Morality and the Web Jeroen van den Hoven Professor Ethics and Technology Delft University of Technology Scientific Director 3TU.Ethics The Hague.

Slides:



Advertisements
Similar presentations
Trusted Computing in Government Networks May 16, 2007 Richard C. (Dick) Schaeffer, Jr. Information Assurance Director National Security Agency.
Advertisements

E-Strategies and ICT Infrastructure Policies and Regulations ITU-WTO Workshop Geneva Dec Mostafa Terrab, infoDev.
Steps towards E-Government in Syria
A platform of for knowledge and services sharing Fernando Ferri IRPPS-CNR.
The Challenge of the New Data Mark Elliot, Social Sciences University of Manchester January 2013
Cloud computing security related works in ITU-T SG17
Centro Internacional para Estudios del Medio Ambiente y el Desarrollo Sostenible CIEMADeS Centro Internacional para Estudios del Medioambiente y el Desarrollo.
Interaction of RFID Technology and Public Policy Presentation at RFID Privacy MIT 15 TH November 2003 By Rakesh Kumar
City-based Sematic Grids: Building the new urban utility infrastructure Jose Luiz Moutinho Globelics June 1 st, 2005.
Socio-economic Sciences & Humanities – Opportunities in Horizon 2020 Conference “Achieving Impact”, Athens, Christina Bitterberg,
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
Net and Game Cultures Sonja Kangas A-Clinic.
1 Fabrizio Sestini New Paradigms and Experimental Facilities DG Information Society and Media "The views expressed in this presentation are those of the.
Department of Computer Science City College of New York City College of New York Spring 2006 Copyright © 2006 by Abbe Mowshowitz CSc 375 SOCIAL ISSUES.
Future Research Directions Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
IT Governance: Simultaneously Empowers and Controls Source: IT Governance, Chapter 1.
Computer Ethics Overview Gordon College. Introduction  Computer ethics is growing and changing as computers are growing and changing growing and changinggrowing.
For education and learning Learning Environments/ ICT in Education
CORDRA Philip V.W. Dodds March The “Problem Space” The SCORM framework specifies how to develop and deploy content objects that can be shared and.
Human-centric digital age Technologies, networks and digital and social media are changing the way people think, behave, apprehend neighbouring objects.
© IBE....doing business ethically makes for better business…. Business Ethics: the essential components Philippa Foster Back OBE Director Institute of.
 area of law that deals with protecting the rights of those who create original works  Also called as confidential information.  It is called “intellectual”
The 2014 International Conference on Internet Computing and Big Data (ICOMP'14), USA, Las-Vegas, July 21-24, science.org/worldcomp14/ws/conferences/icomp14/submission.
What is Commerce? “Seller” “Buyer” Transaction Basic Computer Concepts
E-Business Romania Adriana Ţicău State Secretary for Information Technology Conferinţele Piaţa Financiară Bucharest, the 26 th of March 2002.
1 1: Inter-Act, 13 th Edition Orientation Orientation.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Peter Marland Director of Housing Jenna Condie Lecturer in Social Media: The Business Case & the Psychology.
E-Commerce Systems Chapter 8
Research at Department of Computer and Systems Sciences – DSV.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
HCIMA Unit 3 The Internet Revolution and Electronic Tools Next slide.
Network of Excellence in Internet Science Network of Excellence in Internet Science (EINS) Joint Workshop and 4 th Plenary Meeting Bologna June 13, 2014.
Tax Morale in Norway (and elsewhere) – flexible or firm?
A.ABDULLAEV, Director of the Public Fund for Support and Development of Print Media and Information Agencies of Uzbekistan.
IST programme Cultural Heritage in Tomorrow ’s Knowledge Society FUTURE PLANS FP6 Cultural Heritage in Tomorrow ’s Knowledge Society FUTURE PLANS FP6 RRRESE.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
John Grant Chief General Manager National Office for the Information Economy Canberra, Australia The Government OnLine Strategy.
(ITGS) INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY Group 3.
NAVEEN AGENT BASED SOFTWARE DEVELOPMENT. WHAT IS AN AGENT? A computer system capable of flexible, autonomous (problem-solving) action, situated in dynamic,
Helping you and your family to stay in control. YouTubeWhatsApp Instagram Facebook Google Moviestar Planet Twitter Oovoo Amazon Club Penguin.
MYP Global Contexts. IB/MYP Organization that works with schools and shares educational values and beliefs –Student-centered education –The conscious.
Qualitative data analysis : an introduction Chapter 12. Cyberethnography Carol Grbich.
Welcome to Department of Computer and Systems Sciences – DSV.
1 Innovation in Services Business Service Design and Innovation Fostering the Economic and Legal Framework for Innovation Performance and Development of.
Ethics in a Computing Culture Chapter 6 How Computing Is Changing Who We Are.
Introduction to Superfast West Yorkshire Business Support 1 st May 2014 Richard Brook Business Adviser.
Digital Libraries1 David Rashty. Digital Libraries2 “A library is an arsenal of liberty” Anonymous.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Tim Barette Primary ICT & Computing Consultant, Babcock 4S Barnsbury Primary School.
1 Research Compliance at HMS: What is it Why it is important Who is involved How it affects you and how you can get help Postdoctoral Fellow Orientation.
1 IoT for Smart Cities Where we are at and where we could be Olga Cavalli CCAT LAT Argentina Forum on "Powering Smart Sustainable Cities With the Internet.
Laws and Codes for the Internet: a Continental European Legal Perspective Fernando Galindo Faculty of Law University of Zaragoza Belfast,
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Ethical Implications In The Age Of Information
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Corporate Citizenship: Voices for Innovation: Shaping our environment John Galligan Director, Corporate Affairs & Citizenship
Strand 1: Social and ethical significance SL/HL core Social and ethical considerations linked to specified IT developments. Students must study the following.
The Ethics of Privacy in the Digital Society Ethical issues of emerging information and communication technologies Professor Bernd Carsten Stahl.
Raising Digitally Literate Citizens Curbar Primary School March 2016.
THE core elements of digital citizenship
Technical Communication: Concepts and Features
MGMT 452 Corporate Social Responsibility
Living with technology Helping you and your family to stay in control
Chapter 9 Ethics and Professional Practice in IT
SoBigData Ethics Unpacking Privacy Designing for Responsibility
WJEC Health Unit1 1 Physical Factors (5)
Customer Service in a Virtual World
Presentation transcript:

Morality and the Web Jeroen van den Hoven Professor Ethics and Technology Delft University of Technology Scientific Director 3TU.Ethics The Hague

The Web is an Epistemic Success Criteria for success of an epistemic practice (Goldman, Thagard, e.a.) Speed  How quick do you get an answer to your question Power  The capability of an epistemic practice to get you answers at all Economy  The cost of getting an answer Fecundity  The number of people the practice can involve and reach at one time Reliability  The ratio of true beliefs to the total number of beliefs acquired re the topic of a question

Web Connectivity Communication Interaction Coordination Transaction

ICT Information Ubiquitous Pervasive Ambient Constitutive Confusing Value laden

ICT Constitutive Technology Not merely Enabling Constitutive ICT Shapes practices, discourses, institutions

Confused Democracy Trust Privacy Property Community Person Intelligence Life Democracy Work Health Friendship

IT: more confused Electronic Democracy E- Trust Informational Privacy Intellectual Property Cyber Community Digital Person Artificial Intelligence Artificial Life Digital Democracy Tele Work E- Health Net Friendship

Conceptual Vacuum “New Sort of Community” “New Sort of Privacy” “New sort of Trust” “New sort of Friendship” Conceptual Vacuum -  Policy Vacuum & Design Vacuum

Value Laden Technology

Bias in Search Engines

Torah Compliant (kosher) Search Engine

The Formula that Killed Wallstreet David X. Li's Gaussian copula function as first published in Investors exploited it as a quick—and fatally flawed—way to assess risk. Gamma The all-powerful correlation parameter, which reduces correlation to a single constant..

Values Built into Systems Interfaces Infrastructures Algorithms Ontologies Code Protocols Integrity constraints Architectures Identity Management Systems Authorization Matrix Procedures Regulations Incentive structures Auction mechanisms Voting mechanism Monitoring and inspection Governance arrangements

Designer is a choice architect

Value Sensitive Design ETHICS AND TECHNOLOGY Values Norms Laws Ideals Code Architectures infrastructures Information Systems Ontologies Standards artifacts Express Implement Evaluate,Justify Audit Responsibility Privacy Accountability Agency Autonomy sustainability Computers Oiltankers Airplanes Reactors Roads Internet Electricity Grids Hospitals

The Web is also a bit of a Moral Success Emancipates Empowers Equalizes Enhances Accountability ………..

Some Moral Problems Cyberbullying Trolls Happy slapping Anorexia glorification Cybersuicide (pacts) Violent computer games Child Pornograph and Pedophilia

Exculpiating redescriptions Why did you do it? It was just…..no more than It was virtual…; it all seemed a bit unreal Because I could… It was private… It’s all new Everyone does it, no one told me it was wrong I don’t know I didn’t realize it caused so much grief I got further and further into it I became addicted

The Web and Moral Fog Added to the conceptual confusion common to new IT (“is this a friend?” Is this “a community”?) Moral Fog is created by the morally relevant features of the Web jointly EVIL ONLINE, Dean Cocking & Jeroen van den Hoven, Wiley Blackwell, 2011

Morally relevant features of the Web Cascades (availability, information, reputation) Daily me, informational/moral homogeneity Physical Isolation Domestication of Wrongdoing Anomimity; feeling of anonymity, hiding in the crowd Virtuality Blurred public private boundaries and blurred boundaries of social spheres; unclear jurisdiction Interpretative flexibility; problem of relevant descriptions Voluntariness of self-presentation; involuntariness in off-line emotional responses and reactive attitudes is morally significant; reliable signals of moral motivation

Moral Fog Banality of Moral Wrongdoing Wrongdoing is close, common Wrongdoers exploit ambiguity; Problem of relevant description

Situationism in Ethics Ethical behaviour to large extent dependent on situational and contextual factors Milgram Zimbardo Trolley-research

Ethics & Design We design Large Socio Technical Systems (e.g. SNS) We make moral mistakes in design; e.g. financial world, safety culture in oil industry. Ethics is in an important sense situational Moral development, education, guidance and character formation massively situated in Social Media Environments We have to (think about) design for moral development and flourishing on the Web