Composite Ethical Frameworks for IOT and Other Emerging Technologies


Paper by Max SengesPatrick S. Ryan and Richard S. Whitt: “Modern engineering and technology has allowed us to connect with each other and even to take us to the moon. But technology has also polluted vast areas of the planet and it has empowered surveillance and authoritarian governments with dangerous tools. There are numerous cases where engineers and other stakeholders routinely ask what they are capable of inventing, and what they actually should invent. Nuclear weapons and biotechnology are two examples.

But when analyzing the transformations arising from less controversial modern socio-technological tools—like the internet, smartphones, and connected devices which augment and define our work and social practices—two very distinct areas of responsibility become apparent.

On the one hand, there are questions around the values and practices of the engineers who create the technologies. What values should guide their endeavours and how can society promote good conduct?

And on the other hand, there are questions regarding the effects when people use these technologies.

While engineering and design choices can either promote or hinder commendable social behavior and appropriate use, this chapter will focus on the first question….(More)”.

Tracking Metrics in Social 3.0


Nancy Lim in AdWeek: “…Facebook is the world’s most popular social network, with incomparable reach and real value for marketers. However, as engagement on the channel increases, marketers are in a pickle. While they want to track and support valuable experiences on Facebook, they’re unsure if they can trust the channel’s metrics…..Marketers’ wavering trust in Facebook metrics warrants a look back at the evolution of social media itself.

At social’s advent (Social 1.0), metrics focused strictly on likes and comments. Content simply wasn’t as important as users learned to build social profiles and make the platform work for them.

Then, Social 2.0 invited brands to enter the fray. With them came the new role of content as a driver of top-line metrics.

Now, we’re in the midst of Social 3.0, where advancements in the technology have made it possible for social channels to result in real ad conversions.

When it comes to these conversions, it’s no longer all about the click. There’s been a marked shift away from social interactions of the past, which centered around intangible things like likes and engagement-based activities. Now, marketers are tasked with tracking more tangible metrics like conversions. Another way to look at this evolution is from social objectives (likes, shares, comments) to real business objectives (conversions, units sold, cost per sale)….

To thrive in Social 3.0, marketers must provide more direct channels for responses with lower barriers of entry, and do more of this work themselves.

They must also come to terms with the fact that while Facebook often feels like an owned channel, it’s first and foremost a platform designed for consumers. This means they cannot blindly put all their trust in Facebook’s metrics. Rather, marketers should be partnering with available third-party technologies to truly understand, trust and drive full value from Facebook insights.

Call tracking provides an avenue for this. Armed with call tracking software, marketers can determine which campaigns are causing Facebook users to pick up their phones. For instance, marketers can assign unique call numbers to separate Facebook campaigns to A/B test different copy and CTAs. Once they know what’s working best, they can incorporate that feedback into future campaigns.

Other analytics tools then provide a clearer picture. For example, marketers can leverage insights from Google Analytics, third-party data providers or other big analytics tools to learn more about the users that are engaging. Such a holistic perspective results in the creation of more personalized campaigns and, therefore, conversions….(More)”.

Friendship, Robots, and Social Media: False Friends and Second Selves


Book by Alexis M. Elder: “Various emerging technologies, from social robotics to social media, appeal to our desire for social interactions, while avoiding some of the risks and costs of face-to-face human interaction. But can they offer us real friendship? In this book, Alexis Elder outlines a theory of friendship drawing on Aristotle and contemporary work on social ontology, and then uses it to evaluate the real value of social robotics and emerging social technologies.

In the first part of the book Elder develops a robust and rigorous ontology of friendship: what it is, how it functions, what harms it, and how it relates to familiar ethical and philosophical questions about character, value, and well-being. In Part II she applies this ontology to emerging trends in social robotics and human-robot interaction, including robotic companions for lonely seniors, therapeutic robots used to teach social skills to children on the autism spectrum, and companionate robots currently being developed for consumer markets. Elder articulates the moral hazards presented by these robots, while at the same time acknowledging their real and measurable benefits. In the final section she shifts her focus to connections between real people, especially those enabled by social media. Arguing against critics who have charged that these new communication technologies are weakening our social connections, Elder explores ways in which text messaging, video chats, Facebook, and Snapchat are enabling us to develop, sustain, and enrich our friendship in new and meaningful ways….(More)”.

Innovation Contests: How to Engage Citizens in Solving Urban Problems?


Chapter by Sarah Hartmann, Agnes Mainka and Wolfgang G. Stock in Enhancing Knowledge Discovery and Innovation in the Digital Era: “Cities all over the world are challenged with problems evolving from increasing urbanity, population growth, and density. For example, one prominent issue that is addressed in many cities is mobility. To develop smart city solutions, governments are trying to introduce open innovation. They have started to open their governmental and city related data as well as awake the citizens’ awareness on urban problems through innovation contests.

Citizens are the users of the city and therefore, have a practical motivation to engage in innovation contests as for example in hackathons and app competitions. The collaboration and co-creation of civic services by means of innovation contests is a cultural development of how governments and citizens work together in an open governmental environment. A qualitative analysis of innovation contests in 24 world cities reveals this global trend. In particular, such events increase the awareness of citizens and local businesses for identifying and solving urban challenges and are helpful means to transfer the smart city idea into practicable solutions….(More)”.

The rise of female whistleblowers


Andrea Hickerson at the Oxford Bibliographies: “Until recently, I firmly believed whistleblowers would increasingly turn to secure, anonymizing tools and websites, like WikiLeaks, to share their data rather than take the risk of relying on a journalist to protect their identity. Now, however, WikiLeaks is implicated in aiding the election of Donald Trump, and “The Silence Breakers,” outspoken victims of sexual assault, are Time’s 2017 Person of the Year.

Not only is this moment remarkable because of the willingness of whistleblowers to come forward and show their faces, but also because women are the ones blowing the whistle. With the notable exception of Chelsea Manning who herself did not choose to be identified, the most well-known whistleblowers in modern history, arguably Daniel EllsbergEdward Snowden, and Jeffrey Wigand, are all men.

Research suggests key individual and organizational attributes that lend themselves to whistleblowing. On the individual level, people motivated by strong moral values or self-identity might be more likely to act. At the organizational level, individuals are more likely to report wrongdoing if they believe they will be listened to.

People who have faith in the organizations they work for are more likely to report wrongdoing internally. Those who don’t have faith look to the government, reporters, and/or hire lawyers to expose the wrongdoings.

Historically, women wouldn’t have been likely candidates to report internally becausethey haven’t been listened to or empowered in the workplace  At work they are  undervalued,underrepresented in leadership roles, and underpaid compared to male colleagues. This signals to women that their concerns will not be taken seriously or instigate change. Therefore, many choose to remain silent.

Whistleblowing comes with enormous risks, and those risks are greater for women….(More)”.

Can we help wildlife adapt by crowdsourcing human responses to climate change?


Project by WWF: “Can data on how people respond to a warming world help us anticipate human impacts on wildlife?

Not long after Nikhil Advani joined WWF in 2013, he made an intriguing discovery. Advani, whose work focuses on climate change adaptation, was assessing the vulnerability of various species to the changing planet. “I quickly realized,” he says, “that for a lot of the species that WWF works on—like elephants, mountain gorillas, and snow leopards—the biggest climate-driven threats are likely to come from human communities affected by changes in weather and climate.”

His realization led to the launch of Climate Crowd, an online platform for crowdsourcing data about two key topics: learning how rural and indigenous communities around the world are responding to climate change, and how their responses are affecting biodiversity. (The latter topic, Advani says, is something we know very little about yet.) For example, if community members enter protected areas to collect water during droughts, how will that activity affect the flora and fauna?

Working with partners from a handful of other conservation groups, Advani designed a survey for participants to use when interviewing local community members. Participants transcribe the interviews, mark each topic discussed in a list of categories (such as drought or natural habitat encroachment), and upload the results to the online platform…(Explore the Climate Crowd).

Computational Propaganda and Political Big Data: Moving Toward a More Critical Research Agenda


Gillian Bolsover and Philip Howard in the Journal Big Data: “Computational propaganda has recently exploded into public consciousness. The U.S. presidential campaign of 2016 was marred by evidence, which continues to emerge, of targeted political propaganda and the use of bots to distribute political messages on social media. This computational propaganda is both a social and technical phenomenon. Technical knowledge is necessary to work with the massive databases used for audience targeting; it is necessary to create the bots and algorithms that distribute propaganda; it is necessary to monitor and evaluate the results of these efforts in agile campaigning. Thus, a technical knowledge comparable to those who create and distribute this propaganda is necessary to investigate the phenomenon.

However, viewing computational propaganda only from a technical perspective—as a set of variables, models, codes, and algorithms—plays into the hands of those who create it, the platforms that serve it, and the firms that profit from it. The very act of making something technical and impartial makes it seem inevitable and unbiased. This undermines the opportunities to argue for change in the social value and meaning of this content and the structures in which it exists. Big-data research is necessary to understand the socio-technical issue of computational propaganda and the influence of technology in politics. However, big data researchers must maintain a critical stance toward the data being used and analyzed so as to ensure that we are critiquing as we go about describing, predicting, or recommending changes. If research studies of computational propaganda and political big data do not engage with the forms of power and knowledge that produce it, then the very possibility for improving the role of social-media platforms in public life evaporates.

Definitionally, computational propaganda has two important parts: the technical and the social. Focusing on the technical, Woolley and Howard define computational propaganda as the assemblage of social-media platforms, autonomous agents, and big data tasked with the manipulation of public opinion. In contrast, the social definition of computational propaganda derives from the definition of propaganda—communications that deliberately misrepresent symbols, appealing to emotions and prejudices and bypassing rational thought, to achieve a specific goal of its creators—with computational propaganda understood as propaganda created or disseminated using computational (technical) means…(More) (Full Text HTMLFull Text PDF)

Behind the Screen: the Syrian Virtual Resistance


Billie Jeanne Brownlee at Cyber Orient: “Six years have gone by since the political upheaval that swept through many Middle East and North African (MENA) countries begun. Syria was caught in the grip of this revolutionary moment, one that drove the country from a peaceful popular mobilisation to a deadly fratricide civil war with no apparent way out.

This paper provides an alternative approach to the study of the root causes of the Syrian uprising by examining the impact that the development of new media had in reconstructing forms of collective action and social mobilisation in pre-revolutionary Syria.

By providing evidence of a number of significant initiatives, campaigns and acts of contentious politics that occurred between 2000 and 2011, this paper shows how, prior to 2011, scholarly work on Syria has not given sufficient theoretical and empirical consideration to the development of expressions of dissent and resilience of its cyberspace and to the informal and hybrid civic engagement they produced….(More)”.

Research reveals de-identified patient data can be re-identified


Vanessa Teague, Chris Culnane and Ben Rubinstein in PhysOrg: “In August 2016, Australia’s federal Department of Health published medical billing records of about 2.9 million Australians online. These records came from the Medicare Benefits Scheme (MBS) and the Pharmaceutical Benefits Scheme (PBS) containing 1 billion lines of historical health data from the records of around 10 per cent of the population.

These longitudinal records were de-identified, a process intended to prevent a person’s identity from being connected with information, and were made public on the government’s open data website as part of its policy on accessible public 

We found that patients can be re-identified, without decryption, through a process of linking the unencrypted parts of the  with known information about the individual.

Our findings replicate those of similar studies of other de-identified datasets:

  • A few mundane facts taken together often suffice to isolate an individual.
  • Some patients can be identified by name from publicly available information.
  • Decreasing the precision of the data, or perturbing it statistically, makes re-identification gradually harder at a substantial cost to utility.

The first step is examining a patient’s uniqueness according to medical procedures such as childbirth. Some individuals are unique given public information, and many patients are unique given a few basic facts, such as year of birth or the date a baby was delivered….

The second step is examining uniqueness according to the characteristics of commercial datasets we know of but cannot access directly. There are high uniqueness rates that would allow linking with a commercial pharmaceutical dataset, and with the billing data available to a bank. This means that ordinary people, not just the prominent ones, may be easily re-identifiable by their bank or insurance company…

These de-identification methods were bound to fail, because they were trying to achieve two inconsistent aims: the protection of individual privacy and publication of detailed individual records. De-identification is very unlikely to work for other rich datasets in the government’s care, like census data, tax records, mental health records, penal information and Centrelink data.

While the ambition of making more data more easily available to facilitate research, innovation and sound public policy is a good one, there is an important technical and procedural problem to solve: there is no good solution for publishing sensitive complex individual records that protects privacy without substantially degrading the usefulness of the data.

Some data can be safely published online, such as information about government, aggregations of large collections of material, or data that is differentially private. For sensitive, complex data about individuals, a much more controlled release in a secure research environment is a better solution. The Productivity Commission recommends a “trusted user” model, and techniques like dynamic consent also give patients greater control and visibility over their personal information….(More).

The Annual Review of Social Partnerships


(Open access) book edited by May Seitanidi and Verena Bitzer: “…written for and by cross-sector social partnership (CSSP) academics and practitioners focusing on nonprofit, business, and public sectors, who view collaboration as key to solving social problems such as climate change, economic inequality, poverty, or biodiversity loss and environmental degradation. Published by an independent group of academics and practitioners since 2006, the ARSP bridges academic theory and practice with ideas about promoting the social good, covering a wide range of subjects and geographies surrounding the interactions between nonprofit, business, and public sectors. Its aim is to inform, to share, to inspire, to educate, and to train. Building a global community of experts on CSSPs, be they from academic or practice, is the inherent motivation of the ARSP. The ARSP offers new directions for research, presents funded research projects, and provides published papers in a compilation, allowing researchers to familiarize themselves with the latest work in this field. The ARSP also captures and presents insights on partnerships from practitioners, enabling its readership to learn from the hands-on experiences and observations of those who work with and for partnerships….(More)”. Issues of the ARSP can be downloaded here.