SlideShare a Scribd company logo
IOT/ETHICS
SUBGROUP ON ETHICS
VENICE, 19TH JUNE 2012
PEOPLE
Jeroen van den Hoven, Professor of Moral Philosophy


Francien Dechesne, Postdoc researcher (STARS project)
Job Timmermans, Researcher (ETICA project)
AGENDA
SUBGROUP PROGRESS:
• ISSUES & CHALLENGES
• OBJECTIVES
• NEXT STEPS
• CALL FOR PAPERS
CIA CHIEF PETRAEUS
“We’ll Spy on You Through Your Dishwasher”
Wired, March 15, 2012
AN ETHICS OF IOT?
Party Stopper
or
Unique Selling Point?


IOT raises ethics challenges and opportunities
related to
autonomy, security, equity, equality,
justice, access, discrimination,
data profiling, confidentiality, ….
KEY PROBLEM
   21ST CENTURY: VALUE
   SENSITIVE DESIGN                                        Computers
                                                           Oiltankers
Responsibility                                             Airplanes
Privacy                                                    Reactors
Accountability                 Express                     Roads
Agency                        Implement                    Internet
Autonomy                                                   Electricity
Sustainability                                             Grids
Safety                                       Artefacts     Hospitals
Security          Values                  Architectures
                  Norms                     Materials
                                            Standards
                    Laws
                                             Security
                   Ideals                    Systems
                 Principles   Justify     Infrastructure
                               Audit
ISSUES 1/3
Privacy & Security
Blurring of contexts: private vs. public
Informed Consent vs. Obfuscation of Functionality
Confidence vs. Trust
Agency: social contract between people and objects?
Non-neutrality of IoT Metaphores
ISSUES 2/3
Responsibility & Precautionary Principle
Responsible Innovation & Setting new standards
Social justice & Digital divide
Support solving existing problems
Adaptation to mediated environment
ISSUES 3/3
New organizational principles and institutional design
New ontology
Fair distribution costs and benefits
Public acceptance of innovative technology
Technology lock-in
COMPLETENESS?
Which notable issues are missing in the list?
FROM ISSUES TO
OBJECTIVES
Discussion of deduced Objectives
OBJECTIVES 1/2
Preservation of privacy by design at the level of code,
devices, institutions
Establish criteria for responsibility/liability/ accountability
with regards to the functioning of IoT.
A fair distribution of costs and benefits of IoT. Part of this
goal should be the evaluation of risks involved in IoT.
Prevent widening of digital divide; use potential of IoT to
close the gap.
OBJECTIVES 2/2
Operationalize public values into the design of IoT in as early
a stage of its development as possible.
Design for trust
Design for public acceptability.
Strive for conceptual clarity to prevent the dialogue and
policy measures from being misdirected
IMPACT & POLICY
Possible implications of issues and objectives?


Which will be the adequate policy types for which issue:
- Do nothing / Self-regulation
- Soft law
- Co-regulation
- Binding law
NEXT STEPS
Issues & challenges
         Further completion & categorization
Objectives
         Distil & categorize
Policy Options
         Translate objectives into policy options
Impact
         Assess possible impact
CALL FOR PAPERS
Special Issue of Ethics and Information Technology (ETIN)
on the Internet of Things (IoT)

More Related Content

What's hot

Different applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadDifferent applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin Akad
Jatin Akar
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Aariff Ansari
 
Recent trends in cloud computing articles
Recent trends in cloud computing articlesRecent trends in cloud computing articles
Recent trends in cloud computing articles
AIRCC Publishing Corporation
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
IJNSA Journal
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
IJNSA Journal
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
IJNSA Journal
 
Cloud Sweden Charter English
Cloud Sweden Charter EnglishCloud Sweden Charter English
Cloud Sweden Charter English
Predrag Mitrovic
 
13th International Conference on Networks & Communications (NeCoM 2021)
13th International Conference on Networks & Communications (NeCoM 2021)13th International Conference on Networks & Communications (NeCoM 2021)
13th International Conference on Networks & Communications (NeCoM 2021)
ijassn
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
IJNSA Journal
 
HIPAA Compliance For Emerging Technologies
HIPAA Compliance For Emerging TechnologiesHIPAA Compliance For Emerging Technologies
HIPAA Compliance For Emerging Technologies
Synerzip
 
Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...
IJNSA Journal
 
PETRAS Hub Overview
PETRAS Hub OverviewPETRAS Hub Overview
PETRAS Hub Overview
IoTUK
 
Capstone Team Report -The Vicious Circle of Smart Grid Security
Capstone Team Report -The Vicious Circle of Smart Grid SecurityCapstone Team Report -The Vicious Circle of Smart Grid Security
Capstone Team Report -The Vicious Circle of Smart Grid Security
reuben_mathew
 
IoT and Crime Prevention
IoT and Crime PreventionIoT and Crime Prevention
IoT and Crime Prevention
IoTUK
 
AIOTI presentation
AIOTI presentationAIOTI presentation
AIOTI presentation
IoTUK
 
Ann ackaert - handle with ecare: 5 years of ict research in the homecare envi...
Ann ackaert - handle with ecare: 5 years of ict research in the homecare envi...Ann ackaert - handle with ecare: 5 years of ict research in the homecare envi...
Ann ackaert - handle with ecare: 5 years of ict research in the homecare envi...
imec.archive
 
Cyber Physical System: Architecture, Applications and Research Challenges
Cyber Physical System: Architecture, Applicationsand Research ChallengesCyber Physical System: Architecture, Applicationsand Research Challenges
Cyber Physical System: Architecture, Applications and Research Challenges
Syed Hassan Ahmed
 
Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things
IJECEIAES
 

What's hot (20)

Different applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadDifferent applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin Akad
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Recent trends in cloud computing articles
Recent trends in cloud computing articlesRecent trends in cloud computing articles
Recent trends in cloud computing articles
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
 
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
 
Cloud Sweden Charter English
Cloud Sweden Charter EnglishCloud Sweden Charter English
Cloud Sweden Charter English
 
13th International Conference on Networks & Communications (NeCoM 2021)
13th International Conference on Networks & Communications (NeCoM 2021)13th International Conference on Networks & Communications (NeCoM 2021)
13th International Conference on Networks & Communications (NeCoM 2021)
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
 
HIPAA Compliance For Emerging Technologies
HIPAA Compliance For Emerging TechnologiesHIPAA Compliance For Emerging Technologies
HIPAA Compliance For Emerging Technologies
 
Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...
 
PETRAS Hub Overview
PETRAS Hub OverviewPETRAS Hub Overview
PETRAS Hub Overview
 
Capstone Team Report -The Vicious Circle of Smart Grid Security
Capstone Team Report -The Vicious Circle of Smart Grid SecurityCapstone Team Report -The Vicious Circle of Smart Grid Security
Capstone Team Report -The Vicious Circle of Smart Grid Security
 
IoT and Crime Prevention
IoT and Crime PreventionIoT and Crime Prevention
IoT and Crime Prevention
 
AIOTI presentation
AIOTI presentationAIOTI presentation
AIOTI presentation
 
Ann ackaert - handle with ecare: 5 years of ict research in the homecare envi...
Ann ackaert - handle with ecare: 5 years of ict research in the homecare envi...Ann ackaert - handle with ecare: 5 years of ict research in the homecare envi...
Ann ackaert - handle with ecare: 5 years of ict research in the homecare envi...
 
Cyber Physical System: Architecture, Applications and Research Challenges
Cyber Physical System: Architecture, Applicationsand Research ChallengesCyber Physical System: Architecture, Applicationsand Research Challenges
Cyber Physical System: Architecture, Applications and Research Challenges
 
Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things
 

Similar to IoT week Venice 2012 - Ethics Sub group presentation

BUTLER IoT - Luxemburg presentation 8 9-12
BUTLER IoT - Luxemburg presentation 8 9-12BUTLER IoT - Luxemburg presentation 8 9-12
BUTLER IoT - Luxemburg presentation 8 9-12
JobT
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
ChantellPantoja184
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptx
SyedSaqlain32
 
Jacques Bus F I I R L Presentation J B
Jacques  Bus  F I  I R L  Presentation  J BJacques  Bus  F I  I R L  Presentation  J B
Jacques Bus F I I R L Presentation J B
Irish Future Internet Forum
 
Smart health
Smart healthSmart health
Smart health
Tauseef Naquishbandi
 
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
SMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  OpportunitiesSMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  Opportunities
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
Tauseef Naquishbandi
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
Aakashjit Bhattacharya
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Mark Underwood
 
Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...
Dr Rachel O'Connell
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
YogeshIJTSRD
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
IJEACS
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
Shyam Goyal
 
The Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionThe Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolution
Sathvik N Prasad
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
CSCJournals
 
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IJCI JOURNAL
 
Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information Management
Alexander Deucalion
 
76 s201918
76 s20191876 s201918
76 s201918
IJRAT
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
PayamBarnaghi
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
CityPulse Project
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
eletseditorial
 

Similar to IoT week Venice 2012 - Ethics Sub group presentation (20)

BUTLER IoT - Luxemburg presentation 8 9-12
BUTLER IoT - Luxemburg presentation 8 9-12BUTLER IoT - Luxemburg presentation 8 9-12
BUTLER IoT - Luxemburg presentation 8 9-12
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptx
 
Jacques Bus F I I R L Presentation J B
Jacques  Bus  F I  I R L  Presentation  J BJacques  Bus  F I  I R L  Presentation  J B
Jacques Bus F I I R L Presentation J B
 
Smart health
Smart healthSmart health
Smart health
 
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
SMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  OpportunitiesSMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  Opportunities
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
The Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionThe Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolution
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
 
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
 
Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information Management
 
76 s201918
76 s20191876 s201918
76 s201918
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 

IoT week Venice 2012 - Ethics Sub group presentation

  • 2. PEOPLE Jeroen van den Hoven, Professor of Moral Philosophy Francien Dechesne, Postdoc researcher (STARS project) Job Timmermans, Researcher (ETICA project)
  • 3. AGENDA SUBGROUP PROGRESS: • ISSUES & CHALLENGES • OBJECTIVES • NEXT STEPS • CALL FOR PAPERS
  • 4. CIA CHIEF PETRAEUS “We’ll Spy on You Through Your Dishwasher” Wired, March 15, 2012
  • 5. AN ETHICS OF IOT? Party Stopper or Unique Selling Point? IOT raises ethics challenges and opportunities related to autonomy, security, equity, equality, justice, access, discrimination, data profiling, confidentiality, ….
  • 6. KEY PROBLEM 21ST CENTURY: VALUE SENSITIVE DESIGN Computers Oiltankers Responsibility Airplanes Privacy Reactors Accountability Express Roads Agency Implement Internet Autonomy Electricity Sustainability Grids Safety Artefacts Hospitals Security Values Architectures Norms Materials Standards Laws Security Ideals Systems Principles Justify Infrastructure Audit
  • 7. ISSUES 1/3 Privacy & Security Blurring of contexts: private vs. public Informed Consent vs. Obfuscation of Functionality Confidence vs. Trust Agency: social contract between people and objects? Non-neutrality of IoT Metaphores
  • 8. ISSUES 2/3 Responsibility & Precautionary Principle Responsible Innovation & Setting new standards Social justice & Digital divide Support solving existing problems Adaptation to mediated environment
  • 9. ISSUES 3/3 New organizational principles and institutional design New ontology Fair distribution costs and benefits Public acceptance of innovative technology Technology lock-in
  • 10. COMPLETENESS? Which notable issues are missing in the list?
  • 11. FROM ISSUES TO OBJECTIVES Discussion of deduced Objectives
  • 12. OBJECTIVES 1/2 Preservation of privacy by design at the level of code, devices, institutions Establish criteria for responsibility/liability/ accountability with regards to the functioning of IoT. A fair distribution of costs and benefits of IoT. Part of this goal should be the evaluation of risks involved in IoT. Prevent widening of digital divide; use potential of IoT to close the gap.
  • 13. OBJECTIVES 2/2 Operationalize public values into the design of IoT in as early a stage of its development as possible. Design for trust Design for public acceptability. Strive for conceptual clarity to prevent the dialogue and policy measures from being misdirected
  • 14. IMPACT & POLICY Possible implications of issues and objectives? Which will be the adequate policy types for which issue: - Do nothing / Self-regulation - Soft law - Co-regulation - Binding law
  • 15. NEXT STEPS Issues & challenges Further completion & categorization Objectives Distil & categorize Policy Options Translate objectives into policy options Impact Assess possible impact
  • 16. CALL FOR PAPERS Special Issue of Ethics and Information Technology (ETIN) on the Internet of Things (IoT)