2,430 research outputs found
AI for the Common Good?! Pitfalls, challenges, and Ethics Pen-Testing
Recently, many AI researchers and practitioners have embarked on research
visions that involve doing AI for "Good". This is part of a general drive
towards infusing AI research and practice with ethical thinking. One frequent
theme in current ethical guidelines is the requirement that AI be good for all,
or: contribute to the Common Good. But what is the Common Good, and is it
enough to want to be good? Via four lead questions, I will illustrate
challenges and pitfalls when determining, from an AI point of view, what the
Common Good is and how it can be enhanced by AI. The questions are: What is the
problem / What is a problem?, Who defines the problem?, What is the role of
knowledge?, and What are important side effects and dynamics? The illustration
will use an example from the domain of "AI for Social Good", more specifically
"Data Science for Social Good". Even if the importance of these questions may
be known at an abstract level, they do not get asked sufficiently in practice,
as shown by an exploratory study of 99 contributions to recent conferences in
the field. Turning these challenges and pitfalls into a positive
recommendation, as a conclusion I will draw on another characteristic of
computer-science thinking and practice to make these impediments visible and
attenuate them: "attacks" as a method for improving design. This results in the
proposal of ethics pen-testing as a method for helping AI designs to better
contribute to the Common Good.Comment: to appear in Paladyn. Journal of Behavioral Robotics; accepted on
27-10-201
DEVELOPING AWARENESS OF COMPUTER ETHICS
The most important factor in effective computer security is people -- their attitudes, actions, and sense of right and wrong. This workshop will explore the ethical problems and issues raised in the computing environment. Topics to be discussed include misuse of computers, concepts of privacy, codes of conduct for computer professionals, disputed rights to products, defining ethical, moral, and legal parameters, and what security practitioners should do about ethics. Audience opinions will be wetcome as they will aid in developing ethical standards for the information systems profession
PRECEPT:a framework for ethical digital forensics investigations
Purpose: Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics has become far more sophisticated over the years and is now able to uncover even more evidence that can be used to support prosecution of cyber criminals in a court of law. Governments, too, have embraced the ability to track suspicious individuals in the online world. Forensics investigators are driven to gather data exhaustively, being under pressure to provide law enforcement with sufficient evidence to secure a conviction. Yet, there are concerns about the ethics and justice of untrammeled investigations on a number of levels. On an organizational level, unconstrained investigations could interfere with, and damage, the organizationâs right to control the disclosure of their intellectual capital. On an individual level, those being investigated could easily have their legal privacy rights violated by forensics investigations. On a societal level, there might be a sense of injustice at the perceived inequality of current practice in this domain. This paper argues the need for a practical, ethically-grounded approach to digital forensic investigations, one that acknowledges and respects the privacy rights of individuals and the intellectual capital disclosure rights of organisations, as well as acknowledging the needs of law enforcement. We derive a set of ethical guidelines, then map these onto a forensics investigation framework. We subjected the framework to expert review in two stages, refining the framework after each stage. We conclude by proposing the refined ethically-grounded digital forensics investigation framework. Our treatise is primarily UK based, but the concepts presented here have international relevance and applicability.Design methodology: In this paper, the lens of justice theory is used to explore the tension that exists between the needs of digital forensic investigations into cybercrimes on the one hand, and, on the other, individualsâ rights to privacy and organizationsâ rights to control intellectual capital disclosure.Findings: The investigation revealed a potential inequality between the practices of digital forensics investigators and the rights of other stakeholders. That being so, the need for a more ethically-informed approach to digital forensics investigations, as a remedy, is highlighted, and a framework proposed to provide this.Practical Implications: Our proposed ethically-informed framework for guiding digital forensics investigations suggest a way of re-establishing the equality of the stakeholders in this arena, and ensuring that the potential for a sense of injustice is reduced.Originality/value: Justice theory is used to highlight the difficulties in squaring the circle between the rights and expectations of all stakeholders in the digital forensics arena. The outcome is the forensics investigation guideline, PRECEpt: Privacy-Respecting EthiCal framEwork, which provides the basis for a re-aligning of the balance between the requirements and expectations of digital forensic investigators on the one hand, and individual and organizational expectations and rights, on the other
PRECEPT: A Framework for Ethical Digital Forensics Investigations.
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics has become far more sophisticated over the years and is now able to uncover even more evidence that can be used to support prosecution of cyber criminals in a court of law. Governments, too, have embraced the ability to track suspicious individuals in the online world. Forensics investigators are driven to gather data exhaustively, being under pressure to provide law enforcement with sufficient evidence to secure a conviction.
Yet, there are concerns about the ethics and justice of untrammeled investigations on a number of levels. On an organizational level, unconstrained investigations could interfere with, and damage, the organizationâs right to control the disclosure of their intellectual capital. On an individual level, those being investigated could easily have their legal privacy rights violated by forensics investigations. On a societal level, there might be a sense of injustice at the perceived inequality of current practice in this domain.
This paper argues the need for a practical, ethically-grounded approach to digital forensic investigations, one that acknowledges and respects the privacy rights of individuals and the intellectual capital disclosure rights of organisations, as well as acknowledging the needs of law enforcement. We derive a set of ethical guidelines, then map these onto a forensics investigation framework. We subjected the framework to expert review in two stages, refining the framework after each stage. We conclude by proposing the refined ethically-grounded digital forensics investigation framework. Our treatise is primarily UK based, but the concepts presented here have international relevance and applicability.
In this paper, the lens of justice theory is used to explore the tension that exists between the needs of digital forensic investigations into cybercrimes on the one hand, and, on the other, individualsâ rights to privacy and organizationsâ rights to control intellectual capital disclosure.
The investigation revealed a potential inequality between the practices of digital forensics investigators and the rights of other stakeholders. That being so, the need for a more ethically-informed approach to digital forensics investigations, as a remedy, is highlighted, and a framework proposed to provide this.
Our proposed ethically-informed framework for guiding digital forensics investigations suggest a way of re-establishing the equality of the stakeholders in this arena, and ensuring that the potential for a sense of injustice is reduced.
Justice theory is used to highlight the difficulties in squaring the circle between the rights and expectations of all stakeholders in the digital forensics arena. The outcome is the forensics investigation guideline, PRECEpt: Privacy-Respecting EthiCal framEwork, which provides the basis for a re-aligning of the balance between the requirements and expectations of digital forensic investigators on the one hand, and individual and organizational expectations and rights, on the other
Beneficial Artificial Intelligence Coordination by means of a Value Sensitive Design Approach
This paper argues that the Value Sensitive Design (VSD) methodology provides a principled approach to embedding common values in to AI systems both early and throughout the design process. To do so, it draws on an important case study: the evidence and final report of the UK Select Committee on Artificial Intelligence. This empirical investigation shows that the different and often disparate stakeholder groups that are implicated in AI design and use share some common values that can be used to further strengthen design coordination efforts. VSD is shown to be both able to distill these common values as well as provide a framework for stakeholder coordination
Recommended from our members
Questionnaires, in-depth interviews and focus groups
With fast changing technologies and related human interaction issues, there is an increased need for timely evaluation of systems with distributed users in varying contexts (Pace, 2004). This has led to the increased use of questionnaires, in-depth interviews and focus groups in commercial usability and academic research contexts. Questionnaires are usually paper based or delivered online and consist of a set of questions which all participants are asked to complete. Once the questionnaire has been created, it can be delivered to a large number of participants with little effort. However, a large number of participants also means a large amount of data needing to be coded and analysed. Interviews, on the other hand, are usually conducted on a one-to-one basis. They require a large amount of the investigatorâs time during the interviews and also for transcribing and coding the data. Focus groups usually consist of one investigator and a number of participants in any one session. Although the views of any one participant cannot be probed to same degree as in an interview, the discussions that are facilitated within the groups often result in useful data in a shorter space of time than that required by one-to-one interviews.
All too often, however, researchers eager to identify usability problems quickly throw together a questionnaire, interview or focus group that, when analysed, produces very little of interest. What is often lacking is an understanding of how the research method design fits with the research questions (Creswell, 2003) and how to appropriately utilise these different approaches for specific HCI needs. The methods described in this chapter can be useful when used alone but are most useful when used together with other methods. Creswell (2003) provides a comprehensive analysis of the different quantitative and qualitative methods and howthey can be mixed and matched for overall better quality research. Depending on what we are investigating, sometimes it is useful to start with a questionnaire and then, for example, follow up some specific points with an experiment, or a series of interviews, in order to fully explore some aspect of the phenomenon under study.
This chapter describes how to choose between and design questionnaires, interviews and focus group studies and using two examples illustrates the advantages of combining a number of approaches when conducting HCI research
Comparative Philosophies in Intercultural Information Ethics
The following review explores Intercultural Information Ethics in terms of comparative philosophy, supporting IIE as the most relevant and significant development of the field of Information Ethics. The focus of the review is threefold. First, it will review the core presumption of the field of IIE, that being the demand for an intermission in the pursuit of a founding philosophy for IE in order to first address the philosophical biases of IE by western philosophy. Second, a history of the various philosophical streams of IIE will be outlined, including its literature and pioneering contributors. Lastly, a new synthesis of comparative philosophies in IIE will be offered, looking towards a future evolution of the field. Examining the interchange between contemporary information ethicists regarding the discipline of IIE, the review first outlines the previously established presumptions of the field of IIE that posit the need for an IE as grounded in western sensibilities. The author then addresses the implications of the foregoing presumption from several non-western viewpoints, arguing that IIE does in fact find roots in non-western philosophies as established in the concluding synthesis of western and eastern philosophical traditions
Recommended from our members
The gift of the code: A culture of an operating system
âThe Gift of the Codeâ explores the boundaries between technology and sociality, computers and cultures. Based on long-term ethnographic research among users and developers of GNU/Linux Operating System, this work analyses how Linux developers and users consume, create and exchange an as much technical as cultural discursive construction of sociality. Like a modern-day kula ring, the Linux code is analysed in terms of a gift: one cannot keep it for oneâs self, it contains obligations and a promise of future reciprocity. It is a collective gift of the self-ascribed Hackers that come from different geographic places and meet in lines of code, socializing by exchanging ideas about the code and about themselves. This work shows by what means the computer hackers of Linux, abiding to the original definition of the word, actively constitute their community using discourse: language, e-mail, internal meritocratic hierarchies based on technical ability and ethics of the group, boundaries of exclusion and inclusion. This project is about power relations, resistance networks and the hegemony of a techno-scientific self-indulgence of some post-residents of an imagined cyber-West. Equally, it is about the giving of gifts, hacker culture and the âfunâ of hacking, creating and maintaining a âguerrillaâ operating system. Studying the anthropology of GNU/Linux operating system is a journey towards an investigation of what makes the social into technology and how technology is translated into sociality
Hackers: a case-study of the social shaping of computing
The study is an examination of hacking, placing the act in the
context of theories of technological change. The account of hacking is
used to substantiate those theories that emphasise the societal
shaping of technology over the notion of technological determinism.
The evolution of hacking is traced, showing how it reflects changing
trends in the nature of information: the most vivid of these is the
conceptualisation of information known as 'cyberspace'. Instead of
simply cataloguing the impact of technical changes within computing,
and the effects they have had upon information, the study shows
how technical change takes place in a process of negotiation and
conflict between groups.The two main groups analysed are those of the Computer
Underground (CU) and the Computer Security Industry (CSI). The
experiences and views of both groups are recounted in what
constitute internalist and externalist accounts of hacking and its
significance. The internalist account is the evidence provided by
hackers themselves. It addresses such issues as what motivates the
act of hacking; whether there is an identifiable hacking culture; and
why it is almost an exclusively male activity. The externalist account
contains the perceptions of hacking held by those outside the
activity.The state of computing's security measures and its
vulnerability to hacking is described, and evidence is provided of the
extent to which hacking gives rise to technical knowledge that could
be of potential use in the fixing of security weaknesses. The division
within the CSI between those broadly cooperative with hackers and
those largely hostile to them is examined, and the reasons why
hacking knowledge is not generally utilised are explored. Hackers
are prevented from gaining legitimacy within computing in a process
referred to as 'closure'. Examples include hackers being stigmatised
through the use of analogies that compare their computing activities
to conventional crimes such as burglary and tresspass.Stigmatisation is carried out by the CSI who use it in a process of
professional boundary formation to distinguish themselves from
hackers. It is also used by other authority figures such as Members
of Parliament whose involvement in the process of closure takes the
form of the anti-hacking legislation they have passed, an analysis of
which concludes this study
Recommended from our members
The Language of the cybersouls
Debates about technology are mostly staged in a grand setting: presented as the sinister toolkit of authoritarian organisations, or as the progressive fabric of the future. Yet everyone is involved in technology as part of every microscopic action in every humdrum life. How do theories about technology cope with this political spectrum? One option is to treat technology as we treat language and specifically use Wittgensteinâs language games as an analogy. So that technology, like language, becomes inseparable from us and an intimate part of us, and this merging of technology and the human transforms us all into cyborgs
- âŠ