当前位置:网站首页>Ethical considerations
Ethical considerations
2022-06-24 15:14:00 【403 Forbidden】
Lecture 23: Ethical considerations
-appreciate that there exist ethical considerations in the context of a data wrangling/data science/data analytics project
Data extraction, not data collection
• Google Streetview ("single greatest breach in the history of privacy”)
• Our everydayness quantified
• Incursions into legally and socially undefended territory
• Google has the largest unpaid number of employees - “You’re not the customer, you’re the product ..”
-be able to explain who are the stakeholders in big data analytics and what are their perspectives? Understand what the tensions are between their motivations and what is the degree of power balance between them.
explain who are the stakeholders in big data analytics
what are their perspectives?
Data is contributed, collected, extracted, exchanged, sold, shared, and processed for the purpose of predicting and modifying human behaviour in the production of economic or social value.
what the tensions are between their motivations?
Process 1: Data Extraction
•Data extraction, not data collection : Google Streetview ("single greatest breach in the history of privacy”)
•Our everydayness quantified
•Incursions into legally and socially undefended territory
Process 2: Data commodification: secondary markets and hidden value chains
•Sell personal data until it turns into waste
•Big data as a new industry (secondary markets)
Process 3: Decision Making
•Big Data Quality (Veracity)
–Data accuracy for aggregated data
–Completeness of our digital identity
–Mosaic effect
–Meaning dependent on the context
•Data Analysis
–Predictions based on the past
–How can I redefine myself?
–In what context is is legitimate to make a prediction about someone?
–Predictions often based on correlations (not causations)
–What about outliers? (what if I don’t fit into a predefined category??)
•Data Visualization
–Decision making and presentation biases
Process 4: Control and monitoring
•Pervasive monitoring now possible using sensors, Internet of Things technology
•Everyone is observed, organisations make money of observing others, collect data, sell data, make offers, induce dependence
•What happens to social trust?
•Surveillance is the precise opposite of the trust-based relationships
•Free market economy versus Surveillance Economy
Process 5: Experiments
Rewards and punishments
what is the degree of power balance between them?
•EU General Data Protection Regulation (enforced since May 2018)
•Aims to regulate and protect data privacy for all EU citizens.
–Penalty 4% of annual global turnover of the organizations.
•The consent
–should be clear, concise, not too long and intelligibly written—should attach the reasons of data collection and analyses.
–individuals have the right to withdraw the consent with the same easiness that they have previously agreed with.
•Accessing individual’s data
–Individuals have the right to ask for a copy of their personal data together with information regarding the processing and purpose of data collection and analyses from a controller
–Individuals have the right of data portability, which means that they can transfer their data from one controller to another.
-appreciate the difference between the following two perspectives on the definition of (big) data analytics
Perspective 1: The ability to collect, store, and process increasingly large and complex data sets from a variety of sources, into competitive advantage.(more technology)
Perspective 2: Data is contributed, collected, extracted, exchanged, sold, shared, and processed for the purpose of predicting and modifying human behaviour in the production of economic or social value.(more social)
- p1 is a organization perspective, p2 is a social perspective
- P1 is the basic explanation, P2 is BDA from social perspective
-appreciate the motivation for each of the 10 simple rules for responsible big data research. (you need not memorise this list, but should be able to comment on a rule if it is mentioned)
Rule 1
•Acknowledge that data are people and can do harm
–All data are people until proven otherwise
•Social media
•Heart rates from Youtube videos
•Ocean measurements that change property risk profiles
Rule 2
•Recognize that privacy is more than a binary value
–Privacy is contextual and situational
–Single Instagram photo versus entire history of social media posts
–Privacy preferences differ across individuals and societies
Rule 3
•Guard against the reidentification of your data
–Metadata associated with photos
–Reverse image search – connect dating and professional profiles
–Difficult to recognize the vulnerable points a-priori!
•Battery usage on a phone – can reveal a person’s location
–Unintended consequence of 3rd party access to phone sensors
– When datasets thought to be anonymized are combined with other variables, it may result in unexpected reidentification
Rule 4
•Practice ethical data sharing
–Seeking consent from participants to share data
Rule 5
•Consider the strengths and limitations of your data; big does not automatically mean better
–Document the provenance and evolution of your data. Do not overstate clarity; acknowledge messiness and multiple meanings.
•is a Facebook post or an Instagram photo best interpreted as an approval/disapproval of a phenomenon, a simple observation, or an effort to improve status within a friend network?
Rule 6
•Debate the tough, ethical choices/issues
–importance of debating the issues within groups of peers
•Examples mentioned earlier
–Facebook emotional contagion
–Exposing teen girl’s pregnancy
•More recently, Google Duplex
Rule 7
•Develop a code of conduct for your organization, research community, or industry
–Are we abiding by the terms of service or users’ expectations?
–Does the general public consider our research “creepy”?
Rule 8
•Design your data and systems for auditability
–Plan for and welcome audits of your big data practices.
–Systems of auditability clarify how different datasets (and the subsequent analysis) differ from each other, aiding understanding and creating better research.
•“For example, many types of social media and other trace data are unstructured, and answers to even basic questions such as network links depend on the steps taken to collect and collate data.”
Rule 9
•Engage with the broader consequences of data and analysis practices
–Recognize that doing big data research has societal-wide effects
Rule10
•Know when to break these rules
–Natural disaster
–Public health emergency
–Hostile enemy
It may be important to temporarily put aside questions of individual privacy in order to serve a larger public good.
边栏推荐
- One article to get UDP and TCP high-frequency interview questions!
- 六石管理学:垃圾场效应:工作不管理,就会变成垃圾场
- 东方财富哪个开户更安全,更好点
- 【ansible问题处理】远程执行用户环境变量加载问题
- 手机注册股票开户 炒股开户安全吗
- Detailed explanation of redis data types
- 安防市场进入万亿时代,安防B2B网上商城系统精准对接深化企业发展路径
- R语言实战应用精讲50篇(二十三)-贝叶斯理论重要概念: 可信度Credibility, 模型Models, 和参数Parameters
- update+catroot+c000021a+critical service failed+drivers+intelide+viaide+000000f
- Do you really know the difference between H5 and applet?
猜你喜欢

Py之toad:toad的简介、安装、使用方法之详细攻略

A brief introduction to the lexical analysis of PostgreSQL

Left hand code, right hand open source, part of the open source road

Linux 安装 CenOS7 MySQL - 8.0.26

ES mapping之keyword;term查詢添加keyword查詢;更改mapping keyword類型

laravel下视图间共享数据

Don't underestimate the integral mall. It can play a great role

ES mapping之keyword;term查询添加keyword查询;更改mapping keyword类型

不要小看了积分商城,它的作用可以很大

Wide measuring range of jishili electrometer
随机推荐
一个简单而功能强大的开发者工具箱Box3.cc
六月集训(第23天) —— 字典树
Virtual machines on the same distributed port group but different hosts cannot communicate with each other
Is it safe to open a stock account by mobile phone
Bert-whitening 向量降维及使用
R语言plotly可视化:可视化模型在整个数据空间的分类轮廓线(等高线)、meshgrid创建一个网格,其中每个点之间的距离由mesh_size变量表示、使用不同的形状标签表征、训练、测试及分类标签
FPGA based analog I ² C protocol system design (Part I)
R language plot visualization: use plot to visualize the training set and test set after data division, use different shape label representation, training set, test set, and display training and test
15 differences between MES in process and discrete manufacturing enterprises (Part 2)
golang中Map的并发写入
laravel 8 实现Auth登录
Successfully solved: selenium common. exceptions. SessionNotCreatedException: Message: session not created: This versi
The security market has entered a trillion era, and the security B2B online mall system has been accurately connected to deepen the enterprise development path
Huangchuping presided over the video conference on fixed-point contact with Zhuhai, resolutely implemented the deployment requirements of the provincial Party committee, and ensured positive results i
从pair到unordered_map,理论+leetcode题目实战
Laravel8 uses faker to call factory to fill data
Is it safe to open an account in flush? What preparation is needed
I have been in the industry for 4 years and have changed jobs twice. I have learned a lot about software testing
Keyword of ES mapping; Term query add keyword query; Change mapping keyword type
Go language -init() function - package initialization