Next: Informed Consent Theory
Up: Introduction
Previous: Research Methodology
Contents
Chapter 1 forms the background and setting for the thesis, outlining the history of theories of informed consent, exploring these theories
and their benefits and disadvantages, analysing their suitability for use in an information technology context, and establishing a
grounding for Chapter 2. In particular, it looks at the theory developed by Faden and Beauchamp (1986), which is commonly in use in
current information technology practices, and an alternative approach by Manson and O'Neill (2007) which forms the basis for the theory I
adopt in Chapter 3. Chapter 2 delves into some case studies of informed consent situations in information technology. It describes some
examples of End User License Agreements and privacy policies, showing the problems encountered by computer users wishing to give an
informed consent decision within the current theoretical framework. Chapter 3 begins with the strong claim that current informed consent
practices in information technology situations, particularly those areas discussed in Chapter 2, are insufficient and inappropriate. It
then establishes the value of changing the underlying theoretical framework from the disclosure model, which evolved in an ad-hoc manner
from some of the principles put forward by Faden and Beauchamp, to that of Manson and O'Neill's waiver-based approach. This, then, forms
the basis for my theory of informed consent in information technology, which I develop over the chapter to take into account problems
specific to the information technology context, such as the use of frequent, minor consent requests, and the effects these have on the
consent process. Chapter 4 then looks at the practical implications of the theory I proposed in the previous chapter, looking at
recommendations for implementing the changes for the specific example of End User License Agreements. Finally, I conclude with some
comments about some minor issues with the theory, and suggest some areas that could use further research.
It is important to acknowledge here that in this thesis I am concentrating on conceptual issues surrounding informed consent in information technology, and not on building and testing a system to deal with any specific informed consent problems. Although in chapters 3 and 4 I outline examples of application of the theory, the examples I use in these chapters have not been empirically tested and function purely as feasible practical examples of the recommended framework.
Next: Informed Consent Theory
Up: Introduction
Previous: Research Methodology
Contents
Catherine Flick
2010-02-03