Feeds

How the government uses dirty data to legislate morality

So what's a standard deviation?

  • alert
  • submit to reddit

Maximizing your infrastructure through virtualization

When it comes to sex and censorship, Government's insistence that laws are "evidence-based" is little more than hot air.

The statistics quoted in support of any given case are frequently misleading, partial, and - according to one expert in this field - subject to highly unethical collusion of interest between government and researchers.

From rape to lap-dancing, from internet harm to obscure sexual practices, "evidence" is used to back a narrow politicised agenda, rather than as a basis from which to develop policy.

A good – or bad example – of this approach can be found in the Lilith Report on Lap-dancing, produced in 2003, which sought to link sex crime in Camden with the opening of local lap-dancing clubs.

Sponsored by Eaves Housing For Women – of whom more later - the report quoted, without full context, some selected figures: over a three-year period, the level of sexual offences in Camden fell by less than in two allegedly comparable boroughs, and the level of recorded rape and indecent assault in Camden increased by 50 and 57 per cent following the establishment of two mainstream lap-dancing establishments.

As "research" goes, this contains more holes than the proverbial Swiss cheese. We asked the Eaves Project for comment, but at time of writing had not received an answer.

It is an absurdly simplistic "correlation equals effect" argument, with virtually no controls of any kind. Yet such is the political desire that this report be true, it is quoted frequently and as gospel – from the Guardian to Amnesty’s official site - whenever a journalist wishes to take a pop at lap-dancing.

But then, it was ever thus. The first and ground-breaking research into sexual behaviour was the 1948 Kinsey report in the United States, followed by Mass Observation’s "Little Kinsey", whose findings – including a high level of homosexual experimentation and marital infidelity - were considered so shocking that they were, in typical UK fashion, kept secret for decades after.

Kinsey came in for serious academic criticism on the grounds of sample selection (volunteers who came forward for interview were mainly self-selected) and sample bias (a high proportion of prison inmates and prostitutes). This in turn led critics to argue that both Kinsey’s focus and findings were coloured by his own interest in masochistic and promiscuous sex.

However, a subsequent re-working of Kinsey’s data suggested that the sample bias had little effect and that in general, people’s sex lives were more colourful and more varied than conventional moralists liked to imagine.

Top three mobile application threats

More from The Register

next story
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.