Skip to main content
Log in

Is it Research or is it Spying? Thinking-Through Ethics in Big Data AI and Other Knowledge Sciences

  • Discussion
  • Published:
KI - Künstliche Intelligenz Aims and scope Submit manuscript

Abstract

“How to be a knowledge scientist after the Snowden revelations?” is a question we all have to ask as it becomes clear that our work and our students could be involved in the building of an unprecedented surveillance society. In this essay, we argue that this affects all the knowledge sciences such as AI, computational linguistics and the digital humanities. Asking the question calls for dialogue within and across the disciplines. In this article, we will position ourselves with respect to typical stances towards the relationship between (computer) technology and its uses in a surveillance society, and we will look at what we can learn from other fields. We will propose ways of addressing the question in teaching and in research, and conclude with a call to action.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. This essay comes out of a working group that organized around this question at a Dagstuhl Seminar in July 2014 on Computational Humanities. We thank Chris Biemann, Joachim Scharloth, and Claire Warwick for the inspiring discussions.

  2. http://futureoflife.org/misc/open_letter.

  3. This point was explored e.g. in the Security and Privacy in a Post-Snowden World November 2014 Symposium at KU Leuven (http://eng.kuleuven.be/evenementen/arenbergsymposium-2014).

  4. http://theguardian.com.

  5. http://spiegel.de.

  6. http://washingtonpost.com.

  7. http://firstlook.org/theintercept/.

  8. See [1] for a searchable archive and [10, 29] for Greenwald’s and Poitras’ documentations.

  9. The Five Eyes are the UK, the US, Australia, Canada and New Zealand; five Anglophone countries that have a history of collaborating on intelligence gathering.

  10. http://wikileaks.org/spyfiles.

  11. For documentation, see http://epic.org or http://europe-v-facebook.org.

  12. [19], http://scholarsatrisk.nyu.edu/.

  13. http://www.theguardian.com/technology/2011/nov/01/governments-hacking-techniques-surveillance.

  14. http://www.wassenaar.org/controllists/.

  15. http://bds.sagepub.com/.

  16. http://mitpress.mit.edu/books/series/software-studies.

  17. We can also think of “thinking-through” as a playful etymology of dia (between/through) and logos (thought).

  18. http://www.theguardian.com/us-news/the-nsa-files.

  19. http://people.cs.kuleuven.be/~bettina.berendt/teaching/2014-15-1stsemester/kaw/.

  20. http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm.

  21. http://privacert.com.

  22. http://www.scribd.com/doc/188094600/CSEC-Presentation.

  23. http://www.i-r-i-e.net/issue14.htm.

  24. An example is the Guardian’s and Observer’s style guide, which does however use “race”, judging by the example as referring to either ethnicity or nationality: http://www.theguardian.com/guardian-observer-style-guide-r.

  25. See for example the Yogyakarta Principles on the Application of International Human Rights Law in relation to Sexual Orientation and Gender Identity (2006). http://www.yogyakartaprinciples.org/.

  26. https://uima.apache.org/.

References

  1. American Civil Liberties Union (n.d.) The NSA archive. Searchable archive of Snowden documents. https://www.aclu.org/nsa-documents-search

  2. Ball J (2014) NSA collects millions of text messages daily in ‘untargeted’ global sweep. http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep

  3. Berendt B (2015) Big capta, bad science? On two recent books on “Big Data” and its revolutionary potential. Extended version of book review to appear in Karakter. http://people.cs.kuleuven.be/~bettina.berendt/Reviews/BigData

  4. Berendt B, Preibusch S (2014) Better decision support through exploratory discrimination-aware data mining: foundations and empirical evidence. Artif Intell Law 22(2):175–209

    Article  Google Scholar 

  5. Berger R (2013) Now I see it, now I don’t: researcher’s position and reflexivity in qualitative research. Qualitative Research. doi:10.1177/1468794112468475

  6. boyd D, Crawford K (2012) Critical questions for Big Data. Inform Commun Soc 15(5):662–679

    Article  Google Scholar 

  7. Gehring P (2012) Fragliche Expertise. Zur Etablierung von Bioethik in Deutschland. [Questionable expertise. About the establishment of bioethics in Germany.] In: Hagner M (ed.), Wissenschaft und Demokratie [Science and Democracy.] Suhrkamp Verlag, Berlin, pp 112–139

  8. Gellman B, Poitras L (2013) U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program. The Washington Post. June 13, 2013. http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html

  9. Greenwald G (2013) NSA collecting phone records of millions of Verizon customers daily. The Guardian. June 6, 2013. http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order

  10. Greenwald G (2014) No place to hide: Edward Snowden, the NSA, and the U.S. surveillance state. Metropolitan Books, New York

    Google Scholar 

  11. Gruber TR (1993) A translation approach to portable ontology specifications. Knowl Acqu 5:199–220

    Article  Google Scholar 

  12. Harrison S (2014) Britain is treating journalists as terrorists—believe me, I know. Guardian CommentIsFree. http://www.theguardian.com/commentisfree/2014/mar/14/britain-journalists-terrorists-edward-snowden-nsa

  13. Heine F (2013) M, F or Blank: ‘Third gender’ official in Germany from November. Spiegel Online. http://www.spiegel.de/international/germany/third-gender-option-to-become-available-on-german-birth-certificates-a-916940.html

  14. Jockers ML (2013) Macroanalysis: digital methods and literary history. University of Illinois Press, Urbana

    Google Scholar 

  15. Kamishima T, Akaho S, Asoh H, Sakuma J (2012) Fairness-aware classifier with prejudice remover regularizer. In: ECML/PKDD (2), LNCS, vol 7524. Springer, New York, pp 35–50

  16. Kammerer D (2014) 1A Trojaner. Geschäftsmodell Überwachung. [Prime Trojans. Business Model Surveillance.] Le Monde Diplomatique (deutsche Ausgabe). http://www.monde-diplomatique.de/pm/2014/10/10.mondeText1.artikel,a0009.idx,1. Accessed 10 Oct 2014

  17. Kirschbaum E (2014) Snowden says NSA engages in industrial espionage: TV. Reuters. 26 Jan 2014. http://www.reuters.com/article/2014/01/26/us-security-snowden-germany-idUSBREA0P0DE20140126

  18. Kitchin R (2014) The data revolution: big data, open data, data infrastructures and their consequences. SAGE Publications Ltd, Thousand Oaks, CA

  19. Lough T, Samek T (2014) Canadian University social software guidelines and academic freedom: an alarming labour trend. Inter Rev Inform Ethics 21: 45–56. http://www.i-r-i-e.net/inhalt/021/IRIE-021-Lough-Samek

  20. MacAskill E, Borger J, Hopkins N, Davies N, Ball J (2013) GCHQ taps fibre-optic cables for secret access to world’s communications. The Guardian. June 21, 2013. http://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa

  21. Markoff J (2005) What the Dormouse said: how the sixties counterculture shaped the personal computer industry. Penguin Publishing Group

  22. Matthews D (2013) America’s secret intelligence budget, in 11 (Nay 13) charts. The Washington Post. August 29, 2013. http://www.washingtonpost.com/blogs/wonkblog/wp/2013/08/29/your-cheat-sheet-to-americas-secret-intelligence-budget/

  23. Mayer-Schönberger V, Cukier K (2013) Big data: a revolution that will transform how we live, work, and think. Houghton Mifflin Harcourt, New York

    Google Scholar 

  24. Moretti F (2007) Graphs, maps, trees: abstract models for literary history. Verso, London

    Google Scholar 

  25. Morozov E (2013) The real privacy problem. MIT Technology Review. http://www.technologyreview.com/featuredstory/520426/the-real-privacy-problem/

  26. Morozov E (2013) To save everything, click here: technology, solutionism, and the urge to fix problems that don’t exist. Public Affairs, Philadelphia

    Google Scholar 

  27. Noller S (2013) Why we need an algorithm ethic. The Guardian. http://www.theguardian.com/media-network/media-network-blog/2013/jan/22/algorithm-ethic-mechanisms-control-security

  28. O’Harrow R Jr (2005) No place to hide. Free Press, New York

    Google Scholar 

  29. Poitras L (2014) CITIZENFOUR. Praxis Films. Film. https://citizenfourfilm.com/

  30. Pedreshi D, Ruggieri S, Turini F (2008) Discrimination-aware data mining. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’08. ACM, New York, pp 560–568

  31. Piatetsky G (2014) Data science is mainly a human science. KDnuggets. http://www.kdnuggets.com/2014/09/data-science-mainly-human-science.html

  32. Pinsent Mason (2002) Government definition of terrorism applies to firefighters. http://www.out-law.com/page-3054

  33. Priest D, Arkin W (2011) Top secret America: the rise of the new American security state. Back Bay Books, New York

    Google Scholar 

  34. Risen J, Lichtblau E (2005) Bush Lets U.S. Spy on Callers Without Courts. The New York Times. http://www.nytimes.com/2005/12/16/politics/16program.html?pagewanted=all&_r=0

  35. Rockwell G, Sinclair S (2014) Watching out for the Olympians! Reading the CSEC Slides. Paper submitted for review. An early draft can be found at http://theoreti.ca/?p=5057

  36. Romei A, Ruggieri S (2014) A multidisciplinary survey on discrimination analysis. Knowl Eng Rev 29(5):582–638

    Article  Google Scholar 

  37. Schneier B (2013) The US government has betrayed the internet. We need to take it back. The Guardian. Sept 5, 2013. http://www.theguardian.com/commentisfree/2013/sep/05/government-betrayed-internet-nsa-spying

  38. Shelley MW (1888) Frankenstein: or, the modern prometheus. George Routledge and Sons, London

  39. Shorrock T (2008) Spies for hire: the secret world of intelligence outsourcing. Simon and Schuster, New York

    Google Scholar 

  40. Sweeney L (2013) Discrimination in online ad delivery. Commun ACM 56(5):44–54

    Article  MathSciNet  Google Scholar 

  41. Weber P (2014) Confused by all the new Facebook genders? Here’s what they mean. Slate. http://www.slate.com/blogs/lexicon_valley/2014/02/21/gender_facebook_now_has_56_categories_to_choose_from_including_cisgender.html

  42. Winner L (1980) Do artifacts have politics? Daedalus 109(1):121–136

    Google Scholar 

  43. Zwitter A (2014) Big data ethics. Big Data Soc 1(2)

Download references

Acknowledgments

We thank the Flemish Agency for Innovation through Science and Technology (IWT), the Fonds Wetenschappelijk Onderzoek – Vlaanderen (FWO), the German Ministry of Education and Research (BMBF), and the Social Science and Humanities Research Council of Canada for support through the projects SPION (Grant Number 100048), Data Mining for Privacy in Social Networks (Grant Number G068611N), the early career research group eTRAP (No. 01UG1409), and the NovelTM project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bettina Berendt.

Additional information

All URLs were last accessed on Feb 23rd, 2015.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Berendt, B., Büchler, M. & Rockwell, G. Is it Research or is it Spying? Thinking-Through Ethics in Big Data AI and Other Knowledge Sciences. Künstl Intell 29, 223–232 (2015). https://doi.org/10.1007/s13218-015-0355-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13218-015-0355-2

Keywords

Navigation