This document discusses artificial intelligence and the Internet of Things (IoT). It lists the background of Alexandra Deschamps-Sonsino, an industrial and interaction designer who is the first UK distributor of Arduino. The document then quotes Buckminster Fuller on the evolution of humanity and unpredictability of complex systems. It lists several principles, frameworks, and recommendations for developing trustworthy and secure IoT technologies, including the Adafruit IoT Bill of Rights, Arduino IoT Manifesto, and ENISA Baseline Security Recommendations for IoT. The document poses questions from Marshall McLuhan and Neil Postman about evaluating new technologies and their societal impacts. It concludes by mentioning Jozeph Weisenbaum
7. ‘Evolution is apparently intent that man fulfill a much
greater destiny than that of being a simple muscle
and reflex machine – a slave automaton- automation
displaces automatons.’
8. ‘Behaviour of whole systems unpredicted by the separately
observed behaviours of any of the system’s separate parts
or any subassembly of the system’s parts.’
30. minimum cryptographic security on its backend and
secure configuration
backend which implements additional security options
implement reliable and appropriate backend patching
procedures which should be evidenced
enforce a strong user identity policy
clear admin user rights management
37. Adafruit IoT Bill of Rights
Adam Greenfield's Everyware Principles
Arduino IoT Manifesto
A trustmark for IoT
Better Things
BSI Kitemark
CE, FCC, UL mark
Charter of Trust
CrowdSupply Proclamation of User Rights
Cyber Independent Testing Lab
Doteveryone trustworthy tech mark
ENISA Baseline Security Recommendations for IoT
Global Ecolabelling Network
Greenpeace Guide to greener Electronics
I am the Cavalry Five Star Automotive Cyber Safety Program
IEEE Standard for Harmonization of Internet of Things (IoT) Devices and Systems
IEEE Standard for Privacy and Security Architecture for Consumer Wireless Devices
iFixit Repairability score
Ind.ie Ethical Design Manifesto
IoT and public interest
IoT CyberSecurity Improvement Act of 2017
IoT Design Manifesto
IoT Facts
IoT Security Foundation Best Practice User Mark
Application Note: Mapping the IoT Security Foundation’s Compliance Framework to the DCMS proposed Code of Practice for Security in Consumer IoT
IoT Security Foundation Principles
Jen Persson Making of an IoT Trust Mark
Project Sopris Seven Properties of Highly Secure Devices
Respects your freedom hardware product certification
Secure by Design: Improving the cyber security of consumer Internet of Things Report
Securing consumer trust in the IoT, Principles and Recommendations 2017
Security Checklist for IoT
Seven Properties of Higly Secure Devices
"The Internet of Things and challenges
for consumer protection"
Doteveryone Ethical Tech Directory
38.
39. What does any artifact enlarge or enhance?
What does it erode or obsolesce?
What does it retrieve that has been earlier obsolesced?
What does it reverse or flip into when pushed to the
limits of its potential?
41. What is the problem to which the technology is the
solution?
Whose problem is it?
Which problem and what institutions might be more
seriously harmed by a technological solution?
What new problems might be created because we have
solved this problem?
What sort of people and institutions might acquire special
economic and political power because of technological
change?
What changes in language are being enforced by new
technologies and what is being gained and lost by such
changes?