SlideShare a Scribd company logo
1 of 22
IOT/ETHICS
BUTLER PROJECT
LUXEMBOURG, 10TH SEPT 2012
PEOPLE


Job Timmermans, Researcher (ETICA project)
AGENDA
CAN WE TRUST OUR BUTLER?
  •   ISSUES & CHALLENGES
  •   VALUE SENSITIVE DESIGN
  •   TRUST
  •   CALL FOR PAPERS
CIA CHIEF PETRAEUS
“We’ll Spy on You Through Your Dishwasher”
Wired, March 15, 2012
AN ETHICS OF IOT?
Party Stopper
or
Unique Selling Point?


IOT raises ethics challenges and opportunities
related to
autonomy, security, equity, equality,
justice, access, discrimination,
data profiling, confidentiality, ….
ISSUES 1/3
Privacy & Security
Blurring of contexts: private vs. public
Informed Consent vs. Obfuscation of Functionality
Confidence vs. Trust
Agency: social contract between people and objects?
Non-neutrality of IoT Metaphores
ISSUES 2/3
Responsibility & Precautionary Principle
Responsible Innovation & Setting new standards
Social justice & Digital divide
Support solving existing problems
Adaptation to mediated environment
ISSUES 3/3
New organizational principles and institutional design
New ontology
Fair distribution costs and benefits
Public acceptance of innovative technology
Technology lock-in
KEY PROBLEM
   21ST CENTURY:
   VALUE SENSITIVE DESIGN                                  Computers
                                                           Oiltankers
Responsibility                                             Airplanes
Privacy                                                    Reactors
Accountability                 Express                     Roads
Agency                        Implement                    Internet
Autonomy                                                   Electricity
Sustainability                                             Grids
Safety                                       Artefacts     Hospitals
Security          Values                  Architectures
                  Norms                     Materials
                                            Standards
                    Laws
                                             Security
                   Ideals                    Systems
                 Principles   Justify     Infrastructure
                               Audit
VALUE SENSITIVE
DESIGN
1. Conceptual investigations
2. (Empirical investigations)
3. Technical investigations
TRUST = IMPORTANT
IoT = disruptive
  •   Public / private blurred
  •   Unknown territory
  •   Feeling safe / secure
  •   Privacy requires Trust

Trust     User acceptation / adaptation
          Successful technology


Examples
  • Dutch Smart Metering roll out
  • Dutch Electronic Patient Record System
Smart
                                            mobile
                                           platform




 Smart
 server              Unifying
platform             BUTLER
                    Architecture
                 Secure, private, trustworthy
                     context capture
               Smart OSGi      Zigbee DPWS




                                                FreeRTOS


                                                             TinyOS
                                                   Contiki
           object/gateway    CoAP
              platform RPL          6LowPAN
                           IEEE 802.15.4
IOT + TRUST =
DIFFERENT
Real-life Impact
Many Unknowns
Defining features:
       •   Distributed / heterarchical structures
       •   Non deterministic / Smart behavior
       •   Dynamic configuration
       •   Obfuscation
       •   Heterogeneity
TRUST = VAGUE
Complex notion
Different meanings in Different disciplines
Conceptual muddle
Difficult to measure (no metrics/ methodologies)
DEFINITION OF TRUST
Accepted vulnerability
       to another's
              possible but not expected ill will
                                     (Friedman, Baier)
WHAT TO TRUST?
Others (E-Trust)
Institutions (Proper governance)
Systems (Technology Dependence)
TRUST VS
CONFICENCE
De-perimeterisation (De-p):
  • Passive                  Active insulation of data
  • Danger (nature)          Risk (manmade)
  • Confidence(no alt’s)     Trust (with alt’s)
                                       (Pieters, 2011)
TRUST VS
RELIABILITY
RELIABILITY
  • Thing – Person interaction
  • Interactively static
TRUST
  • Person – Person interaction
  • Interactively dynamic


Real People vs. ‘Internet’ People
                                    (Pettit, 2008)
TRUST: CRUCIAL
REQUIREMENT =CLUES
•Evidence of Face
•Evidence of Frame
•Evidence of File
               (Pettit, 2008)
REPUTATION SYSTEMS
Examples
  • Amazon
  • Google
  • Slashdot


Present Alternatives + Active system
Sources of Evidence
  • Face : online identity
  • Frame: Score by others
  • File : Aggregated reputation


 Decentralized / distributed reputation system
QUESTIONS?
CALL FOR PAPERS
Special Issue of Ethics and Information Technology (ETIN)
on the Internet of Things (IoT)

More Related Content

What's hot

Unit & Ubiquitous IoT for securing cyberentities
Unit & Ubiquitous IoT for securing cyberentitiesUnit & Ubiquitous IoT for securing cyberentities
Unit & Ubiquitous IoT for securing cyberentities
DikShaant Kripalani
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
Chidiogo Mbonu
 
Ehip4 caring through sharing privacy and-security-technical-aspects riccardo ...
Ehip4 caring through sharing privacy and-security-technical-aspects riccardo ...Ehip4 caring through sharing privacy and-security-technical-aspects riccardo ...
Ehip4 caring through sharing privacy and-security-technical-aspects riccardo ...
imec.archive
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
Ecway Technologies
 
Debugging the internet of things the case of wireless sensor networks
Debugging the internet of things the case of wireless sensor networksDebugging the internet of things the case of wireless sensor networks
Debugging the internet of things the case of wireless sensor networks
ieeeprojectsbangalore
 

What's hot (19)

What is io t
What is io tWhat is io t
What is io t
 
Unit & Ubiquitous IoT for securing cyberentities
Unit & Ubiquitous IoT for securing cyberentitiesUnit & Ubiquitous IoT for securing cyberentities
Unit & Ubiquitous IoT for securing cyberentities
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of things: dispelling common myths
Internet of things: dispelling common myths Internet of things: dispelling common myths
Internet of things: dispelling common myths
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
Living life on the edge - Thingmonk 2016
Living life on the edge - Thingmonk 2016 Living life on the edge - Thingmonk 2016
Living life on the edge - Thingmonk 2016
 
PhD Projects in IoT Network Simulator Research Guidance
PhD Projects in IoT Network Simulator Research GuidancePhD Projects in IoT Network Simulator Research Guidance
PhD Projects in IoT Network Simulator Research Guidance
 
Internet of Things (IoT): Readme
Internet of Things (IoT): ReadmeInternet of Things (IoT): Readme
Internet of Things (IoT): Readme
 
Ehip4 caring through sharing privacy and-security-technical-aspects riccardo ...
Ehip4 caring through sharing privacy and-security-technical-aspects riccardo ...Ehip4 caring through sharing privacy and-security-technical-aspects riccardo ...
Ehip4 caring through sharing privacy and-security-technical-aspects riccardo ...
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
Resilience as a new Enforcement Model for IT Security based on Usage Control
Resilience as a new Enforcement Model for IT Security based on Usage ControlResilience as a new Enforcement Model for IT Security based on Usage Control
Resilience as a new Enforcement Model for IT Security based on Usage Control
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
IoT Architecture
IoT ArchitectureIoT Architecture
IoT Architecture
 
Debugging the internet of things the case of wireless sensor networks
Debugging the internet of things the case of wireless sensor networksDebugging the internet of things the case of wireless sensor networks
Debugging the internet of things the case of wireless sensor networks
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 
Sport && Wellness Hackathon
Sport && Wellness  HackathonSport && Wellness  Hackathon
Sport && Wellness Hackathon
 

Viewers also liked (8)

Combining OSGi technology and Web Services to realize the plug-n-play dream i...
Combining OSGi technology and Web Services to realize the plug-n-play dream i...Combining OSGi technology and Web Services to realize the plug-n-play dream i...
Combining OSGi technology and Web Services to realize the plug-n-play dream i...
 
CV_APR_2016_VLorenzetti
CV_APR_2016_VLorenzettiCV_APR_2016_VLorenzetti
CV_APR_2016_VLorenzetti
 
Presentacion del contexto interno y externo
Presentacion  del contexto interno y externoPresentacion  del contexto interno y externo
Presentacion del contexto interno y externo
 
IMAGE Presentation1
IMAGE Presentation1IMAGE Presentation1
IMAGE Presentation1
 
U.S. Access Board- PROW comments FELDMAN 11 23 11
U.S. Access Board- PROW comments FELDMAN 11 23 11U.S. Access Board- PROW comments FELDMAN 11 23 11
U.S. Access Board- PROW comments FELDMAN 11 23 11
 
Catholic Social Teaching
Catholic Social TeachingCatholic Social Teaching
Catholic Social Teaching
 
بعض اساسيات البرمجة
بعض اساسيات البرمجةبعض اساسيات البرمجة
بعض اساسيات البرمجة
 
Introduction to Catholic Social Teaching - Session 1
Introduction to Catholic Social Teaching - Session 1Introduction to Catholic Social Teaching - Session 1
Introduction to Catholic Social Teaching - Session 1
 

Similar to BUTLER IoT - Luxemburg presentation 8 9-12

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 

Similar to BUTLER IoT - Luxemburg presentation 8 9-12 (20)

Jacques Bus F I I R L Presentation J B
Jacques  Bus  F I  I R L  Presentation  J BJacques  Bus  F I  I R L  Presentation  J B
Jacques Bus F I I R L Presentation J B
 
Smart health
Smart healthSmart health
Smart health
 
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
SMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  OpportunitiesSMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  Opportunities
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
 
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptx
 
IOT presentation.pptx
IOT presentation.pptxIOT presentation.pptx
IOT presentation.pptx
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
 
Internet of Things (IoT) from a business Perspective
Internet of Things (IoT) from a business PerspectiveInternet of Things (IoT) from a business Perspective
Internet of Things (IoT) from a business Perspective
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of Things
 
The Internet of Things (IoT)
The Internet of Things (IoT)The Internet of Things (IoT)
The Internet of Things (IoT)
 
Roberto Minerva: iot challenges - IoT Tunisia 2016
Roberto Minerva:  iot challenges  - IoT Tunisia 2016Roberto Minerva:  iot challenges  - IoT Tunisia 2016
Roberto Minerva: iot challenges - IoT Tunisia 2016
 
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURESON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
 
IOT.pptx
IOT.pptxIOT.pptx
IOT.pptx
 
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Iot 7-12-2021
Iot 7-12-2021Iot 7-12-2021
Iot 7-12-2021
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

BUTLER IoT - Luxemburg presentation 8 9-12

  • 3. AGENDA CAN WE TRUST OUR BUTLER? • ISSUES & CHALLENGES • VALUE SENSITIVE DESIGN • TRUST • CALL FOR PAPERS
  • 4. CIA CHIEF PETRAEUS “We’ll Spy on You Through Your Dishwasher” Wired, March 15, 2012
  • 5. AN ETHICS OF IOT? Party Stopper or Unique Selling Point? IOT raises ethics challenges and opportunities related to autonomy, security, equity, equality, justice, access, discrimination, data profiling, confidentiality, ….
  • 6. ISSUES 1/3 Privacy & Security Blurring of contexts: private vs. public Informed Consent vs. Obfuscation of Functionality Confidence vs. Trust Agency: social contract between people and objects? Non-neutrality of IoT Metaphores
  • 7. ISSUES 2/3 Responsibility & Precautionary Principle Responsible Innovation & Setting new standards Social justice & Digital divide Support solving existing problems Adaptation to mediated environment
  • 8. ISSUES 3/3 New organizational principles and institutional design New ontology Fair distribution costs and benefits Public acceptance of innovative technology Technology lock-in
  • 9. KEY PROBLEM 21ST CENTURY: VALUE SENSITIVE DESIGN Computers Oiltankers Responsibility Airplanes Privacy Reactors Accountability Express Roads Agency Implement Internet Autonomy Electricity Sustainability Grids Safety Artefacts Hospitals Security Values Architectures Norms Materials Standards Laws Security Ideals Systems Principles Justify Infrastructure Audit
  • 10. VALUE SENSITIVE DESIGN 1. Conceptual investigations 2. (Empirical investigations) 3. Technical investigations
  • 11. TRUST = IMPORTANT IoT = disruptive • Public / private blurred • Unknown territory • Feeling safe / secure • Privacy requires Trust Trust User acceptation / adaptation Successful technology Examples • Dutch Smart Metering roll out • Dutch Electronic Patient Record System
  • 12. Smart mobile platform Smart server Unifying platform BUTLER Architecture Secure, private, trustworthy context capture Smart OSGi Zigbee DPWS FreeRTOS TinyOS Contiki object/gateway CoAP platform RPL 6LowPAN IEEE 802.15.4
  • 13. IOT + TRUST = DIFFERENT Real-life Impact Many Unknowns Defining features: • Distributed / heterarchical structures • Non deterministic / Smart behavior • Dynamic configuration • Obfuscation • Heterogeneity
  • 14. TRUST = VAGUE Complex notion Different meanings in Different disciplines Conceptual muddle Difficult to measure (no metrics/ methodologies)
  • 15. DEFINITION OF TRUST Accepted vulnerability to another's possible but not expected ill will (Friedman, Baier)
  • 16. WHAT TO TRUST? Others (E-Trust) Institutions (Proper governance) Systems (Technology Dependence)
  • 17. TRUST VS CONFICENCE De-perimeterisation (De-p): • Passive  Active insulation of data • Danger (nature)  Risk (manmade) • Confidence(no alt’s)  Trust (with alt’s) (Pieters, 2011)
  • 18. TRUST VS RELIABILITY RELIABILITY • Thing – Person interaction • Interactively static TRUST • Person – Person interaction • Interactively dynamic Real People vs. ‘Internet’ People (Pettit, 2008)
  • 19. TRUST: CRUCIAL REQUIREMENT =CLUES •Evidence of Face •Evidence of Frame •Evidence of File (Pettit, 2008)
  • 20. REPUTATION SYSTEMS Examples • Amazon • Google • Slashdot Present Alternatives + Active system Sources of Evidence • Face : online identity • Frame: Score by others • File : Aggregated reputation  Decentralized / distributed reputation system
  • 22. CALL FOR PAPERS Special Issue of Ethics and Information Technology (ETIN) on the Internet of Things (IoT)

Editor's Notes

  1. Introduction of people involved in this presentation:Jeroen – leader of Ethics subgroupFrancien – researcher, related project: ethical and societal aspects of reconfigurable sensor technologyJob – researcher, related project: emerging technologies (ETICA), refer to Monday’s presentation
  2. This quote illustrates the enormous impact IoT may have on the possibilities for information gathering.For the good and for the bad (dual use). This raises issues of privacy, trust, autonomy etc which need to be anticipated in the rollout and development of the technology.
  3. We should take the opportunity to involve ethical and societal aspects in the design of new technology.