2013
DOI: 10.1093/scipol/sct086
|View full text |Cite
|
Sign up to set email alerts
|

Towards a social impact assessment of security technologies: A bottom-up approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0
1

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 14 publications
0
7
0
1
Order By: Relevance
“…Finally, temporal awareness [65] represents a bottom-up process. Gibb and Scott's [10] framework refers to the ability of entrepreneurs to be aware of their own purpose and the goal of their entrepreneurial process-"where they want to and can go". The word "temporal" refers to a time dimension.…”
Section: Ri Maturity Modelsmentioning
confidence: 99%
See 2 more Smart Citations
“…Finally, temporal awareness [65] represents a bottom-up process. Gibb and Scott's [10] framework refers to the ability of entrepreneurs to be aware of their own purpose and the goal of their entrepreneurial process-"where they want to and can go". The word "temporal" refers to a time dimension.…”
Section: Ri Maturity Modelsmentioning
confidence: 99%
“…As a consequence, research on innovation is gradually shifting attention from "how to achieve groundbreaking innovation" towards "how to achieve groundbreaking innovation in a responsible manner" [1,[9][10][11].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Ethics is in this sense broadly interpreted as ‘the world of values that surrounds and flows through any project’ (Burgess, 2011a: 3), and the role of the ethics Work Package (WP) corresponds with the manifold normative challenges that can emerge from ongoing research. In practice, such a broad interpretation of ethics and its guidance and advice capacities results in varying forms of ethics work within project consortia, including the likes of establishing a dialogue with technical partners and raising awareness of ethical stakes, input to technical components and processes, provision of best practice guidelines, or the development of evaluation schemes for project components (see, for example, Hempel et al, 2013; Van Gorp and Van der Molen, 2011). These activities should in theory make it possible to put critique to work and to establish an ethically informed dialogue with those professional communities that are involved in imagining and producing security in the arena of security research programmes.…”
Section: Ethics and Eu Security Researchmentioning
confidence: 99%
“…Como apontado por Antonie (2012), Chávez & Valenzuela (2019) e Mcinerney (2017), deve-se sempre levar em conta os diferentes contextos de cada tipo de organização e os diferentes stakeholders envolvidos (Hadad & Gauca, 2014;Hempel et al, 2013), podendo, inclusive, ocorrer o desenvolvimento de diferentes formas de relatórios, para atender os diferentes tipos de atores interessados (Becker, 2001). Esse envolvimento de diferentes stakeholders, desde a elaboração até o recebimento das informações, foi destacado por diversos autores, sendo inclusive o aspecto de maior concordância entre eles (Chávez & Valenzuela, 2019;Hempel et al, 2013;Kunttu, 2017;Mcinerney, 2017;Polonsky et al, 2016). Como apontado por Agarchand e Laishram (2017), são os funcionários de uma organização ou membros de uma comunidade que vivenciam as suas rotinas, seus desafios e os impactos gerados, entendendo melhor o que é relevante para a medição.…”
Section: Implicação Teórica E Práticaunclassified