SlideShare a Scribd company logo
27/08/2018 IHSA 2018 iTRACK Project
Katrina
Petersen, Olivia
Iannelli,
TRILATERAL
RESEARCH
Ethics and Technology in
Humanitarian Settings: an
iTRACK case study
Examining how the social-cultural intersect with the ethical in
humanitarian technology design and use
For example:
• What cultural considerations need to be taken into account to
really understand how privacy is a public good?
• How do cultural considerations change what is ethically
acceptable or desirable?
The iTRACK system
Keep track of humanitarian workers in the field
Support planners/workers’ situational awareness & decisions
Approach
• Literature review
• iTRACK’s various components were tested in a simulation
exercise
• Interviews with key stakeholders
• Synthetisation of findings
Movement
in space
Classification and
sorting
Qualifying
risk
The iTRACK system
StaffSense
Mobile application for encrypted
asynchronous communication in field
Users can:
• Communicate with headquarters, users
• Receive notifications and alerts
• Send location-based threat messages
• Turn on tracking
• Use a panic button
Enhanced situational awareness
proactive warning and alerting
Mobile DSE
Mobile DSE Application
• Dashboard for convoy navigation and
routing
• Sends real-time convoy location to the
centralized system
Improved navigation and mission re-
routing (in case of threats)
Improved mission planning and
organisation
On board threat detection
Real-time detection of threats and critical
events
• Records 3D 360° HDR panoramic
images and video
• Uses machine learning to detect
landmarks and objects
• Uses landmarks to estimate vehicle
location and trajectory
• Sends real-time alerts to users
Automatically detects potential threats
around the vehicle
Notifies users and headquarters
Movement in Space
Ethical responsibility towards
personal privacy
Social responsibility towards
worker safety
Cultural responsibility towards
local context
When a worker is off duty, they
are not monitored
“Off-duty” is not a clear
category when deployed in a
crisis zone
Movement patterns can help
understanding of communities
being served
Sorting and classification
"(1) pre-existing social values found in the ‘social institutions,
practices and attitudes’ from which the technology emerges, (2)
technical constraints and (3) emergent aspects of a context of
use” (Friedman & Nissenbaum, 1996)
‘‘the values of the author [of an algorithm], wittingly or not, are
frozen into the code, effectively institutionalising those values’’
(Macnish, 2012)
Qualifying Risk
“When the location where the humanitarian workers reside when
being off-duty does not pose any safety risks, the devices can be
turned off” iTRACK designer
“When complex algorithms and big data sets are used to make
decisions, it can be difficult to work out exactly what factors
influenced that decision, and to what extent” (Murray & Fussey,
2018)
Safety Risk depends on a range of factors:
Context, Experience, Familiarity, Timing, Frame of Reference
Because blame can potentially be assigned to several moral
agents simultaneously (Mittelstadt et al, 2016) and to avoid
creating an “accountability gap” (Cardona, 2008), iTrack has to be
transparent about how it approaches security, threats, and
ethical principles.
It has be clear about:
How to define responsibility?
How to define justice and fair treatment?
What is privacy, as a right, intended to offer?
What elements of a situation need to be considered when
determining if acts are ethical?
What is a user required to know about a system?
Contact us
Website: http://www.itrack-project.eu/
Twitter : @iTRACKProject1
E-mail:
Katrina.Petersen@trilateralresearch.com
Olivia.iannelli@trilateralresearch.com

More Related Content

Similar to Ethics and technology in humanitarian setting

Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...ijtsrd
 
Technology and Evaluation Hitachi Paper
Technology and Evaluation Hitachi PaperTechnology and Evaluation Hitachi Paper
Technology and Evaluation Hitachi PaperAmeya Ashok Naik
 
Elastic cognitive systems 18 6-2015-dustdar
Elastic cognitive systems 18 6-2015-dustdarElastic cognitive systems 18 6-2015-dustdar
Elastic cognitive systems 18 6-2015-dustdardiannepatricia
 
PSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-PestotnikPSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-PestotnikMichael Woods, MD, MMM
 
SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )
SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )
SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )ijistjournal
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umarylandSara-Jayne Terp
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKTrilateral Research
 
Activity Streaming as Information X-Docking
Activity Streaming as Information X-DockingActivity Streaming as Information X-Docking
Activity Streaming as Information X-DockingKai Riemer
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningIRJET Journal
 
Industry Standards as vehicle to address socio-technical AI challenges
Industry Standards as vehicle to address socio-technical AI challengesIndustry Standards as vehicle to address socio-technical AI challenges
Industry Standards as vehicle to address socio-technical AI challengesAnsgar Koene
 
An Ontological Framework For Structuring Process Knowledge Specified For The ...
An Ontological Framework For Structuring Process Knowledge Specified For The ...An Ontological Framework For Structuring Process Knowledge Specified For The ...
An Ontological Framework For Structuring Process Knowledge Specified For The ...Courtney Esco
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingIJNSA Journal
 
Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)Ansgar Koene
 
A Holistic Approach to Evaluating Social Media's Successful Implementation in...
A Holistic Approach to Evaluating Social Media's Successful Implementation in...A Holistic Approach to Evaluating Social Media's Successful Implementation in...
A Holistic Approach to Evaluating Social Media's Successful Implementation in...Connie White
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExEADTU
 
Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Roy Ramkrishna
 
On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...Grial - University of Salamanca
 

Similar to Ethics and technology in humanitarian setting (20)

Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...
 
Technology and Evaluation Hitachi Paper
Technology and Evaluation Hitachi PaperTechnology and Evaluation Hitachi Paper
Technology and Evaluation Hitachi Paper
 
Elastic cognitive systems 18 6-2015-dustdar
Elastic cognitive systems 18 6-2015-dustdarElastic cognitive systems 18 6-2015-dustdar
Elastic cognitive systems 18 6-2015-dustdar
 
PSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-PestotnikPSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
 
SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )
SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )
SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACK
 
Activity Streaming as Information X-Docking
Activity Streaming as Information X-DockingActivity Streaming as Information X-Docking
Activity Streaming as Information X-Docking
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
Industry Standards as vehicle to address socio-technical AI challenges
Industry Standards as vehicle to address socio-technical AI challengesIndustry Standards as vehicle to address socio-technical AI challenges
Industry Standards as vehicle to address socio-technical AI challenges
 
An Ontological Framework For Structuring Process Knowledge Specified For The ...
An Ontological Framework For Structuring Process Knowledge Specified For The ...An Ontological Framework For Structuring Process Knowledge Specified For The ...
An Ontological Framework For Structuring Process Knowledge Specified For The ...
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
Isr in coin cadd
Isr in coin caddIsr in coin cadd
Isr in coin cadd
 
Sirris presentation
Sirris presentationSirris presentation
Sirris presentation
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)
 
A Holistic Approach to Evaluating Social Media's Successful Implementation in...
A Holistic Approach to Evaluating Social Media's Successful Implementation in...A Holistic Approach to Evaluating Social Media's Successful Implementation in...
A Holistic Approach to Evaluating Social Media's Successful Implementation in...
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
 
Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015
 
On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...
 

More from Trilateral Research

Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...Trilateral Research
 
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Trilateral Research
 
Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Trilateral Research
 
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...Trilateral Research
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectTrilateral Research
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Trilateral Research
 
CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.Trilateral Research
 
Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Trilateral Research
 
Examining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceExamining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceTrilateral Research
 
A stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceA stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceTrilateral Research
 
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceEvolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceTrilateral Research
 
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesSocial Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesTrilateral Research
 
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Trilateral Research
 
ENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationTrilateral Research
 
Esports in the UK - privacy risks
Esports in the UK - privacy risksEsports in the UK - privacy risks
Esports in the UK - privacy risksTrilateral Research
 
Enhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelEnhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelTrilateral Research
 
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Trilateral Research
 
Key Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectKey Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectTrilateral Research
 

More from Trilateral Research (20)

Star II sme hotline 21.01.20
Star II sme hotline 21.01.20Star II sme hotline 21.01.20
Star II sme hotline 21.01.20
 
Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...
 
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
 
Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...
 
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
 
Overview of CLARITY project
Overview of CLARITY projectOverview of CLARITY project
Overview of CLARITY project
 
CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.
 
Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis
 
Examining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceExamining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster Resilience
 
A stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceA stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilience
 
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceEvolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
 
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesSocial Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
 
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
 
ENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentation
 
Esports in the UK - privacy risks
Esports in the UK - privacy risksEsports in the UK - privacy risks
Esports in the UK - privacy risks
 
Enhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelEnhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national level
 
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
 
Key Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectKey Outputs of the E-CRIME project
Key Outputs of the E-CRIME project
 

Recently uploaded

Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»QADay
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform EngineeringJemma Hussein Allen
 

Recently uploaded (20)

Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Ethics and technology in humanitarian setting

  • 1. 27/08/2018 IHSA 2018 iTRACK Project Katrina Petersen, Olivia Iannelli, TRILATERAL RESEARCH Ethics and Technology in Humanitarian Settings: an iTRACK case study
  • 2. Examining how the social-cultural intersect with the ethical in humanitarian technology design and use For example: • What cultural considerations need to be taken into account to really understand how privacy is a public good? • How do cultural considerations change what is ethically acceptable or desirable?
  • 3. The iTRACK system Keep track of humanitarian workers in the field Support planners/workers’ situational awareness & decisions
  • 4. Approach • Literature review • iTRACK’s various components were tested in a simulation exercise • Interviews with key stakeholders • Synthetisation of findings
  • 7. StaffSense Mobile application for encrypted asynchronous communication in field Users can: • Communicate with headquarters, users • Receive notifications and alerts • Send location-based threat messages • Turn on tracking • Use a panic button Enhanced situational awareness proactive warning and alerting
  • 8. Mobile DSE Mobile DSE Application • Dashboard for convoy navigation and routing • Sends real-time convoy location to the centralized system Improved navigation and mission re- routing (in case of threats) Improved mission planning and organisation
  • 9. On board threat detection Real-time detection of threats and critical events • Records 3D 360° HDR panoramic images and video • Uses machine learning to detect landmarks and objects • Uses landmarks to estimate vehicle location and trajectory • Sends real-time alerts to users Automatically detects potential threats around the vehicle Notifies users and headquarters
  • 10. Movement in Space Ethical responsibility towards personal privacy Social responsibility towards worker safety Cultural responsibility towards local context When a worker is off duty, they are not monitored “Off-duty” is not a clear category when deployed in a crisis zone Movement patterns can help understanding of communities being served
  • 11. Sorting and classification "(1) pre-existing social values found in the ‘social institutions, practices and attitudes’ from which the technology emerges, (2) technical constraints and (3) emergent aspects of a context of use” (Friedman & Nissenbaum, 1996) ‘‘the values of the author [of an algorithm], wittingly or not, are frozen into the code, effectively institutionalising those values’’ (Macnish, 2012)
  • 12. Qualifying Risk “When the location where the humanitarian workers reside when being off-duty does not pose any safety risks, the devices can be turned off” iTRACK designer “When complex algorithms and big data sets are used to make decisions, it can be difficult to work out exactly what factors influenced that decision, and to what extent” (Murray & Fussey, 2018) Safety Risk depends on a range of factors: Context, Experience, Familiarity, Timing, Frame of Reference
  • 13. Because blame can potentially be assigned to several moral agents simultaneously (Mittelstadt et al, 2016) and to avoid creating an “accountability gap” (Cardona, 2008), iTrack has to be transparent about how it approaches security, threats, and ethical principles. It has be clear about: How to define responsibility? How to define justice and fair treatment? What is privacy, as a right, intended to offer? What elements of a situation need to be considered when determining if acts are ethical? What is a user required to know about a system?
  • 14. Contact us Website: http://www.itrack-project.eu/ Twitter : @iTRACKProject1 E-mail: Katrina.Petersen@trilateralresearch.com Olivia.iannelli@trilateralresearch.com

Editor's Notes

  1. This is in part driven by semi-recent events that showed issues like privacy, autonomy, justice are cultural bound --german wings crash --increased realization within technology design that it is not just the organisational or individual practices that matter, but the contextual, situational, environmental. increase use of tech designed by EU projects outside of the EU
  2. One place that we’ve been exploring this work is in the project iTrack. EU funded: Horizon 2020 -- 3 years 12 Partners from 8 EU states and UNWFP Aim: next generation intelligent tracking platform Through things like threat detection, tracking of workers paths and other assets. tested in simulations with humanitarian practitioners. Pilot applications with the World Food Programme and iMMAP in the on-going conflict disasters in the Middle East.
  3. To be clear, itrack has not been tried in the active field yet. It is still being developed, so many of these conversations are potentials in order to get designer to consider the implications of their choices.
  4. I’m going to go into three different areas where ethics are frequently the conversation and try to try to raise some socio-cultural considerations for further thinking. Then, I’ll sum up some initial thoughts on what this could mean for those of us considering the ethics and technology in humanitarian settings.
  5. Let me tell you a bit more about iTrack. sensor development GIS, security & privacy, artificial intelligence, information management, risk analysis, humanitarian logistics.
  6. Location tracker can be turned off.
  7. Bc of privacy issues – no people Images not sent, just alerts and identifications (with percentages)
  8. A few systems create traces in real time of the movements of people and assets. These components can note if you enter a building or if you pause roadside for a while.   The designers are very aware of the privacy issues that come with this – learning from recent troubles with fitbits leaving traces of soldiers movements at military bases, specifically designing in the option to turn the tracking aspects off.   (Along with an elaborate scheme of access control, data aging, logging, and auditing)   However, while this manages one aspect of privacy, it raises others, others than can be seen when looking at the socio-cultural aspects.   This is because: Turning off a location tracker might disable the possibilities for the humanitarian organization to warn, and to find and evacuate humanitarian workers when an incident occurs in the location where they are 'off duty’.   We’ve had conversations with humanitarian workers who want to be protected and tracked to reduce safety risk. For them, privacy isn’t even an issue at hand. In their socio-cultural context, responsibility and safety is what matters. Privacy does not provide safety nor does it lead towards organisational responsibility.   By tracking humanitarian workers it could also be possible to enhance the safety of those they serve.   An advisor at the World Food Program we spoke to mentioned that this additional layer of surveillance may also make beneficiaries, particularly women, feel more comfortable and safe when dealing with humanitarian workers. These women would know these individuals are being tracked and therefore, more accountable for their actions.   So, what protection does privacy offer here? Humanitarian safety and security and responsibility might be in conflict with specific engagements towards privacy. Even more, privacy does not mean the same one place to the next…(Germanwings)     And even when on duty, interpreting the tracking data is not straightforward.   Interviewee: “We were driving in Sri lanka and our driver starts plucking leaves from a bush. He was collecting neems plants which if you give it to the local people it is considered an act of hospitality. The driver said that to enter into the community we should bring the women these neem leafs and they will take this as a sign that we are being culturally appropriate. When we arrived they were totally at ease and happy to see us and we had a successful meeting. Now you run that through iTRACK you stopped by the side of the road to go play in the bushes for 25 minutes is that an inefficiency or is that a mission success factor?”   Reverse question: what protection does tracking offer?
  9. “The fact is your system is never going to be able to detect that. There is no algorithm to detect whether you are hanging out with someone or doing something because you want to or because it is helping you get to your objective.”   No right answer   And these are harder to design for because many issues like this have no ”right” answer to compare against.   If you are working on facial recognition, eventually it does or does not correctly identify faces.   But if you are working on objects, threats, and privacy, we are talking apples and oranges where they both have the potential to be correct….depending.   For example, A child soldier carrying a gun could be considered a threat, due to the identification of a gun, but to label him or her as such would be far too simplistic.   In a conflict setting, many things, should not be interpreted as black and white but rather, have a variety of different social and cultural interpretations which vary from country to country and often from town to town.
  10. Going back to the tracking: This makes it a challenge when the designers say: “Of course, when the location where the humanitarian workers reside when being off-duty does not pose any safety risks, the devices can be turned off.” Or when they say they can quantify threat.   How do you define the risks and threats, then, that these questions of privacy and security are being framed around?   What factors do you consider? What definition of objects?   With the implementation of iTRACK the responsibility of threat identification, and therefore, security, could be shifted from the individual to somebody else, within his organisation, or at a distance in time and space (e.g. programmer) affecting a humanitarian worker’s dynamic with their organisation and peers as well as their freedom of choice,   Some of these conversations are old, like the way values are carried in algorithms, classifications systems, and   Some are still ongoing – think the challenges in facial and voice recognition or police profiling   Or those around justice and fair treatment. (like those around environmental justice).   Because some groups are more vulnerable than others and subject to disproportionate burdens. Fairness and justice for them mean something different for those in positions of power. So when defining the objects around us, these objects have different meanings and implications depending on:   Context, Experience, Familiarity, Timing, Frame of Reference