Skip to main content

Preserving Dignity, Maintaining Security and Acting Ethically

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 593))

Abstract

Humans design, operate and are the net beneficiaries of most systems. However humans are fallible and make mistakes. At the same time humans are adaptable and resourceful in both designing systems and correcting them when they go wrong. In contrast machines have in the main been designed to follow rules and are often constrained to produce the same output for the same input over and over again. Ethical decisions require that different outputs arise from apparently identical appearing inputs as the wider context for the decision has changed. Humans make ethical decisions almost automatically but as we move towards an increasingly machine led society those aspects of dignity, ethics and security which are managed by humans will be addressed by machines. The aim of this paper is to give an overview of the state of the art in security standardization in machine to machine and IoT systems, for the use cases of eHealth and autonomous transport systems, in order to outline the new ethics and security challenges of the machine led society. This will consider progress being made in standards towards the ideal of each of a Secure and Privacy Preserving Turing Machine and of an Ethical Turing Machine.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    http://ethics.iit.edu/ecodes/node/4233.

  2. 2.

    http://www.informationisbeautiful.net/visualizations/million-lines-of-code/.

  3. 3.

    “Reports that say that something hasn't happened are always interesting to me, because as we know, there are known knowns; there are things we know we know. We also know there are known unknowns; that is to say we know there are some things we do not know. But there are also unknown unknowns – the ones we don't know we don't know. And if one looks throughout the history of our country and other free countries, it is the latter category that tend to be the difficult ones.” Attributed to Donald Rumsfeld on 12-February-2002.

  4. 4.

    https://www.schneier.com/blog/archives/2014/04/seventh_movie-p.html.

  5. 5.

    https://en.wikipedia.org/wiki/Richard_Reid => The “shoe bomber”.

  6. 6.

    https://en.wikipedia.org/wiki/Chinese_whispers => A parlor game that passes a message round introducing subtle changes in meaning with each re-telling.

References

  1. CIS Critical Security Controls - Version 6.1192. http://www.cisecurity.org/critical-controls/

  2. The Common Criteria. www.commoncriteriaportal.org

  3. ETSI TS 102 165-1: CYBER; methods and protocols; Part 1: method and proforma for Threat, Vulnerability, Risk Analysis (TVRA). https://portal.etsi.org/webapp/WorkProgram/SimpleSearch/QueryForm.asp

  4. Luft, J., Ingham, H.: The Johari window, a graphic model of interpersonal awareness. In: Proceedings of the Western Training Laboratory in Group Development, Los Angeles (1955)

    Google Scholar 

Download references

Acknowledgments

Contributions made by the author in development of this paper have in part been supported by EU projects i-locate (grant number 621040), SUNSHINE (grant number 325161) and UNCAP (grant number 643555).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Scott Cadzow .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Cadzow, S. (2018). Preserving Dignity, Maintaining Security and Acting Ethically. In: Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. AHFE 2017. Advances in Intelligent Systems and Computing, vol 593. Springer, Cham. https://doi.org/10.1007/978-3-319-60585-2_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60585-2_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60584-5

  • Online ISBN: 978-3-319-60585-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics