SlideShare une entreprise Scribd logo
1  sur  35
Télécharger pour lire hors ligne
Data & Digital Ethics: some
thoughts
Kate Carruthers
Version 1.0
August 2017
Classification: PUBLIC
Ethics
Moral principles that govern a person's behaviour or the
way in which they conduct an activity…
August 17 Kate Carruthers | UNSW 1
“We ask ethical questions whenever we think
about how we should act. Being ethical is a
part of what defines us as human beings.”
The Ethics Centre, Sydney
August 17 Kate Carruthers | UNSW 2
Digital Ethics?
“A few guidelines are useful in most situations:
• Use the golden rule: ask yourself how you would like to be treated
as a human being, citizen or customer.
• There are always unintended consequences: embrace new positive
uses of technology, and block undesirable uses.
• Success usually comes from exercising discipline and self-restraint
in using technology, rather than pushing the limits.”
August 17 Kate Carruthers | UNSW 3
Goasduff, C. L. (2016, March 07). Kick-Start the Conversation on Digital Ethics. Retrieved August 15, 2017, from
http://www.gartner.com/smarterwithgartner/kick-start-the-conversation-on-digital-ethics/
Areas of focus
• Ethics of data - how we generate, record & share
data
• Ethics of algorithms - how we interpret data via
artificial intelligence, machine learning and robots
• Ethics of practices - devising responsible
innovation and professional codes to guide this
emerging science
August 17 Kate Carruthers | UNSW 4
What is data ethics?
Luciano Floridi, Mariarosaria Taddeo
Phil. Trans. R. Soc. A 2016 374
20160360; DOI: 10.1098/rsta.2016.0360. Published
14 November 2016
5 Propositions about data
1.Data is not neutral
2.There is no such thing as raw data
3.The signal to noise ratio has changed
4.Data is not inherently smart
5.The more data we have the less anonymity
August 17 Kate Carruthers | UNSW 5
3 things
August 17 Kate Carruthers | UNSW 6
Privacy
Data Gov
Info
Sec
Some food for thought
August 17 7Kate Carruthers | UNSW
August 17 Kate Carruthers | UNSW 8
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-
hacks/
August 17 Kate Carruthers | UNSW 9
This Photo by Unknown Author is licensed under CC BY-NC-SA
Facebook study
“We show, via a massive (N = 689,003) experiment on Facebook,
that emotional states can be transferred to others via emotional
contagion, leading people to experience the same emotions without
their awareness. We provide experimental evidence that emotional
contagion occurs without direct interaction between people
(exposure to a friend expressing an emotion is sufficient), and in the
complete absence of nonverbal cues.”
August 17 Kate Carruthers | UNSW 10
Kramer, A. D., Guillory, J. E., & Hancock, J. T. (2014). Experimental evidence of
massive-scale emotional contagion through social networks. Proceedings
of the National Academy of Sciences, 111(24), 8788-8790.
August 17 Kate Carruthers | UNSW 11
http://thehackernews.com/2017/07/sweden-data-breach.html
August 17 Kate Carruthers | UNSW 12
August 17 Kate Carruthers | UNSW 13
https://www.youtube.com/watch?v=WHynGQ9Vg30
August 17 Kate Carruthers | UNSW 14
August 17 Kate Carruthers | UNSW 15
Some traditional approaches
August 17 16Kate Carruthers | UNSW
1. Minimize attack surface area
2. Establish secure defaults
3. Principle of Least privilege
4. Principle of Defence in depth
5. Fail securely
6. Don’t trust services
7. Separation of duties
8. Avoid security by obscurity
9. Keep security simple
10. Fix security issues correctly
OWASP Security by Design Principles
August 17 Kate Carruthers | UNSW 17
Open Web Application Security Project
https://www.owasp.org/index.php/Security_by_Design_Principles
IEEE CS/ACM Code of Ethics & Professional Practice
Software engineers shall commit themselves to making the analysis, specification, design, development, testing and maintenance of software a
beneficial and respected profession. In accordance with their commitment to the health, safety and welfare of the public, software engineers
shall adhere to the following Eight Principles:
1. Public: Software engineers shall act consistently with the public interest.
2. Client and Employer: Software engineers shall act in a manner that is in the best interests of their client and employer, consistent with the
public interest.
3. Product: Software engineers shall ensure that their products and related modifications meet the highest professional standards possible.
4. Judgement: Software engineers shall maintain integrity and independence in their professional judgment.
5. Management: Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of
software development and maintenance.
6. Profession: Software engineers shall advance the integrity and reputation of the profession consistent with the public interest.
7. Colleagues: Software engineers shall be fair to and supportive of their colleagues.
8. Self: Software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical
approach to the practice of the profession.
August 17 Kate Carruthers | UNSW 18
https://www.computer.org/web/education/code-of-ethics
ACM Code of Ethics
August 17 Kate Carruthers | UNSW 19
As an ACM member I will
1. Contribute to society and human well-being.
2. Avoid harm to others.
3. Be honest and trustworthy.
4. Be fair and take action not to discriminate.
5. Honor property rights including copyrights and patent.
6. Give proper credit for intellectual property.
7. Respect the privacy of others.
8. Honor confidentiality.
From the ACM Code of Ethics
Accenture: 12 guidelines for developing data ethics codes
1. The highest priority is to respect the persons behind the data.
2. Attend to the downstream uses of datasets.
3. Provenance of the data and analytical tools shapes the consequences of
their use.
4. Strive to match privacy and security safeguards with privacy and security
expectations.
5. Always follow the law, but understand that the law is often a minimum bar.
6. Be wary of collecting data just for the sake of more data.
7. Data can be a tool of inclusion and exclusion.
August 17 Kate Carruthers | UNSW 20
https://www.accenture.com/t20160629T012639__w__/us-en/_acnmedia/PDF-24/Accenture-Universal-Principles-Data-Ethics.pdf
Accenture: 12 guidelines for developing data ethics codes
8. As much as possible, explain methods for analysis and marketing to data
disclosers.
9. Data scientists and practitioners should accurately represent their
qualifications, limits to their expertise, adhere to professional standards,
and strive for peer accountability.
10.Aspire to design practices that incorporate transparency, configurability,
accountability, and auditability.
11.Products and research practices should be subject to internal, and
potentially external ethical review.
12.Governance practices should be robust, known to all team members and
reviewed regularly
August 17 Kate Carruthers | UNSW 21
https://www.accenture.com/t20160629T012639__w__/us-en/_acnmedia/PDF-24/Accenture-Universal-Principles-Data-Ethics.pdf
Some things to think about
August 17 22Kate Carruthers | UNSW
Privacy matters
Privacy by Design
1. Proactive not Reactive; Preventative not
Remedial
2. Privacy as the Default Setting
3. Privacy Embedded into Design
4. Full Functionality – Positive-Sum, not Zero-Sum
5. End-to-End Security – Full Lifecycle Protection
6. Visibility and Transparency – Keep it Open
7. Respect for User Privacy – Keep it User-Centric
August 17 Kate Carruthers | UNSW 23
“Privacy is an inherent
human right, and a
requirement for
maintaining the human
condition with dignity and
respect.”
- Bruce Schneier
August 17 Kate Carruthers | UNSW 24
Technology has no
ethics. People
demonstrate ethics.
August 17 Kate Carruthers | UNSW 25
Technology inherits
the biases of its
makers
August 17 Kate Carruthers | UNSW 26
Kent Aitken, Prime Ministers Fellow,
Public Policy Forum Canada, 2017
Some new approaches
August 17 27Kate Carruthers | UNSW
August 17 Kate Carruthers | UNSW 28
http://www.fatml.org/
August 17 Kate Carruthers | UNSW 29
https://standards.ieee.org/develop/indconn/ec/autonomous_systems.html
August 17 Kate Carruthers | UNSW 30
August 17 Kate Carruthers | UNSW 31
Education
August 17 Kate Carruthers | UNSW 32
More thought is
needed!
Resources
Georgetown University, Kennedy Institute of Ethics, Ethics Lab
Causeit Data Ethics
The BIG Data Ethics Cheat Sheet, Hackermoon
Digital Ethics Lab - Oxford Internet Institute - University of Oxford
Guidelines on Ethical Research - British Sociological Association
What is data ethics? Luciano Floridi, Mariarosaria Taddeo. Phil. Trans. R. Soc. A 2016 374
20160360; DOI: 10.1098/rsta.2016.0360. Published 14 November 2016
Digital Enlightenment Forum: Digital Ethics. Workshop Report. (2016, March 1). Retrieved August 16, 2017, from
https://digitalenlightenment.org/sites/default/files/users/14/Digital%20Ethics%20Workshop%20Report%20v2.pdf
A deep study on the concept of digital ethics. Maggiolini, Piercarlo. (2014).. Revista de Administração de
Empresas, 54(5), 585-591. https://dx.doi.org/10.1590/S0034-759020140511
August 17 Kate Carruthers | UNSW 33
Thank you
Kate Carruthers
k.carruthers@unsw.edu.au
August 17 Kate Carruthers | UNSW 34

Contenu connexe

Tendances

Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin itRushana Bandara
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Our future in 2050
Our future in 2050Our future in 2050
Our future in 2050Tannya
 
Future & Technology - What's Next?
Future & Technology - What's Next? Future & Technology - What's Next?
Future & Technology - What's Next? Massive Media
 
Why Cloud Matters in Industry 4.0
Why Cloud Matters in Industry 4.0Why Cloud Matters in Industry 4.0
Why Cloud Matters in Industry 4.0Ridi Fe
 
Ethics in the use of Data & AI
Ethics in the use of Data & AI Ethics in the use of Data & AI
Ethics in the use of Data & AI Kalilur Rahman
 
Digitalization and Innovation - Today and Tomorrow
Digitalization and Innovation - Today and TomorrowDigitalization and Innovation - Today and Tomorrow
Digitalization and Innovation - Today and TomorrowApps with love
 
The Role of Artificial Intelligence in Manufacturing : 15 High Impacted AI Us...
The Role of Artificial Intelligence in Manufacturing : 15 High Impacted AI Us...The Role of Artificial Intelligence in Manufacturing : 15 High Impacted AI Us...
The Role of Artificial Intelligence in Manufacturing : 15 High Impacted AI Us...CANOPY ONE SOLUTIONS
 
Data and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneData and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneTim Rich
 
Living in the IT Era L1.pptx
Living in the IT Era L1.pptxLiving in the IT Era L1.pptx
Living in the IT Era L1.pptxRammel1
 
The Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance CapitalismThe Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance CapitalismJongseung Kim
 
Digital Transformation and IOT
Digital Transformation and IOTDigital Transformation and IOT
Digital Transformation and IOTMatthew W. Bowers
 

Tendances (20)

Implementing Ethics in AI
Implementing Ethics in AIImplementing Ethics in AI
Implementing Ethics in AI
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
50 years of Moore's Law.
50 years of Moore's Law.50 years of Moore's Law.
50 years of Moore's Law.
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Our future in 2050
Our future in 2050Our future in 2050
Our future in 2050
 
Future & Technology - What's Next?
Future & Technology - What's Next? Future & Technology - What's Next?
Future & Technology - What's Next?
 
Ethics In A Digital Age
Ethics In A Digital AgeEthics In A Digital Age
Ethics In A Digital Age
 
Why Cloud Matters in Industry 4.0
Why Cloud Matters in Industry 4.0Why Cloud Matters in Industry 4.0
Why Cloud Matters in Industry 4.0
 
Ethics in the use of Data & AI
Ethics in the use of Data & AI Ethics in the use of Data & AI
Ethics in the use of Data & AI
 
Digitalization and Innovation - Today and Tomorrow
Digitalization and Innovation - Today and TomorrowDigitalization and Innovation - Today and Tomorrow
Digitalization and Innovation - Today and Tomorrow
 
The Role of Artificial Intelligence in Manufacturing : 15 High Impacted AI Us...
The Role of Artificial Intelligence in Manufacturing : 15 High Impacted AI Us...The Role of Artificial Intelligence in Manufacturing : 15 High Impacted AI Us...
The Role of Artificial Intelligence in Manufacturing : 15 High Impacted AI Us...
 
The Ethics of AI
The Ethics of AIThe Ethics of AI
The Ethics of AI
 
Data and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneData and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs One
 
Living in the IT Era L1.pptx
Living in the IT Era L1.pptxLiving in the IT Era L1.pptx
Living in the IT Era L1.pptx
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 
The Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance CapitalismThe Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance Capitalism
 
Digital Transformation and IOT
Digital Transformation and IOTDigital Transformation and IOT
Digital Transformation and IOT
 

Similaire à Data & Digital Ethics: some thoughts

Data & Digital Ethics - CDAO Conference Sydney 2018
Data & Digital Ethics - CDAO Conference Sydney 2018Data & Digital Ethics - CDAO Conference Sydney 2018
Data & Digital Ethics - CDAO Conference Sydney 2018Kate Carruthers
 
Data at the centre of a complex world
Data at the centre of a complex world Data at the centre of a complex world
Data at the centre of a complex world Kate Carruthers
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxPallawiBulakh1
 
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Ansgar Koene
 
Best Practices for Sharing Economics Data
Best Practices for Sharing Economics DataBest Practices for Sharing Economics Data
Best Practices for Sharing Economics DataMicah Altman
 
Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61Liming Zhu
 
Dr Masood Ahmed and Alan Davies - ECO 17: Transforming care through digital h...
Dr Masood Ahmed and Alan Davies - ECO 17: Transforming care through digital h...Dr Masood Ahmed and Alan Davies - ECO 17: Transforming care through digital h...
Dr Masood Ahmed and Alan Davies - ECO 17: Transforming care through digital h...Innovation Agency
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAnsgar Koene
 
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...ijtsrd
 
Ethics my own effort
Ethics my own effortEthics my own effort
Ethics my own effortHina Honey
 
Data; Data manipulation, sorting, grouping, rearranging. Plotting the data. D...
Data; Data manipulation, sorting, grouping, rearranging. Plotting the data. D...Data; Data manipulation, sorting, grouping, rearranging. Plotting the data. D...
Data; Data manipulation, sorting, grouping, rearranging. Plotting the data. D...jybufgofasfbkpoovh
 
Shaping Ethics in the Digital Age - Connected and Open Research Ethics (CORE)
Shaping Ethics in the Digital Age - Connected and Open Research Ethics (CORE)Shaping Ethics in the Digital Age - Connected and Open Research Ethics (CORE)
Shaping Ethics in the Digital Age - Connected and Open Research Ethics (CORE)Gayle Simon
 
Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsEthics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsMichael Zimmer
 
Ethical Priniciples for the All Data Revolution
Ethical Priniciples for the All Data RevolutionEthical Priniciples for the All Data Revolution
Ethical Priniciples for the All Data RevolutionMelissa Moody
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Glenn Villanueva
 
Research methods - ethics
Research methods - ethicsResearch methods - ethics
Research methods - ethicsTracy Harwood
 
Ethics of Analytics and Machine Learning
Ethics of Analytics and Machine LearningEthics of Analytics and Machine Learning
Ethics of Analytics and Machine LearningMark Underwood
 
strata_ny_2016_version_final_no_animation
strata_ny_2016_version_final_no_animationstrata_ny_2016_version_final_no_animation
strata_ny_2016_version_final_no_animationTaposh Dutta Roy
 

Similaire à Data & Digital Ethics: some thoughts (20)

Data & Digital Ethics - CDAO Conference Sydney 2018
Data & Digital Ethics - CDAO Conference Sydney 2018Data & Digital Ethics - CDAO Conference Sydney 2018
Data & Digital Ethics - CDAO Conference Sydney 2018
 
Data at the centre of a complex world
Data at the centre of a complex world Data at the centre of a complex world
Data at the centre of a complex world
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptx
 
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
 
Best Practices for Sharing Economics Data
Best Practices for Sharing Economics DataBest Practices for Sharing Economics Data
Best Practices for Sharing Economics Data
 
Data ethics
Data ethicsData ethics
Data ethics
 
Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61
 
Dr Masood Ahmed and Alan Davies - ECO 17: Transforming care through digital h...
Dr Masood Ahmed and Alan Davies - ECO 17: Transforming care through digital h...Dr Masood Ahmed and Alan Davies - ECO 17: Transforming care through digital h...
Dr Masood Ahmed and Alan Davies - ECO 17: Transforming care through digital h...
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry Standards
 
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
 
Ethics my own effort
Ethics my own effortEthics my own effort
Ethics my own effort
 
Data; Data manipulation, sorting, grouping, rearranging. Plotting the data. D...
Data; Data manipulation, sorting, grouping, rearranging. Plotting the data. D...Data; Data manipulation, sorting, grouping, rearranging. Plotting the data. D...
Data; Data manipulation, sorting, grouping, rearranging. Plotting the data. D...
 
Shaping Ethics in the Digital Age - Connected and Open Research Ethics (CORE)
Shaping Ethics in the Digital Age - Connected and Open Research Ethics (CORE)Shaping Ethics in the Digital Age - Connected and Open Research Ethics (CORE)
Shaping Ethics in the Digital Age - Connected and Open Research Ethics (CORE)
 
Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsEthics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
 
From byte to mind
From byte to mindFrom byte to mind
From byte to mind
 
Ethical Priniciples for the All Data Revolution
Ethical Priniciples for the All Data RevolutionEthical Priniciples for the All Data Revolution
Ethical Priniciples for the All Data Revolution
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
 
Research methods - ethics
Research methods - ethicsResearch methods - ethics
Research methods - ethics
 
Ethics of Analytics and Machine Learning
Ethics of Analytics and Machine LearningEthics of Analytics and Machine Learning
Ethics of Analytics and Machine Learning
 
strata_ny_2016_version_final_no_animation
strata_ny_2016_version_final_no_animationstrata_ny_2016_version_final_no_animation
strata_ny_2016_version_final_no_animation
 

Plus de Kate Carruthers

Data Protection for Higher Education
Data Protection for Higher EducationData Protection for Higher Education
Data Protection for Higher EducationKate Carruthers
 
Modelling Higher Education's digital future
Modelling Higher Education's digital future Modelling Higher Education's digital future
Modelling Higher Education's digital future Kate Carruthers
 
Starting data governance
Starting data governance Starting data governance
Starting data governance Kate Carruthers
 
Data governance – an essential foundation to good cyber security practice
Data governance – an essential foundation to good cyber security practiceData governance – an essential foundation to good cyber security practice
Data governance – an essential foundation to good cyber security practiceKate Carruthers
 
Info Sec, AI, and Ethics
Info Sec, AI, and EthicsInfo Sec, AI, and Ethics
Info Sec, AI, and EthicsKate Carruthers
 
Internet of Things and Governance
Internet of Things and GovernanceInternet of Things and Governance
Internet of Things and GovernanceKate Carruthers
 
Digital Marketing and your startup
Digital Marketing and your startupDigital Marketing and your startup
Digital Marketing and your startupKate Carruthers
 
Data Governance - a work in progress
Data Governance - a work in progressData Governance - a work in progress
Data Governance - a work in progressKate Carruthers
 
Future proof your career
Future proof your career  Future proof your career
Future proof your career Kate Carruthers
 
Implementing Data Governance & ISMS in a University
Implementing Data Governance & ISMS in a UniversityImplementing Data Governance & ISMS in a University
Implementing Data Governance & ISMS in a UniversityKate Carruthers
 
Taking disruption for granted
Taking disruption for grantedTaking disruption for granted
Taking disruption for grantedKate Carruthers
 
The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...Kate Carruthers
 
Social media: balancing risk and control
Social media: balancing risk and controlSocial media: balancing risk and control
Social media: balancing risk and controlKate Carruthers
 
Building the sharing economy
Building the sharing economy Building the sharing economy
Building the sharing economy Kate Carruthers
 
Hardware is Hard - Products are Hard Melbourne 2013
Hardware is Hard - Products are Hard Melbourne 2013Hardware is Hard - Products are Hard Melbourne 2013
Hardware is Hard - Products are Hard Melbourne 2013Kate Carruthers
 
Social and technology trends for banking
Social and technology trends for bankingSocial and technology trends for banking
Social and technology trends for bankingKate Carruthers
 
Internet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsInternet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsKate Carruthers
 
Your blog your brand - tips on getting started with your blog
Your blog your brand - tips on getting started with your blogYour blog your brand - tips on getting started with your blog
Your blog your brand - tips on getting started with your blogKate Carruthers
 
Social media for social good 2012
Social media for social good 2012Social media for social good 2012
Social media for social good 2012Kate Carruthers
 

Plus de Kate Carruthers (20)

Data Protection for Higher Education
Data Protection for Higher EducationData Protection for Higher Education
Data Protection for Higher Education
 
Modelling Higher Education's digital future
Modelling Higher Education's digital future Modelling Higher Education's digital future
Modelling Higher Education's digital future
 
Starting data governance
Starting data governance Starting data governance
Starting data governance
 
Data governance – an essential foundation to good cyber security practice
Data governance – an essential foundation to good cyber security practiceData governance – an essential foundation to good cyber security practice
Data governance – an essential foundation to good cyber security practice
 
Info Sec, AI, and Ethics
Info Sec, AI, and EthicsInfo Sec, AI, and Ethics
Info Sec, AI, and Ethics
 
Internet of Things and Governance
Internet of Things and GovernanceInternet of Things and Governance
Internet of Things and Governance
 
Digital Marketing and your startup
Digital Marketing and your startupDigital Marketing and your startup
Digital Marketing and your startup
 
Data Governance - a work in progress
Data Governance - a work in progressData Governance - a work in progress
Data Governance - a work in progress
 
Future proof your career
Future proof your career  Future proof your career
Future proof your career
 
Implementing Data Governance & ISMS in a University
Implementing Data Governance & ISMS in a UniversityImplementing Data Governance & ISMS in a University
Implementing Data Governance & ISMS in a University
 
Taking disruption for granted
Taking disruption for grantedTaking disruption for granted
Taking disruption for granted
 
The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...
 
Social media: balancing risk and control
Social media: balancing risk and controlSocial media: balancing risk and control
Social media: balancing risk and control
 
Building the sharing economy
Building the sharing economy Building the sharing economy
Building the sharing economy
 
Hardware is Hard - Products are Hard Melbourne 2013
Hardware is Hard - Products are Hard Melbourne 2013Hardware is Hard - Products are Hard Melbourne 2013
Hardware is Hard - Products are Hard Melbourne 2013
 
Social and technology trends for banking
Social and technology trends for bankingSocial and technology trends for banking
Social and technology trends for banking
 
Internet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsInternet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business Models
 
Crowdfunding
CrowdfundingCrowdfunding
Crowdfunding
 
Your blog your brand - tips on getting started with your blog
Your blog your brand - tips on getting started with your blogYour blog your brand - tips on getting started with your blog
Your blog your brand - tips on getting started with your blog
 
Social media for social good 2012
Social media for social good 2012Social media for social good 2012
Social media for social good 2012
 

Dernier

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Dernier (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Data & Digital Ethics: some thoughts

  • 1. Data & Digital Ethics: some thoughts Kate Carruthers Version 1.0 August 2017 Classification: PUBLIC
  • 2. Ethics Moral principles that govern a person's behaviour or the way in which they conduct an activity… August 17 Kate Carruthers | UNSW 1 “We ask ethical questions whenever we think about how we should act. Being ethical is a part of what defines us as human beings.” The Ethics Centre, Sydney
  • 3. August 17 Kate Carruthers | UNSW 2
  • 4. Digital Ethics? “A few guidelines are useful in most situations: • Use the golden rule: ask yourself how you would like to be treated as a human being, citizen or customer. • There are always unintended consequences: embrace new positive uses of technology, and block undesirable uses. • Success usually comes from exercising discipline and self-restraint in using technology, rather than pushing the limits.” August 17 Kate Carruthers | UNSW 3 Goasduff, C. L. (2016, March 07). Kick-Start the Conversation on Digital Ethics. Retrieved August 15, 2017, from http://www.gartner.com/smarterwithgartner/kick-start-the-conversation-on-digital-ethics/
  • 5. Areas of focus • Ethics of data - how we generate, record & share data • Ethics of algorithms - how we interpret data via artificial intelligence, machine learning and robots • Ethics of practices - devising responsible innovation and professional codes to guide this emerging science August 17 Kate Carruthers | UNSW 4 What is data ethics? Luciano Floridi, Mariarosaria Taddeo Phil. Trans. R. Soc. A 2016 374 20160360; DOI: 10.1098/rsta.2016.0360. Published 14 November 2016
  • 6. 5 Propositions about data 1.Data is not neutral 2.There is no such thing as raw data 3.The signal to noise ratio has changed 4.Data is not inherently smart 5.The more data we have the less anonymity August 17 Kate Carruthers | UNSW 5
  • 7. 3 things August 17 Kate Carruthers | UNSW 6 Privacy Data Gov Info Sec
  • 8. Some food for thought August 17 7Kate Carruthers | UNSW
  • 9. August 17 Kate Carruthers | UNSW 8 http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches- hacks/
  • 10. August 17 Kate Carruthers | UNSW 9 This Photo by Unknown Author is licensed under CC BY-NC-SA
  • 11. Facebook study “We show, via a massive (N = 689,003) experiment on Facebook, that emotional states can be transferred to others via emotional contagion, leading people to experience the same emotions without their awareness. We provide experimental evidence that emotional contagion occurs without direct interaction between people (exposure to a friend expressing an emotion is sufficient), and in the complete absence of nonverbal cues.” August 17 Kate Carruthers | UNSW 10 Kramer, A. D., Guillory, J. E., & Hancock, J. T. (2014). Experimental evidence of massive-scale emotional contagion through social networks. Proceedings of the National Academy of Sciences, 111(24), 8788-8790.
  • 12. August 17 Kate Carruthers | UNSW 11 http://thehackernews.com/2017/07/sweden-data-breach.html
  • 13. August 17 Kate Carruthers | UNSW 12
  • 14. August 17 Kate Carruthers | UNSW 13 https://www.youtube.com/watch?v=WHynGQ9Vg30
  • 15. August 17 Kate Carruthers | UNSW 14
  • 16. August 17 Kate Carruthers | UNSW 15
  • 17. Some traditional approaches August 17 16Kate Carruthers | UNSW
  • 18. 1. Minimize attack surface area 2. Establish secure defaults 3. Principle of Least privilege 4. Principle of Defence in depth 5. Fail securely 6. Don’t trust services 7. Separation of duties 8. Avoid security by obscurity 9. Keep security simple 10. Fix security issues correctly OWASP Security by Design Principles August 17 Kate Carruthers | UNSW 17 Open Web Application Security Project https://www.owasp.org/index.php/Security_by_Design_Principles
  • 19. IEEE CS/ACM Code of Ethics & Professional Practice Software engineers shall commit themselves to making the analysis, specification, design, development, testing and maintenance of software a beneficial and respected profession. In accordance with their commitment to the health, safety and welfare of the public, software engineers shall adhere to the following Eight Principles: 1. Public: Software engineers shall act consistently with the public interest. 2. Client and Employer: Software engineers shall act in a manner that is in the best interests of their client and employer, consistent with the public interest. 3. Product: Software engineers shall ensure that their products and related modifications meet the highest professional standards possible. 4. Judgement: Software engineers shall maintain integrity and independence in their professional judgment. 5. Management: Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintenance. 6. Profession: Software engineers shall advance the integrity and reputation of the profession consistent with the public interest. 7. Colleagues: Software engineers shall be fair to and supportive of their colleagues. 8. Self: Software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical approach to the practice of the profession. August 17 Kate Carruthers | UNSW 18 https://www.computer.org/web/education/code-of-ethics
  • 20. ACM Code of Ethics August 17 Kate Carruthers | UNSW 19 As an ACM member I will 1. Contribute to society and human well-being. 2. Avoid harm to others. 3. Be honest and trustworthy. 4. Be fair and take action not to discriminate. 5. Honor property rights including copyrights and patent. 6. Give proper credit for intellectual property. 7. Respect the privacy of others. 8. Honor confidentiality. From the ACM Code of Ethics
  • 21. Accenture: 12 guidelines for developing data ethics codes 1. The highest priority is to respect the persons behind the data. 2. Attend to the downstream uses of datasets. 3. Provenance of the data and analytical tools shapes the consequences of their use. 4. Strive to match privacy and security safeguards with privacy and security expectations. 5. Always follow the law, but understand that the law is often a minimum bar. 6. Be wary of collecting data just for the sake of more data. 7. Data can be a tool of inclusion and exclusion. August 17 Kate Carruthers | UNSW 20 https://www.accenture.com/t20160629T012639__w__/us-en/_acnmedia/PDF-24/Accenture-Universal-Principles-Data-Ethics.pdf
  • 22. Accenture: 12 guidelines for developing data ethics codes 8. As much as possible, explain methods for analysis and marketing to data disclosers. 9. Data scientists and practitioners should accurately represent their qualifications, limits to their expertise, adhere to professional standards, and strive for peer accountability. 10.Aspire to design practices that incorporate transparency, configurability, accountability, and auditability. 11.Products and research practices should be subject to internal, and potentially external ethical review. 12.Governance practices should be robust, known to all team members and reviewed regularly August 17 Kate Carruthers | UNSW 21 https://www.accenture.com/t20160629T012639__w__/us-en/_acnmedia/PDF-24/Accenture-Universal-Principles-Data-Ethics.pdf
  • 23. Some things to think about August 17 22Kate Carruthers | UNSW
  • 24. Privacy matters Privacy by Design 1. Proactive not Reactive; Preventative not Remedial 2. Privacy as the Default Setting 3. Privacy Embedded into Design 4. Full Functionality – Positive-Sum, not Zero-Sum 5. End-to-End Security – Full Lifecycle Protection 6. Visibility and Transparency – Keep it Open 7. Respect for User Privacy – Keep it User-Centric August 17 Kate Carruthers | UNSW 23 “Privacy is an inherent human right, and a requirement for maintaining the human condition with dignity and respect.” - Bruce Schneier
  • 25. August 17 Kate Carruthers | UNSW 24 Technology has no ethics. People demonstrate ethics.
  • 26. August 17 Kate Carruthers | UNSW 25 Technology inherits the biases of its makers
  • 27. August 17 Kate Carruthers | UNSW 26 Kent Aitken, Prime Ministers Fellow, Public Policy Forum Canada, 2017
  • 28. Some new approaches August 17 27Kate Carruthers | UNSW
  • 29. August 17 Kate Carruthers | UNSW 28 http://www.fatml.org/
  • 30. August 17 Kate Carruthers | UNSW 29 https://standards.ieee.org/develop/indconn/ec/autonomous_systems.html
  • 31. August 17 Kate Carruthers | UNSW 30
  • 32. August 17 Kate Carruthers | UNSW 31 Education
  • 33. August 17 Kate Carruthers | UNSW 32 More thought is needed!
  • 34. Resources Georgetown University, Kennedy Institute of Ethics, Ethics Lab Causeit Data Ethics The BIG Data Ethics Cheat Sheet, Hackermoon Digital Ethics Lab - Oxford Internet Institute - University of Oxford Guidelines on Ethical Research - British Sociological Association What is data ethics? Luciano Floridi, Mariarosaria Taddeo. Phil. Trans. R. Soc. A 2016 374 20160360; DOI: 10.1098/rsta.2016.0360. Published 14 November 2016 Digital Enlightenment Forum: Digital Ethics. Workshop Report. (2016, March 1). Retrieved August 16, 2017, from https://digitalenlightenment.org/sites/default/files/users/14/Digital%20Ethics%20Workshop%20Report%20v2.pdf A deep study on the concept of digital ethics. Maggiolini, Piercarlo. (2014).. Revista de Administração de Empresas, 54(5), 585-591. https://dx.doi.org/10.1590/S0034-759020140511 August 17 Kate Carruthers | UNSW 33