{"id":5,"date":"2005-09-20T18:38:54","date_gmt":"2005-09-20T16:38:54","guid":{"rendered":"http:\/\/www.bijt.org\/wordpress\/?p=5"},"modified":"2009-09-08T13:44:03","modified_gmt":"2009-09-08T11:44:03","slug":"technology-ethics-meeting-in-delft","status":"publish","type":"post","link":"https:\/\/www.bijt.org\/wordpress\/2005\/09\/20\/technology-ethics-meeting-in-delft\/","title":{"rendered":"Technology &#038; ethics meeting in Delft"},"content":{"rendered":"<p>Monday, September 19, I was in Delft for a meeting with researchers from the <a href=\"http:\/\/tudelft.nl\">Technical University Delft<\/a> and two Australian researchers. Present were:<\/p>\n<p>Seumas Miller  &#8211;  Australian National University &#8211; Centre for Applied Philosophy and Public Ethics; privacy issues<br \/>\nCathy Flick &#8211; Charles Sturt University &#8211; ICT industry, codes of ethics, policies, trust, privacy<br \/>\nJeroen van den Hoven &#8211; TU Delft; prof. Ethics of Technology; privacy issues, moral identity<br \/>\nAlper Cugun &#8211; MSc student TU Delft;  social issues, online communities<br \/>\nNo\u00ebmi Manders &#8211; PhD researcher TU Delft; ethical aspects of identity management<br \/>\nBibi van den Berg &#8211; PhD EUR; ambient intelligence<br \/>\nJeroen Timmermans &#8211; PhD EUR; playful identities<br \/>\nMichiel de Lange &#8211; PhD EUR; playful identities<\/p>\n<p>There were some interesting topics discussed. Read the full notes on the meeting below:<\/p>\n<p><!--more--><\/p>\n<p>\/\/ Jeroen vd Hoven:<br \/>\nPrivacy issues &amp; moral identity: the right to write your own biography (Isaya Berlin).<br \/>\nWith more and more data, identities are being constructed about people on the basis of database- information.<\/p>\n<p>Popper: 3 worlds<br \/>\nobjections:<br \/>\n1. someone interrupting and interfering in your autonomous thoughts<br \/>\n2. increasing your self-awareness by &#8216;looking at you&#8217; &#8211; new perspective<br \/>\n3. information gets stored into databases &gt; who will see it? quasi-independent information objects leading life of their own.<\/p>\n<p>Institutions can constrain information (physical, deontic, epistemic) &#8211; moral justification:<br \/>\n&#8211; preventing harm (cf. Nazis in NL with lists of jews)<br \/>\n&#8211; transparancy &#8211; personal data has become commodified and is being sold<br \/>\n&#8211; information must remain in its original context; it can be used in discriminatory ways if it leakes into other domains.<br \/>\n&#8211; One can only write his own moral biography. Other institutions\/person shouldn&#8217;t have acces to information that could picture your Self. [one cannot know what it is like to be you; persons change and develop their personalities]. Privileged acces only for subject.<br \/>\nWe expect modesty in others in judging us and saying &#8220;I know you&#8221;.<br \/>\n&#8212;&#8212;&#8211;<br \/>\nQ: is breach of privacy justified when you suspect someone is doing something evil when your aiming for the truth, but it&#8217;s difficult to get at?<br \/>\nQ: What lattitude should people have to keep aspects of their life private?<br \/>\n&gt; people need a &#8216;time-out&#8217; from morality to experiment with it and develop their owm moral identity.<br \/>\n[individualist perception of identity; atomistic vs. collective image]<br \/>\n&gt; We reveal more of ourselves to invite others to assist us in identity creation.<br \/>\n[presupposing an autonomous kernel that knows itself].<br \/>\n[the individual that constructs itself can do so in language that is not at all useful for other to comprehend &#8211; Wittgenstein]<br \/>\nQ:  how can you describe the boundaries of what others may know things about you (just like &#8216;social space&#8217;. A: one can descern information as being &#8216;sensitive&#8217; when it can be used to describe your moral identity; Q: but what is &#8216;sensitive information&#8217;? differs from person to person. Stereotypes can quickly emerge.<\/p>\n<p>\/\/ Bibi<br \/>\nambient intelligence: personalised space.<br \/>\nQ: to what extent can you expect a technology to &#8216;know you&#8217; and adapt to your personality? Is the Self becoming a set of preferences?<br \/>\nconcept of &#8216;strangeness&#8217; of places: in a globalised world there are a lot of places that are familiar: the same everywhere. No room anymore for the &#8216;ongemak&#8217; and the unexpected, unmediated experience. Sometimes persons are formed by uncontrollable events.<br \/>\nQ: what if there are many different people with all their own preferences present in one place?<br \/>\nQ: what does collective experience mean when all places are personalised?<br \/>\nQ: when does it turn off? how does it respond to your changing preferences?<br \/>\nQ: Responsability for experiences are being handed over to technologies. Who is responsable for the quality of these experiences?<\/p>\n<p>\/\/ Cathy<br \/>\nTrusted computing: chip on motherboard, booting in &#8216;trusted mode&#8217;. Trusted modes are becoming ubiquitous: everyone needs to have a &#8216;trusted computer&#8217;. Large corporations are developing this. Possible problems:<br \/>\n&#8211; TC could be used to enforce DRM<br \/>\n&#8211; Technical specs change often<br \/>\n&#8211; open standards group TCG originally set up has been left by MS<br \/>\n&#8211; it can be used also for &#8216;trusted communication&#8217; between terrorists, MS has not fully incorporated it in Vista.<\/p>\n<p>\/\/ Seamus Miller<br \/>\nCollective actions.<br \/>\nindividual action &#8211; collective action (behaviour\/congnitive). How can this be morally significant?<br \/>\n&#8211; assertions you don&#8217;t have the right to have<br \/>\njoint procedural mechanism: not one person, not collective, but through adding\/combining different databases to create profiles &gt; who is responsable?<br \/>\nQ: make distinction between responsability &#8211; accountability?<\/p>\n<div class=\"syndication-links\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Monday, September 19, I was in Delft for a meeting with researchers from the Technical University Delft and two Australian researchers. Present were: Seumas Miller [&hellip;] <span class=\"read-more-link\"><a class=\"read-more\" href=\"https:\/\/www.bijt.org\/wordpress\/2005\/09\/20\/technology-ethics-meeting-in-delft\/\">Read More<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"mf2_syndication":[],"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_share_on_mastodon":"0"},"categories":[6],"tags":[104,54,155],"class_list":["post-5","post","type-post","status-publish","format-standard","hentry","category-meetingsevents","tag-ethics","tag-meeting","tag-technology"],"share_on_mastodon":{"url":"","error":""},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/peQgW-5","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.bijt.org\/wordpress\/wp-json\/wp\/v2\/posts\/5","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bijt.org\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bijt.org\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bijt.org\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bijt.org\/wordpress\/wp-json\/wp\/v2\/comments?post=5"}],"version-history":[{"count":1,"href":"https:\/\/www.bijt.org\/wordpress\/wp-json\/wp\/v2\/posts\/5\/revisions"}],"predecessor-version":[{"id":426,"href":"https:\/\/www.bijt.org\/wordpress\/wp-json\/wp\/v2\/posts\/5\/revisions\/426"}],"wp:attachment":[{"href":"https:\/\/www.bijt.org\/wordpress\/wp-json\/wp\/v2\/media?parent=5"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bijt.org\/wordpress\/wp-json\/wp\/v2\/categories?post=5"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bijt.org\/wordpress\/wp-json\/wp\/v2\/tags?post=5"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}