Advertisement

Intersecting the Digital Maze. Considering Ethics in Cloud-Based Services’ Research

  • Daniel KerpenEmail author
  • Matthias Dorgeist
  • Sascha Zantis
Chapter

Abstract

Significant mobile device interactivity is realized by cloud computing – e.g., smartphone applications („apps“) as well as industrial smart manufacturing systems. The contribution deals with how cloud-based services such as these lead to severe privacy concerns that require consideration as ethical issues in ICT research projects. Furthermore, it critically discusses interdisciplinary, stakeholder-oriented conceptualizations of context-aware and reflective system designs.

Keywords

responsible research and innovation (RRI) privacy and data protection cloud computing smartphone applications 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Atzori, L., Iera, A. & Morabit, G. (2010). The Internet of Things: a survey. Computer Networks, 54(15), 2787-2805.Google Scholar
  2. Brecher, C. (2015). Mechatronics and control for production plants. Aachen: Werkzeugmaschinenlabor (WZL)/Fraunhofer IPT – RWTH Aachen University.Google Scholar
  3. De Filippi, P. & McCarthy, S. (2012). Cloud Computing: Centralization and Data Sovereignty. European Journal for Law and Technology, 3(2). Retrieved 22.02.2017. Retrievable at: http://ejlt.org/article/view/101/234
  4. Eggert, M., Häußling, R., Henze, M., Hermerschmidt, L., Hummen, R., Kerpen, D., Pérez, A. N., Rumpe, B., Thißen, D. & Wehrle, K. (2014). SensorCloud: Towards the interdisciplinary development of a trustworthy platform for globally interconnected sensors and actuators. In H. Krcmar, R. Reussner & B. Rumpe (eds.), Trusted Cloud Computing (pp. 203-218), Cham et al.: Springer.Google Scholar
  5. European Commission. (2017). Secure societies – protecting freedom and security of Europe and its citizens. Retrievable at: https://ec.europa.eu/programmes/horizon2020/en/h2020-section/secure-societies-%E2%80%93-protecting-freedomand-security-europe-and-itscitizens [February 22, 2017].
  6. Giese, H., Rumpe, B., Schätz, B. & Sztipanovits, J. (2012). Science and engineering of Cyber-Physical Systems (Dagstuhl Seminar 11441). In H. Giese, B. Rumpe, B. Schätz & J. Sztipanovits, J. (eds.), Dagstuhl Reports (pp. 1-22). Schloss Dagstuhl: Leibniz Center for Informatics.Google Scholar
  7. Henze, M., Hermerschmidt, L., Kerpen, D., Häußling, R., Rumpe, B. & Wehrle, K. (2016). A comprehensive approach to privacy in the cloud-based Internet of Things. Future Generation Computer Systems, 56, 701-718.Google Scholar
  8. Henze, M., Hiller, J. & Kerpen, D. (2016). TruCS. Trusted cyber-physical systems. Project proposal for RWTH profile area “ICT foundations of a digitized industry, economy, and society“. Aachen: RWTH Aachen University.Google Scholar
  9. Henze, M., Kerpen, D., Hiller, J., Eggert, M., Hellmans, D., Mühmer, E., Renuli, O., Maier, H., Stüble, C., Häußling, R. & Wehrle, K. (2016). Towards transparent information on individual cloud service usage. Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) (pp. 366-370), Luxembourg.Google Scholar
  10. Hornung, G., & Schnabel, C. (2009). Data protection in Germany I: The population cencus descision and the right to informational self-determination. Computer Law & Security Report, 25(1), 84-88.Google Scholar
  11. Kagermann, H., Wahlster, W. & Helbig, J. (eds.) (2013). Recommendations for implementing the strategic initiative Industrie 4.0. Final report of the Industrie 4.0 Working Group. München: acatech.Google Scholar
  12. Krcmar, H., Reussner, R. & Rumpe, B. (eds.) (2014). Trusted Cloud Computing. Cham et al.: Springer.Google Scholar
  13. Lee, E. A. (2008). Cyber-physical systems: design challenges. Technical report no. UCB/EECS-2008-8, Berkeley/CA (Electrical Engineering and Computer Sciences University of California at Berkeley).Google Scholar
  14. Longé, G. (2015). Assistance systems for industry 4.0 in weaving machinery with special focus on Augmented Reality-based applications for smart glasses. Master thesis. Aachen: Institut für Textiltechnik at RWTH Aachen University.Google Scholar
  15. Martin, K. & Shilton, K. (2016). Putting mobile application privacy in context: An empirical study of user privacy expectations for mobile devices. The Information Society, 32(3), 200-216.Google Scholar
  16. Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. National Institute of Standards and Technology (special publication 800-145).Google Scholar
  17. Presidency of the Council of the European Union. (2014). Rome Declaration on Responsible Research and Innovation in Europe. Retrievable at: https://ec.europa.eu/research/swafs/pdf/rome_declaration_RRI_final_21_November.pdf [February 2, 2017].
  18. Shklovski, I., Mainwaring, S.D., Skúladóttir, H.H. & Borgthorsson, H. (2014). Leakiness and creepiness in app space: Perceptions of privacy and mobile app use. Proceedings of the 32nd annual ACM conference on Human factors in computing systems (CHI) (pp. 2347-2356). Toronto, Canada.Google Scholar
  19. von Schomberg, R. (2013). A vision of Responsible Research and Innovation. In: R.J. Owen, J.R. Bessant, & M. Heintz (eds.), Responsible innovation. Managing the responsible emergence of science and innovation in society (pp. 51–74). Chichester: John Wiley & Sons.Google Scholar

Copyright information

© Springer Fachmedien Wiesbaden GmbH 2018

Authors and Affiliations

  • Daniel Kerpen
    • 1
    Email author
  • Matthias Dorgeist
    • 1
  • Sascha Zantis
    • 1
  1. 1.Institut für SoziologieRWTH Aachen UniversityAachenGermany

Personalised recommendations