SoBigData Ethics Unpacking Privacy Designing for Responsibility

Slides:



Advertisements
Similar presentations
Good governance for water, sanitation and hygiene services
Advertisements

Tri-Council Policy Statement 2010 Ethical Conduct for Research Involving Humans.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Workshop 501 and 505 Review barriers to communication
Ethical Considerations when Developing Human Research Protocols A discipline “born in scandal and reared in protectionism” Carol Levine, 1988.
ETHICS In Field Of Dental Hygiene BY Dr. Shahzadi Tayyaba Hashmi.
A Global Framework for Public Health Functions Taskforce for World Federation of Public Health Associations Draft for discussion 15 th May 2014.
The purpose of this Unit is to enable individuals to develop the key principles, values and attitude which are central to high quality care practice Key.
Scientific Data Management for the Protection of Human Subjects Robert R. Downs NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
What Would You Do? A Case Study in Ethics
The principles used by AUTEC in granting ethical approval for research.
HUMAN RIGHTS BASED APPROACH See Me Brewing Lab Cathy Asante.
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
ETHICAL FRAMEWORK
Key Elements of Legislation For Disaster Risk Reduction Second Meeting of Asian Advisory Group of Parliamentarians for DRR 5-7 February, 2014, Vientiane,
Ethics & Bioethics Danielle Nicholson Outreach Officer REMEDI- Regenerative Medicine Institute NUI Galway.
Morality and the Web Jeroen van den Hoven Professor Ethics and Technology Delft University of Technology Scientific Director 3TU.Ethics The Hague.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
Contextual Integrity as a Normative Guide for Privacy Helen Nissenbaum New York University * School of Information, UC Berkeley April 2, 2008 * Supported.
ETHICS IN FIELD OF DENTAL HYGIENE Dr. Shahzadi Tayyaba Hashmi
Environmental Management System Definitions
Human Subject Protection Research Imperatives. History World War II - Nuremberg Tuskegee Study Belmont Report Modern Problems - Inadequacy of “Good Intentions”
Experimental Research Methods in Language Learning Chapter 6 Ethical Considerations in Experimental Research.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Cultural Competence Considerations [and other alliterations] in International Research IRB 2 Continuing Education March 10, 2015.
Castlebridge associates | | Castlebridge changing how people think about information How to Implement the.
Chapter 2: Ethical Issues in Program Evaluation. Institutional Review Boards (IRBs) Federal mandate for IRBs –Concern during 1970s about unethical research.
Copyright c 2001 The McGraw-Hill Companies, Inc.1 Chapter 5 Research Ethics All researchers, even students, have a responsibility to conduct ethical research.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Research Ethics Dr Nichola Seare Aston Health Research & Innovation Cluster.
Child safe guarding Child protection in your organisation.
Chapter 4 Ethical Standards. Introduction Limits to what law, regulations, and accrediting standards and requirements can govern In the absence of law,
Information ITIL Technology Infrastructure Library ITIL.
Public Procurement Agency - Bulgaria
Role of Media in Promoting National Values & National Cohesion
Suggestion for Summarizing Process of the Principles
Back to Basics – Approval Criteria
Corporate Criminal Liability
GDPR (General Data Protection Regulation)
Anselm Schneider NCCR Trade Regulation/ University of Zurich
Chapter 1: Introduction
Session 2: Institutional arrangements for energy statistics
Chapter 5 Research Ethics
Basic Principles: Ethics and Business
General Data Protection Regulation
Human Rights and Patient Care
Getting it right for every child and information sharing
Introduction to GDPR 09/11/2018.
ETHICAL CONSIDERATIONS IN THE CONDUCT OF HEALTH SCIENCES RESEARCH
Ethics in Research.
Advancing Telemedicine Adoption in Europe – Developing capacities
SwafS Ethics and Research Integrity
Information technologies/NBIC and Big data
Corporate Governance It is a system by which companies are managed and directed in the best interests of the owners and shareholders. It refers to the.
Integrity Achala Dahal.
Greg Nezat CRNA, PhD CDR/NC/USN Chairman, IRB II
CUNY Human Research Protection Program (HRPP)
New Data Innovation Projects: Data Privacy and Data Protection
The Need for Ethical Principles
Gem Complete Health Services
Moral Decision-Making
SwafS Ethics and Research Integrity
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Good practices for risk assessment and control activities
Basic Principles: Ethics and Business
Fostering Improved Training Tools for Responsible Research & Innovation
CEng progression through the IOM3
Towards a frictionless social security
Presentation transcript:

SoBigData Ethics Unpacking Privacy Designing for Responsibility Jeroen van den Hoven Delft University of Technology SoBigData Ethics Unpacking Privacy Designing for Responsibility

Central ‘SoBigEthical’ Questions EU has set higher standards for ethics of research: both in terms of methods, and practices, consequences, but also aims What good is SoBigData Research bringing? Is it producing good outcomes, without producing bad outcomes?

Responsible Data Science Responsible Research Infrastructure

Dutch Consortium (25 meuro application pending)

Fairness Accuracy Confidentiality Transparency

Humanitarian

Two vantage points Responsible Research and Innovation (RRI) Value Sensitive Design

Applied to Research infrastructure RRI: Basic Idea Applied to Research infrastructure

Responsible Research and Innovation A research infrastructure can be said to be “responsible” only if it accomodates data users, controlers and processors involved in bringing about epistemic outcomes as responsible agents, i.e. they must have been enabled (A) to obtain – as much was possible – the relevant information on (i) the consequences of their actions and on (ii) the range of options/alternatives (e.g. data minimization) open to them and (B) to evaluate outcomes and options effectively in terms of relevant moral values (including, but not limited to wellbeing, justice, equality, privacy, openness, autonomy, safety, security, accountability, and efficiency). (C) to use these considerations (under A and B) as requirements for design and development of new functionality, products and services leading to moral improvement

Research Infra: socio-tech systems Actor 4 Social Network Actor 1 Actor 2 Actor 3 Actor 6 SociotechSoc Human 1 Human 2 Human 3 Sociotechnical Network Box: Fill – white Border – Light blue, background 2, darker 75% - 3px Text in box: Dark purple, text 2, darker 25% Lines: Light blue, background 2, darker 75% 3px Technical Network Component 1 Component 2 Component 3 Component 4 Component 5

Value Sensitive Design

Values Built into Systems Interfaces Infrastructures Algorithms Ontologies Code Protocols Integrity constraints Architectures Governance arrangements Identity Management Systems Authorization Matrix Procedures Regulations Incentive structures Auction mechanisms Voting mechanism Monitoring and inspection

Key Problem 21st Century: Value Sensitive Design 5/29/2018 Data sets Models Algorithms Procedures Protocols Encryption Responsibility Privacy Accountability Agency Autonomy Security transparency Express Implement Values Norms Laws Ideals Ethics Principles Artefacts Architectures Materials Standards Security Systems Infrastructure Justify Audit Key Problem 21st Century: Value Sensitive Design 13

High Level supra-functional requirementsl Values hierarchy Values Norms Policies Mechanisms Protocols Design requirements High Level supra-functional requirementsl

Example of values hierarchy Design requirements Norms Values privacy Risk mitigation Coarse graining Data clustering Pseudonymization Accountability Data quality Security

Values 1. Privacy = data protection for moral reasons 1.1. prevention of Harm 1.2. prevention of Exploitation, manipulation, economic disadvantage 1.3. prevention of Discrimination 1.4 Respect for persons and human dignity, moral autonomy   2. Fairness 2.1 Equal Access/openness 2.2 positionality   3. Reliability 3.1. accuracy 3.2. relevance 3.3 veracity 3.4 soundness 4. Responsibility 4.1 transparency 4.2 accountability 4.3 liability 4.4. Agency and control 4.4.1 perspicuous representation of values and choices in Research Infrastructure

Design for X Design for privacy Design for security Design for inclusion Design for sustainability Design for democracy Design for safety Design for transparency Design for accountability Design for responsibility

Design for Responsibility

Design for Responsibility X Holding Y Responsible for Z X Making Y Responsible for Z X Taking Responsibility for Y X Feeling Responsible for Y

Decide about criteria for Responsibility Attribution Responsibility Apportioning Knowledge Intention Control Non coercion Capacity - Fairness - completeness

Determine type of responsibility 1. Causality 2. Blame 3. Accountability 4. Liability 5. Role/task 1. Task Responsibility 2. Negative Task responsibility 3. Supervising responsibility 4. Self Monitoring Responsibility 5. Meta- task Responsibility

Task responsibility 1. Task Responsibility 2. Negative Task responsibility 3. Supervising responsibility 4. Self Monitoring Responsibility 5. Meta- task Responsibilities Obligation to check whether others (or future selves) can see to it that… Obligation to see to it that others (or future selves) can see to it that … Obligation to prevent moral dilemma’s from arising

Roles, Responsibilities Legal roles: Data controller Data processor Governance roles (Ethics Board, SoBigData Governance) SoBigData Researchers ( Final Users, End Users Software provider Data set provider Research infrastructure engineers Executor Secondary Users Decentral governance bodies (ERB participating universities)

Teams

Unpacking Privacy

Privacy: Data protection for moral reasons 5/29/2018 Privacy: Data protection for moral reasons Protecting X

Constrain generating Data Protection Acquiring accessing processing Disseminating Personal Data Data Protection

Privacy: Data Protection for Moral Reasons 5/29/2018 Preventing harm Prevention of manipulation and exploitation, e.g. fairness in markets for personal data Prevention of Discrimination and Contextual Integrity 4. Respect moral autonomy Privacy: Data Protection for Moral Reasons 28

Design for Privacy EX ANTE 1. Informed consent 2. Right to be forgotten 3. Identity Management 4. Reciprocal Privacy 5. Coarse graining, anonymization 5. Sous-veillance, counter veillance EX POST 6. Violation/intrusion detection 7. Big data applications to detect Big data violations of privacy EX ANTE

Responsibility, accountability, privacy, security……… Moral Overload Responsibility, accountability, privacy, security………

Value Pluralism Dependability Usability Resilience Reliability Privacy Autonomy Equity Justice Dignity Wellbeing and Happiness Safety Security Sustainability Health Friendship Solidarity Dependability Usability Resilience Reliability Efficiency Flexibility CONFLICT DILEMMA

Moral Overload Prosperity AND sustainability Security AND Privacy Efficiency AND Safety Accountability AND Confidentiality

5/29/2018 Security Moral Overload 33

No Privacy, no Security (1.0) 5/29/2018 Security No Privacy, no Security (1.0) 34

5/29/2018 Security Privacy or Security (2.0) 35

5/29/2018 Privacy & Security (3.0) 36

Moral axiom If you can change the world by innovation today so that you can satisfy more of your obligations tomorrow, you have a moral obligation to innovate today.

SobigData Ethics

Where can we improve upon older ethical frameworks? Design Stance Better recognition of the difficulties of informed consent; Definition of Personal data Specification of “use limitation” and “purpose specification” Recognizing the potential expansion of identifiability; Anonymization techniques and implementation; Algorithmic ethics/ fairness/transparency/accountability and preventation of discrimination; Perspicuoius representation of data, models, algorithms Making sure we do not forget we are dealing with people and not numbers.

How do we make this concrete? It is only one thing to say that we should safeguard all these principles. It is quite another thing to make sure that these principles are actually embedded into design of the research iunfrastructure. Ethical considerations need to be introduced into: Work flows A knowledge base of best practices Overarching responsibility architecture This cannot be done by ethicists, but will require a shared commitment on the part of everyone involved in SoBigData!

Ethics Board Helen Nissenbaum, NYU Nikolaus Forgó, Hannover Jeroen van den Hoven, TU Delft Dag Elgesem, Bergen, Norway Jeroen Terstegge, DPA Netherlands, Phillips Privacy Officer