Data & Digital Ethics: some
Moral principles that govern a person's behaviour or the
way in which they conduct an activity…
August 17 Kate Carruthers | UNSW 1
“We ask ethical questions whenever we think
about how we should act. Being ethical is a
part of what defines us as human beings.”
The Ethics Centre, Sydney
“A few guidelines are useful in most situations:
• Use the golden rule: ask yourself how you would like to be treated
as a human being, citizen or customer.
• There are always unintended consequences: embrace new positive
uses of technology, and block undesirable uses.
• Success usually comes from exercising discipline and self-restraint
in using technology, rather than pushing the limits.”
August 17 Kate Carruthers | UNSW 3
Goasduff, C. L. (2016, March 07). Kick-Start the Conversation on Digital Ethics. Retrieved August 15, 2017, from
Areas of focus
• Ethics of data - how we generate, record & share
• Ethics of algorithms - how we interpret data via
artificial intelligence, machine learning and robots
• Ethics of practices - devising responsible
innovation and professional codes to guide this
August 17 Kate Carruthers | UNSW 4
What is data ethics?
Luciano Floridi, Mariarosaria Taddeo
Phil. Trans. R. Soc. A 2016 374
20160360; DOI: 10.1098/rsta.2016.0360. Published
14 November 2016
5 Propositions about data
1.Data is not neutral
2.There is no such thing as raw data
3.The signal to noise ratio has changed
4.Data is not inherently smart
5.The more data we have the less anonymity
August 17 Kate Carruthers | UNSW 5
August 17 Kate Carruthers | UNSW 6
Some food for thought
August 17 7Kate Carruthers | UNSW
August 17 Kate Carruthers | UNSW 8
August 17 Kate Carruthers | UNSW 9
This Photo by Unknown Author is licensed under CC BY-NC-SA
“We show, via a massive (N = 689,003) experiment on Facebook,
that emotional states can be transferred to others via emotional
contagion, leading people to experience the same emotions without
their awareness. We provide experimental evidence that emotional
contagion occurs without direct interaction between people
(exposure to a friend expressing an emotion is sufficient), and in the
complete absence of nonverbal cues.”
August 17 Kate Carruthers | UNSW 10
Kramer, A. D., Guillory, J. E., & Hancock, J. T. (2014). Experimental evidence of
massive-scale emotional contagion through social networks. Proceedings
of the National Academy of Sciences, 111(24), 8788-8790.
August 17 Kate Carruthers | UNSW 11
Some traditional approaches
August 17 16Kate Carruthers | UNSW
1. Minimize attack surface area
2. Establish secure defaults
3. Principle of Least privilege
4. Principle of Defence in depth
5. Fail securely
6. Don’t trust services
7. Separation of duties
8. Avoid security by obscurity
9. Keep security simple
10. Fix security issues correctly
OWASP Security by Design Principles
August 17 Kate Carruthers | UNSW 17
Open Web Application Security Project
IEEE CS/ACM Code of Ethics & Professional Practice
Software engineers shall commit themselves to making the analysis, specification, design, development, testing and maintenance of software a
beneficial and respected profession. In accordance with their commitment to the health, safety and welfare of the public, software engineers
shall adhere to the following Eight Principles:
1. Public: Software engineers shall act consistently with the public interest.
2. Client and Employer: Software engineers shall act in a manner that is in the best interests of their client and employer, consistent with the
3. Product: Software engineers shall ensure that their products and related modifications meet the highest professional standards possible.
4. Judgement: Software engineers shall maintain integrity and independence in their professional judgment.
5. Management: Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of
software development and maintenance.
6. Profession: Software engineers shall advance the integrity and reputation of the profession consistent with the public interest.
7. Colleagues: Software engineers shall be fair to and supportive of their colleagues.
8. Self: Software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical
approach to the practice of the profession.
August 17 Kate Carruthers | UNSW 18
ACM Code of Ethics
August 17 Kate Carruthers | UNSW 19
As an ACM member I will
1. Contribute to society and human well-being.
2. Avoid harm to others.
3. Be honest and trustworthy.
4. Be fair and take action not to discriminate.
5. Honor property rights including copyrights and patent.
6. Give proper credit for intellectual property.
7. Respect the privacy of others.
8. Honor confidentiality.
From the ACM Code of Ethics
Accenture: 12 guidelines for developing data ethics codes
1. The highest priority is to respect the persons behind the data.
2. Attend to the downstream uses of datasets.
3. Provenance of the data and analytical tools shapes the consequences of
4. Strive to match privacy and security safeguards with privacy and security
5. Always follow the law, but understand that the law is often a minimum bar.
6. Be wary of collecting data just for the sake of more data.
7. Data can be a tool of inclusion and exclusion.
August 17 Kate Carruthers | UNSW 20
Accenture: 12 guidelines for developing data ethics codes
8. As much as possible, explain methods for analysis and marketing to data
9. Data scientists and practitioners should accurately represent their
qualifications, limits to their expertise, adhere to professional standards,
and strive for peer accountability.
10.Aspire to design practices that incorporate transparency, configurability,
accountability, and auditability.
11.Products and research practices should be subject to internal, and
potentially external ethical review.
12.Governance practices should be robust, known to all team members and
August 17 Kate Carruthers | UNSW 21
Some things to think about
August 17 22Kate Carruthers | UNSW
Privacy by Design
1. Proactive not Reactive; Preventative not
2. Privacy as the Default Setting
3. Privacy Embedded into Design
4. Full Functionality – Positive-Sum, not Zero-Sum
5. End-to-End Security – Full Lifecycle Protection
6. Visibility and Transparency – Keep it Open
7. Respect for User Privacy – Keep it User-Centric
August 17 Kate Carruthers | UNSW 23
“Privacy is an inherent
human right, and a
maintaining the human
condition with dignity and
- Bruce Schneier
August 17 Kate Carruthers | UNSW 24
Technology has no
August 17 Kate Carruthers | UNSW 25
the biases of its
August 17 Kate Carruthers | UNSW 26
Kent Aitken, Prime Ministers Fellow,
Public Policy Forum Canada, 2017
Some new approaches
August 17 27Kate Carruthers | UNSW
August 17 Kate Carruthers | UNSW 28
August 17 Kate Carruthers | UNSW 29
August 17 Kate Carruthers | UNSW 32
More thought is
Georgetown University, Kennedy Institute of Ethics, Ethics Lab
Causeit Data Ethics
The BIG Data Ethics Cheat Sheet, Hackermoon
Digital Ethics Lab - Oxford Internet Institute - University of Oxford
Guidelines on Ethical Research - British Sociological Association
What is data ethics? Luciano Floridi, Mariarosaria Taddeo. Phil. Trans. R. Soc. A 2016 374
20160360; DOI: 10.1098/rsta.2016.0360. Published 14 November 2016
Digital Enlightenment Forum: Digital Ethics. Workshop Report. (2016, March 1). Retrieved August 16, 2017, from
A deep study on the concept of digital ethics. Maggiolini, Piercarlo. (2014).. Revista de Administração de
Empresas, 54(5), 585-591. https://dx.doi.org/10.1590/S0034-759020140511
August 17 Kate Carruthers | UNSW 33
August 17 Kate Carruthers | UNSW 34