SlideShare ist ein Scribd-Unternehmen logo
1 von 14
27/08/2018 IHSA 2018 iTRACK Project
Katrina
Petersen, Olivia
Iannelli,
TRILATERAL
RESEARCH
Ethics and Technology in
Humanitarian Settings: an
iTRACK case study
Examining how the social-cultural intersect with the ethical in
humanitarian technology design and use
For example:
• What cultural considerations need to be taken into account to
really understand how privacy is a public good?
• How do cultural considerations change what is ethically
acceptable or desirable?
The iTRACK system
Keep track of humanitarian workers in the field
Support planners/workers’ situational awareness & decisions
Approach
• Literature review
• iTRACK’s various components were tested in a simulation
exercise
• Interviews with key stakeholders
• Synthetisation of findings
Movement
in space
Classification and
sorting
Qualifying
risk
The iTRACK system
StaffSense
Mobile application for encrypted
asynchronous communication in field
Users can:
• Communicate with headquarters, users
• Receive notifications and alerts
• Send location-based threat messages
• Turn on tracking
• Use a panic button
Enhanced situational awareness
proactive warning and alerting
Mobile DSE
Mobile DSE Application
• Dashboard for convoy navigation and
routing
• Sends real-time convoy location to the
centralized system
Improved navigation and mission re-
routing (in case of threats)
Improved mission planning and
organisation
On board threat detection
Real-time detection of threats and critical
events
• Records 3D 360° HDR panoramic
images and video
• Uses machine learning to detect
landmarks and objects
• Uses landmarks to estimate vehicle
location and trajectory
• Sends real-time alerts to users
Automatically detects potential threats
around the vehicle
Notifies users and headquarters
Movement in Space
Ethical responsibility towards
personal privacy
Social responsibility towards
worker safety
Cultural responsibility towards
local context
When a worker is off duty, they
are not monitored
“Off-duty” is not a clear
category when deployed in a
crisis zone
Movement patterns can help
understanding of communities
being served
Sorting and classification
"(1) pre-existing social values found in the ‘social institutions,
practices and attitudes’ from which the technology emerges, (2)
technical constraints and (3) emergent aspects of a context of
use” (Friedman & Nissenbaum, 1996)
‘‘the values of the author [of an algorithm], wittingly or not, are
frozen into the code, effectively institutionalising those values’’
(Macnish, 2012)
Qualifying Risk
“When the location where the humanitarian workers reside when
being off-duty does not pose any safety risks, the devices can be
turned off” iTRACK designer
“When complex algorithms and big data sets are used to make
decisions, it can be difficult to work out exactly what factors
influenced that decision, and to what extent” (Murray & Fussey,
2018)
Safety Risk depends on a range of factors:
Context, Experience, Familiarity, Timing, Frame of Reference
Because blame can potentially be assigned to several moral
agents simultaneously (Mittelstadt et al, 2016) and to avoid
creating an “accountability gap” (Cardona, 2008), iTrack has to be
transparent about how it approaches security, threats, and
ethical principles.
It has be clear about:
How to define responsibility?
How to define justice and fair treatment?
What is privacy, as a right, intended to offer?
What elements of a situation need to be considered when
determining if acts are ethical?
What is a user required to know about a system?
Contact us
Website: http://www.itrack-project.eu/
Twitter : @iTRACKProject1
E-mail:
Katrina.Petersen@trilateralresearch.com
Olivia.iannelli@trilateralresearch.com

Weitere ähnliche Inhalte

Ähnlich wie Ethics and technology in humanitarian setting

Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...ijtsrd
 
Technology and Evaluation Hitachi Paper
Technology and Evaluation Hitachi PaperTechnology and Evaluation Hitachi Paper
Technology and Evaluation Hitachi PaperAmeya Ashok Naik
 
Elastic cognitive systems 18 6-2015-dustdar
Elastic cognitive systems 18 6-2015-dustdarElastic cognitive systems 18 6-2015-dustdar
Elastic cognitive systems 18 6-2015-dustdardiannepatricia
 
PSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-PestotnikPSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-PestotnikMichael Woods, MD, MMM
 
SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )
SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )
SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )ijistjournal
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umarylandSara-Jayne Terp
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKTrilateral Research
 
Activity Streaming as Information X-Docking
Activity Streaming as Information X-DockingActivity Streaming as Information X-Docking
Activity Streaming as Information X-DockingKai Riemer
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningIRJET Journal
 
Industry Standards as vehicle to address socio-technical AI challenges
Industry Standards as vehicle to address socio-technical AI challengesIndustry Standards as vehicle to address socio-technical AI challenges
Industry Standards as vehicle to address socio-technical AI challengesAnsgar Koene
 
An Ontological Framework For Structuring Process Knowledge Specified For The ...
An Ontological Framework For Structuring Process Knowledge Specified For The ...An Ontological Framework For Structuring Process Knowledge Specified For The ...
An Ontological Framework For Structuring Process Knowledge Specified For The ...Courtney Esco
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingIJNSA Journal
 
Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)Ansgar Koene
 
A Holistic Approach to Evaluating Social Media's Successful Implementation in...
A Holistic Approach to Evaluating Social Media's Successful Implementation in...A Holistic Approach to Evaluating Social Media's Successful Implementation in...
A Holistic Approach to Evaluating Social Media's Successful Implementation in...Connie White
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExEADTU
 
Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Roy Ramkrishna
 
On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...Grial - University of Salamanca
 

Ähnlich wie Ethics and technology in humanitarian setting (20)

Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...
 
Technology and Evaluation Hitachi Paper
Technology and Evaluation Hitachi PaperTechnology and Evaluation Hitachi Paper
Technology and Evaluation Hitachi Paper
 
Elastic cognitive systems 18 6-2015-dustdar
Elastic cognitive systems 18 6-2015-dustdarElastic cognitive systems 18 6-2015-dustdar
Elastic cognitive systems 18 6-2015-dustdar
 
PSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-PestotnikPSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
 
SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )
SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )
SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACK
 
Activity Streaming as Information X-Docking
Activity Streaming as Information X-DockingActivity Streaming as Information X-Docking
Activity Streaming as Information X-Docking
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
Industry Standards as vehicle to address socio-technical AI challenges
Industry Standards as vehicle to address socio-technical AI challengesIndustry Standards as vehicle to address socio-technical AI challenges
Industry Standards as vehicle to address socio-technical AI challenges
 
An Ontological Framework For Structuring Process Knowledge Specified For The ...
An Ontological Framework For Structuring Process Knowledge Specified For The ...An Ontological Framework For Structuring Process Knowledge Specified For The ...
An Ontological Framework For Structuring Process Knowledge Specified For The ...
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
Isr in coin cadd
Isr in coin caddIsr in coin cadd
Isr in coin cadd
 
Sirris presentation
Sirris presentationSirris presentation
Sirris presentation
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)
 
A Holistic Approach to Evaluating Social Media's Successful Implementation in...
A Holistic Approach to Evaluating Social Media's Successful Implementation in...A Holistic Approach to Evaluating Social Media's Successful Implementation in...
A Holistic Approach to Evaluating Social Media's Successful Implementation in...
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
 
Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015
 
On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...
 

Mehr von Trilateral Research

Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...Trilateral Research
 
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Trilateral Research
 
Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Trilateral Research
 
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...Trilateral Research
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectTrilateral Research
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Trilateral Research
 
CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.Trilateral Research
 
Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Trilateral Research
 
Examining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceExamining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceTrilateral Research
 
A stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceA stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceTrilateral Research
 
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceEvolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceTrilateral Research
 
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesSocial Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesTrilateral Research
 
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Trilateral Research
 
ENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationTrilateral Research
 
Esports in the UK - privacy risks
Esports in the UK - privacy risksEsports in the UK - privacy risks
Esports in the UK - privacy risksTrilateral Research
 
Enhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelEnhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelTrilateral Research
 
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Trilateral Research
 
Key Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectKey Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectTrilateral Research
 

Mehr von Trilateral Research (20)

Star II sme hotline 21.01.20
Star II sme hotline 21.01.20Star II sme hotline 21.01.20
Star II sme hotline 21.01.20
 
Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...
 
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
 
Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...
 
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
 
Overview of CLARITY project
Overview of CLARITY projectOverview of CLARITY project
Overview of CLARITY project
 
CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.
 
Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis
 
Examining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceExamining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster Resilience
 
A stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceA stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilience
 
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceEvolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
 
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesSocial Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
 
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
 
ENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentation
 
Esports in the UK - privacy risks
Esports in the UK - privacy risksEsports in the UK - privacy risks
Esports in the UK - privacy risks
 
Enhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelEnhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national level
 
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
 
Key Outputs of the E-CRIME project
Key Outputs of the E-CRIME projectKey Outputs of the E-CRIME project
Key Outputs of the E-CRIME project
 

Kürzlich hochgeladen

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Kürzlich hochgeladen (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Ethics and technology in humanitarian setting

  • 1. 27/08/2018 IHSA 2018 iTRACK Project Katrina Petersen, Olivia Iannelli, TRILATERAL RESEARCH Ethics and Technology in Humanitarian Settings: an iTRACK case study
  • 2. Examining how the social-cultural intersect with the ethical in humanitarian technology design and use For example: • What cultural considerations need to be taken into account to really understand how privacy is a public good? • How do cultural considerations change what is ethically acceptable or desirable?
  • 3. The iTRACK system Keep track of humanitarian workers in the field Support planners/workers’ situational awareness & decisions
  • 4. Approach • Literature review • iTRACK’s various components were tested in a simulation exercise • Interviews with key stakeholders • Synthetisation of findings
  • 7. StaffSense Mobile application for encrypted asynchronous communication in field Users can: • Communicate with headquarters, users • Receive notifications and alerts • Send location-based threat messages • Turn on tracking • Use a panic button Enhanced situational awareness proactive warning and alerting
  • 8. Mobile DSE Mobile DSE Application • Dashboard for convoy navigation and routing • Sends real-time convoy location to the centralized system Improved navigation and mission re- routing (in case of threats) Improved mission planning and organisation
  • 9. On board threat detection Real-time detection of threats and critical events • Records 3D 360° HDR panoramic images and video • Uses machine learning to detect landmarks and objects • Uses landmarks to estimate vehicle location and trajectory • Sends real-time alerts to users Automatically detects potential threats around the vehicle Notifies users and headquarters
  • 10. Movement in Space Ethical responsibility towards personal privacy Social responsibility towards worker safety Cultural responsibility towards local context When a worker is off duty, they are not monitored “Off-duty” is not a clear category when deployed in a crisis zone Movement patterns can help understanding of communities being served
  • 11. Sorting and classification "(1) pre-existing social values found in the ‘social institutions, practices and attitudes’ from which the technology emerges, (2) technical constraints and (3) emergent aspects of a context of use” (Friedman & Nissenbaum, 1996) ‘‘the values of the author [of an algorithm], wittingly or not, are frozen into the code, effectively institutionalising those values’’ (Macnish, 2012)
  • 12. Qualifying Risk “When the location where the humanitarian workers reside when being off-duty does not pose any safety risks, the devices can be turned off” iTRACK designer “When complex algorithms and big data sets are used to make decisions, it can be difficult to work out exactly what factors influenced that decision, and to what extent” (Murray & Fussey, 2018) Safety Risk depends on a range of factors: Context, Experience, Familiarity, Timing, Frame of Reference
  • 13. Because blame can potentially be assigned to several moral agents simultaneously (Mittelstadt et al, 2016) and to avoid creating an “accountability gap” (Cardona, 2008), iTrack has to be transparent about how it approaches security, threats, and ethical principles. It has be clear about: How to define responsibility? How to define justice and fair treatment? What is privacy, as a right, intended to offer? What elements of a situation need to be considered when determining if acts are ethical? What is a user required to know about a system?
  • 14. Contact us Website: http://www.itrack-project.eu/ Twitter : @iTRACKProject1 E-mail: Katrina.Petersen@trilateralresearch.com Olivia.iannelli@trilateralresearch.com

Hinweis der Redaktion

  1. This is in part driven by semi-recent events that showed issues like privacy, autonomy, justice are cultural bound --german wings crash --increased realization within technology design that it is not just the organisational or individual practices that matter, but the contextual, situational, environmental. increase use of tech designed by EU projects outside of the EU
  2. One place that we’ve been exploring this work is in the project iTrack. EU funded: Horizon 2020 -- 3 years 12 Partners from 8 EU states and UNWFP Aim: next generation intelligent tracking platform Through things like threat detection, tracking of workers paths and other assets. tested in simulations with humanitarian practitioners. Pilot applications with the World Food Programme and iMMAP in the on-going conflict disasters in the Middle East.
  3. To be clear, itrack has not been tried in the active field yet. It is still being developed, so many of these conversations are potentials in order to get designer to consider the implications of their choices.
  4. I’m going to go into three different areas where ethics are frequently the conversation and try to try to raise some socio-cultural considerations for further thinking. Then, I’ll sum up some initial thoughts on what this could mean for those of us considering the ethics and technology in humanitarian settings.
  5. Let me tell you a bit more about iTrack. sensor development GIS, security & privacy, artificial intelligence, information management, risk analysis, humanitarian logistics.
  6. Location tracker can be turned off.
  7. Bc of privacy issues – no people Images not sent, just alerts and identifications (with percentages)
  8. A few systems create traces in real time of the movements of people and assets. These components can note if you enter a building or if you pause roadside for a while.   The designers are very aware of the privacy issues that come with this – learning from recent troubles with fitbits leaving traces of soldiers movements at military bases, specifically designing in the option to turn the tracking aspects off.   (Along with an elaborate scheme of access control, data aging, logging, and auditing)   However, while this manages one aspect of privacy, it raises others, others than can be seen when looking at the socio-cultural aspects.   This is because: Turning off a location tracker might disable the possibilities for the humanitarian organization to warn, and to find and evacuate humanitarian workers when an incident occurs in the location where they are 'off duty’.   We’ve had conversations with humanitarian workers who want to be protected and tracked to reduce safety risk. For them, privacy isn’t even an issue at hand. In their socio-cultural context, responsibility and safety is what matters. Privacy does not provide safety nor does it lead towards organisational responsibility.   By tracking humanitarian workers it could also be possible to enhance the safety of those they serve.   An advisor at the World Food Program we spoke to mentioned that this additional layer of surveillance may also make beneficiaries, particularly women, feel more comfortable and safe when dealing with humanitarian workers. These women would know these individuals are being tracked and therefore, more accountable for their actions.   So, what protection does privacy offer here? Humanitarian safety and security and responsibility might be in conflict with specific engagements towards privacy. Even more, privacy does not mean the same one place to the next…(Germanwings)     And even when on duty, interpreting the tracking data is not straightforward.   Interviewee: “We were driving in Sri lanka and our driver starts plucking leaves from a bush. He was collecting neems plants which if you give it to the local people it is considered an act of hospitality. The driver said that to enter into the community we should bring the women these neem leafs and they will take this as a sign that we are being culturally appropriate. When we arrived they were totally at ease and happy to see us and we had a successful meeting. Now you run that through iTRACK you stopped by the side of the road to go play in the bushes for 25 minutes is that an inefficiency or is that a mission success factor?”   Reverse question: what protection does tracking offer?
  9. “The fact is your system is never going to be able to detect that. There is no algorithm to detect whether you are hanging out with someone or doing something because you want to or because it is helping you get to your objective.”   No right answer   And these are harder to design for because many issues like this have no ”right” answer to compare against.   If you are working on facial recognition, eventually it does or does not correctly identify faces.   But if you are working on objects, threats, and privacy, we are talking apples and oranges where they both have the potential to be correct….depending.   For example, A child soldier carrying a gun could be considered a threat, due to the identification of a gun, but to label him or her as such would be far too simplistic.   In a conflict setting, many things, should not be interpreted as black and white but rather, have a variety of different social and cultural interpretations which vary from country to country and often from town to town.
  10. Going back to the tracking: This makes it a challenge when the designers say: “Of course, when the location where the humanitarian workers reside when being off-duty does not pose any safety risks, the devices can be turned off.” Or when they say they can quantify threat.   How do you define the risks and threats, then, that these questions of privacy and security are being framed around?   What factors do you consider? What definition of objects?   With the implementation of iTRACK the responsibility of threat identification, and therefore, security, could be shifted from the individual to somebody else, within his organisation, or at a distance in time and space (e.g. programmer) affecting a humanitarian worker’s dynamic with their organisation and peers as well as their freedom of choice,   Some of these conversations are old, like the way values are carried in algorithms, classifications systems, and   Some are still ongoing – think the challenges in facial and voice recognition or police profiling   Or those around justice and fair treatment. (like those around environmental justice).   Because some groups are more vulnerable than others and subject to disproportionate burdens. Fairness and justice for them mean something different for those in positions of power. So when defining the objects around us, these objects have different meanings and implications depending on:   Context, Experience, Familiarity, Timing, Frame of Reference