Panagiotis Koilakos

Associate Operational Data Management Officer, UNHCR

MSc in Data Science - Research Methods and Professional Practice

In general

"Malicious Inputs to Content Filters": Initial Case Study Analysis

 The ACM case study on "Malicious Inputs to Content Filters" (ACM, N.D.) examines the case of "Blocker Plus", a company implementing content filters to ensure compliance of educational institutions with the Children's Internet Protection Act (CIPA). The company implemented machine learning algorithms in an attempt to avoid the labour-intensive task of maintaining a list of keywords and websites to block. The implemented system was exploited, resulting in content not directly failing under the CIPA provisions to be blocked. The present text will explore the case study by comparing it with the ACM Code of Conduct (ACM, 2018), the BCS Code of Conduct (BCS, 2022) as well as the revised CIPA (American Library Association, 2010) under the assumption that both ACM and BCS codes are binding for the company.

 With 54% of children under 13 having seen sexual content online (30% having seen sexual content online at school) (Common Sense, 2022) and almost half of children having seen harmful content online (Weale, 2022), CIPA provides provisions for the protection of minors while using the internet. To this extent, the act attempts to regulate content that is taken as obscene, child pornography or content considered harmful to minors, such as nudity, or that "lacks serious literary, artistic, political, or scientific value" (American Library Association, 2010).

 The actions and omissions of the company resulted in content that is considered of "literary, artistic, political, or scientific value" being blocked and specific groups being discriminated against. Apart from the company's moral obligations, this also resulted in ethical violations based on the two aforementioned Codes of Conduct. Under Articles 1.2 and 1.4, ACM instructs members to "Avoid Harm" and "Be fair and take action not to discriminate". Having no access to scientific information about vaccinations (being one the top most searched terms in 2020), the global warming effect (being an increasingly searched term), and matters such as homosexual weddings being censored violates the two above provisions (Google Trends, 2023).

 Moreover, the company failed to adequately review the developed system, as instructed by article 2.4 of the ACM Code of Conduct, lacked appropriate system impact evaluation as per article 2.5 and demonstrated a lack of public information provision about the wrong filtering, possible mitigation measures and system limitations, as per Article 2.7. At the same time, the proven system exploitation showed a lack of appropriate risk analysis and technological measures, directly violating Article 2.9, which states, "In cases where misuse or harm are predictable or unavoidable, the best option may be to not implement the system.", especially when considering the refusal of the company to roll-back to the previous system used after identifying the severe issues of the newly implemented system. The fact that the implemented system directly impacted society and the education system, and considering the strong indications of lack of adequate pre-implementation review, resulted in the violation of Article 3.7 as the company failed to "Recognize and take special care of systems that become integrated into the infrastructure of society". All of the above led directly to a violation of Article 4.1. as the company failed to uphold several vital parts of the Code, severely impacting the education system.

 Similarly, when comparing the actions and omissions of the company with the BCS Code of Conduct, we can find several direct violations. Even though the actions of the company had to be aligned with quotation 1.a. (considering that the company was implementing a CIPA compliance system), the company showed disregard for environmental matters by allowing censorship of the term climate change and failed to uphold the public interest by discriminating based on sexual orientation and gender identity. Moreover, not following CIPA provisions showed a lack of understanding of quotation 2.d., by effectively failing to comply with the legislation, and failed to uphold the no-harm principle as per quotation 2.f. Additionally, it showed a lack of due care, as otherwise required by article 3.a. and failed to take responsibility for its omissions as per article 3.c. of the same.

 Finally, one should consider that the Codes of Conduct mentioned above, even though binding, are not necessarily strict legal documents, and thus, they may be open to interpretation. Similarly, CIPA can be open to interpretation when we consider both the lawmaker's intent and the sense of justice and present norms in a society. Having said that, even though in-home/private content filtering may not be able to be regulated, having in mind the freedom of speech and opinion and possible internet censorship (McCarthy, 2004), it is apparent that both the actions as well as the omissions of the company resulted in several forms of discrimination (in direct violation of article 1.4 of ACM Code of Conduct against discrimination), and resulted in actual internet censorship, by limiting content which is of "literary and scientific value" and thus being against the provisions of CIPA.

 To sum up, the company should have taken actions to avoid discriminatory filtering by utilizing subject-matter experts and adequate testing before releasing the machine learning models in a production environment (Articles 1.2, 1.4, 2.4, 2.5, 2.7 of ACM Code of Conduct and Citations 2.d., 2.f of BCS Code of Conduct), have measures in place to avoid misuse and exploitation of their system and underlying algorithms (Article 2.9 of ACM Code of Conduct) and have fall back plans in place. Moreover, the company showed complete and utter disregard after the issues had been identified, thus being in direct violation of articles 3.7 and 4.1 of the ACM Code of Conduct, quotations 3.a and 3.c of the BCS Code of Conduct and most notably with the provisions of CIPA.

Back to contents

ACM. (N.D.) Case: Malicious Inputs to Content Filters. Available from: https://ethics.acm.org/code-of-ethics/using-the-code/case-malicious-inputs-to-content-filters/ [Accessed 14 August 2023]

ACM. (2018) ACM Code of Ethics and Professional Conduct. Available from: https://www.acm.org/code-of-ethics [Accessed 14 August 2023]

BCS. (2022) CODE OF CONDUCT FOR BCS MEMBERS. Available from: https://www.bcs.org/media/2211/bcs-code-of-conduct.pdf [Accessed 14 August 2023]

American Library Association. (2010) The Children's Internet Protection Act (CIPA). Available from: http://www.ala.org/advocacy/advleg/federallegislation/cipa [Accessed 14 August 2023]

Common Sense. (2022) Teens and Pornography. Available from: https://www.commonsensemedia.org/sites/default/files/research/report/2022-teens-and-pornography-final-web.pdf [Accessed 14 August 2023]

Weale, S. (September 29, 2022) Almost half of children in England have seen harmful content online – survey. The Guardian. Available from: https://www.theguardian.com/society/2022/sep/29/almost-half-of-children-in-england-have-seen-harmful-content-online-survey [Accessed 14 August 2023]

Google Trends. (2023) Google Trends. Available from: https://trends.google.com/trends/ [Accessed 14 August 2023]

McCarthy, M. (2004) Filtering the Internet: The Children's Internet Protection Act. Educational Horizons 82(2): 108-113. Available from: http://www.jstor.org/stable/42927138 [Accessed 14 August 2023]


"Malicious Inputs to Content Filters": Summary

Based on peers' responses

 The ACM case study on "Malicious Inputs to Content Filters" (ACM, N.D.) which examines the case of the company "Blocker Plus" and their product of web content filtering, has been analyzed in terms of technical, ethical and legal compliance. During the said analysis (Koilakos, 2023), several compliance issues have been found, some being legal, such as non-compliance with CIPA based on the law's intent, and others being ethical, based both on the ACM's Code of Conduct (ACM, N.D.) and the BCS' Code of Conduct (BCS, 2022).

 Apart from the company's violations, the analysis provided mitigation recommendations, such as utilizing subject-matter experts and testing adequately before the software's roll-out. In addition to that, leveraging the "power of the many" is another approach during which the company would make the algorithm and design ideas publicly available and transparent to the general audience (or to a limited audience - to ensure that their intellectual property is safeguarded), possibly allowing them to identify flaws early on (Kanakavelu, 2023). Another element that the company could have used is the implementation of a risk assessment, during which they would "consider the risks of harm or misuse before implementing the system" (Biswas, 2023).

 Overall, the company showed complete and utter disregard for the possible (and actual) misuse of their system, failed to balance the equities between automation and the public good and did not utilize any of the available design principles or mitigation measures available to them.

Back to contents

ACM. (N.D.) Case: Malicious Inputs to Content Filters. Available from: https://ethics.acm.org/code-of-ethics/using-the-code/case-malicious-inputs-to-content-filters/ [Accessed 28 August 2023]

ACM. (N.D.) ACM Code of Ethics and Professional Conduct. Available from: https://www.acm.org/code-of-ethics [Accessed 28 August 2023]

BCS. (2022) CODE OF CONDUCT FOR BCS MEMBERS. Available from: https://www.bcs.org/media/2211/bcs-code-of-conduct.pdf [Accessed 28 August 2023]

Koilakos, P. (2023) Initial Post. Available from: https://www.my-course.co.uk/mod/forum/discuss.php?d=177795 [Accessed 28 August 2023]

Kanakavelu, N. (2023) Re:Initial Post. Available from: https://www.my-course.co.uk/mod/forum/discuss.php?d=177795 [Accessed 28 August 2023]

Biswas, S. (2023) Re:Initial Post. Available from: https://www.my-course.co.uk/mod/forum/discuss.php?d=177795 [Accessed 28 August 2023]


Reflective activity - Ethics in Computing

Abstract

 In conclusion, ethics shall be in the main picture of computing and not be considered a secondary duty. With technology continuing to evolve, ethical dilemmas are expected to become more complex, as can also be seen through the increased ethical concerns of every subsequent industrial revolution. Concerning data-related computing ethics and the involvement of people with specific needs in humanitarian contexts, addressing such challenges requires organisations and professionals to think outside of silos, and it needs a collective effort that involves ethicists, humanitarians, policymakers, computing and data professionals as well as the population of concern. It is only through dialogue, public consultation, strict oversight and enforcement, professionalism and commitment to upholding the ethical principles that we can ensure that the third and fourth industrial revolutions will not be overshadowed by harm to society and that humanity will thrive and enjoy the benefits of the innovation and prosperity that computing has to offer.

View embedded Download and View PDF file
Back to contents

Literature Review Guiding Questions

Guiding questions to support planning, revising, and refining of a literature review as provided by the University of Essex

Q: What is the focus and aim of your review? Who is your audience?
 A: Our literature review has the subject of "How can technology be used to raise awareness on the protection of refugees?".
 Starting from the target audience, our literature review targets a broad spectrum of target groups, mainly revolving around the general public. Other target groups include humanitarian organisations, non-governmental organisations and human rights advocates while it aims to reach policymakers. The audience, already familiar with our subject, shares the concern about adequately protecting refugees and upholding their rights, while they have a shared interest in raising awareness and driving change.
 As technological advancements continue changing and revolutionising various aspects of our lives, we must explore how these innovations can be used in intersection with advocating for refugee rights. The aim of the literature review is bi-fold: To identify and analyse the existing technological interventions that have been and are currently used for the cause mentioned above, and, to bring together tech professionals, humanitarian workers, and the public to collaborate on how technology can be at service of advocacy for refugee rights.


Q: Why is there a need for your review? Why is it significant?
 A: Technology's rapid evolution presents challenges and opportunities for addressing global humanitarian crises. Among these crises, the rights of refugees stand as one of the most urgent, with millions displaced in perilous situations. Public awareness of refugee rights remains somewhat limited in many layers of society. Given the evolution of technology, as mentioned above, and its potential benefits, the question of how technology can raise awareness for refugees' rights emerges.
 The proposed literature review is significant for various reasons, such as providing systematic pathways and discipline-related knowledge on the use of technology for advocacy purposes and understanding of current efforts and practices, looking into the emerging technologies which might not have been utilised for advocacy reasons yet, despite their potential, but also highlighting associated risks taking into consideration the sensitive nature of the population of concern, due to their legal and physical protection status.


Q: What is the context of the topic or issue? What perspective do you take? What framework do you use to synthesise the literature?
 A: The ever-increasing number of displaced people fleeing war and persecution is one of our time's most pressing humanitarian challenges. The context for our literature review is to provide clarity on the intersection of technological advancements and refugee advocacy.
 Our working assumption is that technology possesses the power to reshape negative narratives and raise awareness. For this reason, we approach the literature review as an interdisciplinary topic of humanitarian interventions and technological capability.
 We follow a hybrid approach between the traditional and systematic literature review frameworks. The workflow starts by categorising the main technological interventions (e.g. communication, virtual reality, AI, etc.) and further analysing relevant literature in terms of theory and real-world examples with a particular interest in advocacy usages. Through this workflow, we aim to achieve a complete understanding of the technological usage regarding advocacy causes and, furthermore, identify gaps, opportunities and risks.


Q: How did you locate and select sources for inclusion in the review?
 A: The process of locating and selecting resources for the literature review has been following both an academic approach and an applicable-practice approach. We begin by reviewing generic information from organisations dealing with refugee-related issues. At the same time, we search through Google Scholar for journals and other articles for scholarly literature related to technology, advocacy and human rights.
 Depending on the specific issue that we were researching (e.g. social media and advocacy, technology and ethics, etc.), we used a combination of keywords such as "social media", "advocacy" "refugee rights", "awareness", and "risks". Preference was given to the most recent articles and articles from academic sources. In parallel, we dived into information provided by the UN, INGOs and technology organisations related to advocacy. Organisations such as IOM, UNHCR and the UN have been of particular interest.
 The process above ensures that the list of sources is credible. Resources were further evaluated regarding relevance and contribution to the literature review subject. The followed methodology provided the complete picture of the studied matter by combining followed practice, academic research, criticality and applicability.


Q: How is your review structured?
 A: The structure of this review is planned from generic to specific. Starting from generic information, we indicate trends in technology usage to highlight its importance in everyday life, and we continue by displaying basic metrics of displacement and the connection of technology with inequalities. Moving to the more specific content, we connect technologies such as social media and VR with the advocacy and awareness-raising cause while discussing specific ethical and implementation concerns.


Q: What are the main findings in the literature on this topic?
 A: The literature on leveraging technology to promote awareness about refugee rights has revealed several findings. The digital era has significantly shifted the information provision and how people learn the news, with mainstream media being complemented, if not replaced, by social media platforms, allowing for more spherical and worldwide dissemination of information. Moreover, virtual reality (VR) and augmented reality (AR) can be and have been beneficial to the cause by providing firsthand experience of living within a refugee camp.
 At the same time, concerns about the technology's usage are critical. Ethical concerns, especially regarding the privacy and security of refugees, and other issues, such as audience desensitisation, have been at the forefront of the literature review.


Q: What are the main strengths and limitations of this literature?
 A: The literature review has been constructed based on the available public materials. This leads to several strengths but also specific limitations. Some of the most critical strengths of the literature review are the diverse perspectives presented due to the usage of several resources from different disciplines such as the academia, UN, INGOs, and the technology sector; the presentation of real-world applications, without limiting the review in theoretical concept; and the presentation from a forward-looking perspective without restriction to the past or the present. Regarding limitations, the forward-looking approach can be proven to be a double-edged sword in case the potential is overemphasised over current applications. Additionally, there is a lack of literature discussing the long-term impact, and finally, there is an underrepresentation of refugee-led literature.


Q: Are there any discrepancies in this literature?
 A: Due to the "generic to specific" approach we have followed throughout the composition of the literature review, and as with any other interdisciplinary field, the available literature presents discrepancies mainly revolving around ethical consideration and technology success rate for advocacy reasons. More specifically, a general observation is that literature tends to agree with the power of social media but also presents the lack of sustained commitment and regular supporters. Virtual reality (VR) and augmented reality (AR) are also fields where discrepancies are observed with focus on the benefit-risk ratio of AR and VR applications and viewer desensitisation.


Q: What conclusions do your draw from the review? What do you argue needs to be done as an outcome of the review?
 A: It is evident that technology offers powerful tools to swift the negative narratives and advocate for refugee rights. If correctly used, digital platforms and advanced technologies such as AR and VR can educate the public and give a path for more inclusive policymaking. This potential should be assessed regarding the population it serves, and ethical dilemmas and challenges should be addressed. Finally, a synergistic approach must be followed by bringing together humanitarians, policymakers, tech-industry experts and refugees to implement appropriate campaigns.

Back to contents

Healey, M., Matthews, K., & Cook-Sather, A. (2020) Writing about learning and teaching in higher education: Creating and contributing to scholarly conversations across a range of genres. Center for Engaged Learning Open-Access Books, Elon University. 142-152.


Research Proposal Review

 The realm of computing, and especially the discipline of data science, has as a prerequisite the effective and proper usage of data collection methods as a pathway to understanding the studied matter at hand. Throughout this week's reading, there are several methods and techniques described which can be employed by researchers to achieve their research goals and support the research results. For this reason, we will compare the methods presented in the unit's readings and assess which are suitable for the proposed research/dissertation based on the research questions, aims and objectives, as well as based on the envisioned data required for the desired outcome.

 Our approach will consider the technical and theoretical subject of using queuing theory in the humanitarian context, along with its specific limitations. Starting with a generic overview, the research has a mix of exploratory and descriptive approaches, aiming to expand existing knowledge and procedures for how queues are utilized by directly applying findings in queuing environments through a simulation, as well as exploring underresearched or unresearched areas of the matter at hand (Fleetwood, 2021). Considering the vague data needs of the research (due to its nature), the ill-defined data sources, primarily due to the uncommon, hardly accessible and sometimes unsafe environment that we explore, and issues that might arise in access to data (Dudovskiy, 2022), a combination of data collection methodologies will need to be utilized.

 Among the various data collection methods presented in this week's reading material, and considering the research subject particularities, it is of particular interest the use of case studies to evaluate the research subject (Dawson, 2015; Fleetwood, 2021). Case studies will provide in-depth insight into various subject elements, such as the studied population or applied queuing in different environments. Also, other qualitative methods, such as one-to-one interviews with subject matter experts, will be needed. Field experts will be able to provide insights on followed practices as well as experience-led guidance (Dawson, 2015). Text contextual analysis on the available related literature, especially considering the diverse studied environment in terms of culture, ethnicity, geography, religion and sex, will provide a better understanding of the challenges of the research, as well as specific areas that the researcher should be prudent of (QuestionPro, 2021).

 Additionally, despite data source and availability challenges, the research has as one of its objectives to implement an algorithm/program that can be utilized to plan queuing activities. Considering the experimental element of the selected research method, the developed algorithm can be used as an isolated simulation environment to provide analytics on which algorithm works best and will thus help in deciding the final deliverable. For this reason, primary data collection will be used in terms of algorithmic success (Dudovskiy, 2022). Secondary data collection to compare the algorithm's success with the actual queuing times will depend on data availability.

 In conclusion, the chosen blend of data collection methods and research approaches vastly depends on the objectives, aim and constraints of the proposed research. While the methods and approaches mentioned above are the most appropriate at this preliminary phase of the proposal and can provide a well-rounded understanding of the topic, the selected options might change based on the steering of the research and research-specific challenges.

Back to contents

Dawson, C. (2015) Projects in Computing and Information Systems: A Students Guide. 3rd ed. Harlow: Pearson. Available via the Vitalsource Bookshelf. [Accessed 10 October 2023].

Dudovskiy, J. (2022) Data Collection Methods. Available from: https://research-methodology.net/research-methods/data-collection/ [Accessed 10 October 2023]. Fleetwood, D. (2021) What is Research: Definition, Methods, Types & Examples. Available from: https://www.questionpro.com/blog/what-is-research/ [Accessed 10 October 2023]. QuestionPro. (2021) Text Analysis: What It Is, Techniques + Examples. Available from: https://www.questionpro.com/blog/text-analysis/ [Accessed 2 October 2023].

Literature Review and Research Proposal Outlines: "How can technology be used to raise awareness on the protection of refugees, to the general public"

Preparation/introduction of the literature review

 The world is currently facing the most significant displacement in history, with nearly 110 million forcibly displaced people, out of which more than 45 million are refugees, asylum seekers and others in need of international protection (UNHCR, 2022). At the same time, anti-refugee rhetoric and negative perceptions towards refugees tend to be more and more frequent, especially among the host-country population (Findor et al., 2021) , although research argues that those opinions do not monopolize the refugee discussions (Loescher, 2021). In an effort to shift this narrative, technology can be leveraged, primarily through the mainstream media (having the lion's share in the public's information) (McCann et al., 2023).

 As previously mentioned, some of the louder (but not necessarily numerous) public voices lobby for stricter border policies and immigration laws. In order to shift the scale, the use of existing technologies, coupled with technological innovation, can be used. Starting from mainstream media, the era of only-written articles is long gone, with images and videos slowly replacing writing (Silverman, 2019). On the other hand, creative storytelling, such as the article "A Game of Shark and Minnow" (Himmelman, 2013), is visually appealing to the audience and can be similarly used by the mainstream media to tell the stories of refugee journeys and relevant risks.

 Journalistic tools continue beyond creative storytelling, with augmented reality being previously used for humanitarian purposes; going back to 2004 in a United Nations documentary (Irom, 2018), one can find several use cases, for example, showing a refugee's journey from Syria to Greece. Finally, one of the most common technologies used nowadays, social media, having universal coverage, can further assist in shifting anti-refugee narratives, especially if used by influential people or well-known and respected organizations (Kent, 2018).

 On the other hand, the use of technology needs to be thoroughly assessed before being used. Technologies such as augmented reality may put at risk already vulnerable populations. For example, cases in which augmented reality is used to sensitize the general public on the refugees' living conditions may pose risks related to data protection (Jerome & Greenberg, 2021), such as the refugees' whereabouts, negative coping mechanisms used, or even revealing information about their specific legal and physical protection needs (e.g. GBV cases). Another risk may be the audience's desensitization due to overexposure, similar to the desensitization of viewers due to overexposure to violence (Krahe et al., 2015).

 To conclude, technology presents immense opportunities for raising awareness about the protection needs of refugees, asylum seekers and people needing international protection. Leveraging technology use cases such as augmented reality can help provide the general public with hands-on experience in the life of a refugee. Consequently, sensitizing the public can assist in applying pressure on global leaders to take more robust protection measures for the people in need. All of the above should be used by having the "do not harm" principle (UNDP, 2023) in mind and ensuring that the safety of the people is not jeopardized at any step of the process.

Back to contents

Findor, A., Hruska, M., Jankovska, P. & Popudova, M. (2021) Re-examining public opinion preferences for migrant categorizations: "Refugees" are evaluated more negatively than "migrants" and "foreigners" related to participants' direct, extended, and mass-mediated intergroup contact experiences. International Journal of Intercultural Relations 80: 262-273. DOI: https://doi.org/10.1016/j.ijintrel.2020.12.004

Himmerlman, J. (October 27, 2013) A GAME OF SHARK AND MINNOW. The New York Times Magazine. Available from: https://www.nytimes.com/newsgraphics/2013/10/27/south-china-sea/index.html [Accessed 4 August 2023].

Irom, B. (2018) Virtual Reality and the Syrian Refugee Camps: Humanitarian Communication and the Politics of Empathy. International Journal Of Communication 12: 4269-4291. Available from: https://ijoc.org/index.php/ijoc/article/view/8783/2483 [Accessed 4 August 2023].

Jerome, J., Greenberg, J. (2021) AUGMENTED REALITY + VIRTUAL REALITY. Available from: https://iapp.org/media/pdf/resource_center/fpf_report_augmented_virtual_reality_recommendations.pdf [Accessed 4 August 2023].

Kent, J. (2018) 'The Role of Technology in Addressing the Global Migration Crisis', World Radiocommunication Conference. Berkley, June. Centre for International Governance Innovation & World Refugee Council.

Krahé, B., Möller, I., Huesmann, R., Kirwil, L., Felber, J. & Berger, A. (2011) Desensitization to Media Violence: Links With Habitual Media Violence Exposure, Aggressive Cognitions, and Aggressive Behavior. J Pers Soc Psychol 100(4): 630-646. DOI: 10.1037/a0021711

Loescher, G. (2021) '5 Perceptions and misperceptions about refugees', in: Loescher, G. (eds) Refugees: a Very Short Introduction. Oxford: Oxford Academic. 73.

McCann, K., Sienkiewicz, M. & Zard, M. (2023) The role of media narratives in shaping public opinion toward refugees: A comparative analysis. Geneva: International Organization for Migration.

Silverman, J. (26 February, 2015) ‘Pics or it didn’t happen’ – the mantra of the Instagram era. The Guardian. Available from: https://www.theguardian.com/news/2015/feb/26/pics-or-it-didnt-happen-mantra-instagram-era-facebook-twitter [Accessed 4 August 2023].

UNDP. (2023) 5. Do Not Harm. Available from: https://www.undp.org/digital/standards/5-do-no-harm [Accessed 4 August 2023].

UNHCR. (2022) Refugee Statistics. Available from: https://www.unhcr.org/refugee-statistics/ [Accessed 4 September 2023].


Literature Review: "How can technology be used to raise awareness on the protection of refugees, to the general public"

Abstract

 Despite the exponential advancements in technology, which drive the "economic growth" (Driskell, 2022) and help people stay connected and in spite of the social media penetration mentioned previously, social inequalities are on the rise, suggesting that the world is moving forward in terms of technological application metrics but backwards in terms of inequality metrics. Private wealth is rising, while public wealth has been on a decline since 1970. Income inequalities are found to be on levels similar to those found in the early 20th century, while gender inequalities in pay are only 4% lower than in 1990 (World Inequality Report, 2022). Other examples of untackled inequalities include the lack of access to healthcare for women and children (United Nations, 2023), while the Gini coefficient, which measures inequality, increased from 27% in 2021 to 28% in 2022, signifying a general increase in inequalities in Ireland (Ireland Central Statistics Office, 2023). The United Nations (2023) also reports that 20% of people have been discriminated against at least once in their lifetime. The social injustices, despite the progress of humankind, also disproportionally affect refugees, asylum seekers and people in need of international protection.

View embedded Download and View PDF file
Back to contents

"Case Study: Accuracy of information" - Initial Case Study Analysis

 Researchers constantly face complex and cross-discipline ethical dilemmas while conducting their research duties (National Research Council et al., 2005). Those challenges are becoming even more complex in the case of paid research, where intellectual property, civil and criminal liabilities, and responsibility towards the general public come into play. The intellectual property (IP) aspect depends on multiple factors, such as legal agreements, the researcher's funding, and national legislation (The University of Melbourne, N.D.).

 In our case study (University of Essex, 2023), we discuss the scenario of Abi, a researcher who receives funding from Whizzz to evaluate the nutritious value of their cereal. During the research, Abi realised that the data suggest that the nutritious value of the product is lesser than expected, and further findings suggest that the product may even be harmful. There, Abi faces several ethical dilemmas related to using more favourable data analysis and how his research will be used, even if Abi shows both the positive and negative aspects of his research. The case study is analysed assuming the ordering party holds the IP rights, although the European Commission suggest co-authorship (EC, 2005).

 Undoubtedly, Abi, as a researcher, holds the primary responsibility, regardless of the ordering party's research objective, to conduct his research duties ethically and legally. Having said that, the research methodology must be defined beforehand (Kelley et al., 2003) and not change throughout the process to favour any outcome. At the same time, Abi can and should conduct his research unbiasedly, so he should favour neither the positive nor the negative findings (University of Cambridge, N.D.). This means researching the full spectrum of the product's nutritious values and writing his report by fully disclosing all the relevant findings.

 Moreover, despite Abi not holding the IR of his work, he may be professionally and scientifically responsible for how his research will be used based on the signed agreement between him and his funder, his contractual obligations, the relevant institutional code of conduct and applicable legislation (EC, 2005; Valkenburg et al., 2020). The much-needed peer review, primarily due to the implications of the research to the broader public and the ethical implications, and professional audits shall also have a say in the research outcome (Kelly, 2014; EC, 2005).

 Another aspect is the researcher's responsibility towards the public regardless of who holds the IP rights. For example, the French Centre of Scientific Research (2016) instructs researchers that they are ethically obliged to make their complete research available to other researchers and the general public, while the European Charter for Researchers (2005) suggests that the complete research should be made available to the general public and the ordering party as applicable and adequately exploited. This needs to be further assessed due to complex underlying legal implications.

 In summary, regardless of the ordering party's objectives, the searcher holds the primary responsibility to conduct his duties ethically and legally. This means the full findings shall be disclosed, whether favourable or not for the ordering entity. No data alteration or misrepresentation shall occur. The researcher can also employ the available tools to seek advice (e.g. through an appropriate ethics committee or a professional body's ethicist) or even refuse to accept the assignment on the grounds of upholding ethical standards. Finally, the proper exploitation of the results falls under the researcher's responsibilities (EC, 2005).

Back to contents

Centre National de la Recherche Scientifique. (2016) Integrity and responsibility in research practices. Available from: https://comite-ethique.cnrs.fr/wp-content/uploads/2020/09/COMETS-GUIDE-EN.pdf [Accessed 1 October 2023].

European Commission. (2005) The European Charter for Researchers. Available from: https://euraxess.ec.europa.eu/jobs/charter/european-charter [Accessed 1 October 2023].

Kelly, J., Sadeghieh, T. & Adeli, K. (2014) Peer Review in Scientific Publications: Benefits, Critiques, & A Survival Guide. EJIFCC 25(3): 227-43. Available from: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4975196/ [Accessed 30 September 2023].

Kelley, K., Clark, B., Brown, V. & Sitzia, J. (2003) Good practice in the conduct and reporting of survey research. International Journal for Quality in Health Care 15(3): 261–266. DOI: https://doi.org/10.1093/intqhc/mzg031

National Research Council, Institute of Medicine. (2005) Ethical Considerations for Research on Housing-Related Health Hazards Involving Children. Washington, DC: The National Academies Press. Available from: https://nap.nationalacademies.org/catalog/11450/ethical-considerations-for-research-on-housing-related-health-hazards-involving-children [Accessed 2 October 2023].

The University of Melbourne. (N.D.) Understanding intellectual property for researchers. Available from: https://research.unimelb.edu.au/commercialisation/researchers/protect-and-grow-your-idea/understanding-intellectual-property-for-researchers [Accessed 2 October 2023].

University of Cambridge. (N.D.) Good Research Practice. Available from: https://www.research-integrity.admin.cam.ac.uk/good-research-practice [Accessed 2 October 2023].

University of Essex Online. (2023) Collaborative Learning Discussion 2 [VLE]. RMPP_PCOM7E Research Methods and Professional Practice August 2023. University of Essex Online.

Valkenburg, G., Dix, G., Tijdink, J. et al. (2020) Making researchers responsible: attributions of responsibility and ambiguous notions of culture in research codes of conduct. BMC Med Ethics 21(56). DOI: https://doi.org/10.1186/s12910-020-00496-0


"Case Study: Accuracy of information" - Summary

Based on peers' responses

 Researchers frequently face complex ethical challenges, especially in paid research, including but not limited to legal liabilities, public responsibility, and intellectual property (IP) rights. These challenges are influenced by various factors such as funding sources and legal agreements, national laws, and professional practices and ethics enforced by professional bodies (National Research Council et al., 2005; The University of Melbourne, N.D.).

 A case study from the University of Essex (2023) presents such challenges and ethical dilemmas by introducing Abi, a researcher funded by Whizzz to assess the nutritional value of their cereal. Abi's research results indicate that the product's nutritional value is below the expected, and some ingredients are potentially harmful. The ethical and legal dilemma revolves around data representation, findings communication and its subsequent usage.

 First, regardless of the funder's intentions, Abi's primary responsibility as a researcher is to execute his research ethically, without bias and prejudice and present both positive and negative results. The research methodology should be predetermined (Kelley et al., 2003), ensuring no shifts in approach to favour any desired outcomes (University of Cambridge, N.D.). Although Abi might not possess the IP rights, and despite the fact that the European Commission (2005) suggest co-authorship of researches, he remains professionally accountable for the research's application. Institutional guidelines further influence this accountability, along with the researcher's legal agreement with the funder and relevant laws (EC, 2005; Valkenburg et al., 2020). Peer reviews and professional audits also significantly impact research outcomes (Kelly, 2014; EC, 2005).

 Furthermore, researchers must share their findings with the public, irrespective of IP ownership. For instance, the French Centre of Scientific Research (2016) states that researchers must provide their research to peers and the public. Similarly, the European Charter for Researchers (2005) recommends sharing the complete research with the public and relevant stakeholders.  Finally, as a professional practice, Abi should take into consideration elements related to data protection, especially for data received by the funder or produced during the research that qualify as personal or sensitive data, and, at the same time, ensure that the primary data, which they are the cornerstone of the analysis, are verified in terms of accuracy and reliability (Jabbal, 2023).  In a nutshell, irrespective of a funder's goals, researchers must ethically and legally uphold their responsibilities. This means fully disclosing all results without bias or alteration. In case of doubt, they can seek ethical advice or decline projects to uphold these standards. Properly using and sharing research results is also of paramount importance to ensure that the public interest is satisfied (EC, 2005).

Back to contents

Centre National de la Recherche Scientifique. (2016) Integrity and responsibility in research practices. Available from: https://comite-ethique.cnrs.fr/wp-content/uploads/2020/09/COMETS-GUIDE-EN.pdf [Accessed 1 October 2023].

European Commission. (2005) The European Charter for Researchers. Available from: https://euraxess.ec.europa.eu/jobs/charter/european-charter [Accessed 1 October 2023].

Jabbal, S. (2023) Collaborative Learning Discussion 2 - Peer Response [VLE]. RMPP_PCOM7E Research Methods and Professional Practice August 2023. University of Essex Online.

Kelly, J., Sadeghieh, T. & Adeli, K. (2014) Peer Review in Scientific Publications: Benefits, Critiques, & A Survival Guide. EJIFCC 25(3): 227-43. Available from: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4975196/ [Accessed 30 September 2023].

Kelley, K., Clark, B., Brown, V. & Sitzia, J. (2003) Good practice in the conduct and reporting of survey research. International Journal for Quality in Health Care 15(3): 261–266. DOI: https://doi.org/10.1093/intqhc/mzg031

National Research Council, Institute of Medicine. (2005) Ethical Considerations for Research on Housing-Related Health Hazards Involving Children. Washington, DC: The National Academies Press. Available from: https://nap.nationalacademies.org/catalog/11450/ethical-considerations-for-research-on-housing-related-health-hazards-involving-children [Accessed 2 October 2023].

The University of Melbourne. (N.D.) Understanding intellectual property for researchers. Available from: https://research.unimelb.edu.au/commercialisation/researchers/protect-and-grow-your-idea/understanding-intellectual-property-for-researchers [Accessed 2 October 2023].

University of Cambridge. (N.D.) Good Research Practice. Available from: https://www.research-integrity.admin.cam.ac.uk/good-research-practice [Accessed 2 October 2023].

University of Essex Online. (2023) Collaborative Learning Discussion 2 [VLE]. RMPP_PCOM7E Research Methods and Professional Practice August 2023. University of Essex Online.

Valkenburg, G., Dix, G., Tijdink, J. et al. (2020) Making researchers responsible: attributions of responsibility and ambiguous notions of culture in research codes of conduct. BMC Med Ethics 21(56). DOI: https://doi.org/10.1186/s12910-020-00496-0


Queuing Theory in Practice: Employing and Applying Queuing Theory for Humanitarian Registration and Assistance Delivery Activities

Abstract

 Following a similar approach, our research proposal aims to understand how queues work in other disciplines, how computing can provide value in the utilisation and optimisation of queues, and how queues can be used in humanitarian contexts in complex environments for registration and assistance delivery activities. By answering this subset of questions, we aim to showcase how the widely used concept of queues can use the computing and data analysis disciplines to assist the humanitarian field with the problem of reducing waiting times for populations in perilous situations and apply proper prioritisation by using the technology and computing concepts in a reproducible and usable manner. This technological intervention can potentially assist more than 108 million displaced people worldwide (UNHCR, 2023).

View embedded View in new page Download and View PPT file
Back to contents

Worksheets

Abstract

 Hypothesis Testing and Summary Measures & Chart Worksheets and Analysis (View embedded)

View embedded
Back to contents

Personal Development Plan

Personal Development Plan 1 Personal Development Plan 2

Back to contents

Action Plan

Action Plan

Back to contents

Professional Skills Matrix

University of Essex - Adapted from BCS guidelines and Essex graduate.
Aware: General understanding and basic knowledge; Trained: Able to apply knowledge, able to work independently under certain conditions; Proficient: Broad and in-depth knowledge, able to work independently with very little supervision; Expert: Seen as a subject matter expert, able to lead and train others.
Competency Essex Graduate Skill Skill Level
Professional Literacy, Communication, Language Skills Express information effectively to technical and non-technical audiences Proficient
Create documents to aid your communication (reports, diagrams, legal descriptions, plans, manuals and charts) Expert
Commercial Awareness Keep current with tools of the industry, as well as emerging technology Trained
Seek opportunites to improve and share knowledge of tools and technoology that may improve productivity Proficient
Participate in scientific and professional organisations Trained
Emphasise quality, customer satisfaction and fair application of policies Proficient
Demonstrate familiriaty with codes of conduct for the Computing field Trained
Subject understanding, research, critical thinking, time management Critically analyse complex ideas in concepts in the field of Computer Science Trained
Recognise inconsistencies and gaps in information, and search for additional information when needed Proficient
Explore complex real-world problems in a Computing context Trained
Legal and Ethical Ethical Awareness Comply with the letter and spirit of applicable laws Proficient
Maintain privacy and confidentiality of company, co-worker and customer information Expert
Social (inc. Teamwork) Cultural Awareness Act in the best interest of the community at large - Social (Community) Responsibility Proficient
Teamwork, Leadership and Resilience, Time Management Collaborate effectively in diverse teams to achieve team goals Expert
Meeting team objectives using teamwork skills Proficient
Demonstrate skills in leadership and team building Trained
Give and receive constructive feedback Trained
Creativity, Entrepreneurial, Problem solving, Initiative, Decision Making Create, discuss and deliver strategies for sustainability for all stakeholders (company, community and environment) Trained
Able to make a decision on a complex matter/scenario using multiple sources of information Trained
Technical (Data Science) IT and Digital, Numeracy SQL for database querying Proficient
Python Proficient
Java Trained
noSQL Aware
R Trained
Gits - repository development and maintenance Trained
Use of conferenceing technologies and Moodle (VLE) Proficient
Use of Word Processing tools and Spreadsheets Expert
Effective use of e-library resources Proficient
Subject Application Global Citizen, Teamwork, Leadership, Emotional Intelligence Take into account other people's perspectives Trained
Work constructively with differences in viewpoints Trained
Actively participate in a range of community activities as an informed citizen Trained
Decision Making, Initiative, Emotional Intelligence, Ethical Awareness Develop, articulate and clarify your personal values and ethics Trained

Back to contents

SWOT Analysis

SWOT Analysis

Back to contents

Reflective Piece

Abstract

 Throughout this module, I explored and familiarised myself with different research methodologies, ethical considerations in computing, and academic professional practices. Due to limited pre-existing knowledge, I faced challenges in understanding research concepts. Succeeding units introduced hands-on literature review and research proposal presentation, data collection methods, and statistical approaches, which improved my understanding. The final units, emphasizing research writing and project management, shaped my future plans. Throughout the module, collaboration with peers has also been beneficial, while logistical challenges mainly related to conflicting priorities hindered my performance. Overall, this module improved my research capabilities and helped me find a passion for paper writing, which I aim to pursue in the future.

View embedded
Back to contents

Feautured Resources