Skip to main content

Study on Wide-Ranging Ethical Implications of Big Data Technology in a Digital Society: How Likely Are Data Accidents in the COVID-19 Reality?

  • Chapter
  • First Online:
Developments in Information & Knowledge Management for Business Applications

Part of the book series: Studies in Systems, Decision and Control ((SSDC,volume 376))

  • 795 Accesses

Abstract

This chapter is dedicated to the wide-ranging ethical implications of Big Data technology in a Digital Society. Exponential growth in the commercial use of the Internet has dramatically increased the volume and scope of data gathered and analyzed by datacentric business organizations. Big Data emerged as a term to summarize both the technical and commercial aspects of this growing data collection and analysis processes. Until now, much discussion of Big Data is focused on its transformational potential for technological innovation and efficiency; however, less attention was given to its ethical implications beyond the generation of commercial value. In this chapter, the authors investigate the wide-ranging ethical implications of Big Data technology. The authors inform that strategies behind Big Data technology require organizational systems, or business ecosystems, that leave them vulnerable to accidents associated with its commercial value and known as data accidents. These data accidents have distinct features and raise important concerns, including about data privacy in the time of the COVID-19 pandemic. In this chapter, the authors suggest methods of successful risk mitigation strategies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. George, G., Haas, M., Pentland, A.: Big data and management. Acad. Manag. J. 57(2), 321–326 (2014)

    Article  Google Scholar 

  2. Lokshina, I.V., Durkin, B.J., Lanting, C.J.M.: Data analysis services related to the IoT and big data: strategic implications and business opportunities for third parties. Int. J. Interdisciplinary Telecommun. Netw. 9(2), 37–56 (2017)

    Google Scholar 

  3. Lokshina, I.V., Lanting, C.J.M., Durkin, B.J.: IoT and big data-driven data analysis services for third parties, strategic implications and business opportunities. Int. J. Soc. Ecol. Sustain. Develop. 9(3), 37–56 (2018)

    Article  Google Scholar 

  4. Lokshina, I.V., Durkin, B.J., Lanting, C.J.M.: The IoT- and big data-driven data analysis services: KM, implications and business opportunities. Int. J. Knowl. Manage. 14(4), 88–107 (2018)

    Article  Google Scholar 

  5. Lokshina, I., Durkin, B., Lanting, C. J. M.: IoT-and big data-driven data analysis services for third parties: business models, new ventures and potential horizons. In: Meghanathan, N. (ed.) Strategic Innovations and Interdisciplinary Perspectives in Telecommunications and Networking, pp. 256–289. (2019a)

    Google Scholar 

  6. Lokshina, I., Gregus, M., Thomas, W.: Application of integrated building information modeling, IoT and blockchain technologies in system design of a smart building. Proc. Comput. Sci. 160, 497–502 (2019)

    Article  Google Scholar 

  7. Lokshina I., Zhong H.: Digital communications and a smart World. In: Kryvinska, N., Greguš, M. (eds.) Data-Centric Business and Applications. Lecture Notes on Data Engineering and Communications Technologies, vol. 20, Springer, Cham (2019)

    Google Scholar 

  8. Lokshina, I., Lanting, C., Durkin, B.: Evaluation of strategic opportunities and resulting business models for SMEs employing IoT in their data-driven ecosystems. In: Jennex, M. (ed.) Knowledge Management, Innovation, and Entrepreneurship in a Changing World. pp. 148–186. (2020)

    Google Scholar 

  9. Lokshina, I.V., Lanting, C.J.M.: Addressing ethical concerns of big data as a prerequisite for a sustainable big data industry. Int. J. Interdisciplinary Telecommun. Netw. 10(3), 34–52 (2018)

    Google Scholar 

  10. Lokshina, I.V., Lanting, C.J.M.: A Qualitative evaluation of IoT-driven eHealth: knowledge management, business models and opportunities, deployment and evolution. In: Proceedings of Hawaii International Conference on System Science (HICSS-51), pp. 4123–4132. Waikoloa, Hawaii (2018b)

    Google Scholar 

  11. Miller, Z.: Former NSA Chief was worried about ‘‘Enemy of The State’’ Reputation| TIME.com (2013). Retrieved from http://swampland.time.com/2013/06/07/formernsa-chief-was-worried-about-enemy-of-the-state-reputation

  12. Jennex, M.E.: Big data, the internet of things, and the revised knowledge pyramid. ACM SIGMIS Database: the DATABASE for Adv. Info. Syst. 48(4), 69–79 (2017)

    Article  Google Scholar 

  13. Marr, B.: Big data: Using SMART Big Data Analytics and Metrics to Make Better Decisions and Improve Performance. Wiley, Chichester, UK (2015)

    Google Scholar 

  14. Molok, N., Chang, S., Ahmad, A.: Information leakage through online social networking: opening the doorway for advanced persistence threats. In: Australian Information Security Management Conference (2012)

    Google Scholar 

  15. Sedayao, J., Bhardwaj, R.: Making big data, privacy, and anonymization work together in the enterprise: experiences and issues. Big Data Congress (2014)

    Google Scholar 

  16. Zaslavsky, A. Perera, C., Georgakopoulos, D.: Sensing as a service and big data. In: Proceedings of International Conference on Advances in Cloud Computing (ACC), pp. 21–29. (2012)

    Google Scholar 

  17. Committee on Commerce, Science, and Transportation.: Committee Announces Paper Hearing on Big Data and the Coronavirus. (Paper hearing titled Enlisting Big Data in the Fight Against Coronavirus on Thursday, April 9, 2020). Press Release (April 2, 2020). Retrieved from https://www.commerce.senate.gov/2020/4/committee-announces-paper-hearing-on-big-data-and-the-coronavirus

  18. Ylijoki, O., Porras, J.: Perspectives to definition of big data: a mapping study and discussion. J. Innov. Manage. 4(1), 69–91 (2016). https://doi.org/10.24840/2183-0606_004.001_0006

    Article  Google Scholar 

  19. Scarpino, S., Petri, G.: On the predictability of infectious disease outbreaks. Nature Commun. 10, 898 (2019)

    Article  Google Scholar 

  20. Hong, W., Thong, J.: Internet privacy concerns: an integrated conceptualization and four empirical studies. MIS Q. 37(1), 275–298 (2013)

    Article  Google Scholar 

  21. Jain, P., Gyanchandani, M., Khare, N.: Big data privacy: a technological perspective and review. J. Big Data 3(25) (2016). https://doi.org/10.1186/s40537-016-0059-y

  22. Lokshina, I.V., Durkin, B.J.: Redesigning the healthcare model to address obesity problem using the integration of processes and mobile technologies: facing a worldwide epidemic in an innovative manner. Wireless Personal Commun. Springer, US 96(4), 5483–5498 (2017)

    Article  Google Scholar 

  23. Lokshina, I.V., Durkin, B.J.: Using wireless and mobile technologies in e-healthcare on a wide scale: the issues and challenges to overcome. Int. J. Serv. Econ. Manage. 8(3), 133–151 (2018)

    Google Scholar 

  24. Lu, R., Zhu, H., Liu, X., Liu, J., Shao, J.: Toward efficient and privacy-preserving computing in big data era. IEEE Netw 28(1), 46–50 (2014)

    Article  Google Scholar 

  25. Abdullah, N., Håkansson, A., Moradian, E.: Blockchain based approach to enhance big data authentication in distributed environment. In: International Conference on Ubiquitous and Future Networks. ICUFN, pp. 887–892. (2017)

    Google Scholar 

  26. Bambauer, D.: Ghost in the network. Univer. Pennsylvania Law Rev. 162(5), 1050 (2014)

    Google Scholar 

  27. Jacobs, A.: Pathologies of big data. ACM Queue 7(6) (2009)

    Google Scholar 

  28. Perera, C., Ranjan, R., Wang, L., Khan, S., Zomaya, A.: Big data privacy in the internet of things era. IT Professional 17(3), 32–39 (2015). https://doi.org/10.1109/MITP.2015.34

    Article  Google Scholar 

  29. Fink, M., Harms, R., Hatak, I.: Nanotechnology and ethics: the role of regulation versus self-commitment in shaping researchers’ behavior. J. Bus. Ethics 109(4), 569–581 (2012)

    Article  Google Scholar 

  30. Bateman, C., Valentine, S., Rittenburg, T.: Ethical decision making in a peer-to-peer file sharing situation: the role of moral absolutes and social consensus. J. Bus. Ethics 115(2), 229–240 (2013)

    Article  Google Scholar 

  31. Witte, D.: Privacy deleted: is it too late to protect our privacy online? J. Internet Law 18(1), 1–28 (2013)

    Google Scholar 

  32. Nunan, D., Di Domenico, M.: Big data: a normal accident waiting to happen? J. Business Ethics 145, 481–491 (2017). https://doi.org/10.1007/s10551-015-2904-x

    Article  Google Scholar 

  33. Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C., Byers, A.: Big data: The next frontier for innovation, competition, and productivity (2011). Retrieved from http://www.mckinsey.com/Insights/MGI/Research/Technology_and_Innovation/Big_data_The_next_frontier_for_innovation

  34. Schlegelmilch, B., Oberseder, M.: Half a century of marketing ethics: shifting perspectives and emerging trends. J. Business Ethics 93(1), 1–19 (2010)

    Article  Google Scholar 

  35. De George, R.: The Ethics of Information Technology and Business. Blackwell Publishing, Oxford, UK (2003)

    Book  Google Scholar 

  36. Likhterman, S., Lokshina, I., Batugina, N.: The use of fuzzy models to estimate stability of mine constructions. In: Martens P.N. (ed.) Roof-bolting in Mining , ABRW Band 15, pp. 433-443. (1998)

    Google Scholar 

  37. Perrow, C.: Normal accident at three-mile Island. Society 18(5), 17–26 (1981)

    Article  Google Scholar 

  38. Perrow, C.: Normal Accidents: Living with High Risk Technologies. Basic Books, New York (1984)

    Google Scholar 

  39. Perrow, C.: Normal Accidents: Living with High Risk Technologies, 2nd edn. Princeton University Press, New Jersey (1999)

    Google Scholar 

  40. Perrow, C.: Disasters evermore? reducing our vulnerabilities to natural, industrial, and terrorist disasters. Social Res: An Int Quarter 75(3), 733–752 (2008)

    Article  Google Scholar 

  41. Perrow, C.: What’s needed is application, not reconciliation: a response to Shrivastava Sonpar and Pazzaglia. Hum. Relat. 62, 1391 (2009)

    Article  Google Scholar 

  42. Pidgeon, N.: Retrospect: normal accidents. Nature 477(7365), 404–405 (2011)

    Article  Google Scholar 

  43. Lokshina, I.V., Insinga, R.C.: Decision support system for ventilation operator based on fuzzy methods applied to identification and processing of gas-dynamic images. J. Electr. Eng. 54(9–10), 277–280 (2003)

    Google Scholar 

  44. Lokshina, I.V.: Intellectual support of investment decisions based on a clustering of the correlation graph of securities. WSEAS Trans. Syst. 1(2), 284–290 (2002)

    Google Scholar 

  45. Lokshina, I.V.: Expert system based on the fuzzy diagnostic model to support coal mine ventilation operator’s decisions. In: Grmela, A., Mastorakis, N. (eds) Advances in Intelligent Systems, Fuzzy Systems, Evolutionary Computation. pp. 118–122. WSEAS Press (2001)

    Google Scholar 

  46. Helmreich, R.: Managing human error in aviation. Sci. Am. 276(5), 62 (1997)

    Article  Google Scholar 

  47. Dain, S.: Normal accidents: human error and medical equipment design. The Heart Surgery Forum#2002–180891, 5(3), 254–257 (2002). Retrieved from www.hsforum.com/vol5/issue3/2002-180891.html

  48. Palmer, D., Maher, M.: A normal accident analysis of the mortgage meltdown. Res. Sociol. Organ. 30, 219–256 (2010)

    Article  Google Scholar 

  49. Rosenthal, C.: Big data in the age of the telegraph (2014). Retrieved from http://www.mckinsey.com/insights/organization/big_data_in_the_age_of_the_telegraph

  50. Kuechler, W.: Business applications of unstructured text. Commun. ACM 50(10), 86–93 (2007)

    Article  Google Scholar 

  51. HM Government.: UK data capability strategy: seizing the data opportunity—Publications—GOV.UK (2013). Retrieved from https://www.gov.uk/government/publications/ukdata-capability-strategy

  52. Hurwitz, J.: The Making of a (Big Data) President. Businessweek.com (2012). Retrieved from http://www.businessweek.com/articles/2012-11-14/the-making-of-a-big-datapresident

  53. Kaczor, S., Kryvinska, N.: It is all about services—fundamentals. Drivers and Bus. Models The Soc. Serv. Sci. J. Serv. Sci. Res. Springer 5(2), 125–154 (2013)

    Google Scholar 

  54. Kryvinska, N.: Building consistent formal specification for the service enterprise agility foundation. Soc. Serv. Sci. J. Serv. Sci. Res. Springer 4(2), 235–269 (2012)

    Article  Google Scholar 

  55. Molnár, E., Molnár, R., Kryvinska, N., Greguš, M.: Web intelligence in practice. Soc. Service Sci. J. Service Sci. Res. Springer 6(1), 49–172 (2014)

    Google Scholar 

  56. Marcus, G.: The web gets smarter. The New Yorker (2012). Retrieved from http://www.newyorker.com/culture/culturedesk/the-web-gets-smarter

  57. Groves, P., Kayyali, B., Knott, D., Van Kuiken, S.: The “Big Data” Revolution in Healthcare. Center for US Health System Reform, McKinsey & Company, Accelerating value and innovation (2013)

    Google Scholar 

  58. Mayer-Schonberger, V., Cukier, K.: Big data: a revolution that will transform how we live, work, and think. Houghton Mifflin Harcourt, Boston, MA (2013)

    Google Scholar 

  59. McAffee, A., Brynjolfsson, E.: Big data: the management revolution. Harvard Bus. Rev. 90(10), 60–68 (2012)

    Google Scholar 

  60. Boyd, D., Crawford, K.: Critical questions for big data: provocations for a cultural, technological, and scholarly phenomenon. Info. Commun. Soc. 15(5), 662–679 (2012)

    Article  Google Scholar 

  61. Warren, S., Brandeis, L.: The right to privacy. Harvard Law Rev IV 5, 193–220 (1890)

    Article  Google Scholar 

  62. Zuboff, S.: In the Age of the Smart Machine: Machine: The Future of Work and Power. Basic Books, NY (1988)

    Google Scholar 

  63. Mundie, C.: Privacy pragmatism. Foreign Affairs 93(2), 28–38 (2014)

    Google Scholar 

  64. Diamond, J.: In: Guns Germs and Steel: The Fate of Human Societies. W. W. Norton & Company (1997)

    Google Scholar 

  65. Lindenbaum, S.: Kuru, prions, and human affairs: thinking about epidemics. Annu. Rev. Anthropol. 30, 363–85 (2001)

    Article  Google Scholar 

  66. Wheeler, N.: Tracing outbreaks with machine learning. Nature Rev Microbiol 17, 269 (2019). https://doi.org/10.1038/s41579-019-0153-1

    Article  Google Scholar 

  67. Bates, M.: Tracking disease: digital epidemiology offers new promise in predicting outbreaks. IEEE Pulse 8(1), 18–22 (2017)

    Article  Google Scholar 

  68. GSMA.: GSMA guidelines on the protection of privacy in the use of mobile phone data for responding to the Ebola outbreak (October 2014). Retrieved from https://www.gsma.com/mobilefordevelopment/wp-content/uploads/2014/11/GSMA-Guidelines-on-protecting-privacy-in-the-use-of-mobile-phone-data-for-responding-to-the-Ebola-outbreak-October-2014.pdf

  69. The Economist.: To curb covid-19. China is using its high-tech surveillance tools. Non-state firms are best equipped to track people’s movements and contacts (2020). https://www.economist.com/china/2020/02/29/to-curb-covid-19-china-is-using-its-high-tech-surveillance-tools

  70. Mozur, P., Zhong, R., Krolik, A.: In Coronavirus fight, China gives citizens a color code, with red flags. The New York Times (March 1, 2020). Retrieved from https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html

  71. European Commission (n.d.) 2018 Reform of EU data protection rules (2018). Retrieved from https://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_en#background

  72. European Data Protection Board.: Statement by the EDPB Chair on the processing of personal data in the context of the COVID-19 outbreak (March 16, 2020). Retrieved from https://edpb.europa.eu/news/news/2020/statement-edpb-chair-processing-personal-data-context-covid-19-outbreak_en

  73. Proposal for a Regulation of the European Parliament and of the Council, European Commission (2012). Retrieved from http://ec.europa.eu/digital-agenda/en/news/proposal-regulation-european-parliament-and-council-establishing-connecting-europe-facility

  74. Ward, P.: Improving access to, use of, and outcomes from public health programs: the importance of building and maintaining trust with patients/clients. Frontiers Public Health 5, 22 (2017). https://doi.org/10.3389/fpubh.2017.00022

    Article  Google Scholar 

  75. OECD.: Government at a Glance (2019). Retrieved from https://www.oecd.org/gov/government-at-a-glance-22214399.htm

  76. Wang, C., Ng, C., Brook, R. (2020). Digital smartphone tracking for COVID-19—balancing public health and civil liberties. JAMA. Retrieved from https://jamanetwork.com/journals/jama/fullarticle/2762689

  77. Heilbroner, R.: Do machines make history? Technol. Culture 8(3), 335–345 (1967)

    Article  Google Scholar 

  78. Coates, J.: Computers and business? a case of ethical overload. J. Bus. Ethics 1(3), 239–248 (1982)

    Article  Google Scholar 

  79. Anjaria, K., Mishra, A.: Information leakage analysis of software: how to make it useful to IT industries? Future Comput. Info. J. 2(1), 10–18 (2017). https://doi.org/10.1016/j.fcij.2017.04.002

    Article  Google Scholar 

  80. Leveson, N.: Engineering a Safer World. MIT Press, Systems Thinking Applied to Safety (2016)

    Google Scholar 

  81. Leveson, N., Dulac, N., Marais, K., Carroll, J.: Moving beyond normal accidents and high reliability organizations: a systems approach to safety in complex systems. Organiz. Stud. 30(2–3), 227–249 (2009)

    Article  Google Scholar 

  82. Shrivastava, S., Sonpar, K., Pazzaglia, F.: Normal accident theory versus high reliability theory: a resolution and call for an open systems view of accidents. Hum. Relat. 62(9), 1357–1390 (2009)

    Article  Google Scholar 

  83. Cummings, L.: Normal accidents: living with high-risk technologies. Book Rev. Adminis. Sci. Quarter. 29(4), 630–632 (1984)

    Google Scholar 

  84. Rijpma, J.: Complexity, tight–coupling and reliability: connecting normal accidents theory and high reliability theory. J. Contingencies Crisis Manage. 5(1), 15–23 (1997)

    Article  Google Scholar 

  85. Sagan, S.: The limits of safety: organizations, accidents, and nuclear weapons. Princeton University Press, Princeton, NJ (1993)

    Book  Google Scholar 

  86. Bloomberg.: The Coronavirus May Be “Disease X” Health Experts Warned About (22 Feb 2020). Retrieved from https://www.bloombergquint.com/business/coronavirus-may-be-the-disease-x-health-agency-warned-about

  87. Pillinger, M.: Virus travel bans are inevitable but ineffective. Foreign Policy (20 Feb 2020). Retrieved from https://foreignpolicy.com/2020/02/23/virus-travel-bans-are-inevitable-but-ineffective/

  88. Science.: The coronavirus seems unstoppable. What should the world do now? (25 Feb 2020). https://www.sciencemag.org/news/2020/02/coronavirus-seems-un-stoppable-what-should-world-do-now

  89. Cockcroft, A.: The netflix tech blog: a closer look at the christmas eve outage (2012). Retrieved from http://techblog.netflix.com/2012/12/a-closer-look-at-christmas-eve-outage.html

  90. Amazon.: Summary of the December 24, 2012 Amazon ELB service event in the US-East Region (2012). Retrieved from http://aws.amazon.com/message/680587/

  91. Brown, B., Court, D., McGuire, T.: Views from the front lines of the data-analytics revolution. Mckinsey.com (2014). Retrieved from http://www.mckinsey.com/insights/business_technology/views_from_the_front_lines_of_the_data_analytics_revolution

  92. Snook, S.: Friendly Fire: The Accidental Shootdown of U.S. Black Hawks over Northern Iraq. Princeton University Press (2000)

    Google Scholar 

  93. Goel, S.: Is part of Chelsea Manning’s legacy increased surveillance? the conversation (January 20, 2017). Retrieved from https://theconversation.com/is-part-of-chelsea-mannings-legacy-increased-surveillance-71607

  94. Shane, S.: The Age of Big Leaks, The New York Times (February 2, 2019). Retrieved from https://www.nytimes.com/2019/02/02/Sunday-review/data-leaks-journalism.html

  95. Shane, S., Perlroth, N., Sanger, D.: Security breach and spilled secrets have shaken the N.S.A., The New York Times (November 12, 2017). Retrieved from https://www.nytimes.com/2017/11/12/us/nsa-shadow-brokers.html

  96. Szoldra, P.: This is everything Edward Snowden revealed in one year of unprecedented top-secret leaks. Business Insider (September 16, 2016). Retrieved from https://www.businessinsider.com/snowden-leaks-timeline-2016-9

  97. United Nations.: Senior officials sound alarm over food insecurity, warning of potentially ‘Biblical’ famine. In: Briefings to Security Council. Press Release (April 21, 2020). Retrieved from https://www.un.org/press/en/2020/sc14164.doc.htm

  98. Leigh, D.: How 250,000 US embassy cables were leaked. The Guardian (November 28, 2010). Retrieved from https://www.theguardian.com/world/2010/nov/28/how-us-embassy-cables-leaked

  99. Waterman, S.: NSA leaker Ed Snowden used banned thumb drive, exceeded access. The Washington Times (2013). Retrieved from https://www.washingtontimes.com/news/2013/jun/14/nsa-leaker-ed-snowden-used-banned-thumb-drive-exce/

  100. Allen & Overy.: Big data—Annual review 2013—Allen & Overy (2013). Retrieved from http://www.allenovery.com/publications/en-gb/annualreview2013/global-local/Pages/Big-data.aspx

  101. MacGregor, D.: 10 Public response to Y2K: social amplification and risk adaptation: or, ‘‘how I learned to stop worrying and love Y2K’’. In: Pidgeon, N., Kasperson, R., Slovic, P. (eds.) The Social Amplification of Risk (pp. 243). New York, Cambridge University Press (2003)

    Google Scholar 

  102. La Porte, T., Consolini, P.: Working in practice but not in theory: theoretical challenges of high-reliability organizations. J. Public Adm. Res. Theor. 1, 19–47 (1991)

    Google Scholar 

  103. Bygrave, L.: Data Privacy Law: An International Perspective. Oxford University Press, Oxford (2014)

    Book  Google Scholar 

  104. Ashford, W.: Infosec 2014: Act now, but no new EU data protection law before 2017, says ICO (2014). Retrieved from http://www.computerweekly.com/news/2240219908/Infosec-2014-Act-now-but-no-new-EU-data-protection-law-before2017-says-ICO

  105. Farivar, C.: EU data protection reform could start ‘trade war’, US official says (Wired UK) (2014). Retrieved from http://www.wired.co.uk/news/archive/2013-02/01/eu-data-protection-us-trade-war

  106. Johnson, M., Egelman, S., Bellovin, S.: Facebook and privacy: it’s complicated. In: Symposium on Usable Privacy and Security (SOUPS) 2012, July 11–13 (2012)

    Google Scholar 

  107. De Mauro, A., Greco, M., Grimaldi, M.: A formal definition of big data based on its essential features. Library Rev. 65(3), 122–135 (2016). https://doi.org/10.1108/LR-06-2015-0061

    Article  Google Scholar 

  108. Lokshina, I., Lanting, C.: Study on Wide-ranging Ethical Implications of Big Data Technology in a Digital Society: How Likely Are Data Accidents during COVID-19?. J. Business Ecosystems. 2(1), 32–57 (2021)

    Google Scholar 

  109. Roberts, K.: Some characteristics of high reliability organizations. Organ. Sci. 1, 160–177 (1990)

    Article  Google Scholar 

  110. Wu, J., Leung, K., Leung, G.: Nowcasting and forecasting the potential domestic and international spread of the 2019-nCoV outbreak originating in Wuhan, China: a modelling study. Lancet 395, 689–697 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Izabella V. Lokshina .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Lokshina, I.V., Lanting, C.J.M. (2021). Study on Wide-Ranging Ethical Implications of Big Data Technology in a Digital Society: How Likely Are Data Accidents in the COVID-19 Reality?. In: Kryvinska, N., Poniszewska-Marańda, A. (eds) Developments in Information & Knowledge Management for Business Applications . Studies in Systems, Decision and Control, vol 376. Springer, Cham. https://doi.org/10.1007/978-3-030-76632-0_1

Download citation

Publish with us

Policies and ethics