The Internet of Things: Foundational ethical issues
Tóm tắt
Từ khóa
Tài liệu tham khảo
AboBakr, 2017, IoT ethics challenges and legal issues
Agarwal, 2016, Toward building a safe, secure, and easy-to-use internet of things infrastructure, IEEE Comput., 49.4, 88, 10.1109/MC.2016.111
Allhoff, 2009, Risk, precaution, and emerging technologies, Stud. Ethic, Law Soc., 3.2, 1
Allhoff, 2013, Evans, and Adam Henschke
Allhoff, 2016
Allhoff, 2008
Allhoff, 2007
Allhoff, 2010
2002
2016
S. Banerjee, T. Hemphill, P. Longstreet, “Is IoT a Threat to Consumer Consent?” (unpublished, 2017).
Barnes, 1984, 2
Berman, 2017, Social behavior in the Internet of Things, Commun. Assoc. Comput. Mach., 60.2, 6
A. Bogle, “Strava has published details about secret military bases, and an australian was the first to know,” ABC News (2018, 30 January). Available at http://www.abc.net.au/news/science/2018-01-29/strava-heat-map-shows-military-bases-and-supply-routes/9369490.
Brey, 2012, Anticipatory ethics for emerging technologies, Nanoethics, 6.1, 1, 10.1007/s11569-012-0141-7
Business Wire, “Explosive internet of things spending to reach $1.7 Trillion in 2020, According to IDC” (June 2, 2015). Available at https://www.businesswire.com/news/home/20150602005329/en/Explosive-Internet-Things-Spending-Reach-1.7-Trillion.
Campaign to Stop Killer Robots, “Learn” (2018). Available at https://www.stopkillerrobots.org/learn/.
D. Canetti, M.L. Gross, I. Waismel-Manor, “Immune from cyberfire?: The psychological and physiological effects of cyberwarfare.” In Allhoff et al. (2016), pp. 157–76.
Carpenter v. United States, 585U.S. (2018).
Chapman, 2018
L.C. Charland, “Decision-making capacity,” The Stanford Encyclopedia of Philosophy (2015). Available at https://plato.stanford.edu/archives/fall2015/entries/decision-capacity.
N. Chokshi, “Is Alexa listening?: Amazon echo sent out recording of couple's conversation,” New York Times (May 25, 2018). Available at https://www.nytimes.com/2018/05/25/business/amazon-alexa-conversation-shared-echo.html.
J. DeCew, “Privacy,” Stanford Encyclopedia of Philosophy (2018). Available at https://plato.stanford.edu/entries/privacy/.
Department of Defense, “DoD News Briefing: Secretary Rusmfeld and Gen. Myers” (February 12, 2002).
Dreves, 2017, A generalized nash equilibrium approach for optimal control problems of autonomous cars, Optim. Control Appl. Methods, 39, 326, 10.1002/oca.2348
European Parliament and Council of the European Union, Regulation (EU) 2016/679 (General Data Protection Regulation) (2016).
Eysenbach, 2001, Ethical issues in qualitative research on internet communities, Br. Med. J., 323, 1103, 10.1136/bmj.323.7321.1103
Faden, 1986
M. Fisher, “Here's the e-mail trick Petreus and broadwell used to communicate,” Washington Post (November 12, 2012). Available at https://www.washingtonpost.com/news/worldviews/wp/2012/11/12/heres-the-e-mail-trick-petraeus-and-broadwell-used-to-communicate/?utm_term=.53d9e006c076.
Fletcher, 2015, Internet of Things, 19
L. Franceschi-Bicchierai, “Internet of things teddy bear leaked 2 million parent and kids message recordings,” Motherboard (February 27, 2017). Available at: https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings.
M. Garber, “Email location data led to the discovery of the Petraeus affair,” The Atlantic (November 12, 2012). Available at https://www.theatlantic.com/technology/archive/2012/11/email-location-data-led-to-the-discovery-of-the-petraeus-affair/265093/.
M. Goodman, “The Internet of Things will turn our machines against us,” Wired (January 15, 2016). Available at https://www.wired.co.uk/article/internet-of-hackable-things.
Griswold v. Connecticut, 381U.S. 479 (1965).
Haggard, 2015, North Korea and the sony hack: exporting instability through cyberspace, AsiaPacific Issues, 117, 1
Henschke, 2017
Henschke, 2017, The Internet of Things and dual layers of ethical concern, 229
K. Hill, “How target figured out a teen girl was pregnant before her father did,” Forbes (February 16, 2012). Available at https://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/#7f6e25046668.
K. Hill, S. Mattu, “The house that spied on me,” Gizmodo (February 7, 2018). Available at https://gizmodo.com/the-house-that-spied-on-me-1822429852.
J. Hiner, “New research: most Iot devices can be hacked into botnets,” TechRepublic (March 7, 2018). Available at https://www.techrepublic.com/article/new-research-most-iot-devices-can-be-hacked-into-botnets/.
Hillman, 2002, Standard-form contracting in the electronic age, N.Y.U. Law Rev., 77, 429
R. Jenkins, “Cyberwarfare as Ideal War” in Allhoff et al. (2016), pp. 89–114.
M. Kan, IoT botnet highlights the dangers of default passwords,” InfoWorld (October 4, 2016). Available at https://www.infoworld.com/article/3127167/password-security/iot-botnet-highlights-the-dangers-of-default-passwords.html.
Katz, 1994, Informed consent—must it remain a fairy tale, J. Contemp. Health Law Policy, 10.69, 69
N. Kobie, “The Internet of Things: convenience at a price,” The Guardian (March 30, 2015). Available at: https://www.theguardian.com/technology/2015/mar/30/internet-of-things-convenience-price-privacy-security .
D. Kravets, “Makes of internet of things-connected vibrator will settle privacy suit,” Ars Technica (December 8, 2016). Available at https://arstechnica.com/tech-policy/2016/12/maker-of-internet-of-things-connected-vibrator-will-settle-privacy-suit/.
M. Lazarescu, “Hacked by your fridge: the internet of things could spark s new wave of cyber attacks,” The Conversation (October 6, 2016). Available at https://theconversation.com/hacked-by-your-fridge-the-internet-of-things-could-spark-a-new-wave-of-cyber-attacks-66493.
A. Levy, “Cisco Wagers $1.4 billion on ‘Internet of Things,” CNBC (February 3, 2016). Available at https://www.cnbc.com/2016/02/03/cisco-wagers-14-billion-on-internet-of-things.html.
P. Lin, “Introduction to Robot Ethics” in Lin et al. (2012), pp. 3–16.
Lin, 2012
Lin, 2017
J. Locke, (Indianapolis, IN: Hackett Publishing, 1980).
G. Lucas, “Emerging norms for cyberwarfare,” in Allhoff et al. (2016), pp. 13–33.
Lucas, 2016
Macnish, 2012, Unblinking eyes: the ethics of automating surveillance, Ethics and Information Technology, 14, 151, 10.1007/s10676-012-9291-0
Macnish, 2017
Mak, 2014, An implementation of toy safety assessment model, 12
C. Matyszczyk, “Samsung's warning: our smart TVs record your living room chatter,” CNET (February 8, 2015). Available at https://www.cnet.com/news/samsungs-warning-our-smart-tvs-record-your-living-room-chatter/.
C. McLeod, “Trust,” Stanford Encyclopedia of Philosophy (2015). Available at https://plato.stanford.edu/entries/trust/.
Mill, 1978, On Liberty
J. Mohammed, “5 Predictions for the Internet of Things in 2016,” World Economic Forum (December 15, 2015). Available at https://www.weforum.org/agenda/2015/12/5-predictions-for-the-internet-of-things-in-2016/.
Moor, 1979, Are there decisions computers should never make?, Nat. Syst., 1, 217
National Telecommunications & Information Administration [NTIA], “Fostering the advancement of the Internet of Things” (January 2017). Available at https://www.ntia.doc.gov/files/ntia/publications/iot_green_paper_01122017.pdf.
Neisse, 2015, An agent-based framework for informed consent in the Internet of Things, 789
Nozick, 1974
Peppet, 2017, Regulating the Internet of Things: first steps toward managing discrimination, privacy, security, and consent, Texas Law Rev., 93, 85
Popescul, 2013, “Internet of Things: some ethical issues,”, USV Annal. Econ. Publ. Administr., 13, 208
Pretty v. United Kingdom, 2346/02 (2002).
ProCD, Inc. v. Zeidenberg, 86 F.3d 1447 (7th Cir. 1996).
M. Redden, “Tech company accused of collecting details of how customers use sex toys,” The Guardian (September 14, 2016). Available at https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit.
Reuters, “Uber settles with family of woman killed by self-driving car,” The Guardian (March 29, 2018). Available at https://www.theguardian.com/technology/2018/mar/29/uber-settles-with-family-of-woman-killed-by-self-driving-car.
Rhodes, 2016, “Democratic business ethics: Volkswagen's emissions scandal and the disruption of corporate sovereignty,”, Org. Stud., 37, 1501, 10.1177/0170840616641984
P. Roberts, “Pretty much all consumer internet of things vulnerabilities are avoidable,” The Security Ledger (September 13, 2016). Available at https://securityledger.com/2016/09/pretty-much-all-consumer-internet-of-things-vulnerabilities-are-avoidable/.
Robbins, 2017, Designing for democracy: bulk data and authoritarianism, Surveil. Soc., 15.3, 582, 10.24908/ss.v15i3/4.6606
Roe v. Wade, 410U.S. 113 (1973).
Rotaru v. Romania, 28341/95 (2000).
Rosen, 2012, The right to be forgotten, Stanford Law Rev., 64, 88
M. Schmidt, L. Vihul, “The emergence of international legal norms for cyber-conflict” in Allhoff et al. (2016), pp. 34–55.
A. Scroxton, “UK IoT research hub opens with support from academic world,” ComputerWeekly.com (January 6, 2016). Available at https://www.computerweekly.com/news/4500270034/UK-IoT-research-hub-opens-with-support-from-academic-world.
Sindell v. Abbott Laboratories, 607 P.2d 924 (Cal. 1980).
B. Smith, “Facial recognition technology: the need for public regulation and corporate responsibility,” Microsoft Issues (July 13, 2018). Available at https://blogs.microsoft.com/on-the-issues/2018/07/13/facial-recognition-technology-the-need-for-public-regulation-and-corporate-responsibility/.
Sparrow, 2016, Robots and respect: assessing the case against autonomous weapon systems, Ethics Int. Affairs, 30.1, 93, 10.1017/S0892679415000647
Stankovic, 2014, Research directions for the Internet of Things, IEEE Int. Things J., 1.1, 3, 10.1109/JIOT.2014.2312291
K. Steele, H. Orri Stefánsson, “Decision theory”, The Stanford Encyclopedia of Philosophy (2016). https://plato.stanford.edu/archives/win2016/entries/decision-theory/.
E. Stewart, “What the government could actually do about Facebook,” Vox (April 10, 2018). Available at https://www.vox.com/policy-and-politics/2018/4/10/17208322/facebook-mark-zuckerberg-congress-testimony-regulation.
Step-Saver Data Systems, Inc. v. Wyse Technology 939 F.2d 91 (3rd Cir. 1991).
T.S., “Why Uber's self-driving car killed a pedestrian,” The Economist (May 29, 2018). Available at https://www.economist.com/the-economist-explains/2018/05/29/why-ubers-self-driving-car-killed-a-pedestrian.
Twerski, 1974, Product liability: a study of the interaction of law and techonology, Duqesene Law Rev., 12.3, 425
H. Ungureanu, Massive dyn DDOS attack: experts blame smart fridges, dvrs, and other iot devices why your internet went down, Tech Times (October 24, 2016). Available at https://www.techtimes.com/articles/183339/20161024/massive-dyn-ddos-attack-experts-blame-smart-fridges-dvrs-and-other-iot-devices-why-your-internet-went-down.htm.
Urquhart, 2018, Avoiding the internet of insecure industrial things, Comput. Law Secur. Rev., 34.3, 450, 10.1016/j.clsr.2017.12.004
Uslaner, 2010
Vallentyne, 2014, “Libertarianism,”, Stanford Enclyclopedia of Philosophy
van de Poel, 2017, Safe-by-design: from safety to responsibility, NanoEthics, 11.3, 297, 10.1007/s11569-017-0301-x
Weber, 2013, Internet of Things—governance Quo Vadis, Comput. Law Secur. Rev., 29, 341, 10.1016/j.clsr.2013.05.010
Weber, 2015, Internet of Things: privacy issues revisited, Comput. Law Secur. Rev., 31, 618, 10.1016/j.clsr.2015.07.002
White, 2015, Internet of Hackable Things: wired world wide open to new age of cyber crime, Sydney Morning Herald