SlideShare a Scribd company logo
1 of 41
Download to read offline
Data & Digital Ethics
Kate Carruthers
Version 1.0
March 2018
Classification: PUBLIC
Slides are available
https://www.slideshare.net/carruthk
March 18 Kate Carruthers | UNSW 1
Agenda
1. Ethics and data
2. Why this important
3. Some traditional approaches
4. Some new approaches
5. What we need to do
March 18 Kate Carruthers | UNSW 2
Ethics
Moral principles that govern a person's behaviour or the
way in which they conduct an activity…
March 18 Kate Carruthers | UNSW 3
“We ask ethical questions whenever we think
about how we should act. Being ethical is a
part of what defines us as human beings.”
The Ethics Centre, Sydney
March 18 Kate Carruthers | UNSW 4
Areas of focus
• Ethics of data - how we generate, record & share
data
• Ethics of algorithms - how we interpret data via
artificial intelligence, machine learning and robots
• Ethics of practices - devising responsible
innovation and professional codes to guide this
emerging science
March 18 Kate Carruthers | UNSW 5
What is data ethics?
Luciano Floridi, Mariarosaria Taddeo
Phil. Trans. R. Soc. A 2016 374
20160360; DOI: 10.1098/rsta.2016.0360. Published
14 November 2016
5 Propositions about data
1.Data is not neutral
2.There is no such thing as raw data
3.The signal to noise ratio has changed
4.Data is not inherently smart
5.The more data we have the less anonymity
March 18 Kate Carruthers | UNSW 6
March 18 Kate Carruthers | UNSW 7
Privacy
Data
Governance
Cyber
Security
Ethics
The essentials
March 18 Kate Carruthers | UNSW 8
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-
hacks/
March 18 Kate Carruthers | UNSW 9
This Photo by Unknown Author is licensed under CC BY-NC-SA
March 18 Kate Carruthers | UNSW 10
https://www.arnnet.com.au/article/609309/australian-red-cross-launches-investigation-after-massive-data-cock-up/
March 18 Kate Carruthers | UNSW 11
http://www.news.com.au/technology/online/australias-2016-census-had-significant-and-obvious-oversights-report-
finds/news-story/6edcf8f897b2361965bd72683ee6edbe
Facebook study
“We show, via a massive (N = 689,003) experiment on Facebook,
that emotional states can be transferred to others via emotional
contagion, leading people to experience the same emotions without
their awareness. We provide experimental evidence that emotional
contagion occurs without direct interaction between people
(exposure to a friend expressing an emotion is sufficient), and in the
complete absence of nonverbal cues.”
March 18 Kate Carruthers | UNSW 12
Kramer, A. D., Guillory, J. E., & Hancock, J. T. (2014). Experimental evidence of
massive-scale emotional contagion through social networks. Proceedings
of the National Academy of Sciences, 111(24), 8788-8790.
March 18 Kate Carruthers | UNSW 13
http://thehackernews.com/2017/07/sweden-data-breach.html
March 18 Kate Carruthers | UNSW 14
******
https://www.theverge.com/2016/3/24/11297050/tay-microsoft-chatbot-racist
March 18 Kate Carruthers | UNSW 15
“Revealed: 50
million Facebook
profiles harvested
for Cambridge
Analytica in major
data breach”
https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election
March 18 Kate Carruthers | UNSW 16
https://medium.com/textifire/cambridge-analytica-microsofts-exploitative-ad-tech-c2db8633f542
May 2017: Cambridge Analytica: Microsoft’s Exploitative Ad-Tech
Trump & Brexit’s infamous data firm was allegedly grown in the Microsoft-funded
advertising research labs at Cambridge University.
Traditional approaches
• Security by Design
• Privacy by Design
• Examples:
oIEEE CS/ACM Code of Ethics
oACM Code of Ethics
• Guidelines
March 18 Kate Carruthers | UNSW 17
1. Minimize attack surface area
2. Establish secure defaults
3. Principle of Least privilege
4. Principle of Defence in depth
5. Fail securely
6. Don’t trust services
7. Separation of duties
8. Avoid security by obscurity
9. Keep security simple
10. Fix security issues correctly
OWASP Security by Design Principles
March 18 Kate Carruthers | UNSW 18
Open Web Application Security Project
https://www.owasp.org/index.php/Security_by_Design_Principles
Privacy matters
Privacy by Design
1. Proactive not Reactive; Preventative not
Remedial
2. Privacy as the Default Setting
3. Privacy Embedded into Design
4. Full Functionality – Positive-Sum, not Zero-Sum
5. End-to-End Security – Full Lifecycle Protection
6. Visibility and Transparency – Keep it Open
7. Respect for User Privacy – Keep it User-Centric
March 18 Kate Carruthers | UNSW 19
“Privacy is an inherent
human right, and a
requirement for
maintaining the human
condition with dignity and
respect.”
- Bruce Schneier
https://www.schneier.com/essays/archives/2006/05/the_eternal_value_of.html
IEEE CS/ACM Code of Ethics & Professional Practice
Software engineers shall commit themselves to making the analysis, specification, design, development, testing and maintenance of software a
beneficial and respected profession. In accordance with their commitment to the health, safety and welfare of the public, software engineers
shall adhere to the following Eight Principles:
1. Public: Software engineers shall act consistently with the public interest.
2. Client and Employer: Software engineers shall act in a manner that is in the best interests of their client and employer, consistent with the
public interest.
3. Product: Software engineers shall ensure that their products and related modifications meet the highest professional standards possible.
4. Judgement: Software engineers shall maintain integrity and independence in their professional judgment.
5. Management: Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of
software development and maintenance.
6. Profession: Software engineers shall advance the integrity and reputation of the profession consistent with the public interest.
7. Colleagues: Software engineers shall be fair to and supportive of their colleagues.
8. Self: Software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical
approach to the practice of the profession.
March 18 Kate Carruthers | UNSW 20
https://www.computer.org/web/education/code-of-ethics
ACM Code of Ethics
March 18 Kate Carruthers | UNSW 21
As an ACM member I will
1. Contribute to society and human well-being.
2. Avoid harm to others.
3. Be honest and trustworthy.
4. Be fair and take action not to discriminate.
5. Honor property rights including copyrights and patent.
6. Give proper credit for intellectual property.
7. Respect the privacy of others.
8. Honor confidentiality.
From the ACM Code of Ethics http://www.acm.org/about/code-of-ethics
Accenture: 12 guidelines for developing data ethics codes
1. The highest priority is to respect the persons behind the data.
2. Attend to the downstream uses of datasets.
3. Provenance of the data and analytical tools shapes the consequences of
their use.
4. Strive to match privacy and security safeguards with privacy and security
expectations.
5. Always follow the law, but understand that the law is often a minimum bar.
6. Be wary of collecting data just for the sake of more data.
7. Data can be a tool of inclusion and exclusion.
March 18 Kate Carruthers | UNSW 22
https://www.accenture.com/t20160629T012639__w__/us-en/_acnmedia/PDF-24/Accenture-Universal-Principles-Data-Ethics.pdf
Accenture: 12 guidelines for developing data ethics codes
8. As much as possible, explain methods for analysis and marketing to data
disclosers.
9. Data scientists and practitioners should accurately represent their
qualifications, limits to their expertise, adhere to professional standards,
and strive for peer accountability.
10.Aspire to design practices that incorporate transparency, configurability,
accountability, and auditability.
11.Products and research practices should be subject to internal, and
potentially external ethical review.
12.Governance practices should be robust, known to all team members and
reviewed regularly
March 18 Kate Carruthers | UNSW 23
https://www.accenture.com/t20160629T012639__w__/us-en/_acnmedia/PDF-24/Accenture-Universal-Principles-Data-Ethics.pdf
Issues with Codes of Ethics
• Often nobody knows they exist
• Even if they do, nobody follows them
• If they do follow them it turns into work to rule
• It’s hard to articulate all ethical requirements in a code
• Needs strong institutional support
• Guidelines have similar issues
March 18 Kate Carruthers | UNSW 24
March 18 Kate Carruthers | UNSW 25
“One Zettabyte is approximately equal to a
thousand Exabytes, a billion Terabytes, or a trillion
Gigabytes.”
https://blogs.cisco.com/sp/the-zettabyte-era-officially-begins-how-much-is-that
March 18 Kate Carruthers | UNSW 26
March 18 Kate Carruthers | UNSW 27
Technology has no
ethics.
People demonstrate
ethics.
March 18 Kate Carruthers | UNSW 28
Technology inherits
the biases of its
makers – therefore
we need diversity
March 18 Kate Carruthers | UNSW 29
“Complexity is a defining
feature of the digital era, &
we are not adjusting our
governance structures to
manage it.” Kent Aiken, Prime Minister’s Fellow,
Public Policy Forum Canada, 2017
Some new approaches
• FATML – Fairness, Accountability and Transparency in
Machine Learning
• IEEE Global Initiative on Ethics of Autonomous and
Intelligent Systems
• Algorithmic Justice League
• Education in digital ethics
March 18 Kate Carruthers | UNSW 30
March 18 Kate Carruthers | UNSW 31
http://www.fatml.org/
March 18 Kate Carruthers | UNSW 32
https://standards.ieee.org/develop/indconn/ec/autonomous_systems.html
March 18 Kate Carruthers | UNSW 33
March 18 Kate Carruthers | UNSW 34
Education
March 18 Kate Carruthers | UNSW 35
We cannot leave
ethics to volunteer
groups!
Digital Ethics?
“A few guidelines are useful in most situations:
• Use the golden rule: ask yourself how you would like to
be treated as a human being, citizen or customer.
• There are always unintended consequences: embrace
new positive uses of technology, and block undesirable
uses.
• Success usually comes from exercising discipline and
self-restraint in using technology, rather than pushing the
limits.”
March 18 Kate Carruthers | UNSW 36
Goasduff, C. L. (2016, March 07). Kick-Start the Conversation on Digital Ethics. Retrieved August 15, 2017, from
http://www.gartner.com/smarterwithgartner/kick-start-the-conversation-on-digital-ethics/
March 18 Kate Carruthers | UNSW 37
We need formal ways
to consider the ethical
implications of data
and its uses
Slides are available
https://www.slideshare.net/carruthk
March 18 Kate Carruthers | UNSW 38
Resources
Georgetown University, Kennedy Institute of Ethics, Ethics Lab
Causeit Data Ethics
The BIG Data Ethics Cheat Sheet, Hackermoon
Digital Ethics Lab - Oxford Internet Institute - University of Oxford
Guidelines on Ethical Research - British Sociological Association
What is data ethics? Luciano Floridi, Mariarosaria Taddeo. Phil. Trans. R. Soc. A 2016 374
20160360; DOI: 10.1098/rsta.2016.0360. Published 14 November 2016
Digital Enlightenment Forum: Digital Ethics. Workshop Report. (2016, March 1). Retrieved August 16, 2017, from
https://digitalenlightenment.org/sites/default/files/users/14/Digital%20Ethics%20Workshop%20Report%20v2.pdf
A deep study on the concept of digital ethics. Maggiolini, Piercarlo. (2014).. Revista de Administração de
Empresas, 54(5), 585-591. https://dx.doi.org/10.1590/S0034-759020140511
March 18 Kate Carruthers | UNSW 39
Thank you
Kate Carruthers
k.carruthers@unsw.edu.au
March 18 Kate Carruthers | UNSW 40

More Related Content

What's hot

Modelling Higher Education's digital future
Modelling Higher Education's digital future Modelling Higher Education's digital future
Modelling Higher Education's digital future Kate Carruthers
 
Implementing Data Governance & ISMS in a University
Implementing Data Governance & ISMS in a UniversityImplementing Data Governance & ISMS in a University
Implementing Data Governance & ISMS in a UniversityKate Carruthers
 
Social media: balancing risk and control
Social media: balancing risk and controlSocial media: balancing risk and control
Social media: balancing risk and controlKate Carruthers
 
Keith prabhu global high on cloud summit
Keith prabhu  global high on cloud summitKeith prabhu  global high on cloud summit
Keith prabhu global high on cloud summitadministrator_confidis
 
2021 GeoConvergence: Ethics presentation
2021 GeoConvergence: Ethics presentation2021 GeoConvergence: Ethics presentation
2021 GeoConvergence: Ethics presentationPLACE
 
OECD Geospatial Lab - Locus Charter
OECD Geospatial Lab - Locus Charter OECD Geospatial Lab - Locus Charter
OECD Geospatial Lab - Locus Charter PLACE
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by DesignUnisys Corporation
 
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...Sonia Usih, PMP, MCPM, BSc.
 
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...Data Con LA
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesTom Kirby
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security BattlegroundWatchful Software
 
ÐDaM and Equally presentation at the EDCon conference
ÐDaM and Equally presentation at the EDCon conferenceÐDaM and Equally presentation at the EDCon conference
ÐDaM and Equally presentation at the EDCon conferenceQuentin de Beauchesne
 
ICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalJohn Weiler
 
Where is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudWhere is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudChris Swan
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNorth Texas Chapter of the ISSA
 
Xact aceds 5-7-14 webcast
Xact aceds 5-7-14 webcastXact aceds 5-7-14 webcast
Xact aceds 5-7-14 webcastRobbie Hilson
 
PERC_BIG Data CreditScoring_102015_1(2)
PERC_BIG Data CreditScoring_102015_1(2)PERC_BIG Data CreditScoring_102015_1(2)
PERC_BIG Data CreditScoring_102015_1(2)Michael Turner
 
Citrix Security Survey Guide
Citrix Security Survey GuideCitrix Security Survey Guide
Citrix Security Survey GuideCitrix
 

What's hot (20)

Modelling Higher Education's digital future
Modelling Higher Education's digital future Modelling Higher Education's digital future
Modelling Higher Education's digital future
 
Implementing Data Governance & ISMS in a University
Implementing Data Governance & ISMS in a UniversityImplementing Data Governance & ISMS in a University
Implementing Data Governance & ISMS in a University
 
Social media: balancing risk and control
Social media: balancing risk and controlSocial media: balancing risk and control
Social media: balancing risk and control
 
Keith prabhu global high on cloud summit
Keith prabhu  global high on cloud summitKeith prabhu  global high on cloud summit
Keith prabhu global high on cloud summit
 
2021 GeoConvergence: Ethics presentation
2021 GeoConvergence: Ethics presentation2021 GeoConvergence: Ethics presentation
2021 GeoConvergence: Ethics presentation
 
Presentation
PresentationPresentation
Presentation
 
OECD Geospatial Lab - Locus Charter
OECD Geospatial Lab - Locus Charter OECD Geospatial Lab - Locus Charter
OECD Geospatial Lab - Locus Charter
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
 
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challenges
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
 
ÐDaM and Equally presentation at the EDCon conference
ÐDaM and Equally presentation at the EDCon conferenceÐDaM and Equally presentation at the EDCon conference
ÐDaM and Equally presentation at the EDCon conference
 
ICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_final
 
Where is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudWhere is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloud
 
David Smith gfke 2014
David Smith gfke 2014David Smith gfke 2014
David Smith gfke 2014
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
 
Xact aceds 5-7-14 webcast
Xact aceds 5-7-14 webcastXact aceds 5-7-14 webcast
Xact aceds 5-7-14 webcast
 
PERC_BIG Data CreditScoring_102015_1(2)
PERC_BIG Data CreditScoring_102015_1(2)PERC_BIG Data CreditScoring_102015_1(2)
PERC_BIG Data CreditScoring_102015_1(2)
 
Citrix Security Survey Guide
Citrix Security Survey GuideCitrix Security Survey Guide
Citrix Security Survey Guide
 

Similar to Data & Digital Ethics - CDAO Conference Sydney 2018

Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Ansgar Koene
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxPallawiBulakh1
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAnsgar Koene
 
Governance compliance
Governance   complianceGovernance   compliance
Governance complianceAndy Petrella
 
Creating a new culture around authenticity and generative AI
Creating a new culture around authenticity and generative AICreating a new culture around authenticity and generative AI
Creating a new culture around authenticity and generative AICharles Darwin University
 
Industry Standards as vehicle to address socio-technical AI challenges
Industry Standards as vehicle to address socio-technical AI challengesIndustry Standards as vehicle to address socio-technical AI challenges
Industry Standards as vehicle to address socio-technical AI challengesAnsgar Koene
 
Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwarivpnmentor
 
Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61Liming Zhu
 
Big Data: Opportunity & Challenges
Big Data: Opportunity & ChallengesBig Data: Opportunity & Challenges
Big Data: Opportunity & ChallengesKuncoro Wastuwibowo
 
Big Data: Opportunity & Challenges
Big Data: Opportunity & ChallengesBig Data: Opportunity & Challenges
Big Data: Opportunity & ChallengesKuncoro Wastuwibowo
 
Ethics of Analytics and Machine Learning
Ethics of Analytics and Machine LearningEthics of Analytics and Machine Learning
Ethics of Analytics and Machine LearningMark Underwood
 
acatech_STUDY_Internet_Privacy_WEB
acatech_STUDY_Internet_Privacy_WEBacatech_STUDY_Internet_Privacy_WEB
acatech_STUDY_Internet_Privacy_WEBJaina Hirai
 
Data; Data manipulation, sorting, grouping, rearranging. Plotting the data. D...
Data; Data manipulation, sorting, grouping, rearranging. Plotting the data. D...Data; Data manipulation, sorting, grouping, rearranging. Plotting the data. D...
Data; Data manipulation, sorting, grouping, rearranging. Plotting the data. D...jybufgofasfbkpoovh
 
AI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security CommonsAI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security Commonsprofessormadison
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyMicah Altman
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES.eu
 
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...ijtsrd
 
Introduction to Big Data and Data Science
Introduction to Big Data and Data ScienceIntroduction to Big Data and Data Science
Introduction to Big Data and Data ScienceFeyzi R. Bagirov
 

Similar to Data & Digital Ethics - CDAO Conference Sydney 2018 (20)

Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptx
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry Standards
 
Governance compliance
Governance   complianceGovernance   compliance
Governance compliance
 
Creating a new culture around authenticity and generative AI
Creating a new culture around authenticity and generative AICreating a new culture around authenticity and generative AI
Creating a new culture around authenticity and generative AI
 
Industry Standards as vehicle to address socio-technical AI challenges
Industry Standards as vehicle to address socio-technical AI challengesIndustry Standards as vehicle to address socio-technical AI challenges
Industry Standards as vehicle to address socio-technical AI challenges
 
Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwari
 
Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61
 
Big Data: Opportunity & Challenges
Big Data: Opportunity & ChallengesBig Data: Opportunity & Challenges
Big Data: Opportunity & Challenges
 
Big Data: Opportunity & Challenges
Big Data: Opportunity & ChallengesBig Data: Opportunity & Challenges
Big Data: Opportunity & Challenges
 
Ethics of Analytics and Machine Learning
Ethics of Analytics and Machine LearningEthics of Analytics and Machine Learning
Ethics of Analytics and Machine Learning
 
acatech_STUDY_Internet_Privacy_WEB
acatech_STUDY_Internet_Privacy_WEBacatech_STUDY_Internet_Privacy_WEB
acatech_STUDY_Internet_Privacy_WEB
 
Ethics in Technology Handout
Ethics in Technology HandoutEthics in Technology Handout
Ethics in Technology Handout
 
Data ethics
Data ethicsData ethics
Data ethics
 
Data; Data manipulation, sorting, grouping, rearranging. Plotting the data. D...
Data; Data manipulation, sorting, grouping, rearranging. Plotting the data. D...Data; Data manipulation, sorting, grouping, rearranging. Plotting the data. D...
Data; Data manipulation, sorting, grouping, rearranging. Plotting the data. D...
 
AI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security CommonsAI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security Commons
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
 
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
 
Introduction to Big Data and Data Science
Introduction to Big Data and Data ScienceIntroduction to Big Data and Data Science
Introduction to Big Data and Data Science
 

More from Kate Carruthers

Data Governance - a work in progress
Data Governance - a work in progressData Governance - a work in progress
Data Governance - a work in progressKate Carruthers
 
Future proof your career
Future proof your career  Future proof your career
Future proof your career Kate Carruthers
 
Taking disruption for granted
Taking disruption for grantedTaking disruption for granted
Taking disruption for grantedKate Carruthers
 
The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...Kate Carruthers
 
Building the sharing economy
Building the sharing economy Building the sharing economy
Building the sharing economy Kate Carruthers
 
Hardware is Hard - Products are Hard Melbourne 2013
Hardware is Hard - Products are Hard Melbourne 2013Hardware is Hard - Products are Hard Melbourne 2013
Hardware is Hard - Products are Hard Melbourne 2013Kate Carruthers
 
Social and technology trends for banking
Social and technology trends for bankingSocial and technology trends for banking
Social and technology trends for bankingKate Carruthers
 
Internet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsInternet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsKate Carruthers
 
Your blog your brand - tips on getting started with your blog
Your blog your brand - tips on getting started with your blogYour blog your brand - tips on getting started with your blog
Your blog your brand - tips on getting started with your blogKate Carruthers
 
Social media for social good 2012
Social media for social good 2012Social media for social good 2012
Social media for social good 2012Kate Carruthers
 
Whats the big idea with social media media140-2012
Whats the big idea with social media media140-2012Whats the big idea with social media media140-2012
Whats the big idea with social media media140-2012Kate Carruthers
 
Failing in the right direction
Failing in the right directionFailing in the right direction
Failing in the right directionKate Carruthers
 
The Power of Social Business
The Power of Social BusinessThe Power of Social Business
The Power of Social BusinessKate Carruthers
 
Gathering11 - envisioning change
Gathering11 - envisioning changeGathering11 - envisioning change
Gathering11 - envisioning changeKate Carruthers
 
Social innovation Sydney Case Study
Social innovation Sydney Case StudySocial innovation Sydney Case Study
Social innovation Sydney Case StudyKate Carruthers
 
Beta space | introduction websites
Beta space | introduction websitesBeta space | introduction websites
Beta space | introduction websitesKate Carruthers
 
Leadership and the Digital Revolution
Leadership and the Digital RevolutionLeadership and the Digital Revolution
Leadership and the Digital RevolutionKate Carruthers
 
#C3t The Command & Control of Twitter
#C3t The Command & Control of Twitter#C3t The Command & Control of Twitter
#C3t The Command & Control of TwitterKate Carruthers
 

More from Kate Carruthers (19)

Data Governance - a work in progress
Data Governance - a work in progressData Governance - a work in progress
Data Governance - a work in progress
 
Future proof your career
Future proof your career  Future proof your career
Future proof your career
 
Taking disruption for granted
Taking disruption for grantedTaking disruption for granted
Taking disruption for granted
 
The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...
 
Building the sharing economy
Building the sharing economy Building the sharing economy
Building the sharing economy
 
Hardware is Hard - Products are Hard Melbourne 2013
Hardware is Hard - Products are Hard Melbourne 2013Hardware is Hard - Products are Hard Melbourne 2013
Hardware is Hard - Products are Hard Melbourne 2013
 
Social and technology trends for banking
Social and technology trends for bankingSocial and technology trends for banking
Social and technology trends for banking
 
Internet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsInternet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business Models
 
Crowdfunding
CrowdfundingCrowdfunding
Crowdfunding
 
Your blog your brand - tips on getting started with your blog
Your blog your brand - tips on getting started with your blogYour blog your brand - tips on getting started with your blog
Your blog your brand - tips on getting started with your blog
 
Social media for social good 2012
Social media for social good 2012Social media for social good 2012
Social media for social good 2012
 
Whats the big idea with social media media140-2012
Whats the big idea with social media media140-2012Whats the big idea with social media media140-2012
Whats the big idea with social media media140-2012
 
Failing in the right direction
Failing in the right directionFailing in the right direction
Failing in the right direction
 
The Power of Social Business
The Power of Social BusinessThe Power of Social Business
The Power of Social Business
 
Gathering11 - envisioning change
Gathering11 - envisioning changeGathering11 - envisioning change
Gathering11 - envisioning change
 
Social innovation Sydney Case Study
Social innovation Sydney Case StudySocial innovation Sydney Case Study
Social innovation Sydney Case Study
 
Beta space | introduction websites
Beta space | introduction websitesBeta space | introduction websites
Beta space | introduction websites
 
Leadership and the Digital Revolution
Leadership and the Digital RevolutionLeadership and the Digital Revolution
Leadership and the Digital Revolution
 
#C3t The Command & Control of Twitter
#C3t The Command & Control of Twitter#C3t The Command & Control of Twitter
#C3t The Command & Control of Twitter
 

Recently uploaded

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...lizamodels9
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...lizamodels9
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 

Recently uploaded (20)

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 

Data & Digital Ethics - CDAO Conference Sydney 2018

  • 1. Data & Digital Ethics Kate Carruthers Version 1.0 March 2018 Classification: PUBLIC
  • 3. Agenda 1. Ethics and data 2. Why this important 3. Some traditional approaches 4. Some new approaches 5. What we need to do March 18 Kate Carruthers | UNSW 2
  • 4. Ethics Moral principles that govern a person's behaviour or the way in which they conduct an activity… March 18 Kate Carruthers | UNSW 3 “We ask ethical questions whenever we think about how we should act. Being ethical is a part of what defines us as human beings.” The Ethics Centre, Sydney
  • 5. March 18 Kate Carruthers | UNSW 4
  • 6. Areas of focus • Ethics of data - how we generate, record & share data • Ethics of algorithms - how we interpret data via artificial intelligence, machine learning and robots • Ethics of practices - devising responsible innovation and professional codes to guide this emerging science March 18 Kate Carruthers | UNSW 5 What is data ethics? Luciano Floridi, Mariarosaria Taddeo Phil. Trans. R. Soc. A 2016 374 20160360; DOI: 10.1098/rsta.2016.0360. Published 14 November 2016
  • 7. 5 Propositions about data 1.Data is not neutral 2.There is no such thing as raw data 3.The signal to noise ratio has changed 4.Data is not inherently smart 5.The more data we have the less anonymity March 18 Kate Carruthers | UNSW 6
  • 8. March 18 Kate Carruthers | UNSW 7 Privacy Data Governance Cyber Security Ethics The essentials
  • 9. March 18 Kate Carruthers | UNSW 8 http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches- hacks/
  • 10. March 18 Kate Carruthers | UNSW 9 This Photo by Unknown Author is licensed under CC BY-NC-SA
  • 11. March 18 Kate Carruthers | UNSW 10 https://www.arnnet.com.au/article/609309/australian-red-cross-launches-investigation-after-massive-data-cock-up/
  • 12. March 18 Kate Carruthers | UNSW 11 http://www.news.com.au/technology/online/australias-2016-census-had-significant-and-obvious-oversights-report- finds/news-story/6edcf8f897b2361965bd72683ee6edbe
  • 13. Facebook study “We show, via a massive (N = 689,003) experiment on Facebook, that emotional states can be transferred to others via emotional contagion, leading people to experience the same emotions without their awareness. We provide experimental evidence that emotional contagion occurs without direct interaction between people (exposure to a friend expressing an emotion is sufficient), and in the complete absence of nonverbal cues.” March 18 Kate Carruthers | UNSW 12 Kramer, A. D., Guillory, J. E., & Hancock, J. T. (2014). Experimental evidence of massive-scale emotional contagion through social networks. Proceedings of the National Academy of Sciences, 111(24), 8788-8790.
  • 14. March 18 Kate Carruthers | UNSW 13 http://thehackernews.com/2017/07/sweden-data-breach.html
  • 15. March 18 Kate Carruthers | UNSW 14 ****** https://www.theverge.com/2016/3/24/11297050/tay-microsoft-chatbot-racist
  • 16. March 18 Kate Carruthers | UNSW 15 “Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach” https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election
  • 17. March 18 Kate Carruthers | UNSW 16 https://medium.com/textifire/cambridge-analytica-microsofts-exploitative-ad-tech-c2db8633f542 May 2017: Cambridge Analytica: Microsoft’s Exploitative Ad-Tech Trump & Brexit’s infamous data firm was allegedly grown in the Microsoft-funded advertising research labs at Cambridge University.
  • 18. Traditional approaches • Security by Design • Privacy by Design • Examples: oIEEE CS/ACM Code of Ethics oACM Code of Ethics • Guidelines March 18 Kate Carruthers | UNSW 17
  • 19. 1. Minimize attack surface area 2. Establish secure defaults 3. Principle of Least privilege 4. Principle of Defence in depth 5. Fail securely 6. Don’t trust services 7. Separation of duties 8. Avoid security by obscurity 9. Keep security simple 10. Fix security issues correctly OWASP Security by Design Principles March 18 Kate Carruthers | UNSW 18 Open Web Application Security Project https://www.owasp.org/index.php/Security_by_Design_Principles
  • 20. Privacy matters Privacy by Design 1. Proactive not Reactive; Preventative not Remedial 2. Privacy as the Default Setting 3. Privacy Embedded into Design 4. Full Functionality – Positive-Sum, not Zero-Sum 5. End-to-End Security – Full Lifecycle Protection 6. Visibility and Transparency – Keep it Open 7. Respect for User Privacy – Keep it User-Centric March 18 Kate Carruthers | UNSW 19 “Privacy is an inherent human right, and a requirement for maintaining the human condition with dignity and respect.” - Bruce Schneier https://www.schneier.com/essays/archives/2006/05/the_eternal_value_of.html
  • 21. IEEE CS/ACM Code of Ethics & Professional Practice Software engineers shall commit themselves to making the analysis, specification, design, development, testing and maintenance of software a beneficial and respected profession. In accordance with their commitment to the health, safety and welfare of the public, software engineers shall adhere to the following Eight Principles: 1. Public: Software engineers shall act consistently with the public interest. 2. Client and Employer: Software engineers shall act in a manner that is in the best interests of their client and employer, consistent with the public interest. 3. Product: Software engineers shall ensure that their products and related modifications meet the highest professional standards possible. 4. Judgement: Software engineers shall maintain integrity and independence in their professional judgment. 5. Management: Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintenance. 6. Profession: Software engineers shall advance the integrity and reputation of the profession consistent with the public interest. 7. Colleagues: Software engineers shall be fair to and supportive of their colleagues. 8. Self: Software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical approach to the practice of the profession. March 18 Kate Carruthers | UNSW 20 https://www.computer.org/web/education/code-of-ethics
  • 22. ACM Code of Ethics March 18 Kate Carruthers | UNSW 21 As an ACM member I will 1. Contribute to society and human well-being. 2. Avoid harm to others. 3. Be honest and trustworthy. 4. Be fair and take action not to discriminate. 5. Honor property rights including copyrights and patent. 6. Give proper credit for intellectual property. 7. Respect the privacy of others. 8. Honor confidentiality. From the ACM Code of Ethics http://www.acm.org/about/code-of-ethics
  • 23. Accenture: 12 guidelines for developing data ethics codes 1. The highest priority is to respect the persons behind the data. 2. Attend to the downstream uses of datasets. 3. Provenance of the data and analytical tools shapes the consequences of their use. 4. Strive to match privacy and security safeguards with privacy and security expectations. 5. Always follow the law, but understand that the law is often a minimum bar. 6. Be wary of collecting data just for the sake of more data. 7. Data can be a tool of inclusion and exclusion. March 18 Kate Carruthers | UNSW 22 https://www.accenture.com/t20160629T012639__w__/us-en/_acnmedia/PDF-24/Accenture-Universal-Principles-Data-Ethics.pdf
  • 24. Accenture: 12 guidelines for developing data ethics codes 8. As much as possible, explain methods for analysis and marketing to data disclosers. 9. Data scientists and practitioners should accurately represent their qualifications, limits to their expertise, adhere to professional standards, and strive for peer accountability. 10.Aspire to design practices that incorporate transparency, configurability, accountability, and auditability. 11.Products and research practices should be subject to internal, and potentially external ethical review. 12.Governance practices should be robust, known to all team members and reviewed regularly March 18 Kate Carruthers | UNSW 23 https://www.accenture.com/t20160629T012639__w__/us-en/_acnmedia/PDF-24/Accenture-Universal-Principles-Data-Ethics.pdf
  • 25. Issues with Codes of Ethics • Often nobody knows they exist • Even if they do, nobody follows them • If they do follow them it turns into work to rule • It’s hard to articulate all ethical requirements in a code • Needs strong institutional support • Guidelines have similar issues March 18 Kate Carruthers | UNSW 24
  • 26. March 18 Kate Carruthers | UNSW 25 “One Zettabyte is approximately equal to a thousand Exabytes, a billion Terabytes, or a trillion Gigabytes.” https://blogs.cisco.com/sp/the-zettabyte-era-officially-begins-how-much-is-that
  • 27. March 18 Kate Carruthers | UNSW 26
  • 28. March 18 Kate Carruthers | UNSW 27 Technology has no ethics. People demonstrate ethics.
  • 29. March 18 Kate Carruthers | UNSW 28 Technology inherits the biases of its makers – therefore we need diversity
  • 30. March 18 Kate Carruthers | UNSW 29 “Complexity is a defining feature of the digital era, & we are not adjusting our governance structures to manage it.” Kent Aiken, Prime Minister’s Fellow, Public Policy Forum Canada, 2017
  • 31. Some new approaches • FATML – Fairness, Accountability and Transparency in Machine Learning • IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems • Algorithmic Justice League • Education in digital ethics March 18 Kate Carruthers | UNSW 30
  • 32. March 18 Kate Carruthers | UNSW 31 http://www.fatml.org/
  • 33. March 18 Kate Carruthers | UNSW 32 https://standards.ieee.org/develop/indconn/ec/autonomous_systems.html
  • 34. March 18 Kate Carruthers | UNSW 33
  • 35. March 18 Kate Carruthers | UNSW 34 Education
  • 36. March 18 Kate Carruthers | UNSW 35 We cannot leave ethics to volunteer groups!
  • 37. Digital Ethics? “A few guidelines are useful in most situations: • Use the golden rule: ask yourself how you would like to be treated as a human being, citizen or customer. • There are always unintended consequences: embrace new positive uses of technology, and block undesirable uses. • Success usually comes from exercising discipline and self-restraint in using technology, rather than pushing the limits.” March 18 Kate Carruthers | UNSW 36 Goasduff, C. L. (2016, March 07). Kick-Start the Conversation on Digital Ethics. Retrieved August 15, 2017, from http://www.gartner.com/smarterwithgartner/kick-start-the-conversation-on-digital-ethics/
  • 38. March 18 Kate Carruthers | UNSW 37 We need formal ways to consider the ethical implications of data and its uses
  • 40. Resources Georgetown University, Kennedy Institute of Ethics, Ethics Lab Causeit Data Ethics The BIG Data Ethics Cheat Sheet, Hackermoon Digital Ethics Lab - Oxford Internet Institute - University of Oxford Guidelines on Ethical Research - British Sociological Association What is data ethics? Luciano Floridi, Mariarosaria Taddeo. Phil. Trans. R. Soc. A 2016 374 20160360; DOI: 10.1098/rsta.2016.0360. Published 14 November 2016 Digital Enlightenment Forum: Digital Ethics. Workshop Report. (2016, March 1). Retrieved August 16, 2017, from https://digitalenlightenment.org/sites/default/files/users/14/Digital%20Ethics%20Workshop%20Report%20v2.pdf A deep study on the concept of digital ethics. Maggiolini, Piercarlo. (2014).. Revista de Administração de Empresas, 54(5), 585-591. https://dx.doi.org/10.1590/S0034-759020140511 March 18 Kate Carruthers | UNSW 39