SlideShare a Scribd company logo
1 of 41
Download to read offline
Data & Digital Ethics
Kate Carruthers
Version 1.0
March 2018
Classification: PUBLIC
Slides are available
https://www.slideshare.net/carruthk
March 18 Kate Carruthers | UNSW 1
Agenda
1. Ethics and data
2. Why this important
3. Some traditional approaches
4. Some new approaches
5. What we need to do
March 18 Kate Carruthers | UNSW 2
Ethics
Moral principles that govern a person's behaviour or the
way in which they conduct an activity…
March 18 Kate Carruthers | UNSW 3
“We ask ethical questions whenever we think
about how we should act. Being ethical is a
part of what defines us as human beings.”
The Ethics Centre, Sydney
March 18 Kate Carruthers | UNSW 4
Areas of focus
• Ethics of data - how we generate, record & share
data
• Ethics of algorithms - how we interpret data via
artificial intelligence, machine learning and robots
• Ethics of practices - devising responsible
innovation and professional codes to guide this
emerging science
March 18 Kate Carruthers | UNSW 5
What is data ethics?
Luciano Floridi, Mariarosaria Taddeo
Phil. Trans. R. Soc. A 2016 374
20160360; DOI: 10.1098/rsta.2016.0360. Published
14 November 2016
5 Propositions about data
1.Data is not neutral
2.There is no such thing as raw data
3.The signal to noise ratio has changed
4.Data is not inherently smart
5.The more data we have the less anonymity
March 18 Kate Carruthers | UNSW 6
March 18 Kate Carruthers | UNSW 7
Privacy
Data
Governance
Cyber
Security
Ethics
The essentials
March 18 Kate Carruthers | UNSW 8
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-
hacks/
March 18 Kate Carruthers | UNSW 9
This Photo by Unknown Author is licensed under CC BY-NC-SA
March 18 Kate Carruthers | UNSW 10
https://www.arnnet.com.au/article/609309/australian-red-cross-launches-investigation-after-massive-data-cock-up/
March 18 Kate Carruthers | UNSW 11
http://www.news.com.au/technology/online/australias-2016-census-had-significant-and-obvious-oversights-report-
finds/news-story/6edcf8f897b2361965bd72683ee6edbe
Facebook study
“We show, via a massive (N = 689,003) experiment on Facebook,
that emotional states can be transferred to others via emotional
contagion, leading people to experience the same emotions without
their awareness. We provide experimental evidence that emotional
contagion occurs without direct interaction between people
(exposure to a friend expressing an emotion is sufficient), and in the
complete absence of nonverbal cues.”
March 18 Kate Carruthers | UNSW 12
Kramer, A. D., Guillory, J. E., & Hancock, J. T. (2014). Experimental evidence of
massive-scale emotional contagion through social networks. Proceedings
of the National Academy of Sciences, 111(24), 8788-8790.
March 18 Kate Carruthers | UNSW 13
http://thehackernews.com/2017/07/sweden-data-breach.html
March 18 Kate Carruthers | UNSW 14
******
https://www.theverge.com/2016/3/24/11297050/tay-microsoft-chatbot-racist
March 18 Kate Carruthers | UNSW 15
“Revealed: 50
million Facebook
profiles harvested
for Cambridge
Analytica in major
data breach”
https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election
March 18 Kate Carruthers | UNSW 16
https://medium.com/textifire/cambridge-analytica-microsofts-exploitative-ad-tech-c2db8633f542
May 2017: Cambridge Analytica: Microsoft’s Exploitative Ad-Tech
Trump & Brexit’s infamous data firm was allegedly grown in the Microsoft-funded
advertising research labs at Cambridge University.
Traditional approaches
• Security by Design
• Privacy by Design
• Examples:
oIEEE CS/ACM Code of Ethics
oACM Code of Ethics
• Guidelines
March 18 Kate Carruthers | UNSW 17
1. Minimize attack surface area
2. Establish secure defaults
3. Principle of Least privilege
4. Principle of Defence in depth
5. Fail securely
6. Don’t trust services
7. Separation of duties
8. Avoid security by obscurity
9. Keep security simple
10. Fix security issues correctly
OWASP Security by Design Principles
March 18 Kate Carruthers | UNSW 18
Open Web Application Security Project
https://www.owasp.org/index.php/Security_by_Design_Principles
Privacy matters
Privacy by Design
1. Proactive not Reactive; Preventative not
Remedial
2. Privacy as the Default Setting
3. Privacy Embedded into Design
4. Full Functionality – Positive-Sum, not Zero-Sum
5. End-to-End Security – Full Lifecycle Protection
6. Visibility and Transparency – Keep it Open
7. Respect for User Privacy – Keep it User-Centric
March 18 Kate Carruthers | UNSW 19
“Privacy is an inherent
human right, and a
requirement for
maintaining the human
condition with dignity and
respect.”
- Bruce Schneier
https://www.schneier.com/essays/archives/2006/05/the_eternal_value_of.html
IEEE CS/ACM Code of Ethics & Professional Practice
Software engineers shall commit themselves to making the analysis, specification, design, development, testing and maintenance of software a
beneficial and respected profession. In accordance with their commitment to the health, safety and welfare of the public, software engineers
shall adhere to the following Eight Principles:
1. Public: Software engineers shall act consistently with the public interest.
2. Client and Employer: Software engineers shall act in a manner that is in the best interests of their client and employer, consistent with the
public interest.
3. Product: Software engineers shall ensure that their products and related modifications meet the highest professional standards possible.
4. Judgement: Software engineers shall maintain integrity and independence in their professional judgment.
5. Management: Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of
software development and maintenance.
6. Profession: Software engineers shall advance the integrity and reputation of the profession consistent with the public interest.
7. Colleagues: Software engineers shall be fair to and supportive of their colleagues.
8. Self: Software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical
approach to the practice of the profession.
March 18 Kate Carruthers | UNSW 20
https://www.computer.org/web/education/code-of-ethics
ACM Code of Ethics
March 18 Kate Carruthers | UNSW 21
As an ACM member I will
1. Contribute to society and human well-being.
2. Avoid harm to others.
3. Be honest and trustworthy.
4. Be fair and take action not to discriminate.
5. Honor property rights including copyrights and patent.
6. Give proper credit for intellectual property.
7. Respect the privacy of others.
8. Honor confidentiality.
From the ACM Code of Ethics http://www.acm.org/about/code-of-ethics
Accenture: 12 guidelines for developing data ethics codes
1. The highest priority is to respect the persons behind the data.
2. Attend to the downstream uses of datasets.
3. Provenance of the data and analytical tools shapes the consequences of
their use.
4. Strive to match privacy and security safeguards with privacy and security
expectations.
5. Always follow the law, but understand that the law is often a minimum bar.
6. Be wary of collecting data just for the sake of more data.
7. Data can be a tool of inclusion and exclusion.
March 18 Kate Carruthers | UNSW 22
https://www.accenture.com/t20160629T012639__w__/us-en/_acnmedia/PDF-24/Accenture-Universal-Principles-Data-Ethics.pdf
Accenture: 12 guidelines for developing data ethics codes
8. As much as possible, explain methods for analysis and marketing to data
disclosers.
9. Data scientists and practitioners should accurately represent their
qualifications, limits to their expertise, adhere to professional standards,
and strive for peer accountability.
10.Aspire to design practices that incorporate transparency, configurability,
accountability, and auditability.
11.Products and research practices should be subject to internal, and
potentially external ethical review.
12.Governance practices should be robust, known to all team members and
reviewed regularly
March 18 Kate Carruthers | UNSW 23
https://www.accenture.com/t20160629T012639__w__/us-en/_acnmedia/PDF-24/Accenture-Universal-Principles-Data-Ethics.pdf
Issues with Codes of Ethics
• Often nobody knows they exist
• Even if they do, nobody follows them
• If they do follow them it turns into work to rule
• It’s hard to articulate all ethical requirements in a code
• Needs strong institutional support
• Guidelines have similar issues
March 18 Kate Carruthers | UNSW 24
March 18 Kate Carruthers | UNSW 25
“One Zettabyte is approximately equal to a
thousand Exabytes, a billion Terabytes, or a trillion
Gigabytes.”
https://blogs.cisco.com/sp/the-zettabyte-era-officially-begins-how-much-is-that
March 18 Kate Carruthers | UNSW 26
March 18 Kate Carruthers | UNSW 27
Technology has no
ethics.
People demonstrate
ethics.
March 18 Kate Carruthers | UNSW 28
Technology inherits
the biases of its
makers – therefore
we need diversity
March 18 Kate Carruthers | UNSW 29
“Complexity is a defining
feature of the digital era, &
we are not adjusting our
governance structures to
manage it.” Kent Aiken, Prime Minister’s Fellow,
Public Policy Forum Canada, 2017
Some new approaches
• FATML – Fairness, Accountability and Transparency in
Machine Learning
• IEEE Global Initiative on Ethics of Autonomous and
Intelligent Systems
• Algorithmic Justice League
• Education in digital ethics
March 18 Kate Carruthers | UNSW 30
March 18 Kate Carruthers | UNSW 31
http://www.fatml.org/
March 18 Kate Carruthers | UNSW 32
https://standards.ieee.org/develop/indconn/ec/autonomous_systems.html
March 18 Kate Carruthers | UNSW 33
March 18 Kate Carruthers | UNSW 34
Education
March 18 Kate Carruthers | UNSW 35
We cannot leave
ethics to volunteer
groups!
Digital Ethics?
“A few guidelines are useful in most situations:
• Use the golden rule: ask yourself how you would like to
be treated as a human being, citizen or customer.
• There are always unintended consequences: embrace
new positive uses of technology, and block undesirable
uses.
• Success usually comes from exercising discipline and
self-restraint in using technology, rather than pushing the
limits.”
March 18 Kate Carruthers | UNSW 36
Goasduff, C. L. (2016, March 07). Kick-Start the Conversation on Digital Ethics. Retrieved August 15, 2017, from
http://www.gartner.com/smarterwithgartner/kick-start-the-conversation-on-digital-ethics/
March 18 Kate Carruthers | UNSW 37
We need formal ways
to consider the ethical
implications of data
and its uses
Slides are available
https://www.slideshare.net/carruthk
March 18 Kate Carruthers | UNSW 38
Resources
Georgetown University, Kennedy Institute of Ethics, Ethics Lab
Causeit Data Ethics
The BIG Data Ethics Cheat Sheet, Hackermoon
Digital Ethics Lab - Oxford Internet Institute - University of Oxford
Guidelines on Ethical Research - British Sociological Association
What is data ethics? Luciano Floridi, Mariarosaria Taddeo. Phil. Trans. R. Soc. A 2016 374
20160360; DOI: 10.1098/rsta.2016.0360. Published 14 November 2016
Digital Enlightenment Forum: Digital Ethics. Workshop Report. (2016, March 1). Retrieved August 16, 2017, from
https://digitalenlightenment.org/sites/default/files/users/14/Digital%20Ethics%20Workshop%20Report%20v2.pdf
A deep study on the concept of digital ethics. Maggiolini, Piercarlo. (2014).. Revista de Administração de
Empresas, 54(5), 585-591. https://dx.doi.org/10.1590/S0034-759020140511
March 18 Kate Carruthers | UNSW 39
Thank you
Kate Carruthers
k.carruthers@unsw.edu.au
March 18 Kate Carruthers | UNSW 40

More Related Content

What's hot

Keith prabhu global high on cloud summit
Keith prabhu  global high on cloud summitKeith prabhu  global high on cloud summit
Keith prabhu global high on cloud summit
administrator_confidis
 
ICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_final
John Weiler
 
Xact aceds 5-7-14 webcast
Xact aceds 5-7-14 webcastXact aceds 5-7-14 webcast
Xact aceds 5-7-14 webcast
Robbie Hilson
 
PERC_BIG Data CreditScoring_102015_1(2)
PERC_BIG Data CreditScoring_102015_1(2)PERC_BIG Data CreditScoring_102015_1(2)
PERC_BIG Data CreditScoring_102015_1(2)
Michael Turner
 

What's hot (20)

Modelling Higher Education's digital future
Modelling Higher Education's digital future Modelling Higher Education's digital future
Modelling Higher Education's digital future
 
Implementing Data Governance & ISMS in a University
Implementing Data Governance & ISMS in a UniversityImplementing Data Governance & ISMS in a University
Implementing Data Governance & ISMS in a University
 
Social media: balancing risk and control
Social media: balancing risk and controlSocial media: balancing risk and control
Social media: balancing risk and control
 
Keith prabhu global high on cloud summit
Keith prabhu  global high on cloud summitKeith prabhu  global high on cloud summit
Keith prabhu global high on cloud summit
 
2021 GeoConvergence: Ethics presentation
2021 GeoConvergence: Ethics presentation2021 GeoConvergence: Ethics presentation
2021 GeoConvergence: Ethics presentation
 
Presentation
PresentationPresentation
Presentation
 
OECD Geospatial Lab - Locus Charter
OECD Geospatial Lab - Locus Charter OECD Geospatial Lab - Locus Charter
OECD Geospatial Lab - Locus Charter
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
 
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challenges
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
 
ÐDaM and Equally presentation at the EDCon conference
ÐDaM and Equally presentation at the EDCon conferenceÐDaM and Equally presentation at the EDCon conference
ÐDaM and Equally presentation at the EDCon conference
 
ICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_final
 
Where is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudWhere is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloud
 
David Smith gfke 2014
David Smith gfke 2014David Smith gfke 2014
David Smith gfke 2014
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
 
Xact aceds 5-7-14 webcast
Xact aceds 5-7-14 webcastXact aceds 5-7-14 webcast
Xact aceds 5-7-14 webcast
 
PERC_BIG Data CreditScoring_102015_1(2)
PERC_BIG Data CreditScoring_102015_1(2)PERC_BIG Data CreditScoring_102015_1(2)
PERC_BIG Data CreditScoring_102015_1(2)
 
Citrix Security Survey Guide
Citrix Security Survey GuideCitrix Security Survey Guide
Citrix Security Survey Guide
 

Similar to Data & Digital Ethics - CDAO Conference Sydney 2018

acatech_STUDY_Internet_Privacy_WEB
acatech_STUDY_Internet_Privacy_WEBacatech_STUDY_Internet_Privacy_WEB
acatech_STUDY_Internet_Privacy_WEB
Jaina Hirai
 
Introduction to Big Data and Data Science
Introduction to Big Data and Data ScienceIntroduction to Big Data and Data Science
Introduction to Big Data and Data Science
Feyzi R. Bagirov
 

Similar to Data & Digital Ethics - CDAO Conference Sydney 2018 (20)

Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptx
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry Standards
 
Governance compliance
Governance   complianceGovernance   compliance
Governance compliance
 
Creating a new culture around authenticity and generative AI
Creating a new culture around authenticity and generative AICreating a new culture around authenticity and generative AI
Creating a new culture around authenticity and generative AI
 
Industry Standards as vehicle to address socio-technical AI challenges
Industry Standards as vehicle to address socio-technical AI challengesIndustry Standards as vehicle to address socio-technical AI challenges
Industry Standards as vehicle to address socio-technical AI challenges
 
Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwari
 
Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61
 
Big Data: Opportunity & Challenges
Big Data: Opportunity & ChallengesBig Data: Opportunity & Challenges
Big Data: Opportunity & Challenges
 
Big Data: Opportunity & Challenges
Big Data: Opportunity & ChallengesBig Data: Opportunity & Challenges
Big Data: Opportunity & Challenges
 
Ethics of Analytics and Machine Learning
Ethics of Analytics and Machine LearningEthics of Analytics and Machine Learning
Ethics of Analytics and Machine Learning
 
acatech_STUDY_Internet_Privacy_WEB
acatech_STUDY_Internet_Privacy_WEBacatech_STUDY_Internet_Privacy_WEB
acatech_STUDY_Internet_Privacy_WEB
 
Ethics in Technology Handout
Ethics in Technology HandoutEthics in Technology Handout
Ethics in Technology Handout
 
Data ethics
Data ethicsData ethics
Data ethics
 
Data; Data manipulation, sorting, grouping, rearranging. Plotting the data. D...
Data; Data manipulation, sorting, grouping, rearranging. Plotting the data. D...Data; Data manipulation, sorting, grouping, rearranging. Plotting the data. D...
Data; Data manipulation, sorting, grouping, rearranging. Plotting the data. D...
 
AI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security CommonsAI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security Commons
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
 
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
 
Introduction to Big Data and Data Science
Introduction to Big Data and Data ScienceIntroduction to Big Data and Data Science
Introduction to Big Data and Data Science
 

More from Kate Carruthers

The Power of Social Business
The Power of Social BusinessThe Power of Social Business
The Power of Social Business
Kate Carruthers
 
Social innovation Sydney Case Study
Social innovation Sydney Case StudySocial innovation Sydney Case Study
Social innovation Sydney Case Study
Kate Carruthers
 

More from Kate Carruthers (19)

Data Governance - a work in progress
Data Governance - a work in progressData Governance - a work in progress
Data Governance - a work in progress
 
Future proof your career
Future proof your career  Future proof your career
Future proof your career
 
Taking disruption for granted
Taking disruption for grantedTaking disruption for granted
Taking disruption for granted
 
The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...
 
Building the sharing economy
Building the sharing economy Building the sharing economy
Building the sharing economy
 
Hardware is Hard - Products are Hard Melbourne 2013
Hardware is Hard - Products are Hard Melbourne 2013Hardware is Hard - Products are Hard Melbourne 2013
Hardware is Hard - Products are Hard Melbourne 2013
 
Social and technology trends for banking
Social and technology trends for bankingSocial and technology trends for banking
Social and technology trends for banking
 
Internet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsInternet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business Models
 
Crowdfunding
CrowdfundingCrowdfunding
Crowdfunding
 
Your blog your brand - tips on getting started with your blog
Your blog your brand - tips on getting started with your blogYour blog your brand - tips on getting started with your blog
Your blog your brand - tips on getting started with your blog
 
Social media for social good 2012
Social media for social good 2012Social media for social good 2012
Social media for social good 2012
 
Whats the big idea with social media media140-2012
Whats the big idea with social media media140-2012Whats the big idea with social media media140-2012
Whats the big idea with social media media140-2012
 
Failing in the right direction
Failing in the right directionFailing in the right direction
Failing in the right direction
 
The Power of Social Business
The Power of Social BusinessThe Power of Social Business
The Power of Social Business
 
Gathering11 - envisioning change
Gathering11 - envisioning changeGathering11 - envisioning change
Gathering11 - envisioning change
 
Social innovation Sydney Case Study
Social innovation Sydney Case StudySocial innovation Sydney Case Study
Social innovation Sydney Case Study
 
Beta space | introduction websites
Beta space | introduction websitesBeta space | introduction websites
Beta space | introduction websites
 
Leadership and the Digital Revolution
Leadership and the Digital RevolutionLeadership and the Digital Revolution
Leadership and the Digital Revolution
 
#C3t The Command & Control of Twitter
#C3t The Command & Control of Twitter#C3t The Command & Control of Twitter
#C3t The Command & Control of Twitter
 

Recently uploaded

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 

Recently uploaded (20)

Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 

Data & Digital Ethics - CDAO Conference Sydney 2018

  • 1. Data & Digital Ethics Kate Carruthers Version 1.0 March 2018 Classification: PUBLIC
  • 3. Agenda 1. Ethics and data 2. Why this important 3. Some traditional approaches 4. Some new approaches 5. What we need to do March 18 Kate Carruthers | UNSW 2
  • 4. Ethics Moral principles that govern a person's behaviour or the way in which they conduct an activity… March 18 Kate Carruthers | UNSW 3 “We ask ethical questions whenever we think about how we should act. Being ethical is a part of what defines us as human beings.” The Ethics Centre, Sydney
  • 5. March 18 Kate Carruthers | UNSW 4
  • 6. Areas of focus • Ethics of data - how we generate, record & share data • Ethics of algorithms - how we interpret data via artificial intelligence, machine learning and robots • Ethics of practices - devising responsible innovation and professional codes to guide this emerging science March 18 Kate Carruthers | UNSW 5 What is data ethics? Luciano Floridi, Mariarosaria Taddeo Phil. Trans. R. Soc. A 2016 374 20160360; DOI: 10.1098/rsta.2016.0360. Published 14 November 2016
  • 7. 5 Propositions about data 1.Data is not neutral 2.There is no such thing as raw data 3.The signal to noise ratio has changed 4.Data is not inherently smart 5.The more data we have the less anonymity March 18 Kate Carruthers | UNSW 6
  • 8. March 18 Kate Carruthers | UNSW 7 Privacy Data Governance Cyber Security Ethics The essentials
  • 9. March 18 Kate Carruthers | UNSW 8 http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches- hacks/
  • 10. March 18 Kate Carruthers | UNSW 9 This Photo by Unknown Author is licensed under CC BY-NC-SA
  • 11. March 18 Kate Carruthers | UNSW 10 https://www.arnnet.com.au/article/609309/australian-red-cross-launches-investigation-after-massive-data-cock-up/
  • 12. March 18 Kate Carruthers | UNSW 11 http://www.news.com.au/technology/online/australias-2016-census-had-significant-and-obvious-oversights-report- finds/news-story/6edcf8f897b2361965bd72683ee6edbe
  • 13. Facebook study “We show, via a massive (N = 689,003) experiment on Facebook, that emotional states can be transferred to others via emotional contagion, leading people to experience the same emotions without their awareness. We provide experimental evidence that emotional contagion occurs without direct interaction between people (exposure to a friend expressing an emotion is sufficient), and in the complete absence of nonverbal cues.” March 18 Kate Carruthers | UNSW 12 Kramer, A. D., Guillory, J. E., & Hancock, J. T. (2014). Experimental evidence of massive-scale emotional contagion through social networks. Proceedings of the National Academy of Sciences, 111(24), 8788-8790.
  • 14. March 18 Kate Carruthers | UNSW 13 http://thehackernews.com/2017/07/sweden-data-breach.html
  • 15. March 18 Kate Carruthers | UNSW 14 ****** https://www.theverge.com/2016/3/24/11297050/tay-microsoft-chatbot-racist
  • 16. March 18 Kate Carruthers | UNSW 15 “Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach” https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election
  • 17. March 18 Kate Carruthers | UNSW 16 https://medium.com/textifire/cambridge-analytica-microsofts-exploitative-ad-tech-c2db8633f542 May 2017: Cambridge Analytica: Microsoft’s Exploitative Ad-Tech Trump & Brexit’s infamous data firm was allegedly grown in the Microsoft-funded advertising research labs at Cambridge University.
  • 18. Traditional approaches • Security by Design • Privacy by Design • Examples: oIEEE CS/ACM Code of Ethics oACM Code of Ethics • Guidelines March 18 Kate Carruthers | UNSW 17
  • 19. 1. Minimize attack surface area 2. Establish secure defaults 3. Principle of Least privilege 4. Principle of Defence in depth 5. Fail securely 6. Don’t trust services 7. Separation of duties 8. Avoid security by obscurity 9. Keep security simple 10. Fix security issues correctly OWASP Security by Design Principles March 18 Kate Carruthers | UNSW 18 Open Web Application Security Project https://www.owasp.org/index.php/Security_by_Design_Principles
  • 20. Privacy matters Privacy by Design 1. Proactive not Reactive; Preventative not Remedial 2. Privacy as the Default Setting 3. Privacy Embedded into Design 4. Full Functionality – Positive-Sum, not Zero-Sum 5. End-to-End Security – Full Lifecycle Protection 6. Visibility and Transparency – Keep it Open 7. Respect for User Privacy – Keep it User-Centric March 18 Kate Carruthers | UNSW 19 “Privacy is an inherent human right, and a requirement for maintaining the human condition with dignity and respect.” - Bruce Schneier https://www.schneier.com/essays/archives/2006/05/the_eternal_value_of.html
  • 21. IEEE CS/ACM Code of Ethics & Professional Practice Software engineers shall commit themselves to making the analysis, specification, design, development, testing and maintenance of software a beneficial and respected profession. In accordance with their commitment to the health, safety and welfare of the public, software engineers shall adhere to the following Eight Principles: 1. Public: Software engineers shall act consistently with the public interest. 2. Client and Employer: Software engineers shall act in a manner that is in the best interests of their client and employer, consistent with the public interest. 3. Product: Software engineers shall ensure that their products and related modifications meet the highest professional standards possible. 4. Judgement: Software engineers shall maintain integrity and independence in their professional judgment. 5. Management: Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintenance. 6. Profession: Software engineers shall advance the integrity and reputation of the profession consistent with the public interest. 7. Colleagues: Software engineers shall be fair to and supportive of their colleagues. 8. Self: Software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical approach to the practice of the profession. March 18 Kate Carruthers | UNSW 20 https://www.computer.org/web/education/code-of-ethics
  • 22. ACM Code of Ethics March 18 Kate Carruthers | UNSW 21 As an ACM member I will 1. Contribute to society and human well-being. 2. Avoid harm to others. 3. Be honest and trustworthy. 4. Be fair and take action not to discriminate. 5. Honor property rights including copyrights and patent. 6. Give proper credit for intellectual property. 7. Respect the privacy of others. 8. Honor confidentiality. From the ACM Code of Ethics http://www.acm.org/about/code-of-ethics
  • 23. Accenture: 12 guidelines for developing data ethics codes 1. The highest priority is to respect the persons behind the data. 2. Attend to the downstream uses of datasets. 3. Provenance of the data and analytical tools shapes the consequences of their use. 4. Strive to match privacy and security safeguards with privacy and security expectations. 5. Always follow the law, but understand that the law is often a minimum bar. 6. Be wary of collecting data just for the sake of more data. 7. Data can be a tool of inclusion and exclusion. March 18 Kate Carruthers | UNSW 22 https://www.accenture.com/t20160629T012639__w__/us-en/_acnmedia/PDF-24/Accenture-Universal-Principles-Data-Ethics.pdf
  • 24. Accenture: 12 guidelines for developing data ethics codes 8. As much as possible, explain methods for analysis and marketing to data disclosers. 9. Data scientists and practitioners should accurately represent their qualifications, limits to their expertise, adhere to professional standards, and strive for peer accountability. 10.Aspire to design practices that incorporate transparency, configurability, accountability, and auditability. 11.Products and research practices should be subject to internal, and potentially external ethical review. 12.Governance practices should be robust, known to all team members and reviewed regularly March 18 Kate Carruthers | UNSW 23 https://www.accenture.com/t20160629T012639__w__/us-en/_acnmedia/PDF-24/Accenture-Universal-Principles-Data-Ethics.pdf
  • 25. Issues with Codes of Ethics • Often nobody knows they exist • Even if they do, nobody follows them • If they do follow them it turns into work to rule • It’s hard to articulate all ethical requirements in a code • Needs strong institutional support • Guidelines have similar issues March 18 Kate Carruthers | UNSW 24
  • 26. March 18 Kate Carruthers | UNSW 25 “One Zettabyte is approximately equal to a thousand Exabytes, a billion Terabytes, or a trillion Gigabytes.” https://blogs.cisco.com/sp/the-zettabyte-era-officially-begins-how-much-is-that
  • 27. March 18 Kate Carruthers | UNSW 26
  • 28. March 18 Kate Carruthers | UNSW 27 Technology has no ethics. People demonstrate ethics.
  • 29. March 18 Kate Carruthers | UNSW 28 Technology inherits the biases of its makers – therefore we need diversity
  • 30. March 18 Kate Carruthers | UNSW 29 “Complexity is a defining feature of the digital era, & we are not adjusting our governance structures to manage it.” Kent Aiken, Prime Minister’s Fellow, Public Policy Forum Canada, 2017
  • 31. Some new approaches • FATML – Fairness, Accountability and Transparency in Machine Learning • IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems • Algorithmic Justice League • Education in digital ethics March 18 Kate Carruthers | UNSW 30
  • 32. March 18 Kate Carruthers | UNSW 31 http://www.fatml.org/
  • 33. March 18 Kate Carruthers | UNSW 32 https://standards.ieee.org/develop/indconn/ec/autonomous_systems.html
  • 34. March 18 Kate Carruthers | UNSW 33
  • 35. March 18 Kate Carruthers | UNSW 34 Education
  • 36. March 18 Kate Carruthers | UNSW 35 We cannot leave ethics to volunteer groups!
  • 37. Digital Ethics? “A few guidelines are useful in most situations: • Use the golden rule: ask yourself how you would like to be treated as a human being, citizen or customer. • There are always unintended consequences: embrace new positive uses of technology, and block undesirable uses. • Success usually comes from exercising discipline and self-restraint in using technology, rather than pushing the limits.” March 18 Kate Carruthers | UNSW 36 Goasduff, C. L. (2016, March 07). Kick-Start the Conversation on Digital Ethics. Retrieved August 15, 2017, from http://www.gartner.com/smarterwithgartner/kick-start-the-conversation-on-digital-ethics/
  • 38. March 18 Kate Carruthers | UNSW 37 We need formal ways to consider the ethical implications of data and its uses
  • 40. Resources Georgetown University, Kennedy Institute of Ethics, Ethics Lab Causeit Data Ethics The BIG Data Ethics Cheat Sheet, Hackermoon Digital Ethics Lab - Oxford Internet Institute - University of Oxford Guidelines on Ethical Research - British Sociological Association What is data ethics? Luciano Floridi, Mariarosaria Taddeo. Phil. Trans. R. Soc. A 2016 374 20160360; DOI: 10.1098/rsta.2016.0360. Published 14 November 2016 Digital Enlightenment Forum: Digital Ethics. Workshop Report. (2016, March 1). Retrieved August 16, 2017, from https://digitalenlightenment.org/sites/default/files/users/14/Digital%20Ethics%20Workshop%20Report%20v2.pdf A deep study on the concept of digital ethics. Maggiolini, Piercarlo. (2014).. Revista de Administração de Empresas, 54(5), 585-591. https://dx.doi.org/10.1590/S0034-759020140511 March 18 Kate Carruthers | UNSW 39