The Internet of Things: Foundational ethical issues

Internet of Things - Tập 1-2 - Trang 55-66 - 2018
Fritz Allhoff1, Adam Henschke2,3
1Department of Philosophy, Western Michigan University, United States
2Faculty of Technology, Policy, and Management, Delft University of Technology, the Netherlands
3National Security College, Australian National University, Australia

Tóm tắt

Từ khóa


Tài liệu tham khảo

AboBakr, 2017, IoT ethics challenges and legal issues

Agarwal, 2016, Toward building a safe, secure, and easy-to-use internet of things infrastructure, IEEE Comput., 49.4, 88, 10.1109/MC.2016.111

Allhoff, 2009, Risk, precaution, and emerging technologies, Stud. Ethic, Law Soc., 3.2, 1

Allhoff, 2013, Evans, and Adam Henschke

Allhoff, 2016

Allhoff, 2008

Allhoff, 2007

Allhoff, 2010

2002

2016

S. Banerjee, T. Hemphill, P. Longstreet, “Is IoT a Threat to Consumer Consent?” (unpublished, 2017).

Barnes, 1984, 2

Berman, 2017, Social behavior in the Internet of Things, Commun. Assoc. Comput. Mach., 60.2, 6

A. Bogle, “Strava has published details about secret military bases, and an australian was the first to know,” ABC News (2018, 30 January). Available at http://www.abc.net.au/news/science/2018-01-29/strava-heat-map-shows-military-bases-and-supply-routes/9369490.

Brey, 2012, Anticipatory ethics for emerging technologies, Nanoethics, 6.1, 1, 10.1007/s11569-012-0141-7

Business Wire, “Explosive internet of things spending to reach $1.7 Trillion in 2020, According to IDC” (June 2, 2015). Available at https://www.businesswire.com/news/home/20150602005329/en/Explosive-Internet-Things-Spending-Reach-1.7-Trillion.

Campaign to Stop Killer Robots, “Learn” (2018). Available at https://www.stopkillerrobots.org/learn/.

D. Canetti, M.L. Gross, I. Waismel-Manor, “Immune from cyberfire?: The psychological and physiological effects of cyberwarfare.” In Allhoff et al. (2016), pp. 157–76.

Carpenter v. United States, 585U.S. (2018).

Chapman, 2018

L.C. Charland, “Decision-making capacity,” The Stanford Encyclopedia of Philosophy (2015). Available at https://plato.stanford.edu/archives/fall2015/entries/decision-capacity.

N. Chokshi, “Is Alexa listening?: Amazon echo sent out recording of couple's conversation,” New York Times (May 25, 2018). Available at https://www.nytimes.com/2018/05/25/business/amazon-alexa-conversation-shared-echo.html.

J. DeCew, “Privacy,” Stanford Encyclopedia of Philosophy (2018). Available at https://plato.stanford.edu/entries/privacy/.

Department of Defense, “DoD News Briefing: Secretary Rusmfeld and Gen. Myers” (February 12, 2002).

Dreves, 2017, A generalized nash equilibrium approach for optimal control problems of autonomous cars, Optim. Control Appl. Methods, 39, 326, 10.1002/oca.2348

European Parliament and Council of the European Union, Regulation (EU) 2016/679 (General Data Protection Regulation) (2016).

Eysenbach, 2001, Ethical issues in qualitative research on internet communities, Br. Med. J., 323, 1103, 10.1136/bmj.323.7321.1103

Faden, 1986

M. Fisher, “Here's the e-mail trick Petreus and broadwell used to communicate,” Washington Post (November 12, 2012). Available at https://www.washingtonpost.com/news/worldviews/wp/2012/11/12/heres-the-e-mail-trick-petraeus-and-broadwell-used-to-communicate/?utm_term=.53d9e006c076.

Fletcher, 2015, Internet of Things, 19

L. Franceschi-Bicchierai, “Internet of things teddy bear leaked 2 million parent and kids message recordings,” Motherboard (February 27, 2017). Available at: https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings.

M. Garber, “Email location data led to the discovery of the Petraeus affair,” The Atlantic (November 12, 2012). Available at https://www.theatlantic.com/technology/archive/2012/11/email-location-data-led-to-the-discovery-of-the-petraeus-affair/265093/.

M. Goodman, “The Internet of Things will turn our machines against us,” Wired (January 15, 2016). Available at https://www.wired.co.uk/article/internet-of-hackable-things.

Google v. Costeja, C-131/12 (2014).

Griswold v. Connecticut, 381U.S. 479 (1965).

Haggard, 2015, North Korea and the sony hack: exporting instability through cyberspace, AsiaPacific Issues, 117, 1

Henschke, 2017

Henschke, 2017, The Internet of Things and dual layers of ethical concern, 229

K. Hill, “How target figured out a teen girl was pregnant before her father did,” Forbes (February 16, 2012). Available at https://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/#7f6e25046668.

K. Hill, S. Mattu, “The house that spied on me,” Gizmodo (February 7, 2018). Available at https://gizmodo.com/the-house-that-spied-on-me-1822429852.

J. Hiner, “New research: most Iot devices can be hacked into botnets,” TechRepublic (March 7, 2018). Available at https://www.techrepublic.com/article/new-research-most-iot-devices-can-be-hacked-into-botnets/.

Hillman, 2002, Standard-form contracting in the electronic age, N.Y.U. Law Rev., 77, 429

R. Jenkins, “Cyberwarfare as Ideal War” in Allhoff et al. (2016), pp. 89–114.

Jones, 1996, “Trust as an Affective Attitude,”, Ethics, 107, 4, 10.1086/233694

M. Kan, IoT botnet highlights the dangers of default passwords,” InfoWorld (October 4, 2016). Available at https://www.infoworld.com/article/3127167/password-security/iot-botnet-highlights-the-dangers-of-default-passwords.html.

Katz, 1994, Informed consent—must it remain a fairy tale, J. Contemp. Health Law Policy, 10.69, 69

N. Kobie, “The Internet of Things: convenience at a price,” The Guardian (March 30, 2015). Available at: https://www.theguardian.com/technology/2015/mar/30/internet-of-things-convenience-price-privacy-security .

D. Kravets, “Makes of internet of things-connected vibrator will settle privacy suit,” Ars Technica (December 8, 2016). Available at https://arstechnica.com/tech-policy/2016/12/maker-of-internet-of-things-connected-vibrator-will-settle-privacy-suit/.

M. Lazarescu, “Hacked by your fridge: the internet of things could spark s new wave of cyber attacks,” The Conversation (October 6, 2016). Available at https://theconversation.com/hacked-by-your-fridge-the-internet-of-things-could-spark-a-new-wave-of-cyber-attacks-66493.

A. Levy, “Cisco Wagers $1.4 billion on ‘Internet of Things,” CNBC (February 3, 2016). Available at https://www.cnbc.com/2016/02/03/cisco-wagers-14-billion-on-internet-of-things.html.

Li, 2015, The Internet of Things: a survey, Inf. Syst. Front., 17, 243, 10.1007/s10796-014-9492-7

P. Lin, “Introduction to Robot Ethics” in Lin et al. (2012), pp. 3–16.

Lin, 2012

Lin, 2017

J. Locke, (Indianapolis, IN: Hackett Publishing, 1980).

G. Lucas, “Emerging norms for cyberwarfare,” in Allhoff et al. (2016), pp. 13–33.

Lucas, 2016

Macnish, 2012, Unblinking eyes: the ethics of automating surveillance, Ethics and Information Technology, 14, 151, 10.1007/s10676-012-9291-0

Macnish, 2017

Mak, 2014, An implementation of toy safety assessment model, 12

C. Matyszczyk, “Samsung's warning: our smart TVs record your living room chatter,” CNET (February 8, 2015). Available at https://www.cnet.com/news/samsungs-warning-our-smart-tvs-record-your-living-room-chatter/.

C. McLeod, “Trust,” Stanford Encyclopedia of Philosophy (2015). Available at https://plato.stanford.edu/entries/trust/.

Mill, 1978, On Liberty

J. Mohammed, “5 Predictions for the Internet of Things in 2016,” World Economic Forum (December 15, 2015). Available at https://www.weforum.org/agenda/2015/12/5-predictions-for-the-internet-of-things-in-2016/.

Moor, 1979, Are there decisions computers should never make?, Nat. Syst., 1, 217

Moore, 2008, Defining privacy, J. Soc. Philos., 39, 411, 10.1111/j.1467-9833.2008.00433.x

National Telecommunications & Information Administration [NTIA], “Fostering the advancement of the Internet of Things” (January 2017). Available at https://www.ntia.doc.gov/files/ntia/publications/iot_green_paper_01122017.pdf.

Neisse, 2015, An agent-based framework for informed consent in the Internet of Things, 789

Nozick, 1974

Peppet, 2017, Regulating the Internet of Things: first steps toward managing discrimination, privacy, security, and consent, Texas Law Rev., 93, 85

Popescul, 2013, “Internet of Things: some ethical issues,”, USV Annal. Econ. Publ. Administr., 13, 208

Pretty v. United Kingdom, 2346/02 (2002).

ProCD, Inc. v. Zeidenberg, 86 F.3d 1447 (7th Cir. 1996).

Prosser, 1953, Comparative negligence, Michig. Law Rev., 51, 465, 10.2307/1285070

M. Redden, “Tech company accused of collecting details of how customers use sex toys,” The Guardian (September 14, 2016). Available at https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit.

Reuters, “Uber settles with family of woman killed by self-driving car,” The Guardian (March 29, 2018). Available at https://www.theguardian.com/technology/2018/mar/29/uber-settles-with-family-of-woman-killed-by-self-driving-car.

Rhodes, 2016, “Democratic business ethics: Volkswagen's emissions scandal and the disruption of corporate sovereignty,”, Org. Stud., 37, 1501, 10.1177/0170840616641984

P. Roberts, “Pretty much all consumer internet of things vulnerabilities are avoidable,” The Security Ledger (September 13, 2016). Available at https://securityledger.com/2016/09/pretty-much-all-consumer-internet-of-things-vulnerabilities-are-avoidable/.

Robbins, 2017, Designing for democracy: bulk data and authoritarianism, Surveil. Soc., 15.3, 582, 10.24908/ss.v15i3/4.6606

Roe v. Wade, 410U.S. 113 (1973).

Rotaru v. Romania, 28341/95 (2000).

Rosen, 2012, The right to be forgotten, Stanford Law Rev., 64, 88

Roy, 1999, ‘Polis’ and ‘Oikos’ in classical athens, Greece Rome, 46, 1, 10.1017/S0017383500026036

M. Schmidt, L. Vihul, “The emergence of international legal norms for cyber-conflict” in Allhoff et al. (2016), pp. 34–55.

A. Scroxton, “UK IoT research hub opens with support from academic world,” ComputerWeekly.com (January 6, 2016). Available at https://www.computerweekly.com/news/4500270034/UK-IoT-research-hub-opens-with-support-from-academic-world.

Simpson, 2012, What is trust?, Pacif. Philosop. Q., 93, 550, 10.1111/j.1468-0114.2012.01438.x

Sindell v. Abbott Laboratories, 607 P.2d 924 (Cal. 1980).

B. Smith, “Facial recognition technology: the need for public regulation and corporate responsibility,” Microsoft Issues (July 13, 2018). Available at https://blogs.microsoft.com/on-the-issues/2018/07/13/facial-recognition-technology-the-need-for-public-regulation-and-corporate-responsibility/.

Sparrow, 2016, Robots and respect: assessing the case against autonomous weapon systems, Ethics Int. Affairs, 30.1, 93, 10.1017/S0892679415000647

Stankovic, 2014, Research directions for the Internet of Things, IEEE Int. Things J., 1.1, 3, 10.1109/JIOT.2014.2312291

K. Steele, H. Orri Stefánsson, “Decision theory”, The Stanford Encyclopedia of Philosophy (2016). https://plato.stanford.edu/archives/win2016/entries/decision-theory/.

E. Stewart, “What the government could actually do about Facebook,” Vox (April 10, 2018). Available at https://www.vox.com/policy-and-politics/2018/4/10/17208322/facebook-mark-zuckerberg-congress-testimony-regulation.

Step-Saver Data Systems, Inc. v. Wyse Technology 939 F.2d 91 (3rd Cir. 1991).

Summers v. Tice, 199 P.2d 1 (Cal. 1947).

T.S., “Why Uber's self-driving car killed a pedestrian,” The Economist (May 29, 2018). Available at https://www.economist.com/the-economist-explains/2018/05/29/why-ubers-self-driving-car-killed-a-pedestrian.

Twerski, 1974, Product liability: a study of the interaction of law and techonology, Duqesene Law Rev., 12.3, 425

H. Ungureanu, Massive dyn DDOS attack: experts blame smart fridges, dvrs, and other iot devices why your internet went down, Tech Times (October 24, 2016). Available at https://www.techtimes.com/articles/183339/20161024/massive-dyn-ddos-attack-experts-blame-smart-fridges-dvrs-and-other-iot-devices-why-your-internet-went-down.htm.

Urquhart, 2018, Avoiding the internet of insecure industrial things, Comput. Law Secur. Rev., 34.3, 450, 10.1016/j.clsr.2017.12.004

Uslaner, 2010

Vallentyne, 2014, “Libertarianism,”, Stanford Enclyclopedia of Philosophy

van de Poel, 2017, Safe-by-design: from safety to responsibility, NanoEthics, 11.3, 297, 10.1007/s11569-017-0301-x

Weber, 2013, Internet of Things—governance Quo Vadis, Comput. Law Secur. Rev., 29, 341, 10.1016/j.clsr.2013.05.010

Weber, 2015, Internet of Things: privacy issues revisited, Comput. Law Secur. Rev., 31, 618, 10.1016/j.clsr.2015.07.002

White, 2015, Internet of Hackable Things: wired world wide open to new age of cyber crime, Sydney Morning Herald

Whitmore, 2015, The Internet of Things—a survey of topics and trends, Inf. Syst. Front., 17, 261, 10.1007/s10796-014-9489-2