Abstract
“How to be a knowledge scientist after the Snowden revelations?” is a question we all have to ask as it becomes clear that our work and our students could be involved in the building of an unprecedented surveillance society. In this essay, we argue that this affects all the knowledge sciences such as AI, computational linguistics and the digital humanities. Asking the question calls for dialogue within and across the disciplines. In this article, we will position ourselves with respect to typical stances towards the relationship between (computer) technology and its uses in a surveillance society, and we will look at what we can learn from other fields. We will propose ways of addressing the question in teaching and in research, and conclude with a call to action.
Similar content being viewed by others
Notes
This essay comes out of a working group that organized around this question at a Dagstuhl Seminar in July 2014 on Computational Humanities. We thank Chris Biemann, Joachim Scharloth, and Claire Warwick for the inspiring discussions.
This point was explored e.g. in the Security and Privacy in a Post-Snowden World November 2014 Symposium at KU Leuven (http://eng.kuleuven.be/evenementen/arenbergsymposium-2014).
The Five Eyes are the UK, the US, Australia, Canada and New Zealand; five Anglophone countries that have a history of collaborating on intelligence gathering.
For documentation, see http://epic.org or http://europe-v-facebook.org.
We can also think of “thinking-through” as a playful etymology of dia (between/through) and logos (thought).
An example is the Guardian’s and Observer’s style guide, which does however use “race”, judging by the example as referring to either ethnicity or nationality: http://www.theguardian.com/guardian-observer-style-guide-r.
See for example the Yogyakarta Principles on the Application of International Human Rights Law in relation to Sexual Orientation and Gender Identity (2006). http://www.yogyakartaprinciples.org/.
References
American Civil Liberties Union (n.d.) The NSA archive. Searchable archive of Snowden documents. https://www.aclu.org/nsa-documents-search
Ball J (2014) NSA collects millions of text messages daily in ‘untargeted’ global sweep. http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep
Berendt B (2015) Big capta, bad science? On two recent books on “Big Data” and its revolutionary potential. Extended version of book review to appear in Karakter. http://people.cs.kuleuven.be/~bettina.berendt/Reviews/BigData
Berendt B, Preibusch S (2014) Better decision support through exploratory discrimination-aware data mining: foundations and empirical evidence. Artif Intell Law 22(2):175–209
Berger R (2013) Now I see it, now I don’t: researcher’s position and reflexivity in qualitative research. Qualitative Research. doi:10.1177/1468794112468475
boyd D, Crawford K (2012) Critical questions for Big Data. Inform Commun Soc 15(5):662–679
Gehring P (2012) Fragliche Expertise. Zur Etablierung von Bioethik in Deutschland. [Questionable expertise. About the establishment of bioethics in Germany.] In: Hagner M (ed.), Wissenschaft und Demokratie [Science and Democracy.] Suhrkamp Verlag, Berlin, pp 112–139
Gellman B, Poitras L (2013) U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program. The Washington Post. June 13, 2013. http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html
Greenwald G (2013) NSA collecting phone records of millions of Verizon customers daily. The Guardian. June 6, 2013. http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order
Greenwald G (2014) No place to hide: Edward Snowden, the NSA, and the U.S. surveillance state. Metropolitan Books, New York
Gruber TR (1993) A translation approach to portable ontology specifications. Knowl Acqu 5:199–220
Harrison S (2014) Britain is treating journalists as terrorists—believe me, I know. Guardian CommentIsFree. http://www.theguardian.com/commentisfree/2014/mar/14/britain-journalists-terrorists-edward-snowden-nsa
Heine F (2013) M, F or Blank: ‘Third gender’ official in Germany from November. Spiegel Online. http://www.spiegel.de/international/germany/third-gender-option-to-become-available-on-german-birth-certificates-a-916940.html
Jockers ML (2013) Macroanalysis: digital methods and literary history. University of Illinois Press, Urbana
Kamishima T, Akaho S, Asoh H, Sakuma J (2012) Fairness-aware classifier with prejudice remover regularizer. In: ECML/PKDD (2), LNCS, vol 7524. Springer, New York, pp 35–50
Kammerer D (2014) 1A Trojaner. Geschäftsmodell Überwachung. [Prime Trojans. Business Model Surveillance.] Le Monde Diplomatique (deutsche Ausgabe). http://www.monde-diplomatique.de/pm/2014/10/10.mondeText1.artikel,a0009.idx,1. Accessed 10 Oct 2014
Kirschbaum E (2014) Snowden says NSA engages in industrial espionage: TV. Reuters. 26 Jan 2014. http://www.reuters.com/article/2014/01/26/us-security-snowden-germany-idUSBREA0P0DE20140126
Kitchin R (2014) The data revolution: big data, open data, data infrastructures and their consequences. SAGE Publications Ltd, Thousand Oaks, CA
Lough T, Samek T (2014) Canadian University social software guidelines and academic freedom: an alarming labour trend. Inter Rev Inform Ethics 21: 45–56. http://www.i-r-i-e.net/inhalt/021/IRIE-021-Lough-Samek
MacAskill E, Borger J, Hopkins N, Davies N, Ball J (2013) GCHQ taps fibre-optic cables for secret access to world’s communications. The Guardian. June 21, 2013. http://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa
Markoff J (2005) What the Dormouse said: how the sixties counterculture shaped the personal computer industry. Penguin Publishing Group
Matthews D (2013) America’s secret intelligence budget, in 11 (Nay 13) charts. The Washington Post. August 29, 2013. http://www.washingtonpost.com/blogs/wonkblog/wp/2013/08/29/your-cheat-sheet-to-americas-secret-intelligence-budget/
Mayer-Schönberger V, Cukier K (2013) Big data: a revolution that will transform how we live, work, and think. Houghton Mifflin Harcourt, New York
Moretti F (2007) Graphs, maps, trees: abstract models for literary history. Verso, London
Morozov E (2013) The real privacy problem. MIT Technology Review. http://www.technologyreview.com/featuredstory/520426/the-real-privacy-problem/
Morozov E (2013) To save everything, click here: technology, solutionism, and the urge to fix problems that don’t exist. Public Affairs, Philadelphia
Noller S (2013) Why we need an algorithm ethic. The Guardian. http://www.theguardian.com/media-network/media-network-blog/2013/jan/22/algorithm-ethic-mechanisms-control-security
O’Harrow R Jr (2005) No place to hide. Free Press, New York
Poitras L (2014) CITIZENFOUR. Praxis Films. Film. https://citizenfourfilm.com/
Pedreshi D, Ruggieri S, Turini F (2008) Discrimination-aware data mining. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’08. ACM, New York, pp 560–568
Piatetsky G (2014) Data science is mainly a human science. KDnuggets. http://www.kdnuggets.com/2014/09/data-science-mainly-human-science.html
Pinsent Mason (2002) Government definition of terrorism applies to firefighters. http://www.out-law.com/page-3054
Priest D, Arkin W (2011) Top secret America: the rise of the new American security state. Back Bay Books, New York
Risen J, Lichtblau E (2005) Bush Lets U.S. Spy on Callers Without Courts. The New York Times. http://www.nytimes.com/2005/12/16/politics/16program.html?pagewanted=all&_r=0
Rockwell G, Sinclair S (2014) Watching out for the Olympians! Reading the CSEC Slides. Paper submitted for review. An early draft can be found at http://theoreti.ca/?p=5057
Romei A, Ruggieri S (2014) A multidisciplinary survey on discrimination analysis. Knowl Eng Rev 29(5):582–638
Schneier B (2013) The US government has betrayed the internet. We need to take it back. The Guardian. Sept 5, 2013. http://www.theguardian.com/commentisfree/2013/sep/05/government-betrayed-internet-nsa-spying
Shelley MW (1888) Frankenstein: or, the modern prometheus. George Routledge and Sons, London
Shorrock T (2008) Spies for hire: the secret world of intelligence outsourcing. Simon and Schuster, New York
Sweeney L (2013) Discrimination in online ad delivery. Commun ACM 56(5):44–54
Weber P (2014) Confused by all the new Facebook genders? Here’s what they mean. Slate. http://www.slate.com/blogs/lexicon_valley/2014/02/21/gender_facebook_now_has_56_categories_to_choose_from_including_cisgender.html
Winner L (1980) Do artifacts have politics? Daedalus 109(1):121–136
Zwitter A (2014) Big data ethics. Big Data Soc 1(2)
Acknowledgments
We thank the Flemish Agency for Innovation through Science and Technology (IWT), the Fonds Wetenschappelijk Onderzoek – Vlaanderen (FWO), the German Ministry of Education and Research (BMBF), and the Social Science and Humanities Research Council of Canada for support through the projects SPION (Grant Number 100048), Data Mining for Privacy in Social Networks (Grant Number G068611N), the early career research group eTRAP (No. 01UG1409), and the NovelTM project.
Author information
Authors and Affiliations
Corresponding author
Additional information
All URLs were last accessed on Feb 23rd, 2015.
Rights and permissions
About this article
Cite this article
Berendt, B., Büchler, M. & Rockwell, G. Is it Research or is it Spying? Thinking-Through Ethics in Big Data AI and Other Knowledge Sciences. Künstl Intell 29, 223–232 (2015). https://doi.org/10.1007/s13218-015-0355-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13218-015-0355-2