SlideShare a Scribd company logo
1 of 22
IOT/ETHICS
BUTLER PROJECT
LUXEMBOURG, 10TH SEPT 2012
PEOPLE


Job Timmermans, Researcher (ETICA project)
AGENDA
CAN WE TRUST OUR BUTLER?
  •   ISSUES & CHALLENGES
  •   VALUE SENSITIVE DESIGN
  •   TRUST
  •   CALL FOR PAPERS
CIA CHIEF PETRAEUS
“We’ll Spy on You Through Your Dishwasher”
Wired, March 15, 2012
AN ETHICS OF IOT?
Party Stopper
or
Unique Selling Point?


IOT raises ethics challenges and opportunities
related to
autonomy, security, equity, equality,
justice, access, discrimination,
data profiling, confidentiality, ….
ISSUES 1/3
Privacy & Security
Blurring of contexts: private vs. public
Informed Consent vs. Obfuscation of Functionality
Confidence vs. Trust
Agency: social contract between people and objects?
Non-neutrality of IoT Metaphores
ISSUES 2/3
Responsibility & Precautionary Principle
Responsible Innovation & Setting new standards
Social justice & Digital divide
Support solving existing problems
Adaptation to mediated environment
ISSUES 3/3
New organizational principles and institutional design
New ontology
Fair distribution costs and benefits
Public acceptance of innovative technology
Technology lock-in
KEY PROBLEM
   21ST CENTURY:
   VALUE SENSITIVE DESIGN                                  Computers
                                                           Oiltankers
Responsibility                                             Airplanes
Privacy                                                    Reactors
Accountability                 Express                     Roads
Agency                        Implement                    Internet
Autonomy                                                   Electricity
Sustainability                                             Grids
Safety                                       Artefacts     Hospitals
Security          Values                  Architectures
                  Norms                     Materials
                                            Standards
                    Laws
                                             Security
                   Ideals                    Systems
                 Principles   Justify     Infrastructure
                               Audit
VALUE SENSITIVE
DESIGN
1. Conceptual investigations
2. (Empirical investigations)
3. Technical investigations
TRUST = IMPORTANT
IoT = disruptive
  •   Public / private blurred
  •   Unknown territory
  •   Feeling safe / secure
  •   Privacy requires Trust

Trust     User acceptation / adaptation
          Successful technology


Examples
  • Dutch Smart Metering roll out
  • Dutch Electronic Patient Record System
Smart
                                            mobile
                                           platform




 Smart
 server              Unifying
platform             BUTLER
                    Architecture
                 Secure, private, trustworthy
                     context capture
               Smart OSGi      Zigbee DPWS




                                                FreeRTOS


                                                             TinyOS
                                                   Contiki
           object/gateway    CoAP
              platform RPL          6LowPAN
                           IEEE 802.15.4
IOT + TRUST =
DIFFERENT
Real-life Impact
Many Unknowns
Defining features:
       •   Distributed / heterarchical structures
       •   Non deterministic / Smart behavior
       •   Dynamic configuration
       •   Obfuscation
       •   Heterogeneity
TRUST = VAGUE
Complex notion
Different meanings in Different disciplines
Conceptual muddle
Difficult to measure (no metrics/ methodologies)
DEFINITION OF TRUST
Accepted vulnerability
       to another's
              possible but not expected ill will
                                     (Friedman, Baier)
WHAT TO TRUST?
Others (E-Trust)
Institutions (Proper governance)
Systems (Technology Dependence)
TRUST VS
CONFICENCE
De-perimeterisation (De-p):
  • Passive                  Active insulation of data
  • Danger (nature)          Risk (manmade)
  • Confidence(no alt’s)     Trust (with alt’s)
                                       (Pieters, 2011)
TRUST VS
RELIABILITY
RELIABILITY
  • Thing – Person interaction
  • Interactively static
TRUST
  • Person – Person interaction
  • Interactively dynamic


Real People vs. ‘Internet’ People
                                    (Pettit, 2008)
TRUST: CRUCIAL
REQUIREMENT =CLUES
•Evidence of Face
•Evidence of Frame
•Evidence of File
               (Pettit, 2008)
REPUTATION SYSTEMS
Examples
  • Amazon
  • Google
  • Slashdot


Present Alternatives + Active system
Sources of Evidence
  • Face : online identity
  • Frame: Score by others
  • File : Aggregated reputation


 Decentralized / distributed reputation system
QUESTIONS?
CALL FOR PAPERS
Special Issue of Ethics and Information Technology (ETIN)
on the Internet of Things (IoT)

More Related Content

What's hot

Unit & Ubiquitous IoT for securing cyberentities
Unit & Ubiquitous IoT for securing cyberentitiesUnit & Ubiquitous IoT for securing cyberentities
Unit & Ubiquitous IoT for securing cyberentitiesDikShaant Kripalani
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Internet of things: dispelling common myths
Internet of things: dispelling common myths Internet of things: dispelling common myths
Internet of things: dispelling common myths Vish Nandlall
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGSChidiogo Mbonu
 
Living life on the edge - Thingmonk 2016
Living life on the edge - Thingmonk 2016 Living life on the edge - Thingmonk 2016
Living life on the edge - Thingmonk 2016 martinjgale
 
PhD Projects in IoT Network Simulator Research Guidance
PhD Projects in IoT Network Simulator Research GuidancePhD Projects in IoT Network Simulator Research Guidance
PhD Projects in IoT Network Simulator Research GuidancePhD Services
 
Ehip4 caring through sharing privacy and-security-technical-aspects riccardo ...
Ehip4 caring through sharing privacy and-security-technical-aspects riccardo ...Ehip4 caring through sharing privacy and-security-technical-aspects riccardo ...
Ehip4 caring through sharing privacy and-security-technical-aspects riccardo ...imec.archive
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security IssuesPhearin Sok
 
Resilience as a new Enforcement Model for IT Security based on Usage Control
Resilience as a new Enforcement Model for IT Security based on Usage ControlResilience as a new Enforcement Model for IT Security based on Usage Control
Resilience as a new Enforcement Model for IT Security based on Usage ControlSven Wohlgemuth
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksEcway Technologies
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceFaction XYZ
 
IoT Architecture
IoT ArchitectureIoT Architecture
IoT ArchitectureNaseeba P P
 
Debugging the internet of things the case of wireless sensor networks
Debugging the internet of things the case of wireless sensor networksDebugging the internet of things the case of wireless sensor networks
Debugging the internet of things the case of wireless sensor networksieeeprojectsbangalore
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computingRam kumar
 

What's hot (19)

What is io t
What is io tWhat is io t
What is io t
 
Unit & Ubiquitous IoT for securing cyberentities
Unit & Ubiquitous IoT for securing cyberentitiesUnit & Ubiquitous IoT for securing cyberentities
Unit & Ubiquitous IoT for securing cyberentities
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of things: dispelling common myths
Internet of things: dispelling common myths Internet of things: dispelling common myths
Internet of things: dispelling common myths
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
Living life on the edge - Thingmonk 2016
Living life on the edge - Thingmonk 2016 Living life on the edge - Thingmonk 2016
Living life on the edge - Thingmonk 2016
 
PhD Projects in IoT Network Simulator Research Guidance
PhD Projects in IoT Network Simulator Research GuidancePhD Projects in IoT Network Simulator Research Guidance
PhD Projects in IoT Network Simulator Research Guidance
 
Internet of Things (IoT): Readme
Internet of Things (IoT): ReadmeInternet of Things (IoT): Readme
Internet of Things (IoT): Readme
 
Ehip4 caring through sharing privacy and-security-technical-aspects riccardo ...
Ehip4 caring through sharing privacy and-security-technical-aspects riccardo ...Ehip4 caring through sharing privacy and-security-technical-aspects riccardo ...
Ehip4 caring through sharing privacy and-security-technical-aspects riccardo ...
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
Resilience as a new Enforcement Model for IT Security based on Usage Control
Resilience as a new Enforcement Model for IT Security based on Usage ControlResilience as a new Enforcement Model for IT Security based on Usage Control
Resilience as a new Enforcement Model for IT Security based on Usage Control
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
IoT Architecture
IoT ArchitectureIoT Architecture
IoT Architecture
 
Debugging the internet of things the case of wireless sensor networks
Debugging the internet of things the case of wireless sensor networksDebugging the internet of things the case of wireless sensor networks
Debugging the internet of things the case of wireless sensor networks
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 
Sport && Wellness Hackathon
Sport && Wellness  HackathonSport && Wellness  Hackathon
Sport && Wellness Hackathon
 

Viewers also liked

Combining OSGi technology and Web Services to realize the plug-n-play dream i...
Combining OSGi technology and Web Services to realize the plug-n-play dream i...Combining OSGi technology and Web Services to realize the plug-n-play dream i...
Combining OSGi technology and Web Services to realize the plug-n-play dream i...mfrancis
 
Presentacion del contexto interno y externo
Presentacion  del contexto interno y externoPresentacion  del contexto interno y externo
Presentacion del contexto interno y externoekluz
 
IMAGE Presentation1
IMAGE Presentation1IMAGE Presentation1
IMAGE Presentation1DAVID LONG
 
Catholic Social Teaching
Catholic Social TeachingCatholic Social Teaching
Catholic Social Teachingnjknutson
 
بعض اساسيات البرمجة
بعض اساسيات البرمجةبعض اساسيات البرمجة
بعض اساسيات البرمجةmadani zamzami
 
Introduction to Catholic Social Teaching - Session 1
Introduction to Catholic Social Teaching - Session 1Introduction to Catholic Social Teaching - Session 1
Introduction to Catholic Social Teaching - Session 1smolgff
 

Viewers also liked (8)

Combining OSGi technology and Web Services to realize the plug-n-play dream i...
Combining OSGi technology and Web Services to realize the plug-n-play dream i...Combining OSGi technology and Web Services to realize the plug-n-play dream i...
Combining OSGi technology and Web Services to realize the plug-n-play dream i...
 
CV_APR_2016_VLorenzetti
CV_APR_2016_VLorenzettiCV_APR_2016_VLorenzetti
CV_APR_2016_VLorenzetti
 
Presentacion del contexto interno y externo
Presentacion  del contexto interno y externoPresentacion  del contexto interno y externo
Presentacion del contexto interno y externo
 
IMAGE Presentation1
IMAGE Presentation1IMAGE Presentation1
IMAGE Presentation1
 
U.S. Access Board- PROW comments FELDMAN 11 23 11
U.S. Access Board- PROW comments FELDMAN 11 23 11U.S. Access Board- PROW comments FELDMAN 11 23 11
U.S. Access Board- PROW comments FELDMAN 11 23 11
 
Catholic Social Teaching
Catholic Social TeachingCatholic Social Teaching
Catholic Social Teaching
 
بعض اساسيات البرمجة
بعض اساسيات البرمجةبعض اساسيات البرمجة
بعض اساسيات البرمجة
 
Introduction to Catholic Social Teaching - Session 1
Introduction to Catholic Social Teaching - Session 1Introduction to Catholic Social Teaching - Session 1
Introduction to Catholic Social Teaching - Session 1
 

Similar to BUTLER IoT - Luxemburg presentation 8 9-12

SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
SMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  OpportunitiesSMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  Opportunities
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities Tauseef Naquishbandi
 
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...waylay
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptxSyedSaqlain32
 
IOT presentation.pptx
IOT presentation.pptxIOT presentation.pptx
IOT presentation.pptxchWaqasZahid
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
 
Internet of Things (IoT) from a business Perspective
Internet of Things (IoT) from a business PerspectiveInternet of Things (IoT) from a business Perspective
Internet of Things (IoT) from a business PerspectiveOsama M. Khaled
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsPing Identity
 
The Internet of Things (IoT)
The Internet of Things (IoT)The Internet of Things (IoT)
The Internet of Things (IoT)Dadhaniya Renish
 
Roberto Minerva: iot challenges - IoT Tunisia 2016
Roberto Minerva:  iot challenges  - IoT Tunisia 2016Roberto Minerva:  iot challenges  - IoT Tunisia 2016
Roberto Minerva: iot challenges - IoT Tunisia 2016IoT Tunisia
 
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...Veselin Pizurica
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricMark Underwood
 
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURESON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURESManisha Luthra
 
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IJCI JOURNAL
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptnadoje
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 

Similar to BUTLER IoT - Luxemburg presentation 8 9-12 (20)

Jacques Bus F I I R L Presentation J B
Jacques  Bus  F I  I R L  Presentation  J BJacques  Bus  F I  I R L  Presentation  J B
Jacques Bus F I I R L Presentation J B
 
Smart health
Smart healthSmart health
Smart health
 
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
SMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  OpportunitiesSMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  Opportunities
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
 
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptx
 
IOT presentation.pptx
IOT presentation.pptxIOT presentation.pptx
IOT presentation.pptx
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
 
Internet of Things (IoT) from a business Perspective
Internet of Things (IoT) from a business PerspectiveInternet of Things (IoT) from a business Perspective
Internet of Things (IoT) from a business Perspective
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of Things
 
The Internet of Things (IoT)
The Internet of Things (IoT)The Internet of Things (IoT)
The Internet of Things (IoT)
 
Roberto Minerva: iot challenges - IoT Tunisia 2016
Roberto Minerva:  iot challenges  - IoT Tunisia 2016Roberto Minerva:  iot challenges  - IoT Tunisia 2016
Roberto Minerva: iot challenges - IoT Tunisia 2016
 
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURESON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
 
IOT.pptx
IOT.pptxIOT.pptx
IOT.pptx
 
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Iot 7-12-2021
Iot 7-12-2021Iot 7-12-2021
Iot 7-12-2021
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

BUTLER IoT - Luxemburg presentation 8 9-12

  • 3. AGENDA CAN WE TRUST OUR BUTLER? • ISSUES & CHALLENGES • VALUE SENSITIVE DESIGN • TRUST • CALL FOR PAPERS
  • 4. CIA CHIEF PETRAEUS “We’ll Spy on You Through Your Dishwasher” Wired, March 15, 2012
  • 5. AN ETHICS OF IOT? Party Stopper or Unique Selling Point? IOT raises ethics challenges and opportunities related to autonomy, security, equity, equality, justice, access, discrimination, data profiling, confidentiality, ….
  • 6. ISSUES 1/3 Privacy & Security Blurring of contexts: private vs. public Informed Consent vs. Obfuscation of Functionality Confidence vs. Trust Agency: social contract between people and objects? Non-neutrality of IoT Metaphores
  • 7. ISSUES 2/3 Responsibility & Precautionary Principle Responsible Innovation & Setting new standards Social justice & Digital divide Support solving existing problems Adaptation to mediated environment
  • 8. ISSUES 3/3 New organizational principles and institutional design New ontology Fair distribution costs and benefits Public acceptance of innovative technology Technology lock-in
  • 9. KEY PROBLEM 21ST CENTURY: VALUE SENSITIVE DESIGN Computers Oiltankers Responsibility Airplanes Privacy Reactors Accountability Express Roads Agency Implement Internet Autonomy Electricity Sustainability Grids Safety Artefacts Hospitals Security Values Architectures Norms Materials Standards Laws Security Ideals Systems Principles Justify Infrastructure Audit
  • 10. VALUE SENSITIVE DESIGN 1. Conceptual investigations 2. (Empirical investigations) 3. Technical investigations
  • 11. TRUST = IMPORTANT IoT = disruptive • Public / private blurred • Unknown territory • Feeling safe / secure • Privacy requires Trust Trust User acceptation / adaptation Successful technology Examples • Dutch Smart Metering roll out • Dutch Electronic Patient Record System
  • 12. Smart mobile platform Smart server Unifying platform BUTLER Architecture Secure, private, trustworthy context capture Smart OSGi Zigbee DPWS FreeRTOS TinyOS Contiki object/gateway CoAP platform RPL 6LowPAN IEEE 802.15.4
  • 13. IOT + TRUST = DIFFERENT Real-life Impact Many Unknowns Defining features: • Distributed / heterarchical structures • Non deterministic / Smart behavior • Dynamic configuration • Obfuscation • Heterogeneity
  • 14. TRUST = VAGUE Complex notion Different meanings in Different disciplines Conceptual muddle Difficult to measure (no metrics/ methodologies)
  • 15. DEFINITION OF TRUST Accepted vulnerability to another's possible but not expected ill will (Friedman, Baier)
  • 16. WHAT TO TRUST? Others (E-Trust) Institutions (Proper governance) Systems (Technology Dependence)
  • 17. TRUST VS CONFICENCE De-perimeterisation (De-p): • Passive  Active insulation of data • Danger (nature)  Risk (manmade) • Confidence(no alt’s)  Trust (with alt’s) (Pieters, 2011)
  • 18. TRUST VS RELIABILITY RELIABILITY • Thing – Person interaction • Interactively static TRUST • Person – Person interaction • Interactively dynamic Real People vs. ‘Internet’ People (Pettit, 2008)
  • 19. TRUST: CRUCIAL REQUIREMENT =CLUES •Evidence of Face •Evidence of Frame •Evidence of File (Pettit, 2008)
  • 20. REPUTATION SYSTEMS Examples • Amazon • Google • Slashdot Present Alternatives + Active system Sources of Evidence • Face : online identity • Frame: Score by others • File : Aggregated reputation  Decentralized / distributed reputation system
  • 22. CALL FOR PAPERS Special Issue of Ethics and Information Technology (ETIN) on the Internet of Things (IoT)

Editor's Notes

  1. Introduction of people involved in this presentation:Jeroen – leader of Ethics subgroupFrancien – researcher, related project: ethical and societal aspects of reconfigurable sensor technologyJob – researcher, related project: emerging technologies (ETICA), refer to Monday’s presentation
  2. This quote illustrates the enormous impact IoT may have on the possibilities for information gathering.For the good and for the bad (dual use). This raises issues of privacy, trust, autonomy etc which need to be anticipated in the rollout and development of the technology.
  3. We should take the opportunity to involve ethical and societal aspects in the design of new technology.