog could be said to be a whole toolbox itself, acting as repository for questionnaires, feedback to the questionnaires, ethical information and information about future and past feedback sessions. The weblog shaped thinking about the proposed model, matters around metrics and e-government in general, without directing responses to questionnaires or interviews, a key issue when employing a weblog for research, as opposed to journalistic or personal reasons Some ethical issues around weblogs were raised by Rogerson (2006) but he focused on journalistic and personal weblogs, not weblogs focused on research. This paper explores ethical issues involved with weblogs that are research focused, and in particuar AR focused.

As with any tool, practice at posting on the weblog made using it easier. The main concern was then to provide interesting content. Sources of material came from reading a range of publications but setting up an automated newsfeed search brought up content both for the weblog and the research. The blogger, having an IT background and being responsible for a number of official websites, had experience in the technology but had not previously constructed a weblog. Implementation required consideration of design options to develop a site structure to deliver a relatively attractive but easy to maintain research tool. Also needed was provision for future questionnaires and other documents. A title of the “Great E-mancipator” for the research theme and weblog assisted focusing and styling the weblog.

The weblog was a launch pad for surveys, enabling the ethical preamble to be read, with supporting materials, and then the survey reached by those wanting to complete it. This follows Denscombe’s (2005, p.8) advice:

“research project Home Pages offer a voluntary, self-initiated means for dealing with the requirements of research ethics. They provide an eminently practical tool for ‘self-governance’ that addresses a public audience of a) potential participants, b) actual participants, c) other researchers.”

This added ethical value to the weblog from the outset. In addition, the weblog was convenient when encouraging responses, since postings promoted the survey, with later posts reporting initial feedback and thus prompting additional responses.

Being relatively novel, and one of a set of instruments, writing original posts and relevant responses was a challenge, whilst operating within standard research ethical guidelines to support successful research. This meant not breaking confidences revealed in meetings and maintaining neutrality when discussing different suppliers’ products.

In September 2008, the Municipal Journal online version, www.localgov.co.uk, took the weblog as an automatic RSS feed into their own list of bloggers, which included known commentators and a Member of Parliament. Mick Phythian was interviewed by localgov for their special regular section on citizen engagement, with links back to the weblog. The weblog homepage was updated on a regular basis and further links added, along with the ability to subscribe being used by a slowly increasing audience.

The weblog had been consistently monitoring news around the new national indicator, NI14, on “avoidable contact” and announcing the latest government papers about it as they appeared. Establishing a role as a “critical friend” of metrics attracted a small, regular audience of practitioners, academics and consultants with an interest in the field. Whilst not discovering direct answers to research questions by itself, it drew out the limited range of solutions on the market to recording both service user satisfaction and NI14. Weblog comments confirmed we were correct to determine a common and composite metric for use across multiple channels and services, along with the general difficulties presented by channel shift and costing, when channels are seen in isolation. Encouraging feedback, whilst providing either anonymity or protection of social capital could also be seen as an ethical challenge when collecting data, either directly through the weblog, or via the questionnaires and interviews.

This paper describes in more detail:

  • The process of developing the weblog, describing the ethical framework for this
  • The ongoing experience of writing a weblog for research and for promoting research and discussion of ethical issues faced and how these were reconciled within the live/ongoing research process.
  • Lessons learnt from employing the weblog that inform research ethics.
  • Ethical Implications for researchers using blogs and a consideration of how these may be addressed
  • Conclusions on the use of weblogs as research instruments and their ethical issues

REFERENCES

Denscombe (2005)

de Vries (2007)

Elo & Kyngas (2007)

Hookway (2008)

Krippendorff (1980)

Mayring (2000)

Murthy (2008)

Nahapiet & Ghoshal (1998)

Research Information Network (2010)

Rogerson (2006)

Weare & Lin (2000)

Wiles, Pain & Crow (2010)

Online Pornography – Isn’t It Time to Stop Being So Squeamish?

AUTHOR
Prof Andy Phippen

ABSTRACT

Online pornography is one of the last taboos for acadmeic research with little peer reviewed literature exploring the phenomenon. However, one cannot underestimate is social and economic impact. According to Ropelato (n.d.), the ‘pornography industry is larger than the revenues of the top technology companies combined: Microsoft, Google, Amazon, eBay, Yahoo!, Apple, Netflix and EarthLink’, yearning a worldwide revenue of $97.06 billion in 2006, where 25% of total daily search engine requests were for pornography, attracting 72 million visitors worldwide to pornography websites in this year. However, could one argue that research into the online pornography phenomenon is sadly lacking due to academic squeamishness or a failure to acknowledge it as a mainstream aspect of adult society?

Opinion on the social impact of online pornography is clearly divided, in both the little academic literature that exists on the subject, and discussion in the quality media. While conducting research for documentary ‘Hardcore Profits’, Tim Samuels discovered remote villages for example, Ghana, suffer consequences of porn (averypublicsociologist, 2009). It was the belief by local villagers that porn watched via mobile cinemas had increased rape occurrences and marital breakdowns. In the absence of sex education, young men follow suit having sex without using condoms and as a result, two men interviewed contracted HIV. We might suggest that there is a wider public health issue here for policy makers – if one’s only experience of “sex education” is online pornography, this may result in a distorted view of acceptable practice. However, is this the fault of the pornography industry, or government failures to provide effective sex education in their country?

The transmission of sexually transmitted disease also brings media attention to the industry, as reflected in a recent news story about an HIV positive actor in the US. In light of these incidents it could be argued that for the pornography to be deemed ethical, condoms should clearly be shown in use.

Toub (2010) reported that the director of the Feminist Porn Awards, Alison Lee, felt that although the porn industry believe viewers don’t want to see condoms used, however: ‘all it would take would for them to say we’re using condoms 100 percent of the time and viewers would get used to it’, therefore in her view, using condoms in porn would be accepted by consumers.

Many claim that heterosexual pornography showing women forced into sex acts by men objectifies women as genitals and sexualise women (Jones.C, 2004; Onne. A, 2009). Zillmann (1986) documented that men enduring prolonged exposure to heterosexual pornography influenced the likelihood of coercing women into unwanted sexual acts and committing rape (applies to those who have some degree of psychoticism). Zillmann identified other issues that emerged following experiments to test effects of prolonged consumption of heterosexual pornography. This includes discontent for the physical appearance and sexual performance of intimate partners and the opinion that habitual pornography consumers are at risk of becoming sexually callous and violent.

However, there are counter arguments that have a more “pro pornography” stance when considering its social impact. Marriott’s (2003) comments that Erotic Review film critics rarely think how, why and whether pornography is degrading to women; ‘we suspect that it might be degrading to everybody’. This could suggest that porn protesters, especially those who regard porn to degrade and objectify women, voice extreme views when actually, porn consumers understand they watch unrealistic material which is the purpose – to physically view fantasies for entertainment and pleasure. This reflects Neu’s (2002) argument, claiming that pornography is not supposed to reflect reality because it’s a fantasy, serving as a ‘safety valve’ for pleasure. Hoffman, 2008 conducted a documentary around the pornography industry and accepted the effect of all pornography, highlighting that, like any other entertainment such as sporting events, it perpetuates inaccurate ideas about how the audience can be in comparison to the characters.

Research undertaken at the University of Plymouth with a small group of adult consumers presents results that challenge of a lot of the “conventional wisdom” regarding the negative social impact of pornography. An online survey disseminated in January 2011 elicited 118 responses from mainly younger adults (over 85% aged between 18-24), with only 15 respondents saying they had never looked at pornography online. A gender split of roughly 50/50 male/female allowed an exploration of attitudes which challenged thinking that females viewed pornography as negative and detrimental to women.

In our sample, an almost equal number of females than males disagreed that pornography objectified women and while more of both genders did agree, more males “strongly agreed”. More females than males also disagreed that “regular exposure to pornography could increase the chance of consumers forcing others into unwanted sexual acts”, with the vast majority of our respondents disagreeing with this statement. However, there was more agreement that “regular exposure to pornography can lead to consumers desensitising sexual relationships” with a clear skew for the whole population agreeing with this statement. There was, again, no clear gender split.

It was also interesting to note that the majority of our respondents did not feel that watching pornography encouraged unsafe sex. Given our population was entirely UK based, this would support the earlier observation that pornography does not encourage unsafe se per se, however, if it is the only form of public education, it may.

One final area, which was the only attitudinal measure which did show a clear gender difference, was whether pornography should clearly show the use of condoms. The vast majority of our female respondents said they thought this should be the case, while over two thirds of males disagreed.

Respondents were also invited to comment if they disagreed with this statement. It was interesting to note that the comments of Hoffman (2008) were supported by a number of our respondents – generally they felt that pornography was “entertainment” or “fantasy” and therefore did not have to reflect sexual acts in the really world.

We would acknowledge that our initial results are presented from a relatively small sample size and are not immediately generalisable. However, our results do highlight the need for academic research in this area. Without a strong evidence base the stigma surrounded the phenomenon will remain as opinion will be presented as fact. Clearly our research shows a mature attitude in general to what some regard as part of mainstream adult Internet society. Perhaps the academic world, and its ethics committees, should cease its delicate sensibilities around the subject matter and engage in developing greater understanding of what is clearly viewed by many to be part of their adult lives.

REFERENCES

Averypublicsociologist (2009) Hardcore Profits [Online] Available: http://averypublicsociologist.blogspot.com/2009/09/hardcore-profits.html [Date accessed: 15 October 2010].

Hoffman (2008). 9to5: Days in Porn. Distributed by Media Entertainment GmbH (theatrical), Strand Releasing (DVD).

Jones, C. (2004) Porn – can you be an ethical consumer? [Online] Available: http://www.scarleteen.com/forum/Forum8/HTML/000786.html [Date accessed: 14 November 2010].

Marriott, E. (2003) Men and Porn [Online] Available: http://www.guardian.co.uk/world/2003/nov/08/gender.weekend7 [Date accessed: 5 October 2010].

Neu, J. (2002) An Ethics of Fantasy? Journal of Theoretical and Philosophical Psy, 22 (2), pp.133-157.

Onne, A. (2009) Review: The Sex Education Show vs. Pornography [Online] Available: http://www.thefword.org.uk/blog/2009/03/review_the_sex [Date accessed: 3 October 2010].

Ropelato, J. (n.d.) Internet Pornography Statistics [Online] Available: http://internet-filter-review.toptenreviews.com/internet-pornography-statistics-pg2.html [Date accessed: 25 November 2010].

Toub, M. (2010) How to revel in porn and feel good about it. [Online] Available from: http://www.theglobeandmail.com/life/family-and-relationships/how-to-revel-in-porn-and-feel-good- about-it/article1664172/ [Accessed: 28 October 2010].

Zillmann, D. (1986) Effects of Prolonged Consumption of Pornography [Online] Available: http://profiles.nlm.nih.gov/NN/B/C/K/V/_/nnbckv.pdf [Date accessed: 15 November 2010].

Is the ICT Infrastructure Future Proof ?

AUTHOR
Norberto Patrignani and Iordanis Kavathatzopoulos

ABSTRACT

The ICT infrastructure and its technological core are now becoming the critical infrastructures of our society. Our activities and processes are now relying on these platforms, they are now our social and business platforms. But are they sustainable? What are the (physical) limits to take into account when looking into the ICT future? Do the planet have enough resources to sustain the making, powering and wasting of all the electronic devices needed to support our social and business platforms in the future?

This paper addresses the issue of evaluating the environmental impact of ICT. Starting from the analysis of the sustainability of one of its most celebrated “laws”, the Moore’s law, we analyse its entire life-cycle, from “silicon-factories”, to their use in data centres, to the final destination of ICT products: recycling and reuse (trash ware) in the best case or, uncontrolled waste traffic towards poor countries with health hazards and environmental pollution, in the worst case.

We introduce a new dimension in the social and ethical analysis related to ICT: the future. What are the implications of this future ethics in ICT?

The Physical limits of ICT Infrastructure

ICT, the “cleanest” and the most “de-materialized” economy’s sector, is under scrutiny by environmental advocacy organizations [Greenpeace, 2010]. ICT contribution (production, power supply) to greenhouse gas production (CO2, etc.) is becoming significant and reaching the same level of airlines (close to 3% of total CO2) [Gartner, 2007].

Our computers are based on silicon chips but their production process has one of he highest impact in the industry: for producing a DRAM (of 2g of weight) we need about 1,7 Kg of fossil fuels and chemicals, a “material intensity” of 850:1, probably the highest in all industries (cars manufacturing has a material intensity of 2:1) [SVTC, 2007].

About workers in these chip factories: the first warning was the results of the first study about the health conditions of “semiconductor workers”. They had an illness rate 200% higher than other workers and the women’s miscarriage rate was 40% higher. This was the first sign that the high-tech revolution carries a high price for health, the environment and sustainable economic development. Chip manufacturing requires vast resources and is based on several toxic hazards during its lifecycle, from design and production (then to disposal) [SJMN, 1985].

Probably the Moore’s law [Moore, 1965] is one of the best examples of the so called “magnificent and progressive” goals of technology trends, described by the doubling of the number of transistors on an integrated circuit every eighteen months. From the first microprocessor Intel 4004 (based on about 103 transistors), to the last generations of chips (Intel-Itanium, with more than 109 transistors), this “law” was valid. But what about its sustainability? A recent study of Yale University showed the limits of Moore’s law due to material consumption: “Our high-tech products increasingly make use of rare metals, and mining those resources can have devastating environmental consequences… The processing capacity increase … is enabled by an expanded use of elements … computer chips made use of 11 major elements in the 1980s but now use about 60 (two-thirds of the periodic table!)” [Schmitz, Graedel, 2010]. Most of these elements are the so called rare-earths and the largest mines are now concentrated in China (see fig.1). This has important implications also at international and political level [Pumphrey, 2011].
FutureProof_fig1
The Moore’s law has consequences also on the speed of “gadgets” consumption: new products emerge constantly, they are faster, smaller, cheaper and smarter; but each new wave of innovation in electronics technology introduces new materials and pushes last year’s obsolete gadgets and machines into the waste-basket [WSJ, 2004]. Innovation is the hallmark of ICT industry, but we should also start very quickly to think about its sustainability. This recall the electronic sustainability commitment of “Soesterberg principle”: “Each new generation of technical improvements in electronic products (Moore’s law) should include parallel and proportional improvements (@Moore’s law) in environmental, health and safety, as well as social justice attributes” [Soesterberg, 1999].

Future Ethics

Computer scientists and professionals have difficulties in dealing with long terms consequences of their research and projects, in particular when dealing with moral imperatives defined for the welfare of future generations of humans or for the planet. When we miss the direct interactions with the consequences of our actions it is very difficult to get feedback and change our directions. One of the first researchers studying the ethical challenges introduced by technological developments was Hans Jonas in its Imperative of Responsibility: “Human survival depends on our efforts to care for our planet and its future … act so that the effects of your action are compatible with the permanence of genuine human life” [Jonas, 1984].

How can we develop a new stage of ethics, an ethics that will inform our decisions when the consequences of our acts are so distant in the future? This is the central problem of the so called “future ethics”: the rational acceptance of a norm doesn’t automatically guarantee the action or behaviour according to the norm [Birnbacher, 2006].

Conclusions

ICT offers a number of opportunities for the achievement of global sustainability by economic benefits (value creation, employment, government revenues, etc.), for industrialized countries (eco-efficiency enhancing applications, substitution of transport and buildings by teleworking, videoconferencing, e-business, etc.), and for developing countries (economic development, implementation of poverty alleviation strategies) [WSIS, 2003], but on the other hand we must be aware that ICT products can have adverse environmental and social impact by consuming elements that are becoming scarce, lowering the working conditions in the manufacturing phase, consuming energy in the use phase and growing the e-Waste problem.

This double face of ICT rise ethical dilemmas in the field of “future ethics” where the contributions of philosophers like Jonas or Birnbacher will helps us in analysing the dilemmas introduced by ICT towards the future.

If we want a more reliable ICT social and business platform we should start also pointing our glasses towards the future ethical dilemmas.

REFERENCES

– Birnbacher D., (2006), “What motivates us to care for the (distant) future?”, N° 04/2006 Gouvernance Mondiale

– Gartner (2007), Gartner Estimates ICT Industry Global CO2 Emissions, 2007

– Greenpeace (2010), Guide to Greener Electronics, October 2010

– Jonas H. (1984), “The Imperative of Responsibility: In Search of Ethics for the Technological Age”, University of Chicago Press, 1984

– Moore G.E. (1965), Cramming more components onto integrated circuits, Electronics Magazine, 19 April 1965

– Pumphrey D., Ladislaw S.O., Hyland L. (2011), “Energy and Environment in the Barack Obama–Hu Jintao Meeting”, Center for Strategic and International Studies, csis.org, January 2011

– Schmitz O.J., Graedel T.E. (2010), “The Consumption Conundrum: Driving the Destruction Abroad”, e360.yale.edu, April 2010

– SJMN (1985), San Jose Mercury News, “High Birth Defects Rate in Spill Area”, January 17, 1985

– Soesterberg (1999), Trans-Atlantic Network for Clean Production Meeting, Soesterberg, The Netherlands, May 1999

– SVTC (2007), Silicon Valley Toxics Coalition, October 2007

– UN-WSIS (2003), Geneva Declaration of Principles, World Summit on Information Society

– WSJ (2004), “e-Waste, the world’s fastest growing and potentially most dangerous waste problem”, Wall Street Journal, September 23, 2004.

The Adventures of Picciotto Roboto: AI & Ethics in Criminal Law

AUTHOR
Prof. Ugo Pagallo

ABSTRACT

In their 2007 Ethicomp paper, Reynolds and Ishikawa proposed three possible examples of criminal robots:

I) Their first hypothesis was “Picciotto Roboto.” The field pertains to robotic security guards as the Sohgo Security Service’s Guardrobo marketed since 2005. The case concerns a security robot participating in a criminal enterprise as a bank robbery. “As such, it seems that the robot is just an instrument just as the factory which produces illegal products might be. The robot in this case should not be arrested, but perhaps impounded and auctioned” (Reynolds and Ishikawa, 2007);

II) The second scenario is given by the “Robot Kleptomaniac.” Here, the machine has free will and self-chosen goals, so that it plans a series of robbery of batteries from local convenience stores, the aim being to recharge its batteries. Leaving aside the responsibilities of designers and producers of such robots, it is possible to claim that the unlawful conduct of the robot depends on – and is justifiable on the basis of – what is mandatory for survival. In any event, “the robot ultimately chooses and carries out the crime” (Reynolds and Ishikawa, 2007);

III) The final hypothesis is no longer a matter of imagination: the Robot Falsifier. In the mid 1990’s, the Legal Tender project claimed that remote viewers can tele-operate a robotic system to physically alter “purportedly authentic US $ 1000 bills” (Goldberg et al., 1996).

Interestingly, in How Just Could a Robot War Be?, Peter Asaro seriously assumes the hypothesis of the “Robot Kleptomaniac,” by envisaging autonomous robots that challenge national sovereignty, produce accidental wars or even make revolutions. In fact, once we admit the existence of a robot that chooses and carries out the criminal action, it necessarily follows that “autonomous technological systems might act in unanticipated ways that are interpreted as acts of war” and, moreover, they may “begin to act on their own intentions and against the intentions of the states who design and use them” (Asaro, 2008). As a result, new types of crime could emerge with robots accountable for their own actions: for example, in Criminal Liability and ‘Smart’ Environments (2010), Mireille Hildebrandt examines a machine that “provides reasons for its behaviours [in that] it has developed second order beliefs about its actions that enable itself as their author.” The self-consciousness of the robot not only materializes Sci-Fi scenarios as imagining a robot revolution and, hence, a new cyber-Spartacus. What is more, in the phrasing of James Moor (1985), the “logical malleability” of robots would end up changing the meaning of traditional notions such as stealing and assaulting, because the culpability of the agent, i.e., its mens rea would be rooted in the artificial mind of a machine “capable of a measure of empathy” and “a type of autonomy that affords intentional actions” (Hildebrandt, 2010). Today’s state-of-the-art in technology, however, suggests to go back to the case of “Picciotto Roboto” rather than insisting on the adventures of “Robot Kleptomaniac.” Although “many authors point out that smart robots already invoke a mutual double anticipation, for instance generating protective feelings for Sony’s robot pet for AIBO” (Hildebrandt, 2010), it seems more profitable to revert to the terra cognita of common legal standpoints that exclude robot criminal-accountability. For the foreseeable future, indeed, robots will be held legally and morally irresponsible because they lack the set of preconditions for attributing liability to someone in the case of violation of criminal laws. Since consciousness is a conceptual prerequisite for both legal and “moral agency” (Himma, 2007), the standard legal viewpoint claims that even when, say, Robbie CX30 assassinated Bart Matthews in Richard Epstein’s story on The Case of the Killer Robot (1997), the homicide remains a matter of human responsibility, because robots are not aware of their own conduct like ‘wishing’ to act in a certain way. Whether the fault is of the Silicon Valley programmer indicted for manslaughter or of the company, Silicon Techtronics, which promised to deliver a safe robot, it would be meaningless to put poor Robbie on trial for murder.

Still, there is no need to evaluate robots with Turing tests so as to admit a new generation of criminal cases involving human (legal and moral) responsibility and even robots’ moral accountability (as in Floridi and Sanders, 2004). In order to highlight this transformation, it is crucial to address the new responsibilities for Picciotto Robotos that participate or are employed in criminal enterprises, in that robots affect standard legal notions as ‘causality’ and human ‘culpability.’ As the field of computer crimes has shown since the first 1990’s, robots induce a “policy vacuum” (Moor, 1985), for the increasing autonomy and even unpredictability of their behaviour alter the conditions on which the principle of human responsibility is traditionally grounded. Some speak of a “failure of causation” due to the impossibility of attributing responsibility on the grounds of “reasonable foreseeability,” since it would be hard to predict what types of harm may supervene (Karnow, 1996). Others stress “strong moral responsibilities” that software programmers and engineers now have for the design of AAAs, i.e., autonomous artificial agents (Grodzinsky, Miller and Wolf, 2008). Besides a new generation of cases, such as a “semiautomatic robotic cannon deployed by the South African army [which] malfunctioned, killing 9 soldiers and wounding 14 others” in October 2007 (Wallach and Allen, 2009), it is necessary to address both legal and ethical issues of this deep transformation, by paying attention to the ways responsibility should be apportioned between designers, producers, and users of increasingly smarter AAAs.

REFERENCES

Asaro, P. (2008,) How just could a robot war be?, Frontiers in Artificial Intelligence and Applications, 75, 50-64;

Epstein, R. G. (1997), The case of the killer robot, New York, Wiley;

Floridi, L., and Sanders, J. (2004), On the morality of artificial agents, Minds and Machines, 14(3): 349-379;

Goldberg, K., Paulos, E., Canny, J., Donath, J. and Pauline, N. (1996), Legal tender, ACM SIGGRAPH 96 Visual Proceedings, August 4-9, New York, ACM Press, pp. 43-44;

Grodzinsky, F. S., Miller, K. A., and Wolf, M. J. (2008), The ethics of designing artificial agents, Ethics and Information Technology, 10: 115-121;

Hildebrandt, M. (2010), Criminal liability and ‘smart’ environments, Conference on the Philosophical Foundations of Criminal Law at Rutgers-Newark, August 2009;

Himma, K. E. (2007), Artificial agency, consciousness, and the criteria for moral agency: what properties must an artificial agent have to be a moral agent?, 2007 Ethicomp Proceedings, Global e-SCM Research Center & Meiji University, pp. 236-245;

Moor, J. (1985), What is computer ethics?, Metaphilosophy, 16(4): 266-275; Reynolds, C. and Ishikawa M. (2007), Robotic thugs, 2007 Ethicomp Proceedings, Global e-SCM Research Center & Meiji University, pp. 487-492;

Wallach, W. and Allen, C. (2009), Moral machines: teaching robots right from wrong. New York: Oxford University Press.

Use of Social Networks and communication

AUTHOR
Marta Oyaga Serrano

ABSTRACT

When a computer network connects people or organizations it’s a social network. Just as a computer network is a set of machines connected by a set of cables, a social network is a set of people (or organizations or other social entities) connected by a set of social relations such as friendship, co-working or information exchange. Many researchs about how people use computer-mediated communication (CMC) have concentrated on how individual users interface with their computers, how two persons interact on-line, or how small groups function on-line. As widespread communication via computer networks develops, the analysts need to go beyond studying single users, two-person ties, and small groups to examining the computer-supported social networks (CSSNs) that flourish in areas as different as the workplace and virtual communities. This paper describes the use of the social network approach for understanding the interplay between computer networks, CMC, and social processes.

Social network analysis focuses on patterns of relations among people, organizations, states… and that’s the reason why the analysts try to describe networks of relations as much as possible, the flow of information (and other resources) through them, and discover what effects these relations and networks have on people and organizations.This research approach has rapidly developed in the past twenty years, principally in sociology and communication science. Also, they treat the description of relational patterns as interesting in its own right – e.g., is there a core and periphery?– and examine how involvement in such social networks helps to explain the behavior and attitudes of network members– e.g., do peripheral people send more e-mails and do they feel more involved? They use a variety of techniques to discover a densely-knit clusters and to look for similar role relations. When social network analysts study two-person ties, they interpret their functioning in the light of the two persons’ relations with other network members. This is a quite different approach than the standard CMC assumption that relations can be studied as totally separate units of analysis. “To discover how A, who is in touch with B and C, is affected by the relation between B and C… demands the use of the [social] network concept” [Barnes, 1972, p. 3].

Related with the information about social networks is necessary to say that is gathered by questionnaires, interviews, diaries, observations and more recently through computer monitoring. In both whole and ego-centered network studies of CMC, people are often asked to identify the frequency of communication with others as well as the medium of interaction. Questions may refer to a specific relational content such as “socialize with” or “give advice to” within a given time frame. The most typical question in the studies of communication patterns is thinking about each member of their team and to identify the means of communication for each type of relation. For example, members can give an account of their work communication with each person in unscheduled face-to-face meetings, scheduled face-to-face meetings, by telephone, fax, paper letters or memos, videoconferencing, etcetera.

There are times when the social network itself is the focus of attention. If we term network members egos and alters, then each tie not only gives egos direct access to their alters, but also indirect access to all those network members to whom their alters are connected. Indirect ties link in compound relations (e.g., friend of a friend) that fit network members into larger social systems The social network approach facilitates the study of how information flows through direct and indirect network ties, how people acquire resources and how coalitions and cleavages operate.

Although a good deal of CMC research has investigated group interaction on-line, a group is only one kind of social network, one that is tightly-bound and densely-knit. The whole relations doesn’t fit neatly into tightly-bounded solidarities. Indeed, limiting descriptions to groups and hierarchies oversimplifies the complex social networks that computer networks support.

Because computer networks often are social networks, the social network approach gives important leverage for understanding what goes on in computer-mediated communication: how CMC affects the structure and functioning of social systems (be they organizations, workgroups or friendship circles) and how social structures affect the way computer-mediated communication is used.

Initial studies of computer mediated-communication developed from studies of human-computer interactions. Such studies focused on how individuals interfaced with various forms of “groupware”: software and hardware adapted for computer-mediated communication. The obvious analytic expansion beyond the individual has been to the tie, e.g., how two persons interact through CMC. Not only is this a natural expansion, it is analytically tractable, and it has fit the expertise of those social scientists who have pioneered CMC research: psychologists and psychologically-inclined communication scientists and information scientists.

A need for new ways of analyzing CMC has developed with the spread of computer networks and the realization that social interactions online are not simply scaled-up individuals and ties. Analysts want to know how third parties affect communications, how relations offline affect relations online, and how CMC intersects with the structure and functioning of social systems. For example, have organizations flattened their hierarchy, are virtual communities rebuilding social trust online, and have personal attributes become less relevant on the Internet where “nobody knows you are a dog”. Given the network nature of computer-mediated communication, the social network pproach is a useful way to address such questions.

Online privacy and culture: A comparative study between Japan and Korea

AUTHOR
Yohko Orito, Eunjin Kim, Yasunori Fukuta and Kiyoshi Murata

ABSTRACT

Since its early stage, B to C e-commerce has been accompanied by the concerns of a wide range of individual users over misuse of their personal information and an invasion of the right to information privacy. Despite the tremendous advancement and widespread availability of security technology to protect the right such as public-key cryptography and the enactment and/or revision of relevant legislation for personal information protection, the concern has still remained to exist in the mind of a broad range of people.

As a way of addressing the concern, a large majority of B to C e-commerce sites post their privacy policies online. It is alleged that online privacy policies function as tools to engender consumers’ trust in online businesses [Doherty, 2001; ECOM, 2008]. It may intuitively be plausible that cultivating customers’ trust in B to C e-commerce companies through publicising privacy policies on their websites is critical for them because of their indispensable collection, storage and use of personal data and of extremely limited opportunities of face-to-face interaction with customers. Simultaneously, if online privacy policies provide individual users with enough information to correctly evaluate trustworthiness of B to C e-commerce sites, individuals can enjoy online shopping without any concern about the violation of their privacy.

However, awareness of the importance of protecting personal information and the right to privacy is inevitably affected by socio-cultural circumstances surrounding B to C e-commerce and any Net-based business necessarily has a global nature. Analysis of the effectiveness of online privacy policies while taking into account local socio-cultural factors and cross-cultural studies on it are thus significant for protection of the right to information privacy and construction of trustworthy B to C e-commerce environment.

In order to undertake this research subject, Orito et al. [2008] conducted a questionnaire survey in April 2008. The 416 valid responses to the survey provided material for a preliminary study of the awareness about online privacy of young Japanese people as customers of B to C e-commerce sites. However, the survey results contained seemingly contradictive responses. For example, more than half of the respondents who acknowledged the importance of online privacy policies when purchasing something online did not actually read the policies very frequently and were not sure if B to C e-commerce companies complied with their own online privacy policies. Even though more than 70% of the respondents answered that they did not know what the right to privacy was, almost all the respondents believed that protection of the right to privacy was “very important” or “important”.

The analysis of these interesting results based on Japanese socio-cultural characteristics reminded the authors of the necessity and importance of taking a step towards cross-cultural studies. In summer 2009, a research project of a comparative study on online privacy between Japan and Republic of Korea was launched. Korea is geographically closed to Japan and has long, complex cultural and historical relationships with the country. The both nations are located in Sinosphere and share the tradition of Confucianism, but Confucian values, culture and customs remain in Korean lifestyles far more strongly than in Japanese ones as shown in Korean people’s respectful attitude towards their elders and the restriction on marriage and adoption based on the rule of Bon-gwan (??; ??). On the other hand, the percentage of Christians including both Catholics and Protestants in the population is nearly 30% (nearly 70% of those who declare their religious affiliation) in Korea, while less than 1% in Japan where most people consider they don’t have any specific religious belief.

After the World War II, Japan achieved a miraculous economic recovery driven chiefly by heavy and chemical industries. While suffering from the after-effects of the collapse of the bubble economy occurred in 1989, the Japanese government adopted a series of “e-Japan” strategies from 2001 designed to prepare the nation for the rapid and drastic changes in socio-economic structure caused by the development and spread of IT and to create an advanced information and telecommunication network society, which resulted in a highly sophisticated broadband network infrastructure throughout the country. Korea, on the other hand, experienced swift economic growth in the 1960s and 70s referred to as the “Miracle on the Han River” during which the two Korean giants, Samsung and Hyundai, laid their foundations. Getting over the “IMF Crisis” in 1997, the Korean government put forth policies to forge an IT nation and promoted the diffusion of the Internet. Consequently, the penetration rate of the Internet has reached nearly 80% in Korea. Although the both countries are now the world’s leading IT nations, the ways of regulating individual users’ online behaviour show a striking contrast between the two nations. For example, in Korea, Net users are legally obligated to use their real names when they post comments on portal sites or media sites to which an average of more than or equal to a hundred thousand users access a day [Chiyohara, 2010]. There is not such regulation in Japan.

Considering the similarities and differences in socio-cultural settings between the two countries, the cross-cultural study promises to provide fruitful findings to the research project. A survey using the questionnaire Orito et al. (2008) developed was conducted at Kyonggi University in Suwon, Korea in May 2010 and collected 205 valid responses.

There were significant differences in responses to the 10 questions out of the 21 questions in the questionnaire between the two samples. For example, the Korean respondents understand the concept of the right to privacy more than the Japanese ones, whereas the Japanese awareness that privacy policies are posted on B to C e-commerce sites was higher than the Korean one. There was no significant difference in recognition of the importance of protecting the right to privacy between the two nations. The survey results are analysed based on socio-cultural characteristics of Japan and Korea to provide useful findings for the advancement of the research, geographical scope of which will be expanded to other regions including European and Islamic countries in the future.

REFERENCES

Chiyohara, R. (2010), Cyber-violence and cyber-contempt, Journal of Information and Management, Vol. 30, No. 3, pp. 88-98 (in Japanese).

Doherty, S. (2001), Keeping data private. Available online at http://www.networkcomputing.com/1213/1213ws1.html (accessed on 15th July 2009).

Next Generation Electronic Commerce Promotion Council of Japan (ECOM) (2008), Survey on Privacy Policy and Other Similar Statements on Websites (in Japanese). Available online at http://www.ecom.jp/report/guideline_20080826.pdf (accessed on 20th June 2009).

Orito, Y., K. Murata, Y. Fukuta, S. McRobb and A. A. Adams (2008), Online privacy and culture: Evidence from Japan, Proceedings of ETHICOMP 2008, pp. 615-622.