Skip to main content

2014 | Buch

Emerging Pervasive Information and Communication Technologies (PICT)

Ethical Challenges, Opportunities and Safeguards

insite
SUCHEN

Über dieses Buch

This book provides a wide and deep perspective on the ethical issues raised by pervasive information and communication technology (PICT) – small, powerful, and often inexpensive Internet-connected computing devices and systems. It describes complex and unfamiliar technologies and their implications, including the transformative potential of augmented reality, the power of location-linked information, and the uses of “big data,” and explains potential threats, including privacy invaded, security violated, and independence compromised, often through widespread and lucrative manipulation.

PICT is changing how we live, providing entertainment, useful tools, and life-saving systems. But the very smartphones that connect us to each other and to unlimited knowledge also provide a stream of data to systems that can be used for targeted advertising or police surveillance. Paradoxically, PICT expands our personal horizons while weaving a web that may ensnare whole communities.

Chapters describe particular cases of PICT gone wrong, but also highlight its general utility. Every chapter includes ethical analysis and guidance, both specific and general. Topics are as focused as the Stuxnet worm and as broad as the innumerable ways new technologies are transforming medical care.

Written for a broad audience and suitable for classes in emerging technologies, the book is an example of anticipatory ethics – “ethical analysis aimed at influencing the development of new technologies” (Deborah Johnson 2010).

The growth of PICT is outpacing the development of regulations and laws to protect individuals, organizations, and nations from unintended harm and malicious havoc. This book alerts users to some of the hazards of PICT; encourages designers, developers, and merchants of PICT to take seriously their ethical responsibilities – if only to “do no harm” – before their products go public; and introduces citizens and policy makers to challenges and opportunities that must not be ignored.

Inhaltsverzeichnis

Frontmatter
Chapter 1. Introduction: The Impact, Benefits, and Hazards of PICT
Abstract
This chapter opens with an extended definition and description of pervasive information and communication technology (PICT) as a sociotechnical system – in brief, an intertwined system of social practices and the technologies that make the social practices possible which in turn spur technological revision and innovation that simultaneously modify or transform social practices in a never-ending spiral. It then describes the following ten chapters. Chapter 2 presents and analyzes three case studies of actual recent events that highlight key aspects of PICT. Chapters 3, 4, and 5 tackle surveillance from three different angles, but together provide a primer on the ethical issues involved. Chapters 3, 6, and 7 focus on health care, an area of significant growth for PICT. Chapter 8 considers a particular type of PICT – augmented reality – and reveals its far-from-obvious ramifications. Chapter 9 provides a different kind of case study as a social scientist describes her experience working with technologists developing PICT with the goal (successfully achieved) of making ethics a design goal. Chapters 10 and 11 focus more narrowly on ethical guidance for PICT.
Kenneth D. Pimple
Chapter 2. Three Case Studies
Abstract
This chapter will introduce three real-world case studies involving pervasive information and communication technology (PICT) systems and the ethical issues which can arise during the development and deployment of these systems and technologies. The sensor-effector system model will be used to decompose the larger area of PICT into three areas of focus: sensors, effectors, and the systems these elements form with their control logic. Each of these areas will be examined through a real-world example and discussion of the issues inherent in the pervasive use of information technology in that area. In the first case, our over-reliance on GPS systems will serve as an example of the issues related to pervasive sensors. In the second case, the dangers of computer viruses and worms such as Stuxnet will illustrate what can arise with pervasive effectors. Finally, the Flash Crash experienced by the stock markets in 2010 will exemplify what can occur when sensors, effectors, and their control logic are combined into autonomous systems and deployed pervasively throughout a world.
Donald R. Searing, Elizabeth A. M. Searing
Chapter 3. Health Information in the Background: Justifying Public Health Surveillance Without Patient Consent
Abstract
Often we think of collecting, storing, and using health data without patient consent as unethical and illegal. However, there are situations where the collection of health information without consent is not only ethical and legal, it is essential for community and public health. Public health surveillance – the ongoing, systematic collection, analysis, and interpretation of health-related data with the a priori purpose of preventing or controlling disease or injury, or identifying unusual events of public health importance, followed by the dissemination and use of information for public health action – allows the government to meet its ethical obligation to protect the health of the population. By adhering to public health ethics principles, public health surveillance systems, including pervasive information and computing technology (PICT), can be designed and implemented in ways that both honor individuals and protect communities.
Lisa M. Lee
Chapter 4. Surveillance in the Big Data Era
Abstract
The development of networked, mobile devices has made possible anytime, anywhere access to digital information and communication resources. At the same time, thanks to the interactive capability of these devices, pervasive monitoring goes hand-in-hand with pervasive information and computing technology (PICT). As our ability to share data goes mobile, so too does the ability to track a growing range of information about our activities, our movements, our preferences, behaviour and interests. The ability to collect and sort large amounts of data about people leads to changes in the way monitoring and surveillance works. It also marks the convergence between monitoring in contexts ranging from marketing and political campaigning to policing and security. This chapter considers some of the shifts associated with surveillance in the digitally-enhanced era of so-called “big data,” and explores some of the ethical and social concerns it raises. It argues for the importance of several types of control and accountability measures related to the collection and use of personal information.
Mark Andrejevic
Chapter 5. We Know Where You Are. And We’re More and More Sure What That Means
Abstract
Knowing where something occurs is most meaningful if placed in relation to other events, people, and things. Recent innovations in pervasive information and computing technology (PICT) and related information technology infrastructures open up capabilities to record and analyze locations and relations among events in unparalleled fashion, leading to increases in data about where people are and what they do. Spatial analysis can identify many of these relations and help create penetrating insights. First, this chapter considers how the field of geography has developed analytical capabilities that support understanding online and virtual activities involving pervasive information technology. Because of a growing infrastructure with a capability to thoroughly record locations and events, coupled with computational approaches that mine data and cross-reference data from different sources, geographic analysis has become a commonplace means of analyzing data and establishing patterns of activities or information about individuals. With vast amounts of location data and the use of analysis techniques, it has become possible to not only know where people are, but what the aggregation of data from different sources means. Also this chapter reviews recent developments and their underlying geographic concepts, and points to important questions in considering the role of location and relations in information-age surveillance.
Francis Harvey
Chapter 6. Preserving Life, Destroying Privacy: PICT and the Elderly
Abstract
Issues of privacy are undeniably central moral concerns in pervasive information and communication technology (PICT), as many aspects of individual privacy seem to be unavoidable casualties of the increased ubiquity of such technologies. It appears that many people make this trade-off willingly, as attested by the number of users of Facebook, Google, and other technologies that routinely mine personal data for commercial use. This large and growing population may take it for granted that elderly people experiencing (or perceived as experiencing) increasing physical frailty, decreasing mental competence, and the concomitant reliance on health professionals and other caregivers should be expected to give up a degree of privacy if it means staying in their own homes rather than moving to a nursing home or assisted living facility. As the end of life approaches, it may seem to many that privacy is less important than comfort. This chapter examines the relationship between privacy, competency, paternalism, coercion, and the elderly – a group that will likely be among the first to have PICT forced upon them in their own homes, probably by their own adult offspring.
Cynthia M. Jones
Chapter 7. When Cutting Edge Technology Meets Clinical Practice: Ethical Dimensions of e-Health
Abstract
The purpose of this chapter is to identify problems generated by electronic health (e-Health) and to explore their impact on ethical clinical conduct in order to identify ameliorative strategies. More generally the chapter is an exploration of how to deal with change and reaffirm what is fundamental in health care. Healthcare is primarily a moral enterprise in which action means values. The clinicians’ primary value commitment must always be to the patients’ welfare and best interests. Using a set of indicators as standards of performance for the sociotechnical e-Health system, including pervasive information and computing technology (PICT), the chapter explores the impact of technology performance, vendor and health-related entity management and law and regulation on clinical conduct.
Katherine D. Seelman, Linda M. Hartman, Daihua X. Yu
Chapter 8. Ethics and Pervasive Augmented Reality: Some Challenges and Approaches
Abstract
Google has recently announced Project Glass, a plan to embed computers into eyeglasses. Their vision is that technology should “be there when you need it and get out of your way when you don’t.” The main idea behind this technology is called augmented reality. In this chapter I will introduce the main ideas behind augmented reality, and the most interesting examples (so far) of how it is used. I’m most interested, however, in the ethical challenges this technology will present as it becomes pervasive. I describe and explain two examples; augmented reality as an extension of the home (which has privacy implications), and augmented reality advertising (which has implications for property rights and local government). Along the way I will introduce several techniques and concepts that are useful in analyzing the ethics of new technologies, including pervasive information and computing technology (PICT).
Bo Brinkman
Chapter 9. This is an Intervention: Foregrounding and Operationalizing Ethics During Technology Design
Abstract
Pervasive information and communication technologies (PICT) can raise many ethical issues during their design. Ethical concerns, however, are often supplanted by competing design values including efficiency, cost, and elegance. Increasingly, advocates and researchers are experimenting with ethics-oriented interventions in the form of action research that inserts social scientists or humanists into the design process to promote human values. This chapter describes and evaluates an intervention to promote privacy and resist surveillance in a ubiquitous computing laboratory. Ethnographic data from 2 years of participant observation suggest that laboratory interventions can serve as a values lever—a design practice that pries open conversations about ethics and helps the team come to consensus about ethics as design principles. The chapter suggests criteria by which researchers can evaluate the success of an ethics intervention and describes ways in which such interventions can increase designers’ ability to foreground, react to, and incorporate ethics into design.
Katie Shilton
Chapter 10. Applying “Moral Responsibility for Computing Artifacts” to PICT
Abstract
“Moral Responsibility for Computing Artifacts,” nicknamed “The Rules,” is a collaborative project dedicated to continuously revising and improving a short document promoting a succinct and fundamental articulation of responsibilities that accrue to people who design, develop, deploy, or knowingly use computing artifacts. At this writing there are 50 people signed on to the project from nine countries; the current document can be found at the end of this chapter. Although The Rules are designed to be applicable to all computing artifacts, there are interesting aspects specific to pervasive devices that make The Rules particularly important for this subset of computing artifacts. This chapter explores aspects of pervasive information and communication technologies (PICT) artifacts that are most problematic ethically, and examines how the principles in The Rules can be applied to help mitigate these ethical concerns.
Keith W. Miller
Chapter 11. Principles for the Ethical Guidance of PICT
Abstract
As used in this chapter, principles offer moral or ethical guidance at a level of specificity between those of foundational ethical theories, such as the Golden Rule or Immanuel Kant’s Categorical Imperative, and detailed rules of conduct, such as the 600-some commandments in the Hebrew Bible or the ever-expanding U.S. Code of Federal Regulations. In this chapter I describe the utility of a principle-based approach and offer a preliminary set of principles intended to provide practical guidance to people and organizations who create, distribute, use, and regulate pervasive information and communication technologies (PICT). My goal is to articulate principles at a level of abstraction that will facilitate (a) the creation of appropriate rules and (b) ethically sound decision-making and behavior in circumstances that no rules cover.
Kenneth D. Pimple
Backmatter
Metadaten
Titel
Emerging Pervasive Information and Communication Technologies (PICT)
herausgegeben von
Kenneth D. Pimple
Copyright-Jahr
2014
Verlag
Springer Netherlands
Electronic ISBN
978-94-007-6833-8
Print ISBN
978-94-007-6832-1
DOI
https://doi.org/10.1007/978-94-007-6833-8

Premium Partner