000 04546nam a22004815i 4500
001 978-94-007-6833-8
003 DE-He213
005 20140220082528.0
007 cr nn 008mamaa
008 130826s2014 ne | s |||| 0|eng d
020 _a9789400768338
_9978-94-007-6833-8
024 7 _a10.1007/978-94-007-6833-8
_2doi
050 4 _aQA76.9.C66
072 7 _aUBJ
_2bicssc
072 7 _aCOM079000
_2bisacsh
082 0 4 _a004
_223
100 1 _aPimple, Kenneth D.
_eeditor.
245 1 0 _aEmerging Pervasive Information and Communication Technologies (PICT)
_h[electronic resource] :
_bEthical Challenges, Opportunities and Safeguards /
_cedited by Kenneth D. Pimple.
264 1 _aDordrecht :
_bSpringer Netherlands :
_bImprint: Springer,
_c2014.
300 _aX, 252 p. 10 illus., 2 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLaw, Governance and Technology Series ;
_v11
505 0 _aContributors -- List of Abbreviations -- Acknowledgments; Kenneth D. Pimple -- 1. Introduction; Kenneth D. Pimple -- 2. Three Case Studies; Donald R. Searing and Elizabeth A.M. Searing -- 3. Health information in the background; Lisa M. Lee -- 4. Surveillance in the Big Data Era; Mark Andrejevic -- 5. We know where you are. And we're more and more sure what that means; Francis Harvey -- 6. Preserving life, destroying privacy; Cynthia M. Jones -- 7. When cutting edge technology meets clinical practice; Katherine D. Seelman, Linda M. Hartman, and Daihua Yu -- 8 Ethics and pervasive augmented reality; Bo Brinkman -- 9. This is an intervention; Katie Shilton -- 10. Applying “Moral Responsibility for Computing Artifacts” to PICT; Keith W. Miller -- 11. Principles for the ethical guidance of PICT; Kenneth D. Pimple -- Glossary -- Index.
520 _aThis book provides a wide and deep perspective on the ethical issues raised by pervasive information and communication technology (PICT) – small, powerful, and often inexpensive Internet-connected computing devices and systems. It describes complex and unfamiliar technologies and their implications, including the transformative potential of augmented reality, the power of location-linked information, and the uses of “big data,” and explains potential threats, including privacy invaded, security violated, and independence compromised, often through widespread and lucrative manipulation. PICT is changing how we live, providing entertainment, useful tools, and life-saving systems. But the very smartphones that connect us to each other and to unlimited knowledge also provide a stream of data to systems that can be used for targeted advertising or police surveillance. Paradoxically, PICT expands our personal horizons while weaving a web that may ensnare whole communities. Chapters describe particular cases of PICT gone wrong, but also highlight its general utility. Every chapter includes ethical analysis and guidance, both specific and general. Topics are as focused as the Stuxnet worm and as broad as the innumerable ways new technologies are transforming medical care. Written for a broad audience and suitable for classes in emerging technologies, the book is an example of anticipatory ethics – “ethical analysis aimed at influencing the development of new technologies” (Deborah Johnson 2010). The growth of PICT is outpacing the development of regulations and laws to protect individuals, organizations, and nations from unintended harm and malicious havoc. This book alerts users to some of the hazards of PICT; encourages designers, developers, and merchants of PICT to take seriously their ethical responsibilities – if only to “do no harm” – before their products go public; and introduces citizens and policy makers to challenges and opportunities that must not be ignored.
650 0 _aComputer science.
650 0 _aEthics.
650 0 _aMass media
_xLaw and legislation.
650 1 4 _aComputer Science.
650 2 4 _aComputers and Society.
650 2 4 _aEthics.
650 2 4 _aPublic International Law.
650 2 4 _aMedia Law.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9789400768321
830 0 _aLaw, Governance and Technology Series ;
_v11
856 4 0 _uhttp://dx.doi.org/10.1007/978-94-007-6833-8
912 _aZDB-2-SHU
999 _c93883
_d93883