ethical implications of emerging technologies - unesco 2007
TRANSCRIPT
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
1/90
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
2/90
Prepared by Mary Rundle and Chris Conley
Geneva Net Dialogue
UNESCO: Paris, 2007
Ethical Implications
of Emerging Technologies:
A Survey
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
3/90
The ideas, facts and opinions expressed in this publication are those of theauthors. They do not necessarily reflect the views of UNESCO and do notcommit the Organization.
Recommended catalogue entry:
UNESCO. Information for All Programme (IFAP). Ethical Implications of Emerging Technologies: A Survey .
Edited by the Information Society Division, Communication and InformationSector (Editor: Boyan Radoykov) Paris: UNESCO, 2007 - 92 p ; 21 cm.I - TitleII UNESCO
III Information for All Programme
Published in 2007 by the United Nations Educational, Scientific and CulturalOrganization,7, place de Fontenoy F-75352 Paris 07 SP, Paris, France
Coordinator of the publication: Boyan Radoykov
UNESCO
All rights reservedCI-2007/WS/2 - CLD 31112
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
4/90
ETHICAL IMPLICATIONS
OF EMERGING TECHNOLOGIES:
A SURVEY
Prepared by Mary Rundle and Chris Conley
ACKNOWLEDGEMENTS
In the course of compiling this report, a number of prominent members of theworldwide technology and infoethics communities have shared their expertiseand perspectives with us, including: Hal Abelson, Ben Adida, Ang Peng Hwa,Kader Asmal, Ted Barnett, Stefan Bechtold, Peter Berghammer, Scott Bradner,Stefan Brands, Kim Cameron, Shunling Chen, David Clark, John Clippinger,Urs Gasser, Lauren Gelman, Georg Greve, Dick Hardt, Dewayne Hendricks,Chris Hoofnagle, Hai Huang, Ben Laurie, Ronaldo Lemos, Lawrence Lessig,
Jamie Lewis, Abdel-Hamid Mamdouh, Dsire Miloevi, Nicholas Negroponte,Cory Ondrejka, David Reed, Eric Rescorla, Jonathan Robin, Judit Rius Sanjuan,Wendy Seltzer, Lara Srivastava, William Terrill, Paul Trevithick, Jake Wachman,David Weinberger, Ian Wilkes, and Jonathan Zittrain.
* Mary Rundle is a fellow at the Berkman Center for Internet and Society at Harvard Law
School and a non-resident fellow at the Center for Internet and Society at Stanford Law
School. Chris Conley holds a masters degree in computer science from M.I.T. and is currentlya J.D. candidate at Harvard Law School, where he focuses on the intersection of law and
technology. This paper has been produced under Geneva Net Dialogue, a Geneva-based,
open, international association whose mission is to lend its support to the operationof human rights in the information society by improving ties between the technology
community, the policymaking community, and civil society at the international level.
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
5/90
Ethical Implications of Emerging Technologies:
A SurveyMary Rundle and Chris Conley
Foreword 4
Introduction 6
The Technologies as a Short Story 8
Infoethics Goals for Neutral Technologies 11
The Ethical Challenges of Emerging Technologies - Case Studies 28
The Semantic Web and Other Metadata 28
Digital Identity Management 31 Biometrics 38
Radio Frequency Identification 41
Sensors 50
The Geospatial Web and Location-Based Services 55
Mesh Networking 58
Grid Computing 62
New Computing Technologies 70
Table: Summary of Infoethics Concerns 73
The Short Story Revisited 75
Recommendations 78
ANNEX: A Democratic Information Society
(Summary of an interview with David P. Reed) 82
Table of Contents
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
6/90
4
Embracing coherent ethical guide-lines is essential for building inclusiveknowledge societies and raisingawareness about the ethical aspectsand principles is central for upholdingthe fundamental values of freedom,equality, solidarity, tolerance andshared responsibility. Thus, UNESCOencourages the definition and adop-tion of best practices and voluntary,
professional guidelines addressingethical issues for media professionals,information producers, and serviceproviders and users with due respectto freedom of expression.
The quickening speed of techno-logical evolution leaves little time todecision-makers, legislators and other
major stakeholders to anticipate andabsorb changes before being chal-lenged to adapt to the next wave oftransformation. Lacking the time forlengthy reflection, the internationalcommunity is often faced with imme-diate policy choices that carry seriousmoral and ethical consequences:
Increase public infrastructure orpermit preferential use by investors?Allow the market to oblige peopleto participate in digital systems orsubsidize more traditional lifestyles?Let technology develop as it will orattempt to programme machines tosafeguard human rights?
The Infoethics Survey of Emerging
Technologies prepared by the NGOGeneva Net Dialogue at the requestof UNESCO aims at providing anoutlook to the ethical implications offuture communication and informa-tion technologies. The report furtheraims at alerting UNESCOs MemberStates and partners to the increasingpower and presence of emerging
technologies and draws attention totheir potential to affect the exerciseof basic human rights. Perhaps as itsmost salient deduction, the studysignals that these days all decisionmakers, developers, the corporatescholar and users are entrusted with aprofound responsibility with respect
Foreword
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
7/90
5
to technological developments andtheir impact on the future orientationof knowledge societies.
It is our hope that this study willimpress upon the policy makers, com-munity, producers and users the needto carefully observe evolutions in ICTs and, by so doing, to comprehendthe ethical and moral consequences
of technological choices on humanrights in the Knowledge Societies.
Abdul Waheed Khan
Assistant Director-General forCommunication and Information,UNESCO
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
8/90
6
Introduction
The Internet boom has providedmany benefits for society, allowing thecreation of new tools and new waysfor people to interact. As with manytechnological advances, however, theInternet has not been without nega-tive aspects. For example, it has creatednew concerns about privacy, and it hasbeen hampered by spam and viruses.Moreover, even as it serves as a medium
for communication across the globe, itthreatens to cut off people who lackaccess to it.
New solutions in information and com-munication technologies (ICTs) areconstantly emerging, and, for good orfor ill, the changes they bring may openup our societies and our world to a
greater extent than did the first phase ofthe Internet revolution. It is imperative toconsider the implications of these newtechnologies, and to encourage positivechoices regarding their uses.
UNESCO is well situated to call theattention of the international commu-
nity to these advances, particularly as totheir ethical and societal consequences,which this report refers to as infoethicalchallenges or infoethics. To that end,this survey analyzes certain UNESCOgoals in light of emerging technologiesthat will usher in the future InformationSociety1 in particular:
1. The Semantic Web and Other
Metadata Metadata, or dataabout data, enables greater auto-mated analysis of information; theSemantic Web promises to usemetadata to create an environ-ment in which computers canserve as intelligent agents ratherthan mere tools.
2. Digital Identity Managementand Biometrics Digital identitymanagement allows the amass-ing and automatic processing ofpersonal data; biometrics providesmeans by which human beingscan be uniquely identified.
1 UNESCO is increasingly using the term Knowledge Societies, which reflects a
development-oriented, people-centred and pluralistic vision of the future societies.However, for the purposes of this study, the term Information Society is used throughout
the document.
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
9/90
7
Introduction
3. Radio Frequency Identifica-
tion (RFID) and Sensors Thesetechnologies monitor the physi-cal world, using communicationstechnology to distribute informa-tion about a specific location.
4. The Geospatial Web and Loca-
tion-Based Services Both ofthese technologies serve to as-sociate digital data with physicallocations.
5. Mesh Networking Meshnetworking facilitates the forma-tion of networks across areaswithout existing communicationsinfrastructures. As such, it can help
connect underserved areas.
6. Grid Computing This tech-nology may allow the worldscomputing power and data stor-age resources to be pooled forpeople to access as needed.
7. New Computing Technologies
Combined with the technolo-gies listed above, a powerful mixof optics, quantum computing,and other new technologies haspotential to bring about a globalbrain.
Because choices in their design and
use carry moral consequences, thesetechnologies pose significant infoeth-ics challenges.
This survey considers these choices
in the light of key UNESCO infoethicsgoals - in particular:
(a) Fostering the application ofhuman rights and fundamentalfreedoms in cyberspace;
(b) Extending the public domain ofinformation;
(c) Enabling diversity of content ininformation networks; and
(d) Promoting access to informationand means of communication.
Taking these objectives as a given, the
survey employs them as measures inassessing likely consequences of differ-ent technological choices.
In presenting results of this examina-tion, the report first tells an introductorystory of how the technologies coveredrelate to one another. Next, infoethicsgoals are presented. Then, for each tech-
nological trend surveyed, the reportcontains a short chapter drafted in layterms to provide an overview of therelevant technology and to highlightramifications and concerns. The reportthen summarizes this infoethics analysisand revisits the story of the emergingtechnologies. Finally, the report offers
recommendations on ways to advanceinfoethics goals in anticipation of theseoncoming technologies.
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
10/90
8
The Technologies as a
Short Story
In the short history of the InformationSociety, technology has moved frommaking sense of cyberspace tomaking sense of the physical world,with new modes of connectivity nowholding promise for a seamlesslyintegrated Internet to reach allregions of the globe.
For the Internets first phase, humans
initiated the exchange of text, images,and other information. Given the enor-mous amount of content and codethat has been generated, computersnow need interoperable metadata,or data about data, to navigate. Thesemantic web promises to offer suchmetadata. This new metadata languageoffers predictability in a cyberspace of
ever growing exchanges, with the vo-cabulary of metadata lending greaterprecision to human use of the Internetor even allowing computers to accessand analyze content directly.
Since people have been the actorsin the first phase of the Internet, and
should remain of central concern inall future developments, it makessense that computers would need
a detailed set of terms to facilitateexchanges on behalf of individuals.Put another way, as programmesnavigate the web (with web agentsquerying many web sites to answerany given human question), a personneeds to be able to delegate hisidentity to a programme so it canthink and act on his behalf forexample negotiate for his preferred
rental car model, designate whichfriends may have access to hiscalendar, or pay taxes on onlinetransactions. Hence, records arebeing developed to refer to elementsof a persons various digital personae(e.g., name, date of birth, citizenship,etc. for one persona; pseudonym,favorite songs, etc. for another). In this
way, metadata serves as a languagefor describing digital identities.
To date, digital identities have typi-cally been dissociated from physicalidentities. However, the emergingtechnology ofbiometrics promises tocorrelate the two, linking an individuals
various digital identities to his embod-ied person. An embodied person canbe represented in digital form through
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
11/90
9
The Technologies as a Short Story
the translation of unique attributes for
example his fingerprints, iris pattern, orwalking gait. These attributes are takenas measurements, with the biometricstranslated into numerical expressionsthat computers can refer to in theirmachine-readable language. A physi-cal person can thereby be uniquelyidentified and then abstracted as data.
Similarly, both radio frequencyidentification (RFID) and sensorsare making other aspects of thephysical world manageable andsearchable in the digital world. RFIDtags enable the tracking of physicalobjects or people using cheap,digital technology: A person bearing
an RFID chip can easily be identifiedfor different purposes for example,ensuring that new-born babies donot get mixed up in a hospital, orgranting the proper people accessto restricted areas of a building.Likewise, a specific product (say, abottle of shampoo) can be trackedfrom its production line to the store
where it is sold and even associatedwith an individual consumer. Thisinformation can be used for a range ofpurposes, from promoting effi ciencyin the supply chain to allowing therecall of faulty products.
One might take issue with metadatas
linguistically equating an individualwith a bottle of shampoo. To such anobjection, a computer scientist mightrespond that these problems can beresolved as the metadata languagesare refined to add dimension andascribe value.2
There are certain signs that thisrefinement is underway, drivenin part by the importation of thephysical world into cyberspace.Sensors are enabling the furtherdigitization of the physical world measuring observable qualitiessuch as oxygen level or acceleration,and then translating them into digital
form. With more material added tocyberspace, flesh is put on the bonesof previously catalogued ideas.Different contexts provide dimensionand establish added meanings forthe semantic web to recognize.
Meanwhile, just as cyberspace isimporting the real world, it is itself
being exported to that physicalspace through the geospatial weband location-based services (LBS)technology. These Internet-renderedservices superimpose themselves onthe real world and offer web-basedviews of real-world locations overlaid
2 Such issues point to the problem of technological neutrality that is, the question of
whether technology is neutral or whether it is laden with values. Values may be ascribed
during the development of a language, and someone or something needs to choosehow to order things for example deciding if a human falls into the same category as an
object, or how categories should overlap.
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
12/90
10
The Technologies as a Short Story
with relevant information (e.g., home
prices, crime rates, or hiking trails).The line separating the real worldand cyberspace has already begunto blur; in time, these two worlds maybe integrated.
However, the Information Society isnot there yet. Huge swaths of the globeremain without Internet connectivity,particularly in the developing world.While this territory historically hasseemed vast, it may not be long beforeglobal connectivity is realized. Theadvent ofmesh networking, whichallows network-enabled devices (e.g.,mobile phones) to establish a peer-to-peer network spontaneously, offers
one means of extending the rangeof connectivity without requiring anexpensive infrastructure. The evolvingability of mobile phones and otherelectronic devices to connect tothe Internet and to each other willexpand the reach of mesh networks,perhaps eventually extending a globalnetwork to every location on earth in
ubiquitous networking.
Of course, a network comprisedlargely of devices without significantcomputing power has limitationsin terms of computing resources,data storage and accessibility. Thisproblem could be addressed by grid
computing, whereby storage andcomputing power are pooled in anetwork, with people tapping intoresources as needed and providing
them as available, in accordance with
some cost allocation scheme.
Should a combination of ubiquitousnetworking and grid computing comeabout, the Information Society wouldfind itself in a world of ubiquitouscomputing at which point thephysical and digital worlds will becomeless distinguishable. Every object even doors, clocks, refrigerators, orwatches will be able communicate itsstatus and respond to its environment.Meanwhile, computing power itselfmay continue growing exponentially,supported by new technologies suchas optical or quantum computing,which will be important for processing
this immense quantity of data. Incombination with a massive computinggrid, this force could constitute a largevirtual brain that continuously pushescomputational limits in an expandinguniverse.
This story tells of a bright future inwhich emerging technologies are
applied to the benefit of all human-ity. History suggests, however, thattechnology can also be used to limitrather than to promote human rightsand dignity. Thus, it is important toconsider how these technologiesmay promote or thwart the realiza-tion of infoethics goals.
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
13/90
11
Information and communicationtechnologies (ICTs) are an increasinglypowerful force in the modern world.
Their influence can be seen in allspheres of public life, from businessinteractions and education to politicsand international affairs. Thesetechnologies, particularly the Internet,have also become a dominantmechanism for conducting private
affairs and participating in society.Advancing technology frequentlyserves to allow prior activities to beperformed more easily and can openup entirely new possibilities.
Moreover, the rate at which tech-nology advances is itself increasing.Moores Law,3 which states that the
computing power of a single mi-croprocessor grows exponentially,applies to other technologies aswell. The Internet and related tech-nologies allow for new ideas andinventions to be distributed far morerapidly than before, and encouragethe ever-increasing pace of tech-
nological growth.
But technology in itself is neutral; itdoes not directly contribute to theadvancement of human rights. Manytechnologies have multiple possibleapplications, some of which mayserve to further this goal, others ofwhich may hinder it.
It is therefore imperative that emer-ging technologies be examined in
light of their impact on the exerciseof human rights. As describedabove, the infoethics goals providea framework for this examination.
The first infoethics goal, derived fromthe Universal Declaration of HumanRights,4 establishes the fundamentalpriority of putting technology in theservice of human rights. Stemming
from that goal are three others thataim to promote the public domain,diversity of content, and accessto information and the means ofcommunication with these threebased on the premise that all peopleshould be able to share in thebenefits of ICTs.
3 Seehttp://en.wikipedia.org/wiki/Moore%27s_law (viewed November 8, 2006).4 UN General Assembly resolution 217 A (III) of 10 December 1948.
Infoethics Goals for
Neutral Technologies
http://en.wikipedia.org/wiki/Moore%27s_lawhttp://en.wikipedia.org/wiki/Moore%27s_law -
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
14/90
Infoethics Goals for Neutral Technologies
12
Human Rights and Fundamental
Freedoms
Technology can serve to promote orrestrict human rights. The InformationSociety should foster the use ofemerging technologies in such a wayas to maximize the benefits that theyprovide while minimizing the harms.In many cases, this promotion may beless a matter of technological controlthan of oversight: establishing theproper legal or regulatory system toensure that technology capable ofabuse is not in fact abused, and thatthe benefits of technology are sharedamong all.
In discussing human rights, we takeas a starting point the UniversalDeclaration of Human Rights. Manyof the rights stated in this documentare particularly important whenconsidering the ethical ramificationsof new technologies and theirpotential uses. For the purposes ofthis study, key provisions include:
ARTICLE 2:
Everyone is entitled to all the rights
and freedoms set forth in this
Declaration, without distinction of
any kind, such as race, colour, sex,
language, religion, political or other
opinion, national or social origin,property, birth or other status.
Furthermore, no distinction shall
be made on the basis of the politi-
cal, jurisdictional or international
status of the country or territory towhich a person belongs, whether
it be independent, trust, non-self-
governing or under any other
limitation of sovereignty.
ICTs enable the collection and pars-ing of information and, as such, allowmyriad categorizations. Personal datamay be broken down to such elementsas ethnicity, gender, religion, national-ity, and socio-economic status, amongothers. From an infoethics perspec-tive, it is important to ensure that thecategorization of data elements ac-cording to such lines does not result ininterference with a persons rights and
freedoms.
ARTICLE 3:
Everyone has the right to life,
liberty and security of person.
The right to life, liberty and securityof person is one of the most
fundamental rights included in theUniversal Declaration of Human Rights,and yet among the most diffi cultto define. This right encompasses aright of access to all of the necessitiesof life, including food and shelter.
ICTs contribute to health-improving
and even life-saving benefits, rangingfrom clean-air technologies andcoordinated medical research to earlyemergency alerts and quick access
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
15/90
Infoethics Goals for Neutral Technologies
13
to medical information. Does a right
to life encompass universal accessto these benefits of technology,regardless of ability to pay?
So, too, the economic effi cienciesbrought on by ICTs may raise thestandard of living in many areas ofthe world. Hence, the economicgains normally translate into betterenjoyment of the right to life, libertyand security of person.
While this Article may be construedas entailing a right of access to theinformation, ideas, cultural elements,and communication media that allowpeople to take part in society, it may
also be read to allow an individualto opt out of participating in ICTsystems. For example, under thisright a person might be permittedto refuse to have an ICT deviceimplanted into his body. If such animplant were to become de factorequirement for participation in theInformation Society, should the law
step in to allow that person to haveaccess to all of the necessities of life,including food and shelter, despitehis refusal to receive the implant?
ARTICLE 7:
All are equal before the law and
are entitled without any discrimi-nation to equal protection of the
law. All are entitled to equal pro-
tection against any discrimination
in violation of this Declaration and
against any incitement to suchdiscrimination.
The concept of equal protection canbe aided or hindered by the deploy-ment of ICTs. Technologies that serveto provide all people with equalopportunity and access, withoutdiscrimination, serve this provision.However, technology can also beimplemented to identify members ofspecific groups, and thus to enablediscrimination against those groups.
ARTICLE 11:
(1) Everyone charged with a
penal offence has the right tobe presumed innocent until
proved guilty according to
law in a public trial at which
he has had all the guarantees
necessary for his defence.
(2) No one shall be held guilty of
any penal offence on account
of any act or omission whichdid not constitute a penal
offence, under national or
international law, at the time
when it was committed. Nor
shall a heavier penalty be
imposed than the one that
was applicable at the time the
penal offence was committed.
Data that is gathered or analyzed bytechnology is increasingly used in
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
16/90
Infoethics Goals for Neutral Technologies
14
judicial proceedings. When evidence
stemming from the application oftechnology contradicts a persons tes-timony, a dilemma arises as to whichaccount deserves more credence.Despite the tendency of society to trustevidence produced by machines onthe basis of general statistical accuracy,computer code may carry mistakes orbe corrupted. In this sense, then, thereare infoethics nuances in the use oftechnology to establish proof.
ARTICLE 12:
No one shall be subjected to arbi-
trary interference with his privacy,
family, home or correspondence,
nor to attacks upon his honor andreputation. Everyone has the right
to the protection of the law against
such interference or attacks.
ICTs can serve to protect or limitthe right of privacy. For example,encryption technologies can makecommunication between private
parties confidential, or they can bemodified to allow outside interests(such as governments) to interceptthis communication. Likewise, sur-veillance technologies can serve toguard privacy, but they may also beused as tools to infringe on the pri-vacy of others.
ICTs can afford anonymity, allowing
people to feel comfortable sharingideas they might not air if their nameswere associated with these ideas. Inthis sense, privacy and anonymity incommunication bear a close relation-ship to the right to seek, receive andimpart information (Article 19) as wellas the right to associate or assemble(Article 20).
Efforts to protect privacy, however,may impose other costs on society,and efforts to protect other rights mayhave privacy implications. For exam-ple, any protection that technologyprovides for anonymous, secure com-munication may limit the effectiveness
of protection against attacks on apersons honor and reputation.
Privacy concerns are also raised bythe increasing collection of personaldata by private and governmentalentities. A question receiving grow-ing attention is the duty that privatecompanies have to safeguard con-
sumers personal data, especially in theinternational context of the Internet.
There are also questions regardinggovernmental treatment of personaldata, particularly concerning whatrules apply when different govern-ments share such information.5
5 The United States and the European Union are currently embroiled in a dispute concerning
the disclosure and use of information about airline passengers. See Air Security Talks Fail,
Daily Mail, October 2, 2006, p. 32.
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
17/90
Infoethics Goals for Neutral Technologies
15
Of course, there are questions as to
what constitutes arbitrary and in-terference. If a policy applies acrossthe board and is supported by whatseem to be reasonable arguments, isit arbitrary? If surveillance poses noinconvenience, is it interference?6
ARTICLE 18:
Everyone has the right to freedom
of thought, conscience and reli-
gion; this right includes freedom
to change his religion or belief,
and freedom, either alone or in
community with others and in
public or private, to manifest his
religion or belief in teaching, prac-
tice, worship and observance.
ICTs and thought, conscience andreligion can interact in various ways.First, and most simply, ICTs can beused to further religious interestsand to allow persons to communi-cate on issues of faith. If, however,the use of technology is contrary
to beliefs, then the observance ofthese beliefs may be threatenedby making the use of technologymandatory or practically necessaryto function in the modern world.
ARTICLE 19:
Everyone has the right to freedom
of opinion and expression; this
right includes freedom to hold
opinions without interference and
to seek, receive and impart infor-
mation and ideas through any
media and regardless of frontiers.
As with the right of privacy, theright to freedom of opinion andexpression in the Information Societyis tightly intertwined with ICTs.
Technologies can open channels bywhich information may be sharedand opinions expressed; it can alsobe used to restrict the information
available7
and to identify and interferewith people expressing alternativeopinions.8 In this sense, there is a linkbetween privacy (Article 12) and thefreedom to seek, receive and impartinformation.
Moreover, the right to freedomof opinion and expression loses
value without the ability actually tocommunicate ones views to others.ICTs can be used to create a publicforum where this communicationcan take place, or it can restrictexpression by placing limits on a
6 See Lawrence Lessig, Code and Other Laws of Cyberspace, New York: Basic Books, 1999, Ch.
11: Privacy.7 For example, many countries currently use filtering software to limit the information that
citizens can access on the Internet. Seehttp://www.opennetinitiative.org/.8 See, e.g., http://www.rsf.org/article.php3?id_article=16402 (describing the prosecution of
dissidents based on information provided by Yahoo!).
http://www.opennetinitiative.org/http://www.rsf.org/article.php3?id_article=16402http://www.rsf.org/article.php3?id_article=16402http://www.opennetinitiative.org/ -
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
18/90
Infoethics Goals for Neutral Technologies
16
Anonymous Expression
By Wendy Seltzer9
Anonymous expression has a long and distinguished tradition. Voltaire and George
Eliot wrote under pseudonyms. Support for the ratification of the U.S. Constitutionwas procured through anonymous articles in the Federalist Papers. Modern-day
bloggers and mailing-list contributors may not use the same flowery language and
elegant pseudonyms, but their freedom of expression is no less important. The tech-nology they use can facilitate either identification or anonymity and that will affect
the range and content of online expression.
Anonymity can make possible or enhance many expressive activities. The freedomto impart information thus includes the right to speak anonymously; freedom of as-
sembly includes the right to associate without giving a name or without revealing
group membership to outsiders; and the freedom to seek and receive informationincludes the right to listen, watch, and read privately.
Protections for anonymity are vital to democratic discourse. Allowing dissenters
to hide their identities frees them to express minority views critical to an informeddemocratic discourse. Otherwise, fear that their identity may be uncovered and that
they may be persecuted on account of their speech, may prevent those in political,
ethnic, religious, or other minority groups from speaking at all. That silence in turndeprives the whole public of access to those ideas.
persons ability to communicate with
others. The right to seek, receive,and impart information, therefore, isclosely tied to freedom of assembly
and association (Article 20) since
accessing and disseminating ideasoften entail connecting with othersin the Information Society.
9 Wendy Seltzer is Visiting Assistant Professor of Law, Brooklyn Law School, and a fellow at
the Berkman Center for Internet and Society at Harvard Law School.
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
19/90
Infoethics Goals for Neutral Technologies
17
ARTICLE 20:
(1) Everyone has the right to
freedom of peaceful assembly
and association.
(2) No one may be compelled to
belong to an association.
The right of association is affectedby ICTs in various ways. Technologymay serve to enable this right byproviding the means of facilitatingcontacts, coordinating exchanges,and interacting with other persons inan association. However, technologycan also hinder this right, if used toidentify and target members of anassociation, or to disrupt or otherwise
prevent peaceful assembly.
Technology also presents a threat tothe right to refrain from joining anassociation. This right to be alonedepends in no small part on theindividuals choice not to interactwith others. Technology can infringeupon that right, requiring that a
person associate with others in orderto obtain the full benefits available tomembers of society. It can also enablethe identification and stigmatizationof those who choose not to join agiven association.
As noted above, the rights to enjoy
privacy (Article 12) and to seek, receive,and impart information (Article 19)are linked to this package of rights
with technology reinforcing this
relationship.
ARTICLE 21:
(1) Everyone has the right to
take part in the government
of his country, directly or
through freely chosen repre-
sentatives.
(2) Everyone has the right of
equal access to public service
in his country.
(3) The will of the people shall
be the basis of the authority
of government; this will shall
be expressed in periodic andgenuine elections which shall
be by universal and equal
suffrage and shall be held by
secret vote or by equivalent
free voting procedures.
Democratic elections, like many otherfacets of modern life, are becoming
increasingly reliant on technology.Political candidates rely on media andcommunication networks to expresstheir views and coordinate sup-porters. Candidates are not alone indoing so; politically active groups arealso increasingly using the Internet toobtain grass-roots support for their
proposals and to build a constituencyand thus a voice.
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
20/90
Infoethics Goals for Neutral Technologies
18
Political use of ICTs can be harmful,
however, where technology is abusedto further a political candidacy oragenda.10 Furthermore, the increasinguse of technology in politics canpresent a barrier to entry, where certainclasses of persons are effectivelybarred from political activity if ICTsare not broadly available for theiruse. Finally, as electronic voting isadopted as a means for carrying outelections, security against corruption isincreasingly dependent on specialists.
ARTICLE 26:
(1) Everyone has the right to
education. Education shall be
free, at least in the elemen-tary and fundamental stages.
Elementary education shall
be compulsory. Technical and
professional education shall
be made generally available
and higher education shall
be equally accessible to all on
the basis of merit.
(2) Education shall be directed to
the full development of the
human personality and to the
strengthening of respect for
human rights and fundamental
freedoms. It shall promote
understanding, tolerance and
friendship among all nations,
racial or religious groups, andshall further the activities of
the United Nations for the
maintenance of peace.
(3) Parents have a prior right to
choose the kind of education
that shall be given to their
children.
Education is becoming reliant on tech-nology in two ways. First, educationabout technology itself is growingin perceived importance and valueas technology emerges as a domi-nant facet of business and thus aviable career route for many learners.
Second, technology is used to enableeducation on a vast range of subjects,allowing learners to improve theiraccess to outside sources of informa-tion, use multimedia educationalmaterials, and interact with teachersand fellow learners in new ways.
For these reasons, the single greatest
threat that ICTs pose to the right toeducation is the possibility that theywill serve to increase stratificationbased on income level and accessto technology. As ICTs become a keycomponent in an educational system,learners who are unable to obtainaccess to the technology have fewer
10 For example, staff members of several members of the U.S. Congress have altered onlineencyclopedia entries about their employer, sometimes removing facts that cast the Senator
or Representative in a negative light. See http://news.bbc.co.uk/2/hi/technology/4695376.
stm.
http://news.bbc.co.uk/2/hi/technology/4695376http://news.bbc.co.uk/2/hi/technology/4695376 -
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
21/90
Infoethics Goals for Neutral Technologies
19
resources available to them; moreo-
ver, the quality of non-technologicaleducational resources may decline asa result of a greater focus on onlineeducation. Encouraging programmesthat seek to prevent this result shouldbe a primary concern of governmentsand infoethicists.11
Finally, technology can impact theability of parents to choose the edu-cation presented to their children.ICTs can provide a broad rangeof options, allowing schools andparents to create individually craftedcurricula that take advantage of thewide range of options. Conversely,however, parents may find it diffi cult
to limit the information that theirchildren access as part of their educa-tion precisely because of the ease ofaccess provided by technology.
ARTICLE 27:
(1) Everyone has the right freely
to participate in the cul-
tural life of the community, toenjoy the arts and to share in
scientific advancement and
its benefits.
(2) Everyone has the right to the
protection of the moral and
material interests resulting
from any scientific, literary or
artistic production of whichhe is the author.
Perhaps the greatest promise of ICTsis the concept of a true informationcommons, a medium that allowsfor the increasingly rapid discoveryand distribution of new ideas. At thesame time, technology can serveas a barrier to the spread of newideas. For example, ideas that areonly available on a specific mediummay infringe on the rights of thosewho have no access to the requiredtechnology. Furthermore, even thosewith access to the Internet and otherforms of ICTs can be blocked from
full participation in cultural life bytechnological means, for exampletechnology implementing data userestrictions.
Technology also poses a threatto existing intellectual propertyregimes and thus to the protection ofrights-holders interests. File-sharing
networks and other activities madepossible by new technology havemade the infringement of copyrightmuch easier to effectuate and harderto prevent or prosecute.
In order to encourage a vibrantcultural life for all, infoethics must
11 Two such programmes are the One Laptop per Child programme at the MassachusettsInstitute of Technology (see text box, infra, and http://laptop.media.mit.edu/) and the
Global Education and Learning Community (see http://www.sun.com/products-n-
solutions/edu/gelc/).
http://laptop.media.mit.edu/http://www.sun.com/products-n-solutions/edu/gelchttp://www.sun.com/products-n-solutions/edu/gelchttp://www.sun.com/products-n-solutions/edu/gelchttp://www.sun.com/products-n-solutions/edu/gelchttp://www.sun.com/products-n-solutions/edu/gelchttp://www.sun.com/products-n-solutions/edu/gelchttp://www.sun.com/products-n-solutions/edu/gelchttp://www.sun.com/products-n-solutions/edu/gelchttp://www.sun.com/products-n-solutions/edu/gelchttp://www.sun.com/products-n-solutions/edu/gelchttp://laptop.media.mit.edu/ -
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
22/90
Infoethics Goals for Neutral Technologies
20
consider the role that technological
advancement may play in strength-ening or weakening the enforcementof intellectual property rights.
Access to Information and
Communication
In order for human rights to befully operational in the InformationSociety, people need access to infor-mation, which in turn requires accessto the means by which it is delivered.
Therefore, infoethics goals must alsofocus on three major categories ofaccess to information and communi-cation that are essential to the exerciseof human rights: (i) the public domain
of knowledge and creative works;(ii) diversity of content on informationand communication networks; and(iii) unfettered access to such informa-tion (including the means of deliveryand the ability to use content).
Public Domain
One primary goal of infoethics isto extend the public domain ofinformation; that is, to define an illus-trative set of knowledge, information,cultural and creative works thatshould be made available to everyperson. This category contains, but isnot necessarily limited to:
Government documents, allo-wing an informed democracyto observe and evaluate the
actions of their elected leaders,
and thus allowing all personsto participate in the process ofgovernment;
Information about personal
data retained by entities, allo-wing individuals to understandthe extent to which actions mayor may not be private;
Scientific and historical data,allowing all persons full access tothe knowledge that they need tointerpret events and to furtherthe progress of knowledge;
Information relating to health
hazards, allowing persons tounderstand the risks to whichthey may be exposed and to actaccordingly;
Information on the state
of technology, allowing thepublic to consider how theInformation Society might guard
against information warfare andother threats to human rights.
Creative works that are part
of a shared cultural base, al-lowing persons to participateactively in their community andcultural history.
UNESCOs Recommendation concerningthe Promotion and Use of Multilingualism
and Universal Access to Cyberspace,
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
23/90
Infoethics Goals for Neutral Technologies
21
adopted at its 32nd session in October
2003, provides the following definitionof public domain information: Publicdomain information is publicly acces-sible information, the use of whichdoes not infringe any legal right, orany obligation of confidentiality. It thusrefers on the one hand to the realm ofall works or objects of related rights,which can be exploited by everybodywithout any authorization, for instancebecause protection is not grantedunder national or international law, orbecause of the expiration of the term ofprotection. It refers on the other handto public data and offi cial informationproduced and voluntarily made avail-able by governments or international
organizations.
The extent of the public domain isfrequently contested. Public accessto government documents and de-liberations is naturally restricted bythe need for confidentiality in certainaffairs; similarly, access to personalinformation is constrained by privacy
concerns. Some nations choose to
remove certain content from the
public domain, deeming exposure tothis material harmful to the popula-tion at large.12 Scientific research andknowledge may be limited by govern-ment regulation, often due to ethicalconcerns.13 Intellectual property lawsfrequently reduce the public domainby granting exclusive license overcreative works to the holder of the in-tellectual property rights, with varyingdegrees of fair use permitted.14
However, infoethics perhaps neednot determine whether any given linebetween public domain and restrictedinformation or intellectual property isright. Instead, infoethics should focus
on ensuring that information that isclearly part of the public domain isavailable to all persons. Information onhealth risks of new technologies shouldbe readily available and distributed toall potential users. Creative works thatare part of the public domain should beclearly indicated as such. Governmentsshould allow access to documents that
are not properly secret,15 including
12 In Germany, for example, content promoting neo-Nazi organizations or denying the
Holocaust is prohibited. See Deutsche Welle, Trial Highlights Limits of Free Speech in
Germany, available at http://www.dw-world.de/dw/article/0,2144,1896750,00.html
(describing the criminal trial of Ernst Zndel on charges of inciting racial hatred basedon his denial of the Holocaust).
13 For example, the UN has recently passed a resolution urging Member States to prohibit
human cloning in any form, but it was unable to reach an agreement to pass a binding formof the same resolution. See United Nations Declaration on Human Cloning, U.N. Doc. No.
A/59/516/Add.1 (2005).14 See Ruth Okediji, Towards an International Fair Use Doctrine, 39 Columbia J. Transnat L.
75 (2000).15 South Africa provides individuals a right of action to obtain information held by private entities.
See Promotion of Access to Information Act, Act No. 2 of 2000 (The Republic of South Africa).
http://www.dw-world.de/dw/article/0,2144,1896750,00.htmlhttp://www.dw-world.de/dw/article/0,2144,1896750,00.html -
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
24/90
Infoethics Goals for Neutral Technologies
22
making those documents available
over commonly used communicationand information media.
Diversity of Content on
Information Networks
ICTs also can have a great impact onthe diversity of content on informa-tion networks. In an ideal society,the content available on informationnetworks should reflect the diver-sity of legitimate preferences of thepopulation. In addition, the informa-tion networks should be open tocontent from all sources, allowingany interested person to be a creatorof content rather than a mere con-
sumer.
Broadcast media, such as televisionand radio, allow content to be rap-idly delivered to consumers in distantplaces. However, broadcast mediatends to cater to the populationsegments with the most economicpower; the substantial startup costs
of operating a television channel orradio station deter the distribution ofcontent targeted at niche audiences,16
and existing channels may have no
incentive to accept content fromother sources or to provide diversecontent.17
In Brazil, observers have expressedconcern about the diversity ofcontent available on cellular phonenetworks.18 Cellular phone networksare currently the dominant means ofdistributing interactive content; while45% of the population has access tocellular phones, only 12% has accessto the Internet. Not surprisingly,then, cellular phone networks areincreasingly becoming carriers of var-ious forms of content beyond voicetelephony; music, video, interactive
games, and other material can beaccessed on cellular phone networks.
Thus, as with traditional media enter-prises, cellular phone companiesmay have exclusive control over thecontent available to a large fractionof the population, and therefore havethe potential to promote or limit thedelivery of available content.
ICTs offer the potential to overcomethese obstacles to content diversity.
16 Some nations have attempted to address this problem through regulation. In Germany,for example, each state must either provide a public network supplying diverse content or
must regulate private networks to ensure that they provide a diversity of content matched
to the interests of subsets of the population. See Uli Widmaier, German BroadcastRegulation: A Model for a New First Amendment?, 21 B.C. Intl & Comp. L. Rev. 75, 93-99
(1998).17 The United States attempted to regulate the relationship between television networks and
the creators of television programming, but has abandoned that effort. See Christopher S.
Yoo, Beyond Network Neutrality, 19 Harvard J. L. & Tech. 1, Fall 2005, p. 49 n.188.18 Email conversation with Ronaldo Lemos, Creative Commons Brazil, February 2006.
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
25/90
Infoethics Goals for Neutral Technologies
23
In principle, ICTs substantially reduce
the cost of producing and distribut-ing content, allowing diversity ofboth creative works and creators.In allowing the generation of moreinteractive content, they transformconsumers into active participants.
Unfettered Access to
Information
Establishing a base of public domaininformation and diversity of contenton information networks are laud-able goals. However, the fulfillmentof the spirit of these goals dependson the actual ability of persons toaccess and use the content and infor-
mation that the public domain anddiversity make available. Thus, oneof the dominant goals of infoethicsis to achieve universal access to alllegal content. There are two, largelydistinct, components to this goal:ensuring that all persons are able toobtain the content, and ensuring thatall persons are able to use the content
that they obtain.
The ability to obtain content requiresaccess to the information networksor other channels of distribution,which can be accomplished eitherby increasing access to a particularchannel or by providing additional
channels of distribution. For instance,
a country whose citizens have limited
access to computers and the Internetcannot achieve the goal of universalaccess to information simply byensuring that content is availableonline. Instead, it must determine thebest course of actually making thatcontent available to its population.
This might be achieved by deployingnew technologies like web-enabledmobile phones to increase connec-tivity; it might also be accomplishedby ensuring that the content is alsoavailable in other forms to those whocannot access it online.
Diversity of content is heavily relianton maintaining network neutrality
so that no single entity can serve tolimit access to (legal) content.19 Undernetwork neutrality, each node on thenetwork is content-blind, passingalong all traffi c without concern asto its type or content. Thus, if fully im-plemented, network neutrality wouldrequire that all nodes on a network(including Internet service providers,
or ISPs) pass along traffi c withoutconcern for (or even identification of)its origin, destination, and content.
Complete neutrality, however, carriesits own hazards: a network that isentirely content-neutral encouragesthe diversity of legal content, but it
also permits various forms of illegal
19 See, e.g., Mark N. Cooper ed., Open Architecture as Communications Policy, Center for
Internet and Society at Stanford Law School, 2004.
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
26/90
Infoethics Goals for Neutral Technologies
24
content, ranging from pornography
to spam and viruses. Infoethics shouldthus seek to shape the future of ICTsto retain the positive features ofnetwork neutrality while encouragingdevelopments that limit its harms.20A key question here is whether edgedevices might better address harmsthan could changes to the networkitself since edge devices may bebetter technically and are more likelyto rest under the users control.
Search engines present another accesspoint where the practical accessibilityof content may be limited. Given thesheer volume of data available on theInternet, many users rely on search en-
gines to locate desired content; thus,any content that cannot be accessedvia search engines may be effectivelyinaccessible. Like ISPs, search enginesthus have the potential to act as achokepoint and to affect the diversityof content available on an informationnetwork, promoting some contentby placing it atop a list of search
results while selectively filteringother content. Google, for example,has filtered searches conducted onits French and German language
sites, removing matches that link to
Nazi or anti-Semitic content.21 Again,however, this capability is not ethicallyquestionable per se; it may simplyrequire oversight to ensure that it isbeing utilized to remove only illegiti-mate content.22
If information is distributed via ICTs,access to it fundamentally requiresaccess to the technology itself.Increasingly, projects are beinglaunched to remedy lack of ICTsaccess, providing a solution that maybe more cost-effective and morebeneficial than projects to provideinformation in various offl ine formats.
The One Laptop per Child Foundation,
for instance, seeks to leverage ad-vancing technology to producecheap, low-powered computers withwireless network capacity that can bewidely distributed in poorer segmentsof the world.23 (See Text Box, below.)Moreover, as will be discussed in thesections that follow, the problem ofexclusion could diminish as the cost
of networked computing drops.
Still, even if the cost of ICTs declinesto a point where todays technology
20 See Jonathan Zittrain, Without a Net, in Legal Affairs (January - February 2006), available at
http://www.legalaffairs.org/issues/January-February-2006/feature_zittrain_janfeb06.msp.21 See http://cyber.law.harvard.edu/filtering/google/results1.html; cf. Isabell Rorive,
Freedom of Expression in the Information Society, Working Paper for the Preparatory
Group on Human Rights, the Rule of Law and the Information Society 8, Sept. 15, 2004
(discussing censorship by search engines in France, Germany, and China).22 In addition, users could configure personal filters to prevent exposure to undesired
content.23 Seehttp://laptop.org/.
http://www.legalaff/http://cyber.law.harvard.edu/fihttp://laptop.org/http://laptop.org/http://cyber.law.harvard.edu/fihttp://www.legalaff/ -
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
27/90
Infoethics Goals for Neutral Technologies
25
becomes affordable for all, there will
always be new advancements thatbegin with limited accessibility. Inthis regard, the process of ICTs diffu-sion warrants attention.
In the development of informationnetworks, it is important to ensurethat standards organizations andthe like are not overly influencedby particular agendas. Allowing anyone group to capture a regulatory orstandard-setting organization preventsthese organizations from achieving abalance between interests. Designersof network technologies could bemandated or given incentives to offerthe greatest overall benefit to society,
rather than to support the demands ofa specific group (e.g., owners of copy-righted content).
Ensuring that all persons are able
to use the content that they obtainposes other challenges. Even wherecontent is available, it is of little valueunless it can in fact be understoodand used. Thus, universal access toinformation requires that contentbe distributed multilingually, or thattechnology be deployed to translatecontent into a usable form. Similarly,technology can be used to make infor-mation accessible to the physicallydisabled. In addition, content shouldbe easily machine-readable; publicdomain content in particular shouldbe released in a format that is broadlyused and does not require specificapplications or devices to access.
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
28/90
Infoethics Goals for Neutral Technologies
26
One Laptop per Child: The $100 LaptopBy Samuel Klein
The One Laptop per Child (OLPC) initiative, conceived at the MIT Media Lab and firstannounced in January 2005, is an effort to mass-produce cheap, durable laptops and to
distribute them throughout the world to improve education for children. The stated goal
of the project is to provide children around the world with new opportunities to explore,
experiment, and express themselves. If all goes as planned, these opportunities will beprovided entirely through the laptops, which, equipped with free software, will be tools for
creating and receiving content.
The project to date has focused on developing cheap, durable hardware designs, particularlya low-cost display with a target production cost of $100 per laptop in its early stages (less
later) and building a network of partners to help produce the necessary hardware and
software. The project relies on economies of scale: The production schedule calls for at least5 million laptops. The laptop will have built-in wireless capability, will work as part of a local
mesh network when there is no access to the global Internet, and will support innovative
power sources, including winding by hand.
The laptops are meant to be widely distributed within a given area, one to every child
in a school or region. Distribution is to be carried out through schools via national
governments. The OLPC Chairman, Nicholas Negroponte, says the team has had initial
discussions with offi cials in China, India, Brazil, Argentina, Egypt, Nigeria, and Thailand;24the team recognizes, however, that unless a country can provide one laptop for every
child in its population, hard decisions about where and how to distribute the laptopsmust be made.
There are philosophical goals to the project, in addition to the technical ones. Laptops
were chosen in part because they can be taken home and can engage the whole family.A stated intent is that children will own their laptops, though these may be among the
most expensive and novel personal items in their neighborhood.
24 From the One Laptop Per Child FAQ: http://laptop.org/faq.en_US.html (viewed November
8, 2006).
http://laptop.org/faq.en_US.htmlhttp://laptop.org/faq.en_US.html -
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
29/90
27
The development of a deployment and education plan from the design of software
and content to be included on the machine, to research and suggestions on how toimplement an effective One Laptop per Child teaching environment is one of the morerecent project goals to take form. OLPC is currently soliciting input on how to proceed
with and study this goal.25 While OLPC is an educational project, this effort is not simply
a question of pedagogy. Distributing millions of laptops to areas where computers arescarce, and providing every member of a communitys youngest generation with a
world view and with exotic tools and knowledge completely foreign to their elders,
disrupts the status quo in a significant way.
The question of how to select content, distribute the laptops, and recommend their uses,
so as to produce desired change without unwanted social and cultural upheaval, is a crucial
question and one on which many groups may wish to engage. For an initiative of its size, OLPCis unusually open to suggestions; the project has a publicly editable list of tasks that includes
a request for panels of thinkers to study some of these issues and propose improvements
and recommendations.26
25 From http://wiki.laptop.org/wiki/OLPC_software_task_list#Eductional_community_engagement
(viewed November 8, 2006): We propose including other intellectuals, artists, civic leaders in order
to provide a diversity of experience and expertise.26 Id., http://wiki.laptop.org/wiki/OLPC_software_task_list#Strategic_research (viewed November
8, 2006).
http://wiki.laptop.org/wiki/OLPC_software_task_list#Eductional_community_engagementhttp://wiki.laptop.org/wiki/OLPC_software_task_list#Strategic_researchhttp://wiki.laptop.org/wiki/OLPC_software_task_list#Strategic_researchhttp://wiki.laptop.org/wiki/OLPC_software_task_list#Eductional_community_engagement -
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
30/90
28
With the increasing importance of ICTsin the world comes a growing needto recognize the ethical ramificationsof new technologies. Moreover, therapid rate of technological changedemands that we understand emer-ging technologies and their potentialeffects as they are being developed,and not wait until the consequencesare manifest before we prepare for
them. By understanding tomorrowstechnologies in light of infoethicsgoals, society can better anticipatetheir effects and deploy them in amanner that leverages their benefitswhile mitigating potential harms.
The following case studies highlightsome of these technologies and flag
many of the infoethics concerns thataccompany them.
The Semantic Weband Other Metadata
What the Semantic Web Is
The Internet was conceived as amechanism to allow humans to initi-
ate the exchange of text, images, andother information. With the exponentialgrowth of content available on theInternet, however, this is increasinglybecoming impractical. Search enginesseek to mitigate this problem by provi-ding a tool to navigate the web, butthey provide only a partial solution. Tomake the web fully navigable, interop-
erable metadata, or data about data, isrequired. This metadata can also serve tomake the web more machine-readable,allowing computers to evolve fromdumb tools to intelligent agents. Thesemantic web27 promises to offer suchmetadata.
The Ethical Challenges of
Emerging Technologies -
Case Studies
27 The Semantic Web is an offi cial project of the World Wide Web Consortium, which was
founded by Tim Berners-Lee, the webs inventor.
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
31/90
The Ethical Challenges of Emerging Technologies - Case Studies
29
How the Semantic Web
Works
The Internet existed for nearly threedecades before it took off as a popularmedium for information and commu-nication.28 Although the Internet wasbased on common computer lan-guages, or code, from the start (TCP/IP,SMTP, etc.), what triggered its uptakewas the royalty-free nature of the lan-guages of the World Wide Web (web) that is, HTML and HTTP and thefact that HTML was particularly user-friendly. These two languages allowedthe loose coupling of machinesinvolved in exchanging information meaning any web client seeking
information could talk to any webserver, which could then providethat information remotely, in a formthat people could enjoy. Internetusage increased dramatically, and thisphenomenon spurred the creation ofmore content, which in turn gave riseto more exchange.
Given the high volume of web content,the semantic web is being designedto create a universal medium forthe exchange of data29 using thesame loose coupling properties forprogrammatic data as there was forhuman-rendered data with HTML.
This new language should provide
predictability in a cyberspace ofever growing exchanges, with thevocabulary of metadata lendinggreater precision as computers accessand analyze content directly.
The semantic web combines a setof computer languages30 to providemachine-readable descriptions ofweb content. This metadata may becreated by humans or computers,and is designed to provide contextabout the content without requiringa person or machine to actually parsethe content. Once a piece of informa-tion is tagged, the semantic web canreason about it and develop contex-
tual meanings based on observationsabout connections that the pieceof information has with others. Thisenables machines to search web sitesand carry out tasks in a standardizedway.
Although the name refers to web, thisinitiative is geared toward enabling
machines to handle data among arange of Internet applications.
28 See History of the Internet (Wikipedia entry), http://en.wikipedia.org/wiki/Internet_history
(viewed November 8, 2006).29 Seehttp://www.w3.org/Consortium/activities#SemanticWebActivity.30 For example, Resource Description Framework (RDF), Web Ontology Language (OWL),
and Extensible Markup Language (XML).
http://en.wikipedia.org/wiki/Internet_historyhttp://www.w3.org/Consortium/activities#SemanticWebActivityhttp://www.w3.org/Consortium/activities#SemanticWebActivityhttp://en.wikipedia.org/wiki/Internet_history -
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
32/90
The Ethical Challenges of Emerging Technologies - Case Studies
30
Ramifications and Concerns
The wealth of content available oninformation networks, particularly theInternet, is useful only if people canactually find and access the informa-tion that they need. The semanticweb allows people to use computersas agents to search for appropriatecontent based on a wide range ofcriteria which could include thepublic domain or intellectual propertystatus of the content, alternate sourcesof the content in different formats orlanguages, or even the existence ofevidence serving to refute the viewoffered in the content.
The wealth of content is closelyrelated to the Internet explosion,which is often credited to the networkneutrality principle that holds thatall traffi c should be treated equally.Oddly, the semantic web could cutagainst this neutrality by equippingparties with tools to filter Internetcontent based on its associated
metadata: ISPs, routers, or searchengines could use the metadata todistinguish between types of contentand grant preferential treatment tocertain traffi c, raising barriers to entry
for new service or content providers.
In this regard, the semantic websmachine-readable labels could markcontent for discrimination and reducethe ability of users to generate andshare material.
Moreover, some would contend that,in giving users the ability to accessonly the content that they desire, thesemantic web could damage publicdiscourse. The theory here is that fullparticipation in society requires aforum in which a person can make hisvoice heard, but that the semantic weband other technologies allow otherusers fully to customize their experi-ences and to receive only the content
that they explicitly request. In otherwords, the semantic web enablesend-user insularity and so indirectlydestroys the forum. Here again, theworry is that the semantic web couldin fact harm the very connectivity thatit was designed to promote.31
More theoretically, machines must
be programmed to categorize andassign values to information so that,for example, personal data can bedistinguished from weather patternsand flagged as warranting privacy. In
31 See Cass R. Sunstein, The Daily We, Boston Review (Summer 2000), available athttp://www.bostonreview.net/BR26.3/sunstein.html. Others would argue, however, that even a
seemingly low rate of exposure to differing views via the Net (e.g., 15 per cent) may suggest
greater public dialogue than had previously been the case. See work by Eszter Hargittai,Cross-Ideological Conversations among Bloggers, http://crookedtimber.org/2005/05/25/
cross-ideological-conversations-among-bloggers/ visited November 8, 2006 (describing
work by Eszter Hargittai, Jason Gallo and Sean Zehnder analyzing cross-linkages among
liberal and conservative political blogs).
http://www.bostonreview.net/BR26.3/sunstein.htmlhttp://www.bostonreview.net/BR26.3/sunstein.htmlhttp://crookedtimber.org/2005/05/25http://crookedtimber.org/2005/05/25http://www.bostonreview.net/BR26.3/sunstein.htmlhttp://www.bostonreview.net/BR26.3/sunstein.html -
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
33/90
The Ethical Challenges of Emerging Technologies - Case Studies
31
this sense, there are risks inherent in
designing tools simply to exchangeinformation without simultaneouslycoding them to assign a highervalue to data relating to humans.Safeguarding human rights mayrequire programming computers toput personal data on a higher plane.
Still, one should not overstate thedangers of the semantic web. Afterall, these harms are possible evenwithout metadata and are far fromcertain to occur even with metadata.
On balance, it seems the semanticweb will support the goal of promot-ing access to information by making
existing content far easier to identify,locate, and use.
Digital Identity
Management
The previous case study discussedhow metadata is allowing increasinglysophisticated machine-to-machineexchanges. This increase in commu-nication between machines createsthe potential for good or harmful con-sequences, such as the lowering of
transaction costs in commerce or thelaunching of malicious virus attacks.
This section first looks at how the
automated exchange of data isdriving the need for digital identitymanagement tools that afford bettercontrol over the flow of personalinformation. It sets the stage for thenext case study, which explores how,through biometrics, metadata cango beyond a persons diverse digitalpersonae to pinpoint an embodiedperson.
What Digital Identity
Management Is
Simply stated, digital identity man-agement concerns the control of
digitized information pertaining toa person. This information is some-times referred to as personal data, orpersonally identifiable information.
This latter term more precisely sug-gests that the data can be linked tothe specific individual involved.
As originally designed, the architecture
of the Internet did not provide a mech-anism to verify, or authenticate, theidentities of users. Its designers wereworking in a different time and culturefrom todays online environment, withthat early community of Internet userscomprising essentially a highly coop-erative, high-trust society of computer
scientists. The Internet they brought tobear reflected this culture.
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
34/90
The Ethical Challenges of Emerging Technologies - Case Studies
32
With the explosion in Internet
usage drawing strangers to interactat unprecedented rates, it is notsurprising that the once trustfulatmosphere of the Internet haschanged, and that people are startingto view the space with growingreserve. Put another way, the Internethas undergone a sort of urbanization,where more and more people aregravitating toward it for its benefits,but where the traditional sense ofcommunity has broken down andpeople find they must be on guard.Computer scientists are starting tosay: In retrospect, we should havedesigned an authentication layerinto the Internet. Now, with the
Internet scaled up large, and with somuch commerce passing over it, thepotential for fraud is enormous.32
E-commerce statistics bear witness tothis shift. Statistics published last yearshowed a sharp drop in the number
of consumers who feel comfort-
able participating in e-commerce.33People have learned to questionwhether the person or entity at theother end of a transaction is indeedwho he, she, or it claims to be, andpeople wonder if they can actuallyhold that other party accountableshould something in the exchangego awry. By responding to an emailor filling out an online form, will aperson be a victim of phishing orpharming?34
At the same time, it is natural forInternet users to lament the fact thatthey currently have to rememberpasswords and fill out all sorts of forms
when reserving a rental car, purchasinga book, or engaging in some othercommon transaction online. Althoughthis is a repetitive and often frustratingtask, people have been trained toprovide information in this way, anddo so without thinking.35
32 Interview with Paul Trevithick, Project Lead of the Eclipse Foundations Higgins Trust
Framework project, August 2005.33 Riva Richmond, Internet Scams, Breaches Drive Buyers Off the Web, Survey Finds, Wall
Street Journal, June 23, 2005, p. B3, reporting on a Gartner study of 5000 online consumers.
The article states that more than 42% of online shoppers and 28% of those who bank
online are cutting back on these activities due to security and privacy issues.34 David Bank and Riva Richmond explain in Information Security: Where the Dangers Are,
Wall Street Journal, July 18, 2005: In phishing scams, fraudsters send emails that appear
to come from a trusted source, like Citibank or eBay. Click on a link in the email, and youredirected to a fake Web site, where youre asked to reveal account numbers, passwords
and other private information Then theres pharming, where hackers attack the server
computers where legitimate Web sites are housed. Type in the address of the legitimatesite, and you are redirected to a look-alike.
35 This point is often made by Kim Cameron, Microsofts Identity and Access Architect. He
reminds industry colleagues that people are not stupid, but rather they have been given
poor tools for interacting online.
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
35/90
The Ethical Challenges of Emerging Technologies - Case Studies
33
Industry specialists say that digital iden-
tity management tools will allow onlineexchanges to be much more secureand convenient, as this technology willenable enhanced control over digitizedinformation relating to a person.36
Consumers have to date not em-braced this technology because ithas not yet been presented in a formthey are willing to accept. Microsoftis still smarting from its past experi-ence trying to provide such tools,37and other technology companieshave taken note: People do not wanta single, powerful company to be atthe center of their trust relationshipsor to occupy a monopoly position in
handling their personal data.
Technology developers38 are there-fore now focusing on user-centricapproaches to digital identity man-agement. In this new paradigm, aperson will choose among differentidentity providers to take care of hispersonal data, with his permission
then required for that identity providerto pass his information to anotherperson or entity in a transaction;
meanwhile, the new system will also
verify the identity of that other partyto the transaction.
How Digital Identity
Management Works
This user-centric identity model hastwo primary parts: one that handlesthe exchange of identity informa-tion as it passes between endpointcomputers or devices, and the otherthat helps a user manage his iden-tity information on his computer. Forthe part between devices, this newsystem may be thought of as a setof rules for exchanging information39
(called computer protocols) in theform of packaged, sealed tokens.
The user can hire whatever identityprovider he wants to guarantee hisinformation and package it intotokens, even employing different pro-viders for different purposes (e.g., oneto handle credit card details; anotherto manage core personal information
like name and date of birth; anotherto process medical records; etc.).Identity providers may reside on a
36 See, e.g., Kim Camerons Identity Weblog at http://www.identityblog.com/, Dick Hardts
Identity 2.0 weblog at http://www.identity20.com/, and others available at http://www.
identitygang.org/individuals.37 In the past several years the market has largely rejected Microsofts Passport identity
management systems. The market also resoundingly rejected Passports predecessor,
Hailstorm.38 OpenID, Sxip, the Liberty Alliance, Shibboleth, Passel, and other industry players have joined
Microsoft in the quest to provide identity management tools that the market will accept.39 A consortium involving Microsoft, IBM, and other technology firms developed the
standards for this exchange as part of a larger set of standards for web services.
http://www.identityblog.com/http://www.identity20.com/http://www/http://www/http://www.identity20.com/http://www.identityblog.com/ -
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
36/90
The Ethical Challenges of Emerging Technologies - Case Studies
34
persons computer or device, or they
may be located elsewhere, accessiblethrough the Internet.
So, for example, when a person wantsto conduct an online transaction, thecomputer or device on the otherpartys end (in industry parlance, therelying party) will indicate to hisagent what package of informationis needed. The agent will then requesta token containing these claims fromone or more identity providers thatthe person has entrusted with thisinformation; the identity provider(s)will then pass the token to the relyingparty. A person can supervise thisexchange every time it occurs, or he
can do so once and then opt to let theexchange take place automaticallyhenceforth.
The second part of the system is whattakes place on a persons computeror device. Instead of rememberingpasswords or typing in an array ofinformation in an online order form, a
person conducting e-commerce willsimply choose a visual representationor icon of the particular packageneeded (e.g., an icon symbolizingbanking, medical, or tax information).When he chooses that icon, his agentinitiates a call for the release of digitaltokens by identity providers to the
relying party, as described above.The agent will be able to operate onall sorts of devices, be they desktop
computers or cellular phones or other
mobile devices. This agent will be thesole component of the digital identitysystem with which the user will needto authenticate himself directly (e.g.,through a fingerprint scan).
As the trusted intermediary, a personsidentity agent will sit at the center ofthe users communication and haveaccess to all identity informationexchanged. It will unwrap a token andtranslate the claims from one systemslanguage into a format recognizableto another. To protect privacy insofaras possible, this trusted intermediarywill ideally keep to a minimum theamount of information disclosed for
a given transaction. In many cases,this may require that the informationin a given token be transformed intoan alternate token correspondingwith a specific request. For example,the intermediary will be able to takeinformation from a token vouchingthat a person was born on a specificdate (e.g., July 20, 1969) and translate
it so that the new claim revealsnothing more than that the person isindeed over 21 years old.
Putting theory into practice, Microsoftis planning to roll out a user-friendlytoken exchange system with visualicons called Cardspace that will
resemble cards that people currentlycarry in their wallets, such as a driverslicense, a credit card, etc. While the
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
37/90
The Ethical Challenges of Emerging Technologies - Case Studies
35
plan is to introduce this system in
the new version of Windows, calledWindows Vista,40 the digital identitysystem will also be available in up-grades for Windows XP. Microsoft hasbeen on the private campaign trailto convince big e-commerce playerslike Amazon and eBay to accept thesenew services in exchange for moredirect access to Microsoft custom-ers. Because so many people alreadyuse Windows XP, the spread of theseservices will not hinge on widespreadadoption of the newer Windows Vista.Given the fact that Windows XP runson hundreds of millions of machinestoday, these digital identity manage-ment tools have a strong probability
of taking root.
Meanwhile, IBM and Novell in February2006 announced their intention tooffer programming code to allow forsimilar digital identity managementtools to be built using open-sourcesoftware. The project, named Higgins,will enable different identity manage-
ment tools to interoperate.41 Ratherthan managing digital identities itself,Higgins overlays different systemsin order that information might beexchanged among them at a users
request.42 One attractive prospect
is portability in reputation systems,which would allow, for example, aperson to take the reputation he hasbuilt up in the eBay43 community andcarry it over into the world of SecondLife.44 The technical requirements forsuch portability are just starting to beexplored.
Ramifications and Concerns
The new digital identity manage-ment tools promise to cut todaysphishing and pharming and may alsoaddress spam problems. Since anidentity agent can help to minimize
data disclosed to a merchant or otherentity with which a person interacts,the technology may boost privacy asit minimizes the number of entitiesthat have access to an individualsprofile. Perhaps most significantly,the systems distributed architectureshould reduce vulnerability to attacksince theoretically data is not con-
centrated in one place.
If the system can protect personaldata in this way, digital identitymanagement has many possible ben-
40 Worldwide availability of Windows Vista is scheduled for early 2007.41 The Eclipse Foundation, an open-source community, manages Higgins.42 Interviews with John Clippinger, a senior fellow at the Berkman Center for Internet and
Society at Harvard Law School, Fall 2005.43 See http://pages.ebay.com/services/forum/feedback.html describing the eBay reputation
system (viewed November 8, 2006).44 Seehttp://secondlife.com/whatis/describing the 3-D virtual world of Second Life (viewed
November 8, 2006).
http://pages.ebay.com/services/forum/feedback.htmlhttp://secondlife.com/whatishttp://secondlife.com/whatishttp://secondlife.com/whatishttp://pages.ebay.com/services/forum/feedback.html -
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
38/90
The Ethical Challenges of Emerging Technologies - Case Studies
36
efits to society, including preventing
malicious conduct and making theInternet a better forum for commerce.From this vantage point, the techno-logy promotes privacy, security, andimproved living standards.
So, too, tools enabling the exchangeof personal data based on an indi-viduals preferences may facilitatesocial interactions. Paul Trevithick,Project Lead for Higgins, emphasizesthe benefits of a user-centered net-working layer that gives people morecontrol over their digital identitiesacross a wide variety of computer-mediated contexts (e.g., email, instantmessaging, e-commerce, shared
spaces, and enterprise directories),especially those involving social net-works.45 In this way, digital identitymanagement tools may serve as aboon to freedom of assembly.
Looked at from another perspective,however, the existence of digitalidentity management systems could
pose significant risks for privacy andsecurity. As noted, in the proposedarchitecture a persons identity agentwill serve as the most trusted inter-mediary in the new digital identitysystem; however, current technologyprovides no guarantee that a personsidentity agent will not collude with
the other parties to a transaction (i.e.
identity providers and relying parties).
In addition, it is quite conceivable thatthe market will not support the hostof identity providers that advocatesof systems speak of, but that insteadthere will be a natural concentrationin identity provisioning. Quite simply,users might find it inconvenient orexpensive to separate their data anddesignate elements to different iden-tity providers. Or, relying parties mightbe restrictive in recognizing identityproviders, with the result that a lim-ited set of identity providers woulddominate the market. Either way, asmall number of identity providers
would have control over a great dealof personal data. Moreover, givencurrent designs of the system, it istechnically possible for identity pro-viders and relying parties to collude.In other words, it is unclear how theplayers in the identity managementinfrastructure will be accountable tousers and the Information Society
generally.46 Of course, the market mayspur improved technologies whosearchitecture guarantees trustworthybehavior, and the law may well rein-force these incentives.47
To some, the primary infoethics con-cern is what happens if a big player
45 Interview with Paul Trevithick, September 20, 2005.46 Mary Rundle and Ben Laurie, Identity Management as a Cybersecurity Case Study,
Berkman Center Publication Series, September 2005, p. 8.47 Microsoft took a strong stance advocating privacy legislation in 2006.
-
7/31/2019 Ethical Implications of Emerging Technologies - Unesco 2007
39/90
The Ethical Challenges of Emerging Technologies - Case Studies
37
e.g., a government or a mega-
corporation usurps a distributed,user-centric identity system and ap-plies its own globally unique identifier,violating all the user-centric principlesthat industry developers have ad-vertised. In other words, there arecurrently no innate technological pro-tections regarding possible future usesof these tools. If the tools were usedthroughout the Information Societyin an abusive manner to discriminate,intimidate, and block communication,human rights and related infoethicsgoals would be in serious jeopardy.
The magnitude of these effectsshould not be underestimated given
the revolution that digital identitymanagement may bring in machine-to-machine interactions, or webservices. Dale Olds, a key Novellengineer in this area, has indicatedthat Higgins may seek to developan additional technology that wouldautomatically transfer informationfrom an individuals given digital
identity (or persona) when he visits aweb site.48 It may be here that digitalidentity management tools will havetheir strongest impact: By enablingmachines to exchange personal dataautomatically on peoples behalf, thetools will throw off one of the biggestimpediments to web services. Hence,
the empowering of machines in this
way could ignite an explosion inmachine-to-machine interaction.
Machine empowerment points toperhaps the biggest unknown andthe one with the greatest potentialimpact concerning not what humansmay do with these tools, but ratherhow machines will treat humans withpersonal data so well organized. KimCameron, Microsofts chief Identityand Access Architect, underscoresthese apprehensions:
The broader aspects of the waynetwork intelligence respondsto who we are is of much more
concern to me when I thinkforward twenty years Beyondthe abuse of power there areother equally chilling possiblefutures involving the potentialrelationship between humankind and machine intelligence.I realize people are not likely towant to discuss this because
it is too forward thinking, butthe two actually can mutuallyreinf