Skip to main content
Log in

Parallel, Embedded or Just Part of the Team: Ethicists Cooperating Within a European Security Research Project

  • Original Paper
  • Published:
Science and Engineering Ethics Aims and scope Submit manuscript

Abstract

Different methods have been developed to address ethical issues during research. Most of these methods were developed at universities. In this article ethical parallel research within a Research and Technology Organization is described. Within a European project about perceived security, CPSI, the ethical issues were identified by ethicists cooperating in the project. The project CPSI was aimed at developing a research method that can be used by (local) government to monitor or assess perceived and actual security. Together with the researchers a way was sought to address the ethical issues. Several issues could be addressed by choices with regard to the design of the validation study, in this case a survey. The ethical and legal reasons that were relevant for choices in the design of the validation study were made an integral part of these decisions. Some issues were already identified during the writing of the proposal others were only identified during the research. Participating in the research gave the ethicists access to all relevant information. It made it possible to address the ethical issues when they became relevant. Ethical reasons were part of some of the discussions on research method. It proved possible to address most ethical issues satisfactorily during the research project.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. We are aware that there is a lively debate whether moral or ethical expertise can exist and what this expertise should entail (see for example Singer 1972; Cholbi 2007; Varelius 2008). We are not going into this debate but assume that people who have experience in identifying ethical issues and have some formal education in ethics could act as ethicists in the way presented here. Note that we assisted the researchers in making choices; we did not make the choices for them.

  2. If the fear that people feel is dismissed by policymakers as irrational because the crime data do not give rise to any concern then there is a similarity with regard to issues about perceived safety. In debates about technological risks sometimes accusations are made that “the public” or laymen are not rational because they refuse nuclear plants because of the risks but accept other technologies or behavior that is more risky like driving a car. These statements disregard that people might have other valid reasons to reject certain technologies. For more information about technological risks and judgment of acceptability, see (Asveld and en Roeser 2008). For perceived security it is important to realize that there might be biases in the reported data.

  3. More information on the project can be found in the reports, see the project website http://www.cpsi-fp7.eu.

  4. One of the partners is going to host the datawarehouse and users will not be able to add extra categories or link other databases to the datawarehouse.

  5. By good research we mean in this case that the conclusions of the research are valid and justified and that the research was performed taking ethical values into account. Research leading to valid results while respecting values such as privacy is regarded to be better research.

References

  • Asveld, L., & en Roeser, S. (2008). The ethics of technological risks. London: Earthscan Publishers.

    Google Scholar 

  • Bakker, F., De Graaf, H., De Haas, S., Kedde, H., Kruijer, H., & Wijsen, C. (2009). Sexuele gezondheid in Nederland, Rutgers Nisso groep, Nederland, http://www.rutgersnissogroep.nl.

  • Cholbi, M. (2007). Moral expertise and the credential problem. Ethical Theory and Moral Practice, 10, 323–334.

    Article  Google Scholar 

  • Custers, B. H. M. (2004). The power of knowledge; ethical, legal, and technological aspects of data mining and group profiling in epidemiology. Tilburg: Wolf Legal Publishers.

    Google Scholar 

  • European Data Protection Directive 95/46/EC. (1995).

  • Krumpal, I., Rauhut, H., Böhr, D., Naumann, E. (2008). How likely is “likely”? Subjective perception and communication of victimization probabilities. In Proceedings of the 7th International Conference on Social Science Methodology, Naples (pp. 1–19), Sept 1–5.

  • Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79, 119–157.

    Google Scholar 

  • Noelle-Neumann, E. (1993). The spiral of silence—public opinion, our social skin. Chicago: University of Chicago Press.

    Google Scholar 

  • Singer, P. (1972). Moral experts. Analysis, 32, 115–117.

    Article  Google Scholar 

  • Snyder, M. (1987). Public appearances/private realities: The psychology of self-monitoring. New York: W.H. Freeman and Co.

    Google Scholar 

  • Van der Burg, S. (2008). Imagining the future of photoacoustic mammography. Science and Engineering Ethics, 15, 97–110.

    Article  Google Scholar 

  • Van Gorp, A. (2009). Ethics in and during technological research; an addition to ICT ethics and science ethics. In M. Duewel & P. Sollie (Eds.), Evaluating new technologies. Dordrecht: Springer.

  • Van Tongeren, P. (2008). Schaamte. Ethische perspectieven, 18(3), 437–450.

    Article  Google Scholar 

  • Varelius, J. (2008). Ethics consultation and autonomy. Science and Engineering Ethics, 14, 65–76.

    Article  Google Scholar 

  • Vedder, A. (2004). KDD, privacy individuality and fairness. In R. Spinello & H. Tavani (Eds.), Readings in cyberethics (2nd ed., pp. 462–470). Sudbury, MA: Jones and Bartlett Publishers.

    Google Scholar 

  • Vedder, A., & Custers, B. (2009). Whose responsibility is it anyway? Dealing with the consequences of new technologies. In M. Duewel & P. Sollie (Eds.), Evaluating new technologies. Dordrecht: Springer.

  • Wittebrood, K. (2006). Slachtoffers van criminaliteit; feiten en achtergronden. Den Haag: Sociaal en Cultureel Planbureau.

  • http://www.cpsi-fp7.eu.

  • Zwart, S., Van de Poel, I., Van Mil, H., & Brumsen, M. (2006). A network approach for distinguishing ethical issues in research and development. Science and Engineering Ethics, 12, 663–684.

    Article  Google Scholar 

Download references

Acknowledgments

The work described in this article was done within the project Changing Perceptions of Security and Interventions (CPSI) grant agreement number 217881. This project was funded by the European Commission within the seventh Framework Program theme 10 Security. We would like to thank all partners for their cooperation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. van Gorp.

Rights and permissions

Reprints and permissions

About this article

Cite this article

van Gorp, A., van der Molen, S. Parallel, Embedded or Just Part of the Team: Ethicists Cooperating Within a European Security Research Project. Sci Eng Ethics 17, 31–43 (2011). https://doi.org/10.1007/s11948-009-9187-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11948-009-9187-5

Keywords

Navigation