next up previous contents
Next: Informed Consent Theory Up: Introduction Previous: Research Methodology   Contents

Thesis Structure

Chapter 1 forms the background and setting for the thesis, outlining the history of theories of informed consent, exploring these theories and their benefits and disadvantages, analysing their suitability for use in an information technology context, and establishing a grounding for Chapter 2. In particular, it looks at the theory developed by Faden and Beauchamp (1986), which is commonly in use in current information technology practices, and an alternative approach by Manson and O'Neill (2007) which forms the basis for the theory I adopt in Chapter 3. Chapter 2 delves into some case studies of informed consent situations in information technology. It describes some examples of End User License Agreements and privacy policies, showing the problems encountered by computer users wishing to give an informed consent decision within the current theoretical framework. Chapter 3 begins with the strong claim that current informed consent practices in information technology situations, particularly those areas discussed in Chapter 2, are insufficient and inappropriate. It then establishes the value of changing the underlying theoretical framework from the disclosure model, which evolved in an ad-hoc manner from some of the principles put forward by Faden and Beauchamp, to that of Manson and O'Neill's waiver-based approach. This, then, forms the basis for my theory of informed consent in information technology, which I develop over the chapter to take into account problems specific to the information technology context, such as the use of frequent, minor consent requests, and the effects these have on the consent process. Chapter 4 then looks at the practical implications of the theory I proposed in the previous chapter, looking at recommendations for implementing the changes for the specific example of End User License Agreements. Finally, I conclude with some comments about some minor issues with the theory, and suggest some areas that could use further research.

It is important to acknowledge here that in this thesis I am concentrating on conceptual issues surrounding informed consent in information technology, and not on building and testing a system to deal with any specific informed consent problems. Although in chapters 3 and 4 I outline examples of application of the theory, the examples I use in these chapters have not been empirically tested and function purely as feasible practical examples of the recommended framework.


next up previous contents
Next: Informed Consent Theory Up: Introduction Previous: Research Methodology   Contents
Catherine Flick 2010-02-03