The Quest for the Perfect Search Engine: Values, Technical Design, and the Flow of Personal Information in Spheres of Mobility

Similar documents
CSCI 2070 Introduction to Ethics/Cyber Security. Amar Rasheed

Big Data & Ethics some basic considerations

Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology

A PERSPECTIVE IN COMPUTER ETHICS. Pattarasinee Bhattarakosol 1. Abstract. Introduction. What is computer ethics?

0x1A Great Papers in Computer Security

Computer and Information Ethics

Lumeng Jia. Northeastern University

DIGITIZING OURSELVES TO DEATH

Bridging the Gap Between Law & HCI: Designing Effective Regulation of Human Autonomy in Everyday Ubicomp Systems!

CSI Professional Practice In Computer Science. Ethical, social, and professional aspects of the modern computing technology.

The Use of Commercial Databases for National Security: Privacy, Evaluation, and Accuracy

CILIP Privacy Briefing 2017

A comprehensive guide to digital badges.

DRM vs. CC: Knowledge Creation and Diffusion on the Internet

Information Communication Technology

8 Executive summary. Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector

Interoperable systems that are trusted and secure

Methodology for Agent-Oriented Software

Values at Play (VAP) is a project funded by the National Science Foundation to

Personal Data Protection Competency Framework for School Students. Intended to help Educators

Designing values in an adaptive learning platform

New forms of scholarly communication Lunch e-research methods and case studies

Case Germany: Climate Discourse North Rhine-Westphalia (Klimadiskurs NRW)

IRIE International Review of Information Ethics Vol. 10 (02/2009)

Technical Issues and Requirements for privacy risk identification through Crowd-sourcing

Career Roadmap. Career Development Office. Contents. Introduction... 2 Steps to creating a career road map

Sustainable development

Privacy and Security in an On Demand World

Information and Communications Technology and Environmental Regulation: Critical Perspectives

For more information about how to cite these materials visit

IRIE International Review of Information Ethics Vol. 3 (06/2005)

Consenting Agents: Semi-Autonomous Interactions for Ubiquitous Consent

The Effects of the Information Explosion on Information Literacy

Heaven and hell: visions for pervasive adaptation

Surveillance and Privacy in the Information Age. Image courtesy of Josh Bancroft on flickr. License CC-BY-NC.

Amusing Ourselves to Death Discussion Questions

Ethics in Artificial Intelligence

Digital transformation in the Catalan public administrations

Getting on the same page

Visual Arts What Every Child Should Know

Engaging Industry Partners

Assignment 3. The Internet as Social Technology

POLICY SIMULATION AND E-GOVERNANCE

Integrating Fundamental Values into Information Flows in Sustainability Decision-Making

special roundtable Andrew D. Marble Kenneth Lieberthal Emily O. Goldman Robert Sutter Ezra F. Vogel Celeste A. Wallander

Mission: Materials innovation

Learning Goals and Related Course Outcomes Applied To 14 Core Requirements

RAZER CENTRAL ONLINE MASTER GUIDE

The SAFARI Syndrome. Implementing CRIS and Open Science By Joachim Schöpfel, University of Lille 3

User Research in Fractal Spaces:

Trusted Data Intermediaries

The Method Toolbox of TA. PACITA Summer School 2014 Marie Louise Jørgensen, The Danish Board of Technology Foundation

Systems. Professor Vaughan Pomeroy. The LRET Research Collegium Southampton, 11 July 2 September 2011

A DIALOGUE-BASED APPROACH TO MULTI-ROBOT TEAM CONTROL

Use of Patent Landscape Reports for Commercial Activities

Culturally Sensitive Design for Privacy: A case study of the Arabian Gulf

Library Special Collections Mission, Principles, and Directions. Introduction

liberal the habib HABIB UNIVERSITY: UNIVERSITY AVENUE, OFF SHAHRAH-E-FAISAL, GULISTAN-E-JAUHAR, KARACHI

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION. Chapter 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS

SOCIAL DECODING OF SOCIAL MEDIA: AN INTERVIEW WITH ANABEL QUAN-HAASE

Chapter 4. L&L 12ed Global Ed ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS. Information systems and ethics

STRANDS AND STANDARDS

BI TRENDS FOR Data De-silofication: The Secret to Success in the Analytics Economy

OPEN SCIENCE: TOOLS, APPROACHES, AND IMPLICATIONS *

MEDIA AND INFORMATION

Learning in a Digital Age. Susan M. Zvacek, PhD Associate Provost for the Advancement of Teaching and Learning

Call for Chapters for RESOLVE Network Edited Volume

Indiana K-12 Computer Science Standards

A STUDY ON THE DOCUMENT INFORMATION SERVICE OF THE NATIONAL AGRICULTURAL LIBRARY FOR AGRICULTURAL SCI-TECH INNOVATION IN CHINA

200 West Baltimore Street Baltimore, MD TTY/TDD marylandpublicschools.org

Ethics Guideline for the Intelligent Information Society

Kauffman Dissertation Executive Summary

Grant and Funding Opportunities

Designing Integrity Policy with the TU Delft s Code of Ethics

UNDERSTANDING REAL-VIRTUAL DYNAMICS OF HUMAN BEHAVIOR FROM THE ACTION STREAM PERSPECTIVE

CSTA K- 12 Computer Science Standards: Mapped to STEM, Common Core, and Partnership for the 21 st Century Standards


Mark Coeckelbergh (University of Twente, NL) FREEDOM, SECURITY, PRIVACY OR HOW TO LIVE WITH NEW INFORMATION AND COMMUNICATION TECHNOLOGIES

Discovering Your Family History with MyHeritage Unique Technologies By: Daniel Horowitz - -

Introduction to Computer Science - PLTW #9340

Vision. The Hague Declaration on Knowledge Discovery in the Digital Age

About The Project. About Peer To Patent

Amigo Approach Towards Perceived Privacy

Embracing the human and social dimension of technology and innovation

Kansas Curricular Standards for Dance and Creative Movement

Dissemination and Exploitation under H2020

Understanding User s Experiences: Evaluation of Digital Libraries. Ann Blandford University College London

How do our ethical codes relate to safeguarding intellectual property?

Staff get data back just hours after fire guts The Academy, Selsey. Redstor to the rescue after disaster strikes

in the New Zealand Curriculum

How to use adobe premiere pro cs5 youtube

What Makes International Research Ethical (Or Unethical)? Eric M. Meslin, Ph.D Indiana University Center for Bioethics

A Behind-the-Scenes Look Into the Technology Driving the Testing Industry Castle Worldwide

If These Crawls Could Talk: Studying and Documenting Web Archives Provenance

National Core Arts Standards Grade 8 Creating: VA:Cr a: Document early stages of the creative process visually and/or verbally in traditional

ICT Framework. Version 0.3

ABBREVIATIONS. jammer-to-signal ratio

When the phone rings for you: how to handle the interview scheduling call

AWARENESS Being Aware. Being Mindful Self-Discovery. Self-Awareness. Being Present in the Moment.

BIM FOR INFRASTRUCTURE THE IMPACT OF TODAY S TECHNOLOGY ON BIM

Transcription:

The Quest for the Perfect Search Engine: Values, Technical Design, and the Flow of Personal Information in Spheres of Mobility Michael Zimmer, PhD (Culture & Communication, NYU) Information Society Project Yale Law School

Inspirations we are surrounded by the wondrous effects of machines and are encouraged to ignore the ideas embedded in them. Which means we become blind to the ideological meaning of our technologies Neil Postman, Technopoly Must avoid accepting the design of technologies at interface value Sherry Turkle, Life on the Screen 2

Foundations Technology is not neutral Beniger; Ellul; Marcuse; Mumford; Winner Biases in media & communication technology Eisenstein; Innis; McLuhan; Ong; Postman Ethics & values in technology Brey; Friedman; Johnson; Mitcham; Moor; Nissenbaum; Tavani; van den Hoven Design of ICT bears directly and systematically on the realization, or suppression, of particular configurations of social, ethical, and political values 3

Faustian Bargain Anyone who has studied the history of technology knows that technological change is always a Faustian bargain: Technology giveth and technology taketh away, and not always in equal measure. A new technology sometimes creates more than it destroys. Sometimes, it destroys more than it creates. But it is never onesided. ~ Neil Postman 4

Research Agenda Explore the social, political and value dimensions of communication, information, and new media technologies Technologies Web search engines Information interfaces encyclopedias computer file systems web sites Web 2.0 & social network platforms Concerns Personal information flows Access to knowledge Privacy, freedom from bias, autonomy, liberty 5

Research Agenda and engage with technical design communities to proactively influence design in value-conscious ways Value-Conscious Design Design for Values (J. Camp) Value Sensitive Design (B. Friedman) Values at Play (H. Nissenbaum) Include values of moral & ethical import in initial design process Pragmatic engagement & collaboration with technical designers 6

Research Agenda and engage with technical design communities to proactively influence design in value-conscious ways Value-Conscious Design ~ Methodology Conceptual: Philosophical analysis & development of values at play Technical: Material reading of particular design features and variables (operationalization & translation of values) Empirical: Measurable analyses supporting the Conceptual and Technical efforts 7

Dissertation The Quest for the Perfect Search Engine: Values, Technical Design, and the Flow of Personal Information in Spheres of Mobility conceptual investigation of the values at play with the quest for the perfect search engine technical investigation of the design features of the perfect search engine itself contribute to future pragmatic attempts to design the perfect search engine in order to re-negotiate our Faustian bargain and protect the values traditionally enjoyed in our spheres of mobility 8

Planet Google Organize the world s information and make it universally accessible and useful. 9

Perfect Search Provide results that suit the context and intent of the search query User satisfaction & loyalty Increased revenues 10

Perfect Search Perfect Reach: process and understand all the information in the world Perfect Recall: understand exactly what you mean and give back exactly what you want Like the mind of God Don t be evil Faustian bargain? 11

Perfect Search s Perfect Recall Must be omniscient Collect as much information as possible about the searcher Server logs Cookies User accounts 12

Server Logs 123.45.67.89-25/Mar/2003 10:15:32 - http://www.google.com/search?q= join+alcoholics+anonymous Firefox 1.0.7; Windows NT 5.1-740674ce2123e969 IP Address Cookie ID Date & Time Search terms: Join Alcoholics Anonymous Also likely includes results clicked, referring page, and other clickstream data 13

Perfect Search s Perfect Recall Collecting, aggregating & mining users searches Necessary for perfect search Majority of users unaware until DOJ v. Google AOL data But that s only a sliver of the Perfect Recall 14

Perfect Search s Perfect Recall Over two dozen products & services Interconnected via cookies & Google Accounts Contacts, news, subscriptions, blogs, books, stocks, appointments, e-mail, friends, computer files, discussion groups, URLs 15

Database of Intentions This information represents, in aggregate form, a place holder for the intentions of humankind - a massive database of desires, needs, wants, and likes that can be discovered, subpoenaed, archived, tracked, and exploited to all sorts of ends. - John Battelle Source of insight into what someone is thinking, not just what that person is doing 16

Faustian Bargain Feedback loop Must provide (often non-trivial) information to participate Faustian bargain: Perfect search engine promises breadth, depth, efficiency, and relevancy but requires the widespread collection of personal and intellectual information 17

Acceptable Bargain? Rhetoric of efficiency, utility, and relevancy improve the quality of our services inherently helpful, useful, and a good way to support a service Privacy concerns overblown? no personal information is shared same info already shared with libraries, stores, publishers, etc 18

Contextual Integrity & Perfect Search Agents Before: Scattered, often unrepeated, rarely consolidated Perfect Search: Single agent ~ Google Types of info Before: Incomplete, verbal requests, some transaction data Perfect Search: Complete, consistent, digital Transmission principles Before: Mostly voluntary; bound by ethics codes Perfect Search: Compelled, hidden, automatic; often intended to share with 3rd parties 19

Contextual Integrity & Perfect Search Violation of the contextual integrity of the privacy of personal information Significant shift in informational norms (agents, types, transmission principles) Not the same as that provided in other information-seeking scenarios But what of the rhetoric of efficiency, utility, and relevancy? 20

Values in Spheres of Mobility Freedom to move through physical, intellectual (and digital) spheres Explore unknown frontiers Overcome barriers of time & space Free and open inquiry Privacy, autonomy and liberty Free from answerability or oversight Self-determination and self-definition 21

Tech in Spheres of Mobility Technologies introduced to enhance our mobility Physical: EZ-Pass, networked vehicles Intellectual: library management systems Digital: Cookies and DRM But Faustian bargains persist Ability to monitor, track, control mobilities across spheres Threaten the very values meant to enhance 22

Threat to Spheres of Mobility Web search engines are the latest technological medium to support physical, intellectual, and digital mobility Perfect search presents a similar threat to technologies before it Unable to navigate our spheres free from answerability and oversight Threatening values of privacy, autonomy, liberty and freedom 23

Resistance is Futile I find myself getting sucked down the Google wormhole It s all part of Google s benign dictatorship of your life. I don t know if I want all my personal information saved on this massive server in Mountain View, but it is so much of an improvement on how life was before, I can t help it 24

Ante up Collection of personal information becomes a prerequisite of participation oscillates between seemingly rewarding participation and punishing attempts to elect not to divulge personal information (Elmer, Profiling Machines) Compelled to provide or make available personal information 25

Solutions? Law & external regulation Yale Regulating Search? Internal policy & self-regulation Intel & Microsoft No one wants to be first Usually imperfect Design Lessig: how a system is designed will affect the freedoms and control the system enables Design is a critical juncture to re-negotiate 26

Value-Conscious Design Conceptual Clarity & normative understanding of the values at stake with the perfect search Technical Brief discussion of how the design of the perfect search technically captures user information What next? Continued conceptual expansion Continued technical investigation Initiate empirical examination of harms & effects Engage with technical design community 27

Help Continued conceptual expansion Need answers to the nothing to hide argument Need FoxNews sound bites Continued technical analysis Perform Ben Edelman-type technical analysis Method? Explore alternative solutions for personalization, privacy-protecting data-mining, etc Sampling Alternative business models 28

Help Initiate empirical examination of uses, harms & effects Perform Eszter Hargittai-type user studies Collaborations? Engage with technical design community Get them to the table Overcome challenges Operationalization Competing values Role as advocate 29