Data Ethics: Practical Strategies for Implementing Ethical Information Management and Governance [2 ed.] 1398610291, 9781398610293

Data-gathering technology is more sophisticated than ever, as are the ethical standards for using this data. This second

140 60 41MB

English Pages 400 [393] Year 2023

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Cover
Contents
Foreword
Introduction: Why write a book on data ethics?
01 Ethics in the context of data management
What will we cover in this chapter?
Ethics and the evolution of technology
Privacy and the environment: two examples of ethical questions in data
The evolution of privacy and technology
Data ethics and environmental concerns
Volkswagen’s ‘dieselgate’ scandal
Other ethical dilemmas
The drive for effective ethics in information management
Chapter summary
Questions
Notes
Further reading
References
02 Introduction to ethical concepts and frameworks
What will we cover in this chapter?
Introduction
Ethical theories you should know about
Relational ethics
Current concepts in data ethics: data colonialism and ethics washing
Common elements of ethical frameworks
Chapter summary
Questions
Notes
Further reading
References
03 Ethical principles, standards and practice
What will we cover in this chapter?
Principles
Developing ethical data principles
Looking at data ethics principles in practice
Seeking the ‘ethic of society’ – where to look for ethical inspiration
Conclusion
Chapter summary
Questions
Notes
References
04 Ethics, privacy and analytics
What will we cover in this chapter?
Analytics and data science: an ethical challenge
What is data analytics?
The ethical issues in data analytics
Chapter summary
Questions
Notes
Further reading
References
05 Ethics and data management (including AI)
What will we cover in this chapter?
Introduction
Introducing data management
Introducing data governance
Introducing data quality management
Introducing data modelling
Introducing data warehousing and business intelligence
Big Data, AI and machine learning
The role of data literacy and data acumen in data ethics
The ethical question of data-enabled actions
Chapter summary
Note
Further reading
References
06 Developing an ethical architecture for information management
What will we cover in this chapter?
Data ethics and information architecture – what is the connection?
Implementing ethical architecture: common challenges
Zachman, ethical architecture and the long-term vision
Chapter summary
Questions
Note
Further reading
References
07 Introducing the Ethical Enterprise Information Management (E2IM) framework
What will we cover in this chapter?
Building a model for ethical enterprise information management
Ethics and Big Data
Conclusion
Chapter summary
Questions
Further reading
References
08 Information ethics as an information quality system
What will we cover in this chapter?
Ethics as a quality system
Applying quality management principles to ethical information management
Chapter summary
Questions
Notes
Further reading
References
09 Information ethics and data governance
What will we cover in this chapter?
Introduction
How data governance supports ethics
Principles and modes of governance
Communication of ethical values and supporting ethical values through stewardship and governance
Using storytelling to communicate values
Data review boards
Change management
Chapter summary
Questions
Note
Further reading
References
10 Information ethics and risk: Tools and methods for identifying and managing ethical risk
What will we cover in this chapter?
Introduction
Looking for parallel models
Privacy by Design
Ethics by Design
Privacy engineering
The E2IM ethical impact assessment model
Chapter summary
Questions
Note
Further reading
References
11 Data ethics: the bigger picture
What will we cover in this chapter?
Introduction
Tackling the wicked problem
Beyond data literacy: data acumen
Educating the ethic of the individual
Educating the ethic of the organization
Educating the ethic of society
Educating to mitigate ‘ethics washing’
Education on ethics
Conclusion
Chapter summary
Note
References
And in conclusion...
Index
Recommend Papers

Data Ethics: Practical Strategies for Implementing Ethical Information Management and Governance [2 ed.]
 1398610291, 9781398610293

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

i

PRAISE FOR DATA ETHICS 2ND EDITION ‘In a world where AI is creating a growing wave of often dubious information, O’Keefe and O Brien’s book should be mandatory reading for everyone in IT, media, regulatory bodies and beyond. This new edition focuses on emerging topics of vital importance in a world where ethical decisions by IT may literally be, in the extreme, matters of life and death.’ Barry Devlin, Founder, 9 Sight Consulting and author of Business unIntelligence ‘I can’t think of a subject more relevant than data ethics. Given that we live in a data-dependent world, the most important question is not “Can I do something with data?” but “Should I do something with data?”. These questions should be considered by teens learning to code, business people gathering and exploiting customer data, scientists developing and releasing AI applications, and anyone creating and using data. Katherine O’Keefe and Daragh O Brien provide excellent groundwork for addressing these questions and give us the tools to think and act with our data in a responsible way. Read their book, share it and apply it!’ Danette McGilvray, President and Principal, Granite Falls Consulting and author of Executing Data Quality Projects ‘Reading Data Ethics gave me goosebumps. Impeccably researched, it is the definitive work on the topic. Simultaneously confronting and enlightening, it challenged my own ethical framework and validated the principles I hold dear in my practice as a data governance executive. The foreword by John Ladley is delightful and sets the scene perfectly for what is to follow. I look forward to our DAMA community, both here in Australia and internationally, having the opportunity to share their experiences after reading this outstanding book on data ethics.’ Andrew Andrews, Data Governance Manager, ANZ Banking Group and Vice President Marketing, DAMA International

ii

‘Ethics play an increasingly important role when considering how to collect and use personal information. This updated edition of Data Ethics clearly explains how to take ethics seriously and make it an integral part of business information management and governance. The combination of sound and up-to-date legal theories with practical tips and case studies makes it a useful handbook for anyone working with data on a regular basis. The only disadvantage is the realization my own to-do list grew a little longer.’ Paul Breitbarth, Senior Visiting Fellow, European Centre on Privacy and Cybersecurity, Maastricht University

iii

Second edition

Data Ethics

Practical strategies for implementing ethical information management and governance

Katherine O’Keefe Daragh O Brien

iv

Publisher’s note Every possible effort has been made to ensure that the information contained in this book is accurate at the time of going to press, and the publisher and authors cannot accept responsibility for any errors or omissions, however caused. No responsibility for loss or damage occasioned to any person acting, or refraining from action, as a result of the material in this publication can be accepted by the editor, the publisher or the authors.

First published in Great Britain and the United States as Ethical Data and Information Management: Concepts, tools and methods in 2018 by Kogan Page Limited Second edition published in 2023 Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licences issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned addresses: 2nd Floor, 45 Gee Street London EC1V 3RS United Kingdom

8 W 38th Street, Suite 902 New York, NY 10018 USA

4737/23 Ansari Road Daryaganj New Delhi 110002 India

www.koganpage.com Kogan Page books are printed on paper from sustainable forests. © Katherine O’Keefe and Daragh O Brien, 2018, 2023 The right of Katherine O’Keefe and Daragh O Brien to be identified as the authors of this work has been asserted by them in accordance with the Copyright, Designs and Patents Act 1988. ISBNs Hardback 978 1 3986 1029 3 Paperback 978 1 3986 1027 9 Ebook 978 1 3986 1028 6 British Library Cataloguing-in-Publication Data A CIP record for this book is available from the British Library. Library of Congress Control Number 2023933664 Typeset by Integra Software Services, Pondicherry Print production managed by Jellyfish Printed and bound by CPI Group (UK) Ltd, Croydon, CR0 4YY

v

CONTENTS Foreword  x



Introduction: Why write a book on data ethics?  1

01

Ethics in the context of data management  21 What will we cover in this chapter?  21 Ethics and the evolution of technology  22 Privacy and the environment: two examples of ethical questions in   data  25 The evolution of privacy and technology  26 Data ethics and environmental concerns  27 Volkswagen’s ‘dieselgate’ scandal  28 Other ethical dilemmas  35 The drive for effective ethics in information management  40 Chapter summary  42 Questions  43 Notes  43 Further reading  43 References  44

02

Introduction to ethical concepts and frameworks  46 What will we cover in this chapter?  46 Introduction  47 Ethical theories you should know about  50 Relational ethics  59 Current concepts in data ethics: data colonialism and ethics   washing  66 Common elements of ethical frameworks  72 Chapter summary  75 Questions  75 Notes  76 Further reading  76 References  77

vi

Contents

03

Ethical principles, standards and practice  81 What will we cover in this chapter?  81 Principles  82 Developing ethical data principles  84 Looking at data ethics principles in practice  91 Seeking the ‘ethic of society’ – where to look for ethical   inspiration  95 Conclusion  104 Chapter summary  104 Questions  104 Notes  105 References  105

04

Ethics, privacy and analytics  107 What will we cover in this chapter?  107 Analytics and data science: an ethical challenge  108 What is data analytics?  109 The ethical issues in data analytics  109 Chapter summary  133 Questions  133 Notes  134 Further reading  134 References  134

05

Ethics and data management (including AI)  139 What will we cover in this chapter?  139 Introduction  140 Introducing data management  141 Introducing data governance  144 Introducing data quality management  149 Introducing data modelling  153 Introducing data warehousing and business intelligence  156 Big Data, AI and machine learning  158 The role of data literacy and data acumen in data ethics  164 The ethical question of data-enabled actions  165 Chapter summary  167 Note  167 Further reading  168 References  169

Contents

06

Developing an ethical architecture for information management  171 What will we cover in this chapter?  171 Data ethics and information architecture – what is the   connection?  172 Implementing ethical architecture: common challenges  195 Zachman, ethical architecture and the long-term vision  197 Chapter summary  198 Questions  198 Note  199 Further reading  199 References  199

07

Introducing the Ethical Enterprise Information Management (E2IM) framework  202 What will we cover in this chapter?  202 Building a model for ethical enterprise information   management  203 Ethics and Big Data  221 Conclusion  225 Chapter summary  227 Questions  227 Further reading  227 References  228

08

Information ethics as an information quality system  230 What will we cover in this chapter?  230 Ethics as a quality system  231 Applying quality management principles to ethical information   management  234 Chapter summary  264 Questions  265 Notes  265 Further reading  265 References  266

vii

viii

Contents

09

Information ethics and data governance  269 What will we cover in this chapter?  269 Introduction  270 How data governance supports ethics  271 Principles and modes of governance  273 Communication of ethical values and supporting ethical values   through stewardship and governance  287 Using storytelling to communicate values  292 Data review boards  295 Change management  301 Chapter summary  311 Questions  312 Note  312 Further reading  312 References  312

10

Information ethics and risk: Tools and methods for identifying and managing ethical risk  315 What will we cover in this chapter?  315 Introduction  315 Looking for parallel models  318 Privacy by Design  319 Ethics by Design  320 Privacy engineering  322 The E2IM ethical impact assessment model  325 Chapter summary  344 Questions  344 Note  344 Further reading  345 References  346

11

Data ethics: the bigger picture  348 What will we cover in this chapter?  348 Introduction  348 Tackling the wicked problem  350 Beyond data literacy: data acumen  351 Educating the ethic of the individual  356

Contents

Educating the ethic of the organization  357 Educating the ethic of society  359 Educating to mitigate ‘ethics washing’  360 Education on ethics  361 Conclusion  362 Chapter summary  363 Note  363 References  363

And in conclusion...  366 Index  371

ix

x

FOREWORD I am privileged to pen this foreword because: a) the authors have excellent taste and b) a little-known aspect of my intellectual life is a significant amount of academic work in ethics, religion and philosophy. I am also privileged because: 1) I have known Daragh and Katherine a long time and 2) I have deep respect for their work. There is some incredibly valuable material in these forthcoming pages. Humanity’s track record is sketchy when it comes to doing new things. Events and movements that create enormous benefits often suffer from unintended consequences. We sing the praises of the computer and the internet, yet accept a plethora of risks, inconveniences and inefficiencies. Enormous sums of money change hands, yet many societies are starting to wonder ‘is this really all we are going to get?’ If we examine the Industrial Revolution, we see similar themes. Big shifts in economies. Wondrous inventions. And unintended consequences of slums, disease, and banking and social systems that took decades to appear remotely moral or equitable. Over time, humanity adjusted, and the actions of people changed. So did our educational and government policies. As this foreword is being written, the collapse in data systems of Southwest Airlines during a weather event combined with the Christmas holidays is grabbing a lot of attention. On top of that, the morning news has articles about Google being fined (again), Facebook paying a fine (again) and cyber threats growing exponentially (still). Is all this relevant to the topic of data? Of course. When you work in the realm of data you work in this realm of huge potential, and huge risk. Does this book help address the clash between benefits and risks stemming from the realm of data? Yes. This book addresses unintended consequences (ethics) around a huge change in the human experience (data). There is excellent research here, strong examples and excellent guidance. It is crucial that the reader take this content to heart. This cannot be emphasized enough. Early on, Daragh and Katherine mention that humanity has run into ­ethics and data repeatedly. This builds their strong case that sincere organizational efforts are required around ethics.

Foreword

This is not a light topic. This is a serious and challenging effort. But Daragh and Katherine are well-immersed and knowledgeable in this work and have written another excellent edition of their ethics book. I need to reinforce their discussion and urge the reader to embrace the topic and the learning within, but not because ‘history is repeating’ or ‘this is required for my organization’. The reader must be attentive because we have entered the realm of anthropology. Anthropology is the science of being human. Relating to the study of human behaviour from an environmental, biological and societal perspective, anthropology observes all aspects of the human experience. In other words, anything that is anthropological is PERSONAL. Given that data is one of those movements that affect the human experience, it too is personal. Anthropology shows us that humans either adapt to massive shifts in society or suffer from the failure to adapt. Our unintended consequences from the rise of data are the tip of the iceberg. When we, as members of humanity, deal with data in an organizational sense, we are compelled to behave. After all, this can affect career and livelihood – always a good motivator. When a business leader or politician says ‘data is important’, we easily move to the social or institutional behaviour. But if this is all ‘anthropological’ then humanity needs to define the new ‘right things’ to do for individuals – at the workplace, and everywhere else. What is the right thing to do with data? Rather than have a supervisor or institution specify an institutional behaviour, maybe the discussion needs to be reversed; what do you need to know about data behaviour before you even start the job? At the end of the day, when humans do new things, and then these new things go off the rails, we usually find an answer in human behaviour. Data, as a subject, is square in the centre of humans adapting to technology. Daragh and Katherine provide excellent examples, justifications and ­solutions. The neat thing about anthropology is it is well studied. There are patterns we can use to our advantage. Organizations need to teach that they and their employees operate a data supply chain with far-reaching consequences. The young child needs to learn that they generate data, and not share personal data, while at the same time needing to know they need to share toys and kindness. The high-school student needs to learn to be more judicious before downloading the new app. Advanced institutions of learning need to offer and require dedicated classes in organizations, data and ethics.

xi

xii

Foreword

Is this another fundamental change in how we treat fellow humans? I believe this to be true, but time will tell. Perhaps, like the Industrial Revolution, social norms should be viewed as subject to upheaval. For sure, what is in this book needs to appear well before professional exposure. For most organizations, the reactions to date towards data ethics have been externally driven (GDPR, CCPA, etc), i.e. responses that apply to bad actors and organizations that have not considered an ethical context as they race to cash in on data. Data conferences and forums feature topics on ‘How to monetize data’ or ‘How to create products from data’. I do not see many topics of ‘Should we create products with our customer’s data?’ We have not scratched the surface as to what to do proactively. Data is an anthropological issue. The economic doctrines of land, labour and capital now have a new friend: data. We are ill-equipped for this new age. There is a way to go but we are in good hands with this book. Daragh and Katherine provide a solid foundation.

John Ladley

1

Introduction Why write a book on data ethics?

What will we cover in this chapter? In this chapter we introduce why data and information ethics are becoming a critical issue for business, society and for all of us as individuals. We think about topics such as:

●●

●●

●●

●●

What are the implications of our data-gathering tools and technologies from an ethical perspective? What types of ethical dilemma might you face as your organization looks to become more ‘data driven’ and harness the various new and emerging sources of data and methods of data capture? Given that law makers and legislation increasingly lag behind the pace of technological innovation, is there value in taking a ‘principles approach’ to ethics for information management rather than waiting to be told what is the wrong thing to do? What is the importance of consciously assessing the trade-offs and balances that need to be struck in the adoption and development of new technologies and methods for putting information to use in organizations and society?

Introduction We live in interesting times. The pace of innovation and development in various fields of information management and information technology continues to accelerate, with functionality and features common today that

2

Introduction

would not have appeared out of place in science-fiction movies of even a few years ago. We have been gathering and recording information in written and pictographic forms for around 5,000 years. Cuneiform texts from ancient Mesopotamia are among the oldest evidence of recorded history. The advent of modern technologies means we are now recording, in a year, more information than we have recorded in all of the preceding history of humankind. The pace of logging, recording and cataloguing of information continues to accelerate as our technical capabilities evolve. The challenge we now face is whether our love affair with technology and technological innovation may have left us ill-prepared for the various ethical and moral issues that the uses of that technology increasingly throw us on a day-to-day basis. In the years since the first edition published, there have been many developments, so while the time for a new edition was right, we also wanted to make sure the title aligns with the content, which we feel is achieved with ‘Data Ethics’. The purpose of this book is to explore whether the fundamental ethical challenges we face are new variants of issues we have struggled with in all cultures for many thousands of years. While our technology capabilities advance at a phenomenal rate, the solutions needed to put ethical principles into practice might be found in the fundamental disciplines of information management and how we manage and lead our information organizations. In the past few years, we’ve seen both a lot of rapid change in the fields related to data and information ethics and, at the same time, less change than hoped. In 2018, we were seeing a groundswell in awareness of the need for data ethics. As we were finalizing proofs for the first edition of our book, scenarios that we had hypothesized might be the case from smaller and lesspublicized whistleblowing were splashed across the headlines as major international scandals, causing crises in multiple governments and multinational organizations. Between 2018 and 2023, some events have brought the importance of data ethics to very public attention and there has been some movement towards attempting to put teeth into ethical standards at national and supranational levels. The European Union took up the challenge to promote ethical AI put to them by the former European Data Protection Commissioner and published guidelines for ethical AI, following up with a move towards creating an EU Regulation for ethical AI. At a national level, some countries have looked to implement and support ethical frameworks for data use at different levels. Two examples we are personally familiar with are Scotland and Ghana: in 2020, Scotland created

Introduction

a National Expert Group and engaged in a series of public consultations as part of publishing a report on an ethical digital society to inform government decision making around data ethics. Organizations like the UN Global Pulse have engaged with countries in developing economies to help accelerate the development of regulatory frameworks for ethics in artificial intelligence and related fields through consultation and expert input. The advent of a global pandemic put a spotlight both on how valuable for the common good our data capabilities can be and on the dangers of ‘tech solutionist’ thinking and the risks of surveillance, data misuse, and misinformation. Data dashboards became a daily reference in the personal lives of many, and the complexities of data quality and public health surveillance statistics became part of highly politicized public debate. ‘Proxy metrics’ became a news item as, in the absence of testing data, people charted indications of the prevalence of coronavirus through buyer reviews of scented candles. Responses to the pandemic drove home how vital transparency and trustworthiness are to public adoption of innovations with data and technology and ‘data-driven’ decision making, and the necessity of broad public education in how to communicate and interpret data and statistics and identify misuse of data. A sound ethical foundation and transparency around the governance of data collection and use is a key enabler for the adoption of successful projects, and for people to be willing to allow the collection and use of data.

The tools of data gathering It is worth remembering that the Apple iPhone was introduced barely 15 years ago, but has triggered a revolution in hand-held computing that has placed the Apple-device ecosystem at the centre of a revolution in data collection through apps and device capabilities. Far from being simply a communications device, the smartphone has developed into a powerful personal computing platform, with increasingly powerful sensors either built into it directly or connecting to it via Bluetooth connections. Google began as a search engine barely two decades ago, but it has grown into a data management behemoth, developing everything from email services to operating systems to home automation systems. Again, this places Google at the centre of our lives and gives them an unrivalled capability to gather or generate data about us and our interactions with the world around us.

3

4

Introduction

These companies are not alone. Facebook has created a phenomenally powerful tool for connecting with friends and family. This was supplemented with its 2015 acquisition of WhatsApp, which gives it information about who is messaging who, helping to develop a very detailed map of your personal connections and interactions – even if your family members or friends are not using Facebook themselves. Other innovative companies gather and use information in a variety of ways. Some piggyback on the existing technology platforms such as smartphones through the development of new software applications. These applications are not limited to social networking applications. For example, there are smartphone applications using the sensors already built into the phones themselves to support agriculture (Pongnumkul, Chaovalit and Surasvadi, 2015). Smartphone apps have been created that use the camera on the phone to help measure the chlorophyll in plants. This is a good indirect indicator of the health of food crops such as rice. Innovative methods for gathering and analysing data are emerging as researchers and companies develop or deploy new sensor technologies that transmit their data to online applications or smartphone applications. From the humble fitness tracker to wearable cameras to telematics devices in cars, to glasses frames capable of recording video and still images and uploading them to the internet – e.g. Google’s Google Glass (Wikipedia, nda), Snapchat’s Spectacles (Lekach, 2016) or Meta’s more recent collaboration with Ray-Ban, ‘Ray-Ban Stories’ – the modern information-­gathering and information management ecosystem is increasingly complex and ­powerful. The data generated or derived from mobile devices or other sensor technologies that we are using can increasingly be used for a range of things, from keeping semi-automated diaries of various aspects of our personal lives or health – known as ‘Lifelogging’ (Lifestream Blog, 2011) or the ‘Quantified Self’ (Wikipedia, ndb) – to tracking traffic bottlenecks on motorways, or the number of people passing by a particular place on a city street. The deployment of powerful data-gathering capabilities is now substantially cheaper and less invasive than it would have been even a few years ago. To put this in context, when Daragh was a student in the 1990s he helped a friend of his in the Faculty of Medicine with a term-paper experiment and had to wear a heart-rate monitor for a few days. The device was the size of three or four paperback books stacked on each other and had to be worn strapped to his chest day and night. The monitor had to be given to one of the local hospitals to be downloaded and analysed.

Introduction

Today, as he writes this, he is wearing a wristband fitness tracker that sends data about his heart rate, movement and activity levels to his smartphone, integrating via an app on that device. Daragh could also choose to use an app to track his sleep patterns, using the microphone on his phone to record his breathing patterns and incorporating the heart-rate monitoring from his wrist-worn fitness tracker. Rather than having to struggle with a bulky recording device, he uses two lightweight gadgets and some low-cost software running on his phone to record the same type of data his med-student friend was logging 20 years ago. Rather than having to wait a few hours or days for the data to be analysed and presented, when he wakes up Daragh can look at some graphical charts on his phone that tell him how well he has slept and what his heart rate is at any time of the day. However, unlike the 1990s, when the data on Daragh’s heart-rate monitor was accessed only by the laboratory staff in the hospital and his medstudent friend, today his data is exposed to a wide range of potential third parties: the app developers, the fitness tracker manufacturer, the sleep-tracking application developer, the manufacturer of his smartphone and its operating system and potentially other third parties that his data has been shared with or sold to.

The tools of data analytics In parallel with the tools and technologies for gathering information, we have witnessed a substantial increase in the ability of organizations, and indeed individuals, to analyse data. The emergence of big data and data management tools and technologies to support the analysis of large and varied data sets has given rise to the emergence of job descriptions such as ‘Data Scientist’ in organizations. In 2012 ‘Data Scientist’ was proclaimed as the sexiest job title of the 21st century by the Harvard Business Review (Davenport and Patil, 2012). Not unlike the smartphone, the term ‘data science’ has only been around for about 20 years (Cao, 2016). As a term, it is still evolving and includes a spectrum of technical disciplines over and above traditional statistical analysis or database querying. Already, the field includes domains such as artificial intelligence (AI), natural language processing (the use of artificial intelligence to process text to figure out patterns or infer meaning), machine learning (the use of AI to figure

5

6

Introduction

out more complex problems based on a function that learns the parameters of the required outcome from the data available), and deep learning (the development of mathematical models that break complex analysis into simpler discrete blocks that can in turn be adjusted to better predict final outcomes from the AI process). These tools, and the technology platforms they run on, are increasingly powerful. Just as the world of data management software has evolved in recent years to develop more powerful software tools and platforms for data analytics and visualization, hardware manufacturers are now beginning to develop processing chips for the next generation of smartphones, computers and Internet of Things (IoT) devices to allow complex AI functions to be deployed ‘on device’, rather than relying on servers in data centres or hosted in cloud-based environments. The ‘Quantified Self’ movement is a good example of the development of our data-gathering and analytics capabilities over the past few years. Twenty years ago, if we were tracking our exercise routines we would have used a range of independent technologies such as stopwatches and heart-rate monitors and would have recorded our progress and performance indicators in a physical notebook (because our computers were too big to bring to the gym or too heavy to bring on a run). We might have kept a food diary in the notebook as well. We might have manually tracked historic trends or used group activities to compare our progress against a representative sample of our peers. Today, we wear lightweight fitness trackers that also track our location and movement, recording our exercise performance in terms of distance, effort and other performance indicators. We might log the food we are eating by taking photographs of our meals instead of writing in a notebook. Further logging of our activities and actions is automatically through our wearable technologies. We track our performance against peers through pooled data that is shared via our applications. Increasingly, our software tools can infer the calorie and nutrient content of food we eat based on a machine-learning analysis of a photograph of our meals. AI and analytics can enable the automatic tailoring of our exercise regimes to our fitness levels, our ability and our progress. The same technologies can also predict health issues that might arise based on the data they ingest about us. Add to the mix more specialized additional technologies to read blood sugar, blood pressure or other aspects of physical health, and our simple smartphone is the hub of a device that increasingly resembles the tricorder in Star Trek.

Introduction

Of course, this data is useful and valuable. While the pencil-and-paper lifeloggers of old may not have sat recording the speeds they drove at when travelling from A to B, today’s lifeloggers are using the incredible information-processing power of technologies that have relatively recently entered the consumer space to record increasingly granular details about themselves, which can then be made available to third parties such as insurance companies. Governments can use this data for planning health and social policy. Insurers can use it at a macro level to refine their risk models, and at a micro level to target and tailor the policies that they offer to us. Marketers can use the data to identify whether we would be receptive to different methods of advertising for the products they are promoting, and when we would be most suggestible to be influenced by such marketing. The tools of analysis, and the abundance of data sources that are now available to organizations (and to individuals), create an environment that is rich with potential and ripe with opportunity to develop insights into the world at a level of detail and at a level of cost that previous generations could only have dreamt about. However, with this potential we begin to see the re-emergence of a perception of data and analytics as a panacea for all ills, as if access to the right information will magically unlock the strategic vision for a government or organization, or trigger a miraculous improvement in physical well-being among fitness-tracking loggers of all of life’s activities. For example, the Samaritans in the United Kingdom do phenomenal work supporting people who are stressed and depressed and helping them find alternative methods to deal with their mental state. One of the methods they deployed in 2014 was ‘Samaritans’ Radar’, an app that allowed you to put the Twitter handle of a friend or family member into it and it would then conduct sentiment and mood analysis on the person’s tweets to help identify if they were in an up or down state of mind. All of this happened without the knowledge or consent of the selected individual whose posts were being analysed. This is an innovative use of AI, machine learning and text analytics to help people know when they need to reach out to offer support to a friend, family member or colleague. However, the exact same tool, in the hands of a malicious actor or bully, could be used to target harassing messages at a vulnerable person more precisely and track the effectiveness of a harassment campaign. Furthermore, the UK Information Commissioner’s Office expressed concerns that the application was, by its very nature, processing

7

8

Introduction

sensitive categories of personal data relating to the physical or mental health of individuals without their knowledge or consent (Orme, 2014). At the time, the National Association of Data Protection Officers in the UK also expressed concerns (Lee, 2014). In this respect, we risk repeating the errors of previous generations when faced with the potential for technology to automate the processing of data. The Vietnam war was one of the first heavily analytics-driven wars in the era of modern computing. From the Secretary of Defence Robert McNamara down, there was an emphasis on and an obsession with quantitative analytics as a way of gauging the success or failure of operations. From not recognizing the inability of computers of the time to measure intangible factors to not factoring in the quality of the input data, horrendous decisions impacting on the lives of people for many generations were made – because the data said it was the right decision. A key missing link in our rationalization and analysis of technology is the motives of both the person creating the data and the person seeking to use the data. In the Vietnam war, McNamara and US military failed to consider the motivation of the chain of command to filter information upwards, giving the ‘brass’ the answers they wanted, not the insights they needed. McNamara should have been warned of this – when he was with Ford Motor Company he had implemented a rigorous metrics-driven approach to management that resulted in production staff simply dumping parts into the river so they could work around metrics-driven rules on when new car models could be introduced (Cukier and Mayer-Schönberger, 2013). Today, we give fake names and email addresses to websites when registering for services, or take other steps to control how our data is accessed or used by others, such as using virtual private network (VPN) services or ad blockers when surfing the internet. The organizations we interact with analyse and use our data for their own purposes. The clarity and transparency of those purposes to us as individuals or consumers is often lacking. Or the processing may be essentially invisible to us, carried out below the surface of our interactions with companies, products, services or government agencies for aims and objectives that are unstated or unclear. Of course, while we may not have learnt that information technology is not always the panacea for our problems, it has evolved to a point where the data gathered and processed by social media networks and other new technology platforms has the potential to influence people’s moods (Arthur, 2014), the information that they are presented with (Pariser, 2011) and the decisions that they take (Samson, 2016). The emergence of psychographic

Introduction

targeting, a technology that requires the use of AI to analyse and filter vast amounts of data about people from social media, has led to what the Online Privacy Foundation has referred to as ‘the weaponized, artificially intelligent, propaganda machine’ (Revell, 2017). By gathering data in contexts where people are less likely to be misleading or provide inaccurate information or take other steps to mask or protect their data from being gathered or measured, and by combining data across multiple data sets and data points, it has apparently become possible to manipulate and undermine a democracy without firing a single shot (Neudert, 2017).

With great power comes great responsibility The issues raised above highlight one of the key challenges we face as the potential and power of information management in our lives becomes more pervasive, and one of the key reasons that we decided to write this book. The pace of development of data-processing technology has been such in recent years that we have scarcely had a chance as a society to draw breath and consider the implications of the technologies we are developing and deploying. Innovations make it from the research lab to the consumer shelves in a fraction of the time a manufactured product might have in previous generations. Technologies that influence the mood, mental state or behaviour of people are capable of being deployed, in many cases, with minimal cost and negligible testing or oversight. Of course, books take time to research and write. When we started on this process with the first edition of this book, there were very few publications of any kind in the area. A PhD candidate conducting research would have had a very short literature review in the context of information ethics. Beyond some key pioneering research, including work in academia by Luciano Floridi at Oxford University (Google Scholar, nd) and in industry by Gartner Group (Buytendijk, 2015), and the under-recognized work of several other academic and industry researchers and practitioners, this was a niche area. We fully expect this to change rapidly over the coming years, but a critical challenge will be to translate the discussion of information ethics from abstract concepts to tangible methods and practices. The emergence of a regulatory focus on information ethics from the European Data Protection Supervisor in late 2015 (European Data Protection Supervisor, 2015) is, to our view, a sea-change moment. Since

9

10

Introduction

2016 there has been a growing stream of commentary in media, discussion in standards bodies, and debate among practitioners. Discussion has ranged from the security of IoT devices and whether it is ethical to go to market with an unsecure technology (Wadell, 2017), to the use of data to influence elections and behaviour (Helbing et al, 2017), to the ethical issues in AI. At the heart of this evolution in focus on ethics in information management is the realization, however trite it may sound, that ‘with great power comes great responsibility’. The origin of this quote is traced variously to Voltaire, the French Revolution, Winston Churchill or the pages of Marvel comics. But, regardless of the origin, the sentiment is clear – we cannot lightly introduce powerful technologies that have the potential to deliver significant benefits to individuals or to society but equally have the potential to inflict great harm. The complication we face in the Information Age is that a failure to implement technologies with the appropriate balances in place (e.g. easy-to-configure security in IoT devices, appropriate governance in analytics planning and execution) has the potential to affect many thousands, if not millions of people, directly or indirectly, before remedies can be put in place. The alleged manipulation of voters through social media during the UK Brexit referendum and the 2016 US presidential election is a telling example of this (Novi, 2017). The core issues to be addressed, however, go far deeper than the superficial issues of technology implementations and require us to consider the question of what type of society we wish our technologies to enable, and what controls or constraints we might wish to apply to the applications of technologies and the development of such capabilities. But we have been here before. Every generation has faced technological changes or drives for social improvement through new technologies or industries that have promised huge potential. From the printing press, to the development of the factory in the Industrial Revolution, to the development of new medicines or medical procedures, industry after industry has had to face ethical challenges. Often these have been addressed through regulatory measures. For example, Lord Shaftesbury and others pioneered the Factory Acts in the United Kingdom during the Industrial Revolution, which curtailed the use of child labour and set minimum standards for schooling for children working in factories. In other cases, industry regulators or oversight bodies act, such as in the case of the Tuskegee syphilis experiments conducted in Alabama from 1932 to 1972, in which treatment for syphilis was intentionally withheld from African American sharecroppers in rural Alabama. This study, which we will look at in a later chapter of this book,

Introduction

resulted in the publication of the Belmont report that established ethical guidelines for biomedical and behavioural research. As information management practitioners living through this information revolution, increasingly we find ourselves facing a variety of dilemmas and difficult decisions. These arise through the potential capabilities of the tools, technologies and data sets that are, at least in theory, available to us.

The data-driven dilemma The ‘data-driven dilemma’ is the label that Daragh applies to the position that information management professionals and data analysts increasingly find themselves in, given the potential analytics capabilities of software tools and the increasing richness of the ‘data exhaust’ left behind by people as they use common tools and services such as mobile phones. For example, imagine for a moment you are tasked with developing statistical reports to support government investment in tourism policy. The recommendations you make will have potentially significant impacts on the livelihoods of many tourist businesses in remote areas of the country. You know that mobile-phone operators have all the data you need regarding the movements of visitors to the country who have mobile phones from other operators in their home countries and are roaming on mobile networks in your country. However, you will also capture data about business travellers and diplomats. People have no mechanism of opting out. The data will not only show you where each person has been travelling, but who was with them (or rather, what devices might ultimately be linked to a person). The available data is far beyond what you need for your stated analytics purpose. You will also identify at a very granular level of detail the holiday activities of travellers, including how long they spend at locations, and how quickly they get from point A to point B when travelling. You will also get data about people in your country and where they go (or where their devices go) on holidays. This data is generated because of travellers using mobile-phone networks in your country. It allows your analysis to be done quickly and at almost negligible cost once you have the data, particularly when compared with the cost and error rates inherent in doing surveys of travellers. Should you move heaven and earth to get the mobile-phone network data? What are the other implications and risks associated with this processing that might give rise to ethical or legal issues? Should you seek forgiveness rather than permission?

11

12

Introduction

All too often, particularly in the context of big data and analytics processes, we can be faced with a significant short-term win or benefit from the use of data in new or novel ways. Often there is a potential benefit to society arising from the processing. Sometimes that societal benefit is substantial. However, often the impact on individuals and the choices they might make or the freedoms they may otherwise enjoy can be disproportionate to the benefit to society. In these contexts, the data-driven dilemma is one of determining whether, even if we can do something fancy with data or data-related technologies, should we?

The innovator’s dilemma Linked to the data-driven dilemma is the dilemma we face where the pace of technological change is accelerating. The perception is that legislation is lagging further behind the pace of change. For example, the European Union’s General Data Protection Regulation (GDPR) came into force in 2018, a full 23 years after the original Data Protection Directive was enacted, and about as long again since the development of the World Wide Web by Sir Tim Berners-Lee. Even within defined legal frameworks such as the GDPR, there is potentially a wide range of ethical choices to make within the formal parameters of what is legally acceptable. For example, the concept of ‘legitimate interests of the data controller’ as a basis for processing personal data of individuals under the GDPR requires decision makers in organizations to assess the balance between the competing rights and interests of the affected data subjects and the organization. In this context, we increasingly find ourselves having to make evaluations of the ethics of a course of action or a proposed application of technology in information management. But traditional computer science degrees, business management or law degrees leave us significantly ill-prepared for this type of analysis. In addition, our standard business or technology innovation or implementation processes often do not always allow for the consideration time necessary to reflect on ethics as an explicit quality characteristic of our product or service development. As innovation does not exist in a vacuum we must also consider the organizational culture and governance frameworks we operate within and how they can support or undermine ethical considerations. Increasingly the articulation of these governance approaches and the rigour with which organiza-

Introduction

tions embrace and apply ethics and ethical principles in their information management practices will become a source of competitive advantage, both when seeking customers but also for attracting and hiring employees (Jenkin, 2015). Many organizations are attempting to innovate in this area through the introduction of ethics forums or taking part in public ethics discussion groups or conferences. Increasingly, organizations are turning to standards bodies such as the Institute of Electrical and Electronics Engineers Standards Association (IEEE) to define and develop standards for information ethics. But standards frameworks can only really advise or give guidance on what your data ethics should be, they can only provide guidance on the types of ethical decisions you should be taking. Likewise, an internal data ethics forum that is not linked to some form of operational governance will be unable to manifest any sustainable change in information management practices.

Societal value versus individual rights – the root of our own dilemmas The common thread between both the data-driven dilemma and the innovator’s dilemma is one of social value versus individual rights or agency. To paraphrase the EU’s GDPR, the management and processing of information must be designed for the benefit of humanity. The challenge for the information management professional is to understand how to make the trade-offs between competing value and benefits to people arising from processing. If processing is significantly invasive or harmful to the rights or freedoms of individuals but delivers an equally significant social benefit, it may well be that there is a valid ethical trade-off to be made. If, however, the processing is invasive to the individual but of limited value to society then the trade-off is less compelling. Also, even in scenarios where the trade-off is skewed against the individual, organizations might be able to take some action to redress that balance through education, communication or other mechanisms. Societal and social value needs to include or factor in the value to the individual as well. Something may not improve the greater good, but may be a benefit to individuals and support, or impinge on, their dignity or their ability to exercise other rights. For example, CCTV may have a social benefit in supporting the detection of crime. However, too much CCTV, or CCTV that overlooks private as well as public locations, can be highly invasive. It impacts the right to privacy of individuals on a mass scale, and could

13

Introduction

affect the choices people make about their movements (impacting freedom of movement) or who they meet where (impacting rights of assembly). The type of trade-off we see in Figure 0.1 is at the heart of the balancing test required under EU data protection laws when organizations are seeking to rely on the fact that something is in their legitimate interests. It may be in the legitimate interest of the organization, but that interest needs to be balanced against the rights and interests of the individuals affected by the processing. It also arises in other countries in the context of privacy impact assessments, where many countries now require consideration of the impact of data processing on the choices people might make about interacting with services, particularly services offered by government agencies. This type of trade-off and balancing decision is also at the heart of many of the ethics frameworks that govern professions such as lawyers or doctors. For example, the lawyer’s professional duty of confidentiality has high value to society, as without it people who need legal advice or representation might be afraid to seek it out (American Bar Association, 2020; Law Society of Ireland, 2013). Likewise, medical practitioners, psychologists or counsellors all operate under an ethical presumption of confidentiality. This has social value and minimizes the invasiveness or intrusion into the personal and private life of the patient or others (American Medical Association, 2016; Psychological Society of Ireland, 2019). However, these ethical duties can be overruled where there is a wider societal issue or where the disclosure is in the interests of the individual. Figure 0.1  The value/invasiveness matrix High value/low invasiveness

Social/societal value

14

What other ethical issues might arise in this processing? If there is minimal impact on the individual or on society what other constraints might arise?

High value/high invasiveness Is this processing we should be doing? What controls should we be putting in place to mitigate risks?

Low value/low invasiveness

Low value/high invasiveness

What is the value of this processing? Is this data processing an administrative function?

What is the value of this processing? Is this data processing an administrative function?

Individual impact/invasiveness

Introduction

For example, many countries now require doctors, lawyers or psychologists to notify law enforcement where there are indications of child sexual abuse in a matter they are dealing with. The ethical juggling act that must be performed is unenviable – providing sufficient information to the authorities to investigate while protecting the confidence of their client or patient. Similarly, the disclosure of information for the purposes of seeking advice on a matter, or a consultation on a case where this is in the interests of the client or patient, also requires the balancing of the amount of information disclosed (invasiveness) with the benefit that is being sought for the individual (societal or individual value). In mature professions that have struggled with ethics issues since their inception, and whose practitioners have made some horrific errors of ethical judgement over the years (we will read more about some of these later), the ethical questions continue to be a constant and pervasive challenge on a dayto-day basis. In information management we have been shielded, to an extent, from these complexities by the ethical codes and frameworks of the industries for whom we were implementing information management systems. However, as technology for data gathering becomes more pervasive and enters our pockets, our classrooms, our living rooms and our bedrooms, as the volume of data we are recording about people and events continues to grow, and as the technical capabilities to analyse and process that data become both more accessible (low-cost analytics tools and cloud-based technologies) and more autonomous (machine learning and artificial intelligence), the need for a maturing of ethical practices in information management is more pressing than ever.

Introducing the rest of the book The rest of this book is divided roughly into two thematic parts. The first part is principles-focused and gives a crash course in the basics of ethical principles and the types of ethical issues that modern information management professionals face. The second part focuses on tools and practices, looking at some of the existing good practices in information management and exploring how they can be applied to support ethical information management. Our hope is that readers will develop an understanding of both what principles we need to be implementing as part of an ethical enterprise information management philosophy but will also become familiar with approaches to integrating ethical information management into their existing information management practices.

15

16

Introduction

A note on the use of the terms ‘data’ and ‘information’ in this book The first edition of this book was titled Ethical Data and Information Management, and throughout this book we use the terms ‘data’ and ‘information’ somewhat interchangeably. Depending on the sector you are coming to this book from, this may come up against a desire for differentiation. We recognize that there can be complexity in the usage of these two words, but generally at the levels we are approaching both data and information in this book, it is a distinction without a difference. A common industry description of the relation of data and information is that ‘information is data in context’. This description is embedded in a taxonomic hierarchy of ‘data’, ‘information’, ‘knowledge’ and ‘wisdom’, and ‘data ethics’ or ‘information ethics’ would be important for ‘wisdom’ in that taxonomy. Regarding the differentiation between information ethics and data ethics as philosophical sub-disciplines of applied ethics, we are of the opinion that the differentiations between data ethics and information ethics (and other related sub-disciplines such as computer ethics, digital ethics and AI ethics) are more related to waves of academic interest and the specific ethical questions relating to the use of data or information at a specific time and place than useful distinctions for practitioners. As you move beyond this book, we highly recommend you take a holistic view of data ethics, information ethics, computer ethics, digital ethics, technology ethics and other areas of applied ethics you may find relevant to how you are approaching the use of data and its potential impacts. It’s all data, and as soon as you have some context for that data, it’s all information. What matters is the ethics.

Chapter summary In this chapter we started to set out the reasons why it is increasingly important for information management professionals to become more ‘ethically aware’ and what that might actually mean for our methods and practices for managing information. Key topics we addressed include: ●●

The issues, risks and potential benefits that are presented by our increasingly pervasive tools and technologies for data capture and data analysis, much of which has evolved rapidly over the last decade.

Introduction

●●

●●

●●

The importance of responsibility of action in the context of these increasingly powerful data-processing technologies and the need for a maturing in our approach to identifying and addressing the ethical issues they give rise to. The potential for information management as a profession to learn from the successes and failures of other professional disciplines, such as medicine, in defining methods and practices for addressing their ethical challenges. The importance of consciously and deliberatively considering the ethical trade-offs that arise in the development of new technologies for data capture and processing, particularly as information management matures into a professional discipline in its own right and our technical capabilities begin more and more to drive innovation in other areas, rather than technology innovation being driven by the needs of disciplines with existing models of ethical governance.

Questions Throughout the book we will end each chapter with some questions and thoughts for practitioners and students. These are intended to trigger introspective learning and may not have an answer. In this chapter, we start off easily: 1 Why is our approach to data ethics so flawed? 2 What kinds of data-processing activity are you or your organization engaging in that raises ethical concerns or questions? 3 How would you know if proposed processing of data raised ethical concerns? 4 If something in your organization’s approach to managing data raised an ethical concern for you, how would you express that and who would you express it to?

17

18

Introduction

Further reading In this section of each chapter we provide some hints for other related reading you might want to consider relevant to the chapter. This will be in addition to the references for each chapter. For this introductory chapter, we would suggest the following further reading: Floridi, L (2014) The Fourth Revolution: How the infosphere is reshaping human reality, Oxford University Press, Oxford Hasselbalch, G and Tranberg, P (2016) Data Ethics: The new competitive advantage, PubliShare, Copenhagen

References American Bar Association (2020) Rule 1.6 Confidentiality of Information: Client– Lawyer Relationship, Model Rules of Professional Conduct, www.americanbar. org/groups/professional_responsibility/publications/model_rules_of_professional_ conduct/rule_1_6_confidentiality_of_information.html (archived at https://perma. cc/N8A7-BZNC) American Medical Association (2016) Chapter 3: Opinions on privacy, confidentiality & medical records, AMA Principles of Medical Ethics, www.ama-assn.org/sites/default/files/media-browser/code-of-medical-ethicschapter-3.pdf (archived at https://perma.cc/7XBB-V6GL) Arthur, C (2014) Facebook emotion study breached ethical guidelines, researchers say, The Guardian, 30 June, www.theguardian.com/technology/2014/jun/30/ facebook-emotion-study-breached-ethical-guidelines-researchers-say (archived at https://perma.cc/NW2W-EXFQ) Buytendijk, F (2015) Think about digital ethics within continually evolving boundaries, Gartner, 1 April, www.gartner.com/smarterwithgartner/think-aboutdigital-ethics-within-continually-evolving-boundaries/ (archived at https:// perma.cc/LU6G-XH23) Cao, L (2016) Data science and analytics: a new era, International Journal of Data Science and Analytics, 1 (1), 1–2 Cukier, K and Mayer-Schönberger, V (2013) The dictatorship of data, MIT Technology Review, 31 May, www.technologyreview.com/s/514591/thedictatorship-of-data/ (archived at https://perma.cc/5DXM-4KHF) Davenport, T H and Patil, D (2012) Data Scientist: The sexiest job of the 21st century, Harvard Business Review, October, hbr.org/2012/10/data-scientistthe-sexiest-job-of-the-21st-century (archived at https://perma.cc/9VA4-2W3P)

Introduction European Data Protection Supervisor (2015) Towards a New Digital Ethics: Data, dignity, and technology, 11 September, edps.europa.eu/sites/edp/files/ publication/15-09-11_data_ethics_en.pdf (archived at https://perma.cc/W7RAXUDV) Google Scholar (nd) Luciano Floridi, scholar.google.com/citations?user= jZdTOaoAAAAJ (archived at https://perma.cc/4L8Y-F748) Helbing, D et al (2017) [accessed 1 August 2017] Will democracy survive Big Data and artificial intelligence? Scientific American, 25 February, www.scientificamerican.com/article/will-democracy-survive-big-data-andartificial-intelligence/ (archived at https://perma.cc/LK7X-R2C8) Jenkin, M (2015) [accessed 1 August 2017] Millennials want to work for employers committed to values and ethics, The Guardian, 5 May, www. theguardian.com/sustainable-business/2015/may/05/millennials-employmentemployers-values-ethics-jobs (archived at https://perma.cc/TJ37-MQJR) Law Society of Ireland (2013) A Guide to Good Professional Conduct of Solicitors, 3rd edn, Law Society of Ireland, Dublin Lee, D (2014) Samaritans pulls ‘suicide watch’ Radar app, BBC News, 7 November, www.bbc.com/news/technology-29962199 (archived at https://perma.cc/3WC25SKH) Lekach, S (2016) Privacy Panic? Snapchat Spectacles raise eyebrows, Mashable, 16 November, mashable.com/article/snapchat-spectacles-privacy-safety (archived at https://perma.cc/4BB8-FSEZ) Lifestream Blog (2011) Lifelogging, http://lifestreamblog.com/lifelogging/ (archived at https://perma.cc/V94K-XAH4) Neudert, L-M (2017) [accessed 1 August 2017] Computational Propaganda in Germany: A cautionary tale, Oxford Internet Institute, University of Oxford, docslib.org/doc/4608254/computational-propaganda-in-germany-a-cautionarytale (archived at https://perma.cc/9KCA-TGXH) Novi, S (2017) Cambridge Analytica: psychological manipulation for Brexit and Trump? Medium, 9 July, snovi.medium.com/cambridge-analytica-psychologicalmanipulation-for-brexit-and-trump-2e73c2be5117 (archived at https://perma.cc/ J8ZU-MCFD) Orme, J (2014) Samaritans pulls ‘suicide watch’ Radar app over privacy concerns, The Guardian, 7 November, www.theguardian.com/society/2014/nov/07/ samaritans-radar-app-suicide-watch-privacy-twitter-users (archived at https:// perma.cc/8VDY-3A2B) Pariser, E (2011) The Filter Bubble: How the new personalized web is changing what we read and how we think, Viking, London Pongnumkul, S, Chaovalit, P and Surasvadi, N (2015) Applications of smartphonebased sensors in agriculture: A systematic review of research, Journal of Sensors, www.hindawi.com/journals/js/2015/195308/ (archived at https://perma.cc/ FP89-9JQ2)

19

20

Introduction Psychological Society of Ireland (2019) Code of Professional Ethics, October, www. psychologicalsociety.ie/source/Code%20of%20Professional%20Ethics%20 (Oct%202019).pdf (archived at https://perma.cc/78WB-F852) Revell, T (2017) How to turn Facebook into a weaponised AI propaganda machine, New Scientist, 28 July, www.newscientist.com/article/2142072-howto-turn-facebook-into-a-weaponised-ai-propaganda-machine/ (archived at https://perma.cc/9YW4-3EDC) Samson, A (2016) Big Data is nudging you, Psychology Today, 30 August, www. psychologytoday.com/blog/consumed/201608/big-data-is-nudging-you (archived at https://perma.cc/JZ3N-7GRM) Wadell, K (2017) The Internet of Things needs a code of ethics, The Atlantic, 1 May, www.theatlantic.com/technology/archive/2017/05/internet-of-thingsethics/524802/ (archived at https://perma.cc/D92V-GCWX) Wikipedia (nda) Google Glass, en.wikipedia.org/wiki/Google_Glass (archived at https://perma.cc/CV72-REAQ) Wikipedia (ndb) Quantified Self, en.wikipedia.org/wiki/Quantified_Self (archived at https://perma.cc/4J6N-TU3Q)

21

01 Ethics in the context of data   management What will we cover in this chapter? In this chapter you will:

●●

●●

●●

●● ●●

●●

●●

Develop an understanding of how ethics and technology have evolved in tandem since the earliest days of human thought. Explore why it is important for data management professionals to have a grounding in fundamental concepts of ethics, particularly in the context of modern information management capabilities. Be introduced to some of the ethical discussions around technology and the responsibilities of the technologist when developing or integrating technologies. Explore data privacy as an example of data ethics in action. Explore questions of the environmental impacts of data processing as an example of data ethics Be introduced to some fundamental ethical questions that you can ask when planning or performing any data-processing activity. Develop an understanding of the emerging importance of information ethics in the context of the regulatory oversight of data management.

22

Data Ethics

Ethics and the evolution of technology Ethical issues relating to the application of data management technologies and practices are gaining more prominence in mainstream news and political discussion. There are calls for the development of new ethical frameworks and approaches to help technologists deal with the complexity of the issues that are raised, and in some jurisdictions around the world there has been movement to formalize and even bring in regulation for data ethics in some form at national and supranational levels. Computer science and business management courses may teach modules on ethics, but often these courses fail to provide the tools necessary for information management professionals to work from first principles and apply robust ethical concepts in the execution of our day-to-day roles. This can result in the ‘law of unintended consequences’ being invoked, with technologies or analytics capabilities being deployed in the real world without an appropriate analysis of the ethical implications or impacts of the processing ­activity in question. The tools and technologies we have at our disposal as data management professionals have the potential to bring benefit or cause harm to people. All data that is processed, with very few exceptions, impacts on people in some way. Whether it is data that allows us to identify a person and make a determination about their eligibility for a loan, or d ­ ata that trains an artificial intelligence system that provides sentencing recommendations to judges, or whether it is data about the performance of a car’s engine in environmental impact tests, the outcomes that result from the processing of that data affect people through an impact on privacy, a potential for bias in decision making, and an impact on governmental policies and climate change investments. With the incredible i­ncrease in computing power, data-gathering ­capabilities and machine-learning technologies, the potential for harm to be caused to individuals or to groups of society, either by accident or by intentional design, is significant. With significant power comes significant risk. Because of this, it is more important than ever that people who work with data – whether we call ourselves information management professionals, researchers, data scientists, knowledge workers, developers – have an appropriate grounding in ethics so that decisions that are made in relation to the management and use of information are based on sound ethical principles, and so that potential consequences and harms arising from our decisions are taken into account in making these decisions. As the potential fields of application for information technologies and data capture and analytics technologies continues to expand, information

Ethics in the context of data management

management practitioners need to be better equipped to extrapolate ethical issues from first principles. When you learn a programming language you usually start with some common core fundamentals such as variable definition and logic. To start to get to grips with ethics in the context of data management you need to go back to some basic ethical concepts to give a common foundation from which to build your understanding. The evolution of technology has gone hand in hand with the evolution of ethics since the earliest times. Much of that parallel evolution has centred on the discussion and debate about the ways in which evolving technologies might best be applied, and some early discussions of the ethics of technological development centred on new technology for recording and disseminating information. Plato, writing in the Phaedrus in 370BC (Plato, 2009), recounted Socrates’ view of the new information management technology that was emerging in Greece at that time, writing: ‘This discovery of yours will create forgetfulness in the learners’ souls, because they will not use their memories; they will trust to the external written characters and not remember of themselves’. Socrates was describing here the impact on memory and the transfer of information in an oral tradition. His warning was that this new-fangled writing would create the illusion of memory but not the reality of recall and understanding. Later in this dialogue between Socrates and Plato, Socrates says that, with the advent of written characters, people ‘will appear to be omniscient and will generally know nothing’. In recent decades, we’ve seen a small example of the displacing of memory skills onto technology with the development of mobile phone technology. Depending on how old you were when you got your first mobile phone, you may have a mental ‘contacts list’ of phone numbers that you memorized. Today with smartphones that easily have memory for hundreds of numbers, many of us have ‘outsourced’ that memory activity to our phones, integrated with a much larger list of addresses, email addresses and other information about people in our contacts list. Daragh can remember the contact numbers of people he knew before he got his first mobile phone in university, even if he hasn’t dialled the number in decades, but he struggles to remember newer numbers. Katherine has a different but related memory issue more directly related to data management; she struggles to remember who some of the people in her phone contacts list are and how she knew them. At a much larger scale, the illusion of memory described in Plato might also be seen as a wideranging consequence of the primacy of the written word as a way of encoding

23

24

Data Ethics

memory over the past several thousand years. In many ways, cultures with long-developed literary traditions forgot the value of oral traditions in the encoding and transmission of memory, dismissing deep historical and scientific knowledge of indigenous peoples as ‘merely’ myths and legends. More recently, researchers and scientists have begun to identify the scientific and historical knowledge in indigenous oral traditions (Terry et al, 2021). Socrates’ words could be easily adapted to any of the emergent technologies in data management and would still be as relevant and p ­ rovocative of debate as they were when first recorded 2,500 years ago. At their heart is a fundamental truth that in any technology there are both benefits and risks. Jump forward a couple of millennia, and philosophers are still talking about the meaning of our relationships to technology. Martin Heidegger argued that modern technology allowed us to have new relationships with the world that were not previously possible (Heidegger, 1977). Heidegger considered the ways of thinking that lie behind technology and saw technology as a means to an end, not an end in and of itself. But the advent of technologies changed the relationships between people and the other ­objects in nature that we interact with and, through the operation of technology, a new nature of a thing can be revealed. For example, the use of mining technology can turn a beautiful hillside into a tract of land that produces coal or iron ore. He also gave the example of technology being used to manipulate uranium to produce nuclear energy, but highlighted that that process is an example of one that can have either a destructive or a beneficial use. When discussing technology, we often use similar phrases interpreted in a way that suggests that ‘technology is ethically neutral’ and that ‘it just depends on how you use it’. But this interpretation does not consider the many decision points that go into the design and development of any tool or technology. At each stage, there is an assumption made as to what something should be and how something should work. Many of these decisions have ethical impacts, and some tools are designed to be much better at ­producing some outcomes than others. For an example of technology much less fraught with explosive potential than nuclear energy, think about a pair of scissors. A tool as simple as scissors requires a number of technologies and manufacturing capabilities, and decisions that have ethical impacts. The mining and metallurgical technologies that create the metal for the blades, the plastics moulding technologies that produce the handles, and the manufacturing technologies that assemble the scissors, all have their impacts on people and the environment they are in. This is the greater social and environmental context of decisions and ethical impacts that surround the design decision for a simple tool. However,

Ethics in the context of data management

the design of the simple tool itself also can affect the dignity of the people who use them. Scissors aren’t a neutral technology if you are a left-handed person using a pair of scissors made with the design assumption that the user is right-handed. The assumptions underlying the decisions we make as to what information should be included in a data set or design specification, how technology should work, what is a ‘good’ result, and the characteristics of our default ‘user ‘can have direct effects on people and their experience of the tool. Whether scissors are designed as an ergonomic tool to be used by a right-handed person, a left-handed person, or both, as an ambidextrous set of scissors, can have an impact on individuals in terms of the usability of the scissors. The thinking and considerations that are applied to the design and application of technology affect (in this case in a literal way) how objects in the real world are manipulated.1 Unfortunately, it’s not just the aching arm of a left-handed paper cutter that might be manipulated by technology. The potential for people to be manipulated using technology is also a concern, and one that is increasingly topical given the growing concerns about the abuse of social media and associated technologies to influence people’s moods, market products and services, and influence elections. While there are potentially significant benefits from the technologies in question, they create significant ethical questions about their impact on individual choice and agency. In the same time frame as Heidegger, Mario Bunge argued that ‘the technologist must be held not only technically but also morally responsible for whatever he designs or executes: not only should his artifacts be optimally efficient but, far from being harmful, they should be beneficial, and not only in the short run but also in the long term’ (Bunge, 1977). This echoes the sentiment in Recital 4 of the EU General Data Protection Regulation, which says that ‘the processing of personal data should be designed to serve ­mankind’ (European Union, 2016).

Privacy and the environment: two examples of ethical questions in data If you have heard people talking about the capabilities of data or boosting digital transformation, big data, the adoption of AI in organizations or many other data topics in the past decade or so, you will probably have heard someone say that ‘data is the new oil’. We dislike this metaphor for many reasons. The problems with the ‘oil’ metaphor are many, and it highlights two different

25

26

Data Ethics

areas of ethical issues or ethical risk in data that we will introduce in this chapter as examples of the range of ethical questions you may encounter.

The evolution of privacy and technology One of the great risks identified in the application of modern data management capabilities and analytical tools is violation of the fundamental human right to privacy. However, this is not the first time that new developments and applications of technology have raised concerns about the preservation of the right to privacy in the face of the danger of its dissolution by use of technology. Samuel D Warren and Louis D Brandeis founded their argument for a ‘right to privacy’ in the light of developments in business and technology. They referred to the basic principle in common law ‘that the individual shall have full protection in person and in property’, stating that ‘it has been found necessary from time to time to define anew the exact nature and extent of such protection’ (Warren and Brandeis, 1890) and arguing that changes in political, social and economic realities reveal the need for new legal recognition of human rights. They argued that ‘recent inventions and business methods call attention to the next step which must be taken for the protection of the person, and for securing to the individual what Judge Cooley calls the right “to be let alone”.’ Warren and Brandeis conceptualized privacy as a basic fundamental right to the development of the human as an autonomous individual with thoughts and feelings. Essentially, they argued for the preservation of human dignity in two forms: individual autonomy and the development of personality, and the preservation of public face. In doing this, they presented two models for understanding privacy that reflect the different ways privacy rights are approached in the United States and in Europe. While in the United States case law regards privacy with a focus more on the idea of privacy as related to intellectual property or as a ‘liberty right’, Warren and Brandeis also clearly linked the ‘right to privacy’ to first and fourth amendment rights, with a clear emphasis on privacy rights as fundamental to the dignity of the individual. One can read this as an argument for privacy as a ‘personality right’. Bart van der Sloot has identified a clear link between the conceptualization of privacy rights in a European context to the German concept of ‘Persönlichkeitsrecht’, referring to Article 2, paragraph 1 of the German Constitution, which states that ‘Everyone has the right to the free development of his personality insofar as he does not violate the rights of others or offend

Ethics in the context of data management

against the constitutional order or the moral code’ (van der Sloot, 2015). In this, ‘privacy’ is not just a negative right to be ‘left alone’, but a positive right to be free to develop one’s personality as an autonomous human. Building on the concepts of privacy as a right related to human dignity as Warren and Brandeis framed it, Stanley I Benn defined privacy in the context of respect for the person as an autonomous individual or ‘chooser’. Essentially, Benn framed the violation of privacy as a failure to respect personhood (Benn, 1971; Hudson and Husack, 1979). This human rights focus brings us back to first principles, with an understanding that privacy as a right upholds the treatment of a human as an autonomous individual, a ‘chooser’ who must be treated as an end, not just a means. The conceptualization of the individual as ‘chooser’ directly relates to the need to be able to actively and knowingly consent to the processing of one’s information and the purposes for which it is processed. In the wake of human rights violations perpetrated in the years leading up to, during and after the Second World War, European nations have adopted a strong fundamental rights approach to privacy, regarding privacy as a necessary right fundamental to the respect for human dignity. This fundamental rights-based focus is reflected both in the institution of an ­overarching data protection directive, and in Articles 7 and 8 of the European Convention on Human Rights, which has binding treaty power. This rights-based understanding of privacy has a deep history in European philosophy and ethics, which are based in philosophical understandings of personhood and the individual, including Immanuel Kant’s formulations of the categorical imperative.2 In tracing back our understanding of privacy to first principles, we may uncover the foundations of an ethical framework for new developments in technology and actions. This ethical approach ultimately finds expression in many of the fundamental principles of data privacy and data protection laws, which attempt to provide a legal framework to give effect to the ethical values of privacy as a defined right.

Data ethics and environmental concerns The impacts on people’s privacy from data processing is one of the topics often most closely linked to data ethics, but the ethical issues in information management are much broader than a single issue. Even the European formulation of data protection rights broadens the questions of the impact of

27

28

Data Ethics

processing data about people, from impacts on privacy to impacts on other fundamental rights and freedoms. Another focus for questions and concerns in data ethics can also be seen in the problems with ‘data is the new oil’ as a slogan. One of Daragh’s responses to the ‘new oil’ cliche has been to point out that maybe hitching your wagon to the images of oil spills and climate disaster associated with fossil fuel in the 21st century, and to compare the risks of data breaches to the risks of toxic waste spills isn’t the best strategy. These analogies raise questions of the effects of our actions on the environment, another key area of ethical risk in data and information management that has come under increasing attention in recent years.

Volkswagen’s ‘dieselgate’ scandal In 2015, a scandal rocked the automobile industry when it was revealed that Volkswagen had installed ‘defeat devices’ in over 11 million vehicles over the past eight years, software that could detect whether its diesel cars were running under test conditions rather than normal operating conditions for road driving, and adjust the engine’s performance under test conditions, essentially to cheat emissions tests. The environmental impact of this was that these cars were generating up to 40 times the acceptable pollution emission limits for diesel vehicles. The fallout of the scandal resulted in financial penalties of more than $30 billion, criminal penalties including the imprisonment of one of VW’s senior executives, and the firing or suspension of ­several others. A longer-term result of the scandal was a strategic pivot on Volkswagen’s part to focus on electric vehicles, and a resulting overhaul of its operational structures. (Daiss, 2019; US EPA, nd). The impact of the scandal extended beyond a single company, though. The scandal brought scrutiny to the standards in manufacturing of the entire industry, and in 2016 the International Organization for Standardization (ISO) and the International Automotive Task Force (IATF) introduced a new revised automotive industry standard for quality management systems to introduce ethics requirements for the first time (Boler, 2016). Why are we telling a story about the car industry in a book on data ethics? Data processing doesn’t happen in a vacuum. There are always choices being made, and even the most abstract theoretical calculations can often result in real-world effects. In the case of Volkswagen, you may be asking how this is a ‘data’ question. The decisions leading up to the scandal involved ethical questions relating to the use of data analytics in regulatory

Ethics in the context of data management

reporting, and the result was the direct impacts of the emissions released on the environment and the global climate crisis. We will discuss this more indepth as a case study in Chapter 4. For the moment, the software, computing and data analytics involved in the modern automobile industry are an example of how the ethics of data processing and environmental concerns are linked.

Digital waste and the carbon cost of processing data In the 1990s, boosters hyped the ‘paperless office’ as the way of the future and an environmental solution reducing the amount of paper waste in landfills. Decades later, while offices still aren’t ‘paperless’, we have also come to a greater realization that, in the words of Gerry McGovern (2020), ‘digital is physical’ and the energy costs of every action we take on computers is significant. One could argue that the ‘paperless office’ has instead become an office of digital waste, one of the forms of waste produced by a digital economy. Often when we focus on the environmental cost of waste, we focus on the more tangible and visible effects of electronic waste, the discarded devices used to process data. Research from the World Economic Forum (2019) has identified e-waste as ‘the fastest growing waste stream in the world’ and digital waste is also increasing exponentially. The ecological impact of e-waste from the technology we use to process data is inextricably linked to ethical questions regarding the effect on the environment of ‘digital’ or data processing. But with the focus of this book geared specifically towards data ethics or ethical information management, our focus is more on the less tangible – but no less significant – impact of the carbon costs of energy-intensive data processing. Think about how much energy it takes to create, replicate, store, access and process this data in different ways. Because we don’t often see the physical storage of our ‘paperless’ data environment it’s easy to have a hoarding or wasteful attitude ­towards this data. In the words of Gerry McGovern (2020), ‘Digital encourages extreme waste and an extreme waste mindset’. The exponential increase in our use of energy over the centuries is mirrored by the exponential increase in the amount of data in existence. In 1981, Buckminster Fuller described the amount of time across history that it took for the information accumulated and distributed in the world to double. Before 1900, it took approximately 100 years. By the end of the Second World War, information was doubling every 25 years. By 1982, he projected it would double every two years. A 2006 report from IBM r­ eflected Fuller’s

29

30

Data Ethics

discussion of the knowledge doubling curve, projecting that by 2010 the world’s information base would double every 11 hours. IBM’s report, titled ‘The toxic terabyte’, highlighted a risk of Moore’s law regarding the exponential growth in capacity of computer chip design and the ‘data explosion’ it enabled, identifying ‘the toxic terabyte’ as a ‘threat to business efficiency’, which would require ‘changes in business and organizational behaviour’ as well as technical tools to enable information life cycle management (IBM, 2006). This report identified the ‘data explosion’ as primarily an information management problem and highlighted that ‘data-dumping’ behaviour is also an environmental threat, asking ‘Who is – or should be – beating the drum for a ‘greener’ approach to data creation and storage?’ The issues highlighted in the 2006 report have been intensified by the last decade’s focus on ‘big data’ and maximalist approaches to computing and analytics. Estimates are that up to 90 per cent of data we store is essentially waste. In many cases, big data (one of the biggest information management buzzwords of 2014–2016) exemplifies this. Daragh’s perspective of big data from working in the telecommunications industry and managing ‘big data’ before it became a buzzword has been that big data information management is simply information management at scale, and that the same management and governance should apply. We’ve observed a strong trend towards larger and larger data lakes and larger, more energy-intensive automated tools to search through the unstructured and structured big data to sort it. Our turn to the ‘digital’ has resulted in a significant amount of energy use going to the processing of data in various ways. It has been estimated that internet usage alone consumes 1–2 per cent of global energy supply (Kiernan, 2021; Obringer et al, 2021). This makes the energy use consumed by the internet comparable to the top five countries for highest consumption of energy.

Environmental impacts of AI technologies As various AI solutions become integrated into our day-to-day use of data and technology, a number of researchers in computer science have begun to sound the alarm on the carbon cost involved in the processing power required for computing, warning that the computing power required to train and develop models may be a ‘significant contributor to climate change’. The carbon footprint of data processing is a consideration for all computing, but the energy costs of deep learning and training large models are particularly notable. The power requirements for the computations involved

Ethics in the context of data management

in machine learning are significant. These costs and the expense of training models also affect the accessibility of resources to engage in research. This aspect of the environmental concerns in data ethics has challenged the business models of some of the biggest players in the tech world. This was brought to public attention well beyond the usual audience for research in AI ethics, when the publication of a paper by a group of researchers from academia and tech ‘On the dangers of stochastic parrots: Can language models be too big?’ (Bender et al, 2021) coincided with Google precipitously firing two of its star researchers in AI ethics who were co-authors on the paper, raising questions of ‘ethics washing’ and corporate ‘capture’ of academic research. This influential paper raises a number of ethical questions on the environmental and societal implications of the trend in NLP research to move towards ever more massive language models.

Environmental impacts of data centres The increase in computing capacity and maximalist approach to computing can be seen in the growth of data centres globally. Cloud computing has taken over, for what are in many cases very sensible reasons relating to efficiency, economies of scale and the convenience of offerings, as well as the complexities of maintaining separate servers with the capabilities of cloud service providers. It offers a metaphor for the physical impact of a ‘service’ sold on a metaphor of intangibility. It’s a truism often ignored that ‘the cloud is just other people’s computers, or servers’, and one of the most visible manifestations of the energy cost of computing and data processing is the data centre – if you are located near one. Otherwise, physical reality and environmental costs, and trade-offs involved in the provision of computing ‘as a service’ running and cooling down data centres are obscured, even intangible. The building and use of data centres involves trade-offs considering potential balancing of harms to communities and the environment. The balancing of these trade-offs can be extremely contentious in regions that host many data centres. While cloud computing can be potentially much more energy-efficient than the equivalent individual hard drives and servers that the cloud services replace, the energy costs are often immense, and the benefits of those efficiencies may not be seen directly by the communities bearing the costs. In an article on the environmental impact of Ireland’s strategic promotion of being the ‘data capital of Europe’, Aoife Kiernan (2021) describes some of the tensions between the ‘major impact on the environment’ of hosting one of the biggest hubs of data centres in Europe and some po-

31

32

Data Ethics

tential mitigations to the energy costs. For example, cooling systems that increase efficiency by using sensors to determine where energy would best be spent to cool the system, or integrated development of a data centre that uses excess heat in a community district heating system to heat buildings in the area. However, the concentration of data centres in a location that has been considered ideal due to climate, resources and infrastructure has strained the country’s energy grid to its limits and impacted the country’s ability to meet climate targets. The environmental and ethical concerns and trade-offs regarding the resource consumption of data centres are an example of questions in data ethics that require engaging with structurally at political and community planning levels, not simply at a level of individual or organizational decision making. It also illustrates how organizational decision making may externalize costs or impacts, affecting individuals and communities that might not have been considered as stakeholders. This will require nuanced discussion, as decisions like Singapore’s 2019 ban on building new data centres may only displace effects and do not address the demand for data processing power (Mah, 2021).

Some proposed approaches to mitigate environmental harms While the environmental concerns raised by our usage of data are massive and may seem intractable, significant energy is being devoted to finding ways to address the harms to the environment caused by data use. The following are a few examples of ways in which researchers and practitioners are seeking to mitigate the carbon impact of data.

Carbon tracking and reporting Awareness and understanding of the often invisible costs of data processing is foundational to changing behaviour, and many people are working on solutions to help track, report and communicate these costs to help people make decisions. Projects such as the Carbon Literacy Project (carbonliteracy.com) and carbon calculators that measure the footprint of AI or other activities can, with varying accuracy, inform people on the carbon costs of projects and support them in reducing emissions.

Ethics in the context of data management

Efficiency and data minimization There are different ways to reduce energy use through improving efficiency and minimizing your processing of data. Data minimization: Collecting only the data you need and keeping it only as long as is necessary for the purpose. This will involve the core information management practices IBM called out as necessary to avoid ‘the toxic terabyte’. Data minimization – the principle that you should only collect and process data that is to meet your intended purpose and not process more than is necessary – is best known as a central concept in privacy and data protection, but minimizing the amount of data processing you are doing can be a way of increasing the sustainability of your data use as well. More data efficient processes and activities: If you’ve ever complained that ‘this Zoom meeting could have been an email’ or turned your camera off to reduce bandwidth (thus also reducing the energy consumption of the call), you were also considering efficiency and data minimization. Considering what is the most efficient and sustainable way to meet your goals can include data processing that is lighter on processing power and more efficient algorithms. It can also include deciding that an email will be more efficient than a video conference, or that there is a more efficient solution than a blockchain-based technology. Researchers in green AI promote more data-efficient practices in machine learning and other AI technologies. A 2019 position paper advocating for green AI promotes shifting focus to ‘AI research that is more environmentally friendly and inclusive’. Schwartz et al (2019) propose following the strand of sustainable computing in computer science to promote sustainable AI by, among other things, using computational efficiency as an evaluation metric for research papers in artificial intelligence and machine learning, looking to achieve ‘novel results’ while minimizing computational and carbon costs.

Renewable energy One positive climate news story recently has been the rapidly decreasing costs and increasing adoption of renewable energy sources. The carbon cost of computing can be mitigated in some ways by using renewable energy, and this is something that many cloud providers promote when advertising claims that they are carbon neutral or on their way to carbon neutrality. However, it’s important to remember that that this isn’t a panacea for waste,

33

34

Data Ethics

as the demand for energy still far outstrips the supply of clean energy. There are still trade-offs for the use of that clean energy. Clean energy used to train a large model or to power a data centre is still energy that could have been used to power homes. And claims of carbon neutrality should be examined closely, as they may cover forms of greenwashing (for instance through lessthan-effective carbon offset schemes) and ethics washing. The various issues and proposed remedies highlighted when considering the environmental aspects of data ethics show that we are facing a critical need to understand and make responsible decisions considering the environmental and social trade-offs involved in choices about data creation, storage, computing and other data processing, and to reduce waste, increase efficiencies and find sustainable solutions wherever possible.

CASE EXAMPLE  A retail group with an email problem The data protection officer for an international retail group has been struggling to address the group’s ‘data dumping’ attitude towards data and email usage, which impacts the group’s ability to comply with GDPR. There has been a lack of governance around the use of email, and the general practice is to CC everyone on everything and never delete anything. The DPO has been struggling to ensure a compliant response to a former employee’s data access request because it includes several thousand emails that require reviewing and redaction. In addition, group management is considering introducing a new ‘AI analytics’ program for the tracking and analysis of its staff and customer communications. The immediate concern the DPO has is that the proposed email analytics program is not compatible with data protection principles of fair, lawful and transparent processing, or with data minimization. However, the decision makers consider their advice a barrier to progress and plan to go ahead with implementing it regardless of data protection concerns. Although the retail group does not consider data protection a key motivator for its business strategy, it had recently listed environmental responsibility as one of its core values in its business strategy and had made a public commitment to promoting sustainable practices. The DPO researches the relative carbon costs of current email practices and the carbon costs of the proposed ‘AI’ solution. By putting a number to the carbon emissions of every email sent as between 0.03g and 26g of carbon per email, the DPO demonstrates that the current ‘data-dumping’ way of doing things is a practice that can be improved to help meet the group’s sustainability

Ethics in the context of data management

goals. The potential carbon costs are also considered as part of the evaluation of business cases for new technologies, and the perceived benefit of the proposed AI analytics solution for email does not override the added consideration of costs. The DPO collaborates with the leaders of a sustainability initiative in the organization to promote data minimization as part of reducing the carbon cost of its ways of working, and reducing the amount of data transmitted and stored as email in a ‘clean up your inbox’ campaign. Although the DPO still has to resolve a data access request with an excessive number of emails, the foundation has been laid to reduce the risk of a similar issue in the future.

Other ethical dilemmas Privacy, and the impact on individuals that can arise from the loss of that privacy, are the entry point for ethical discussions in information management, as the discussions in this context tend to be the longest running. The discussions are more complex now in the face of machine learning, big data, and the proliferation of technologies and tools for data gathering, p ­ rocessing, storage and distribution. However, as we explore later in this book, there is a range of other topics and challenges arising from modern information management disciplines and capabilities that equally require a framework for analysis and assessment. These include the development of artificial intelligence capabilities and the proliferation of data-gathering capabilities. What we lack in information management disciplines are formalized ways of assessing and evaluating these issues. However, by referring back to first principles rather than seeking to define a new ethical framework, we can apply a two-stage examination of the outcomes against first principles, balancing the outcomes against four ethical questions regarding the preservation or enhancement of human rights. The first step of the test is to ask whether the outcome might contribute positively to ‘the good’, or positive preservation of human rights: 1 Does it preserve or enhance human dignity? 2 Does it preserve the autonomy of the human? 3 Is the processing necessary and proportionate? 4 Does it uphold the common good? The second step of the test is to ask: does the outcome violate any of these four points?

35

36

Data Ethics

This test seeks a positive outcome as a determiner of ethical action. Where the positive contribution to the social good is not the priority, it balances the priorities against the necessity of preserving human rights. An action with an outcome that violates these rights may be expected to come into conflict with the societal ethic that regards human rights as a ­fundamental priority. As modern data management capabilities may process, combine or link, and make available, vast amounts of information, it is important to consider the outcomes resulting from data processing that are not the focus or intended outcome. This test will need to consider not just the intended outcome but other anticipated possible outcomes. In other words, we need to not only think about what the linear planned effects will be if everything works as planned, but what else could this impact? What are the potential knock on effects? Not only ‘what might happen if it works?’ but also ‘what might happen if it doesn’t work as expected?’.

Example test of outcomes against first principles A few brief example scenarios may show how real-world processes and outcomes might be tested against first principles. These are rough illustrations rather than in-depth analyses.

Scenario 1: Public health exposure notification app As part of a multi-pronged effort to curb the spread of a highly contagious disease, a public health body is planning to implement an experimental mobile phone app that utilizes the phone’s Bluetooth technologies to track ­potential exposures to a highly contagious disease and notify people who may be exposed so that they may isolate and be tested. Question 1: Does it preserve human dignity? Does it enhance human dignity? Preservation of life and protection of health are fundamental goals in preserving and enhancing human dignity. The primary goal of the app, if it works as expected, is compatible with this question. Question 2: Does it preserve the autonomy of the human? The question of autonomy raises issues of free and informed consent, which are extremely important for ethical medical practice. The data processed by the app has the potential to be highly invasive, and people may object to any appearance of being tracked extensively, even for a benign purpose. The potential effectiveness of the technology will be limited if people do not download and use

Ethics in the context of data management

it, but requiring people to download and use an app does impinge on their autonomy. Great care will need to be taken to ensure that the design and implementation of the app preserves the individuals’ privacy and their rights to autonomous action as ‘choosers’. It will also be necessary to consider who is to be allowed access to the information, and what controls are in place to ensure decision rights are restricted. Control measures will have to be in place to ensure that information management is centred on the individual and ensures their autonomy as active ‘choosers’ is preserved. Further complexities arise in considering that the effectiveness of the experimental technology in helping to curb infections is unknown, and it is only of any b ­ enefit as part of a larger public health response. Question 3: Is it necessary and proportionate? If the organization wishes widespread use of the app, this processing of personal data will have to be justified as necessary and proportionate. This will require reviewing the evidence of effectiveness once the app has been in use long enough to determine whether the potential benefit does outweigh the risks. In an ongoing crisis there is an argument for using technology that has not been fully vetted to prove the benefits, but once enough data has been gathered, the technology must be evaluated properly. If there is evidence that use of the app breaks some chains of transmission, then it can meet criteria for necessity. Reducing the potential invasiveness of the data gathering and processing as much as possible to still meet the goal of the app is required to ensure proportionality. Question 4: Does it uphold the common good? The purpose and design of the app is to uphold the common good. However, the nature of the technology carries with it high risks of misuse. The question of whether it upholds the common good will depend largely on the effectiveness of the design and the protections put into place to limit the use of the technology solely for its stated and designed purpose. This will also have to be balanced against the privacy aspects and the proportionality and necessity of processing. Following Privacy by Design principles and building safeguards and limitations into the design will support appropriate balance.

Scenario 2: Smart city park benches A smart cities initiative is planning on installing ‘smart benches’ in parks and along footpaths. These benches will be outfitted with solar-powered Wi-Fi hotspots and display screens that provide weather forecasts, maps and other useful information. Cameras placed at the foot of the benches will record footfall traffic and bench usage to help city planners understand and

37

38

Data Ethics

better utilize public spaces. The designers have decided on this innovative use of cameras instead of more common Wi-Fi tracking as a less data-­ intensive way of gathering information that will also capture meaningful information about usage of public spaces by children without mobile phones and people with pets. They will be placed so that they only capture people’s feet and lower legs rather than identifiable faces. Question 1: Does it preserve human dignity? Does it enhance human dignity? First, providing seating in public spaces gives elderly people and people with difficulty standing or walking for extended periods a place to rest. This does support human dignity. The data questions here are the ‘smart’ ­aspects of the benches. Free wireless internet can enhance communications, but it also carries security risks that would need to be taken into account. The foot-level cameras raise greater unintended issues. Although the design is intended to be less invasive than other data gathering techniques, it is likely that many members of the public would perceive their placement as a way of taking ‘up-skirt’ photos. This would be likely to cause distress and feelings of violated dignity. Question 2: Does it preserve the autonomy of the human? As the only way to avoid being recorded by the cameras would be to avoid a public place, this does not support the preservation of autonomy. Question 3: Is it necessary and proportionate? It would be difficult to argue for the necessity of recording footfall traffic in this particular manner. While the actual data gathering may be less invasive than the perceived data gathering, the effects of public perception may be disproportionate. Question 4: Does it uphold the common good? Installation of benches in public places is for public benefit. It could be argued that free Wi-Fi in public places upholds a common good. Easily visible and up-to-date weather forecasts can be useful for the public. Better understanding of how public spaces are used may result in improvements in design of public spaces, but this must be balanced against the likelihood of people being made to feel unsafe by methods of data gathering.

Scenario 3: Use of analytics to create a granular profile for targeted messaging An organization uses algorithmic analysis of the patterns of social media ‘likes’ to create granular profiles of anonymized users, identifying information

Ethics in the context of data management

such as age, gender, ethnicity, socioeconomic status and sexual orientation. These profiles are to be used to provide targeted messaging for marketing or political purposes to identified users who match the granular profile. Question 1: Does it preserve human dignity? Does it enhance human d ­ ignity? These capabilities themselves may not necessarily violate human dignity. However, this depends on the message delivered and the level of invasiveness involved in the profile creation. Controls would be required to ensure that the uses of this information-processing capability do not violate human dignity. Question 2: Does it preserve the autonomy of the human? Although the ­initial data captured for processing is anonymized, the resulting outcome of the aggregation and analysis is essentially identification of individuals, processing sensitive personal information. This is done without the possibility of meaningful consent on the part of the individual. Autonomy is not preserved. Question 3: Is it necessary and proportionate? It would be difficult to argue that this processing is necessary and proportionate. There may be a societal necessity to enable this type of targeted communication, but it must be balanced against the individual’s right to be left alone. Controls would be necessary to justify and ensure the necessity and proportionality of the information processing. Question 4: Does it uphold the common good? As with the question of human dignity, the technological capability is not inherently positive or negative. It would entirely ­depend on the use to which it was put.

Scenario 4: Destruction of only physical copies of medical records from a redress scheme A government agency has been running a redress scheme for survivors of certain medical abuses. The persons affected were required to submit their original hard-copy medical records for review as part of a defined statutory redress scheme. The scheme is coming to an end, and the director of the redress board has determined that all the records will be destroyed once their task is completed, on the basis that they are legally required under data privacy laws to destroy records once their purpose for having them has ended, despite the survivors having initially been told that records would be returned to them. The United Nations has invited some survivors to give testimony to a hearing on similar abuses globally. Other survivors wish to keep their records for reference in ongoing medical treatment.

39

40

Data Ethics

Question 1: Does it preserve human dignity? Does it enhance human dignity? The obligation not to retain data for longer than is necessary is a legal duty in the country in question, but non-retention does not equate to ­destruction. Human dignity is not preserved or enhanced by the destruction of the records in question. Destruction may impair the ability of the individuals to obtain appropriate medical care. Question 2: Does it preserve the autonomy of the human? The affected individuals wish to be able to present their story to the United Nations (UN) or to inform clinicians about their medical histories. Destruction of records deprives them of these choices. Question 3: Is it necessary and proportionate? It is not a necessary step. The physical records could be returned to the survivors. Where the survivor could not be identified, it would be possible to anonymize files and submit them to a university archive or other repository for historical research purposes. Question 4: Does it uphold the common good? No. There is no common good in question in this case.

The drive for effective ethics in information management In announcing in 2015 the formation of an external ethics board for data protection issues, the European Data Protection Supervisor (EDPS) ­expressed the need to ‘promote an ethical dimension in future technologies to retain the value of human dignity and prevent individuals being reduced to mere data subjects’ (European Data Protection Supervisor, 2015a). This statement revealed a concern that the understanding of the ‘data subject’ – as an individual human whose rights and dignity must be preserved – might be lost, which in turn directly reflects Kant’s formulation that ethical action will treat the human as an individual as an end, not a means. The EDPS opinion paper ‘Towards a new digital ethics’ places clear importance on the link between ethics and preserving the dignity of the human to enable ‘empowered individuals’ (European Data Protection Supervisor, 2015b). That paper outlined four tiers of ethical considerations: 1 Future-oriented regulation of data processing and respect for the rights to privacy and to data protection.

Ethics in the context of data management

2 Accountable data controllers who determine personal information processing. 3 Privacy-conscious engineering and design of data-processing products and services. 4 Empowered individuals. In this, the EDPS calls for a ‘big data ethics’ (Figure 1.1) that looks to preserving human rights via a focus on privacy in the design and engineering of big data projects, and an increased accountability for data controllers as key aspects of a future in which the individual human is seen as an end, not a means to an end. Giovanni Buttarelli, the former European Data Protection Supervisor, followed in the footsteps of Warren and Brandeis in recognizing that new technologies and modes of business call attention to the next steps that must be taken to preserve human rights, and in establishing a call for an ethical framework founded on a recognition of human rights and the fundamental concepts of human dignity and autonomy. The opinion paper also follows the reasoning of Heidegger in expressing concern about how the real-world objects, represented in the abstract by data, are manipulated in a way that is ethical. The emphasis on ‘accountable controllers’ and privacy-conscious engineering echoes Bunge’s call for technologists to be morally responsible for the technologies they Figure 1.1  EDPS vision for big data ethics

Future-oriented rules and enforcement

Accountable controllers

Ethics

Dignity

Empowered individuals

SOURCE Adapted from EDPS (2015b)

Innovative privacy engineering

41

42

Data Ethics

develop. The call to empower individuals is ultimately grounded in the Kantian view that people should not be the means to the end but the end themselves. However, the practical application of an ethical framework in the context of modern information management will need to consider organizational values, processes and development of technology in the context of fundamental ethical principles such as human rights and dignity. This extends beyond an agreed-upon ‘code of practice’ into ensuring communication of values across an organization, and governance of processes and behaviour. Without an ethical ‘tone’ set from the top, and full integration of ethical values across an organization and into the planning and design phases of the life cycle, a code of practice may run the risk of ending up a dead and useless ‘strategy’ document that bears little relation to an organization’s strategic practice, or ‘tick box’ compliance to a minimal standard that does not uphold ethical information management practices. These scenarios may result in unexpected adverse consequences. The drive for effective ethics in information management has its roots in the substantial potential and significant risks that are increasingly an inherent part of our information-processing capabilities. In Chapter 7 we will explore the themes raised in the EDPS opinion paper in more detail as we set out a framework for ethical information management in the organization that can help provide a platform for addressing these fundamental ethical considerations.

Chapter summary In this chapter we have begun the exploration of ethics in an information management context: ●●

●●

●●

We discussed why it is important for data and information management professionals to have a good grounding in ethical concepts, particularly in the modern information age. We introduced some of the ethical discussions around technology and the use of technology from Heidegger and Bunge, and highlighted how many of these concepts are echoed in data privacy laws in the EU. We discussed data privacy and data protection as high-profile examples of applied information ethics, with core ethical concepts underpinning the definition of the right to privacy in both United States and EU contexts.

Ethics in the context of data management

●●

●●

We introduced four basic ethical questions to pose when considering any information-processing activity and presented answers to them based on four real-world scenarios. We outlined the drive for ethics in data management that is emerging from the regulatory perspective, and examined the EDPS call for ‘big data ethics’ from the perspective of Kant and Heidegger.

Questions 1 Apply the four-question test to the processing of data by your favourite (or least favourite) social network. Is it acting ethically? 2 What barriers to ethical information management practices do you consider exist in your organization or in an organization with which you are familiar? 3 As a society, do we tend to rush to adopt new technologies without assessing the implications? Is Socrates’ point still valid today? 4 Companies and public-sector organizations are often faced with an inherent conflict between goals and ethics. Discuss.

Notes 1 As a left-handed person, Daragh has battled for years with scissors that were biased against him and can attest to the impact on his interaction with things such as wrapping paper. Katherine pointed this out to him as an example against the argument that technology is neutral. 2 Immanuel Kant (1993) [1785] Grounding for the Metaphysics of Morals, tr James W Ellington, 3rd edn, Hackett, London.

Further reading In this chapter we have begun to introduce some foundational concepts of ethics and information ethics. Further reading that might be of interest includes:

43

44

Data Ethics Bender, E M, Gebru, T, McMillan-Major, A and Shmitchell, S (2021) On the dangers of stochastic parrots: Can language models be too big?, Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, 610–623, doi.org/10.1145/3442188.3445922 Blackburn, S (2003) Ethics: A very short introduction, Oxford University Press, Oxford Johnson, D (1991) Ethical Issues in Engineering, Pearson, New Jersey Kleinman, P (2013) Philosophy 101: From Plato and Socrates to ethics and metaphysics, an essential primer on the history of thought, Adams Media, Avon, MA Waddington, D I (2005) A field guide to Heidegger: Understanding ‘the question concerning technology’, Educational Philosophy and Theory, 37 (4), 567–83 Young, P C (2004) Ethics and risk management: Building a framework, Risk Management, 6 (3), 23–34

References Bender, E M, Gebru, T, McMillan-Major, A and Shmitchell, S (2021) On the dangers of stochastic parrots: Can language models be too big?, Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, 610–623, doi. org/10.1145/3442188.3445922 (archived at https://perma.cc/N4M5-EETL) Benn, S I (1971) Privacy, freedom, and respect for persons, in Privacy: Nomos XIII, ed J Pennock and J Chapman, pp 1–26, Atherton Press, New York Boler, J (2016) Ethics requirements added to automotive quality standard IATF 16949, The Auditor, 8 September, www.theauditoronline.com/ethics-added-toautomotive-quality-standard/ (archived at https://perma.cc/38AM-UDFR) Bunge, M (1977) Towards a technoethics, The Monist, 60 (1), 96–107 Daiss, T (2019) Volkswagen eyes electric pivot amid growing criticism, OilPrice.com, 3 April, oilprice.com/Alternative-Energy/Renewable-Energy/ Volkswagen-Eyes-Electric-Pivot-Amid-Growing-Criticism.html (archived at https://perma.cc/FD64-P4SR) European Data Protection Supervisor (2015a) EDPS to set up an Ethics Board, 11 September, edps.europa.eu/press-publications/press-news/press-releases/2015/ edps-set-ethics-board_en (archived at https://perma.cc/9B2X-2ECG) European Data Protection Supervisor (2015b) Opinion 4/2015 – Towards a new digital ethics: Data, dignity and technology, 11 September, edps.europa.eu/ data-protection/our-work/publications/opinions/towards-new-digital-ethicsdata-dignity-and_en (archived at https://perma.cc/M5S8-QEYY) European Union (2016) Regulation 2016/679/EU, EUR-Lex, 27 April, data.europa. eu/eli/reg/2016/679/oj (archived at https://perma.cc/DU29-KQMH)

Ethics in the context of data management Heidegger, M (1977) The question concerning technology, in The Question Concerning Technology and Other Essays, ed W Lovitt, pp 13–39, Harper & Row, New York Hudson, S D and Husack, D N (1979) Benn on privacy and respect for persons, Australasian Journal of Philosophy, 57 (4), 324–9 IBM (2006) The toxic terabyte: How data-dumping threatens business efficiency, archive.org/details/TheToxicTerabyte (archived at https://perma.cc/EJ4B-RLUP) Kiernan, A (2021) Data centres and the environmental impact of our online world, Trinity News, 12 April, trinitynews.ie/2021/04/data-centres-and-the-environmentalimpact-of-our-online-world/ (archived at https://perma.cc/5U4G-LP3P) Mah, P (2021) Cracking the green conundrum in Singapore, amid a data center moratorium, DCD, 29 January, www.datacenterdynamics.com/en/analysis/ cracking-green-conundrum-singapore-amid-data-center-moratorium/ (archived at https://perma.cc/LXL4-EAS3) McGovern, G (2020) World Wide Waste: How digital is killing our planet – and what we can do about it, Silver Beach Publishing, Gormanston Obringer, R, Rachunok, B, Maia-Silva, D, Arbabzadeh, M, Nateghi, R and Madani, K (2021) The overlooked environmental footprint of increasing internet use, Resources, Conservation and Recycling, 167, April, 105389, doi.org/10.1016/j. resconrec.2020.105389 (archived at https://perma.cc/CB9F-W7EN) Plato (2009) Phaedrus, tr R Waterfield, Oxford University Press, Oxford Schwartz, R, Dodge, J, Smith, N A and Etzioni, O (2019) Green AI, arXiv:1907.10597, arxiv.org/abs/1907.10597 (archived at https://perma.cc/6PY5-SUTV) Terry, J P, Karoro, R, Gienko, G A, Wieczorek, M, & Lau, A Y A (2021) Giant palaeotsunami in Kiribati: Converging evidence from geology and oral history. Island Arc, 30(1), e12417. https://doi.org/10.1111/iar.12417 (archived at https:// perma.cc/A88K-YZ5F) US EPA (nd) Learn about Volkswagen violations, www.epa.gov/vw/learn-aboutvolkswagen-violations (archived at https://perma.cc/K5MJ-DFXM) van der Sloot, B (2015) Privacy as personality right: why the ECtHR’s focus on ulterior interests might prove indispensable in the age of ‘Big Data’, Utrecht Journal of International and European Law, 31 (80), 25–50 World Economic Forum (2019) A New Circular Vision for Electronics: Time for a global reboot, WEF/PACE, January, www.weforum.org/ reports/a-new-circular-vision-for-electronics-time-for-a-global-reboot (archived at https://perma.cc/UE2A-EMW9) Warren, S D and Brandeis, L D (1890) The right to privacy, Harvard Law Review, 4 (5), 193–220

45

46

Introduction to ethical concepts and frameworks

02

What will we cover in this chapter? In this chapter we will:

●● ●●

●●

●●

●●

●●

●●

●●

Introduce fundamental concepts of ethics. Outline how these fundamental concepts and frameworks shape our approaches to ethical decision-making. Introduce the concepts of normative theories of business ethics, including stakeholder theory. Highlight the importance of understanding the limits of our viewpoints and experience. Highlight the challenge that is emerging in terms of the understanding of ethics in the context of information management, and the importance of these foundational concepts. Introduce some concepts in relational ethics, including the ethics of care and a brief description of Ubuntu. Introduce some other common concepts in data ethics including data colonialism and ethics washing. Introduce the concepts of the ethic of society, the ethic of the organization, and the ethic of the individual as different perspectives on ethics.

Introduction to ethical concepts and frameworks

Introduction The number of blogs, articles, comments, and other publications dealing with the question of ethics in information management is increasing. Much of this has been in response to the encroachment onto data privacy rights by some high-profile technology companies as well as wider issues of ethical information handling and business practices in a variety of businesses. Looking at search trends for the term ‘data ethics’ going back to 2010 and setting it as a reference point, we see a strong and steady trend of increasing frequency of searches (Figure 2.1). When we drill into the data, we see some worrying trends. While there has been a 1,350 per cent increase in searches for the term ‘big data ethics’ since 2010, the increase in frequency of searches for the information on the fundamental concepts of ethics ranges between 250 per cent and 700 per cent during that period, which would suggest we have a handle on these fundamental issues. When we look at the top-ranked searches associated with the ‘data ethics’ search term, we find that the relative ranking of searches for questions such as ‘what is ethics?’ and ‘what are ethics?’ are solid performers. Despite an increase in recent content on the topic and an evident increase in interest in the topic, people still struggle with the fundamental question of ‘what is ethics?’ To be fair, this is a question that philosophers have been debating for millennia, and it remains a matter of debate. The more concerning trend we have observed is consistent with this data but less obviously apparent. Our experience as people talking about and teaching ethics in data and information management has been a consistent misunderstanding of what ‘ethics’ is, in the practical question of how ethics relates to data and information. This confusion has resulted in attempts to brand ‘data ethics’, ‘big data ethics’ or ‘AI ethics’ as something completely new and unrelated to already existing branches of ethics, treated data ethics as a subset of data governance, and the reduction of data ethics to simply ‘debiasing datasets’.1 Our experience in working with and teaching ethical information management concepts is that a better approach is to ask ‘what is ethics?’ and build from there. The data we referred to earlier bears out our experience. A full analytical retrospective of the history of the philosophical discourse of ethics is far outside the scope of this book, but jumping into discussion of applied ethics without a grounding in some of the basic concepts, terms and modes of thinking would be like asking you to compete in a martial arts tournament after watching a few Jackie Chan movies.

47

48

Figure 2.1   ‘Data ethics’ search terms

'Data ethics'

Compare

Search term

Worldwide

01/01/2010 – 28/10/2022

All categories

Web search

Interest over time ?

100

50

Note

Note

75

25 1 Jan 2010

本书版权归Kogan Page所有

1 Oct 2013

1 Jul 2017

1 Apr 2021

Introduction to ethical concepts and frameworks

Data management professionals recognize the importance of having an agreed definition of a concept, so in the same way as we would not write a book about data modelling without explaining some of the underpinning mathematical and logical concepts behind that discipline, this chapter aims to provide the skeleton of an operative definition for ethics that will form the basis of further discussion in this book and when thinking about ethical issues in information management. In developing this definition, we are conscious of the limitations and cultural bias in our definitions (an ethical issue itself in the fields of artificial intelligence and machine learning) and will endeavour to provide a holistic definition that considers perspectives from other cultures, but we would strongly emphasize that we are doing so from a particular set of frameworks and perspectives shaped by our culture, education and experiences. Many of the definitions for ethics we encounter in the context of information management discussions present it as a set of principles and practices to help people decide if their conduct is good or bad. This may belie a computer science bias in the definition. Ethics is not simply about defining what behaviour is good or bad, which is a binary choice between two options. Ethics or moral philosophy is concerned with describing or defining the ‘good’ or ‘the good life’ (also described sometimes as ‘human flourishing’) and understanding how we decide what is ‘good’ or what is the right action. What tools and models do you have to help you do this? There are several broad categories of approaching how to define what is ‘good’ or what is the ‘right action’. In formal philosophy, you might tend to follow a single approach down the garden path, testing the limits of the approach with thought problems, and looking for a logical, defensible theory. In the actions of day-to-day life, however, you tend to balance a mix of approaches without necessarily realizing it, making connections with and drawing on rules and frames of thinking you will have been exposed to through your education and culture. What you need to be able to do in the context of data or information management is to understand the inputs into your personal ethical model and be able to understand what formal ethical rules, principles and approaches you are applying in your day-to-day management of information and information systems, and how you are forming your ‘ethical algorithm’. This awareness of first principles and how you are applying them can also help you to describe your ethical reasoning to others either inside your organization or outside it. In many respects, this need to be aware of ethical principles and be able to explain how you are applying them is not too d ­ ifferent from the need for algorithmic transparency in big data and a­ rtificial intelligence.

本书版权归Kogan Page所有

49

50

Data Ethics

Ethical theories you should know about In this section, we look at a few schools of thought in the world of ethics and try to formulate a core definition for data and information management professionals.

Virtue-based ethics Virtue ethics are the oldest of the three major normative theories of ethics. In this ethical norm, a good decision or correct act is one that a virtuous person would make or do in that situation. In Western philosophy, the ancient Greek philosophers Plato and Aristotle are seen as the founders of virtue ethics. In ancient Chinese philosophy, the founding philosophers for virtue ethics are Confucius and Mencius. The ancient Greek and Roman philosophers tended to emphasize this school of thought, which approaches ethics through the lens of self-improvement, virtues being desirable or ‘good’ character attributes. To oversimplify, the aim of virtue ethics is to embody or live in harmony with the moral virtues valued by a culture or society. An ethical person acts in a way that makes them a better person. According to Aristotle, acting in accordance with virtue results in a well-lived life, ‘Eudaimonia’, or ‘happiness’. We see echoes of this in the teachings of a variety of religions and a host of cultural norms around the world that promote the doing of ‘good works’ as a manifestation of ethical conduct, and all of whom echo the concept of a balance between extremes as being the hallmark of virtuous behaviour. Aristotle (2000) identified a range of virtues, and aspects of virtuous behaviour in his writings. For example, one of these was the virtue of courage: ‘The man who flies from and fears everything and does not stand his ground against anything becomes a coward, and the man who fears nothing at all but goes to meet every danger becomes rash.’ If you think about this virtue in a modern information management context, this could be applied to the adoption of new technologies and methods for obtaining or analysing information. The person who says no to any change becomes a coward, but the person who rushes in and adopts new technologies with no concern for danger becomes rash. The ‘golden mean’ is a risk-based approach, where the value of the information management capability is recognized, but the risks are also acknowledged, and appropriate measures are taken to address valid fears rather than ignore them.

本书版权归Kogan Page所有

Introduction to ethical concepts and frameworks

One criticism of virtue ethics is that our values and understandings of ‘virtues’ are culturally bound. Different cultures have different focuses on what they consider to be moral goods or virtuous conduct. Which ‘virtues’ are valued over others may be different in different times, cultures and subcultures, so a focus on virtue ethics in a global context may need to engage with the relativist aspect of what is considered ‘virtuous’. These cultural differences obviously exist between different countries and ethnic cultures. However, they can equally arise in the context of the cultural frame of an industry or social subculture. For example, the virtue perspective of a technology-focused person might differ from that of a more human rights-focused individual. However, as Martha Nussbaum has pointed out, the ‘first principles’ approach of Aristotle when spelling out his virtues does provide a basis to align the perspectives on virtue from a range of cultures (Nussbaum, 1988). Virtue ethics has been the focus of renewed attention recently in the context of data ethics. This is exemplified by the contributions of Shannon Vallor. In her book, Technology and the Virtues (2018), Vallor argues that the other major approaches to normative ethics are not sufficient to address the complexity, scale and rapid development of the technosocial landscape in which we are now making decisions. She proposes that virtue ethics, the development of ‘technomoral virtues’ and moral self-cultivation will give us the tools to make the right decisions in this complex landscape.

CASE STUDY  Running with scissors Daragh has regular debates with Dr Cathal Gurrin, Associate Professor of Computer Science at Dublin City University.2 Cathal’s research is in the area of personal data analytics. For over a decade, Cathal has been wearing and working with a range of wearable sensors and devices to log and record a range of aspects of human existence and experience. Cathal’s focus is on the use of technology to improve and better the lives of people through augmentation of their memories with technology. Daragh comes from a position that technology should not unduly impact on the rights and freedoms of people in society, and the mass deployment of what is essentially a surveillance technology needs to balance both the benefits to the individual and the potential impacts on the wider community. As Cathal puts it: ‘Daragh’s the guy who is always telling me not to run with scissors’, while Daragh bemoans Cathal’s research as being ‘obsessed with building bigger, sharper scissors’.

本书版权归Kogan Page所有

51

52

Data Ethics

When Daragh analysed why there was an apparent conflict of virtue between his view and the views of Cathal, he realized that they were both talking about applying technology in a way that makes people’s lives better, but that they just had different perspectives on what that meant and what it required. Case study questions While this case study describes a debate among old friends, it highlights some interesting questions that can arise in the development of new technologies and the line between research and commercialization: 1 Can you think of a technology or a use of technology that might have sounded

good as a research concept but had unintended consequences? 2 What types of controls exist, or should exist, to ensure academic researchers

think about the potential negative aspects of their research? 3 Can you think of examples of academic studies using information or

information technologies that give rise to potentially negative outcomes for society in the absence of robust ethical controls?

Deontological ethics Another understanding of how to decide right action is based on our understanding of rules, whether moral duties commanded by a deity, or through a theory of ‘universal’ rules or laws. The word ‘deontology’ comes from the Greek words for the study of duty. Deontological ethics are based on choosing your action according to your duty to act in accordance with these universal laws of what is right. German philosopher Immanuel Kant was a famous deontologist who (among other things) developed a philosophical system that looked to determine universal ethical laws in the way we might consider the law of gravity (Stanford Encyclopedia of Philosophy, 2022). He formulated what he called the categorical imperative – formulated as ultimate, unconditional rules for moral conduct determined by objective reason. As an ethical framework, Kant’s formulations of the categorical imperative apply directly to contemporary ethical questions about privacy and human rights. In this book, we will focus on his first and second formulations of the categorical imperative. Kant’s first formulation of the categorical imperative: ‘Act only according to that maxim whereby you can at the same time will that it should become

本书版权归Kogan Page所有

Introduction to ethical concepts and frameworks

a universal law.’ In real-world practice, this can be interpreted as ‘sauce for the goose is sauce for the gander’. If I create a set of rules or code of behaviour that applies to other people but not to myself, it is not a valid rule according to this formulation. Regarding questions of information privacy, we can see this formulation as a response to the argument that ‘if you have nothing to fear you have nothing to hide’. Are people who are saying this willing to apply their argument universally? Are the state or corporate actors – who argue that people should have no reason not to open all our data to view and give up our rights to privacy – equally willing to be completely transparent with their own information and actions? The ultimate transparency of a surveillance state, whether imposed by a government or arising from commercial enterprises, also removes autonomy and dignity. Without the ability to preserve the privacy of one’s thoughts and actions one is in a continual state of exposure, comparable to having no choice but to walk down the street naked. The fact that in some situations one prefers to remove all one’s clothes (e.g. a nudist beach or in the shower) does not defend against the removal of that choice. The question of autonomy and informed consent, the ability to choose whether to share information or not, brings us to Kant’s second formulation of the categorical imperative. Kant’s second formulation of the categorical imperative is a foundational argument for human rights. As such, it is a useful check for the foundations of decisions made in information management and design of data processes: ‘So act as to treat humanity, both in your own person, and in the person of every other, always at the same time as an end, never simply as a means.’ A right action does not simply treat people as commodities, but always ensures their autonomy and dignity as human beings are preserved. This ethical law (or imperative) provides a rule of thumb for right action, in which understanding whether an action is ethical or not is founded in respect for the human as an autonomous person with the right to choose and act in their own capacity. This foundational principle centres upon respect for human dignity. The second formulation of the categorical imperative provides a clear and simple framework, a checkpoint that aligns with the concerns that modern technological advances may violate human rights and dignity. Consider the implications of this principle for ‘freemium’ business models of many online services where users effectively pay with their personal information. This is often summed up in phrases like: ‘If you are not paying for the product, you are the product’. Are these business models treat-

本书版权归Kogan Page所有

53

54

Data Ethics

ing people simply as commodities, or are they somehow acting to treat people as an end in themselves, not simply as a means to an end? Consider the announcement by Google that it was to begin linking people’s offline shopping transactions to online searching activity (Neidig, 2017) to track whether online adverts are leading to real-world purchases. Is this treating people as an end or a means? Deontological ethical frameworks primarily focus on ethics in the intent behind action or the ‘rightness of an act’ rather than the outcomes of an act. In the case of framing an applied ethics for the design of data processing and information management, these ethical principles can be a clear foundational starting point. The results of your actions are less important in a deontological framework than the fact that you took the right action, following a defined set of rules or an ethical code in making that decision. But right intent is only part of the equation. It is also extremely important to consider the consequences of an action or designed process, whether the consequences (or outcomes) in question are intended or unintended. An ethical framework for modern information practices will need to ensure that the individual’s rights or human dignity are upheld in the outcomes of the actions and processes designed. As modern information management processes increase in complexity and capacity, the risk of unintended outcomes that violate the rights of the person increases. These risks must be considered in planning and design, so that possible controls and design changes to mitigate the risk of treating individuals as a means rather than an end might be introduced. One form of deontological ethics that you are likely to interact with is rights-based ethics. Rights-based ethics form the basis for many of our legal systems through declarations of fundamental or universal human rights, which it is our duty to uphold, and which we create laws and regulations to support. These rights-based legal frameworks can be seen in the United States’ Declaration of Independence and Bill of Rights, in the UN’s Universal Declaration of Human Rights, the African Charter on Human and People’s Rights, the Council of Europe’s Convention on Human Rights with its supporting legal framework and courts (the European Court of Human Rights), and many others. Rights-based frameworks are often seen as a way to agree common rules and principles across cultures and differences in ethical frameworks and to ensure enforceability through legal structures and regulations supporting those rights. One example of this the EU’s General Data Protection Regulation (GDPR), which is founded in the protection of rights

本书版权归Kogan Page所有

Introduction to ethical concepts and frameworks

listed in the EU Charter of Fundamental Rights and specifies legal and regulatory structures to support protection of those rights.

Contractualism, the common good and justice based ethics Contractualism as an approach to ethics has foundations in social contract theories from philosophers such as Thomas Hobbes and John Locke. Essentially, social contract theories attempt to justify our norms and rules for society as a form of rational collective agreement. More recently, its bestknown example is expressed in T M Scanlon’s What We Owe to Each Other (1998). In this model, we think about ‘right’ and ‘wrong’ in terms of what we can justify to others and what others would not reasonably reject. In a ‘common good’ ethical frame, also known as social justice, the actions of individuals and organizations should contribute to the greater good of society. The common good has its origins in the work of classical ethics but has found more modern discussion in the works of philosophers such as John Rawls in the form of ethical concepts based on social justice (Rawls, 2005; Velasquez et al, 1992). At the most basic it can be defined as: ‘The common good, then, consists primarily of having the social systems, institutions, and environments on which we all depend work in a manner that benefits all people’ (Velasquez et al, 1992). Rawls explored the idea of justice as a founding principle for a social contract (Rawls, 2005), so justice ethics is a form of social contract theory that looks to increase justice. In this framework, an ethical act looks to treat all human beings equally, increasing justice. Justice would be one of the virtues common to many approaches to virtue ethics, but as it is looking for an outcome of increasing justice, contemporary justice is also a consequentialist framework (Stanford Encyclopedia of Philosophy, 2021) An example of ‘common good’ or social justice-based ethics in action at a macro level would be the provision of social services such as affordable (or free) public healthcare. It provides a public benefit but ensures equality of access, ensuring that the promotion of health is distributed equally, otherwise healthcare would be available only to the very rich. It is no coincidence that ‘justice’ is one of the core ethical principles in the Belmont Report’s guidelines (National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research, 1979) for the protection of human subjects in medical research.

本书版权归Kogan Page所有

55

56

Data Ethics

Consequentialist ethics and utilitarianism Deontological ethics are often contrasted with consequentialist ethics. Consequentialist ethical frameworks look at the outcomes of actions rather than the intent behind the actions. As an ethical framework, consequentialism is goal focused rather than rule focused. In consequentialist ethical theories, the consequences of your actions are what determine whether it is a good action or not. While the intent and following the rules are more important than the result of the action from a deontological view, in consequentialism the ends – the consequences of an action – determine whether the means is right. Many discussions in the ethics of data and technology are framed in the context of harm, and of avoiding or minimizing harms. Harm is a key consequence, so it is likely that from a pragmatic perspective some consequentialist framing is likely to be part of your discussions and decision-making ­processes – whether you use consequences as the main way of deciding on an action or design. Consequences, or outcomes, can be a clear and concrete way of measuring ‘is this good?’ or ‘is this what we want?’, but in complex systems it’s not always easy to see clear cause and effect, and in many cases this is complicated by a need to determine a balance of many different potential harms and benefits to many people, and there is no simple calculation to determine this. Utilitarianism is one of the best-known forms of consequentialist ethics. It is most closely associated with the works of the philosopher John Stuart Mill (Stanford Encyclopedia of Philosophy, 2016). Under a utilitarian view of ethics, we must act to maximize human welfare and minimize harm. One of the best-known expressions of utilitarianism in popular culture is Spock in Star Trek II: The Wrath of Khan: ‘The needs of the many outweigh the needs of the few [or the one]’. However, if the outcomes of an action are what counts, a consequentialist framework would allow clearly unethical or immoral acts up to and including murder, if the benefit was great enough. If you follow this path to its logical conclusion, if the organs of a healthy person would save the lives of five people in need of organ transplants, it would maximize the benefit and thus be ethical to murder the healthy person in order to save the lives of five. You can see the results of this kind of thinking in arguments attempting to justify the decision by the United States military to drop atomic bombs on Hiroshima and Nagasaki. As a consequentialist decision, the argument

本书版权归Kogan Page所有

Introduction to ethical concepts and frameworks

would be that the extreme destruction of the act minimized harm by ending the war quicker, thus resulting in fewer casualties. However, the complexity of follow-on consequences quickly compounds, and it can be easy to risk becoming paralyzed by consideration of possible downstream effects. We also see this in our consulting work where people in organizations rationalize the excessive processing of personal data or acquisition of data on questionably legal grounds on the basis that their data analytics process will have a benefit to society. Another example where this arises is in the context of CCTV or other forms of surveillance technology where the argument is often put forward that the maximum benefit to society arises from a sacrifice of rights to data privacy. Another problem with utilitarianism as an ethical framework is that the argument of ‘maximizing benefit and minimizing harm’ doesn’t necessarily mean that benefit and harm are evenly spread. What if the ‘maximized benefit’ benefits only a few? An extreme example of this currently is a movement of ‘longtermism’. The logical conclusion of much of this movement seems to be justifying significant harms to people alive today via claims that these harms are necessary to create long-term benefit for theoretical people who may exist in the far future.

Stakeholder theory versus shareholder/stockholder theory One area of business ethics concerns the question of to whom an organization has moral or ethical obligations. This is encapsulated in two competing schools of thought: stakeholder theory and shareholder/stockholder theory. These different perspectives directly affect the focus of the organization when assessing the appropriateness of any course of action. Stockholder or shareholder view is the more traditional view of the corporation and its role. It narrowly focuses on a corporation’s fiduciary obligation to increase value to its shareholders by maximizing profits while complying with law by avoiding fraud. This approach views shareholders as the economic engine of the organization and the only group to which the firm must be socially responsible. As such, the goal of the firm is to maximize profits and return a portion of those profits to shareholders as a reward for the risk they took in investing in the firm. It is often referred to as the Friedman doctrine as it was framed by Milton Friedman (Friedman, 1962) as follows: ‘There is one and only one social responsibility of ­business – to

本书版权归Kogan Page所有

57

58

Data Ethics

use its resources and engage in activities designed to increase its profits so long as it stays within the rules of the game, which is to say, engages in open and free competition, without deception or fraud.’ In effect, shareholder theory says that the primary objective of the organization is to make money for its shareholders, and as long as it stays within the rules (or does not get caught breaking them), anything goes. While a dominant theory in business management, one problem with shareholder theory is that it can drive short-term behaviour by managers whose performance bonuses and salaries are usually linked to the bottom-line performance of the organization (Spicer, 2014). These criticisms echo the thoughts of W Edwards Deming, one of the pioneers of the quality management movement, who famously described short-term focus on tangible numbers as being one of the ‘seven deadly diseases’ of modern management (Deming, 1986). Stakeholder theory broadens focus to an organization’s fiduciary duty to not just its shareholders, but its stakeholders. This includes a duty to balance the interests or legal and moral rights of all the organization’s stakeholders, both internal and external (Freeman, 2010; Phillips, 2003). Stakeholders are those who have a vital interest in the corporation, both those who affect the organization and those who are affected by it. This may include owners, managers and employees of a company internally, and external stakeholders such as shareholders, customers, suppliers, creditors, the government or regulators, and society in general, and even the natural environment. Organizations need to identify their legitimate stakeholders and prioritize them, finding the best balance of potentially competing or conflicting interests in order to make the right decisions for the organization. These priorities should include ensuring that the rights of stakeholders are not violated. In a paper by Smith and Hasnas (1999) on the application of normative theories of ethics to information management, they describe one of the key functions of stakeholder theory as being to develop the ‘algorithm’ to balance the competing interests of different stakeholders. We will return to Smith and Hasnas later in this book to explore some of the other ideas in their paper, as they apply to actually putting ethical information management into practice. You might consider shareholder and stakeholder theory as being expressions of a commercial ethical virtue in the ethic of the organization.

本书版权归Kogan Page所有

Introduction to ethical concepts and frameworks

Relational ethics If you are working in a multinational company or developing a product with the intent of global reach, it will be helpful to keep in mind that ‘Western’ frameworks for ethics may overlook or not adequately consider ways of thinking and cultural traditions that are deeply important to other cultures. The differences are things you may want to keep in mind. Not only is it important to remember that our ‘ethic of society’, our frameworks for conceptualizing the world and our relationships with others can conflict with other ‘ethics of society’, there are situations where universalizing from our experience and viewpoint and failing to consider the assumptions and gaps that our own frameworks may have can cause harm to others. You may have noticed a few commonalities between the normative theories or approaches we’ve described so far. In essence, these approaches models for normative ethics have tried to create what is essentially an objective, universally applicable model, which would be independent of religious belief, specific situation, or (particularly in the case of European and North American philosophers) the relations between people as contexts. Generally, these frameworks have been developed through European and North American intellectual history, which has had significant influence globally and has not recognized the development of other frameworks. These normative approaches work from abstract principles, and some have argued that the approaches are too individualist and do not accommodate more communitarian frameworks or the role of interpersonal relationships in moral decision making. Critics have observed a false presumption of impartiality and noted that contextually, the development of these normative theories were often complicated by misogyny, racism and an imperialist mindset that justified treating groups of people as ‘a means to an end’ or as subhuman. These criticisms are not new, and ‘overlooking’ differences while universalizing from limited experience happens not just in international experiences, but also in a single culture where different experiences are not ­recognized. Gendered normative assumptions and other normative assumptions relating to class and ethnicity within a culture are other points where not taking into account different experiences and priorities have caused biased models and poor outcomes. For just one example, at the turn of the 20th century, philosopher, political theorist, and social worker Jane Addams (1902) critiqued abstract and

本书版权归Kogan Page所有

59

60

Data Ethics

individualist moral philosophy as inadequate to address the reality she saw working for social reform with working-class immigrant women in Chicago. She saw ‘objective’ and utilitarian philosophy as incompatible with democracy, arguing, ‘to attain individual morality in an age demanding social morality, to pride one’s self on the results of personal effort when the time ­demands social adjustment, is utterly to fail to apprehend the situation’. Ethical frameworks and models of thought in many cultures around the world that developed independently from ‘Western’ European intellectual traditions put an emphasis on our relationality, our interdependence, and connectedness with the world around us that is less recognized or developed in the approaches we’ve summarized so far. While there is no way we can do justice to the variety of ethical frameworks around the globe in this chapter, we at the very least want to note this while introducing a few ethical concepts characterized by ‘relationality’. In data ethics we are looking to apply ethics in contexts that involve relationships and contexts of social effects, so concepts of relational ethics may be very helpful in refining your understanding.

The ethics of care In 1902, Addams observed that the absence of meaningful relation between people giving charity or doing social work and the people receiving charity caused distrust of utilitarianism and objective ‘ethical’ impulses towards charity, with one exception: visiting nurses, ‘who by virtue of their professional training render services which may easily be interpreted into sympathy and kindness, ministering as they do to obvious needs which do not ­require investigation’ (Addams, 1902). The model of the relationship between caregiver and care receiver that Addams described recognized a form of relational ethics, which she developed in arguments for social ethics. In the 1980s, a number of feminist theorists developed another theory of relational ethics based on a model of the relation between caregiver and care receiver, like the relationship between mother and child, or nurses (comparable to the caring social relationships Jane Addams had observed nearly a century earlier). An ‘ethic of care’ was proposed by Carol Gilligan in the early 1980s critiquing Rawls’ theories of justice ethics, and in response to a psychological theory of moral stages of development proposed by Lawrence Kohlberg, critiquing gender bias in Kohlberg’s research that resulted in a biased theory

本书版权归Kogan Page所有

Introduction to ethical concepts and frameworks

that universalized from observations of privileged white boys and men. Gilligan argued that because boys and girls were raised and socialized differently in US society, they often developed different perceptions of priority for moral reasoning: where boys were developed to value abstract ideas of ‘justice’ and ‘fairness’ more, girls’ development often resulted in more relational ethical frameworks that focused more on attentiveness, trust and responsibility and compassion as values. Creating a ‘universal’ theory or model based on a small and biased sample group (for instance a study that observes only white American boys and men of a privileged socioeconomic status) will result in inadequate outcomes, such as a model of moral development that judges groups that do not fit your study demographic as having inadequately developed moral reasoning. Gilligan’s theories sought to balance the failings she saw in justice ethics, and with models for ethics and moral development, with models for understanding ethics based in caring relationships, prioritizing the pattern of moral development and values that Kohlberg’s model failed to recognize. As Virginia Held describes the relationship between justice ethics and care ethics, ‘An ethic of justice focuses on questions of fairness, equality, individual rights, abstract principles, and the consistent application of them. An ethic of care focuses on attentiveness, trust, responsiveness to need, narrative nuance, and cultivating caring relations’ (Held, 2006). Care theorists have developed approaches to ethics that start from the understanding that we are all dependent on our relationships to others. We all need care and give care to others. These relationships of care are not just one-way give and take, they are reciprocal, and we are interdependent with each other. Joan Tronto (2012) describes care ethics through five basic characteristics: 1 Attentiveness, a proclivity to become aware of need 2 Responsibility, a willingness to respond and take care of need 3 Competence, the skill of providing good and successful care 4 Responsiveness, consideration of the position of others as they see it and recognition of the potential for abuse in care 5 Plurality, communication, trust and respect; solidarity – caring with These broad principles can be useful for focusing a research effort, project or business plan. One simple way to think of it is that attentiveness could be looking to find a problem that needs solving, not building a thing to find a

本书版权归Kogan Page所有

61

62

Data Ethics

problem for. You are taking the responsibility and action to address that need. Having the skill to do so is competence, and responsiveness is thinking about and addressing the possible risks and how your planned data use, technology or system could be abused. Care ethics have largely developed as a ‘Western’ feminist response to other Western philosophical theories. Some of the insights of care ethics echo the emphasis on relationality in other philosophical frameworks.

Relational ethics and ‘non-Western’ or ‘non-Eurocentric’ frameworks This section aims to briefly introduce you to some ethical frameworks that developed outside of European traditions. While we briefly mentioned Confucian philosophy as an example of virtue ethics, the way ‘ethics’ as a branch of philosophy is generally taught in Western academia tends to follow European traditions. Researchers and philosophers have identified this as limiting when trying to consider ‘universal’ ethical principles to guide technological development and AI, and other sociotechnical systems that are deployed globally and will interact with different ‘ethics of society’ and different social and cultural contexts. Data ethicists such as Abeba Birhane look to global philosophical traditions to interrogate assumptions in research and data science founded in European traditions that emphasize rationalism, assumptions of fixed conceptual dichotomies such as ‘good’ and ‘bad’, ‘emotion’ versus ‘reason’, or ‘ethical’ versus ‘scientific’. As an Ethiopian researcher based in Ireland, Birhane has developed a model of data ethics based on relationality through a model of ‘ubuntu’, which grounds abstract concepts in context and history, and what she calls an ‘engaging epistemology’. She argues against a strictly ‘rationalist’ world view exemplified by Rene Descartes as a solipsistic and reductionist false ‘logic’ that creates a false presumption of objectivity or a ‘view from nowhere’, which tends to confirm its own assumptions and cannot accommodate complexity and ambiguity (Birhane, 2021). To remediate this, she proposes approaches based in relational ethics to consider the relations between people when designing and deploying systems that affect people, considering at the centre of our design process the impacts on people who are disproportionately affected. Dominant views in computer science and AI development have tended to consider these effects as ‘outliers’, designing for a normative standard (which is often white and

本书版权归Kogan Page所有

Introduction to ethical concepts and frameworks

male) and a ‘happy path’ where everything works as expected. This is contrary to algorithmic justice or ethical data management. (This argument is also reflected in justice-based approaches to data ethics, such as CostanzaChock’s ‘Design Justice’). Birhane describes relationality as an approach that requires openness and ‘revision and reiteration’ in our understandings of concepts such as ‘bias’ and ‘fairness’, understanding that these can be dynamic depending on context and there isn’t a single final description. She also argues for the prioritizing of understanding over prediction, and an understanding that when we develop classifications and predictions in data science and machine learning, we create systems and practices that ‘create, sustain, and alter the social world’.

Ubuntu (The authors are grateful to our colleague Blessing Mutiro for sharing his insights on ubuntu with us.) Ubuntu is an African ethic that is derived from the philosophy of ubuntu. The philosophy of ubuntu is derived from linguistic expressions of Bantu communities found in Southern Africa, South-East Africa and Central African communities such as Zimbabwe, South Africa, Mozambique, Zambia, Malawi, Eswatini, Tanzania and Democratic Republic of Congo. It denotes a world view that is best expressed as an aphorism in Bantu languages such as Umuntu ngumumntu ngabantu (Nguni/Zulu/Ndebele) or motho ke motho ka batho ba bangwe (Sotho) or kunzi munhu vanhu (Shona). This expression has no exact translation to English; however, the closest of such translation is ‘as a person is a person among other persons’ (Broodryk, 2008; Dolamo, 2013; Tutu, 1999). It has also been translated to English to mean ‘I am because we are, since we are therefore, I am’ (Mbiti, 1969: 215). Ubuntu as an ethic is relational in contrast to most Western ethics that are individualistic in nature. In addition to being relational, ubuntu as an ethic has four other characteristics. It is dialogical, which requires dialogue between God, ancestors and human beings to attain the ideals of ubuntu. It is consensual and spiritual, which means that it is established and operationalized in the world of the living because of an agreement between the spirit world and the world of the living. It is also horizontal and vertical as it governs relations between living human beings and their relations in the spirit world (Mangena, 2016). Ubuntu consists of several values, which include communitarianism, interdependence, dignity, solidarity and responsibility. However, at its core is

本书版权归Kogan Page所有

63

64

Data Ethics

communitarianism, which can constitute a virtue, a procedure or an outcome. Ubuntu is a communal way of life of the Bantu-speaking people and is not attributed to an individual, unlike other ethical philosophies such as Kantian deontology or virtue-based ethics. Ubuntu requires that the wellbeing, interests and needs of the group be given priority over the needs of the individual. It emphasizes compassion and caring for the well-being of others because the interests of the group have priority and the community is at the centre of moral deliberations. Matters of what is right and wrong are determined by the group or community and not the individual. However, ubuntu does not negate the ­individual, who is important in so far as the individual contributes to the development of the community. The community, therefore, becomes responsible for the actions of individuals whose behaviour is judged concurrently with that of the community. This places rights of individuals in the group as duties of the other members of the community. As such, where an individual suffers harm, the whole group suffers harm and where the group suffers harm the individual also suffers harm. This brings into play another key value of ubuntu, which is interdependence whereby the existence of an individual is dependent on other people. Violations of the being of an individual are intolerable to the group because of this interconnectedness. As rights of individuals constitute duties of members of the community, ubuntu requires responsibility. Responsibility places obligations on individuals who form part of the community. These obligations include preventing harm to other individuals or the community and most importantly showing concern for the welfare of other people in society. People have a responsibility of care of other people who constitute the group or community. Taken in a technology context, ubuntu espouses the development of technology that is cognizant and values group or community relations. It demands development of technology that considers the welfare of the group and how negative impacts on individuals are negative impacts on the community that the individual belongs to. It also demands considerations of how negative impacts on a community are negative impacts on the individual. One criticism of ubuntu relates to its failure to meet the criteria of normative ethics. This is because ubuntu, like other African ethics, ‘lacks a welldefended general principle grounding particular duties that is informed by such values and that could be compared to dominant Western theories such as Hobbesian egoism or Kantian respect for persons’ (Metz, 2007). As such, ubuntu must be supplemented or aided by Western concepts for it to be complete. However, such criticisms negate the fact that Africans have moral

本书版权归Kogan Page所有

Introduction to ethical concepts and frameworks

standards against which human behaviour is judged as right and wrong. These are not based on single principles or norms but on rules, customs and traditions developed by the community and an individual. Thus, ubuntu is different from Western notions such as deontological, consequentialist and virtue-based ethics because it espouses a way of life as opposed to containing general defended principles and norms.

Maˉori traditional world views, ethics and data An example of philosophical world views that are not well described by fixed dichotomous binary ‘good/bad’ classifications are various Maori traditions and values. Maori ethical values and practices, as understood to have developed pre-European contact, are described in terms of the sacredness of an interconnected world in which understanding your kinship, following the example of the ancestors, connection and being in accord with the nature of things are ways to guide right action. Traditional Maori cultural concepts and values include ‘tika’, which may be roughly translated as ‘natural’ or ‘right’ and ‘appropriate’, ‘tikanga’, appropriate customs or principles, a respect for ‘mana’, the sacred power or essence of things, which has also been roughly translated to ‘dignity’ or ‘status’, or described as a dignity or power present in someone or something, and interactions and actions are guided by ‘tapu’, sacred and restricted customs (Te Ahukaramu, nd). Western observers of Maori ethical frameworks comparing Maori concepts such as tika with Western philosophical frameworks were struck by what they saw as a ‘lack’ of conceptualizing a binary good/evil in comparison with Christian moralities. In contrast, tika was guided by values of interconnectedness and respect, mana and tapu (Perrett and Patterson, 1991). One example of how perspectives on data differ when taking into account different world views and perspectives can be seen in the approach to knowledge and research, and frameworks and initiatives data sovereignty developed by Maori peoples. Where ‘Western’ conceptualizations of data rights have focused on the individual and harms to the individual, Maori data is considered to be a ‘taonga’ or valued treasure and it is collectively owned, not individually possessed or owned. According to Karaitiana Taiuru, ‘Maori custom does not see a difference between our land and our data’ and there are complex ­cultural considerations, not just about ownership and rights, which may include intergenerational rights and obligations, but around the origins of data and considerations of such issues as ‘Maori data about the living being stored with Maori data about the dead’ (Taiuru, 2022).

本书版权归Kogan Page所有

65

66

Data Ethics

Ethics reviews for academic research in New Zealand and the resulting approved research have resulted in cultural conflict in the past. As a result, some researchers have developed frameworks for research with Maori communities in alignment with principles that respect Maori traditions and values (Health Research Council of New Zealand (nd); Smith et al, 2001). These models have been adapted for data ethics and to look at ethical considerations in information security in New Zealand (Taiuru, 2020). As part of its data ethics toolkit, the Government of New Zealand has published Nga Tikanga Paihere, a framework for responsible data use (Data.govt.nz, nd). As we are Westerners summarizing a rough sketch of complex and diverse cultural values from other people’s descriptions of Maori traditions and ways of thinking, we encourage you to seek more direct expertise in Maori culture for further information and examples. Some resources include Dr Karaitiana Taiuru’s work at https://www.taiuru.maori.nz/ and the Maori Data Sovereignty Network, Te Mana Raraunga.

Current concepts in data ethics: data colonialism and ethics washing In this section we will briefly introduce you to a few concepts that are the subjects of contemporary debate in many communities concerned with data ethics.

Data colonialism Recent searches for trends in interest for ‘data ethics’ showed that the geographical regions where the search terms were most popular were all countries that have been grappling with the effects of colonization (Figure 2.2). We mentioned earlier that some of the criticisms of the dominant approaches to ethics include noting that some of the most noted theories of ethics were developed by generally upper-class European men, who historically proposed universal principles from their own viewpoints and did not necessarily consider women and people of other races to be fully human. For instance, while Immanuel Kant is a foundational philosopher for deontological ethics whose writings were hugely influential in ethics, philosophers tend to ignore the fact that he also wrote an extremely racist theory of racial hierarchy (Mills, 2005). These theories and others from prominent

本书版权归Kogan Page所有

Figure 2.2   Google Trends interest by region for the search term ‘data ethics’ Worldwide, 01/01/2010 – 28/10/2022

Interest by region ?

Include low search volume regions

Region 1

Zimbabwe

2

Ethiopia

64

3

Kenya

44

4

Philippines

44

5

Nepal

27

100

< Showing 1–5 of 28 regions >

67

本书版权归Kogan Page所有

Data ethics

68

Data Ethics

philosophers and scientists created a ‘scientific’ justification for colonialism, which, while claiming universal values of equality and dignity, denied recognition of humanity to indigenous peoples of the Americas, Africa and Asia. One of the reasons this is important in the consideration of data ethics is that many people are calling out what they see to be parallels in modern data practices from corporations and researchers based primarily in North America and Western Europe. These practices have been linked to large-scale harms and exploitation of imbalances in power and resources. Critics and researchers from around the world, particularly from the Global South, indigenous peoples and nations, have identified the way the development of computing infrastructure and research and commodification of data has developed has reproduced patterns of extractive practice that were seen in colonization. It has been a subject of concern for policymakers and practitioners in medical informatics in African countries for approximately two decades (Dauenhauer-Pendley, 2017). This ‘data colonization’ is often driven by Big Tech and Big Data monopolies instead of nation states (Birhane, 2020), but has also been identified in humanitarian ICT efforts. While it is true for all jurisdictions that developments in data and technology tend to outpace efforts to legislate for and regulate responsible use of technology, researchers like Lizza Dauenhauer-Pendley have observed that data colonialist practices in humanitarian efforts ignored privacy and data protection laws that were already in place in African countries, implementing practices that they would not carry out in Europe or North America because of privacy protections. In doing so, tech and data-driven humanitarian activities have created ‘Silicon Valley-centred’ systems that are more focused on the data available and technological capabilities than on people and their actual needs (Dauenhauer-Pendley, 2017). This data colonialist pattern was prominent globally in many tech solutionist experimental innovations introduced in response to the Covid-19 pandemic, and in some cases this resulted in the devotion of resources that were sorely needed for historically successful public health measures being diverted to experimental technologies that still have no published evidence of effectiveness. Large multinational corporations have essentially treated data of people in a similar way to the doctrine of ‘terra nullius’ – in essence ‘data nullius’ – acting on the principle that no-one ‘owns’ the data they extract and so seizing it is legal. This extractive nature of data colonialism is also linked to what Shoshana Zuboff (2019) describes as ‘Surveillance capitalism’: a ‘new economic order that claims human experience as free raw material for hidden commercial practices of extraction, prediction, and sales’. Discussions of

本书版权归Kogan Page所有

Introduction to ethical concepts and frameworks

data colonialism also identify imbalances of power and access availability to computing power and resources that can interact with ecological and environmental concerns in data ethics. Another aspect of data colonialism has been research, data collection and development of systems and products that use data in ways that are culturally appropriative, or disrespect deeply held traditional beliefs and cultural principles (or indeed ethical frameworks) of the people whose data is being used. Cultural appropriation is even seen in the name of the range of philosophical beliefs identified as ‘ubuntu’, since as Birhane has noted, an internet search for ‘ubuntu’ largely turns up results for a Linux distribution (Birhane, 2021). One response to data colonialism has been Indigenous Data Sovereignty movements, in which indigenous peoples across the globe have resisted data colonialism and engaged in decolonization of data, establishing their rights to their data and governance over their data as part of asserting self-­determination and rights to self-sovereignty as a whole. Some examples of Indigenous Data Sovereignty initiatives include the US Indigenous Data Sovereignty Network, Te Mana Raraunga and other Maori data sovereignty projects.

Surveillance capitalism The modern adage that reminds us to think about who benefits from ‘free’ advertising-supported services, ‘if you are not paying for the product, you are the product’, is now out of date. For the issue of commoditization of personal data Katherine has been calling ‘Soylent Data’, Shoshanna Zuboff (2019) has described and expanded upon the term ‘surveillance capitalism’ in her book The Age of Surveillance Capitalism. She describes the issue of extractive practices of the extensive tracking, commodification and monetization of our data through big data mining, predictive analytics, adtech and the core business models of the tech giants such as Google, Amazon and Meta, through which much of our online life is mediated. This model goes far beyond the Big Tech companies and has permeated through our lives in practices of data collection and tracking through connected devices such as our phones and TVs, apps, sensors, our day-to-day purchases with or without loyalty cards, etc. As Zuboff puts it, it is ‘a new economic order that claims human experience as free raw material for hidden commercial practices of extraction, prediction, and sales’. This practice of surveillance capitalism not only impinges on our privacy but on our autonomy, as the aims of surveillance capitalism are to offer certainty to companies by predicting

本书版权归Kogan Page所有

69

70

Data Ethics

our behaviour, but also influencing or controlling it. This is fundamentally a threat to our capabilities of self-determination and control and a threat to democracy, particularly when surveillance capitalism goes hand in hand with a surveillance state.

Ethics washing With increased attention on the harms caused by the use of data about people in particular has come increasing recognition of a need for ethical data use and calls for greater regulation to govern the use of data and development of large-scale data-processing projects like AI. However, this has been met with resistance from large corporations that have built enormous p ­ rofits through business models based on extractive and exploitative data practices that might be curbed by increased regulation. Similar to ‘greenwashing’, in which organizations attempt to present a ‘green’ climate-friendly image to circumvent attempts to effectively regulate practices contributing to the global climate crisis, ‘ethics washing’ attempts to avoid effective regulation that would curb exploitative and harmful data practices through promoting an ‘ethical’ image, capturing and steering the global debate around ethics in data, and by promoting ethical principles and ‘self-regulation’ as a substitute for regulation. Promotion of ‘ethical principles for AI’ and ‘self-regulation’ as a means of avoiding effective regulation or to prevent the development of laws and regulation that would limit organizations and attempts to direct the proposal and development of regulatory regimes in a way that would be favourable to those organizations are forms of ethics washing. An example of concerns about ethics washing was seen in the development of the EU Guidelines for Ethical AI. People noted the prevalence of corporate and Big Tech contributors and the relative lack of academic and civil society members. The result was a document that critics found had significant gaps in framing issues clearly and proposing workable solutions (Veale, 2020). Since we have written a book on data ethics, it should be clear that we think ethical information management is extremely important and regulation is not a replacement for ethics. The former European Data Protection Supervisor, Giovanni Buttarelli (2018), described the relationship of ethics to regulation in data in a speech to the 40th International Conference of Data Protection and Privacy Commissioners, saying that ‘ethics come before, during and after the law. It informs how laws are drafted, interpreted

本书版权归Kogan Page所有

Introduction to ethical concepts and frameworks

and revised. It fills the gaps where the law appears to be silent’. It is from this viewpoint that we emphasize the need for both ethical data initiatives independent of regulation – guiding ethical data use where laws and regulation are insufficient to determine how data should be used – and a need for effective laws and regulation to enforce data use according to the ethic of society. Ethical principles do not substitute for laws and regulation, nor do laws replace ethics. Both are required to ensure harm to people through our use of data is prevented.

Ethical debt Ethical debt, a concept discussed extensively by Casey Fiesler and Natalie Garrett (2020), is what occurs when ethics aren’t considered. Like technical debt and data debt, its cousins in the world of information management and software development, the costs – to privacy, security and harm to victims – often come due many years down the line when you take a ‘we’ll fix it/consider it later’ approach to ethical issues. By failing to think about how a tool or service can be misused or abused, it has the potential to lead to untold harms to the rights and freedoms of others.

CASE STUDY  Zoom bombing During the early days of the Covid-19 pandemic, as video conferencing was embraced as an essential mainstream tool for work and socializing, people began to take advantage of weaknesses in the privacy and security models of popular video conferencing tools to gatecrash other people’s meetings, often displaying inappropriate images or video, or engaging in racist or sexist slurs to harass the meeting participants, who were sometimes young children attending school online during lockdowns (Meineck and Schwenn, 2020). Zoom’s CEO would later recount to the New York Times (Singer, Perlroth and Krolik, 2020) that it simply hadn’t considered other use cases for its product and the types of risks or security threats that might arise. In short, Zoom never anticipated that awful people might do awful things outside the normal sphere of control of a corporate IT department or governance structure. Both Zoom, Microsoft and other video conference platform providers have learned a lot about the ways their tools can be used, abused and misused since then.

本书版权归Kogan Page所有

71

72

Data Ethics

Fiesler and Garrett highlight the key problem with ethical debt, like technical debt, is that ‘it has to be paid back – with interest.’ When we think of technical debt or data debt in organizations, this means incurring higher costs of system or process changes, or increased costs of poor-quality data or rework of data integration efforts. Organizations often feel this impact on their bottom line or in their profit margins. Ethical debt has more profound potential impacts on individuals and society. As technology and data processes are increasingly embedded in our lives, the stakes are higher and the repayment rate on ethical debt is higher for all of us.

Common elements of ethical frameworks As we mentioned in describing virtue ethics, different cultures around the world prioritize different ‘virtues’. While philosophers may look for universal ethical values, it is important to remember that in practice there is no one universal ethical framework or understanding of ethical priorities. We navigate overlapping relative ethical frameworks daily, negotiating how our own understanding of what is right and good is like or different from the understandings or ethical frameworks of other people and groups of people.

The ethic of society Various human groups develop their own norms, including ethical norms. These norms may deprioritize or remain blind to certain things that other cultures consider vital to ethical behaviour. Societal groups and cultures develop common ethical frameworks shared within that society or culture. ‘Cultures’ or societal groups may be very large constructs, such as our understandings of national cultures or even larger geographical constructs such as our distinction between ‘Eastern’ and ‘Western’ cultures. Cultures or societies may be much smaller subunits, down to families. One example of an ethical value for which organizations will encounter different interpretations globally is the differing cultural understandings of the relationship of the individual and society, and the resulting effects on the concept of ‘privacy’ as a value. In cultures that were greatly influenced by the values and philosophies developed in Europe during the Enlightenment, privacy as a concept is seen as fundamentally enabling the

本书版权归Kogan Page所有

Introduction to ethical concepts and frameworks

ability of the individual to develop himself or herself as a fully rounded personality – both with regard to how you present yourself to society but also how you develop your ‘inner self’ and formulate your independent moral and social philosophy. Privacy allows for that space in which you can formulate the thoughts and opinions you might later choose to express, or not to express, to others. While we may often find common ground across cultural and societal groups, within a group people tend to develop a certain shared understanding of priorities and of what is ‘right’. At a global level, we can see this in differences between cultural understandings of the individual’s relationship to the larger social group. Ultimately, the ‘ethic of society’ affects the expectations that people in that society have of, for example, the way things should work, or the way that information systems should ­support humanity.

The ethic of the organization Organizations develop their own culture and values or ethical norms. As a body of people within a cultural construct, every organization develops its own organizational culture. The cultural tone for an organization is often set from the top, as leaders set the organization’s values and priorities. To a greater or lesser extent, these values may be very like the values of the larger society the organization developed in, but the organization may also develop different priorities and values (Figure 2.3). Figure 2.3   The relationship between societal ethics and organizational ethics Ethic of society Ethic of the organization

本书版权归Kogan Page所有

Ethic of the individual

Outcomes of organization activities Society’s expectation

73

74

Data Ethics

Some organizations value ethical standards – such as altruism or the focus on benefit to society – more than others, but in all cases there is a drive to find a balance of priorities and values that result in a functional organization. If the cultural values or ethical framework of the larger society and the cultural values of the organization do not match, this can cause friction between the outcomes, driven by the decisions made in the organization and the expectations of society. One broad example that often causes problems is an organizational ethical framework that primarily focuses its attention on the bottom line of the business at the expense of broader social impacts. Examples of this behaviour might include illegal dumping of waste, inappropriate acquiring of customer data, or sourcing products or raw materials from illegal or inappropriate sources. If the organization supports and enables ethical decision making, this can support the success of the organization. Ethical information management and ethical decision making are increasingly being recognized as a competitive advantage in a competitive global market. Virtues and values such as trustworthiness, beneficence, fairness or justice, respect for privacy and accountability promote good relationships between the organization and its stakeholders and sustainable business models. Public exposure of ethical breaches in information management and business practice have adversely affected not just the reputation but the bottom line of several large global organizations, driving demand for clear codes of ethics across multiple sectors, from automobile manufacturing to machine learning and AI.

The ethic of the individual When considering ethics for information management, we as individuals are negotiating our particular place in our organizations as well as within society. Our personal ethical development is strongly influenced by the cultural frameworks we developed within, and our relations to the ideas, people, organizations and cultures we interact with daily. You may be influenced by these ethical frameworks, but you may also be influencers. Individual people may have higher ethical standards or a clearer ethical vision than the standards and expectations of the surrounding societal ethical framework. These people may be visionaries and leaders, driving cultural change or refining the cultural understanding of what actions are ethical. One of the challenges we face in organizations is to align the balance between the organizational ethic and the societal ethic in a way that sup-

本书版权归Kogan Page所有

Introduction to ethical concepts and frameworks

ports the ethics of the organization’s stakeholders both within the organization and in society. How your personal ethical views are formed is an important factor in this context. How you express your personal ethic, and how you align it with the ethic of the organization, is a critical aspect of responsible information management.

Chapter summary In this chapter: ●●

●●

●● ●●

●●

We introduced some of the foundational theories of ethics that need to be considered in the discussion of ethics in the context of data and information management. We introduced the ideas underpinning stakeholder theory and other normative models of business ethics, which are important to understand in the context of understanding why organizations, and people in organizations, make the ethical choices that they do. We introduced some concepts in relational ethics. We described some common terms and current issues for ethical debate. We introduced the concepts of the ethic of society, the ethic of the organization and the ethic of the individual, and highlighted some of the issues that can arise when there is a disconnect or misalignment between these factors.

Questions 1 What ethical approach set out here best describes your personal code of ethics? 2 Can you identify some gaps in your approaches or experiences that other frameworks or viewpoints might address? 3 How are ethical values communicated and instilled in the organization you work in, or in the school you attended (or are attending)? What are those ethics? 4 How might a stockholder/shareholder theory approach to business ethics create challenges for you working in an information management function? What sort of ethical conflicts might arise?

本书版权归Kogan Page所有

75

76

Data Ethics

5 If you were asked to implement an information management system or practice that would be beneficial to the bottom line of the organization, and would result in a bonus payment for you, but you knew the practice would impact on the rights or welfare of others, what would you do?

Notes 1 We will discuss issues of bias in machine learning and in the datasets used to train algorithms in later chapters of this book, but at this point suffice it to say that there is no such thing as simply debiasing datasets. 2 See www.linkedin.com/in/cgurrin (archived at https://perma.cc/59TP-GP4A) – Cathal and Daragh have been friends for over 30 years. The debate described has raged for half of that time. Daragh likes to think that he is winning.

Further reading There are a lot of excellent books on ethics and ethical concepts available. After all, this is a field of study that is as old as humankind. Among the books and articles we would recommend for further reading are: Birhane, A (2020) Algorithmic colonization of Africa, SCRIPTed, 17 (2), 389–409, doi.org/10.2966/scrip.170220.389 (archived at https://perma.cc/3MAV-JYA5) Birhane, A (2021) Algorithmic injustice: A relational ethics approach, Patterns, 2(2), 100205, doi.org/10.1016/j.patter.2021.100205 (archived at https://perma.cc/ K8EA-Q9W9) Boone, B (2017) Ethics 101: From altruism and utilitarianism to bioethics and political ethics, an exploration of the concepts of right and wrong, Adams Media, Avon, MA Costanza-Chock, S (2018) Design justice: Towards an intersectional feminist framework for design theory and practice, in Design as a catalyst for change  – DRS International Conference 2018, 25–28 June, Limerick, Ireland, eds C Storni, K Leahy, M McMahon, P Lloyd, and E Bohemia, E, doi.org/10.21606/drs.2018.679 (archived at https://perma.cc/9FAB-LECF) Edwards, S D (2009) Three versions of an ethics of care, Nursing Philosophy, 10 (4), 231–40, doi.org/10.1111/j.1466-769X.2009.00415.x Held, V (2006) The Ethics of Care: Personal, political, and global, Oxford University Press, Oxford Leslie, D et al (2022) Advancing data justice research and practice: An integrated literature review, SSRN, https://dx.doi.org/10.2139/ssrn.4073376 (archived at https://perma.cc/ZQ9H-SLGR)

本书版权归Kogan Page所有

Introduction to ethical concepts and frameworks Phillips, R (2003) Stakeholder Theory and Organizational Ethics, Berrett-Koehler Publishers, San Francisco, CA Scalambrino, F (2016) Introduction to Ethics: A primer for the Western tradition, Kendall Hunt, Dubuque Scrutton, R (2001) Kant: A very short introduction, Oxford University Press, Oxford Tronto, J (1994) Moral Boundaries: A political argument for an ethic of care, Routledge, New York Vallor, S (2018) Technology and the Virtues: A philosophical guide to a future worth wanting, Oxford University Press, Oxford Wagner, B (2018) Ethics as an escape from regulation: From ‘ethics-washing’ to ethics-shopping? In Being Profiled: Cogitas ergo sum: 10 years of profiling the European citizen, ed E Bayamlioglu et al, Amsterdam University Press, pp 84–89, doi.org/10.1515/9789048550180-016 (archived at https://perma. cc/9SU6-UD9D) Yu, J (2009) The Ethics of Confucius and Aristotle: Mirrors of virtue, Routledge, New York and London Zuboff, S (2019) The Age of Surveillance Capitalism: The fight for a human future at the new frontier of power, Profile Books, London

References Addams, J (1902) Democracy and Social Ethics, Macmillan, New York Aristotle (2000) Nichomean Ethics, 2nd edn, Hackett Publishing, Indianapolis Birhane, A (2020) Algorithmic colonization of Africa, SCRIPTed, 17 (2), 389–409, doi.org/10.2966/scrip.170220.389 (archived at https://perma.cc/BQ8N-8H8P) Birhane, A (2021) Algorithmic injustice: A relational ethics approach, Patterns, 2(2), 100205, doi.org/10.1016/j.patter.2021.100205 (archived at https://perma. cc/4MX5-D492) Broodryk, J (2008) Understanding South Africa: The uBuntu way of living, Ubuntu School of Philosophy, Pretoria Buttarelli, G (2018) Beyond compliance: Why digital ethics? Address to the 40th International Conference of Data Protection and Privacy Commissioners, European Parliament Hemicycle, 24 October Data.govt.nz (nd) Ngaˉ Tikanga Paihere, data.govt.nz/toolkit/data-ethics/nga-­ tikanga-paihere/ (archived at https://perma.cc/3SSN-ZX8Q) Dauenhauer-Pendley, L (2017) From safety to (no)where: Towards a theory of data colonialism in humanitarian information communication technologies, Master Thesis in Nordic Media, Department of Media and Communication, University of Oslo, Spring, urn.nb.no/URN:NBN:no-60992 (archived at https://perma.cc/ G78A-3NJB) Deming, W E (1986) Out of the Crisis, MIT Press, Boston, MA

本书版权归Kogan Page所有

77

78

Data Ethics Dolamo, R (2013) Botho/Ubuntu: The heart of African ethics, Scriptura, 112 (1), 1–10 Fiesler, C and Garrett, N (2020) Ethical tech starts with addressing ethical debt, Wired, 16 September, www.wired.com/story/opinion-ethical-tech-starts-withaddressing-ethical-debt/ (archived at https://perma.cc/A2TK-43HB) Freeman, R E (2010) Strategic Management: A stakeholder approach, Cambridge University Press, Cambridge Friedman, M (1962) Capitalism and Freedom, University of Chicago Press, Chicago Health Research Council of New Zealand (nd) Te Ara Tika: Guidelines for Ma¯ori Research Ethics, www.hrc.govt.nz/resources/te-ara-tika-guidelines-maoriresearch-ethics-0 (archived at https://perma.cc/7HH8-MSMH) Held, V (2006) The Ethics of Care: Personal, political, and global, Oxford University Press, Oxford Mangena, F (2016) African ethics through Ubuntu: A postmodern exposition, Africology: The Journal of Pan African Studies, 9 (2), 66–80 Mbiti, J S (1969) African Religions and Philosophy, Heinemann, London Meineck, S and Schwenn, P (2020) ‘Zoom bombers’ are still blasting private meetings with disturbing and graphic content, Vice, 10 June, www.vice.com/en/article/ m7je5y/zoom-bombers-private-calls-disturbing-content (archived at https:// perma.cc/4ARY-9W2M) Metz, T (2007) Toward an African moral theory, The Journal of Political Philosophy, 15 (3), 321–41 Mills, C W (2005) Kant’s Untermenschen, in Race and Racism in Modern Philosophy, ed A Valls, pp 169–93, Cornell University Press, Ithaca, NY National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research (1979) The Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research, US Department of Health, Education, and Welfare, 18 April Neidig, H (2017) Privacy watchdog asks FTC to investigate Google’s offline shopping tracker, The Hill, thehill.com/policy/technology/344604-privacy-watchdog-asksftc-to-investigate-googles-offline-shopping-tracker (archived at https://perma.cc/ FW3N-APB9) Nussbaum, M C (1988) Non-relative virtues: an Aristotelian approach, www.wider. unu.edu/sites/default/files/WP32.pdf (archived at https://perma.cc/2T9P-APRP) Perrett, R W and Patterson, J (1991). Virtue ethics and Maori ethics, Philosophy East and West, 41 (2), 185–202, doi.org/10.2307/1399769 (archived at https://perma. cc/5L3U-NU6Z) Phillips, R (2003) Stakeholder Theory and Organizational Ethics, Berrett-Koehler Publishers, San Francisco, CA Rawls, J (2005) A Theory of Justice, Original edn, Belknap Press, Cambridge, MA Scanlon, T M (1998) What We Owe to Each Other, Harvard University Press, Cambridge, MA

本书版权归Kogan Page所有

Introduction to ethical concepts and frameworks Singer, N, Perlroth, N and Krolik, A (2020) Zoom rushes to improve privacy for consumers flooding its service, New York Times, 8 April, www.nytimes.com/​ 2020/04/08/business/zoom-video-privacy-security-coronavirus.html (archived at https://perma.cc/P2SM-Y7K3) Smith, J H and Hasnas, J (1999) Ethics and information systems: The corporate domain, MIS Quarterly, 23 (1), 109–27 Smith, L et al (2001) Te Hiringa i te Mahara: Final Evaluation Report, research ­report to Gardiner and Parata Ltd Spicer, A (2014) Why shareholder value is ‘the dumbest idea in the world’, CNN Business, 24 January, edition.cnn.com/2014/01/24/business/davos-shareholdervalue-is-dumbest-idea/index.html (archived at https://perma.cc/88BX-3N4J) Stanford Encyclopedia of Philosophy (2016) John Stuart Mill, plato.stanford.edu/ entries/mill/ (archived at https://perma.cc/X9QK-5XNG) Stanford Encyclopedia of Philosophy (2021) Justice, plato.stanford.edu/entries/ justice/ (archived at https://perma.cc/4DXE-5U4G) Stanford Encyclopedia of Philosophy (2022) Kant’s moral philosophy, plato.stanford. edu/entries/kant-moral/#CatHypImp (archived at https://perma.cc/7V2Q-D6SR) Taiuru, K (2020) Maˉori data sovereignty and digital colonisation: Presentation to the Digital Justice – Emerging Technologies, Methods and Research, 11 September, www.taiuru.maori.nz/maori-data-sovereignty-and-digital-colonisation/ (archived at https://perma.cc/4JHH-YKV3) Taiuru, K (2022) A Compendium of Maˉori Data, New Zealand, www.taiuru.maori. nz/wp-content/uploads/Maori-Data-Soverignty-Compilation-KTaiuru.pdf (archived at https://perma.cc/78CU-ATU5) Te Ahukaramuˉ Charles Royal (nd) Te Ao Maˉrama – the natural world, Mana, tapu and mauri, Te Ara – The Encyclopedia of New Zealand, www.TeAra.govt.nz/en/ te-ao-marama-the-natural-world/page-5 (archived at https://perma.cc/D36R2MWX) Te Aka (nd) The Maˉori Dictionary, https://maoridictionary.co.nz/ (archived at https://perma.cc/DC42-HY32) Te Mana Raraunga (nd) Te Mana Raraunga, www.temanararaunga.maori.nz (archived at https://perma.cc/GW8R-VZHX) Tronto, J C (2012) Partiality based on relational responsibilities: Another approach to global ethics, Ethics and Social Welfare, 6 (3), 303–16 Tutu, D (1999) No Future Without Forgiveness, Rider, London Vallor, S (2018) Technology and the Virtues: A philosophical guide to a future worth wanting, Oxford University Press, Oxford Veale, M (2020) A critical take on the policy recommendations of the EU High-Level Expert Group on Artificial Intelligence, European Journal of Risk Regulation, 11 (1), doi.org/10.1017/err.2019.65 (archived at https://perma.cc/L82R-3XJ7)

本书版权归Kogan Page所有

79

80

Data Ethics Velasquez, M, Andre, C, Shanks, T and Meyer, M J (1992) The common good, Markkula Center for Applied Ethics, www.scu.edu/ethics/ethics-resources/ethicaldecision-making/the-common-good/ (archived at https://perma.cc/2RDZ-5VJ2) Zuboff, S (2019) The Age of Surveillance Capitalism: The fight for a human future at the new frontier of power, Profile Books, London

本书版权归Kogan Page所有

81

Ethical principles, standards and practice

03

What will we cover in this chapter? Ethics can be understood at its most basic as the development and application of principles for conduct towards others. However, implementing ethical principles in organizations requires the translation of generic ethical principles into actionable concepts in the organization. In this chapter we will:

●●

●●

●●

●●

Provide an overview of several ethical data management principles initiatives. Outline the criticisms of high-level ethical principles frameworks for AI and data management. Discuss the role of standards as a mechanism for communicating ethical values and guiding action. Set out a taxonomy-based approach to thinking about principles and translating into practice.

The authors are grateful to John Ladley for his sage and timely suggestions on the content of this chapter.

本书版权归Kogan Page所有

82

Data Ethics

Principles A common understanding of a ‘principle’ is as a basic idea or rule that describes or governs how something happens. It is a proposition or value that is a guide for behaviour or for evaluation of behaviour, a fundamental doctrine, premise or assumption, or a rule or code of conduct. In common English language use it generally refers to rules or norms of governance. John Ladley (2012) describes them as ‘beliefs to be applied every day as guidance for procedures and decision-making efforts’. Principles are not the same as policies or procedures. They are more fundamental than that, serving to establish the foundation for policies and procedures within the overall governance of an organization or, for that matter, the governance of society itself. For example, the accounting profession in the United States is governed by a set of Generally Accepted Accounting Principles (GAAP), which have been developed to support the ethical and accurate reporting of financial information (see Table 3.1). These principles are not enshrined in legislation, but accounting professionals in the United States are legally required to follow these principles and their associated guidelines when preparing financial statements that will be released to the public. Outside of the United States, the International Financial Reporting Standards are another widely adopted set of principles for transparent, accurate and ethical preparation of financial accounts. However, there are subtle but important differences between the principles set out in the IFRS and those adopted in the GAAP. This highlights an important issue when considering principles: even in mature professions such as accounting, principles serve as guides to action and can differ significantly between countries and regions. In this way, principles can

Table 3.1  Generally Agreed Accounting Principles (GAAP) GAAP principle

Description

Regularity

The business and accounting staff apply GAAP rules as standard practice

Consistency

Accounting staff apply the same standards through each step of the reporting process and from one reporting cycle to the next, paying careful attention to disclose any differences

Sincerity

Accounting staff provide objective and accurate information about business finances

本书版权归Kogan Page所有

(continued)

Ethical principles, standards and practice

Table 3.1  (Continued) GAAP principle

Description

Permanence

Accounting staff use consistent procedures in financial reporting, enabling business finances to be compared from report to report

Noncompensation Accountants provide complete transparency of positive and negative factors without any compensation. In other words, they do not get paid based on how good or bad the reporting turns out Prudence

Financial data is based on documented facts and is not influenced by guesswork

Continuity

Financial data collection and asset valuations should not disrupt normal business operations

Periodicity

Financial data should be organized and reported according to relevant accounting periods. For example, revenue or expenses should be reported within the corresponding quarter or other reporting period

Materiality

Accountants must rely on material facts and disclose all material financial and accounting facts in financial reports

Good Faith

There is an expectation of honesty and completeness in financial data collection and reporting

often reflect the ethic of society as well as the ethic of the organization in how they seek to guide individual or group behaviours. At the time of writing there is no single agreed-upon set of ethical principles for data management. Data leaders in organizations seeking to establish ethical data management practices are faced with the challenge of identifying and codifying appropriate bedrock principles on which to build their governance systems for ethical data management, the policies, procedures and examples of good practice that will serve as situational moderators of ethical behaviour in the organization. That is not to say that there is no articulation of principles for the ethical management and use of data. Indeed, the opposite is the case. Groucho Marx allegedly said ‘Those are my principles, and if you don’t like them... well, I have others’ (Shapiro, 2006). A data practitioner today could be excused for feeling an affinity with Groucho. Back in 2017 when we were drafting the first edition of this book, the problem we were faced with was a relative absence of principles, standards or best practices for ethical information management. Today there is a pleth-

本书版权归Kogan Page所有

83

84

Data Ethics

ora of principles frameworks, examples of which we will look at later in this chapter. Many of these frameworks have been developed in response to growing concerns about the development and use of machine learning and artificial intelligence systems and may not, at first glance, apply to the more mundane areas of data management that exist in most organizations. Furthermore, some of these ethical codes or principles frameworks are tied to particular professional organization memberships. For example, the ACM’s Code of Ethics and Professional Conduct, adopted in June 2018, is defined as applying to ‘computing professionals’ (Association for Computing Machinery, 2018) – does this mean that its principles don’t apply to the marketing team in your organization, who are using self-service business intelligence tools to slice and dice your customer data? In any event, the ACM principles address the ethic of the individual and not the ethic of the organization. The challenge that data leaders have when taking their first steps in developing their governance framework for ethical data management is identifying what frameworks to draw from when creating their bedrock principles so that those principles can be as broadly applicable as possible in the organization. If there are different statements of fundamental principles for different areas of your organization you don’t have a fundamental statement of principles. Equally, if your principles are defined from the perspective of, or with application to, a specific technology then they will lack the fundamental nature necessary to secure broad adoption in the organization. To put it another way, when you are defining your organizational principles for data ethics, you need to ensure that they will be as applicable to Dave in Accounting as they are to Rana in Marketing or Chrissie who trains your AI models. To do this, we need to be clear what we mean by a principle in the context of ethical data management.

Developing ethical data principles In the last chapter we introduced the concepts of the ethic of society, the ethic of the organization and the ethic of the individual. Ethical data principles are a codification of the ethic of the organization when it comes to how data and information will be managed, used and put to work on behalf of the organization, its customers and other stakeholders. But these organizational principles will not be created or exist in a vacuum and they will be influenced by the ethic of society as expressed through reference frameworks, legislative

本书版权归Kogan Page所有

Ethical principles, standards and practice

requirements, industry standards or other external statements of ethical norms relating to the processing of data. An organization’s ethical data principles serve to translate these generic statements of the ethic of society into actionable statements of the ethic of the organization. Just as the GAAP sets out a broad industry-wide set of ethical principles for accountants, who must then translate those principles into their organization’s ethical principles, policies and procedures, ethical data leaders must take the general principles that may be found in society and translate them into the organization in a way that ensures alignment between the ethic of the organization and the ethic of society. This can often mean transposing a general statement like the Prudence principle in GAAP into language that reflects the culture and operating model of your organization. An ethical data principle needs to be a statement that articulates a shared organization value. The principle must also underlie the strategic vision and mission of the organization and serve as a basis for integrated decision making. It needs to translate an external abstract principle of ethical data use into a tangible statement of ‘this is how we do things around here’. A major criticism of the plethora of frameworks for ethical AI and ethical data management that have emerged in recent years is that they often fail to address this key requirement of translating from the ethic of society into the ethic of the organization in a practical and actionable way. Whether by design or as a result of lack of design, organizations fail to translate data ethics principles into actionable policies and outcomes. According to research by Algorithm Watch there are over 160 distinct frameworks for ethical use of AI or automated decision making, but few of these have any enforcement mechanisms contained in them. This has led to justified criticism of these frameworks as ineffective and potentially more harmful than having no guidelines at all. According to Algorithm Watch (2020), the majority of guidelines they examined ‘are limited to vague formulations’ and lack a ‘clear view of how they are to be applied in practice’. Figure 3.1 illustrates the classification of AI ethics frameworks developed by Algorithm Watch. This issue is, unfortunately, not new to the world of ethical debate and discourse where there is often a difference between the idealized principles of ethics in the abstract and the more concrete practice-oriented perspective that helps people identify the right thing to do in a specific context. Aristotle distinguished between these two modes of thinking about ethical issues, calling the former episteme and the latter phronesis. In reality, we need both a ‘theory of knowledge’ for ethical principles (episteme) as well as a focus on the application of principles in practice, drawing on experience (phronesis).

本书版权归Kogan Page所有

85

86

Data Ethics

Figure 3.1  Classification of AI ethics frameworks by Algorithm Watch (2020) 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0%

Binding agreement

Voluntary commitment

Recommendation

Academic studies of the various published frameworks and guidelines echo the criticisms of Algorithm Watch. Gijs van Maanen (2022) argues that the ‘overabundance of guidelines and frameworks suggests that the identification of moral problems and moral principles (as episteme) tips the scale at the cost of more practice-oriented work (as in phronesis)’. Research by Abeba Birhane and others on papers submitted to academic conferences on AI and computer science also finds ‘that there is a great tendency for abstract discussions of such topics devoid of structural and social factors and specific and potential harms’ (Birhane et al, 2022). The challenge, and indeed the opportunity, for data leaders in organizations is to translate the often high-minded and wordy episteme statements of the ethic of society into clearly articulated statements of guiding principles for your organization. This is the missing link between aspiration and effectiveness, between the episteme and the phronesis necessary to put ethics into action. It is also important that your formulation of guiding principles for data ethics is aligned with the business strategy and goals of the ­organization. Indeed, it is a fundamental principle of successful and sustainable data governance that governance must be aligned with and supporting a clear business strategy and vision. Ethical data management is no different, not least because the ultimate goal is to develop governance

本书版权归Kogan Page所有

Ethical principles, standards and practice

structures to support and encourage ethical use of data. The purpose of these principles is, after all, to provide the basis for the rules, constraints and behaviours by which the organization carries out its day-to-day data activities in the long term and to provide the reference point from which all future decisions about data and its ethical use will be made. If there is no alignment with the business strategy and goals of the organization, the principles will be cast aside as they will be devoid of any link to the structural and social factors in the organization and the specific actions or initiatives of the organization, which may have the potential to cause harms. A key challenge in developing ethical data principles is to ensure that the pursuit of ethical data outcomes is not seen as antithetical to the goals and objectives of the organization. Ethics is ultimately about thinking through and prioritizing competing values, of which the pursuit of profit is just another value to consider. When considering the alignment of our ethical data principles with the business strategy of the organization we need to be able to articulate how our data ethics principles will contribute to the long-term sustainable development of the organization, and what the high-level aspiration of ‘doing things ethically with data’ actually means in practice for staff at the coal face of the organization. This is a challenge that our colleagues in the fields of data governance and data quality have been facing for the last 30 years!

Structuring principles for action – a taxonomy approach Our colleague John Ladley, a leading pioneer in the field of data governance, has long extolled the importance of a taxonomical approach to developing data principles. In John’s view, ‘principles need to drive policies’ (Ladley, 2019). This approach is particularly suited to principles that are abstract and woolly, and which need to be set in a more concrete context in the organization. An additional benefit of this approach is that it distinguishes between a principle and a policy in the hierarchy of things and puts the emphasis on the need to guide and change behaviours, not mechanistically manipulate and revise processes. The data ethics principles that you define for the organization will be the fundamental guidance for procedures and decision making in the organization. These principles must in turn give rise to actionable policies that give

本书版权归Kogan Page所有

87

88

Data Ethics

Figure 3.2  Components of a data principle

Statement of principle



A statement of the principle expressed in simple terms that will be understood by business stakeholders

Set out why this is an important thing for the organization Describe how it aligns with/supports business objectives • Highlight issues/risks that this principle helps mitigate •

Rationale (drivers)

Benefits (value to org/stakeholders)





Set out the benefits to the organization arising from following this data principle.



Ideally show how the principle helps staff in the organization do their jobs better/safer/more effectively

Identify the policies that will be required to give effect to this principle. • Identify the practical implications of the principle • Identify the guidance for actions to support the principle •

Implications (what needs to happen)

SOURCE Based on Ladley (2019)

effect to the principle. A policy, in this context, can be seen through the lens of the DAMA DMBOK1 as a ‘high-level description of the desired behaviour to achieve a set of goals’, setting out a clear statement of a desired course of action. Ladley goes further. In his view, policies are a ‘codification of principles’ that give rise to enforceable processes (see Figure 3.2). Ultimately, according to Ladley, principles are often ‘too lofty to enforce directly’. A common mistake that organizations make is to confuse or conflate a principle with a policy and to jump straight to defining rules that combine elements of a philosophic principle, a policy, a process and an enforcement mechanism. As Ladley (2019) puts it, this ‘is not an ideal approach; rules do not have the weight of belief, they are hard to maintain, and are inflexible’. This is a very significant distinction when it comes to translating data ethics principles from the ethic of society (external frameworks) to the ethic of the organization. Bear in mind that the objective of defining our data ethics principles for the organization is to lay a key foundation stone of the situational moderators of ethical behaviour in the organization. If this is approached at the level of a process change or a ‘tick box’ reform of how data things get done, it will struggle to be sustainable or, worse still, it will

本书版权归Kogan Page所有

Figure 3.3  Cascade from principle to measurable outcomes

Principle

Policy 1

Standards

Processes

Standards

Controls

Processes

Standards

Controls

Processes

89

本书版权归Kogan Page所有

Controls

Policy n

Policy 2

90

Data Ethics

be promoted to the level of a lip-service activity for which the rationale will quickly be forgotten. Jane Addams famously wrote that ‘action indeed is the sole medium of expression for ethics’. So it is essential that, as we identify and develop our data ethics principles, we consider the policies that will be required, and what standards and controls will be needed, and what new processes or changes to existing processes will be necessary to give effect to the principle (see Figure 3.3). What data leaders need to do in this context is to ensure that they define data ethics principles in a way that allows for their application to be implemented in practical ways that can, in turn, be audited and measured. This is essential for a sustainable governance framework for ethical data management to be implemented in the organization. As the President of Ireland, Michael D Higgins, said in a speech launching his Presidential Ethics Initiative in 2016: ‘Words must not be separate from, or unconnected to, the actions necessary to effect real transformation’ (Higgins, 2016). A benefit of this approach is that it enables the organization to identify, for each principle, an appropriate policy that will exist to support that principle in practice. Bluntly: a principle that does not have a correlating policy will never have a practical effect on the conduct of the organization, as there will be nothing against which to hang enforcement sanctions when staff fail to comply with or give appropriate consideration to the ethical data principles of the organization. In data governance engagements with clients we often develop a mapping of principles to policies and then cross-reference that with the actual policy documents to ensure that there is alignment, and also that there is a codified and documented policy in place where it is required. While this may sound like a lot of effort, the value is that data leaders can identify opportunities to address multiple principles in a single policy as well as ensuring that anything that the organization considers to be important in the context of data ethics is backed up by an appropriate and actionable statement of policy. If there is no enabling or supporting policy, there is nothing in your data ethics principles that will let you move from the episteme debate and discussion of high-minded principles to the phronesis of getting things done in practice. Or to put it another way, absent a policy that addresses the ‘how’ of an ethical principle in your organization, there will be no tangible situational moderators of ethical behaviour within your governance framework for ethical data management. Even more bluntly, without this connection, data ethics will remain a talking shop activity with no action.

本书版权归Kogan Page所有

Ethical principles, standards and practice

Linking back to the ethic of society Organizations might also wish to link their data ethics principles back to an externally published set of guidelines or to a generic set of ethical principles. This is easily achieved in this taxonomy-style approach by adding the external principle as a ‘parent’ to the organization’s own data ethics principle, or by ‘tagging’ your internal principles with the external concept. This also allows the organization the flexibility to break complex or otherwise nebulous generic principles into more actionable internal principles.

Looking at data ethics principles in practice There is a spectrum of approaches taken by organizations to documenting and communicating their data ethics principles. The most important consideration when you are packaging and presenting your principles is ensuring that they are communicated clearly, effectively and consistently within the organization and to any external stakeholders who may need to refer to them. We will look at two different examples in this section to identify key elements of the communication of principles. There are many other published sets of data ethics principles and readers are encouraged, when developing your own, to seek inspiration from others but to apply the structured approach outlined above to ensure clarity and effectiveness of your data ethics principles.

UK Government Data Ethics Framework The UK Government’s Data Ethics Framework (UK Government Digital Service, 2020) was developed and published to guide ‘appropriate and responsible data use in the government and wider public sector’. It is designed to be used by anyone working directly or indirectly with data in the public sector in the United Kingdom and it has been developed to provide a series of self-assessment checks to guide people through various ethical considerations. The framework is structured into three overarching ethical principles, which are in turn each mapped to a set of specific actions that might be taken to give effect to a specific ethical principle. This provides a contextlinked set of practical considerations and recommended actions associated with an ethical principle.

本书版权归Kogan Page所有

91

92

Data Ethics

The ethical principles that underpin the UK Government’s approach to ethical data management are simple: ●● ●●

●●

Transparency – actions, processes and data are open to inspection. Accountability – there are effective governance and oversight mechanisms for the project, including public accountability. Fairness – bias and unintended discriminatory effects on individuals or social groups should be eliminated or mitigated.

These principles are then applied in the context of five specific actions: 1 Define public benefit and user need 2 Involve diverse expertise 3 Comply with the law 4 Check the quality and limitations of data/of the machine-learning model 5 Evaluate and consider wider policy implications Users of this data ethics framework are guided through a series of self-assessment questions in respect of the specific actions that result in a score, which in turn directs further actions (see Figure 3.4). Figure 3.4  Extract from UK Government Data Ethics Framework

Self-assessment tables for the 3 overarching principles. Please use the following self assessment to mark, track and share your overall progress over time against the following 3 overarching principles. Key:

Start

During

After

4

5

Score

Principles

0

1

2

3

Transparency Accountability Fairness

SOURCE Contains public sector information licensed under the Open Government Licence v3.0

本书版权归Kogan Page所有

Ethical principles, standards and practice

A potential strength of this framework is that it focuses on a very small set of ethical principles rather than drowning readers in a shopping list of concepts. Unfortunately, the framework has been developed ultimately as a toolkit for implementation of a form of data ethics assessment as part of a project implementation. It does not represent a holistic statement of data ethics principles cascading to inform policy, nor does it provide any rationale for the principles chosen. While the approach taken to the self-­assessment is useful, overall, the framework seeks to combine philosophical ­principles, policies and process into a single instrument focused on the implementation of data science projects. This is a suboptimal approach to establishing data ethics principles, but it does provide a structured and simple ­approach for project teams in organizations to think about the ethical issues raised by their use of data.

US Government Federal Data Strategy Data Ethics Framework Published in December 2020, the US Government’s Data Ethics Framework (United States Government OMB, 2020) has been developed as part of the Federal Data Strategy. The US FDS Data Ethics Framework sets out seven core tenets for data ethics (aka data ethics principles) and then elaborates on them with a clear rationale and articulation of recommended policies. The document also relates each of the data ethics tenets back to the general ethical principles set out by the US Office of Government Ethics. This sends a clear message: these principles are part of the wider ethics culture of the organization. The data ethics tenets of the US Federal Data Strategy are: 1 Uphold applicable statutes, regulations, professional practices, and ethical standards 2 Respect the public, individuals, and communities 3 Respect privacy and confidentiality 4 Act with honesty, integrity, and humility 5 Hold oneself and others accountable 6 Promote transparency 7 Stay informed of developments in the fields of data management and data science

本书版权归Kogan Page所有

93

94

Data Ethics

Each of these tenets is expanded on in a short description that sets out the rationale for the tenet, identifies any interdependencies between the tenets, and provides a list of recommended actions (aka policies) for organization leaders and for data users within federal organizations. In effect, these are recommended responsibilities and accountabilities, and when there are recommendations like this they should be read as a guide for policies and procedures to give effect to the principle. The US Federal Data Ethics Framework also provides references to relevant legal authorities and other associated or relevant government policies, guidance or codes of ethics (see Figure 3.5).

Figure 3.5  Extract from US Federal Data Ethics Framework Recommendations for Federal Organization Leaders: •

Promote the protection of privacy, civil rights, and civil liberties in their organization’s data use.



Consider the impacts their organization’s data activities might have on the public, individuals, and communities and take measures to minimize any negative consequences.

• •

Establish procedures to mitigate harm when negative consequences are unavoidable. Assess stakeholders and implement procedures for the appropriate engagement of those impacted by the organization’s data activities.

Recommendations for Federal Data Users: •

Understand that data activities might impact the public, individuals, and communities.

• •

Promote the public good through data activities. Consider the impacts their data activities might have on the public, individuals, and communities and take measures to minimize any negative consequences.



Take measures to mitigate harm when negative consequences are unavoidable.



Engage data subjects to better understand and promote their interests when data on individuals or communities are used to deliver services to the public.

Legal Authorities: • • • • • • • •

Executive Order: Consultation and Coordination with Indian Tribal Governments (E.O.13175) Federal lnformation Security Modernization Act (FISMA) (44 U.S.C § 3551–3558(2014)) Foundations for Evidence-Based Policymaking Act of 2018 (Pub. L. 115–435) Information Quality Act (IQA) of 2001 (Pub. L. 106–554) Intelligence Reform and Terrorism Prevention Act of 2004 (Pub. L. 108–458) OMB Memorandum: Improving Implementation of the IQA (M–19–15) Tribal Self-Governance Act (25 U.S.C § 46 (1994)) Privacy Act (5 U.S.C § 552a (1974))

Additional Resources: • •

National Endowment for the Humanities (NEH) Code of Ethics Related to Native Americans Department of Health and Human Services (DHHS) Implementation Guidance on Data Collection Standards for Race, Ethnicity, Sex, Primary Language, and Disability Status

本书版权归Kogan Page所有

Ethical principles, standards and practice

Seeking the ‘ethic of society’ – where to look for ethical inspiration The ethic of the organization does not exist in a vacuum. It is important to look outside the organization when seeking to define your principles for ethical data management. This is important for two reasons. First, seeking external inputs when developing your principles can help ensure that your statement of ethical principles is aligned with the expectations of society. Second, researching what principles might be enshrined in laws or industry standards that your organization is required to comply with can help ensure your principles and policies are aligned with the minimum expectations of your industry or the law makers in the countries where your organization operates and processes data.

Organization ethics guidelines or value statements Organizations that wish to be seen as ethical often have general statements of ethics or organization value statements. Many may even have formalized ethics frameworks and guidelines for ethical conduct that set out broad organizational values and describe how these values are implemented in the organization.2 These frameworks will usually also describe the behaviours that are expected of individuals in the organization to give effect to these ethical values. These statements of values and desired behaviours can be very useful when you are trying to develop the data ethics principles your organization will adhere to. Indeed, data ethics cannot be divorced from the general ethics of the organization. As we have already discussed, the ethic of the organization is a crucial element of the overall ethical enterprise information model. For example, when working with clients on data protection compliance programmes in the lead up to the EU’s General Data Protection Regulation coming into force, we sought to map the core data protection principles to the existing values and value statements of clients. In one client, a leading high-end retailer, we restated core data protection principles in the context of a set of core corporate values that had only been recently adopted as part of a larger internal organization change. Table 3.2 is adapted from that work. If your organization hasn’t yet formalized its business ethics framework, organizations such as the Institute of Business Ethics (https://ibe.org.uk)

本书版权归Kogan Page所有

95

96

Data Ethics

Table 3.2  Mapping GDPR to company values example Brand ethical value

Data protection value

Winning Together

By being transparent with people about how we will obtain and use their personal data, and by ensuring whenever possible that people can opt out of any new use of data relating to them, we create win–win outcomes together

Doing the Right Thing

We must always do the right thing with data. If you are unsure about the right thing, you must ask the data protection officer, who will help you reach an answer that will be repeatable and sustainable for the business and our stakeholders

Inspiring The Customer

We will inspire the customer and other stakeholders through innovative ways of using data to help them, and through innovative approaches to explain how we will use data relating to them while supporting their rights

Driving Creativity

We will drive creativity in compliance through the use of DPIAs to test ideas in the design stage to find the best way to achieve our goals while still delighting the customer with our respect for their data and data rights. We will seek to go beyond ‘tick box’: compliance

Performing with Pride

We will consistently and constantly be able to act transparently in respect of how we obtain and use data, taking pride in the foundations we lay through data protection by design and accountability for data in our day-to-day activities

have a range of tools and methodologies to help you formalize the ethics principles of your organization. If you find yourself in the position of having to formalize both your organization ethics and your organization’s ethics as applied to data, this should be approached holistically, ideally with the support of your HR or compliance functions to ensure a consistent cascade of ethical principles rather than disjointed and potentially conflicting priorities arising. For organizations working in a multinational context or that wish to mitigate the risk of adopting an overly narrow ethical framework, the OECD (OECD, 2011) has produced a set of guidelines for organizations, which set out broad business ethics principles for consideration.

本书版权归Kogan Page所有

Ethical principles, standards and practice

Legislation and litigation In many respects legislation can be considered an articulation of ethical principles by legislators in their respective jurisdictions. Laws establish a baseline minimum expectation of conduct of people or organizations in specific circumstances. However, legislation should be seen as a floor on ethical behaviour, not a ceiling on ethical thought. Laws are a systematic body of rules that govern society and the actions of individuals in that society. As such, they can often represent a statutory mechanism to address a specific aspect of behaviour. Also, organizations can often focus on those actions and behaviours that are the minimum necessary to comply with the strict letter of the law. Things become even more complicated when organizations work across different jurisdictions as different legislation will exist in different contexts from country to country. Also, legislation can often lag behind the ethical views of society and, as they must be changed through the formal legislative process, it can take time to change legislation. This can often result in legislation lagging behind the pace of ethical change, the realization of ethical issues and risks in a particular area, or indeed the pace of change in technology and its capabilities. Also, many jurisdictions have legal structures that recognize fundamental rights, which need to be considered as part of the overall legal framework. The EU’s Charter of Fundamental Rights is one example. Similar fundamental principles often underpin legislation and legal systems in other jurisdictions. Law doesn’t evolve solely through changes in legislation. Courts, particularly those in ‘common law’ jurisdictions such as Ireland or the United States, can also develop legal rules and principles that codify ethical principles on a case-by-case basis. For example, the evolution of personal injury rules in many jurisdictions stem from the idea that the producers of products owe a duty of care to those who consume those products. This echoes the Kantian view that people should be seen as an end in and of themselves not merely as a means to an end. Of course, this evolution of principles requires a harm to have been experienced and ultimately litigated, so it will inevitably lag behind the ethical evolution of society or the risks associated with behaviours, conduct or technology capabilities. However, law can sometimes be in conflict with ethical principles, giving rise to challenges in day-to-day implementation of ethics. For example, many jurisdictions have mandatory reporting obligations for health or social care professionals who become aware of risks of sexual abuse or domes-

本书版权归Kogan Page所有

97

98

Data Ethics

tic violence, particularly where the victims are children. This can give rise to conflicts with ethical obligations in respect of patient confidentiality and the confidentiality of the counselling or therapeutic process. This in turn creates a risk that people who need to access support might be deterred from engaging with relevant services because of fears about their details being shared with third parties. That risk must be balanced against the broader risk of social harm or individual harm if incidents of sexual abuse or domestic violence are not investigated in a timely manner by relevant authorities, which is the broader harm that mandatory reporting seeks to address. Equally, judicial interpretation of constitutional or fundamental rights questions can give, and have in many jurisdictions given, rise to outcomes where the interpretation of law does not necessarily match the consensus ethic and values of society but instead conforms to historic cultural norms or ideas in the jurisdiction. Ultimately, laws represent an attempt by policymakers to form rules and a ‘definition of good’ that is acceptable to their constituents and to other stakeholders in the legislative process. For judges ruling on cases in litigation, the same challenge arises to ensure that the law is interpreted fairly and in line with a definition of good that can be inferred from interpretation of legislation or case-law precedents. When it comes to the management and use of data to deliver outcomes for people in society, whether through novel AI applications, advanced machine-learning processes, or basic processing of the right data in the right way. For example, to ensure that someone has not overpaid their income tax or that they have timely information about their electricity consumption so they can make informed decisions about their use of appliances, there can be conflicts between the requirements of law and different ethical perspectives. There can also be conflicts between laws, particularly where concepts or safeguards against unethical uses of information are poorly defined or not considered in the legislation, or where we are operating our processing of data across multiple jurisdictions. Does this mean that legislation and court decisions are of no use to us when seeking to define and develop ethical information management principles in practice? In the context of the ethical information management framework discussed in this book, we represent laws as being influencers of the ethic of the organization and the ethic of the individual that, ideally, are reflective of the expectations that society has of what a minimum standard of ethical conduct would be. Data leaders in organizations should consider both the letter of the law as well as the intent and spirit of legislation to

本书版权归Kogan Page所有

Ethical principles, standards and practice

identify the key ethical principles and objectives of the legislation (but make sure you get help from your legal department when doing this). Likewise, understanding the basis for decisions by courts in litigation that gives rise to new or newly framed duties of care is essential to understanding the ethical basis and framing of the decision and its potential impact or influence on the ethical principles for data management in your organization. For example, the European Union’s GDPR sets out principles in respect of transparency, proactive risk assessment and data protection by design, and ensuring internal accountability for decisions made about how data relating to people is handled. The EU’s AI Act proposes to set out requirements for compliance with ethical guidelines and a ‘product safety’ approach to regulation of AI in the European Union. In both of these examples, the practical implementation in organizations requires us to refer to guidance from regulators such as the European Data Protection Board or other published guidelines, such as the guidelines issued by the European Commission’s High-Level Expert Group on AI (European Commission, 2019). Likewise, the GDPR places a strong emphasis on the development of codes of conduct for the processing of personal data. These codes are intended to take the generic principles and requirements of the legislation and articulate them in the context of particular industry or sectoral contexts. What is important for data leaders when framing and defining ethical principles for data management in your organization is that you pay attention to where legislation or litigation is driving attention and the sources of concern from a social and societal perspective. We must ensure that we have defined and developed our bedrock principles in such a way that we can map them to the requirements of legislation and show how those principles establish the floor that is needed in legislation. We also need to consider how our principles and the governance structures we implement around them provide the foundations to build a more robust and sustainable ethical data management approach in our organizations that will help navigate future legal changes and challenges. For example, in some client engagements we have taken the core data protection principles set out in the GDPR and expanded their scope with clients to see if the broad principle applies to other categories of data in the organization such as product data or asset data. Invariably we find that principles such as transparency (knowing how and where the data was obtained and why), integrity and confidentiality (knowing the data hasn’t been tampered with and can be trusted), accuracy and data quality (knowing the data is fit for purpose) and accountability (everyone knowing their roles and

本书版权归Kogan Page所有

99

100

Data Ethics

responsibilities with respect to that data) can be applied to these broader categories as pragmatic ethical values, which can be mapped to other legal obligations or obligations under industry standards or codes of practice.

Industry standards Industry standards can provide guidance in respect to the formulation of ethical principles or the structures that should be in place to give effect to principles. It is important to caveat discussion of industry standards and data ethics with a recognition that this is an area that is evolving quickly both in the context of data ethics and in the context of ethics in general. Also it is important to note that many of these standards are not developed as a basis for certification or accreditation. Some standards have been developed in the area of management systems, which can be used to support the implementation of governance frameworks around the ethical use of data. Examples of standards that are relevant to the framing of ethical principles for data management include ISO 26000:2010 (Social Responsibility) and ISO 37301:2021. However, this is not an exhaustive list.

ISO 26000:2010 ISO 26000:2010 has been developed as a guidance framework to align with and allow the incorporation of other benchmark references such as the EU Charter of Fundamental Rights and various OECD guidelines, including those on business ethics discussed earlier. The standard defines Social Responsibility as encompassing the responsibility of an organization for how its decisions and activities impact on society and the environment. It requires responsible and ethical behaviour that contributes to sustainable development and the health and welfare of society. The standard requires that social responsibility considers the expectations of stakeholders, compliance with applicable laws and consistency with established international behavioural norms. It also requires that the processes and culture of social responsibility are integrated throughout the organization and its key ­relationships. This standard sets out a number of key principles of social responsibility for organizations including: ●●

Accountability

●●

Transparency

本书版权归Kogan Page所有

Ethical principles, standards and practice ●●

Respect for stakeholder interests

●●

Respect for rule of law

●●

Respect for human rights

●●

Respect for international norms of behaviour

●●

Ethical behaviour

Under the heading of ‘Ethical Behaviour’, the guidance to organizations is that their behaviour should be ‘based on the values of honesty, equity, and integrity’ (ISO, 2010). The standard also identifies a number of recommended ways in which organizations can promote ethical behaviour, including through the development of core values and principles, developing ­appropriate governance structures, and ensuring that conflicts of interests are prevented or resolved. Adopting a reference standard such as ISO 26000:2010 can help data leaders align the data ethics agenda with the wider corporate and social ­responsibility agenda in the organization. By aligning ethical principles, practices and behaviours across these complementary initiatives, the organization can develop a consistent and robust ‘tone from the top’ about ­responsible data behaviours.

ISO 37301:2021 ISO 37301:2021 has been developed as a management standard to guide the development of compliance frameworks. This standard focuses on the development of a ‘compliance culture’ in organizations, and it defines compliance culture as the ‘values, ethics, beliefs, and conduct that exist throughout an organization and interact with the organization’s structures and control systems to produce behavioural norms that are conducive to compliance’ (ISO, 2021). Under the heading of ‘Compliance Culture’ organizations are required to develop, maintain and promote a compliance culture at all times. The standard requires active, visible, consistent and sustained management commitment to common standards of behaviour. It also requires clear roles, ­responsibilities and accountabilities be defined. Finally, it requires that a culture and commitment to continuous improvement be adopted as part of the management system for compliance in the organization. While the standard is clear on the supporting structures that must be defined for compliance, it is silent as to what the values, ethics, beliefs and conduct should be in the organization. But it serves as a reminder that we

本书版权归Kogan Page所有

101

102

Data Ethics

must ensure that whatever ethical principles and values we select, we cannot ignore how those principles will be translated from the episteme to the practical and how we will evidence the operation of those principles on a daily basis in the organization.

Frameworks for data ethics/ethical AI As mentioned earlier in this chapter, Algorithm Watch is tracking over 160 distinct frameworks for ethical use of AI and automated decision making. It is not suggested that data leaders need to reference all of these in developing our own ethical data principles for our organizations. However, it is useful to dip into them to identify common core principles that are relevant and applicable to your organization and to provide a benchmarking of your principles against what is currently published elsewhere. Many of these sets of principles focus either on artificial intelligence or on specific sectoral applications of AI and, as such, might not appear directly relevant to the ethical data questions and challenges that might arise in other data management contexts. However, as with our consideration of legislation as a reference source for ethical principles, data leaders can take some of the specific statements of ethical principles in these frameworks and adapt them to broader applications outside of the domain of AI and machine learning. For example, the EU Commission’s Ethical Guidelines for Trustworthy AI (European Commission, 2019) sets out some fundamental requirements for AI in Europe. While these are defined primarily from the perspective of AI implementation, we can ask ourselves if these principles are valid in respect of other types of data management and data processing.

Ethical principles The core ethical principles are derived from the EU Charter of Fundamental Rights (which we referenced earlier in this chapter). Rephrased without reference to AI, they can provide a basis for ethical principles for data management in general: ●●

Respect for human autonomy – our processing of data should ensure respect for the freedom and autonomy of people in terms of the choices they make and their ability to access services. It also requires effective human oversight over processing activities.

本书版权归Kogan Page所有

Ethical principles, standards and practice ●●

●●

●● ●●

Prevention of harm – our processing of data should not cause harm, exacerbate harm or otherwise affect human beings, particularly vulnerable persons. We also need to consider impact on the natural environment. This echoes the concept of social responsibility from ISO 26000:2010. Fairness – there must be an equal and just distribution of benefits and costs arising from the processing of data, and people should not be deceived by or as a result of processing of data. Fairness also means considering the necessity and proportionality of processing of data to determine if less unfair alternative approaches might be available that better balance competing interests and objectives. Explicability – can we explain what we are doing with data and why? Accountability – are our data management processes auditable, and is there evidence of our decision making in respect of negative impacts, trade-offs and management of changes?

Identifying alignments with other sources of principles can help shape how these are framed in practice, but it is still essential to take these general principles and translate them into actionable and measurable policies, processes and procedures in the organization.

Professional bodies or industry organizations The codes of conduct or ethics codes of the various professional bodies that staff in your organization are members of can be useful sources of insight into how these professions are thinking about the ethics of data (if at all) and what ethical principles they consider most important in respect of data. It can also help to overcome barriers to resistance when implementing your data ethics principles if you can map your data ethics principles to the ethics principles of a colleague’s professional body. When considering professional bodies to look at, it is also important to consider organizations that are not involved in data management or information technology per se but represent a key management function in your organization such as HR. It is also worth considering how your data ethics principles contribute to or support your staff members’ compliance with professional codes of ethics they may be subject to.

本书版权归Kogan Page所有

103

104

Data Ethics

Conclusion Data leaders today are spoiled for choice in terms of frameworks and guidance on data ethics topics. However, the fundamental challenge remains the same as it has always been: we need to translate the high-level principles into actionable policies and procedures in the organization in order to ensure that we can consistently meet the expectations of stakeholders as to our ethical data conduct. More choice does not necessarily make that process easier, but defining the ethical data principles for our organizations is an essential first step to ensuring ethical data conduct. However, a clear distinction needs to be made between the principles and the rules, processes and procedures that are implemented to give effect to those principles in your organization. To make data ethics effective in your organization you need to ensure a clear bridge between the ideal principle and the implemented (and implementable) dayto-day practice. In doing so, it will help simplify the data ethics change if you have aligned your principles and how they are expressed with existing organizational or professional ethical values and your legal obligations.

Chapter summary In this chapter, we examined how ethical principles and frameworks relate to on-the-ground ethical management of data: ●● ●●

●● ●●

●●

We have introduced the concept of ethical principles for data. We have discussed how to develop ethical principles and frameworks for ethical data use in your organization. We have looked at some examples of data ethics frameworks. We have discussed industry standards and codes of concepts as sources of insight. We have introduced some common core principles for ethical data use.

Questions 1 If you are a member of a professional body, what does its code of ethics say about your obligations towards data and the use of data?

本书版权归Kogan Page所有

Ethical principles, standards and practice

2 What ethical principles does your organization set out to the market or to your shareholders? What relationship can you draw between those principles and ethical data use? 3 How can data ethics be presented as a social responsibility initiative in your organization?

Notes 1 The DAMA DMBOK is a data management body of knowledge developed by DAMA International, a leading professional body for data management practitioners. For more information visit www.dama.org (archived at https:// perma.cc/EQN6-7E7Y) 2 For example, global consulting firm PwC has a documented set of ethics principles and behaviours to guide the conduct of staff in their global organization, see www.pwc.com/gx/en/ethics-business-conduct/pdf/pwc-code-ofconduct-april-2021-v2.pdf (archived at https://perma.cc/N4VT-ERED)

References Algorithm Watch (2020) In the realm of paper tigers – exploring the failings of AI ethics guidelines, Algorithm Watch, 28 April, algorithmwatch.org/en/ai-ethicsguidelines-inventory-upgrade-2020/ (archived at https://perma.cc/YA8U-3HEF) Association for Computing Machinery (2018) ACM Code of Ethics and Professional Conduct, www.acm.org/code-of-ethics (archived at https://perma.cc/86CL-JANP) Birhane, A et al (2022) The forgotten margins of AI ethics, FAccT ’22: 2022 ACM Conference on Fairness, Accountability, and Transparency, pp 948–958, ACM, doi.org/10.1145/3531146.3533157 (archived at https://perma.cc/RN5A-TH9A) European Commission (2019) Ethics Guidelines for Trustworthy AI, High-Level Expert Group on Artificial Intelligence, 8 April, data.europa.eu/doi/10.2759/346720 ­(archived at https://perma.cc/R2D8-X84C) Higgins, M D (2016) Speech at the launch of ‘On the Importance of Ethics. A Report on the President of Ireland’s Ethics Initiative’, President of Ireland, 1 February, ­p resident.ie/en/media-library/speeches/remarks-at-the-launch-of-on-the-­ importance-of-ethics.-a-report-on-the-presi (archived at https://perma.cc/2XB369H5) ISO (2010) ISO 26000:2010 Guidance on Social Responsibility, International Organization for Standardization, www.iso.org/standard/42546.html (archived at https://perma.cc/U4A3-JRWX)

本书版权归Kogan Page所有

105

106

Data Ethics ISO (2021) ISO 37301:2021 Compliance Management Systems – Requirements with guidance for use, International Organization for Standardization, www.iso. org/standard/75080.html (archived at https://perma.cc/W9MC-XJFN) Ladley, J (2012) Data Governance: How to design, deploy, and sustain an effective data governance program, Morgan Kaufmann, Waltham, MA Ladley, J (2019) Data Governance: How to design, deploy, and sustain an effective data governance program, 2nd edn, Academic Press, London OECD (2011) OECD Guidelines for Multinational Enterprises, OECD Publishing, www.oecd.org/daf/inv/mne/48004323.pdf (archived at https://perma.cc/8REPU3HM) Shapiro, F (2006) The Yale Book of Quotations, Yale University Press, New Haven, CT and London UK Government Digital Service (2020) Data Ethics Framework, assets.publishing. service.gov.uk/government/uploads/system/uploads/attachment_data/file/923108/ Data_Ethics_Framework_2020.pdf (archived at https://perma.cc/AX42-2NX6) United States Government OMB (2020) Federal Data Strategy Data Ethics Framework, resources.data.gov/assets/documents/fds-data-ethics-framework.pdf (archived at https://perma.cc/U8DC-KQXY) van Maanen, G (2022) AI ethics, ethics washing, and the need to politicise data ­ethics, Digital Society, 1, 9, doi.org/10.1007/s44206-022-00013-3 (archived at https://perma.cc/X7EM-2DAR)

本书版权归Kogan Page所有

107

Ethics, privacy and analytics

04

What will we cover in this chapter? In this chapter we will:

●● ●●

●●

●●

●●

Introduce concepts of ethics in data science and data analytics. Look at the ethical issues in analytics from multiple different perspectives. We will first look at the obvious challenges inherent in analytics and privacy and the potential for analytics processes, whether by intent or mishap, to infringe on the privacy of individuals. This is a fundamental area of concern as it spans a multitude of other analytics scenarios and it is one that organizations and individuals struggle with constantly. Explore how ethical issues in the application of big data in education have raised issues around the ethics of data acquisition about students, but also ethical questions around the potential for analytical bias, equity, and the impact on student expression and pedagogical decision making. Provide an overview of the ethical issues that can arise when applying data analytics to the electoral process. This will look at how the aggregation and analysis of voter data can have significant benefits for the electoral process, but also carries with it immense risks and concerns as well as an increasingly public dark side when combined with other aspects of data science and behavioural manipulation. Consider the ethics of big data in the context of the technologies and capabilities being evenly distributed and whether it is appropriate that societies or communities cannot benefit from these capabilities merely due to cost and access to technologies. If the processing of data is supposed to serve mankind, is some of mankind missing out?

本书版权归Kogan Page所有

108

Data Ethics

At the end of the chapter we will discuss a case concerning the use of analytics and reporting in the automobile industry to generate misleading and inaccurate reporting of vehicle emissions for the purposes of passing emissions tests. We will share with you what this example tells us about the importance of ethical alignment between society, ­organizations and individuals within the organization, and how that can impact on the ethics and efficacy of analytics and data science endeavours. The case study is on ethics in analytics in the context of Volkswagen’s emissions scandal, which affected the global automobile industry, resale values for certain types of cars (e.g. diesel engine vehicles), and assumptions in emissions models used by governments for motor taxation policies and compliance with emissions targets to combat global warming.

Analytics and data science: an ethical challenge Data analytics has evolved rapidly in the last few years in parallel with the growth in the technical capabilities to capture, log, store and process ever larger volumes of data. We have seen the evolution of the humble statistician to the lofty role of ‘Data Scientist’, and we have seen organizations looking for ways to capitalize on the potential that exists to capture previously unheard-of volumes and types of data. As discussed in Chapter 2, the growth in interest in data analytics and the associated technologies tended to outpace the interest in the ethics of data analytics and data science. The interest in the technology and its potential has raced ahead of the consideration of the ethical issues that might arise as a result of these technologies, resulting in risks to society that might not have been fully appreciated by the developers of these tools and technologies. The potential impact on elections around the world of the application of analytics technologies to influence voters and election outcomes (Bright, 2017) is but one example of this emerging ethical dilemma for data analytics. The potential impact on personal data privacy because of the integration and consolidation of data sets also raises potential ethical issues as well as legal compliance challenges. The ‘gaming’ of vehicle engine analytics processes resulting in the misreporting of actual emissions of greenhouse gases is also an example of ethics in action in analytics and data science.

本书版权归Kogan Page所有

Ethics, privacy and analytics

Of course, what is required is not a new form of ethics, but an evolution of existing ethical principles. We need to build from first principles in terms of the ethical frameworks we are applying to data, and ensure that the results that arise from our analytics capabilities are the results we would desire for individuals and society.

What is data analytics? Before we dive too deep into a discussion of the ethical issues in data analytics, it is important that we have a core definition of what data analytics is in this context. This is important, as many of the fundamental ethical questions we are now encountering arise out of the nature of the analytics capabilities that the underlying technologies give rise to. To help frame the discussion of information management disciplines, we refer throughout this book to the Data Management Body of Knowledge (DMBOK) developed by DAMA International (DAMA International, 2017). The DMBOK defines 11 key knowledge domains for information and data management professionals. For readers unfamiliar with the data management disciplines in the DMBOK, we address several of these in more detail as part of that overview in Chapter 5. For the purposes of this chapter we will combine these functions under the umbrella banner of ‘data analytics’. This is partly to reflect the reality in modern organizations that the line between retrospective reporting (business intelligence) and forward-looking ‘predictive’ analytics (data science) is becoming blurred, with technology implementations in organizations increasingly combining the ‘traditional’ analytics functions of data warehousing with the emerging technologies of data science, big data and machine learning/AI. It is also a pragmatic choice given that, from the perspective of people who might be affected by the outcomes of the processing, the specifics of the technology are not the primary concern. For the same reason, in Chapter 5 we will discuss the implications of machine learning and artificial intelligence aspects of data science.

The ethical issues in data analytics Data analytics raises a range of ethical issues and questions that need to be considered, particularly as organizations are beginning to apply or to ma-

本书版权归Kogan Page所有

109

110

Data Ethics

ture their data management and data science capabilities. As Giovanni Buttarelli, the former European Data Protection Supervisor, put it: Human innovation has always been the product of activities by specific social groups and specific contexts, usually reflecting the societal norms of the time. However, technological design decisions should not dictate our societal interactions and the structure of our communities, but rather should support our values and fundamental rights. (European Data Protection Supervisor, 2015)

The challenge we face with analytics capabilities is ensuring that their implementation actually does support our values and fundamental rights. This is particularly the case given the granular detail of information that can be obtained in the current Information Age, let alone the potential of technologies such as the Internet of Things. Remember, at the time of writing it is barely 15 years since Steve Jobs persuaded us to put a GPS-enabled audioand video-recording device in our pockets with the birth of the iPhone. We will start our discussion of ethics in analytics by introducing the auditing and management concept of ‘tone at the top’ to consider ethics and best practice in analytics and data science. ‘Tone at the top’ refers to the attitudes the people in the highest levels of the organization have towards ethics, governance and internal controls, and how upper management attitudes affect the culture and practices of an organization.

‘Tone at the top’ and analytics In this context, the ‘tone at the top’ refers to the strategy of the organization and the contribution that analytics, reporting and data science can make to that strategy. In the context of traditional data warehousing, the DMBOK tells us that we should ‘begin with business goals and strategy’. In the context of data science and big data, we are told that an ‘organization’s big data strategy needs to be aligned with and support its overall business strategy and business requirements’. This also implies an alignment to the values and ethos of that strategy, and ethics (the ‘tone from the top’) has a role in relation to how that strategy is interpreted and what actions or tactics are deemed acceptable to achieving those strategic goals. This overarching ethical view of what is or is not acceptable, or what the emphasis is in the organization from an analytics perspective, is often referred to as the ‘tone at the top’. As Deloitte Consulting (Deloitte, 2015) put it: ‘In the context of an ethics and compliance programme, the tone at the top sets an organization’s

本书版权归Kogan Page所有

Ethics, privacy and analytics

guiding values and ethical climate. Properly fed and nurtured, it is the foundation upon which the culture of an enterprise is built. Ultimately, it is the glue that holds an organization together.’ In many respects, this highlights one of the ways in which machine­ learning strategies can appear to mimic human behaviour. If you focus solely on the stated goal in the strategy of the organization, you are applying a reinforcement learning strategy. As a result, you might achieve that result in a manner that is unexpected, unethical or illegal. For example, if the strategic objective of the organization is to increase profitability by reducing the number of customers it costs more to serve than they generate in revenues, you might try to achieve that goal by sending promotional materials for your competitors to those portions of your customer base on whom you are making a net loss. To do this, you would need to have the data available to calculate the profitability of the customers and also have data about your competitor’s products and services so you can craft an attractive offer for your negative-value customers to migrate. Setting aside for one moment the question of whether such a practice would be legal, the question must be asked if it is ethical to adopt that type of approach to achieving the goal. In this context, ethics can be thought of as analogous to a supervised learning model that helps you ensure alignment between the strategic goals of your organization and your data strategy to support those goals, and clarity of boundaries for what types of actions will be acceptable to achieve those goals. If directly offloading your negative-value customers to your competitors is not ethically acceptable, how then would you achieve the overall objective of increasing average profitability of your customers? From an analytics perspective, you might try to identify opportunities to sell complementary services or to sell them higher-margin services, or you might need to look at what is driving costs in the support and maintenance of those customers – for example, are they using the call centre (expensive contact channel) as opposed to engaging online or through self-service channels? This highlights the dependency between analytics, ethics and data governance. When it comes to analytics and data science, our experience working with clients has been that a tone from the top that is emphasizing the technology over the information, or the value to the organization rather than balancing the value to the organization’s customers or community, or a tone from the top that adopts a ‘mission from god’ approach to the acquisition and integration of data for analysis tends to be a strong indicator of

本书版权归Kogan Page所有

111

112

Data Ethics

ethics or compliance issues further down in the organization’s analytics and information management functions.

Big Data-driven education Big Data analytics and data science has promised incredible benefits in domains such as education. A brave new world of education has been heralded as schools, educators and government education departments look to capabilities of data analytics, sensor-based measurement and data gathered from learning management systems or other classroom tools to develop improved historical reporting of achievement, but also to improve predictive analytics to support learning interventions and, it is promised, improve learner outcomes and achievement. For example, Purdue University (Willis, 2013) has, for several years, used a tool called Course Signals that uses predictive analytics to identify which students are at risk of doing poorly. They use data such as: ●●

student demographics;

●●

academic history;

●●

engagement with online resources;

●●

current course performance.

This data is used to assign the learner to a risk group based on an algorithm. Based on the analysis, learners are sent a notification of whether they are in a red, yellow or green category. If you are red, that means the computer says you need to pull up your socks and get some help. Yellow means you have been categorized as falling behind, and green means you’re doing okay. Instructor feedback follows on performance and where to go next, if an intervention is needed. On the face of it, this is a successful use of analytics and predictive modelling to support learner attainment and learner retention. Purdue reported overall gains in retention of students over four years. Students who did not take part in a course linked to the Course Signals initiative had a retention rate of 69.4 per cent. Students who had at least one course that was linked to Course Signals had a retention rate of 87.42 per cent, and students who had two or more Course Signals had retention rates in excess of 90 per cent. This is despite the SAT scores for students coming into Purdue – and taking more than two courses linked to the Signals programme – being lower than for the group that had no Course Signals courses (Arnold and Pistilli, 2012). In ad-

本书版权归Kogan Page所有

Ethics, privacy and analytics

dition, student performance was higher on final course grades. Arnold and Pistilli report that there was a 10.37 per cent increase in As and Bs awarded on courses that were using Course Signals compared to the same courses in previous years before the programme was introduced. They also reported a decrease in lower grades and course withdrawals compared to previous years. Despite the apparent success, Purdue announced that the Course Signals technology would not be available after December 2017 due to a vendor decision to decommission the platform (Purdue University, 2017). The initial reports looked laudable and impressive. The use of an analytics-based approach to learner support in a third-level institution seemed to work. Or did it? This apparently strong evidence has been criticized in the academic community as confusing causation and correlation. A key question that has been raised by reviewers is whether students were retained because they took more courses linked to Course Signals, or whether they took more courses linked to Course Signals because they had been retained (Caufield, 2013; Essa, 2013). The challenge of verifying the causal effect of learning analytics outcomes has been highlighted as a key challenge for the adoption and acceptance of the technology, with concerns raised about the lack of attention to ethics in the design and execution of studies in the effectiveness of learning analytics (Ferguson and Clow, 2017). In a blog post in 2013, one commentator queried whether the ‘tone at the top’ from Purdue, which had licensed Course Signals to a commercial partner to sell to other universities, might have posed an ethical issue in how it promoted the headline data that had since been called into question (Feldstein, 2013). Indeed, the hype seems to have begun to fade for learning analytics. In addition to the concerns about whether learning outcomes are improved, or the impact on the privacy of students, or the impact on equality, there is a growing recognition that the use of Big Data and analytics in education can fundamentally affect the pedagogical approach of the university. Despite this, tracking and analytics of students are even more prevalent than ever before, with analytics products that arguably have even less potential benefit for learners or educators but are more easily monetizable by the solutions providers. In some cases this has been driven by ‘solutionist’ ed-tech tools sold into schools without adequate scientific or pedagogical support for their effectiveness. One example of this is the use of gaze tracking and ‘emotion analysis’ in remote learning tools such as video-enabled remote ­classrooms and remote proctoring (Kaye, 2022; Poonia, 2022). For instance, while we as humans regularly infer other people’s emotions from their facial

本书版权归Kogan Page所有

113

114

Data Ethics

expressions, ‘emotion recognition’ technology that uses machine learning to attempt the same action does not have the capabilities its name advertises. The premise on which these technologies are promoted is that there are a limited number of universal facial expressions that when modelled, detected and categorized will accurately signify people’s felt emotions, and that using this will enable automated detection of engagement level and thus somehow accurately gauge how well a student is learning (Altuwairqi et al, 2021). However, the premise of a limited number of detectable emotional expressions is pseudoscientific, based on a flawed and outdated model that has largely been rejected in psychology and affective science (Barrett et al, 2019). ‘Emotion recognition’ technologies would be more accurately described as ‘affect labelling’; they do not detect emotions, but assign a categorization to a measurement of part of a person’s display of affect. These models do not take into account how emotional affect can be highly culturally dependent and contextual (Barrett et al, 2019), and methods of tracking engagement by measuring eye contact do not take into account that different social and cultural groups have different rules for respectful eye contact, which would change interpretation emotions (Akechi et al., 2013). Additionally, affect is often different in neurodiverse people, so the results of data mining or machine learning to analyse emotions through measurement of facial affect is likely to result in discriminatory results. Educational technology and remote learning tools were essential enablers for education throughout various stages of pandemic lockdown globally. Some of these solutions have introduced pseudoscientific and potentially harmful uses of data analytics without adequate scientific basis or evidence of effectiveness. Even when limited to ethical goals such as identifying where students may need greater support, the introduction of these applications of data analytics can result in ethical quagmires and harms. It is increasingly clear that learning analytics approaches and technologies have been adopted in the higher-education sector at a faster pace than the discussion of the ethical issues surrounding their use (Roberts et al, 2016). Again, it appears that ‘tone at the top’ may be a contributor to ethical issues in this context, with Roberts et al identifying that the ‘increasingly competitive nature of higher education to quickly fulfil government demands in ­creating nationally and globally competitive graduates may serve as an explanation for the rapid expansion of learning analytics without s­ tudent involvement’. Universities, competing for students and decreased government funding, may be using the lure of the latest technological ­supports and ‘best teaching methods’ to attract students and, hopefully, retain them.

本书版权归Kogan Page所有

Ethics, privacy and analytics

Up until now, institutions have largely focused their efforts on institutional aims such as performance assessment, financial planning and admissions tracking. These are largely achievable with effective data warehousing and business intelligence capabilities. The application of data science approaches promises the potential for student benefits such as insight into their own habits and learning strategies, along with personalized learning plans and the provision of timely interventions and supports. Such smart learning is heralded as a key to promoting efficacy and equality of learning. One of the risks identified by researchers, however, is that use of algorithmically generated personal learning plans might have an impact on pedagogic approaches in education. The decisions of the machine can only be made based on the data the machine has access to. This may serve to limit rather than enhance the pedagogic experience and may make it harder for students, parents and society to exercise agency and choice and demand accountability (Zeide, 2017). The accuracy of outcomes will depend on the representativeness, accuracy and relevance of data that is included in the models for analytics, and the algorithms that are applied. Data quality issues become potentially life altering if an incorrect value for you in the data set labels you as being in difficulty or, equally, labels you as being not in need of assistance when you are (Zeide, 2017). Likewise, the promise of more equitable education outcomes could be undermined by flaws and biases in the underlying algorithms and may incorporate historic patterns of inequity. These historic patterns can in turn create a self-fulfilling prophecy where, because a student fits a variety of criteria that the algorithm has determined are indicative of poor outcomes, the student may become demoralized by the labelling. Zeide also points out that the ‘current approach to big data analytics presumes more data is better, leading to the expansion of types of information collected about students and increasingly creating spaces of pervasive surveillance’ (Zeide, 2017). This has a chilling effect on student expression and diversity, which in turn has a potential long-term impact on our society in terms of the independence of thinking and creativity of the members of that society. In many respects, this is the same type of consideration as exists when we consider the chilling effects of privacy-invasive analytics in the wider context, only in this case it has the potential to curtail future choices and opportunities. The research suggests that students feel more vulnerable in data-driven learning environments, and this can impede academic performance, particularly among minorities.

本书版权归Kogan Page所有

115

116

Data Ethics

If we consider this from the perspective of Kant’s second formulation of the universal imperative, as discussed in Chapter 2, it seems that higher education may have an ethics problem when it comes to the adoption of learning analytics. The students risk getting lost in the mix, risking becoming a means to an end rather than an end in and of themselves. (To put this in context, your humble scribes are both self-directed learners who make connections among topics by discussing with people from other disciplines. We shudder to think how we might have been labelled in a big-data, analyticsbased education model.) Ethically, it is remiss not to include the considerations of students in the assessment of analytics in a learning environment. Despite the many academic papers in this area, there has been very little research on student attitudes. This is consistent with our experience in other areas of Big Data, including electoral analytics. Of the research that exists (see Roberts et al, 2016), several consistent themes emerge around awareness, privacy, accuracy of data, the potential impact on independence of learners and of learning, the potential for inequality because of only some students benefiting, and the importance of an effective governance structure for data that has a strong ethical base. The overarching conclusion that emerges from the research is one of the importance of including students early in the decision-making process about Big Data and learning analytics in order to develop a ‘student-centric’ approach to meet student learning needs (Roberts et al, 2016). We will leave the final word on this to Elana Zeide (Zeide, 2017): ‘It is important that the changes wrought by big data in education are not made unknowingly and inadvertently by thoughtlessly implementing new technologies. They should instead be the result of considered choices sufficiently transparent to permit public scrutiny.’

Big Data in the electoral process Recent political developments have cast a light on the role of big data and analytics in the electoral process. The ability for political parties, or companies working on their behalf, to obtain, ingest and analyse vast amounts of data about individuals, their interests, their hopes, their likely voting intentions, and more, has created a perfect ethical storm for information management professionals. This ethical storm embraces both the traditional data warehousing and business intelligence aspects of analytics, but it is

本书版权归Kogan Page所有

Ethics, privacy and analytics

i­ncreasingly clear that the data science and predictive analytics dimensions can contribute to a potential danger to democratic processes worldwide. The traditional data warehousing and business intelligence aspect of this is relatively simple. A political party can acquire copies of voter rolls in most countries. In some they can obtain copies of the records of who actually voted. In the Irish political system, and many others, each candidate historically held data individually for their own electoral purposes rather than this being a centralized resource for the party machine. But increasingly political parties are centralizing the storage of that data in voter management systems that can include case management (for constituent queries), records of when you were canvassed in an electoral campaign and your stated voting intention or position on the issues. In the United States, this data is supplemented with data sets from third-party data brokers to develop an incredibly rich view of who you are, what you care about and what is the best time to contact you. Politicians and political parties have been doing this type of data gathering and statistical analysis of voters, drawing on the practices of market segmentation in commercial advertising, at least since the era of John F Kennedy. However, the recent increase in the types, granularity and the frequency of update of data about voters that are available now – as a result of social media and other technologies – means that savvy politicians, just as Kennedy did, are seeking to apply the methods and practices of modern business to the political game. Over the past decade, people interested in data-enabled political campaigning have become increasingly enthusiastic about the ability to create a ‘single view of constituent’ and use it to target political messaging and get out the vote, following the successes of the Obama presidential campaigns. Obama emulated his predecessor JFK in harnessing and using data and analytics tools more effectively than previous campaigns or his competitors (Lynch, 2012; Shen, 2013). Over the same period, we have seen the number of users of social media platforms increase, new platforms emerge, and the continued evolution of data analytics capabilities and data-gathering capabilities – all of which now has the potential to be aggregated with the more traditional data that political parties would acquire to support microtargeting of messages to v­ oters. Platforms such as Google and Facebook provide services, driven by analytics and algorithms, that can target messages effectively even to people that the political parties do not have a detailed dossier on already (Armerding, 2016; Talbot, 2016).

本书版权归Kogan Page所有

117

118

Data Ethics

Research published in 2013 by researchers at University of Cambridge (Kosinski, Stillwell and Graepel, 2013) showed that anonymous Facebook likes from US Facebook users could successfully predict, with substantially high degrees of probability, people’s voting preference, sexual orientation and whether they were Caucasian or African American. This research highlighted just how much information people are willingly providing for algorithms to ingest and process to reveal intimate traits about political views, religion, intelligence levels and other factors. Two significant electoral outcomes took place in 2016 that have been ­attributed to the data analytics and targeted political advertising that capitalized on the ‘filter bubble’ effect that is generated by social media and algorithmically generated news feeds. Both the election of Donald Trump in the United States and the UK Brexit vote are credited to the use of data analysis and other techniques by data analytics companies working in both campaigns. The analysis allowed for online advertising to be directly targeted at voters, so a voter whose profile indicated they had a particular bias on a particular issue was shown the message that was most likely to generate a response in favour of the candidate. There is an interesting parallel between the use of analytics and Big Data in elections and their use in education. The debate is about whether predictive analytics and other techniques that are alleged to have been applied in the Trump and Brexit campaigns worked versus other more traditional campaign methods (Mathieson, 2017; Doward and Gibbs, 2017). Both the Clinton defeat and the Brexit vote can equally be explained by poor campaigning on the part of the sides that lost each vote, and other factors unrelated to data and analytics. For example, a national public radio (NPR) analysis identified some key issues in Hillary Clinton’s campaigning, including a failure to engage directly with voters (as she had done in her Senate campaign in 2000), a reactive campaign slogan that echoed Trump’s, and a number of other factors (Montanaro, 2016). In the context of Brexit, there was a lack of awareness among voters that the Conservative Party position was actually to remain in the EU; there were mixed messages from other political parties, in particular Jeremy Corbyn; and there was a media frenzy around the Conservatives about their internal politicking and not their campaigning, and the impact of prolonged media misinformation about the EU, particularly in UK tabloids (Behr, 2016; The Economist, 2017). However, the simple fact is we don’t know for certain if these analytics techniques and the targeting of voters worked, or if they alone swung elections. Voters were targeted with messages that focused on specific issues and

本书版权归Kogan Page所有

Ethics, privacy and analytics

fears. The targeted voters tended to exist in a state of ‘low information’, ­either through limited access to information, limited ability to compare and analyse information, or through the operation of ‘filter bubbles’ created by algorithmic filtering of content and search results. In that context it is all too easy for confirmation bias (‘this must be true, all the sources I use are telling me the same thing’) and other cognitive errors to affect decision making. The answer to the question ‘did misuse of data analytics affect elections?’ has to be ‘it’s complicated’. Research and investigation by activists such as Paul-Olivier Dehaye (2016) highlight some worrying aspects of the Trump election and how these tools might have been used to influence people in these ‘low-information’ states. But, as Dehaye says, the evidence is compelling but not conclusive. The other parallel concerns the views of the people who are ostensibly the focus of this analysis and targeting. As with the education sector there is very little research on voter attitudes to this kind of analysis. Several years ago, we did a data protection impact assessment for an Irish political party voter-data-­ management system. We could only identify a few pieces of research that were addressing voter-data analytics from the voter perspective. However, they were all broadly consistent in their message. Voters didn’t like it. One of the papers we identified was the first nationally representative telephone (wireline and cell phone) survey to explore Americans’ opinions about targeting and tailored advertising by political campaigns, conducted by the Annenberg School for Communication. The results of the survey were stark: 64 per cent of Americans said their likelihood of voting for a candidate they support would decrease if they learn a candidate’s organization buys information about their online activities and their neighbour’s online activities and then sends different messages to each of them; 85 per cent said they would be angry if Facebook used profile information they had set as private in order to send targeted political adverts to them (Turow et al, 2012). US voters didn’t like microtargeting back in 2012. The key issue that US voters reported having back in 2012 was a lack of information about what was being done with their data, and a lack of control over how that data was used. Of respondents surveyed by Turow et al (2012), 65 per cent wanted to know what a campaign knew about them when targeting an advert; 76 per cent said they wanted to know where the data came from. They also had extreme opinions on the selling and sharing of data without informed consent: 91 per cent said it was not okay for a candidate’s website to sell their information; only 38 per cent objected when an opt-in option was given.

本书版权归Kogan Page所有

119

120

Data Ethics

Turow summarizes the Annenberg research as follows: ‘What we have is a major attitudinal tug of war: the public’s emphatic and broad rejection of tailored political ads pulling against political campaigns’ growing adoption of tailored political advertising without disclosing when they are using individuals’ information and how.’ This highlights the information asymmetry problem that many commentators on electoral data analytics have raised in the context of the 2016 US election and the 2016 Brexit referendum. People are largely unaware of how their data is used in electoral analytics and electoral campaigning. Again, we have a classic Kantian ethics problem. As with the use of analytics in education and learning, it appears that the people are being treated as the means to an end, rather than an end in and of themselves. We also see a ‘tone at the top’ deficit from an ethics perspective. Politicians insist they want to hear the voice of the people and respect the will of the people. But, when it comes to data analytics, the voters’ voices appear to be drowned out by the siren call of the algorithmic solution. Looking at this from the perspective of the life cycle of analytics, we find the following ethical questions can arise: 1 Acquisition – is the level of transparency about what information is obtained, how, and where it is obtained from by political parties appropriate? Does the electorate have appropriate controls over how their data is used? 2 Analysis – when combining and linking data in the analysis process, are there appropriate safeguards in place to prevent ethical breaches and to ensure compliance with relevant legislation? 3 Action – what action will be taken based on the analysis? Is it ethical or appropriate to fuel social or political division at the extremes, curtailing debate and reinforcing ideologies through an increasingly targeted algorithmic filter? This is a critical ethical and social dilemma for the Information Age. Whether analytics or psychographic targeting based on your Facebook likes and the ratio of cat pictures to birthday greetings in your Twitter timeline worked in the last cycle of elections, the analytic capabilities and targeting capabilities are getting better. If politicians are going to carry out psychological profiling of you in an experiment to see if they can get your vote in the ballot box, then many commentators feel that, at a minimum, they should be obtaining informed consent, just like real psychologists and scientists.

本书版权归Kogan Page所有

Ethics, privacy and analytics

Data protection laws like the EU’s data protection regime may provide some legal structures to mitigate this ethical dilemma (Zanfir-Fortuna, 2016). It would likely require explicit consent from each individual voter for the processing of a specific set of data. As the manipulation of people’s voting preferences is an order of magnitude more impacting on the other fundamental rights of an individual than persuading them to buy a particular brand of breakfast cereal, it is likely that this type of processing would fall afoul of a number of provisions in the General Data Protection Regulation. The remedies to the concerns raised by US voters in 2012 can be found in EU legislation, it seems. However, the evolution of analytics in the political sphere has tracked the commercial sphere since the invention of the printing press. The technologies used to nudge us to buy certain brands are evolving, as is their application in electoral campaigning. The stakes and implications are higher in this context, however, because our breakfast cereal choice doesn’t (or rather shouldn’t) set the socioeconomic policies of our countries.

Analytics and privacy The balancing of personal data privacy rights against the interests of an organization to execute its functions or sell its services is one of the highestprofile minefields for ethics and analytics. Indeed, when we discuss this topic with peers, clients or at conferences it can be difficult to steer away from ­privacy as a topic and to discuss some of the other ethical aspects of big data and data science. As you have seen in the discussion of analytics in education and in electoral processes, privacy concerns and people’s awareness of what data about them is being processed are a common area of concern. As of March 2022, there are 157 countries with data privacy laws and a several more with proposed legislation (Greenleaf, 2022). But as Mandy Chessell, writing for IBM, has pointed out (Chessell, 2014), increasingly the legislation can lag what is technically feasible. She is not alone in that view. This widening gap and disparity of power between individuals and organizations collecting and collating data about them is where the ethical challenges of data privacy come into play, particularly where there is a perceived gap in the legislation or, in the case of the EU’s General Data Protection Regulation, the legislation is framed as a risk-management approach to privacy and requires the organization to adopt its own assessment of whether its approach to protecting the privacy of the individual is sufficient.

本书版权归Kogan Page所有

121

122

Data Ethics

Figure 4.1   The analytics life cycle

Acquisition

Analysis

Action

It is beyond the scope of this book to give a full analysis of all the aspects and issues of data privacy in an analytics context. For now, we will consider the privacy implications of data analytics in the context of the analytics life cycle (Figure 4.1). While you might not be directly responsible for or in control of the acquisition or action stages in the life cycle, the choices made by others in those stages of the life cycle affect whether your analytics processing is ethical or legal.

Acquisition It is a commonly agreed principle of data privacy that information about people should be obtained fairly and processed in a transparent manner. This is enshrined in the OECD’s Fair Information Practices (OECD, 2013) and is a key principle in the EU’s Charter of Fundamental Rights (European Union, 2000), the General Data Protection Regulation (GDPR) and the other data privacy laws around the world. The ethical questions around transparency at the point of data acquisition include more than just how much you are going to tell people about processing, but also how you are going to tell them. The GDPR (European Union, 2016) explicitly requires that the information provided should be accessible, understandable and intelligible (Recital 39). This raises challenges when we consider the variety of methods by which data about people can be acquired, particularly when it is not being obtained directly from the affected individual. A key point that needs to be considered about the ethics of acquisition is accessibility. Issues such as the level of literacy of the people whose data you are going to be processing, or whether they are colour blind, all need to be considered. The derivation of data about people using machine learning and other analytics techniques such as text analytics also raises potential ethical issues in relation to transparency. This is particularly the case when the machinelearning algorithms use unsupervised or reward-based learning strategies and may do things that are unforeseen by even the developers, or may codify inherent biases that could lead to incorrect or inaccurate data being recorded about people.

本书版权归Kogan Page所有

Ethics, privacy and analytics

Analysis When we enter the analysis phase of the analytics life cycle it is important to consider the ethics of compatibility of processing with the original purposes. Simply because you have data available to analyse, it does not necessarily mean you can or should be doing the analysis. This is highlighted in the principles of purpose limitation and purpose specification in global standards for data privacy principles (European Union, 2016; OECD, 2013). This is an important ethical checkpoint as regulators are increasingly expecting organizations to have documented their decision-making processes for this type of compatibility test. This highlights the critical relationship between information ethics, analytics and data governance. Clear rules need to be defined about ‘how to decide how to decide’. Another key ethical checkpoint is the requirement for processing of personal data to be both necessary and proportionate. This will affect your approach to data acquisition, but it will also affect how you will design your analytics process in a variety of ways, including, but not limited to, how you select data and what level of granularity of data you will use in your analysis. The question of whether the data you are processing is personal data is also important. This relates to the ability of the organization to identify individuals directly or indirectly from the data, irrespective of the presence of tangible personal identifiers such as names or addresses. The combination of data sets, even anonymized data, can eventually result in individuals being identifiable in the data. For example, Facebook can identify ­people in images even where their faces are obscured, based on other physical characteristics (Glaser, 2017), and increasingly analytics processes on images and video are being used to infer people’s emotions and mood in images and videos. Think of it as being like the end of the movie The Usual Suspects, where the character Verbal Kint is being interrogated by police about a gangster, Keyser Söze, who masterminded a violent hijacking. Rather than the infamous Keyser Söze being a different person who Kint is afraid of, Kint is revealed at the end of the movie to be Keyser Söze, and his statement about the events in the movie is revealed to be based on items he has seen around the office of the police officer who was interrogating him such as the brand name on the coffee cup the police officer is drinking from. Based on the small items of data from different sources, a rich profile of an individual can be created. Given enough data points, analysis will prove that you are indeed Keyser Söze, and we also know if you are happy about that fact. The

本书版权归Kogan Page所有

123

124

Data Ethics

key ethical challenge in analytics though is what impact on people this type of analytics process will have. Will it affect their agency and choice? Will it restrict their access to services or information? Much of this comes down to how the output of the analysis will be put into action.

Action ‘Action indeed is the sole medium of expression of ethics’, according to Jane Addams (Addams, 1902). This is as true in analytics as it is in any other domain. As we have seen in our examination of education and electoral data management, it is often how the data will be used that drives many of the ethical issues and privacy issues that arise in analytics. It is important to consider the legal or equivalent effects that your analytics processes will have on the affected individuals. This test of the balance between the data privacy rights of the individuals whose data you are processing and the organization conducting the processing is essential when there is a lack of clear legal basis for your processing such as contractual obligations, consent or a legal requirement. The Article 29 Working Party,1 the collegiate body of European Data Protection Supervisory Authorities, has issued extensive guidance on the considerations to include in such a balancing test (Article 29 Working Party, 2014). This guidance is a useful reference for ethical assessments of analytics processes. There are countless examples of organizations that have failed to manage legal and ethical issues in the life cycle of a data analytics and Big Data context. In the introduction to this book we discussed the Samaritans Radar app and the fallout from the ethical questions of that application’s use of text analytics to identify people who were potentially suicidal or in need of assistance (Orme, 2014). A more recent example is the introduction by Facebook of almost exactly the same type of technology combined with an AI component to proactively identify users who may be manifesting or expressing suicidal intent. Unlike Samaritans Radar, the Facebook system alerts appropriate first responders rather than other individuals who may be trolling the affected individual. Facebook have announced that the system will operate everywhere apart from in the EU, and they have also confirmed (at the time of our writing this chapter) that there is no way for people to opt out of this processing and monitoring. The exclusion of the EU is on the basis that automated processing of data relating to physical or mental health is more highly regulated in the EU. More troubling is the lack of any ability for a person to opt out of the

本书版权归Kogan Page所有

Ethics, privacy and analytics

monitoring (Constine, 2017). Equally concerning is the lack of transparency from Facebook about how their AI monitoring in this context actually works. In effect, by reason of geography, individuals now find themselves subject to monitoring of their mental health by a private corporation that has not disclosed how their monitoring works and will not provide an opt out (Ruiz, 2017). This raises an obvious risk of unintended consequences: without trust in the tool, at-risk people may simply decide against sharing e­ motionally revealing or suicidal posts, which serves to undermine the effectiveness of the existing human-driven reporting processes for content of this type. Another example of the potential ethical issues that can arise is highlighted by the revelations that an Irish government agency had been trying for almost a decade to get access to data from mobile-phone operators in order to track the movements of tourists visiting the country. Despite repeated feedback from the Irish data protection regulator that there was no legal basis for the processing, the agency has persisted to seek access to the data. This essentially amounts to a mass surveillance regime for the purposes of analysis of tourist movements. However, it would not only capture tourists but would also include any business travellers, or any person living along the border between Northern Ireland and the Republic of Ireland. Significant questions exist about the necessity and proportionality of this approach to generating tourism statistics (Edwards, 2017).

CASE STUDY  Automated remote proctoring software A university has adopted a software platform to remotely monitor students taking exams. It was originally adopted as an interim emergency measure during the Covid-19 pandemic while the university shifted to delivering all its courses remotely. The scalability and flexible scheduling capabilities that allow students to take their exams at home at a time that suits their schedules instead of a fixed time in a booked classroom on campus are seen as clear benefits to continue using remote proctoring. Acquisition Before an exam, students are required to submit an official photo ID. As the exam is in progress, students are directly monitored through observation

本书版权归Kogan Page所有

125

126

Data Ethics

software, which records video of the faces of all exam candidates, using biometric facial identification and machine learning for real-time analytics to flag ‘suspicious’ behaviour that indicates likely cheating to lecturers for review. Analysis The video analysis involves biometric identification to verify that the person taking the exam is in fact the registered student, sound recording to ensure answers are not being fed to the exam candidate, algorithmic analysis of tracking of eye movements and face position, and advanced ‘emotion detection’ tools. Suspicious activity includes looking away from the screen, facial expressions the software categorizes as related to cheating, and other movements outside of the expected patterns for exam takers. It also gathers data through computer monitoring software to analyse mouse movements, browser use such as opening and resizing tabs, and typing. Action The gaze and movement tracking analysis flags as suspicious things like ‘excessive’ fidgeting, ‘abnormal’, and exam candidates who ‘look away from the camera’ too often. False flags are raised because the video quality from students’ webcams is insufficient for accurate identification, particularly for students with darker skin. A number of other flags are raised due to ambient noise outside of the students’ control, which the software detects as another person in the room. Students with darker skin tones have complained that they are being subjected to racially biased evaluation because the video recording and analytics are less accurate in identifying them. They back up their complaints with research from prominent AI researchers such as Timnit Gebru and Joy Boulamwini, which demonstrate algorithmic bias in facial recognition technologies. The campus disability rights organization stages a protest, arguing that the analytics disproportionately flag as ‘suspicious’ people with autism, ADHD and vision impairments. Students have signed a petition to discontinue use of the software, arguing that requiring them to submit to remote proctoring in order to pass their course is discriminatory and a violation of their rights, including their rights to privacy because the webcam monitoring results in surveillance of their home environment. Others question the privacy and security risks of allowing remote access to their computers. Some students report that being under automated surveillance during their exams is inducing anxiety.

本书版权归Kogan Page所有

Ethics, privacy and analytics

While there is a strong business case to continue using the automated remote proctoring solution, the university decides to discontinue the service because of the number of data ethics issues called out by stakeholders and identified risks of reputational damage and legal action if the solution is used despite complaints of algorithmic bias and disproportionate and discriminatory outcomes.

This case study is a genericized example of a situation that has arisen in a number of universities. The use of automated remote proctoring services has seen massive adoption, and this has raised significant criticism and pushback from both students and faculty (Harwell, 2020; Young, 2020). Automated remote proctoring has been linked to heightened exam anxiety resulting in lower scores, which is unrelated to the unique stressors and higher anxiety experienced during the pandemic (Woldeab and Brothen, 2019). A survey report from the US National Disabled Law Students Association expresses many of the concerns exam candidates have with remote proctoring (NDLSA, 2020). While hundreds of colleges and universities adopted remote proctoring services during the pandemic, some have discontinued using them, specifically citing ethical and accessibility issues (Chin, 2021). A key feature of an ethical approach to data privacy in an analytics context is the recognition of the need to ensure a balance between the data privacy rights of the individual and the objectives of the organization throughout the analytics life cycle. From a legal compliance perspective, this type of analysis only comes into consideration when there is no other grounds for carrying out the processing such as consent or a legal obligation and the data controller is relying on what is referred to as their ‘legitimate interest’.2 However, from an ethics perspective, in all cases it is a useful checkpoint to ensure that the processing is being done in a way that most appropriately balances rights, duties and obligations. It is an unfortunate truth that sometimes things can be done in a way that is perfectly legal but may not be entirely ethical. The European Data Protection Board (EDPB) has reaffirmed guidance from its predecessor, the Article 29 Working Party (Article 29 Working Party, 2014) on the balancing tests to be applied when an organization is seeking to rely on the legitimate interest ground to justify processing of data. The guidance suggests that organizations consider both their interests and the interests of the affected data subjects as being on a spectrum ranging from insignificant to compelling. Compelling legitimate i­nterests may, subject to appropriate safeguards and controls, justify an intrusion into the privacy of the individual. The role of safeguards is significant in

本书版权归Kogan Page所有

127

Data Ethics

assessing the balance of interests. The more ‘investment’ the data controller has made into safeguards – such as awareness and education about the processing (transparency), technical and organizational controls, data minimization, etc – the higher the potential that there will be a balancing of interests. Of course, this depends on the context of the processing and the context of the types of information that are proposed to be processed. For example, the balancing test for postal marketing to a customer is likely met by: 1) letting them know that if the order is from you then you will send them marketing materials; and 2) providing them with a simple means to opt out or decline the communications. The balancing test for a pizza chain selling the order history of customers to an insurance company for the purposes of calculating premiums is likely to be much harder given the impact on the rights and freedoms of the data subject (for example: how would the insurance company know if you had eaten those three deep-pan pepperonis on your own or not?). The guidance on the balancing test is relatively straightforward and is detailed in the EDPB’s opinion. The process of conducting the assessment ultimately forces organizations to consider if they are viewing the individual as a means in and of themselves or purely as a means to an end. It requires you to consider less privacy-invasive methods and invest in appropriate privacy-enhancing controls such as anonymization, user access controls, or Figure 4.2   Balancing test matrix

Interests of organization

128

High org/low individual

High org/high individual

Balancing test unlikely to be passed Individual is a means to an end Need to consider how to improve safeguards or reduce the invasiveness/ impact of processing

This is a clear win–win for both Need to ensure appropriate transparency and communication as a safeguard

Low org/low individual

Low org/high individual

What is the value of this processing? Is this data processing an administrative function?

This treats the individual as an end in their own right, rather than a means to an end

本书版权归Kogan Page所有

As low value to org, controls and safeguards required to ensure data is not abused/misused Interests of individual

Ethics, privacy and analytics

differential privacy in your analytics processes to strike the right balance. When working with clients we often whiteboard the perspective of the organization and the perspective of the customer using a version of the fourbox model illustrated in Figure 4.2.

The future is here, it’s just not evenly distributed Another aspect of ethics in analytics is the issue of access to the analytics tools and technologies. Data science and analytics can provide significant benefit for developing countries. Unfortunately, the digital dividends that come with technologies such as data analytics tools have lagged the developments in other areas. This is compounded when free software requires expensive hardware to run or presume an always-on, high-speed internet connection. As we develop our analytics technologies and capabilities, we need to keep in mind the digital divide in the world. It is an ethical choice that needs to be made in terms of capability and equality of access to the same potential benefits of analytics. Bruno Sánchez-Andrade Nuño is a data scientist who has worked with the World Bank on development projects. In a blog post in July 2017 (Nuño, 2017) he described the idea of ‘cheap data science’: Cheap Data Science is then the design principle of gracefully degrading to a modest computer and poor connectivity. It’s ok if it takes more time, or you need to bundle your Internet needs. The important thing is that you don’t leave out those without that MacBook Pro or Internet connection…

Bruno’s blog post describes how he has struggled to do cheap data science in developing countries, including the difficulties posed by online courses that use video and other technologies for interactive e-learning that simply will not work in a bandwidth-starved country. As Bruno puts it: ‘Still, it feels to me that much of the latest data science progress use frameworks that are just unable to run on slow computers.’ The ethical issue that Bruno is describing is not a million miles distant from the same issues that give rise to algorithmic bias. When the teams designing and evolving the next generations of data science tools have a frame of reference for the world that cannot comprehend not being able to simply log in to an Amazon AWS or Microsoft Azure, for instance, and spin up a virtual machine, while at the same time downloading data sets and the analytics tools you want to use, and simultaneously watching the training video for the latest release of the software you will be using, then we have one key ingredient for a digital divide. When you are in a position where, if your

本书版权归Kogan Page所有

129

130

Data Ethics

laptop is running slowly you can simply go online and order a new one, or go to the store and buy a higher-specification machine that day, we have another key ingredient for a digital divide. In Bruno’s blog post he writes that he is worried that the advance of data science is creating unnecessary barriers to entry in terms of hardware requirements and infrastructure requirements, which risk depriving a segment of the world’s potential data scientists of access to the tools and technologies they need to bring about life-changing improvements for them and their communities. Is it ethically responsible and sustainable to only design and build software that works only in the richest countries? While not an ethical issue that arises from the use of data in an analytics environment, this is a fundamentally ethical and moral issue where conscious or unconscious decisions taken about the design of technologies can affect the fundamental rights of others. Addressing this might simply mean that politicians in developing nations can also choose to ignore how their citizens want to have their data processed during elections, or it might allow a school or college to implement a student tracking system that may or may not work. Or it could help with processing of data to track infectious diseases before they take hold, or process data from a smartphone-based chlorophyll tester to help predict crop yields and make farming more efficient. Addressing this question by focusing on enabling data scientists without access to bandwidth and energy-intensive computing, developing effective ‘cheap data science’ would also likely result in more energy-efficient data-processing solutions, reducing the carbon footprint of computing as well as promoting equity in access that helps to address computing power imbalances that are a part of ‘data colonialism’.

Ethics and regulatory reporting One of the applications of analytics technologies and methods is in regulatory or consumer reporting. There are many scenarios in business where the output of processes must meet certain standards or a product or service cannot be brought to market. Often in these contexts, governments, industry bodies or regulators define standards that need to be complied with. Where there is a significant financial opportunity at stake organizations might be tempted to tell a white lie or bend the truth or cook the books a little. This highlights the importance of ‘tone at the top’, as discussed by Deloitte (Deloitte, 2015), and it is a key issue in the context of car manufacturers that designed software and analytics processes in the engine management system of vehicles so that they would perform differently under laboratory test conditions compared to their performance in the real world.

本书版权归Kogan Page所有

Ethics, privacy and analytics

The Volkswagen case study below is a good example of the clever application of analytics technologies to detect how the different drive characteristics of a test lab versus a real road can be in the pursuit of an unethical objective. It also highlights the impact of the ‘tone at the top’, and also the impact of organization culture in ensuring that data analytics processes do not result in unethical or illegal outcomes.

CASE STUDY  Volkswagen To summarize the known facts of the Volkswagen case: Volkswagen installed software in its engine management systems that could detect when it was being tested and then switch into test mode and give significantly lower emissions results than any driver could hope to achieve in the real world. In this way, Volkswagen would be able to pass emissions standards tests without the cost or performance impacts that would arise if the engines functioned at that level all the time. In 2007 the manufacture of the engine management component had raised concerns about the legality of using the software. Volkswagen managers at various levels in the organization, including its CEO, were aware of the cheat devices. The EPA in the United States investigated Volkswagen and discovered the cheat devices. In addition, Volkswagen has been under investigation in other jurisdictions and has had to do a mass recall of vehicles in the United States. The company faced a number of criminal charges and class action lawsuits. Eight executives were personally charged for various crimes including conspiring to mislead regulators, and some were subject to prison sentences as well as fines (Atiyeh, 2019). Referring back to Figure 4.1, we can apply an analytics life-cycle perspective to the Volkswagen case. It is easy to see where the information management ethics issues arise. Acquisition Volkswagen procured and installed software that changed the characteristics of the engine during testing. That was a calculated attempt to generate data that did not match real engine performance for the purposes of the emissions testing processes. Management were aware of this and it had approval, it seems, from the CEO down. Analysis Volkswagen did not interfere with the analysis process being undertaken by regulators. It was outside of its control. All it could do was create data for input

本书版权归Kogan Page所有

131

132

Data Ethics

(through the ‘cheat device’) that it knew would fall within the acceptable parameters in the analytics process. Action The purpose of the emissions testing was to ensure the vehicle met the required standards under relevant environmental regulations. If the vehicle did not pass the tests, it could not be sold. However, the analysis led to other actions. Environmentally concerned car purchasers relied on the emissions data when making purchasing decisions. Governments signing climate-change agreements and making pledges to tackle climate change used the emissions data to forecast their emissions footprint into the future as part of their climate-change plan. In short – there were a lot more people relying on the accuracy and quality of the emissions data than just the EPA and its sister organizations in the EU and other jurisdictions. From one perspective, the analytics teams and information professionals who figured out how to develop the cheat device were acting entirely in alignment with company culture and ethos – Volkswagen has been revealed as ‘confident, cutthroat and insular’ (Ewing and Bowley, 2015). The cars had to pass emissions tests – this was the requirement defined, and it was met. The ability of the customer to rely on the emissions data appears not to have featured in the thinking. ‘Volkswagen had become a place where subordinates were fearful of contradicting their superiors and were afraid to admit failure’, according to Ewing and Bowley. In an echo of the previous example scenarios, we see a clear ‘tone at the top’ ethic about the value of accurate and reliable data, and another example where people, the people buying the cars or breathing the exhaust fumes as they walk past the cars, were not considered as stakeholders in the analytics process. They were a means to an end – the profitability of Volkswagen through the sale of cars, not an end in and of themselves, happy customers whose ecological concerns and choices should have been recognized by Volkswagen and supported through the provision of reliable emissions data. Case study questions 1 What was the societal impact of Volkswagen’s emissions-cheat processing? 2 Why do you think individual engineers might have allowed this to happen or

gone along with the development of the emissions-cheating software? 3 What was the ethical balancing test that Volkswagen might have applied to its

decision making?

本书版权归Kogan Page所有

Ethics, privacy and analytics

Chapter summary In this chapter we have looked at the ethics of analytics from a number of perspectives: ●●

●●

●●

●●

●●

●●

We looked at the inherent challenges of ethics in the design of analytics processes. We introduced a simple three-step life cycle for analytics (acquisition, analysis, action) and discussed the ethical issues that can arise at each stage. We discussed how the development of data analytics in education raises a number of ethical issues relating to privacy, autonomy, and also the potential for causation or correlation errors when attributing the success or otherwise of analytics processes. We examined the ethical issues that can arise when applying data analytics to the electoral process, in particular in light of the increasingly public dark side when combined with other aspects of data science and behavioural manipulation. We discussed the importance of ensuring that analytics technologies and practices that can add value to society are capable of being evenly distributed in society, particularly in areas where access to fundamental technologies such as modern computers, electricity or internet access might be limited. Finally, we looked at the ethical issues that arise when an organization decides to ensure its analytics processes always give the desired answer – we did this in a review of the Volkswagen emissions scandal.

Questions 1 Is it true to say that, in any type of data analytics, there is an impact on people, either through the acquisition of data, the type of analysis performed or the actions taken as a result of output of that analysis? 2 How does ‘tone at the top’ influence the governance of data analytics in your organization? If you are not working with an organization, how does ‘tone at the top’ affect analytics processes in a school or university?

本书版权归Kogan Page所有

133

134

Data Ethics

3 Should data analytics professionals adopt an ethical principle such as: ‘First, do no harm’? 4 What role does data privacy law have to play in helping to promote an ethical way of thinking about data and analytics?

Notes 1 The Article 29 Working Party was the collective body of EU data protection regulators under Article 29 of Directive 95/46/EC. Since May 2018, the European Data Protection Board (EDPB) has acted as the collegiate body for EU Data Protection Supervisory Authorities under Article 68 of GDPR. As part of its establishment, EDPB has reaffirmed much of the guidance and opinions issued by the Article 29 Working Party. 2 The entity that is defining the means, purpose and objectives for processing is referred to as a data controller in EU data protection law. Similar language exists in other jurisdictions.

Further reading Bernal, P (2014) Internet Privacy Rights: Rights to protect autonomy, Cambridge University Press, Cambridge Daniel, B (2015) Big data and analytics in higher education: Opportunities and challenges, British Journal of Educational Technology, 46 (5), 904–20 Davis, K and Patterson, D (2012) The Ethics of Big Data: Balancing risk and innovation, O’Reilly Media, Sebastopol, CA Hasselbalch, G and Tranberg, P (2016) Data Ethics: The new competitive advantage, PubliShare, Copenhagen O’Neil, C (2017) Weapons of Math Destruction: How big data increases inequality and threatens democracy, Penguin Books, London

References Addams, J (1902) Democracy and Social Ethics, Macmillan, New York Akechi, H, Senju, A, Uibo, H, Kikuchi, Y, Hasegawa, T and Hietanen, J K (2013) Attention to eye contact in the West and East: Autonomic responses and evaluative ratings, PLoS ONE, 8 (3), e59312, doi.org/10.1371/journal.pone.0059312 (archived at https://perma.cc/NV94-ER39)

本书版权归Kogan Page所有

Ethics, privacy and analytics Altuwairqi, K, Jarraya, S K, Allinjawi, A and Hammami, M (2021) A new emotionbased affective model to detect student’s engagement, Journal of King Saud University – Computer and Information Sciences, 33 (1), 99–109, doi.org/10.1016/j. jksuci.2018.12.008 (archived at https://perma.cc/59PN-EB25) Armerding, T (2016) Big Data and elections: The candidates know you – better than you know them, CSO, 14 July, www.csoonline.com/article/3095709/data-protec​ tion/big-data-and-elections-the-candidates-know-you-better-than-you-knowthem.html (archived at https://perma.cc/J2PE-N2C9) Arnold, K E and Pistilli, M D (2012) Course signals at Purdue: using learning analytics to increase student success, in LAK ’12: Proceedings of the 2nd International Conference on Learning Analytics and Knowledge, ACM, New York Article 29 Working Party (2014) Opinion 06/2014 on the notion of legitimate interests of the data controller under Article 7 of Directive 95/46/EC, 9 April, ec.europa.eu/justice/article-29/documentation/opinion-recommendation/ files/2014/wp217_en.pdf (archived at https://perma.cc/A2MT-4HCQ) Atiyeh, C (2019) Everything you need to know about the VW diesel-emissions scandal, Car and Driver, www.caranddriver.com/news/a15339250/everything-youneed-to-know-about-the-vw-diesel-emissions-scandal/ (archived at https://perma. cc/2DJ5-YT3R) Barrett, L F, Adolphs, R, Marsella, S, Martinez, A M and Pollak, S D (2019) Emotional expressions reconsidered: Challenges to inferring emotion from human facial movements, Psychological Science in the Public Interest, 20 (1), 1–68, doi.org/10.1177/1529100619832930 (archived at https://perma.cc/JZ3M-3TW2) Behr, R (2016) How remain failed: The inside story of a doomed campaign, The Guardian, 5 July, www.theguardian.com/politics/2016/jul/05/how-remain-failedinside-story-doomed-campaign (archived at https://perma.cc/8QSA-RK3C) Bright, S (2017) After Trump, ‘Big Data’ firm Cambridge Analytica is now working in Kenya, BBC News, 3 August, www.bbc.com/news/blogs-trending-40792078 (archived at https://perma.cc/N746-NCDY) Chin, M (2021) University will stop using controversial remote-testing software following student outcry, The Verge, 29 January, theverge.com/2021/1/28/22254631/­ university-of-illinois-urbana-champaign-proctorio-online-test-proctoring-privacy (­archived at https://perma.cc/5KAF-Z57D) Caufield, M (2013) A simple, less mathematical way to understand the course signals issue, Hapgood, 26 September, hapgood.us/2013/09/26/a-simple-​less-­mathematical-​ way-to-understand-the-course-signals-issue/ (archived at https://perma.cc/48PXFF8R) Chessell, M (2014) Ethics for big data and analytics, IBM, www.informatica. uniroma2.it/upload/2017/IA2/IBM-%20Ethics%20for%20BD&A.pdf (archived at https://perma.cc/TGP7-2CLE) Constine, J (2017) Facebook rolls out AI to detect suicidal posts before they’re reported, TechCrunch, 27 November, techcrunch.com/2017/11/27/facebook-aisuicide-prevention/ (archived at https://perma.cc/J9TF-4WML)

本书版权归Kogan Page所有

135

136

Data Ethics DAMA International (2017) The Data Management Body of Knowledge, 2nd edn, Technics Publications, Basking Ridge, NJ Dehaye, P-O (2016) Microtargeting of low-information voters, Medium, 31 December, medium.com/personaldata-io/microtargeting-of-low-information-voters6eb2520cd473 (archived at https://perma.cc/4QBK-5W4M) Deloitte (2015) Tone at the top: The first ingredient in a world-class ethics and compliance program, Deloitte Doward, J and Gibbs, A (2017) Did Cambridge Analytica influence the Brexit Vote and the US election? The Guardian, 4 March, www.theguardian.com/politics/​ 2017/​mar/04/nigel-oakes-cambridge-analytica-what-role-brexit-trump (archived at https://perma.cc/9VWG-F6WR) Edwards, E (2017) Regulator and CSO in stand-off over mobile data, Irish Times, 17 July, www.irishtimes.com/news/ireland/irish-news/regulator-and-cso-in-standoff-over-mobile-data-1.3156892 (archived at https://perma.cc/2BK5-9D68) Essa, A (2013) Can we improve retention rates by giving students chocolates? web. archive.org/web/20180925041751/http://alfredessa.com/2013/10/can-we-im​ prove-retention-rates-by-giving-students-chocolates/ (archived at https://perma. cc/C2W7-H4LW) European Data Protection Supervisor (2015) Towards a New Digital Ethics, EDPS, Brussels European Union (2000) Charter of Fundamental Rights of the European Union (2000/C 364/01), Official Journal of the European Communities, 18 December, www.europarl.europa.eu/charter/pdf/text_en.pdf (archived at https://perma. cc/9ERN-USQ2) European Union (2016) Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation), EUR-Lex, eur-lex.europa.eu/eli/reg/2016/679 (archived at https://perma.cc/GW72-YGGE) Ewing, J and Bowley, G (2015) The engineering of Volkswagen’s aggressive ambition, New York Times, 13 December, nytimes.com/2015/12/14/business/the-engi​ neering-of-volkswagens-aggressive-ambition.html (archived at https://perma.cc/ CQ4V-4A8A) Feldstein, M (2013) Purdue University has an ethics problem, eLiterate, 25 November, mfeldstein.com/purdue-university-ethics-problem/ (archived at https://perma.cc/AS8V-BX9K) Ferguson, R and Clow, D (2017) Where is the evidence? A call to action for learning analytics, in LAK ’17 Proceedings of the Seventh International Learning Analytics & Knowledge Conference, pp 56–65, ACM, New York Glaser, A (2017) Facebook is using an ‘NRA approach’ to defend its creepy facial recognition programs, Slate, 4 August, www.slate.com/blogs/future_ tense/2017/08/04/facebook_is_fighting_biometric_facial_​recognition_privacy_​ laws.html (archived at https://perma.cc/D9LC-MCEJ)

本书版权归Kogan Page所有

Ethics, privacy and analytics Greenleaf, G (2022) Now 157 Countries: Twelve Data Privacy Laws in 2021/22, 176 Privacy Laws & Business International Report 1, 3–8, UNSW Law Research, https://ssrn.com/abstract=4137418 (archived at https://perma.cc/B6M6-ZL84) Harwell, D (2020) Cheating-detection companies made millions during the pandemic. Now students are fighting back, Washington Post, 12 November, washing​ tonpost.com/technology/2020/11/12/test-monitoring-student-revolt/ (archived at https://perma.cc/ELX5-DTDV) Kaye, K (2022) Intel calls its AI that detects student emotions a teaching tool. Others call it ‘morally reprehensible’, Protocol, 17 April, www.protocol.com/enterprise/ emotion-ai-school-intel-edutech (archived at https://perma.cc/G3CM-5YKX) Kosinski, M, Stillwell, D and Graepel, T (2013) Private traits and attributes are predictable from digital records of human behavior, PNAS, 110 (15), 5802–05 Lynch, M (2012) Barack Obama’s Big Data won the US election, Computerworld, 14 November, www.computerworld.com/article/2492877/government-it/barackobama-s-big-data-won-the-us-election.html (archived at https://perma.cc/A45PKEVH) Mathieson, S (2017) Trump, Brexit and Cambridge Analytica – not quite the dystopia you’re looking for, The Register, 7 March, www.theregister.co.uk/2017/03/07/ cambridge_analytica_dystopianism/ (archived at https://perma.cc/KC26-R7YV) Montanaro, D (2016) 7 Reasons Donald Trump won the presidential election, NPR, 12 November, www.npr.org/2016/11/12/501848636/7-reasons-donald-trumpwon-the-presidential-election (archived at https://perma.cc/2REU-S42X) Morgan, T and Hall, M (2015) Volkswagen crisis: Car giant warned against emissions rigging eight years ago, The Telegraph, 27 September, telegraph.co.uk/mo​ toring/car-manufacturers/volkswagen/11894672/Volkswagen-crisis-Car-giantwarned-against-emissions-rigging-eight-years-ago.html (archived at https:// perma.cc/8YF9-7USK) [accessed 4 August 2017] NDLSA (2020) Report on Concerns Regarding Online Administration of Bar Exams, 29 July, ndlsa.org/wp-content/uploads/2020/08/NDLSA_Online-ExamConcerns-Report1.pdf (archived at https://perma.cc/54KM-EXHV) Nuño, B S-A (2017) In defense of cheap data science, Medium, 30 July, medium. com/towards-data-science/in-defense-of-cheap-data-science-f630f248d400 (archived at https://perma.cc/GT4T-6WW3) OECD (2013) The OECD Privacy Framework, www.oecd.org/sti/ieconomy/oecd_ privacy_framework.pdf (archived at https://perma.cc/LS9M-8VHG) Orme, J (2014) Samaritans pulls ‘suicide watch’ Radar app over privacy concerns, The Guardian, 7 November, www.theguardian.com/society/2014/nov/07/samari​ tans-radar-app-suicide-watch-privacy-twitter-users (archived at https://perma.cc/ Q2MH-YGQT) Poonia, G (2022) AI software can now detect emotions during sales calls or in classrooms. But is it smart enough to know exactly what we feel? Deseret News, 27 April, www.deseret.com/2022/4/26/23042787/ai-software-detect-emotionszoom-sales-calls-or-intel-classrooms (archived at https://perma.cc/6L5C-5T82)

本书版权归Kogan Page所有

137

138

Data Ethics Purdue University (2017) Course Signals [Online] Available at: https://www.itap. purdue.edu/learning/tools/course-signals.html (archived at https://perma.cc/ BND2-KE4S) [accessed 1 August 2017] Roberts, L D, Howell, J A, Seaman, K and Gibson, D C (2016) Student attitudes toward learning analytics in higher education: ‘The Fitbit version of the learning world’, Frontiers in Psychology, 19 December, journal.frontiersin.org/article/10.3389/ fpsyg.2016.01959/full (archived at https://perma.cc/4SXM-RAXJ) Ruiz, R (2017) Facebook’s AI suicide prevention tool can save lives, but the company won’t say how it works, Mashable, 28 November, mashable.com/2017/11/28/ facebook-ai-suicide-prevention-tools/#pPNhE9_NBOqC (archived at https:// perma.cc/FD74-M5CM) Shen, G (2013) Big data, analytics and elections, Analytics, 4 February, pubsonline. informs.org/do/10.1287/LYTX.2013.01.03/full/ (archived at https://perma.cc/ DJM4-H943) Talbot, D (2016) How political candidates know if you’re neurotic, MIT Technology Review, 15 April, www.technologyreview.com/s/601214/how-political-candidatesknow-if-youre-neurotic/ (archived at https://perma.cc/R89B-5JXH) The Economist (2017) How and why Brexit triumphed, 7 January, www.economist. com/news/books-and-arts/21713821-first-books-try-explain-shock-referendumlast-june-how-and-why-brexit (archived at https://perma.cc/BA5L-3M5U) Turow, J, Delli Carpini, M X, Draper, N and Howard-Williams, R (2012) Americans roundly reject tailored political advertising at a time when political campaigns are embracing it, Annenberg School for Communication, University of Pennsylvania, graphics8.nytimes.com/packages/pdf/business/24adco.pdf (archived at https:// perma.cc/V9PF-FYVC) Willis, J E (2013) Ethics, Big Data, and analytics: A model for application, Purdue University, July, docs.lib.purdue.edu/idcpubs/1/ (archived at https://perma.cc/​ 49H6-UH5M) Woldeab, D and Brothen, T (2019) 21st Century assessment: Online proctoring, test anxiety, and student performance, International Journal of E-Learning & Distance Education/Revue Internationale Du e-Learning et La Formation à Distance, 34 (1), www.ijede.ca/index.php/jde/article/view/1106 (archived at https://perma. cc/K3HK-PD73) Young, J R (2020) Pushback is growing against automated proctoring services. But so is their use, EdSurge, 13 November, edsurge.com/news/2020-11-13-pushbackis-growing-against-automated-proctoring-services-but-so-is-their-use (archived at https://perma.cc/CX5V-W7W7) Zanfir-Fortuna, G (2016) A look at political psychological targeting, EU data protection law and the US elections, pdpEcho, 14 November, pdpecho.com/​ 2016/11/14/does-eu-data-protection-law-apply-to-the-political-profilerstargetingus-voters/ (archived at https://perma.cc/7JWP-3Q55) Zeide, E (2017) The structural consequences of Big Data-driven education, Big Data, 5 (2), 164–72

本书版权归Kogan Page所有

139

Ethics and data 05 management (including AI) What will we cover in this chapter? Whether we are processing data through advanced artificial intelligence or machine-learning processes, or if we are merely gathering and processing data to manage the delivery of goods or services in a more ‘traditional’ context, the how and why of our processing of data has an ethical dimension that can often be overlooked. Ultimately, all data processing has the potential to impact on the lives and well-being of people. It can be a direct impact, such as where data is processed about where your house is in relation to historic flood patterns that results in your premium going up or you not being able to insure your property. Or it can be an indirect impact, for example where decisions about flooding risks in an area result in changes to the built environment, which may impact on you in other ways like the redirection of a road or the erection of a flood barrier. This chapter will look at the role of ethics in data management practices, and the impact data management practices can have on how we give effect to our ethical principles in the organization. At the end of this chapter you will:

●●

●●

●●

Be able to explain, in simple terms, some of the core data management practices. Be able to explain, in simple terms how machine learning and artificial intelligence work (and why they are just another layer of data management). Be able to discuss ethical issues and questions that arise in the use and application of data management practices, including artificial intelligence.

本书版权归Kogan Page所有

140

Data Ethics

●●

●●

Be able to discuss the importance of data literacy as an enabler of ethical data management. Demonstrate an appreciation for what science fiction can teach us about the ethical conundrums we face as our use of data and artificial intelligence expands.

Introduction In the relatively short period since we wrote the first edition of this book there has been a veritable explosion of interest in the ethics of artificial intelligence. This has, to an extent, overshadowed the role of ethics in the less glamorous area of data management in general. While we have seen the world of ‘decision support systems’ evolve into what are now referred to as machine learning and artificial intelligence systems, we appear to have lost sight of the fact that all these magic boxes that increasingly seek to guide and influence our lives are ultimately built on data. And data is an asset of our organizations and our societies that we have sadly mismanaged for many years. While we are in the midst of a profound shift in how society operates, a cynic would be forgiven for thinking that the ‘shiny object’ syndrome that has surrounded the discussion of AI and the algorithmic processing of social media interactions has slightly blinded us to the fact that the ethical decisions taken in the less media-friendly facets of data management can have a profound knock-on effect on the ethical nature of the magic-box systems that are built on top of those foundations. Science fiction and popular culture present us with fictionalized images of artificial intelligence that colour the way we think about AI. Whether it is HAL9000, SkyNet or the Marvel Comic book Universe’s Ultron, or the progenitor of them all, Frankenstein’s monster, literature tells us stories about our fears when we create intelligent beings in our own image. A common trope in science fiction’s presentation of artificial intelligence is the artificial intelligence that becomes villainous in the logical fulfilment of its programming (think of Ultron acting to wipe out humanity as it is the only logical way to fulfil Tony Stark’s instruction to it to figure out how to prevent all wars). Ultimately, in these stories the true villains of the piece are the human inventors or programmers who failed to adequately assess risk, failed to control the quality or nature of the inputs, and engage in simple data

本书版权归Kogan Page所有

Ethics and data management

­ anagement practices (which we’ll discuss shortly), which might have inm creased the chance of the outcomes matching the narrative. Popular culture also does us a disservice in many respects with its depiction of data management. In part, this is due to the visual nature of the medium and the need for the narrative to progress with some pace. The trope is predictable: someone asks for some question to be asked or some fact to be ascertained and a character utters some jargon while tapping at a keyboard and magically an answer appears, conveniently in time for the next ad break. And all data they get back in response to a request or from a bad guy’s computer or phone is of perfect quality and structured in a format where they can readily load it to their own systems without fear of it failing or, even worse, dropping a ransomware payload into the good guys’ computers (unless, of course, that is the cliffhanger before the next episode). So, science fiction and popular culture have tainted somewhat the public understanding of what is possible with artificial intelligence and what really happens to make basic information systems work. While this has inspired us to dream big, it has also served to mask the unglamorous work of managing data that is needed to make those dreams a reality. And with that comes a blindness to the ethical implications of how we manage and analyse data, some of which we use to teach machines about the world and how to ­interact with it. The past five years have seen an explosion in discussion of the ethics of artificial intelligence and machine learning. However, in many respects the advances in data analytics capabilities that have fuelled the machine-­learning revolution have served to amplify and expose ethical issues relating to other applications of data and data management, as well as introducing novel areas of concern.

Introducing data management In this section we will introduce some of the key data management capabilities that have developed to help organizations tame their data and manage it. It is outside the scope of this text to go into detail on all aspects of data management. We provide a list of recommended reading at the end of this chapter. Whether you come to this book from a technical or non­-

本书版权归Kogan Page所有

141

142

Data Ethics

technical background, we would strongly recommend further reading on some of these foundational topics. Data management is defined by DAMA, a leading professional body in the field, as ‘the development, execution, and supervision of plans, policies, programs, and practices that deliver, control, protect, and enhance the value of data and information assets throughout their life cycles’ (DAMA International, 2017). As with other asset management disciplines, this requires considering managing the data asset throughout the life cycle and considering its proper handling, from planning for acquisition or creation of the data through its maintenance and use and into its disposal once its purpose is concluded. The professional discipline of data management addresses the challenges of managing data and information as an enterprise asset, to better deliver value to an organization and its stakeholders. In the second edition of the DAMA DMBOK, the ‘DMBOK Evolved Wheel’ (Figure 5.1) highlights the role of principles and ethics as a key enabler of data management and strategy. As people in data-centred disciplines realize the increasing power of the data as an asset, we have realized both the increasing need to manage data properly and effectively as an asset to increase value for the organization, and the need to ensure that data is managed and handled ethically with regard to the effects on stakeholders and society in general, with a focus on minimizing any data-related risks. Ethical issues have plagued data management since the dawn of the information age. It is important to understand that the disciplines of data management are simply tools, in the same way as the software and technologies for information management are tools. Ethical information management requires us to make conscious choices to apply these disciplines in an ethical way. The advent of mechanical computers and punch card tabulation devices at the dawn of the 20th century brought about an awareness that with the mass accumulation of data came the potential for harms to people. To help us discuss the ethical issues in data management disciplines, we will ask for help from a pioneer of data ethics in action, a gentleman called René Carmille.

本书版权归Kogan Page所有

Ethics and data management

Figure 5.1  The DAMA Evolved DMBOK Wheel

Da t

Ste w a rds hip and

n tio ica sif as cl



Plan and design

Enable and maintain

ownership •

Big data storage • Data warehousing • Master data management • Data storage and operations • Reference data management • Data integration and interoperability •



• Architecture • Modelling • Design Use and enhance

aturity assessment

icy ol

a

P

RN A GOVE ANCE DAT

• Data science • Data visualization • Data monetization • Predicitive analytics • Master data usage • Business intelligence • Document and content management

t ur

Da ta m

C ul

LIFECYCLE MANAGEMENT

n ha ec

• Data protection: privacy, security, risk management • Matadata management • Data quality management

St ra teg y



Principles and ethics



ta Da

ua tio n

ge





FOUNDATIONAL ACTIVITIES

l va

SOURCE © 2017 DAMA International

CASE STUDY  Meet René Carmille René Carmille was a French military officer, spy, civil servant and statistician. He was a pioneer of industrial management in the public sector, introducing IBM’s punch card technology to France and supporting the development of similar technology by French computing equipment company, Bull. Carmille introduced an identifier that later became the social security number for France, as well as assigning codes to geographical areas, economic activities and professions. In short, he pioneered data management in France.

本书版权归Kogan Page所有

143

144

Data Ethics

At the outbreak of the Second World War, Carmille began to centralize data of French civilians, taking a census of the working age population to identify occupations, trades, qualifications and, importantly, demobilized soldiers. He resisted calls from French government ministers to include details of people’s religion in this census, on the basis that this was a civil census and the state was secular so religion was not necessary. Subsequently however, a census of business ownership was ordered that asked business owners if they were Jewish, in question 11 of the census. Carmille’s statistical service was ordered to use its national registration number to help identify Jewish people in France. He responded by ordering his colleagues to delay responses, mishandle punch cards so they had to be resorted, and reprogramming or vandalizing punch card machines so they would not be able to process any data recorded in field 11 of the punch card. His data team spent much of their time during the Second World War using the information they had processed from the punch cards used in their first census to help find and recruit former French soldiers to the French Resistance. Sadly, Carmille himself was arrested in February 1944, just months before the D-Day landings. He died in Dachau concentration camp in January 1945. Case study questions This case study describes a pioneer of data management who realized the potential harms that could arise from the misuse or abuse of the technologies he was deploying. 1 What benefits was René Carmille trying to achieve in his adoption of

mechanical tabulation machines (aka ‘computers’)? 2 How do René Carmille’s motivations in 1930s France differ from the motives of

public servants or business leaders today when seeking to introduce new data management technologies? 3 What were the harms he saw that made him change his approach? 4 What benefits arose from his approach to managing data in an ethical way? 5 What might René Carmille’s view be of modern machine learning and

algorithms?

Introducing data governance Data governance as a function is one of the areas that will most explicitly express an organization’s ethical norms regarding data and data use, whether

本书版权归Kogan Page所有

Ethics and data management

the organization’s normative ethical framework is formally recognized and accounted for or not. In Chapter 3 we discussed the development of actionable ethical principles for data in the organization. Data governance is how we ensure that those principles are translated consistently into day-to-day data practice. John Ladley defines data governance as ‘the organisation and implementation of policies, procedures, structure, roles, and responsibilities which outline and enforce rules of engagement, decision rights, and accountabilities for the effective management of information assets’ (Ladley, 2019). Perhaps more interestingly for a discussion of data ethics, he also describes data governance as ‘a required business capability if you want to get value from your data’. So, if you want to get the right process and data outcomes for you and your stakeholders, you need data governance. We can understand this as parallel to civil government. At a civil or national level, government and laws facilitate societal enforcement of the broadly agreed ethical norms of a nation or civil body. Laws and the legal system do not determine ethics; they codify decisions made as to what behaviour should be enforced and provide a path for mediation and escalation in disputes. However, laws and legal systems are influenced by the ethics of society and the ethics of individuals (lawmakers, judges, etc). Ethical norms guide the formal decision and codification of what is considered a right action, and who has overriding rights in certain situations. We take decisions based on our ethical views, the codified laws, and any alleged infringement is decided on by an independent judiciary. Data governance is an analogous system that enables an organization to determine what is considered proper action regarding data and data processes. It enables clear definitions, decision-making rights and responsibilities, and provides an escalation path or process of mediation or remediation when people have questions or disputes as to what should be done with what data, by whom, and under which circumstances. As a tool, data governance is, in theory, ethically neutral and acts as a guiding function that facilitates appropriate decision-making and enforcement capabilities. However, data governance is grounded in the ethical principles you have defined within the organization. It must also give effect to accountability and responsibility for data-related issues, and this in turn can raise questions of appropriateness of sanctions for undesired data-related behaviours. Therefore the application of data governance in practice cannot be said to be ethically neutral. Historically, data governance initiatives have been triggered in organizations in response to legal and regulatory changes relating to information

本书版权归Kogan Page所有

145

146

Data Ethics

management. For example, the Sarbanes–Oxley Act in the United States and the General Data Protection Regulation in Europe each contain specific ­requirements for data governance. A more specific example is the establishment by Citibank of a group-wide data quality and data governance initiative following regulatory findings of enterprise-wide risk management and data governance failings, things which financial regulators now consider part of the ethic of good banking (OCC, 2020). While the implementation of data governance in any organization must be based on defined principles for data management, which may in turn be grounded on ethical principles, the actual structural practices of data governance as a tool for management and oversight are the same whether or not the organization is pursuing outcomes that society would consider ethical. In many respects, this echoes Heidegger’s discussion of the ethics of technology, which require consideration of the thinking and principles that ­underpin the use of technology. We will explore the relationship between ethics and data governance in more detail Chapter 9. For now, we will give a summary introduction to some of the core concepts of data governance so that we have a common frame of reference for those later discussions.

Key areas of focus for data governance Data governance is a key enabling capability in organizations of any size. One of the core concepts that needs to be understood and embraced is that managing information is different from managing technology. To use a metaphor that Daragh has used in training courses over the years: ●● ●●

●●

●●

Your organization is a kitchen in a fancy restaurant. Your customers expect a nice meal that tastes nice, looks nice and is at the right price. You don’t deliver that by looking only at the sharpness of your knives and the number of rings on your cooker hobs. If your ingredients aren’t right, if the menu isn’t what you are actually serving, and if your brigade of chefs and kitchen porters don’t know what they are supposed to do and when, your diners won’t care how sharp your knives are.

TV reality shows featuring cranky celebrity chefs going into struggling restaurants to turn them around can help bring this message home. While they are edited and packaged for human drama, the one thing that is constant is

本书版权归Kogan Page所有

Ethics and data management

the fundamental technologies being used are, by and large, unchanging from ­episode to episode. How the use of those technologies is managed and governed, and how the other inputs into the process of producing a meal are managed and governed, and how the overall operation of the kitchen and the production line in the kitchen is governed, that is the difference between a kitchen nightmare and a tasty meal. We also learn from those shows that a key part of an effective kitchen is a separation of duties among the kitchen staff and between the kitchen staff and the front-of-house team. This idea of a separation of duties is a fundamental concept in data governance, as illustrated in Figure 5.2. A key ­function of data governance in organizations is ensuring clarity of data definition, clarity of roles, responsibilities and accountabilities for data, and implementation of appropriate technologies and tools to support the ­delivery of data-driven projects, while ensuring that the core values and principles of the organization are being upheld. A key role of the data governance function in any organization is ensuring clarity of data definition, clarity of roles, responsibilities and accountabilities for data, and implementation of appropriate technologies and tools to support the delivery of data-driven projects. The key tasks to be performed in a data governance framework, include, but are not limited to: ●●

Culture change and change management

●●

Shifting from an IT focus to an information focus

●●

Introducing data stewardship ethos and practices

●●

●●

●●

Defining and improving the data governance operating framework for the organization Defining goals, principles and policies for data and data management in the organization The goals for data management need to be aligned with business strategy

Figure 5.2  Separation of duties – a key concept in data governance Oversight

Data governance Ensuring data is managed Ensuring the right things are being done

本书版权归Kogan Page所有

Execution

Day-to-day data management activities

Data management Using data to achieve organization goals Doing things right (in the right way)

147

148

Data Ethics ●●

●● ●●

●●

The principles being applied need to align with the organization’s values and ethos Issue management and escalation Providing the arbitration (an ‘honest broker’) when there is an internal dispute about the meaning and purpose of data Supporting the organization in engagements with external stakeholders such as regulators

Many of these tasks involve the definition of or reaction to ethical principles that are either developed internally in the organization or are imposed by external forces such as regulatory bodies or legislation. We examine this aspect later in the book.

Data stewardship A steward is a person who has a responsibility to manage the property of another person and may be held to account if that property is lost, stolen, damaged or misused. If you have ever rented an apartment or a house, you’ll have found language in your lease agreement that made you a steward of the property. You may have been required to maintain the property, or to refrain from doing things that would damage the property. You may have had to give an undertaking you wouldn’t sublet the property without permission from the landlord. Data stewardship is the term used to describe accountability and responsibility for the use of data assets in an organization. Data stewards ‘manage data assets on behalf of others and in the best interests of the organization’ (McGilvray, 2008). It can be a formal assignment or it can evolve through people organically trying to help an organization better manage its information. At the heart of the data stewardship concept is an ethical value that data is only held on trust and the processing being performed is for the benefit of someone else. This is consistent with the customer-centric ethos of quality management systems. Data stewardship and the role to be performed is often better defined by the relationship that the individual has with the information assets of the organization rather than where in the functional hierarchy of the organization they sit. Based on his experiences in strategic information transformation roles and in regulatory governance roles earlier in his career, Daragh developed the 3DC framework for the consulting business we work in (see Figure 5.3). This framework defines four categories of data steward:

本书版权归Kogan Page所有

Ethics and data management ●●

●●

●●

●●

Doers – Doers work with data on a day-to-day basis to deliver services or perform customer-facing tasks. They can be found at the front line (operational) and line management (tactical) level in the organization. Definers – Definers define the meaning and purpose of information. They exist at all levels in the organization. It is important that the strategic level view of what data means or is to be used for aligns with how staff at the coalface of the organization understand this, or compliance or quality issues can arise. Deciders – Deciders exist at the tactical and strategic management levels of the organization, from line management up to the board level. Deciders are the people who make decisions about the meaning and purpose of information and are the escalation path for decisions on policies, rules, procedures and strategy. Coordinators – Coordinators operate at all levels in the organization, acting as facilitators for data-related discussion and debate, and ensuring policies, standards and methods are communicated and understood consistently around the organization. They also act as ‘honest brokers’ resolving datarelated issues or disputes internally. Often the coordinating function is one that is mandated by legislation. In other cases, the coordinator may be someone who steps into the role voluntarily or by default.

A formalized data governance framework in the organization serves to clarify the roles, responsibilities and accountabilities of staff in the context of these governance roles. A key aspect of the 3DC framework is that it doesn’t matter where in the organization a staff member sits, it is their role and the actions they take, or should take, in relation to data that determine what their stewardship role is. It is outside the scope of this book to cover more detail on data governance. We provide some additional recommended reading at the end of this chapter.

Introducing data quality management There are many definitions of data quality management. At its simplest, data quality management is the application of proven quality management principles to the management of the quality of data and information. Data quality in this context can be defined as ‘the ability of data to be a trusted source for any or all required uses’ (McGilvray, 2008).

本书版权归Kogan Page所有

149

150

Figure 5.3  The 3DC framework Doer

Strategic

Tactical

Operational

本书版权归Kogan Page所有

Definer

Decider

Defines the business objectives and the critical things the organization needs to know about

Decide on strategic data issues such as the meaning and purpose of data and any variance in data rules across organization

Uses data in a line management context to manage staff/tasks, etc

Uses data definition and business goals to direct staff actions Interprets data on day-to-day basis

Uses data in an operational context to perform their role

Interprets instructions and processes through their understanding of data and the organization’s goals

Makes operational decisions on process or procedure changes based on their delegated authority

Coordinator

Engages across all levels and roles in the organization to ensure clear and consistent communication regarding data related issues, risks and decisions and ensuring alignment on data stewardship roles, responsibilities and accountabilities

Ethics and data management

A data quality dimension is a measurable feature or characteristic of data. These dimensions can be objective (e.g. completeness) or they can be subjective (usability, transactability, reputation) or they can be highly contextual (accuracy, accuracy against surrogate source). Organizations have to identify what dimensions are important to business processes and can also be measured. The key aspect of what is being measured is that it should be linked back to a business risk or issue. For example, if the blood group is not recorded correctly for patients in a hospital, this could result in potential treatment complications. Therefore, a hospital might require 100 per cent population of the ‘blood group’ field and an accuracy level of 100 per cent for that data. Data quality dimensions are used as inputs into data quality business rules. These rules describe how the data should be for it to be useful. They codify the expectation of quality of data and act either to prevent, detect or remedy issues when they are identified. Data profiling is the process by which data is measured against defined business rules to identify issues in the data. A profiling tool will produce a statistical analysis of the data, which can be used to inform analysts about patterns of defect in the content and structure of the data. Depending on the business rule a value may be significant or not. For example, if a data-­ profiling exercise is expected to reveal 100 per cent of all the rows in field X are null, but there are 20 per cent of the records that have values, this might indicate a problem in the data that needs to be investigated. Ultimately, all data is the product of a process that captured or created it. Data quality management applies manufacturing process paradigms to understand the causes of poor-quality data and improve the quality of output data through improvements in the processes that capture and create that data to remove the causes of error. However, studies and industry practitioner experience have identified a range of common causes for data quality problems. These include: 1 A lack of leadership and appropriate governance 2 Difficulty in justifying the required improvements 3 Inappropriate or ineffective tools to measure the value of information 4 Data entry process issues, including inconsistent processes and lack of training 5 Data processing issues, including assumptions about data sources 6 Data systems design issues, including data modelling issues 7 Issues caused by hasty fixes

本书版权归Kogan Page所有

151

152

Data Ethics

Addressing these root causes requires the right approach to be taken both technically and ethically.

Ethics in information quality The challenge here is more in relation to the ethic of quality in the organization. W Edwards Deming (1986) called on leaders in organizations to ‘adopt the new philosophy’ of quality. That is an ethical principle. Organizations that are thinking in terms of quality systems and quality approaches tend to: 1 Focus on the needs of their customers – they make sure they identify and understand them, both customers and their needs, correctly. 2 Drive out fear and encourage pride in a job well done – blaming people for errors and failures of the overall system is counterproductive. While it might be tempting to blame the person nearest the symptom, often the root cause lies elsewhere in the organization. 3 Focus on continuous improvement – by incrementally improving quality and not resting on laurels, the organization can develop a sustainable level of quality. Whether we are dealing with the quality of training data for artificial intelligence or machine-learning processes or the quality of data in customer databases, ultimately the focus needs to be on whether the data is a trusted source for the use we intend to put it to. Whether the data can be a trusted source requires us to consider the lineage and provenance of the data, the quality of the data across relevant data quality dimensions and consider how we intend to use the data. From an ethical perspective we also need to consider the impacts of those uses if the input data is defective. For example, Soapbox Labs has developed its models for speech recognition for children specifically because the corpus of models that existed and are used in a range of other products and services were designed and developed for adult voices and, as a result, were not suitable for applications aimed at children. By tackling this data quality issue, Soapbox have been able to develop tools to help support children in play and education. But to do so, Soapbox has had to consider how it manages issues of data protection and data privacy for children and has adopted a robust policy of processing data only based on consent and ensuring that models derived from such data are rebuilt on a regular basis.

本书版权归Kogan Page所有

Ethics and data management

Bias in training data for artificial intelligence processes is a critical issue in the ethics of artificial intelligence. This bias represents a data-quality problem fundamental to the accuracy and trustworthiness of algorithms. While the bias in facial recognition data is widely discussed (Hardesty, 2018), voice recognition systems also have significant gender and race biases (Bajorek, 2019). Therefore, when we consider the adoption of these types of technologies, we need to consider whether these data quality issues will have a negative impact on the objectives we are trying to achieve in our organizations. Are they a trusted source for any or all required uses? Data quality is such a fundamental issue in the successful adoption of machine learning and AI that the Data Leaders organization developed a ‘conversation starter’ tool for organizations beginning their AI journey.1 However, many of the questions posed in this simple tool are equally applicable to data quality issues affecting the ethical use of data in more traditional forms.

Introducing data modelling A data model is a critical communications tool in data management. Data modelling is the process of discovering, analysing and scoping how an organization thinks about the things that you need to manage data about so your organization can achieve its goals. In essence, it is the process of identifying the key things that the organization needs to manage information about, understanding how they are related to each other and identifying any other business rules that need to be applied. The process requires organizations to discover and document how their data fits together and drives the development of a common data vocabulary, and documents explicit knowledge about your data and your systems. It can also reveal hidden business rules and ethical assumptions that are baked into the design of the organization’s data landscape. Data models are made up of entities (things), and relationships (the highlevel interactions between conceptual entities, detailed interactions at a logical level, and constraints at a physical level). Taken together, these can form a graphical representation of the things that are being managed by the ­organization and the relationship between them. For example, in a school setting, a TEACHER is an entity, as is a STUDENT and a COURSE. The relationship between a TEACHER and a STUDENT could be resolved through the COURSE:

本书版权归Kogan Page所有

153

154

Data Ethics

Figure 5.4  An example of a logical data model Student

Course Attends

Teacher Teaches

There are different types of data models depending on from what level of perspective you are looking at the data. ●●

●●

●●

The conceptual data model – this model describes the high-level business concepts and doesn’t contain any attributes of things or identify any relationships between things. It presents a ‘big picture’ view of the things an organization needs to know about. The logical data model – this model describes the high-level business concepts, their attributes, and how they are linked together logically. At this level we begin to identify business rules that are applied in the organization for how things are related to each other, and ethical questions might arise about what links between things should be supported in the organization. The physical data model – the physical instantiation of a database in the database system. It’s the model of how the data is actually implemented in a system, including the technical metadata such as field lengths and the encoding of logical business rules into system constraints in the database.

For most business purposes, a conceptual or logical model is sufficient as it supports effective communication about data concepts. It is outside the scope of this book to provide a detailed overview of the more technical aspects of data modelling, in particular physical data modelling. We provide some recommended reading in the further reading list at the end of this chapter for anyone who wishes to learn more.

Data modelling and ethics The ethical issues in data modelling are often related to the way in which we view the world and the bias or assumptions that modellers can bring to the table, similar to the challenges of algorithmic bias in AI and analytics. These issues can arise in the most trivial of contexts, such as the humble task of recording someone’s gender in a database. They can also arise in the context of whether or not the model should be built at all.

本书版权归Kogan Page所有

Ethics and data management

Gender, and modelling for gender in databases, is one of the challenges that we set students when we are lecturing on courses. How many gender classifications are there? Is gender the same as anatomical sex? Is gender identity the same as gender? The traditional approaches of a simple ‘male/ female’ flag in your database simply might not be adequate any more. This ethical challenge in reflecting the reality of people in a data model might be complicated further where a trans person has not fully socially transitioned or is genderfluid and may be p ­ resenting as a male in the context of one set of interactions with your organization and as female in another set of interactions. The ethical values of inclusivity, respect for human dignity and confidentiality are baked into the data model because they will have been considered, or not, during the design and data definition. The other context is whether data should be gathered or processed in the first place. For example, if your organization was developing a smartphone application that tracked the driving habits of people who downloaded it and provided rewards for good driver behaviour (e.g. not interacting with the phone while driving, average speed between two points within the speed limit, etc) you might be faced with a requirement to record the origin and destination GPS coordinates for each journey taken by the users of the application, and GPS coordinates for way points on the journey every 10 minutes, to calculate the average speed correctly. Safe drivers get points, so you need to have the data calculated to calculate the points the driver gets. However, you are obtaining a significant amount of data from the smartphone app. By storing it all in the database you are creating a toolset for analysis of driving patterns that could single out individual drivers. Ethically, a data modeller might ask if this is the most efficient way to process this data and preserve the data privacy of the drivers. If the points scheme is based on average speed between two locations and evidence of the device being handled or touched during that time, it may be more appropriate to model for distance travelled and average speed to be recorded, and to ask your smartphone developers to perform the calculations on the device before transferring it to the database. A third perspective on ethical questions in data modelling is the exploration of what questions it might be possible to answer from the data that is being used to populate the model because it is now possible to make connections between facts in different ways. To extend our smartphone example slightly, if your data model allows you to associate the GPS locations of origins or destinations with addresses and details of businesses at those

本书版权归Kogan Page所有

155

156

Data Ethics

a­ ddresses, would it be possible for the data model to allow a user to identify drivers who were visiting high-street retailers and then allow that data to be sold for advertising purposes? If yes, what measures could be taken to prevent the misuse of that kind of capability in the data model? What if the location data reveals regular attendance at a place of religious worship? Is that something that ethically or legally your organization needs to know?

Introducing data warehousing and business intelligence Since the 1980s, as computing technology became available to integrate data across organizations into a single repository (aka a ‘data warehouse’) we have seen an evolution and revolution in how data is linked, cross-­ referenced, analysed and used to support organizational decision making. One of the drivers for the development of data warehousing was as a panacea for the proliferation of departmental decision support systems and reporting environments that were emerging as computing moved onto the desktop in organizations. These local ‘data islands’ were often collating the same data, albeit for different purposes, and it made logical sense to reduce the redundancy and duplication of data, improve consistency of information, and enable the organization to become more ‘data driven’. The driving premise of this evolution is the hope, as DAMA International puts it in the DMBOK, ‘that if an organization asks the right questions of its own data, it can gain insights about its products, services, and customers that enable it to make better decisions about how to fulfil its strategic objectives’. While a variety of new terms and concepts have emerged in the past few years in relation to business intelligence and interrogating data (e.g. ‘data lakehouse’ or ‘data mesh’), at their most fundamental they still reflect the core fundamental concepts of the data warehouse as described by Barry Devlin and others back in the 1980s. A data warehouse consists of two core elements: ●●

●●

A decision support database that integrates data from multiple sources both within the organization and from outside the organization. A set of software programs that collect, extract, transform and load data from these data sources into the data warehouse.

本书版权归Kogan Page所有

Ethics and data management

Other key tools for data warehousing and business intelligence include: ●●

●●

●●

●●

Metadata repositories – used to manage the technical and business metadata from various systems. Data glossary – a description of data in business terms accompanied by technical metadata, and business metadata relating to such things as access rights and allowed uses. Data and data model lineage – it is important to know where the data has come from and what transformations or changes to the data may have occurred when moving from source to destination. Likewise, if data models are being changed or updated, it is important to understand the history of such changes. Data integration tools – software that supports the execution of data quality functions, defect resolution, and escalation of issues within the extract, transform and load processes of the data warehouse.

Modern reporting tools have placed significant power on the desktop or tablet devices of business and IT professionals in organizations, combined with powerful statistical tools and data visualization capabilities. This means that the governance and oversight of how data will be combined and reported on needs to evolve in tandem with the democratization of data access in the organization to ‘data citizens’. In its consulting work, Castlebridge applies an ethical data life cycle divided into three distinct phases, as illustrated in Figure 4.1 in this book. Each phase can give rise to different issues and challenges from a compliance, governance or ethics perspective. ●●

●●

Acquisition – this describes the processes by which data is obtained or created by the organization and populated into the Data Warehouse environment. The methods and approaches used to obtain data or process data during this phase can impact on the quality of the data, the compliance of processing with relevant laws (e.g. data privacy laws), and could raise ethical questions. Analysis – this describes the processes by which the data is being analysed and interrogated. There is an old joke among statisticians that if you torture data long enough it will give you the answers you want. This highlights one of the potential ethical hazards in analysis. Other issues in the analysis phase that might arise can include the knowledge and ability

本书版权归Kogan Page所有

157

158

Data Ethics

of staff to use the data they have access to in a manner that is compatible with relevant laws or standards. This is particularly true in the context of self-service Business Intelligence. ●●

Action – this describes the action that is to be taken based on the analysis outputs. Depending on the action to be taken, and the methods applied to taking that action, ethical or other issues may arise. For example, if you were to automatically fire the lowest performing members of staff in your organization based on a performance report, with no human review or intervention, that could raise ethical issues or issues of legal liability in some jurisdictions.

Ethical issues in data warehousing and business intelligence In general, one of the key ethical challenges in data warehousing and business intelligence is the definition of and embedding of a culture of ethical analytics, particularly in the context of data privacy issues and risks, but also in the context of data being used for new and unforeseen analytics purposes. The types of issues that can arise often fall into the ‘just because we can, does it mean we should?’ category of ethical dilemmas and can relate to questions such as the sourcing of data from third parties, the inference of data from other data as part of the standardization of data or analysis of data, or questions over the management of access to data in the data warehouse, particularly where the organization has deployed self-service analytics capabilities.

Big Data, AI and machine learning Business intelligence tends to be retrospective, telling us what has happened through historic reporting. The promise of data science, machine learning and artificial intelligence is that with sufficient data we will be able to predict what is going to happen. Data science has evolved from the historic disciplines of applied statistics. It deals with the capability to analyse and explore data patterns quickly and effectively. Where traditional business intelligence is retrospective in its focus, data science tries to infer future ­behaviours and outcomes based on historical patterns.

本书版权归Kogan Page所有

Ethics and data management

Modern data technologies allow for the collection and analysis of much larger data sets, allowing data science to evolve from its statistical roots and integrate disciplines from pattern recognition, artificial intelligence, machine learning, data visualization and more, to find new ways to analyse and extract value from data that is both retrospective (what has happened) and predictive (based on what happened, what will happen next). ‘Big data’ is a label applied to data sets that are large (volume), or have a wide range of variety (for example, structured and unstructured data, audio, video, documents, etc), or have velocity (are produced at speed). This large, varied, and rapidly changing data environment requires the tools and techniques of data science to enable the data to be analysed and meaning inferred. It is not surprising that many of the initial tools for big data emerged from the large internet companies such as Google, where they were used to help process the vast amounts of data generated from searches and from text analysis from people using services like Gmail. The term ‘artificial intelligence’ is applied when a machine appears to mimic the cognitive functions that humans normally associate with human minds. Examples of functions that AI has historically performed include optical character recognition, speech recognition, and pattern analysis in large and complex data sets. For example, internet search engines are an example of an AI system that analyses and indexes online content as well as search queries input by people, to helpfully predict what you might be searching for and to return content indexed and sorted by its likely relevance to the search terms you have typed in. In recent years we have witnessed significant evolution of AI in technologies such as self-driving cars and self-navigating drones, voice assistant technology and gaming technologies. Increasingly artificial intelligence systems are being developed and deployed in areas where, historically, humans would have been deployed to conduct research and analysis, such as stock market trading (intelligent trading algorithms) and in law firms (electronic discovery, analysis of legal precedents, intelligent case management systems, etc). Of course, the promise of these technologies depends greatly on the ability of the organization to manage the data inputs and outputs from these systems. This has created a renewed focus on the effective governance and control of data. The management of the metadata associated with the various data sources, transformations, linkages and business rules applied to the data is an essential element of this.

本书版权归Kogan Page所有

159

160

Data Ethics

Some of the technologies and tools in this context are: ●●

Machine learning – this is at the core of the advances in artificial intelligence and is concerned with the construction and study of learning algorithms. These fall into three main categories: {{ {{

{{

●●

●●

●●

●●

unsupervised methods that rely on pattern recognition and identification; supervised (general rules-based) learning methods based on generalized rules and statistical and mathematical modelling techniques; reinforcement learning strategies, which are goal-based learning strategies driven by the algorithm achieving a defined goal, such as winning a game or some other defined task.

Sentiment analysis – this uses technologies such as natural language processing or semantic analysis methods to understand what people are saying or writing, and to infer sentiment from that content (e.g. whether you like or dislike a particular brand of washing powder, based on your Twitter activity). Sentiment analysis can also be linked to machine learning to identify changes in sentiment and infer the next action that might be taken or trigger an appropriate automated response. Data and text mining – this aspect of data science looks for patterns in data, and is effectively a form of unsupervised machine learning. These techniques are used to find hidden or unknown relationships between data by identifying patterns. Predictive analytics – an application of supervised machine learning in which the data elements are modelled, and future outcomes are predicted based on the probability of that thing occurring, based on all the data in the model data. Predictive analytics methods are often used in areas such as share trading, where a predictive model triggers a share trade based on a reaction to an input variable when compared to the historic model. For example, if there are hailstorms in an area that grows sunflowers, the model may trigger the sale of sunflower oil company shares as there will be a drop in profits due to the increased cost of the input materials (sunflowers), as the harvest of sunflowers has reduced after hailstorms in the past. Prescriptive analytics – this is another application of supervised learning that goes beyond simply predicting outcomes, to infer what actions might trigger what outcome. It is used in advanced decision support and risk management scenarios as it can identify what will happen and infers or

本书版权归Kogan Page所有

Ethics and data management

implies why it will happen, highlighting the impacts of various options that might exist to avoid risk or seize opportunity. ●●

Unstructured data analytics – unstructured analytics uses a range of unsupervised learning approaches to analyse and codify information held in ‘unstructured’ forms such as electronic documents, images, video, etc. It commonly focuses on the inference of metadata tagging to link the unstructured data to structured data sets in the data warehouse.

Operational analytics applies predictive, prescriptive, and other machinelearning approaches to the live operational data streams of the organization. Examples of operational analytics include things like surge pricing in ridesharing services, real-time upselling and cross-selling of products on Amazon, or in financial trading. Data visualization is the process by which we interpret concepts and data by using pictures or graphical representations. It can be as simple as a chart or a graph, or as complicated as a colour-coded visualization of data. The three key phases of the ethical data life cycle also apply to artificial intelligence and machine-learning applications. As before, we can encounter a range of issues from a compliance, ethics, technology or quality perspective. ●●

●●

Acquisition – in addition to the actual obtaining of data, as we discussed in the context of data warehousing, a data science context needs to add the development of training data sets and the development of the business rule cascades that are applied in machine-learning/deep-learning contexts to this acquisition phase. In short, in addition to understanding how the data that is to be analysed has been obtained, it is necessary to understand how the rules and inferences that are being applied to the data through the various algorithms you might apply have been created as well. How this is approached can have significant implications for the results of analysis based on those algorithms. Only by understanding this can you ensure you are identifying and controlling for algorithmic biases that might lead to unexpected or unethical outcomes. Analysis – this describes the application of the analytics processes and algorithms to the testing of hypotheses in the data. This is the essence of the scientific method that data scientists should be applying. In our experience, a key element of the analysis phase in a data science/big data context needs to be the constant tuning and enhancing of the algorithms and associated processes based on the outcomes of the various hypothesis

本书版权归Kogan Page所有

161

162

Data Ethics

tests that are performed. For example, an algorithm to detect faces in a video may need to have its learning cascade and algorithms enhanced to take account of a child’s face or bright lights or fast movement that might not have been in earlier data sets analysed. ●●

Action – as before, this describes the action that is to be taken based on the analysis outputs. The action taken may simply be to blur a face in a video, or it may be to provide fashion suggestions in a beauty app on a smartphone. Ethical issues arise in respect of the action that is to be taken based on the analysis. There may be legal liability issues, or commercial impacts on your organization. If the action taken as a result of your analysis is a data visualization, perhaps considering how that is presented and considering the accessibility issues that arise when relying on visual representations of data would be important from a quality and ethics perspective.

Ethical issues in Big Data, machine learning, and artificial intelligence For the purpose of considering the ethical issues associated with big data, machine learning and AI, we will crudely consider them under the collective term of artificial intelligence as, in general, they are all used to support decision making or action taking either by making recommendations to a human or taking actions based on decision parameters that have been set when seeding the decision trees in an AI process. What issues arise for systems that are used to support decision making and other functions in the real world? Increasingly we are seeing the impacts of, and thankfully increasing awareness of, algorithmic bias. Just as with people, AI systems are often a product of the mental models that their parents give them. The cultural biases of those who define the seed rules and coding for a self-learning system can lead to that system repeating those biases in its processing of information and making of decisions, just like a data model can inherit the biases of the modellers. This has led to situations where, for instance, sentencing support systems give harsher sentences to ethnic minorities, insurance risk scoring scores people of particular ethnicity as higher risk than their neighbours, internet searches displayed to ethnic minorities disproportionately turn up results for predatory loan companies, for-profit colleges and low-paying job options, and many other situations which invisibly reinforce biased systems. These situations require proactive decisions to address ­systemic ethical impacts.

本书版权归Kogan Page所有

Ethics and data management

The ethical question of training data sets One ethical problem raised by the use of machine learning and big data for decision making, is that bias introduced into the algorithm or through the data is invisible to us. While you may know that Carl’s opinion on which restaurant in the area is best is coloured by the fact that he doesn’t like Mexican food, you don’t expect an algorithmic sentiment analysis to automatically rate Mexican restaurants lower than other reviewed restaurants because it takes in a corpus of online comments in which the word ‘Mexican’ is frequently collocated with the word ‘illegal’ in derogatory comments about immigrants. Unfortunately, this is an actual observed effect (Speer, 2017). Numbers do not have the fuzzy values and built-in bias of language. But, when the numbers are based on pattern recognition of models built by ­language and the data set used for training machines to recognize patterns is modelled on a system that has unequal outcomes, the result will be ­computational decision making that is inherently biased. This invisibility is compounded by trade secrecy. Companies often consider their algorithms to be trade secrets, so what goes into the decision-making process and how results are derived remains secret even to those with the expertise to examine the source code. These biases might be intentional, but far more often they are unintended and accidental. Models cannot replicate every single variable in the world, so the decisions you make on what is important or relevant for a decision will impact the output. Often a researcher or developer has simply made assumptions in their initial model based on their personal experiences and social points of reference. Even in commercial applications, this unintended bias can arise with impacts on the usefulness and usability of the underlying systems (Wong, 2020). The recent deployment and then withdrawal by Meta of its Galactica system (Greene, 2022), an AI language model that was touted as being able to generate research papers on a range of topics with the aim of helping scientific research, echoes the debacle of Microsoft’s Tay (Vincent, 2016) almost a decade ago and highlights the limitations of AI systems. Where Tay learned how to converse online by studying online discourse and was ultimately terminated for becoming an offensive troll (perhaps a prescient AI in hindsight), Galactica produced output that was coherent but demonstrably wrong – in short, a data-quality problem as the outputs cannot be a trusted source. In a world plagued by misinformation, the automated creation of information that is plausible but utterly wrong represents a significant e­ thical risk as it feeds back into the reinforcement loops that drive social discourse

本书版权归Kogan Page所有

163

164

Data Ethics

and debate. This has not deterred others such as OpenAI’s ChatGPT or Google’s Bard from promoting the promise of LLMs, with similar issues of quality reliability and unintended consequences. The ethical issues that arise raise the need for effective controls. Identifying and countering potentially harmful ethical biases requires a rigorous quality control system and deep understanding of why one cannot simply ‘debias a dataset’. This involves not only checking the output to see whether it matches expectation, but critical self-reflection and ‘red teaming’ or having someone search for your assumptions or blind spots. This issue of algorithmic bias has led to calls for algorithmic transparency, which are increasingly being heeded by legislators, such as in the EU’s proposed AI Regulation (European Commission, 2021), which introduces a number of transparency obligations for AI that interacts with humans, detects emotions or associates people with social categories based on biometric data, or generates or ­manipulates content. There is also the question of how data sets are trained, which can raise many ethical concerns. Many AI systems are ultimately powered by the labour of millions of workers recruited from impoverished communities and paid a pittance for their labour through the ‘gig economy’. Other systems, such as content moderation on social media, rely on humans to review horrific content, often on low wages, precarious contracts and often with limited supports for their well-being.

The role of data literacy and data acumen in data ethics ‘Data literacy’ is a term that has gained much traction since the first edition of this book was published. However, as with many things in data management, it does not have a singular definition and can encompass everything from being able to understand statistics when they are presented or misrepresented in the media to being able to use data management tools and technology, to understanding the meaning and purpose for processing data in the first place. The concept is also often conflated with ‘digital literacy’ (the ­ability to navigate online and understand and interrogate online data and information) and media literacy (the ability to use, understand and create media in variety of contexts). It is also too often confused with an ability to code or to use information technology or information management tools. The ODI in the UK defines data literacy as ‘the ability to think critically about data in different contexts and examine the impact of different approaches when collecting, using and sharing data and information’ (ODI, 2022).

本书版权归Kogan Page所有

Ethics and data management

While there are many other excellent definitions of data literacy from academia and from industry, for the purposes of this book we will focus on the definition developed by Daragh in his work with clients in Castlebridge: Data literacy is the measure of the ability of an individual to understand the meaning and purpose of data in context so that they can be enabled to perform immediate job functions and to extrapolate and correlate knowledge about data in new contexts and unforeseen/novel situations, including being able to consider the practical risks and ethical implications of their actions and the actions taken by the organization.

For organizations to implement effective ethical data management practices, it is essential that staff working with and managing data have a fundamental level of understanding of how issues like the quality of data can affect the outcomes of analytics processes and the actions taken by the organization. In the context of their role, individuals should have sufficient understanding of how their organization has defined data concepts and how they relate to each other (data modelling). It would include understanding that artificial intelligence is not a magic box that can automatically fix problems, but requires training data and input from humans, often low-paid humans, to become proficient in complex tasks. We need critical understanding of the limitations of AI to help counter the halo effect that can arise when large organizations staffed by apparent experts release technologies that produce information that may not be a trusted source for any or all required uses. We do not require all staff to become experts in all things, but we do need to ensure that there is sufficient understanding of data and data management concepts in the organization that ethical issues can be discussed and decided on in an appropriate way.

The ethical question of data-enabled actions Whether it is the use of AI to enable autonomous weapons systems, or improve the targeting capability of drones in order to reduce the risk of harm to civilians in a war zone, or the enhanced ability of a gaming company to better target its advertising and promotions to people who are more likely to spend money with it (i.e., problem gamblers), data management professionals will face ethical choices about how their skills and capabilities will contribute to the benefit of society. These choices may not always be obvious at

本书版权归Kogan Page所有

165

166

Data Ethics

first, but we need to be alert to the potential for misuse, abuse or careless use of data in a way that could harm individuals or society at large. For example, recent years have also brought scrutiny on the use of machine learning to set performance targets for delivery drivers and others, often resulting in an actual degradation of customer service or injury to drivers or others. Likewise, in a world plagued by misinformation, data professionals have a duty to ­ensure that data and information produced can be a trusted source. Data and how it is used can define the society we live in just as much as it can describe it.

CASE STUDY  The return of René Carmille René Carmille implemented ethical data principles to underpin his data governance approach from the early stages of the adoption of tabulation machines and punch card readers. He resisted the inclusion of questions about religion on the basis that the French Republic was a secular state and, therefore, had no need to know that information about people. After the census of business ownership began to collate data about Jewish business owners, he took action to bog the process down and to prevent data being processed in bulk. He also took actions focused on reducing the quality of data (completeness, timeliness) by preventing certain data being read by the punch card machines. By degrading the quality of data, he prevented that data being used to harm people. Carmille also recognized the risk of associating data about businesses and their ownership (the census of business ownership) with individuals and their families. Looked at through the lens of modern data management terminology, René Carmille adopted new technologies to improve the efficiency and effectiveness of data processing, in the same way that organizations today embrace data warehousing, business intelligence tools and machine learning. However, he understood the data modelling implications of linking businesses to people if the ownership of the business was in turn linked to religion. While Carmille might not have referred to this as a ‘data modelling’ issue, he understood the potential for harm if data could be linked in this way in a data model. He therefore set about undermining the quality of the data, while at the same time weaponizing data governance processes to slow down the collation of data that would lead to harm to people.

本书版权归Kogan Page所有

Ethics and data management

He understood the meaning and purpose of data in context and realized the practical and ethical implications of action or inaction in the face of a threat to the lives of innocent people. Case study questions 1 What can today’s data management professional learn from the story of René

Carmille? 2 You are working for an organization that seeks high quality accurate data

about its customers so it can better target advertising to them. Is this goal ethical? What if the organization is selling gambling services or is targeting pornographic content to impressionable teenagers? 3 Can you think of other circumstances where choices about quality of data or

investing in improving the quality of the data have an ethical implication?

Chapter summary In this chapter: ●●

●●

●●

We discussed the history of René Carmille and the French Resistance as a case study in data ethics. We introduced information management disciplines and some of the ethical questions and impacts faced by data practitioners working in these disciplines. We discussed the role data literacy has to play in data ethics.

Note 1 To take the Data Quality and Machine Learning Readiness Test, visit https:// dataleaders.org/tools/data-quality-machine-learning-readiness-test/ (archived at https://perma.cc/S58F-HQB9)

本书版权归Kogan Page所有

167

168

Data Ethics

Further reading Data management Bergstrom, C and West, J (2021) Calling Bullshit: The art of scepticism in a datadriven world, Penguin Random House Castlebridge (2021) Data Literacy and Data Competencies, webinar, 30 November, castlebridge.ie/webinars/data-literacy-data-competencies/ (archived at https:// perma.cc/V2AC-946G) Data Leadership Lessons, Data Literacy with John Ladley, episode 35, Data Leadership Lessons Podcast, 12 April 2021, youtube.com/watch?v=​wGOGf6mSnLM (archived at https://perma.cc/JV6X-Q5F4) Gebru, T, Morgenstern, J, Vecchione, B, Vaughan, J W, Wallach, H, Daumé III, H and Crawford, K (2021) Datasheets for Datasets (arXiv:1803.09010), arXiv, https://doi. org/10.48550/arXiv.1803.09010 (archived at https://perma.cc/8YR4-FVFZ) McGilvray, D (2021) Executing Data Quality Projects: Ten steps to quality data and trusted information, 2nd edn, Academic Press, London O’Keefe, K (2020) What do we mean when we talk about ‘data literacy’? Castlebridge, 10 September, castlebridge.ie/insights/what-do-we-mean-when-we-talk-aboutdata-literacy/ (archived at https://perma.cc/8Z9Q-JMAR) Sebastian-Coleman, L (2018) Navigating the Labyrinth: An executive guide to data management, Technics Publications, Basking Ridge, NJ Simsion, G and Witt, G (2004) Data Modeling Essentials, 3rd edn, Morgan Kaufmann, San Francisco, CA

Ethical issues Article 19 (2016) Algorithms and automated decision-making in the context of crime prevention: a briefing paper, Article 19 – Free Word Centre, London, article19.org/data/files/medialibrary/38579/Algorithms-and-AutomatedDecision-Making-in-the-Context-of-Crime-Prevention-Final.pdf (archived at https://perma.cc/H7BS-68VF) Bender, E M, Gebru, T, McMillan-Major, A and Shmitchell, S (2021) On the Dangers of Stochastic Parrots: Can Language Models Be Too Big?, Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, FAccT ’21, pp 610–23 in Association for Computing Machinery, New York Davies, J (2016) Program good ethics into artificial intelligence, Nature, 538 (7625), 291 Deng, B (2015) Machine ethics: The robot’s dilemma, Nature, 523 (7558), 24–6

本书版权归Kogan Page所有

Ethics and data management Doctorow, C (2017) Algorithmic decision-making: An arms-race between entropy, programmers and referees’ Boing Boing, 1 June, boingboing.net/2017/06/01/ adversarial-computing.html (archived at https://perma.cc/PJ77-J6AT) Earley, S, Henderson, D. and Sebastian-Coleman, L (eds) (2017) The DAMA Guide to the Data Management Body of Knowledge (DAMA-DM BOK), Technics Publications, LLC, Bradley Beach, NJ Etzioni, A and Etzioni, O (2017) Incorporating ethics into artificial intelligence, The Journal of Ethics, 21, 403–18 O Brien, D (2022) ChatGPT and the Enshittening of Knowledge, Castlebridge, 26 January 2023 https://castlebridge.ie/insights/llms-and-the-enshittening-of-knowledge/ (archived at https://perma.cc/Y5XF-HBYE) O’Neil, C (2016) Weapons of Math Destruction: How big data increases inequality and threatens democracy, Crown Publishing, New York

References Bajorek, J P (2019) Voice recognition still has significant race and gender biases, Harvard Business Review, 10 May, h br.org/2019/05/voice-recognition-still-hassignificant-race-and-gender-biases (archived at https://perma.cc/Y9P2-7SN4) DAMA International (2017) DAMA DMBOK: Data Management Body of Knowledge, 2nd edn, Technics Publications, Basking Ridge, NJ Deming, W E (1986) Out of the Crisis, MIT Press, Boston, MA European Commission (2021) Proposal for a regulation of the European Parliament and of the Council laying down harmonised rules on artificial intelligence (Artificial Intelligence Act) and amending certain Union legislative acts, 21 April, eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:52021PC0206&f rom=EN (archived at https://perma.cc/Y588-HKAR) Greene, T (2022) Meta takes new AI system offline because Twitter users are mean, TNW, 19 November, thenextweb.com/news/meta-takes-new-ai-system-offlinebecause-twitter-users-mean (archived at https://perma.cc/WF23-KTYA) Hardesty, L (2018) Study finds gender and skin-type bias in commercial artificial-intelligence systems, MIT News, 11 February, news.mit.edu/2018/studyfinds-gender-skin-​type-bias-artificial-intelligence-systems-0212 (archived at https://perma.cc/AN49-T367) Ladley, J (2019) Data Governance: How to design, deploy, and sustain an effective data governance program, 2nd edn, Academic Press, London McGilvray, D (2008) Executing Data Quality Projects: Ten steps to quality data and trusted information, Morgan Kaufmann, Burlington, MA OCC (2020) OCC assesses $400 million civil money penalty against Citibank, 7 October, occ.gov/news-issuances/news-releases/2020/nr-occ-2020-132.html (archived at https://perma.cc/J56K-Z3JS)

本书版权归Kogan Page所有

169

170

Data Ethics ODI (2022) Data literacy and the UK government, 12 April, theodi.org/article/dataliteracy-and-the-uk-government-report/ (archived at https://perma.cc/67BQBB3H) Speer, R (2017) ConceptNet Numberbatch 17.04: better, less-stereotyped word vectors, ConceptNet blog, 24 April, blog.conceptnet.io/posts/2017/conceptnet-­ numberbatch-17-04-better-less-stereotyped-word-vectors/ (archived at https:// perma.cc/W97P-5XJV) Vincent, J (2016) Twitter taught Microsoft’s AI chatbot to be a racist asshole in less than a day, The Verge, 24 March, www.theverge.com/2016/3/24/11297050/taymicrosoft-chatbot-racist (archived at https://perma.cc/C5SR-ABQR) Wong, H (2020) Siri, Alexa and unconscious bias: The case for designing fairer AI assistants, Design Week, 17 January, www.designweek.co.uk/issues/13-19-­january2020/`-ai-voice-assistants/ (archived at https://perma.cc/9SL2-R6MA)

本书版权归Kogan Page所有

171

Developing an 06 ethical architecture for information management What will we cover in this chapter? In this chapter, we will look at how the Zachman Framework for Enterprise Architecture, as an ontology of artefacts and different levels of perspective on information management, can help address some of the key challenges we face when trying to put ethical concepts into operation in an information management context.

By the end of this chapter you will understand: ●● ●●

●●

●●

Fundamental concepts underpinning the Zachman Framework. The importance of the ontology to defining, assessing and understanding the impact of ethical principles for information management. The importance of an ontological approach to information management and information ethics. The importance of an architectural approach to information ethics to ensure ethical issues and risks posed by processing activities are identified and mitigated in the design of processing activities and technology implementations.

本书版权归Kogan Page所有

172

Data Ethics

Data ethics and information architecture – what is the connection? One of the common complaints we see surrounding ethics in data management is that the challenges that are raised are often complex and require, or are initiated by, changes in organizations, technical capability, or in society’s expectations. People and organizations struggle at times to deal with complexity and change. Understanding and assessing the impact of a change on an already complex network of data management systems and capabilities can be difficult for us. As John Zachman (1996) puts it: ‘A quick review of the history of all the known disciplines that deal with complex objects (things) reveals that change starts with the engineering descriptions of the things.’ What organizations often lack as part of their information strategy or information architecture is a formal description of what the ethics of the organization are and how they cascade through the different representations and perspectives on the information systems and processes that the people in the organization work with. An architectural approach is one proven approach to doing this in a structured way. The Zachman Framework is described by John Zachman as an ontology. From a philosophical perspective, ontology is the branch of philosophy that deals with the nature of existence and being, and the ultimate substance of things. Who we are, how we relate to each other and our surrounding environment is at the heart of the philosophical study of ontology. In an information architecture context, an ontological approach deals with the nature of the enterprise as expressed in its information strategy and systems. Part of the discussion of how you, and your organization, relate to others and to your environment is the ethical model that you are applying to that conduct. Therefore, an ontological approach to managing information in the enterprise must include explicit consideration of the moral and ethical models that are to be applied as part of the management of information in that organization. Logicians understand the term ‘ontology’ slightly differently. They define an ontology as the set of entities that are presupposed by a particular theory about being or reality. What are the things that need to be considered? How are they related to each other in the context of this theoretical model that has been constructed to describe the reality that is being addressed? This provides a mental map that allows for rational discussion of concepts using

本书版权归Kogan Page所有

Developing an ethical architecture

agreed-upon terms. As with the philosophical perspective though, an information architecture needs to define a set of ‘things’ that are being described in the context of a framework for that architecture. Part of that set of things that need to be described and related to other parts of your information architecture are the ethical concepts and precepts that need to be described, understood and applied at each level of perspective you are dealing with. Zachman uses the term ‘ontology’ correctly in its logical sense when he describes his framework for information a­rchitecture as an ontology. Of course, this can lead to confusion in an information management context and AI context as the term ‘ontology’ has become used in an information science context to mean the structuring of knowledge about things by subcategorizing based on identified attributes or essential qualities. From a philosophical and wider library science perspective, that more closely aligns with the definition of a taxonomy than an o ­ ntology. This confusion has led to some criticism of the Zachman Framework for not being complete enough in its description of the framework to constitute an ontology. One of the main reasons cited is that there is no description of how the basic concepts outlined in the Zachman Framework can be broken down into their composite objects. However, it is worth noting that one of the pioneers of the use of the term ‘ontology’ in knowledge sharing and AI clearly states that his use of the term ‘is certainly a different sense of the word than its use in philosophy’ (Gruber, 1992). According to Gruber (2016), ‘ontology is a technical term denoting an artifact that is designed for a purpose, which is to enable the modeling of knowledge about some domain, real or imagined’. The Zachman Framework is ­designed to model knowledge about the universe of enterprise architecture components and provide a framework within which more detailed models can be developed at each level of perspective within each communicative interrogative domain. Rather than being prescriptive of how to break out the composite objects within each level of the framework, the Zachman Framework identifies a set of things that will need to be defined and described in more detail. It then provides a conceptual relationship across the categories of things (the different levels of perspective) that indicate that they need to be considered together at that level, and within the different domains of things down the different levels of perspective, indicating that the actual instantiation of things that describe the concepts at that level in the architecture are linked thematically to one of the key interrogative questions (see Figure 6.1). While many other approaches to defining information architecture exist, and while there are many ontological frameworks for breaking out in more

本书版权归Kogan Page所有

173

174

Data Ethics

detail many of the primitive artefacts identified by the Zachman Framework, it is the philosophical perspective on ontologies in the Zachman Framework rather than the more recent information science perspective that makes it particularly useful as a framework for figuring out how to define and instantiate an architectural model for ethics in information management. The problems we face are complex, and arise in an era of unprecedented change in information management capability and the potential impact of information and how it is used, or abused, on individuals, communities and society as a whole.

Zachman and the allegory of the cave One of the challenges we all face in changing how we think about information management and information ethics is that very often you will perceive your portion of the information architecture from the perspective of your professional discipline or background. This can lead to confusion and miscommunication about what is really being discussed. Ironically, the discussion of whether the Zachman Framework is an ontology or not is actually a good example of this. This brings to mind the ‘allegory of the cave’ (Plato, 2017) in which Plato describes Socrates discussing the effect of education on the nature and behaviour of people. In this story, Socrates describes a group of people who have lived chained to the wall of cave, facing the wall. They see shadows on the wall from objects that are passed in front of a fire that is behind them and they give names to these shadows based on their field of perception. Socrates argued that a philosopher was one of these prisoners who had simply broken free of his chains and understands the shadows on the wall as being just one representation of reality rather than reality itself. In an information management context, our chains are often the professional disciplines or functions we are performing and the bodies of knowledge or methodologies associated with those functions, and the biases that we bring to the discussion from those perspectives. In the absence of a means of expanding our perspective, a data modeller will consider things through the perspective of data modelling, a process architect will perceive things from the perspective of process modelling and execution, and a data scientist will perceive things through the lens of data science methodologies and practices. The Zachman Framework provides an ontological representation of the world outside our respective ‘caves’, all of which may have their own ontological and taxonomical models for the disciplines and activities that

本书版权归Kogan Page所有

Figure 6.1  The Zachman Framework (simplified) Data

Action

Location

Actor

Event

Motivation

Executive

Inventory identification

Process identification

Distribution identification

Responsibility identification

Timing identification

Motivation identification

Scope and context

Business manager

Inventory definition

Process definition

Distribution definition

Responsibility definition

Timing definition

Motivation definition

Business concepts

Architect

Inventory representation

Process representation

Distribution representation

Responsibility representation

Timing representation

Motivation representation

System logic

Engineer

Inventory specification

Process specification

Distribution specification

Responsibility specification

Timing specification

Motivation specification

Technology physics

Technician

Inventory configuration

Process configuration

Distribution configuration

Responsibility configuration

Timing configuration

Motivation configuration

Tool components

Enterprise

Inventory instantiation

Process instantiation

Distribution instantiation

Responsibility instantiation

Timing instantiation

Motivation instantiation

Enterprise

SOURCE Adapted from John Zachman with permission

175

本书版权归Kogan Page所有

176

Data Ethics

are undertaken at different levels of detail in that domain. It provides an ontological construct to recognize the horizontal dependencies of the different disciplines that need to be aligned in an effective enterprise information architecture. In Plato’s recounting of Socrates’ fable, the prisoner who escapes their chains has to learn to adapt their perception of things, at first turning away from the bright lights outside the cave, but ultimately being able to look at the sun itself. It’s only when they can look at the sun that they can begin to think about what it is and how it relates to their experience. In the context of ethical information management, the ‘sun’ is our motivation for gathering and processing data in the first place. Zachman provides an ontological model within which the motivation and reasons for processing can be linked, through the communicative interrogatives and the different perspectives of information management in the organization, to specific categories of ‘thing’ that need to be created and managed in the organization to ensure that ethical considerations are applied appropriately.1

Ethics in the Zachman Framework Zachman defines ‘architecture’ as ‘the set of design artifacts, or descriptive representations, that are relevant for describing an object such that it can be produced to requirements (quality) as well as maintained over the period of its useful life (change)’ (Zachman, 1996). The Zachman Framework is a six-by-six matrix that maps the interrogatives (what, how, where, who, when and why) to different levels of perspective in the organization. The intersection of these interrogatives (row) and the perspectives (column) represents a unique category of design artefact. Each artefact represents how the specific perspective answers the fundamental question in that context (DAMA International, 2017). For certain types of design artefact, there may be a hierarchical relationship of components of that object, which may have architectural models that define how those elements are assembled. These still need to fit within the overall enterprise architecture. The job of the architect, according to Zachman (1996), is to ‘be meticulous to ensure that every sub-part is architected to fit within the superpart’, so that they can be sure to avoid ‘semantic discontinuities, network anomalies, or rule inconsistencies’ across the enterprise as a whole. Ethical models for organizations are no different in this regard to any other form of model. They can have a hierarchical or ontological a­ rchitecture

本书版权归Kogan Page所有

Developing an ethical architecture

of their own that translates general precepts and principles of ethics into more granular representations of those precepts or principles. And at different levels of perspective the way in which that ethic is expressed may differ. But where in the framework would ethics sit? Do we need to define another column in the ontology to reflect ethics as a type of thing that needs to be understood and managed? Thankfully we do not. For a model that was ­defined long before the current discussion of ethics in information management, the Zachman Framework has already defined a communicative interrogative that can capture the questions of ethics, and which Zachman (1996) recognizes as being impacted by issues of granularity in the modelling of responses – the ‘Why’. Zachman originally defined the ‘Why’ column of the framework to address the goals, strategies and means of the organization (DAMA International, 2017). Writing in 1997, David Hay described this column as concerning ‘the translation of business goals and strategies into specific ends and means’ (Hay, 1997). Hay goes on to say in that article that this ‘can be expanded to include the entire set of constraints that apply to an enterprise’s efforts’. Ethics are just another form of constraint that would apply to the efforts of the enterprise. As such, the concept of the ethical information architecture sits within the ‘Why’ column as both a positive interrogative (‘Why are we doing these things?’) and as a negative interrogative (‘Why are we not doing these things?’). The answers to these questions need to be cascaded and reflected in the different perspective rows of the framework and will influence and impact on the design of artefacts elsewhere in that row. Of course, the potential scope of ethical principles and precepts that might need to be considered in the ‘Executive’ perspective (Row 1) is immense. In this context, it is important to consider what we mean by the ‘enterprise’ and what its boundaries are. Zachman identifies a key characteristic of the boundary of an enterprise as being the point at which the organization operates as a stand-alone, self-contained unit. The ‘enterprise’ would be defined by the business functions and assets, integrated in support of a common mission or objectives. This raises an architectural issue, however, when we are considering ethical issues as there will be ethics that are the ‘ethic of society’ and ethics that are the ‘ethic of the organization’. There will even be ‘ethics of the individual’. We have referenced this before and will examine it in more detail in Chapter 9. For now, we will confine ourselves to accepting that there are ethics and ethical perspectives that are external to the organization (the ‘ethics of society’) and those that are internal

本书版权归Kogan Page所有

177

178

Data Ethics

to the organization (‘the ethics of the organization’). The ones you need to architect for are the ethics of the organization. However, as these principles may evolve as society’s ethic evolves, you need to be able to support both the complexity of ethics and the potential for change in your approach. When we start thinking about how ethics can be implemented in an architectural construct, we very quickly find ourselves having to think about how ethics translates into action in the context of the different perspective levels that exist in the enterprise ontology defined by Zachman. To put it bluntly, we need to move from philosophy to engineering and doing, via the medium of architecture. This echoes the sentiment of Jane Addams, who we introduced way back in Chapter 3, who pointed out in her writings that our actions are the only way to evidence your ethics.

Motivation The Motivation column of the framework is where the examination of how you translate philosophy into action through an architecture needs to start. Looking at the different levels of perspective on motivation, we can begin to identify the types of artefact that might be created at each level (see Figure 6.2). It is significant to note that Zachman identifies artifacts in the Motivation column as including: ●●

Motivation Types at Row 1

●●

Business Ends and Business Means at Row 2

●●

System Ends and Means at Row 3

●●

Technology Ends and Means at Row 4

In Row 1 of the Zachman Framework, our discussion of ethics in the enterprise is focused on identifying what the ethics and values of the organization actually are. At this level, we might begin to think about normative theories of ethics such as stakeholder theory, or shareholder theory, or even social justice/common good. This is the executive-level scope and context for every other ethical decision that is taken in the organization. Ethical considerations are one of a number of motivation types that can exist for an organization and it is at this level that we see the manifestation of normative theories of ethics such as shareholder theory versus stakeholder theory. As we look at the lower-level perspectives from Row 2 to Row 4, we see how we need to plan in an architectural way for consistency in how ethics

本书版权归Kogan Page所有

Figure 6.2  Ethics in the Zachman Framework Data

Action

Location

Actor

Event

Motivation

Executive

Inventory identification

Process identification

Distribution identification

Responsibility identification

Timing identification

Motivation identification

Scope and context

Business manager

Inventory definition

Process definition

Distribution definition

Responsibility definition

Timing definition

Motivation definition

Business concepts

Architect

Inventory representation

Process representation

Distribution representation

Responsibility representation

Timing representation

Motivation representation

System logic

Engineer

Inventory specification

Process specification

Distribution specification

Responsibility specification

Timing specification

Motivation specification

Technology physics

Technician

Inventory configuration

Process configuration

Distribution configuration

Responsibility configuration

Timing configuration

Motivation configuration

Tool components

Enterprise

Inventory instantiation

Process instantiation

Distribution instantiation

Responsibility instantiation

Timing instantiation

Motivation instantiation

Enterprise

SOURCE Adapted from Zachman Framework, version 3.0

179

本书版权归Kogan Page所有

180

Data Ethics

and values are communicated in the enterprise, particularly in the ­information management function. ●●

●●

●●

●●

Row 2 requires business managers to align the philosophy and ethos espoused at Row 1, Column 6, with day-to-day ‘doing’ of things in the organization. Inconsistency and incongruence arises here where the dayto-day processes and practices espoused by management do not match with the values that are promoted by the executive scope and context. For example, if an organization states at the executive level that it values and protects the personal data of its customers and employees, a mismatch can arise when business managers in the organization adopt the view that dealing with privacy issues is someone else’s job, like the privacy department or legal. Zachman explicitly labels the artefacts to be defined here as ‘Business Ends’ and ‘Business Means’, echoing the language of classical ethicists like Kant. Row 3 requires clear representation of the values in the design of the logic of the internal systems (information systems and people systems). The logic of that design and the internal alignment with the executive values and the business management definition is what helps reinforce and embed the values in the organization. For example, if an organization says that it values the opinions and feedback of its customers but penalizes staff for spending longer than 90 seconds on a customer service call, there is a disconnect that weakens the ethic of the organization. At this level, Zachman discusses the idea of ‘System Ends’ and ‘System Means’, alluding to the need to begin modelling ethical rules into systems and data architecture constructs. Row 4 relates to how ethical values might find themselves embedded in the specification of how things get done in the organization. The ‘technology physics’ that Zachman refers to can equally be applied to the people in the organization and the constraints on how they might behave. At this level, Zachman still refers to Ends and Means, but in the context of the actual design of the information management technology platform in the organization. Row 5 and Row 6 reflect the actual implementation and instantiation of ethics in the organization in actual process implementation and process execution. Ultimately, it is at this level that the true measure of the ethical motivation of the organization is manifest, as the sole medium of expression of ethics is the actions that are performed.

本书版权归Kogan Page所有

Developing an ethical architecture

The way in which the organization architects the definition and communication of ethics and ethical values in the organization establishes a set of ­constraints on the behaviour of the enterprise. If these are not defined and executed in a semantically congruent way, there is scope for misinterpretation or incorrect internalization of the ethics of the organization by staff. As such, the translation of ethical principles into ethical practices is often a challenge in most enterprises and should be undertaken in a structured manner and not left to chance. We will now look at each of the rows in the Zachman Framework in turn to examine how ethical factors can be instantiated in the overall ontology that Zachman defined.

The ‘Executive’ perspective The ethical motivation of the organization impacts on the approaches applied and actions taken in the context of the other intersections of ­interrogative and perspective. For example, at the ‘Executive’ (Row 1) perspective (see Figure 6.3), the ethical motivation of the organization can impact on its gathering of data and what data is obtained or processed as part of its ‘data inventory’. Organizations often struggle with identifying the ethical issues that might arise with the data that they are proposing to process. These ethical issues are often related to the question of whether the data identifies, relates to or impacts on people. A clearly defined ethical principles artefact that identifies the ethical motives and motivations of the organization can help you frame these discussions in terms of identifying what data you have that contributes to the achievement of those ethical values, or which require care in processing to avoid infringing on the ethical principles you have identified for the organization. This can help avoid the ‘it’s not data about people’ argument that can often bog down ethical change in information management. It allows you, through your executive-level definition of ethical motivation, to identify that the data your organization is processing can be used to have either a positive or negative impact on people. Apple is a good example of this impact as it has historically lagged in the analytics space, compared to Google with its Android operating system, because it does not harvest personal data about its customers from their devices in the same way and have only begun to do so in earnest when it could engineer privacy-respectful and privacy-enhancing ways of doing so, such as differential privacy or the development of on-chip analytics and AI capabilities –

本书版权归Kogan Page所有

181

182

Figure 6.3  Ethical motives on Row 1 of the Zachman Framework

Data

Action

Location

Actor

Event

Motivation

Executive

Inventory identification

Process identification

Distribution identification

Responsibility identification

Timing identification

Motivation identification

Scope and context

Business manager

Inventory definition

Process definition

Distribution definition

Responsibility definition

Timing definition

Motivation definition

Business concepts

Architect

Inventory representation

Process representation

Distribution representation

Responsibility representation

Timing representation

Motivation representation

System logic

Engineer

Inventory specification

Process specification

Distribution specification

Responsibility specification

Timing specification

Motivation specification

Technology physics

Technician

Inventory configuration

Process configuration

Distribution configuration

Responsibility configuration

Timing configuration

Motivation configuration

Tool components

Enterprise

Inventory instantiation

Process instantiation

Distribution instantiation

Responsibility instantiation

Timing instantiation

Motivation instantiation

Enterprise

本书版权归Kogan Page所有

Developing an ethical architecture

so raw data never leaves the person’s device (Glance, 2017). Contrast this with Meta’s struggles with the ethical management and use of data that has resulted in experiments on users to see if bad news affects their mood (shock: it does) (Phipps, 2014) or the introduction of services such as ‘Life Stages’ (which removed privacy controls on content and showed it to people who claimed, without any validation, to be in your school) (O’Keefe and O Brien, 2016; Heath, 2017). Ethical considerations at the executive level should also guide the identification of actions that will be taken using data. This can also be seen in the example of the Samaritans Radar app we discussed in the Introduction, and in the context of the deployment of artificial intelligence by Meta to achieve similar goals, which we looked at in Chapter 4. In the context of Samaritans Radar, while the intent was good (Marrins, 2014), it is open to question whether this mass surveillance approach to mental health support was an action that was compatible with the Samaritans’ core values of privacy, ­confidentiality and respect for the individual. By considering the ethical motivation at the Executive perspective, we can identify that disconnect, which, ultimately, resulted in the Samaritans pulling the Samaritans Radar app entirely due to the privacy concerns that were raised and which were not addressed in the design of the app (Lee, 2014). Likewise, in the context of the Meta AI processing, we can see that at the executive level, Meta has recognized that the processing of data relating to physical or mental health by automated means is subject to more stringent controls in Europe, but it appears not to have considered if the use of an ‘always on’ monitoring of people’s posts to make decisions about mental health will support or undermine the objective of helping people by discouraging them from sharing such information on social media. Similarly, the ethical values and motivations of the organization can impact on the decisions that are taken at the executive level regarding the ­location where data is processed or stored, and the identification of the ­responsibilities that the organization may have regarding the data, or regarding when certain actions or processes might be invoked or triggered. For example, an organization may adopt an ethical policy of not using certain companies for its data processing, or not processing data in certain ­jurisdictions. This may result in the organization losing money or market opportunities. On the other hand, an enterprise may choose to change its product or service offerings in certain markets in response to market opportunity (e.g. lower levels of regulation) or in response to legal requirements in a jurisdiction. An example of this is Apple’s recent decision to pull Virtual

本书版权归Kogan Page所有

183

184

Data Ethics

Private Network (VPN) apps from its App Store in China (Molina, 2017). This has raised questions about Apple’s commitment to its ethical stance on data privacy (Holt, 2017). As we explore in more detail in our discussion of ethics and data governance, a key element of the architecture and design of ethical frameworks in an information management context is the identification of ­responsibility and accountability for ethical issues involving data. This is a Row 1, Column 4 consideration in the Zachman Framework. What is it that your organization is responsible for at the end of the day? At what point might your ethical vision and values be constrained by external factors such as legal or regulatory constraints? Or at what point should your organization seek to go beyond the ‘letter of the law’ and promote a higher ethical standard? Who in the organization is ultimately responsible, and what are they responsible for? It is at this point that the ‘tone at the top’ issues referred to in Chapter 4 begin to emerge, as the statement of identified ethical motivation defined in Row 1, Column 6 is either congruent with or incongruent with the identified responsibilities in Row 1, Column 4. Apple’s decision in July 2017 to pull VPN apps from its App Store is a good example of this type of incongruity. Apple has historically positioned itself as strongly protective of the data privacy of its users. Speaking in 2010, Steve Jobs encapsulated the value as: ‘Privacy means people know what they are signing up for – in plain English, and repeatedly’ (Bergen, 2016). In 2015, Tim Cook drew another line in the sand regarding data privacy and encryption in a speech to EPIC’s Champions of Freedom event in Washington DC, a speech in which he explicitly addressed the issues of encryption, privacy and security, and the morality of undermining privacy rights (Panzarino, 2015). However, critics of Apple contrast its stance in the case relating to an iPhone used by mass murderers in San Bernadino California (Queally and Bennett, 2016; Rubin et al, 2016) with its actions over VPNs in China (Tepper, 2017). In the former case, Apple engaged in extensive legal action to prevent the FBI requiring it to engineer a ‘master key’ for all iPhones without a clear legal basis for the request. In the latter case, Apple has stated that the Chinese situation is different as there is legislation in China that requires VPN providers to register with the government and obtain a licence, and Apple were required to remove apps that do not meet these Chinese regulations. In an explanation given on an earnings call, Tim Cook went on to express Apple’s hope that, over time, the Chinese government would loosen restrictions and that Apple believed in engaging with governments,

本书版权归Kogan Page所有

Developing an ethical architecture

even when it disagrees with them (Tepper, 2017). On that call, Cook also stated that: ‘We strongly believe participating in markets and bringing benefits to customers is in the best interests of the folks there and in other countries as well’. Apple has invested heavily in China since 2016 and in 2021 it was ­revealed it had entered into a deal with the Chinese government worth $275 billion, in a deal that required it to comply with Chinese laws and regulations, which included the moving of iCloud services of Chinese users to a China-based company (Owen, 2021). Of course, Apple’s dependence on the Chinese market and on Chinese supply chains has had operational impacts since the Covid-19 pandemic, which contributed to supply shortages globally. The shifting geo-political landscape in the wake of the Russian invasion of Ukraine and the risk that the Chinese government could be emboldened to seize control of Taiwan raises fresh ethical challenges for Apple potentially, as sanctions against China would impact its ability to service global demand for its products (Lovejoy, 2022). This highlights a key area of responsibility identification at the executive level. Apple appears to have identified that its ethical motivation is constrained by a responsibility as a company to comply with the laws of the jurisdictions it operates in. Apple also sees withdrawing from markets as being something that curtails its influence and its ability to bring benefits to customers, in addition to costing it money and market share (the shareholder value normative ethic at play). In that context, it seems that Apple has determined that the use of engagement and lobbying to push back against enacted laws and regulations that impinge on personal privacy or freedoms is as valid an executive responsibility as litigating when governments or government agencies seek to step beyond what their legal powers and rights to infringe on data privacy might be, and that being active in a market is a lever to help it influence improvements in the ethical drivers of society over time. However, as any builder will tell you, the executive view of the architecture often has to change when the underlying landscape and terrain shifts, making the planned construction unstable.

The ‘Business Manager’ perspective Row 2 of the Zachman Framework is concerned with translating the mission of the enterprise into more detailed representations and models. In the Motivation column (Row 2, Column 6) you would expect to see some tangible definition of what ethical behaviour looks like in the organization (see

本书版权归Kogan Page所有

185

186

Figure 6.4  Ethics in Row 2 of the Zachman Framework

Data

Action

Location

Actor

Event

Motivation

Executive

Inventory identification

Process identification

Distribution identification

Responsibility identification

Timing identification

Motivation identification

Scope and context

Business manager

Inventory definition

Process definition

Distribution definition

Responsibility definition

Timing definition

Motivation definition

Business concepts

Architect

Inventory representation

Process representation

Distribution representation

Responsibility representation

Timing representation

Motivation representation

System logic

Engineer

Inventory specification

Process specification

Distribution specification

Responsibility specification

Timing specification

Motivation specification

Technology physics

Technician

Inventory configuration

Process configuration

Distribution configuration

Responsibility configuration

Timing configuration

Motivation configuration

Tool components

Enterprise

Inventory instantiation

Process instantiation

Distribution instantiation

Responsibility instantiation

Timing instantiation

Motivation instantiation

Enterprise

本书版权归Kogan Page所有

Developing an ethical architecture

Figure 6.4). It’s the level at which organizations start defining a range of things, from what the data they are processing in the organization’s business functions will be, to how the process steps necessary to achieving business functions will be executed, where that will be done and who will do it. The ethical motivation of the organization needs to be defined and codified at this level into meaningful statements of principle and policy. As David Hay wrote in 1997, Row 2 is the level at which the motivations of the organization are ‘translated into the specific rules and constraints that apply to an enterprise’s operation’ (Hay, 1997). In the context of the ethical motivation, this means defining at the business management level clear business rules and policies for ethical conduct in the information environment. These rules may be defined as part of a statement of business values, a core business ethics policy, or as part of information security or data privacy policies in the organization. However, as these documents are rarely prepared by the same functional areas of the organization, often the sum of the parts can be less than the whole, with inconsistencies, incongruities or simply no explicit consideration given to information ethics. Also, in the context of the ethical motivation of the organization, many of these documents are drafted at such a high level as to be more accurately classed as Row 1, Column 6 artefacts as they describe the ethical values and priorities of the organization or profession rather than getting into anything resembling an ‘engineering definition’ of those ethical behaviours. This is particularly the case outside of professional fields where there is an absence of defined disciplinary sanctions for breaches of ethical standards. In these cases, professional bodies may define codes of ethics for their members (which is arguably an externality influencing the organization rather than being something the organization can architect for), or enterprises may define an internal ethics code. However, absent some form of meaningful sanction, these codes have been found to be ‘aspirational, inspirational and a basis for ethical reflection’ (Sturges, 2009). Sturges examined the formal documentation of codes for information ethics. He found that many of them defined the scope of the ethical discussion quite narrowly to issues of data privacy, copyright and confidentiality, or even simply not breaking the law. These are the identification of principles, so belong in the Executive perspective. Many organizations are beginning to examine the concept of an information ethics forum to translate identified ethical principles into defined

本书版权归Kogan Page所有

187

188

Data Ethics

ethical actions and practices in their organizations as part of their overall information governance model. While this is to be welcomed, it does not necessarily address the issue of translating identified principles (Row 1) into defined policies and actions (Row 2). What is required is for management to define a formal framework at this level that allows managers to confirm the following: ●●

●●

●●

I can clearly explain to others how my functional area supports the ethical mission and vision of the organization. When I’m faced with an ethical issue or conflict between values I know where to go for help in resolving the situation. Essential information about ethical issues and priorities flow from management to staff.

If a framework to answer these questions is defined at the business manager level, with clearly defined triggers and pathways to escalate ethical questions to the executive level, then the enterprise will have had to address the question of responsibility definition for information ethics in the context of responsibility in the wider information architecture (Row 2, Column 4). The challenge for organizations is to define their ethical values and motivations clearly enough at this level for business managers to make informed decisions and choices. This requires the elaboration of high-level ethical values into meaningful principles that can be applied in day-to-day practices and processes. This will feed into the definition of the overall data governance framework for the organization, which we will discuss in Chapter 9. To enable the enterprise to discuss and manage ethical issues consistently, there will need to be a consistent definition of the data inventory in the organization from a business perspective (Row 2, Column 1). This definition of data inventory will need to address the definition of metadata for all the entities and ‘things’ that the organization needs to manage. This will need to include both defined terminology such as ‘What is a customer?’ as well as more abstract business rules for the identification of categories of data, such as personal data or data relating to ethnicity, gender, or physical or mental health, that might raise ethical concerns. Of course, as data does not exist in a vacuum, this will require consideration of the definition of the actions and processes that are taken with that data (Row 2, Column  2) and how it might lead to unethical behaviour or support an outcome that is unethical in its impact on individuals. These assessments will often need to go beyond addressing the questions of whether data is ‘personal data’ or whether it describes, defines, or represents a person or

本书版权归Kogan Page所有

Developing an ethical architecture

people, but whether the application of that data in a process context, and the outcomes or impacts of that processing, is in line with the ethical values of the organization. One way in which this might be manifest is the definition of data that is ‘off-limits’ for certain processing activities or purposes, even if it exists in the information architecture. This can arise because of legal restrictions placed on the processing of data but can equally arise from an ethical decision. For example, as a result of a privacy impact assessment we conducted with a government department, they identified that for a certain set of analytics purposes they did not require granular identifiable data, but for other purposes they did. By carefully defining the entities in the data inventory, and associating them to the context of the processes they are used in, the client identified how their ethical value of only infringing on the privacy of identifiable people where necessary and where proportionate could be best achieved. Finally, the definition of the ‘when’ and ‘where’ of processing should be constrained by the definition of ethical principles. Examples of ethics dictating where organizations might conduct business are manifold, often backed up by legal obligations around trade sanctions or restrictions. Examples of ethical artefacts we would expect to see in this context would include business policy decisions about what technology platforms to use for processing of data (e.g. use of cloud versus on-premises, criteria for the selection of cloud providers) or the decisions not to allow data to be processed in certain jurisdictions or countries or third-party providers. In practice, organizations may find some of this is defined in general business ethics policies or enforceable legal obligations such as trade sanctions. However, in other cases it can be a simple moral policy decision (Row 2, Column 6) that constrains the decisions that business managers might take in other contexts.

The ‘Architect’ perspective As we move down the perspectives of the Zachman Framework we begin to identify more granular and tangible things that demonstrate ethical information management at work. At the level of the ‘Architect’ perspective (see Figure 6.5), the Motivation column is seen in the traditional information management context as being where ‘business rules are expressed in terms of information that is and is not permitted to exist’ (Hay, 1997) and which constrain the design of the database and the processes to create and update data in an information system. This is the level at which the business

本书版权归Kogan Page所有

189

190

Figure 6.5  Ethics in Row 3 of the Zachman Framework

Data

Action

Location

Actor

Event

Motivation

Executive

Inventory identification

Process identification

Distribution identification

Responsibility identification

Timing identification

Motivation identification

Scope and context

Business manager

Inventory definition

Process definition

Distribution definition

Responsibility definition

Timing definition

Motivation definition

Business concepts

Architect

Inventory representation

Process representation

Distribution representation

Responsibility representation

Timing representation

Motivation representation

System logic

Engineer

Inventory specification

Process specification

Distribution specification

Responsibility specification

Timing specification

Motivation specification

Technology physics

Technician

Inventory configuration

Process configuration

Distribution configuration

Responsibility configuration

Timing configuration

Motivation configuration

Tool components

Enterprise

Inventory instantiation

Process instantiation

Distribution instantiation

Responsibility instantiation

Timing instantiation

Motivation instantiation

Enterprise

本书版权归Kogan Page所有

Developing an ethical architecture

­ lanning is cascaded into defined business rule models and the design of p data flow models, logical data models, and the specification of data access roles and responsibilities. So, if the Architect perspective is concerned with developing operative models for the enterprise in the contexts of the data, the processes, the actors involved and the other interrogatives that describe the ontology for the enterprise, how do we model the ethical motivation for the organization in Row 3, Column 6? The solution here is not radically different to the question of how we might define or describe a business rule for when data may or may not be accessed for a particular purpose or how we might define a rule for determining if data is of an appropriate level of quality for the purpose for which it will be used. The key point is that, just like a business rule for data, the business rules for ethics need to be consciously designed and documented and a definition of what is ‘good’ needs to be formulated and communicated. One approach is to identify desired behaviours, model them, and describe them in a way that is communicable within the organization (see Chapter 3 for more on this). Another approach is to formalize clear policies and procedures for ethical conduct that create ‘stop and think’ checkpoints in the execution of other architectural functions at this level of perspective. Finally, identifying stories and examples of the ethical behaviour you want the people in your organization to demonstrate, and examples of how common ethical issues can be addressed, are essential. But just like any other architected or designed thing, the quality of the outputs from the process depends on the inputs, which are driven by the higher-level perspectives in Column 6. When discussing ethics, the proof of the pudding is in the actions taken and outcomes that are delivered. In that context, the way in which the ethical model influences the models that are produced for data, process and accountability in the organization are essential. The expression of ethics will be manifested in the design principles that are applied in the context of each of the other columns in the Zachman Framework. This may include issues like: ●●

●●

●●

Accessibility standards for the representation of data in data models or in reports (Data) Definition of standards for onboarding of data from third-party sources (Data/Actors) Definition of roles, responsibilities and accountabilities for data, and access to data in the context of processes (Actors)

本书版权归Kogan Page所有

191

192

Data Ethics ●●

●●

Standards for the use of data storage technologies or cloud platforms (Actors/Location) The models used to define algorithms and machine-learning processes (Data/Process)

Ultimately, the Architect perspective of the Zachman Framework is the level where the enterprise starts to define the day-to-day models for how things get done with data in the organization. It is essential that there is clear alignment with strong ethical models of behaviour in the definition of these other models. Absent a clearly articulated and defined ethical model for enterprise information, however, these other models retain the potential to deliver unethical, or at best ethically questionable, outcomes. Whether it is failing to test to see if the technology in a soap dispenser can detect darker skin tones, or producing data visualizations that are unintelligible to the colour-blind, to failing to introduce controls against gender bias in selection algorithms, these are all symptoms of an absence of an ethically aligned architectural perspective that defined appropriate standards.

The ‘Engineer’ perspective The ‘Engineer’ perspective in the Zachman Framework addresses how things are actually specified in the context of any project, process or system in the enterprise. This is the level of the technology model. It is the level at which the models that are defined in the organization are translated into functioning software, executable business processes, and actionable responsibilities and accountabilities. This occurs through a design process that is informed by the models and rules identified and applies them in the context of a particular system or process. In the context of the ethical motivation (Row 4, Column 6) this means translating abstract ethical concepts into tangible requirements for the operation and behaviour of a system or process. These requirements in turn affect the specification of the data inventory in question, the process steps that are to be taken, and the specification of responsibility and accountability in the execution of the processing activity. It will also require the specification of requirements around the location of processing (what servers or other technology will be holding the data) and the rules for triggering the execution of the process. The problem from an ethical perspective is that this is often the level at which organizations start addressing the implementation of new systems or technologies without first ensuring an appropriate ethical model is defined

本书版权归Kogan Page所有

Developing an ethical architecture

that will feed the technology requirements. It is at this level that companies like Meta find their data science teams altering algorithms to see if exposure to bad news makes people sad or where organizations like the Samaritans adopt text analytics and sentiment analysis technologies without determining how they might be best used to achieve the ethical objectives of the ­organization.

The ‘Technician’ perspective Penultimately, we consider the perspective of the technician, the level at which the specific programs and execution processes are created and configured in the enterprise. The challenge here is to build and configure the enterprise’s technology in such a way as it meets the specification, conforms to the architectural models, meets business requirements and enables execution of strategic vision. There isn’t a lot to say here, other than the ability of the organization to process and manage information in an ethical manner depends on how well the technician implements and configures the programs and coding to give effect to the processes and processing. Of course, this includes people generating business intelligence r­ eporting, training AI applications, implementing chatbots, as well as implementing databases, data interchange processes and other ‘traditional’ information systems implementation tasks. In the context of trends such as self-service business intelligence, how the analytics environment is configured to ensure that individuals only have access to data that is legally or ethically permitted is also a consideration. This can, and should, include assessing if the specification of data extracts or data transfer processes contain excessive or irrelevant data that might create a legal or ethical exposure for the ­enterprise. Again, we often see data privacy or data ethics breaches arising in organizations because a technician-level focus was adopted absent any other models being defined or perspectives being considered. This results in technology that might work wonderfully but which doesn’t integrate with other parts of the organization’s IT systems, or which operates at odds with the stated ethical and regulatory controls that the organization may aspire to have in place. W Edwards Deming described this symptom as being what arises when everyone attempts to apply their ‘best efforts’ to addressing a problem without a broader ‘theory of knowledge’ to apply to the analysis of need and specification and implementation of solution (Deming, 1986).

本书版权归Kogan Page所有

193

194

Data Ethics

The ‘Enterprise’ perspective In the context of the Zachman Framework this perspective is what the customer sees of the organization, the instantiation at a point in time of the different interrogatives in the context of an interaction with the individual. The outcomes delivered and experience of the individual of their interactions are ultimately the hallmark of the enterprise’s information m ­ anagement capabilities. Likewise, the perception of ethical conduct, and the alignment between stated objective and actual delivery and execution of values, is also determined through what the individual experiences when interacting with the organization and the impact that the processing of information in that instance has on the rights and freedoms and choices of the individual or of society.

Granularity and the enterprise Looking back at the questions raised by the different responses by Apple to requests from US law enforcement to develop a capability to unlock iPhones versus its withdrawal of VPN apps from its App Store in China, you are probably wondering how that fits into the Zachman Framework from an ethical perspective. The question of how such questions might be considered in the ontology highlights a key point about the Zachman Framework regardless of whether we are discussing ethics or some other aspect of the enterprise. The focus of the Zachman Framework is the definition of those things that are within the enterprise. There are concepts, influences and obligations outside the organization’s perimeter that it may seek to influence but, ultimately, are beyond its control. This is not a flaw in the ontology, but rather it is a feature of the level of granularity where the ontology defined by John Zachman is focused. Zachman himself highlights this in his 1996 article describing the framework (Zachman, 1996). In that article, Zachman tells us that ‘the level in the hierarchy in which an object functions as a stand-alone, self-contained unit is the level that constitutes a natural boundary for integration’. He goes on to highlight that this is a choice that ‘is made on the basis of manageable scope versus jurisdictional authority’. In short: it’s based on the boundary between the things the organization can control directly in a manageable way and those things that the organization can, at best, seek to influence and other externalities that influence the organization.

本书版权归Kogan Page所有

Developing an ethical architecture

Zachman describes this as ‘the issue of granularity’, bemoaning the fact that the legacy of the information management and data processing profession has been a focus on the lower levels of architectural granularity. He tells us that … even if we have been employing the best architectural techniques by using model driven approaches to systems development, if the implementation was architected at the program, system, application, or departmental levels, we inadvertently or sometimes even deliberately introduced substantial discontinuity and redundancies into the Enterprise data, the network and the business rules.

When considering information ethics, you are facing a similar granularity problem in the architecture, which you will increasingly see manifesting in AI, analytics and other information management disciplines or initiatives. If the implementation is architected at the program, system, application or departmental level, you will inadvertently or sometimes even deliberately introduce discontinuity into the enterprise. This highlights the need for a coherent ethical ‘tone at the top’ from an ethics perspective (Row 1, Column 6), as is borne out by research by organizations such as Deloitte (2014).

Implementing ethical architecture: common challenges One of the challenges that is faced in implementing ethical approaches to information management in organizations is that the traditional ‘information managers’ are at the level of the ‘Engineer’ or, at best, the ‘Architect’ level. Just as there are developers of systems and information management processes who do not consider ethical issues, there are others who recognize the need to engineer information systems ethically. What they often lack is clear guidance on what that should be and what ‘ethical’ means in the context of a given process, a given set of data, or a given context of location or timing. As we have seen in our discussion of the Zachman Framework, the reason for this angst is more often than not that the business management or executive leadership layers of the organization haven’t engaged with the ethical aspects of their information management strategies. The value of an ontological information architecture approach such as Zachman’s is that it

本书版权归Kogan Page所有

195

196

Data Ethics

is simple to point to a Row/Column intersection and show that there is something missing at these levels to provide the guidance and parameters for decisions and actions at lower levels in the framework. Another challenge that is faced, particularly in organizations that are operating in a multinational or multijurisdictional context is that there can be cultural difference around ethical values or how those values should be expressed in systems and processes in different jurisdictions. This is a granularity issue that relates to the Motivation column and the Location column of the framework. In the context of the Zachman Framework we would expect to see clear statements and guidelines from the Executive identifying the locations, identifying responsibilities, and identifying the ethical principles and values of the organization and the local variations that are acceptable. From an ethical perspective, the organization needs to align its ethical architecture internally in a way that both supports ‘higher principle’ ethical positions as well as meeting legal obligations in any jurisdiction the enterprise operates in. While the enterprise may have control over its expression of ethics internally, it may find that external legal obligations constrain or curtail the expression of those ethics in practice. Apple’s response to VPNs in China appears inconsistent with its previously stated ethics and has required its CEO to explain the apparent dichotomy with its previously adopted positions. However, that is an example of an enterprise with a strong ethic of protecting personal data privacy having to respond to a legislative constraint on those protections. If you look at the response of tech giants such as Google or Meta to the global trend of legislation protecting personal data privacy or AI regulation we can see the same effect from the opposite end of the spectrum. Both organizations have faced regulatory scrutiny in the EU over their approach to processing data about people. Practices and approaches that are legal in the United States and are executed in line with the internal ethics of the organization, all too often run into problems when tested against legislative frameworks that require higher standards of protection of personal data privacy. So, while the impact on individuals is different in each case (Apple’s decision risks reducing data privacy for its customers in China, at least for the foreseeable future; Google/Meta find their business and information management practices under challenge), the end result is the same. Apple indicated it will lobby to restore privacy protections in China. Google and Meta lobby extensively on data privacy legislation and e­ nforcement worldwide,

本书版权归Kogan Page所有

Developing an ethical architecture

including appealing enforcement decisions by regulators such as the Irish Data Protection Commission (Irish Times, 2022; Ó Faoiláin, 2021). They cannot control these things from an architectural perspective but they can seek to influence those things that are external to the enterprise architecture to seek alignment between the internal ethical motivations of the o ­ rganization and ensure congruence in the architecture for information ­management. However, sometimes the enterprise must change, rather than the external world. With the trends in consumer concern and awareness about data privacy and data ethics, your organization and many others may need (or are already needing) to realign your internal information architecture to align with external forces. Those that do not, or cannot, risk being considered unethical actors in the Information Age.

Zachman, ethical architecture and the long-term vision The Zachman Framework is a powerful enterprise ontology that supports information architecture concepts but also gives a reasonably complete set of things that need to be considered when trying to give effect to ethics through action in the organization. While criticisms have been raised that the ontology is not an ontology in the computer science understanding of the term, critics of Zachman also admit that they are using the term differently to how it would be used in philosophy. Zachman concludes his own 1996 paper on the Zachman Framework by engaging in some philosophical discussion of how life is a ‘series of decisions’. His words are 25 years old at the time of this writing but are particularly prescient in the context of the threats to data privacy, fundamental rights, and equality of access and opportunity that are arising through the actively, or unthinkingly, unethical application of both legacy and emerging technologies. ‘There is nothing wrong about short term or long term decisions except, it is abundantly clear, if you exclusively make short term decisions and ignore the long term implications there comes a time when you will live to regret it. You are going to “pay later”’ (Zachman, 1996, emphasis ours).

本书版权归Kogan Page所有

197

198

Data Ethics

Chapter summary In this chapter we examined the detail of the Zachman Framework. ●●

●●

●●

●●

You became more familiar with the basic construct of the Zachman Framework ontology. You identified the importance of the Motivation column and its referencing of motivation types and the means and ends for business, systems and technology. You became familiar with the concept that the execution of the motivation ends requires that conscious design decisions to be made in other areas of the ontology across each level of perspective or abstraction. For example, avoiding exposing data to government surveillance as an ethical principle may restrict jurisdictions where data can be stored, affecting the Location vertical. You developed an understanding of why ethical management of information has to be designed for and planned for rather than just hoped for.

Questions 1 Think about organizations that you deal with on a day-to-day basis where your experience of their ethics as a customer doesn’t match their stated values. What might contribute to that? 2 What benefits do you think organizations can gain from building their ethical considerations into how they think about information management? 3 In the same way as organizations face ‘technical debt’ today, is it possible that we are also facing ‘ethical debt’ in the fallout from decisions taken about the adoption of new technologies without appropriate consideration of ethical issues? If so, who pays that ethical debt?

本书版权归Kogan Page所有

Developing an ethical architecture

Note 1 Of course, Socrates goes on to describe what happens when the philosopher returns to the cave and can’t see in the dark. The other prisoners interpret this as meaning the world outside the cave is dangerous and they kill anyone who tries to drag them out of the cave into the light. Those of you who have worked on data privacy issues in organizations may be all too familiar with this scenario.

Further reading Object Management Group (2003) The Zachman Framework and the OMG’s model driven architecture, white paper, September, www.omg.org/mda/mda_files/0903-WP_Mapping_MDA_to_Zachman_Framework1.pdf (archived at https:// perma.cc/7GJR-XFSM) Zachman, J A (2016) The Issue is THE ENTERPRISE, Zachman International, 15 December, www.zachman.com/resources/zblog/item/the-issue-is-the-enterprise (archived at https://perma.cc/63EL-SBBS)

References Bergen, M (2016) Here’s what Steve Jobs had to say about Apple and privacy in 2010, Vox, 21 February, vox.com/2016/2/21/11588068/heres-what-steve-jobshad-to-say-about-apple-and-privacy-in-2010 (archived at https://perma.cc/6VZLHK7M) DAMA International (2017) Data Architecture, in DAMA Data Management Body of Knowledge, 2nd edn, ed L S Coleman, D Henderson and S Earley, sl, Technics Publications, Basking Ridge, NJ Deloitte (2014) Tone at the top: The first ingredient in a world-class ethics and compliance program, sl, Deloitte Deming, W E (1986) Out of the Crisis, MIT Press, Boston, MA Glance, D (2017) Apple’s new mobile AI chip could create a new level of intelligence, Phys.org, 30 May, phys.org/news/2017-05-apple-mobile-ai-chip-intelligence. html (archived at https://perma.cc/MT8V-ST45) Gruber, T (1992) What is an ontology? KSL, Stanford University, www-ksl.stanford. edu/kst/what-is-an-ontology.html (archived at https://perma.cc/7NFY-EBX7) Gruber, T (2016) Ontology, in Encyclopedia of Database Systems, ed L Liu and M Özsu, Springer, New York, NY, doi.org/10.1007/978-1-4899-7993-3_1318-2 ­(archived at https://perma.cc/4CWS-J4AW)

本书版权归Kogan Page所有

199

200

Data Ethics Hay, D (1997) The Zachman Framework: An introduction, The Data Administration Newsletter, 1 June, tdan.com/the-zachman-framework-an-introduction/4140 ­(archived at https://perma.cc/V9AQ-M5M6) Heath, A (2017) Facebook killed the Snapchat-like app for high schoolers it quietly released last year, Business Insider, 8 August, www.businessinsider.com/facebookkills-lifestage-social-network-app-for-high-schoolers-2017-8 (archived at https:// perma.cc/AG9B-P86Y) Holt, J (2017) China VPN ban: What happened to Apple’s moral backbone?. Fortune, 8 August, fortune.com/2017/08/08/apple-china-iphone-vpn-censorshipban/ (archived at https://perma.cc/TS9X-VHFA) Irish Times (2022) Meta wants High Court to quash €405m data protection fine over Instagram setting, 14 November, www.irishtimes.com/business/2022/11/14/ meta-wants-high-court-to-quash-405-million-data-protection-fine-over-­ instagram-setting/ (archived at https://perma.cc/DW9L-ZHEG) Lee, D (2014) Samaritans pulls ‘suicide watch’ Radar app, BBC News, 7 November, bbc.com/news/technology-29962199 (archived at https://perma.cc/48HU-8VHR) Lovejoy, B (2022) Ukraine crisis puts Apple’s unsustainable dependence on China in the spotlight, 9to5Mac, 2 March, 9to5mac.com/2022/03/02/ukraine-crisis-applechina/ (archived at https://perma.cc/Z622-Y4CG) Marrins, K (2014) Samaritans Radar: ‘Charity deserves round of applause for putting mission front and centre’, The Guardian, 3 November, www.theguardian. com/voluntary-sector-network/2014/nov/03/samaritans-radar-twitter-missioncharity (archived at https://perma.cc/YS5M-CA8X) Molina, B (2017) Apple pulls VPN apps from China as government clamps down on internet access, USA Today, www.usatoday.com/story/tech/talkingtech/2017/07/31/ apple-pulls-vpn-apps-china/524798001/ (archived at https://perma.cc/YC3S-RFZ8) Ó Faoiláin, A (2021) WhatsApp appeals against €225m Irish data fine, Independent. ie, 9 November, www.independent.ie/business/irish/whatsapp-appeals-against225m-irish-data-fine-41032090.html (archived at https://perma.cc/7TQX-J8JF) O’Keefe, K and O Brien, D (2016) New paradigm or ethics washing? An analysis of Facebook’s ethics report, Castlebridge, castlebridge.ie/resources/new-paradigm-orethics-washing-an-analysis-of-facebooks-ethics-report/ (archived at https://perma.cc/ P643-G4PP) Owen, M (2021) Apple made secret 5-year $275B deal with Chinese government, AppleInsider, 7 December, appleinsider.com/articles/21/12/07/apple-made-secret5-year-275b-deal-with-chinese-government (archived at https://perma.cc/8YKYK9G6) Panzarino, M (2015) Apple’s Tim Cook delivers blistering speech on encryption, privacy, TechCrunch, 2 June, techcrunch.com/2015/06/02/apples-tim-cook-­ delivers-blistering-speech-on-encryption-privacy (archived at https://perma.cc/ WF5X-MZN9)

本书版权归Kogan Page所有

Developing an ethical architecture Phipps, S (2014) Facebook’s big problem: Ethical blindness, InfoWorld, 30 June, www.infoworld.com/article/2608257/techology-business/facebook-s-big-­ problem--ethical-blindness.html (archived at https://perma.cc/C2YL-3MFL) Plato (2017) The Republic, tr B Jowett, Amazon Classics, Seattle Queally, J and Bennett, B (2016) Apple opposes order to help FBI unlock phone belonging to San Bernadino shooter, Los Angeles Times, 17 February, www. latimes. com/local/lanow/la-me-ln-fbi-apple-san-bernardino-phone-20160216-story.html (archived at https://perma.cc/2LM2-5WES) Rubin, J, Queally, J and Paresh, D (2016) FBI unlocks San Bernardino shooter’s ­­iPhone and ends legal battle with Apple, for now, Los Angeles Times, 28 March, www.latimes.com/local/lanow/la-me-ln-fbi-drops-fight-to-force-apple-to-unlocksan-bernardino-terrorist-iphone-20160328-story.html (archived at https://perma. cc/2MMM-JXW2) Sturges, P (2009) Information ethics in the twenty-first century, Australian Academic & Research Libraries, 40 (4), 241–51 Tepper, F (2017) Here’s Tim Cook’s explanation on why some VPN apps were pulled in China, TechCrunch, 1 August, techcrunch.com/2017/08/01/heres-tim-cooksexplanation-on-why-some-vpn-apps-were-pulled-in-china (archived at https:// perma.cc/Q258-AW8K) Zachman, J A (1996) Enterprise architecture: The issue of the century, cioindex.com/ wp-content/uploads/nm/articlefiles/63503-EAIssueForTheCenturyZachman.pdf (archived at https://perma.cc/B9VQ-SKGD)

本书版权归Kogan Page所有

201

202

Introducing the 07 Ethical Enterprise Information Management (E2IM) framework What will we cover in this chapter? In this chapter we explore with you an approach for implementing ethical data use in an organization that builds (yet again) on existing frameworks and practices in information management. By the end of this chapter you will:

●● ●●

●●

●●

Develop an understanding of conceptual models for data strategy. Develop an understanding of how the expectations of stakeholders are essential to determining the quality of the outputs from any data management process. Develop an understanding of the external stakeholder’s ethical perspective as the benchmark for your organization’s ethical conduct. Have a reference model for ethical enterprise information management that you can use to identify why your organization might have ethical issues in information management, and what you might do about it.

本书版权归Kogan Page所有

Introducing the E2IM framework

In this and the following chapters of the book, we will focus more on practical frameworks for implementing data ethics in organizations, rather than the philosophical theories in data ethics. You will see how aligning the adoption of an ethical frame for data management that is grounded in and aligned with established information management disciplines and practices can help, if not to reduce complexity, then at least to reduce the different flavours of complexity you are having to deal with when trying to manage information in an ethical manner.

Building a model for ethical enterprise information management In Chapter 6 we presented the Zachman Framework for enterprise architecture as a tool for framing discussion around ethical concepts in organizations, building on the oft-neglected ‘Motivation’ column of that framework. Zachman’s approach to mapping the management of an enterprise information ontology shows a successful visual description of complex systems and issues, breaking them down into simple, understandable structures and questions. When we consider the implementation of ethical principles in organizations, we are looking at complexity in multiple aspects. Technology implementation is complex to begin with. To add to that complexity, we have the challenges of identifying the ethical values and norms guiding our organization, and the further complexity of defining, communicating and embedding ethical values in an organizational framework. This moves beyond the overarching big-picture questions of what our organizational values are – what dominant normative theory for ethics is being adopted in the organization – and how we categorize our ethical constructs in the context of an enterprise ontology. It goes right down to on-the-ground complexities of how the organization can ensure alignment between its headline ethical values and the actual experiences of the people interacting with and affected by our organization. Our ‘executive level’ views cascade down to the actual instances of the effects on how we use data on our customers and society.

本书版权归Kogan Page所有

203

204

Data Ethics

Seeking simplicity – a generic framework for information management Our aim in this chapter is to share with you a simple, flexible, visual model for discussing the complexity of integrating and implanting ethical concepts into information management practices. The Ethical Enterprise Information Management (E2IM) model you will explore in this chapter has been developed by the authors in our consulting practice. We developed it as a visual representation of a strategic framework that describes the role and contribution of information management disciplines to the execution of effective ethical information management so they can be properly identified and managed. The E2IM model is built around a generic framework for information management first proposed by Professor Rik Maes in the University of Amsterdam in the late 1990s, which built on prior research on strategic alignment of information technology conducted by Henderson and Venkataraman earlier in the 1990s. We have extended these models to describe the interplay and alignment of ethical frameworks with an organization’s information management practices, but these earlier frameworks were focused on explaining why so many IT projects fail to deliver their expected benefits. Figure 7.1  A simple model for information strategy

Business strategy

Information and communications technology strategy

Internal domain

Organization infrastructure and processes

Information and communications infrastructure and processes

Functional alignment SOURCE Adapted from Henderson and Venkatraman (1993)

本书版权归Kogan Page所有

Strategic fit

External domain

Introducing the E2IM framework

The alignment problem In their research, Henderson and Venkatraman (1993) advocated a four-box grid model to represent the alignment of business and IT functions in an organization, addressing the questions of strategic fit and functional integration between business and IT in the context of the overall strategy of the organization (see Figure 7.1). This framework advocated the alignment of business and IT functions along two basic axes. The vertical axis represented the ‘strategic fit’ between the organizational processes and procedures with the defined business strategy, and the equivalent fit between IT systems and functions with a defined IT strategy. The horizontal axis represents the ­‘functional alignment’ between the business strategy and the technology strategy, and the alignment between business functions and the technology that is being implemented to support and enable the execution of those processes. This recognition of the need for strategic alignment is useful, but the model was missing a critical element – information, or data. This model conflated information with the underlying technology that is used to process and manage it. It also oversimplifies the ‘internal domain’ of the organization by combining the infrastructure for delivery (organization structures, technology infrastructure, etc) with the processes being executed for delivery of outcomes. This contributed to the failure of IT projects to meet business objectives, as the nuance and importance of information flows and the management of information was often lost. Maes et al (2000) proposed an alternative model, commonly referred to as the Amsterdam Information Model, that extends both the vertical strategic fit axis and the horizontal functional axis to reflect these gaps. This model explicitly recognizes the need to strategically manage and govern information as a distinct concept from technology systems, and also extends the organization domains that need to be considered. This gives a nine-box model describing the relationships between the various domains within the organization that need alignment in planning and implementation across business management structures, information architecture and technology architecture, to ensure consistent delivery against the defined business and information strategies. Much like the Zachman framework, the Amsterdam model provides a structure for you to consider the connectedness of things in the organization across different directions. We have found it useful when working with organizations to illustrate the implications for and impacts on one part of the organization resulting from a strength or weakness in the other. For example, an organization may require

本书版权归Kogan Page所有

205

206

Data Ethics

compliance with financial accounting and taxation laws as part of its governance and business strategy. But if the IT services staff use on a day-to-day basis are losing, miscalculating or misclassifying transactions, the operational issues of that IT service would affect the information used for planning and decisions in the organization, and strategies made on incorrect data and assumptions would lead to errors in accounting and failure to meet business strategy and governance goals. Likewise, if your business organization structures are not properly supported by your technology architecture, through segregation of duties and an information architecture that supports data segregation and rolebased access to data, it would be difficult across the board to ensure effective governance of information security and data privacy at the operational level. Figure 7.2  The Castlebridge Model Business

Information

Technology

Strategic

Business strategy and governance

Information strategy and governance

Technology strategy and governance

Structural/ tactical

Business architecture and planning

Information architecture and planning

Technology architecture and planning

Operations

Business process management and execution

Management and application of information

Management and exploitation of IT Services

Stakeholder

Process outcome

Information outcome

Expectation SOURCE Adapted from the Amsterdam Information Model

本书版权归Kogan Page所有

Introducing the E2IM framework

However, we found in our consulting work with organizations that this model still missed a necessary focus, the experiences of people who deal with the results of the information handling, or ‘stakeholders’. Our clients need to explain not just what’s going wrong in an organization because of data handling issues, but also the ‘so what?’ question. Why does it matter to the stakeholder? As a result, in 2012 we started to extend the Amsterdam model to formally recognize the ‘so what?’ question in the context of the outcomes that are experienced by stakeholders because of the operation of the internal business, information and technology functions in the organization (Figure 7.2). By explicitly recognizing the importance of the stakeholder’s perception of the outcomes that they experience as a result of the processing of personal data, you can begin to discuss the impact and implications of business strategy, information architecture or technology implementation on the experience of the stakeholder. This framework describes two types of experience of outcome: process outcome (did the process they were engaged in proceed in the manner they were expecting?), and information outcome (did the information meet their expectation? Was it retained for longer than they would expect? Was it processed in a location that the stakeholder might not have been expecting?). The connecting lines in these models are as important as the boxes, as the connecting lines represent the alignment between the different perspectives on the organization’s information management objectives. As Maes points out, this alignment is a source of tension, with misalignment giving rise to either organization failure or creative tension and innovation. The challenge that organizations face is to manage that tension in a way that mitigates risk, which the International Organization for Standardization (ISO) defines as the ‘effect of uncertainty on outcomes’. Ultimately, the stakeholder (usually) does not care how the ‘magic’ happens in the context of any information-processing activity. Your concern is that the correct process outcome is achieved and that the right thing happens as expected. When you order a book from an online bookstore do you expect to be given insights into the business strategy, operational architecture and technical data-­processing steps that your data goes through to turn your request for a book into a delivered item? No. Your concern is with getting the right book, at the right time, at the right price and in the right condition. Of course, failures in the alignment of strategy, structure and operations can lead to delays in shipping, shipping to the wrong address, shipping of the wrong item or charging of the wrong amount.

本书版权归Kogan Page所有

207

208

Data Ethics

While executing ethical information management is not quite the same as ordering the latest book on ethical information management from a bookstore, the need to ensure appropriate alignment strategically and functionally in the execution of information management is equally important to ensure that the outcomes meet the expectations of the stakeholders. It is this uncertainty as to the ethical nature of the outcomes of information processing that we concern ourselves with for the remainder of this chapter.

Engineering the ethical links In order to engineer the ethical links in the organization’s information management framework we need to consider the practical issues of how codes of ethics and codes of conduct are defined and communicated in the organization. This is usually done through the ‘tone at the top’ from the organization’s leadership (as discussed in Chapter 3). The practical application of an ethical framework in the context of modern information management will need to consider organizational values, processes and development of technology in the context of fundamental ethical principles such as human rights and dignity. This extends beyond an agreed-upon ‘code of practice’ into ensuring communication of values across an organization, and governance of processes and behaviour. As with technology and information strategy, this requires both horizontal and vertical alignment to ensure values are ­communicated and implemented consistently. Without an ethical ‘tone’ set from the top and full integration of ethical values across an organization and into the planning and design phases of the life cycle, a code of practice may run the risk of ending up a dead and useless ‘strategy’ document that bears little relation to an organization’s strategic practice, or wind up delivering structures that drive ‘tick box’ compliance to a minimal standard that does not uphold ethical information management practices The consulting euphemism for the potential results is ‘unexpected adverse consequences’. The ethical concern is harm to the people affected. Therefore, in the context of ethical information management we must: ●● ●●

●●

address the strategic, structural and operational layers; ensure alignment between business functions, information management and technology implementation; consider the perspective of the stakeholder and the outcomes they experience arising from the processing of information.

本书版权归Kogan Page所有

Introducing the E2IM framework

We further extend the model to illustrate a need for alignment in ethical norms and expectations. This dimension represents the potential of a conflict in ethical norms or frameworks, both within the organization and between the organization and the social communities it interacts with. (At this point, we are not prescribing a normative ethical framework.) An organization’s priorities may or may not align well with the overall ethical priorities expected by the culture the organization interacts with. This is the ethical expectation of the external stakeholder in the macro context. Organizational or corporate social responsibility is a factor in building trust with the public, and trust is often a vital component of an organization’s reputation. An organization that does not clearly uphold the rights of its customers, or align with their ethical expectations, runs a large reputational risk that may affect not just the organization itself but the sector it is in. A telling example of this is the focus that is being brought to bear on online advertising and social media in the wake of allegations of interference by foreign powers in elections and referenda. While the impact of psychometric targeting by companies such as Cambridge Analytica has not been clearly measured, large-scale advertising purchases by hostile countries that fed the ‘filter bubble’ effect and attempted to directly influence potential voters in various global elections has been a notable development in propaganda tactics (FBI, 2018; Frier, 2017). Misinformation, and more direct incitement to violence and even genocide, are pressing public concerns that highlight friction between societal expectations, social media companies’ stated values, and the priorities and actions highlighted by actions taken and outcomes. For example, one of a succession of whistle-blowers on Meta’s practices (formerly Facebook) described this misalignment, testifying to the US Senate that despite Meta’s publicly stated values, ‘The company’s leadership knows ways to make Facebook and Instagram safer and won’t make the necessary changes because they have put their immense profits before people’ (United States Senate Committee on Commerce, Science and Transportation, 2021). A risk-based approach may be used to help define a proactive, principlesbased strategy to work towards outcomes that align with a rights-based ethical framework. Peter Young argues that ethics may be considered a risk issue and a management issue, noting that high-profile scandals point out the ‘practical consequences of unethical conduct’ and stating that ‘organization leaders who espouse a belief that expectations for ethical behaviour have become part of the “risk environment” for top management. So, arguably, both stakeholders and managers view “ethical risk” management as

本书版权归Kogan Page所有

209

210

Data Ethics

important’ (Young, 2004). The ethical dimensions of business are of concern to an organization’s customers and stakeholders. However, the internal and external understandings of an organization’s ethics may not align. It is important to consider both the internal goals and values of an organization and the external values and expectations of the greater society. In looking at the morals manifest in business cultures, Steven P Feldman observes that organizations that place their primary priorities on competition and increasing shareholder values often have difficulty integrating their ‘competitive values’ or a focus on maximizing profit with the ‘moral values’ of the greater community. Most organizations with strong ethical values had a strong moral vision at executive level. Companies with a ‘clear moral vision’ integrated an ethical framework that defined the organization’s cultures and priorities and directed action, incorporating these values throughout all facets of the organization and extending them to interaction with the larger community. A siloed approach tends to be problematic. As Feldman says, ‘The lack of cultural integration between competitive values and moral ­values plagues many companies’ (Feldman, 2007). The results of such a lack of ‘cultural integration’ of organizational values and priorities have been seen recently in the scandal surrounding Volkswagen’s use of defeat devices, which we referenced previously. The illegality of using defeat devices to evade environmental regulatory standards is one sign of a disjunct between organizational and societal priorities, but the loss of trust in the organization that has followed shows that the mismatch between the values and ethical standards of the organization extends beyond the letter of the law. It is worth noting that the effects of the scandal are not limited to the organization itself. The consequences of the scandal have affected other automobile manufacturers, destroyed the resale value of diesel cars (Rogers, 2015) and resulted in more than one person going to prison (Atiyeh, 2019; Shepardson and White, 2017). An organization needs to understand its own values and priorities so it can communicate them and determine ‘right action’ or desired behaviour within the organization. To ensure outcomes that are considered desirable from the standpoint of a customer or the larger community, it is also necessary for you to understand how the organization’s ethics align with the larger community or societal ethics and expectations. These are the expectations of the external stakeholders of the outcomes they will experience as a result of the management and processing of information by your organization. The following steps are necessary to clearly determine and communicate the ethical framework for your organization:

本书版权归Kogan Page所有

Introducing the E2IM framework

1 Identify the priorities of the organization and desired behaviour in the organization. 2 Identify how the organizational ethic or priorities align with the larger societal ethical expectations. 3 Determine the desired outcomes and desired behaviour. 4 Ensure you have the tools to promote that outcome. The tools in this case may include standards to determine the appropriateness of an action or procedure, evaluation of the risks of adverse outcomes (including the possibilities of unintended outcomes), and a system of rights and accountabilities to ensure alignment of decisions and actions with priorities and ethical principles. Outcomes and the alignment of outcomes with customer expectations may also act as a sort of large-scale key performance indicator for the function of the ethical framework. To ensure effective alignment of information ethics, the ethical framework of an organization needs to be communicated across silos in the organization as part of the core values of the organization, rather than simply being a line item on a management agenda. The communication of values must be strategically aligned in the business vertical, but also needs to be aligned horizontally so that the information strategy vertical and technology vertical are implemented in a manner consistent with the ethical values of the organization. Where there is a disconnect, a failure to ensure appropriate alignment, it is inevitable that the stakeholders of the organization will ­experience outcomes that might not meet their ethical expectations. One way in which a lack of cultural integration of priorities into the organization may be observed is a ‘tick box’ approach to compliance. A strategic business decision to focus on regulatory compliance as a target is likely to result in a bare-minimum response and a reactionary approach rather than an active, strategic use of governance to ensure optimal ethical outcomes for stakeholders. However, a similar approach to compliance might also be the result of where the organization’s ethical framework solely prioritizes increasing monetary value for shareholders as an outcome. In this case, the organization’s desired outcomes may come into conflict with the expectations of the larger community that it is part of. This conflict of priorities within an organization is not unique to questions of data privacy and other information governance and compliance initiatives, but it is an age-old conflict in the application of ethics in organizations and society. The resolution of this conflict requires careful and diligent management

本书版权归Kogan Page所有

211

212

Data Ethics

of behavioural change to align organizational and societal ethics, and indeed to align the ethic of the individual actor to the desired value system. The alignment between the horizontal functional focus of the organization, and the alignment of strategic priorities and objectives at all levels in the organization, requires considered planning and engineering of the ethical information management culture and environment in your organization. The design and application of technology in support of business and ­information imperatives is an essential element to ensure that ethical standards are met. However, the specification for that technology, the use of that technology, the operation of controls, the communication of requirements, and the identification of and assessment of risks associated with technology require human actors to make ethical choices. Volkswagen’s engines misreported emissions in regulatory checks. They did so because the engine management software was designed to detect regulatory checking and to modify the engine performance characteristics for the duration of that test. That software behaviour was specified by people who defined the requirements for systems; it was coded by people who programmed the systems; it was accepted as desired and acceptable by people who wrote and executed software quality tests for those systems. People ignored external reports indicating that there was cause for concern. A series of ethical choices affected the ultimate delivery of an expected outcome to society (cleaner engines and lower emissions). These ethical choices affected the strategy for and governance of key information in the context of Volkswagen’s engine management systems. The pursuit of market growth drove a series of choices that served to undermine shareholder value in Volkswagen. It ultimately damaged trust in the German automotive industry, tainted other car manufacturers (regardless of their use of similar cheats), and raised questions over the effectiveness of government regulation in a number of jurisdictions. This presents us with a clear conflict between the ethical framework of the organization and the ethical framework of society that has resulted in a series of outcomes that fail to meet the expectations of society. The challenge, and opportunity, arises from the need to understand how to take the abstract concepts of ethics and implement them in a strategic framework for information management, such that informed and effective choices can be made for the governance of information that acknowledges, supports and enables the delivery of ethical outcomes.

本书版权归Kogan Page所有

Introducing the E2IM framework

Engineering ethical alignment Decisions and actions at all levels of the organization are coloured by and influenced by the organization’s ethical or moral priorities. At the outcomes level, the organization comes in close contact with the ethical framework of the larger society. On one hand, the organization’s attitudes towards the ‘customer’ are coloured by its ethical framework. On the other, the expectations of what is considered a quality outcome (process outcome or information outcome) by external ‘customers’ are shaped by the larger socioethical framework. A significant disconnect between social ethic and organizational ethic is likely to cause unsatisfactory outcomes and responses. Figure 7.3 shows a conceptual model for information management functions in the context of two nested ethical perspectives – the ‘ethic of society’ and the ‘ethic of the organization’. There is a third, the ‘ethic of the individual’. We address this aspect in Chapter 9 in the context of data governance for ethical data management, but in the interests of simplicity we do Figure 7.3  C  onceptual model of information management functions in the context of ethical frameworks Ethic of society

本书版权归Kogan Page所有

Stakeholder

Operations

Structural/ tactical

Strategic

Ethic of the organization Business

Information

Technology

Business strategy and governance

Information strategy and governance

Technology strategy and governance

Information architecture and planning

Technology architecture and planning

Management and application of information

Management and exploitation of IT Services

Business architecture and planning Business process management and execution

Process outcome

Expectation

Information outcome

213

214

Ethic of society Technology

Strategic

Business strategy and governance

Information strategy and governance

Technology strategy and governance

Business architecture and planning

Information architecture and planning

Technology architecture and planning

Business process management and execution

Management and application of information

Management and exploitation of IT Services

Operations

Customer education and information

Standards and codes

Information

Stakeholder

Law and regulation

Business

Structural/ tactical

Ethic of the organization

Process outcome

Information outcome

Expectation

Lobbying

Industry practices

Customer feedback and complaints

本书版权归Kogan Page所有

Figure 7.4  The Castlebridge Ethical Enterprise Information Management (E2IM) model

Introducing the E2IM framework

not represent it in the E2IM framework diagrams. Suffice to say that it is in an organization’s best interests to recruit and retain staff who best align with and exemplify the ethical values the organization espouses, and that society expects. This model is built around our extension of the nine-box Amsterdam Information Model discussed earlier in this chapter. In our consulting work, Castlebridge extend this model to include the ‘customer perspective’, which constitutes an expectation (or set of expectations) of how the information and process management capabilities of an organization will deliver desirable and expected outcomes for them (information outcomes and process outcomes) (Figure 7.4). The quality of the overall system of information management (the original nine-box model) is defined by how well the information and process outcomes produced by it meets or exceeds the expectations of the customer, in the form of an individual customer or as embodied by society as a whole. The influence and roles of ethical frameworks on the perceived quality of the system of information management arise in two distinct ways: 1 The ethic of society influences strategic and tactical governance and planning in an organization through the definition and enforcement of laws and regulations, and the development of standards and codes of practice to support the implementation of both legislative requirements and wider concepts of ‘good practice’. Customer feedback and complaints (the ‘voice of the customer’ in quality management terms) drive changes in organization business practices, information management capabilities and technology components. 2 The ethic of the organization can influence society through lobbying at a strategic level, contribution to establishing what ‘good practices’ are through benchmarking and contribution to standards working groups, and through education of the customer and the wider market as to the benefits of products or the societal value of the proposed information processing. Within the organization, the alignment of and execution of business, information and technology functions is generally achieved through the operation of processes, policies, controls and communication within and across organization verticals. This is illustrated in the diagram by the narrow vertical lines, as before. These represent the documented governance structures and procedures for ensuring and assuring alignment. However, the e­ ffectiveness

本书版权归Kogan Page所有

215

216

Data Ethics

of these lines of communication and governance can be heavily influenced by the ethic of society and the ethic of the organization, represented by the horizontal lines running parallel to the formal structures. Where an organization is strongly aligned with the ethic of society, then issues with, questions about and challenges to proposed strategies, methods and procedures for processing information that are at odds with that ethic will be more likely to be communicated and addressed to ensure an overall system of information management that will be capable of better meeting the expectations of customers in that society. But if the ethic of the organization is the dominant cultural driver in the organization, particularly if its values are strongly shareholder-theory oriented, we often find such challenges greeted with resistance, attempts to downplay or ignore the risks, or at times an almost bullying approach to obtaining and processing data even to the point of breaching applicable laws and guidance standards. In short: the decisions an organization takes regarding the implementation of an information architecture or an information governance framework are directly impacted by the manner in which the organization aligns and emphasizes its internal ethical framework with the ethical framework and expectations of society. The ‘tone at the top’ and the spirit of execution in the middle are essential to the effective implementation of an aligned governance model for effective ethical information management. Where the ethic of the organization runs counter to the ethic of society, or where the ethic of society has yet to fully appreciate the implications of a data-­ processing activity, we often find ourselves at the mercy of the ethic of the individual. This, in turn, is often subject to peer pressure or conflicts of ­priority and of objective. Stephen Feldman has described the split personality of business ethics in management as follows, ‘On one hand, they [managers] can develop a single-minded pursuit of profit that sometimes has difficulty even bridling itself at the boundaries of the law; on the other hand, business managers are ­socialized in communities where virtues of honesty, fairness and trustworthiness are held in high regard’ (Feldman, 2007). Unfortunately, this dichotomy of emphasis is not unique to commercial organizations. The single-minded pursuit of one perspective of value can ultimately lead to actions that run counter to commonly agreed ethical values. It is this dichotomy that leads to charities selling or renting access to their donor databases to list brokers without a lawful basis (because it helps make more money for the delivery of service), to government departments

本书版权归Kogan Page所有

Introducing the E2IM framework

demanding bulk data sharing without a clear legal basis and other necessary controls, and to researchers chafing against the constraints that must be placed on their use and exploitation of data to mitigate against unintended consequences of otherwise valid research goals. As concern about the ethical and societal impacts of data and data processing grow, we are seeing an increase in organizations such as Facebook beginning to invest in governance structures and control systems to counter ‘fake news’ and to introduce additional ethical and privacy controls into their business models (Culver, 2017). These are being introduced in response to feedback from customers and from society that the outcomes that are being delivered are unacceptable. What remains to be seen, however, is whether these changes are merely initiatives affecting the formal ‘black line’ controls within the organization or whether there is a meaningful realignment of the business, information and technology dimensions of the organization to address the core issues that arise. The initial resistance of Mark Zuckerberg to accept the potential for Facebook to have influenced the outcome of elections would appear to suggest there may be a disconnect between the ethic of the organization and the ethic of society at the strategic level that could impede meaningful change. In November 2017, Facebook was scheduled to appear before a Senate Committee hearing (an example of the ‘law and regulation’ influence of the ethic of society). Media reports suggested that senior executives will not be present, but instead would be attending an investor conference call (Shinal, 2017). The hearing was attended by Facebook’s General Counsel, not senior executives (US House of Representatives Committee Repository, 2017). While Zuckerberg and other Facebook executives did attend later hearings in the United States, the EU and other jurisdictions, the ‘tone from the top’ was clear: answering to shareholders was more important than answering to legislators and elected representatives. This ‘tone from the top’ of shareholders before stakeholders does not bode well for the sustainability of changes in ethics practices or thinking in the organization. However, in an organization that maintains a balance of priorities that align with the socioethical framework, what is understood to be a quality outcome by the organization should also align with societal expectations. The challenge lies in addressing ethical alignment in the philosophies and strategies for information management in organizations. This requires both an emphasis on introspective re-evaluation of ethics by the organization, as well as an approach to educating and communicating with society about the ethical frame being applied in the organization to the proposed processing.

本书版权归Kogan Page所有

217

218

Data Ethics

In cases where there is a significant disconnect between the two ethical frames outlined, it also requires a clear articulation to society (the customers) as to how the proposed processing is to the benefit of society, even if it requires an evolution of the ethic of society to permit the processing. In this way, the expectation of information and process outcomes, and the perceived and experienced quality of the outcomes delivered by the system for information management in the organization, can be more appropriately established and aligned in a way that not only supports a balancing of at least two potentially competing ethical perspectives but may contribute to an improved quality of ethical practices in relation to information in ­organizations and society alike. The basic principles of human rights, human dignity and the concepts of Kant’s ‘categorical imperative’ (treating the human individual as an end, not just a means) might be used as foundational checkpoints to test outcomes against expectations of quality in an ethical framework.

The analysis of utility of ethical impact The outcomes of different actions naturally vary greatly from small effects to extremely large impacts on quality of life. Possible consequences of an action or option can vary from annoyance to fatal. A pragmatic, utilitarian way to measure this may be to apply a basic risk and impact analysis on the actions planned, determining likely consequences of an activity, the severity of impact these consequences might have, and whether there are any controls in place (such as legal regulations) to mitigate this. Two questions for you to ask at this stage are: 1 Are there societal controls in place to ensure human dignity is upheld in this case? 2 What organizational or technical controls can we put in place to ensure human dignity is upheld? The question of controls includes both external controls such as regulations and internal controls to ensure actions are limited to avoid violating rights. These controls may be as simple as ensuring that individuals are made aware of the purposes of processing, the basis of processing, and the identity of entities or categories of entities that data may be shared with. The importance of this principle in EU Data Protection law was reinforced by the Bara case in the European Court of Justice (Court of Justice of the European Union, 2015). Dignity may not require consent to be obtained (in

本书版权归Kogan Page所有

Introducing the E2IM framework

Bara the Romanian government agencies had a statutory basis for its data sharing), but it does require that there be an awareness of the nature of the proposed processing. Table 7.1  Ethical risk–impact analysis matrix Action/decision Mandate mobile phones of minors have ‘net nanny’ software installed so that parents can ‘protect’ children

Possible consequences ●●

●●

●● ●●

Retain data regarding the sexual life of customers instead of securely deleting

本书版权归Kogan Page所有

Probability Impact

Loss of sense High of autonomy on the part of young people False positives on activity

Medium

Controls ●●

●●

●●

Loss of trust Vulnerabilities in software may expose minors to risk

Possible Medium exposure of highly sensitive personal information, causing distress, impacts to reputation, social position

●●

Privacy impact assessment Education and training of parent and child Limit possible surveillance activities (reduce functionality) Develop app using secure coding principles and standards

Medium External control: to high ●● Data protection regulations mandate that data is retained no longer than necessary Internal controls: ●●

●●

●●

Privacy impact assessment Define retention periods Encrypt data (continued )

219

220

Data Ethics

Table 7.1  (Continued) Action/decision

Possible consequences

Probability Impact

On retiring of a legacy telecom programme, send an automated message to customers who were previously subscribed to the programme, informing them that they have opted out of the programme

Confusion and High distress of customers who are led to believe there is unauthorized activity on their account

Low

Analyse internet search results to determine interests of individual for advertising purposes

Perception of surveillance has chilling effect on willingness to search for knowledge, intellectual freedom

Medium

High

Controls Internal control: suppress messages to customers who had changed programmes before a particular date

●●

●●

●●

Anonymize data Create large enough clusters of data to mitigate direct targeting of individuals Educate users about ad blockers

Table 7.1 represents a possible simple risk–impact analysis focused on the impact of proposed actions on privacy and human dignity and some possible controls to mitigate the risk of violating rights. This type of analysis is similar to a traditional risk analysis in which the probability and impact of the consequences of an action can be identified and assessed, and the relevant controls to mitigate and rebalance that risk are identified. In the context of privacy-impacting processing, this type of analysis is a key component of a privacy impact assessment, going beyond basic ‘tick box’ checks against statutory requirements. Instead it ensures a focus on first principles of ethical behaviour, combined with regulatory requirements and the influence of other externally defined standards. In cases that touch upon fundamental human rights, the risk appetite of an organization should be low. This requires that the organization has a clear

本书版权归Kogan Page所有

Introducing the E2IM framework

understanding of the balance and trade-offs between its goals, as expressed through the ethical framework of the organization, and the expectations of its customers, as expressed through the ethical framework of society. This highlights the importance of impact analyses such as privacy impact assessments, and the need to anticipate in planning and design which areas may impinge upon human rights and ensure controls are in place to mitigate risk and uphold human dignity.

Ethics and Big Data In Chapter 1 we introduced the European Data Protection Supervisor (EDPS) in the context of the regulatory focus on information ethics in Europe. We examined some of the core concepts the EDPS was promoting, from the perspective of the ethical models that they seemed to be aligning with. In the paper ‘Towards a new digital ethics’ (EDPS, 2015) the EDPS has thrown a clear focus on ethics and human dignity into the overall discussion of data protection and privacy. The EDPS opinion identified four key themes through which human dignity can be preserved through ethical practices in ‘big data’ (Figure 7.5). The framework we have outlined in this paper aligns with these themes and Figure 7.5  The EDPS vision for ethics and dignity of individual in Big Data (adapted)

本书版权归Kogan Page所有

Future-oriented rules and enforcement

Accountable controllers

Ethics

Dignity

Empowered individuals

Innovative privacy engineering

221

222

Data Ethics

provides a model for the practical implementation of strategic, tactical and operational governance models for information in organizations. The E2IM framework provides a basis to understand and implement the principles that the EDPS has set out in the opinion on ethics in big data.

Future-oriented rules and enforcement In our framework, legal and regulatory rules are the input of society into the ethical framework of the organization. This input happens at the strategic level to influence the strategic and governance decisions for business, information and technology. Once the voice of society is heard through externally imposed rules, these need to be internalized into the ethical framework of the organization, cascading down from strategic to operational decision makers, and aligning across the three fundamental activity domains of the organization (business, information and technology). The organization can seek to influence rules at the strategic level through lobbying activities, which would include traditional lobbying of legislators but would also include education of wider society about the nature and scope of proposed processing and the trade-offs and benefits. Regulatory rules need to be explicit enough to be meaningful and enforceable but not so prescriptive as to prevent their evolution in response to changes in the potential application of emerging capabilities in technology or to changes in the wider ethical framework of society. Of course, without effective and visible enforcement, particularly in a form that has consequences at the strategic level in the organization, there will be inevitable misalignment of objectives and governance within the organization. This enforcement needs to be meaningful to counteract the conflicts of priorities identified by Feldman and others, which we discussed earlier. It is tempting to believe that the influence of the ‘court of public opinion’ would play a role here. However, this societal penalty may only be as long-lived as the news cycle, hence we do not include it at this level in our framework. Financial and criminal sanctions against organizations and individuals help personalize the need to align the ethic of the organization with the ethic of society. Ultimately, both brand pressures and other sanctions will provide a ‘carrot and stick’ in the context of enforcement as the ‘customer expectation’ of information or process outcomes might be sufficiently negative as to dissuade people from buying a product, using a service, or sharing full and truthful information with a government agency.

本书版权归Kogan Page所有

Introducing the E2IM framework

Accountable controllers The EDPS tells us that: ‘Accountability requires putting in place internal policies and control systems that ensure compliance and provide relevant evidence in particular to independent supervisory authorities’ (EDPS, 2015). This requires formal planning for the implementation of and execution of defined systems of governance for business functions, information assets and technology platforms. In particular, the ability to generate and produce consistently reliable evidence for the operation of controls over the processing of data is essential. The EDPS has argued for more responsible initiative on the part of businesses. These we identify as ‘standard practices’ that might emerge from within an organization and which might be held up as being of benefit to its wider industry or to society (we refrain from using the term ‘best practice’ as this implies no scope for continuous improvement). The EDPS also identifies guidance from data protection authorities, codes of conduct, certifications and other mechanisms to support accountable behaviours in the organization. Another sub-theme in the EDPS commentary on ‘accountable controllers’ is the importance of proactivity and transparency of processing in ensuring robust trust. Our framework represents this through the explicit focus on the customer’s expectations of information and process outcomes and the customer feedback loop.

Empowered individuals The EDPS opinion discusses the need to recognize that individuals are empowered, but also to provide the ability for individuals to exercise power and control over their data and how it is to be used. It discusses the concepts of prosumers, consent and data ownership. These reflect the interplay between the individual as an actor in society and the organization. This societal expectation of the types of process and information outcome that an organization should deliver, and the ability of the organization to meet these expectations, defines the overall quality of the system of information management in an organization to support human dignity through the application of ethical principles and practices. Educating the customer about the uses of data, and avoiding the pitfalls of assuming – without appropriate explanation, lawful basis or consent – ownership of someone else’s data that is linked to their individual personality, is one approach to empowering individuals. Providing mechanisms for

本书版权归Kogan Page所有

223

224

Data Ethics

individuals and society to provide feedback on how data is being processed, and the impact on human dignity, is another. However, for these mechanisms to be effective in practice, the organization needs to ensure appropriate alignment and governance of the business, information and technology functions that contribute to the delivery of the expected information and process outcomes. Part of that governance is an ability to respond to and adapt governance controls to feedback from society, whether it is represented by an individual, a civic society organization or a regulator. Ultimately, as the EDPS points out, in the balancing act between personal data privacy and other concerns such as public interest and the rights of others, human dignity is a constant that must be respected at all times. This right is best supported through mechanisms for governance of information, which allow the ‘voice of the customer’ to be heard and their dignity to be recognized.

Privacy-conscious engineering Giovanni Buttarelli, the former European Data Protection Supervisor, tells us that: Human innovation has always been the product of activities by specific social groups and specific contexts, usually reflecting the societal norms of the time. However technological design decisions should not dictate our societal interactions and the structure of our communities, but rather should support our values and fundamental rights. (EDPS, 2015)

Buttarelli outlined many mechanisms and approaches by which this balancing of technology design against societal interactions and fundamental rights can be achieved – techniques such as metadata to tag records with their data protection requirements, data aggregation and empowerment of individuals through anonymity. A ‘first principles’-based approach building on an assessment of the proposed outcomes against their ability to support human dignity, and their alignment with fundamental concepts in ethical philosophy, is a key first step that you should take to implementing ethical information management practices. To incorporate these into effective day-to-day operative governance frameworks, you need to focus not just on technology but on the ‘business’ processes, functions and objectives that you intend such technologies to support and enable. Hence the importance of the E2IM framework in ensuring effective alignment of perspectives, strategies and practices.

本书版权归Kogan Page所有

Introducing the E2IM framework

This ‘principles first’ approach must, by its very nature, be based on an assessment of the proposed outcomes for society and the desired outcomes of the individuals on whose behalf you are processing this data. From there, your organization must engineer both your technology and the organizational ethics to ensure appropriate attention and respect is paid to ethical concerns such as privacy in a holistic governance environment, rather than this being a hasty afterthought.

Conclusion The vital importance of an ethics framework to govern the development and use of new technologies has been recognized again and again. New developments in information management tools and capabilities shine new light on the need to take steps to actively engage in determining a framework that ensures rights are upheld. A framework for ethical information management practices will need to look to the future to ensure processes are designed with regard to respect for human dignity and fundamental rights such as privacy and data protection. Communication of these values and ethics in an organization must be cross-functional and extend across silos, and will need to be supported by a governance framework that ensures accountability. Following good information governance practices and ensuring ethical requirements are considered at the beginning stages of the information life cycle will help to ensure that new developments in information processes and technologies enhance the dignity and empowerment of the person. In discussing the need for an ethical framework for modern information management tools, it is useful to ground yourself in first principles and to look back to lessons learnt in other areas and disciplines. Technology itself is neutral; our use of technology must be ethical. The fundamental requirement in any design or plan to use technology in a novel way is to ensure that the outcomes of the new use do not result in violations of human dignity, whether by design in which the individual is seen as a means rather than an end, or by unintended consequences of a well-intended process. Rather, from initial planning and design, the ethical values of upholding human dignity must be integrated and communicated as a vital consideration in the design and implementation of new technology and processes. A principlesbased, outcomes-focused framework may provide tools to determine priorities in the contexts of organizational and societal values in order to identify and mitigate the risks of adverse outcomes.

本书版权归Kogan Page所有

225

226

Data Ethics

CASE STUDY  Rape crisis centres and a government agency The Rape Crisis Network Ireland is a non-governmental organization (NGO) in Ireland that provides crisis support to victims of sexual assault. In 2017 it was asked by an Irish government agency that funds its activities to provide detailed information on users of its services. An online questionnaire was distributed that asked for very granular information, including seeking numerical breakdowns of service users by a range of criteria that would enable an individual to be singled out from the data. The Rape Crisis Network Ireland refused to provide granular information of this nature on the basis that it could infringe on the data privacy rights of these individuals as the state agency in question had the potential ability to identify individuals by cross-referencing with other data, and in any event the data could indirectly identify people. The state agency informed the Rape Crisis Network Ireland that its funding could be impacted it did not comply with the request to submit survey responses either online or via a hard-copy form. It was also advised by the state agency that it was to assume consent from the survivors of sexual assault for the processing of particularly sensitive personal data. The Rape Crisis Network Ireland, in consultation with its legal advisors and specialist data privacy consultants, responded to the survey using the hard-copy forms, but provided answers that were aggregated insofar as was possible to mitigate the risk of data being identifiable (e.g. rather than asking for specific numbers in a category of service user, it provided a range). This was deemed unacceptable by the state agency in question and the Rape Crisis Network Ireland organization suffered an impact to its funding that impacted its own internal research and data analysis capabilities. Case study discussion questions 1 What ethical issues arise here? 2 How would you go about assessing the ethical issues in this case study? 3 What normative model of ethics was the rape crisis network applying? Why? 4 How might the data gathering and analysis have been done differently? 5 What role might the E2IM framework play in helping to assess the issues in

this case study and plan for data-gathering activities?

本书版权归Kogan Page所有

Introducing the E2IM framework

Chapter summary In this chapter we introduced the E2IM model for Ethical Enterprise Information Management. ●● ●●

●●

●●

●●

We provided an overview of conceptual models for information strategy. We provided a model that explicitly reflects the role of stakeholders in the ethical information management process. We explored the application of the E2IM model, including the importance of the feedback loops to ensure alignment between the ethic of society and the ethic of the organization so that there is alignment between both and stakeholder expectations will be met. We examined a number of real-world scenarios to demonstrate the application of ethical information management principles. We explored how the E2IM model can be used to align with and address the increased regulatory focus on ethical information management, particularly in a European context.

Questions 1 How might the culture of your organization affect the ethical choices that are taken within the overall governance models adopted? 2 How might the concept of ‘ethic of society’ and ‘ethic of organization’ and their interplay with formally defined data governance and information architecture explain some of the failings of organizations to properly apply or reflect ethical values in the delivery of products or services? 3 Is ethical information management a ‘one off’ activity or should organizations be applying a continuous improvement approach to ensuring alignment of the ethic of the organization with the ethic of society? How might that be achieved?

Further reading While not directly related to the issues of Information Ethics, the Opinion on accountability published by the Article 29 Working Party (aka the European Data Protection Board, post May 2018) highlights a number of areas that are relevant to the E2IM model.

本书版权归Kogan Page所有

227

228

Data Ethics Article 29 Working Party (2010) Opinion 3/2010 on the principle of accountability, 13 July, ec.europa.eu/justice/article-29/documentation/opinion-recommendation/ files/2010/wp173_en.pdf (archived at https://perma.cc/Z76E-CFC4)

References Court of Justice of the European Union (2015) Case C-201/14 Smaranda Bara and Others v Presedintele Casei Nationale de Asigurari de Sanatate and Others, EUR-Lex, eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX:62014CJ0201 (archived at https://perma.cc/W68Q-CJTX) Culver, K B (2017) The ethics of Facebook’s fake news dilemma, The Observatory, 7 February, observatory.journalism.wisc.edu/2017/02/07/the-ethics-offacebooks-fake-news-dilemma/ (archived at https://perma.cc/6J3Z-VWN9) EDPS (2015) Towards a new digital ethics: Data, dignity and technology, European Data Protection Supervisor, 11 September, edps.europa.eu/sites/edp/ files/publication/15-09-11_data_ethics_en.pdf (archived at https://perma.cc/ ZS7W-59Q5) FBI (2018) Joint statement on election day preparations, 5 November, www.fbi. gov/news/press-releases/press-releases/joint-statement-on-election-daypreparations (archived at https://perma.cc/CVA9-VME2) Feldman, S P (2007) Moral business cultures: The keys to creating and maintaining them, Organizational Dynamics, 36 (2), 156–70 Frier, S (2017) Facebook plans big overhaul of political ads after criticism, Bloomberg UK, 21 September, www.bloomberg.com/news/articles/2017-09-21/ facebook-says-it-will-release-russian-election-ads-to-congress (archived at https://perma.cc/YR3Q-2XYQ) Henderson, J and Venkatraman, N (1993) Strategic alignment: Leveraging information technology for transforming organizations, IBM Systems Journal, 32 (1), 472–84 Maes, R, Rijsenbrij, D, Truijens, O and Goedvolk, H (2000) Redefining business – IT alignment through a unified framework, white paper, June, Universiteit van Amsterdam Rogers, C (2015) Kelley Blue Book: Volkswagen diesel car values decline 13%, Wall Street Journal, 6 October, www.wsj.com/articles/kelley-blue-bookvolkswagen-diesel-car-values-decline-13-1444147701 (archived at https:// perma.cc/A2B6-P4CK) Shepardson, D and White, J (2017) VW engineer sentenced to 40-month prison term in diesel case, Reuters, 25 August, www.reuters.com/article/ idUSL2N1LA1OU (archived at https://perma.cc/P5TP-34G7)

本书版权归Kogan Page所有

Introducing the E2IM framework Shinal, J (2017) Facebook probably won’t send Zuckerberg or Sandberg to testify before Congress, says source, CNBC, 4 October, www.cnbc.com/2017/10/04/ zuckerberg-sandberg-not-likely-to-testify-before-congress-source.html (archived at https://perma.cc/3EDC-896G) United States Senate Committee on Commerce, Science and Transportation (2021) Statement of Frances Haugen, 4 October, www.commerce.senate.gov/services/ files/FC8A558E-824E-4914-BEDB-3A7B1190BD49 (archived at https://perma. cc/GGY7-ZRJR) US House of Representatives Committee Repository (2017) Russia Investigative Task Force Hearing with Social Media Companies (Open), docs.house.gov/ Committee/Calendar/ByEvent.aspx?EventID=106558 (archived at https://perma. cc/PT2T-M7CA) Young, P C (2004) Ethics and risk management: Building a framework, Risk Management, 6 (3), 23–34

本书版权归Kogan Page所有

229

230

Information ethics as an information quality system

08

What will we cover in this chapter? Quality is often defined as ‘consistently meeting or exceeding customer expectations’. In the Castlebridge framework we discussed in Chapter 7, the ‘customer’ is identified as an affected stakeholder and could be an external customer using the goods and services of your organization, or an internal customer using information that your organization has obtained, or some other member of society who is affected by the process or information outcomes that are delivered by the organization. In this chapter we will:

●●

●●

●● ●●

●●

Examine the concept of data ethics as data and information quality systems. Identify the role of normative business ethics in the delivery of quality or quality outcomes. Explore a methodology for information quality assessment. Explore the parallels between information quality management and ethical information management. Identify how information quality management principles and techniques can be applied to support ethical data management objectives.

本书版权归Kogan Page所有

Information ethics as an information quality system

Ethics as a quality system The concepts in this chapter are arguably the reason the rest of the book exists. Not long after we started working together, Daragh asked Katherine to put together some quotes from W Edwards Deming for a presentation on information quality for a client. Katherine was struck by how many of Deming’s statements had an ethical thrust to them and started a game of replacing the word ‘quality’ with ‘ethics’. This was one of the starting points in our journey to discover how information management tools could be used in the application of data ethics. What is ‘good’, or what is ‘the good’? How do we decide what is good and what is the right decision or action? How can we systematically ensure people make the right decisions and actions and promote good outcomes? Quality management and ethics ask some similar questions from very different perspectives. In an article in the Electronic Journal of Business Ethics and Organization Studies, Larry Pace (1999) defined quality as ‘doing the right thing the right way the first time every time’. Depending on your preferred source attribution, either W Edwards Deming or Henry Ford told us that ‘Quality means doing it right when no one is looking.’ As Pace points out in his article, these definitions of quality immediately begin to draw our quality thinking to ethical questions. What is the right thing? Who gets to decide what is right? A quality systems approach to data ethics is essentially consequentialist, at least in some respects. At a deeply practical level, you need to consider what the outcomes of actions will be, and whether those outcomes match expectations, and have some ability to respond. As you learnt when we discussed the E2IM model in Chapter 7, those expectations are both the expectations of individual stakeholders and the wider expectations of society as to what is ‘right’ (see Figure 7.4). In the recent criticism and concern around social media platforms such as Facebook and Twitter, whether it is the potential for them to be used to subvert democratic processes or the proliferation of hate speech and bullying of vulnerable individuals, we see this consequentialist drama playing out. The same is happening in the context of online behavioural advertising and the associated data analytics processes. The technologies and the platforms that have evolved have resulted in information and process outcomes that society, as a collective whole, feel don’t match their ethical expectations. This is triggering disruption in the industry and pushing the end customers to modify their use (Griffith, 2016) or abandon social platforms entirely (Haque, 2016).

本书版权归Kogan Page所有

231

232

Data Ethics

Umair Haque (2016) flagged this issue for social media platforms when he wrote in the Harvard Business Review that ‘learning to produce highversus settling for low-quality interactions is one of the great challenges of competence for institutions today’. Thirty-one years earlier, Kaoru Ishikawa, the pioneer of quality management in Japan, summarized the ethical dimension of quality in a way that should resonate profoundly in today’s information age (Ishikawa, 1985): ‘In management, the first concern of the company is the happiness of people who are connected with it. If the people do not feel happy and cannot be made happy, that company does not deserve to exist.’ Ultimately, quality is an inherently ethical concept, and it could be argued that many of the challenges you can face when trying to implement information quality management principles in an organization have their root in the dominant normative business ethic in the organization. Organizations that are dominated by a shareholder value ethic may be resistant to quality practices that require short-term costs. This was identified by W Edwards Deming, in his foundational book Out of the Crisis (1986), where he described ‘emphasis on short-term profits’ as one of the ‘Seven Deadly Diseases of Management’, along with running an organization on visible numbers alone. This focus on short-termism could even be a key root cause of some of the failures of quality management in Western organizations, where the tools of quality management are often applied pragmatically to cost reduction or improvement of productivity to improve the bottom line in the organization. While these goals are present in Japanese and Asian approaches to quality management, the cultural approaches to quality adopted in these countries tend to be more humanistic and holistic in their approach. Quality is considered an explicitly ethical value. In the words of Larry Pace (1999), the Japanese in particular ‘approach quality from the perspective of human happiness’. We have many ways to define what is ‘good’, whether we are asking what ‘quality’ is or what is ‘ethical’. Compliance to legislation is a bare minimum for outcomes to match societal expectation. This corresponds to the shareholder value normative model of ethics that you learnt about earlier in this book. Essentially, this model of quality is whether you or your organization have been caught doing something illegal. The level of ‘good’ in this context is often measured by the level of potential penalty or the severity of impact on the organization that might arise from any associated negative publicity. The organizational ethic of ensuring you do not violate civil rights legislation in your hiring practices or do not do business with firms who engage in

本书版权归Kogan Page所有

Information ethics as an information quality system

slavery to deliver their goods or services are two examples of this ethical value in action. Doing the minimum necessary to comply with data privacy laws would be another example. In some cases, organizations taking this ‘bare minimum’ approach may not even work to comply with laws or societal expectations and will instead calculate the expected fines for getting caught not complying into the cost of doing business. Their sole metric for ‘good’ is quarterly shareholder profits, and the profits made by non-­ compliance exceeds the cost of the fines. An organization that excels, that builds trustworthiness and confidence in its quality of product, exceeds the bare minimum expectations of legal, differentiating itself on its ‘quality’. According to Deming, good quality means a predictable degree of uniformity and dependability with a quality standard suited to the customer. This definition requires a standardized approach to understanding what constitutes a desirable outcome for the customer. In an ethical context, this requires a formal balancing of often competing interests, perspectives and rights. As such, it aligns with the stakeholder-theory model of ethics we discussed in Chapter 2. The organization must consider who its stakeholders are, what their needs and expectations are and what the ethical priorities of these representatives of society are, and put controls in place to ensure that those desired outcomes are consistently and measurably delivered. In other words, it requires a system of clearly communicated values and accountability. It also requires mechanisms that will allow the organization to measure where stakeholder expectations are not being met and react accordingly, but also to identify when the wrong metrics of stakeholder satisfaction are being used to drive decisions. Self-policing and effective mechanisms for feedback and response become essential when the driver for changes to process and information outcomes is not the action of a regulator or law-enforcement body. The social justice perspective on ethics aligns with the quality philosophy of exceeding the expectations of customers, not just meeting them. It requires an assessment of ‘good’ and ‘right’ based on wider social values and a consideration of the impact of data processing and data management activities on the wider fundamental rights and freedoms that underpin a very well defined and communicated set of internal values within the ethic of the organization, but also within the ethic of the individuals who make up that organization. Just as with organizations that seek to meet expectations above basic legal compliance, organizations that are trying to exceed the expectations of their stakeholders need to ensure that there are mechanisms defined in the organization to measure where expectations are not being met

本书版权归Kogan Page所有

233

234

Data Ethics

and react accordingly. It is even more important that organizations pursuing a social justice model of ethics have mechanisms to identify when they are using the wrong metrics for feedback or where their perception of social justice is not striking the correct balance and could be delivering undesired process or information outcomes. Where the ethical standards expressed in the ethic of the organization are aligned with the expectations of stakeholders, as expressed through the ethic of society, the organization will be viewed to be at least meeting a baseline ethical standard in the conduct of the business. Ultimately, the development of ethical standards in organizations and society is intended to reduce the frequency of occurrence of unethical actions through consequences tied to the outcomes produced. Positive outcomes receive positive rewards: increased revenue, increased market share, reduced customer dissatisfaction, improved citizen trust in government processes. Negative outcomes receive negative rewards: loss of business, loss of revenue, distrust of government processes. In this way, the evolution of ethics in an organization is analogous to the development of quality standards and systems in organizations. In that context, the practical development of ethical information management methods and practices in an organization should be able to draw on established quality management and information quality management practices.

Applying quality management principles to ethical information management A recurring theme in this book is the principle that the measure of ethics is the actions taken on the basis of an ethical framework. The quality of the outcomes arising from such action might therefore be the sole measure for ethics, from the consequentialist perspective. You have already seen how Kaoru Ishikawa equated the happiness of people connected to a company with the fate of the company. When we consider quality management and information quality, we are often tempted to look to published standards to see what they might tell us about how to apply ethical concepts in a practical context. However, traditionally, standards lack an explicit ethical dimension. As such, organizations often wind up doing things that are perfectly legal but are unethical or potentially unethical, even when following wellestablished quality management standards such as ISO 9001 or ISO 9004 (Stimson, 2005). In the real-world application of ethics in the management

本书版权归Kogan Page所有

Information ethics as an information quality system

and use of data, we look to decisions and actions taken on the basis of an ethical framework, and to the outcomes of those decisions and actions as reflected in the outcomes of the data processing. The quality of the outcomes arising from such actions will always be a fundamental metric here – even if you do not start from a consequentialist framework – because the outcomes are the effects on people. They are real benefits and harms to people. While there is extensive work under way in recent years across standards bodies such as IEEE and ISO to look at standards for ethics, particularly in information management and the Internet of Things (IoT) and ‘big data’ technologies, many of the tools and techniques that you will need to adopt in an ethical information management context can be found in, or adapted from, fundamental principles and practices in quality management and information quality management. In Chapters 1 to 5 you learnt about the ‘first principles’ perspectives on the philosophy of ethics and how they apply to information management; we will now look at some of these fundamental quality principles and practices.

W Edwards Deming’s 14 points and 7 diseases In his book Out of the Crisis (1986), W Edwards Deming set out what he described as a ‘System of Profound Knowledge’ for quality management and organizational improvement. As part of that system, he set out 14 points for the transformation of businesses, along with 7 ‘deadly diseases’ of management, which he warned organizations to avoid. While not all of them are directly relevant to the discussion of ethical management, Stimson identifies 8 of the 14 principles as being directly relevant to the discussion of ethics and the development of ethical frameworks in organizations. Indeed, Stimson (2005) refers to Deming as a source for deriving a ‘secular basis for ethical behaviour from the tenets of quality’. Furthermore, when we look at many of the challenges that are facing some of the leading ‘born on the internet’ businesses, Deming’s fundamental principles appear prescient. Stimson’s assessment of the alignment between Deming’s 14 points for transformation looked at their relationship to business ethics and identified eight principles that were directly relatable to the broader topic of ethics. In the context of information ethics, and with the benefit of our model set out in Chapter 7, Deming’s principles provide a broader base for ethical information management than that identified for ethics in general. We summarize this in Table 8.1.

本书版权归Kogan Page所有

235

236

Table 8.1  Deming’s 14 points for transformation mapped to ethics Deming’s original principle 1

Create constancy of purpose

2

Adopt the new philosophy

3

Stimson O’Keefe/ Comment O Brien •

It is difficult to embed ethical principles at the front line if your organization’s values change frequently



Management need to wake up to the importance not just of quality data but of ethical data management practices

Cease dependence on inspection to achieve quality



Deming’s point here was that inspection does not improve quality, and the best strategy was to improve processes to reduce variation around the standard

4

End the practice of awarding business based on the price tag



In the modern data world, it is cheap to outsource processing to third parties, but the ethical supply chain for data services should be considered

5

Improve constantly and forever



Deming’s principle addresses continuous improvement of processes to eliminate the causes of error. In an ethical context, this also means continuously evolving the expression of ethical values and the need for organizations to recognize when the ethic of the organization is at odds with the ethic of society

6

Institute training on the job



Deming believed well-trained employees are more inclined to do their best. However, he also highlighted that expecting staff to do their best without providing a framework of knowledge would lead to confusion. In the context of information ethics, this is essential to align individual ethic with organization and society

本书版权归Kogan Page所有





7

Institute leadership





Deming called on organizations to develop leadership and leaders to help people do a better job. This was a mandate for empowerment and delegation of stewardship roles through the organization. Ethical leadership is also important – empowering staff to look behind data to understand the information and process outcomes being delivered

8

Drive out fear





In the context of ethical information management, staff should be able to speak ‘truth to power’ and question the business decisions, information models and technical architectures being implemented

9

Break down barriers between departments





One of the key challenges we see in organizations is the continued dominance of silo-thinking. Improving communication between departments helps support the evolution of the ethic of the organization and alignment with the ethic of society. It also helps avoid ‘groupthink’ in relation to ethical issues

10 Eliminate slogans, exhortations and targets causing adversarial relationships





Deming’s point here was that the organization should avoid ‘management by soundbite’ that can create adversarial relationships between teams or between the organization and other stakeholders. In addition (and counterintuitively to the ‘data-driven’ mandate), running the organization

11 Eliminate management by numerical goals; substitute leadership





based on numerical goals and targets only is not advised. What Deming meant in this context was that management needed to understand the factors driving the numbers as well as the numbers themselves

237

本书版权归Kogan Page所有

(continued)

238

Table 8.1  (Continued) Deming’s original principle 12 Remove barriers that rob the worker of their pride in workmanship

Stimson O’Keefe/ Comment O Brien •

No one likes working for a company that is derided for doing unethical things or producing low-quality products or services. The barriers that can block pride in workmanship can include organizational culture or governance that prevent ethical concerns being raised and discussed. From an ethical perspective this is also a question of how the organization supports and promotes the dignity of their own staff. If there are ethical problems at the front line, the problem rests with the decisions made and processes implemented by management

13 Institute a vigorous programme of education and selfimprovement



Your staff need to be able and be encouraged to develop their skills and understanding of their role. They should be encouraged to learn new skills and perspectives. As technical education becomes increasingly specialized, it is increasingly important for people working in information management roles to look to other fields for potential solutions to the challenges we increasingly face

14 Put everyone in the company to work to accomplish the transformation



Just as with quality, ethical information management is not a job for the ‘ethics’ department. In the Castlebridge model, the operational front-line staff have a key role to play in the continued execution of ethical practices, but need to be supported by their peers elsewhere in the organization

本书版权归Kogan Page所有



Table 8.2 Deming’s 7 deadly diseases – the information ethics perspective Deming’s description

Relevant to ethics

The information ethics perspective

1

Lack of constancy of purpose



If the organization’s mission and values keep changing, it becomes difficult to sustain an organization ethic, so the organization defaults to the ethics of individual actors ‘doing their best’

2

Emphasis on short-term profits



Focusing on short-term profits and profit targets is a function of the shareholder-theory model of ethics. When the organization is focused on the next quarter’s bottom line, the risk

3

Evaluation of performance, merit Rating, annual review



of ethical issues in innovation or information processing being ignored or not considered increases. Likewise, where performance rating/merit rating processes create pressures on ethical behaviour, as the delivered outputs of processes are almost entirely the function of the processes and systems implemented

4

Mobility of top management



From a quality and ethics perspective, the mobility of top management creates issues because senior managers often are not around long enough to deal with the consequences of initiatives. On the other hand, top management who ‘get’ quality or ethics can often move out of organizations when they find themselves unable to effect change or when the ethic of the organization is at odds with the ethic of the individual. It also contributes to managers manipulating data or selectively reporting data to support their personal career progression

5

Running company on visible numbers alone



While Deming was a statistician by training, he understood the limits of numbers. He understood that there are often things that cannot be measured but still need to be managed. Deming stressed the need to understand the ‘why’ of numbers as well as the ‘what’. In the context of information ethics, this means avoiding causation and correlation errors and also considering the non-quantifiable aspects of processing activities

6

Excessive medical costs



These are the costs arising as a result of the remediation of process and information

7

Excessive legal costs



Outcomes. Either people are made ill (stress, medical error, etc) or the organization is sued 239

本书版权归Kogan Page所有

240

Data Ethics

Deming also wrote about what he termed the ‘7 deadly diseases of management’. Each of these impact on quality, but they also have an impact on the ethical management of the organization and information ethics in particular. Table 8.2 summarizes this perspective.

The Plan-Do-Study-Act cycle One of the fundamental techniques that was pioneered by Deming in the field of quality management was the Plan-Do-Study-Act (PDSA) cycle (Figure 8.1). This is often referred to as the Deming cycle but is more correctly attributed to Deming’s mentor, Walter Shewhart. This cycle is often mislabelled as the Plan-Do-Check-Act cycle and it is important to note that Deming stressed the importance of studying results rather than merely checking, and actively disavowed Plan-Do-Check-Act terminology (Moen and Norman, 2010). Much like the ethical principles you have read about earlier in this book, the PDSA cycle is the result of an evolution of thinking in scientific method principles. This cycle (in both forms) has seen widespread adoption across a number of disciplines, including studies in ethics in research and innovation such as the EU-funded Satori project, particularly in its work on a framework for creating ethics impact assessments (Reijers et al, 2016). Figure 8.1  The PDSA cycle

本书版权归Kogan Page所有

Act

Plan

Study

Do

Information ethics as an information quality system

We follow Deming’s emphasis on ‘Studying’ rather than ‘Checking’. Deming’s view was that checking rather than studying focused attention on simple success or failure of implementation, rather than understanding why the implementation succeeded or failed and developing the capability to revise expectations or revise the proposed model for action. This analysis component is essential in the context of ethical information management as it is through this reflection that you develop quantitative and qualitative understanding of how their processing and use of information delivers ­desirable information outcomes and process outcomes for stakeholders. It is also through this process that gaps between the ethic of the organization and the ethic of society can be understood and strategies developed to ensure appropriate alignment. The PDSA cycle forms part of what Deming described as a ‘Model for Improvement’. It is an analysis method that helps answer the following questions: ●● ●●

●●

What are we trying to accomplish? (What is our plan?) How will we know that a change is an improvement? (Do a pilot, study results.) What change can we make that will result in an improvement? (Study results, act on results.)

In the context of ethical data management, these questions form part of the basic questions we need to ask of any information-processing or information-technology adoption, a topic we will return to in a later chapter.

Understanding the PDSA cycle The PDSA cycle is an important tool in the quality systems toolbox, and it is likewise an important weapon in the arsenal of the data ethicist. As such, it is important that you understand the core principles of this deceptively simple tool. Plan In this phase of the cycle you need to define what your objectives are. What is it you are hoping to achieve through the new process or processing activity? This is the phase when the proposed information-processing activities are planned and the criteria for determining successful execution of the processes are identified. At this stage in the process you should be able to make some predictions as to the nature of outcomes from the processing. It is also at this stage, in Deming’s view, that you need to consider who is to do what during the execution of the processing.

本书版权归Kogan Page所有

241

242

Data Ethics

If you are familiar with the principles of Privacy by Design or have conducted privacy impact assessment or data protection impact assessment methods, you will recognize some distinct similarities between what Deming considered to be essential elements of the planning phase for the management of quality in organizations and the things that you need to be considering when assessing whether the processing of data about people infringes on their ‘right to be left alone’, or whether the processing activities as proposed strike an appropriate balance between the rights of the individual and the objectives of the organization. Deming stressed the importance of identifying the who, what, when, where and how of the proposed process at this stage. You will recall that these are the key interrogatives that form the vertical dimensions of the Zachman framework, which we discussed in Chapter 6. You will recall that the Zachman framework also includes a ‘Motivation’ column, corresponding to the fundamental question of why a function is being performed and why particular data is being used for that purpose. While not explicitly referenced in the PDSA cycle, as it is commonly taught and understood, Deming implicitly referenced the importance of considering the ‘Why’ questions. In Out of the Crisis (1986) he posed the questions set out in Table 8.3. Table 8.3  D  eming’s ‘Motivation for Quality’ questions – mapped to data and information ethics Deming’s question

The ‘Why’ corollary in information ethics

What would be the effect if your organization stopped producing its products and services?

What is the value or purpose that is served by the information processing activity? What would happen if you stopped (or didn’t start)? Why are you doing this?

How do your errors affect your immediate customers?

Why should you prevent errors and ensure the right process/information outcomes are delivered? What is the impact on the individual?

How far beyond your immediate customer can you trace the effect of what you do?

Why would your errors or successes impact on others? Why is that important?

What would happen to you Why is the lineage of data important and why if your suppliers did not do would defects in that information supply chain their job? matter to your organization and/or the people whose data you are processing?

本书版权归Kogan Page所有

Information ethics as an information quality system

Do In the ‘Do’ phase of the PDSA cycle you start to execute your plan and carry out your processing activities. You identify and document problems or unexpected outcomes. Crucially, you need to start gathering some data about how well things are going (or not). Deming recommended doing small-scale or pilot projects. In the context of information management and information ethics, this might be achieved most cost-effectively by whiteboarding the process, engaging in focus groups with stakeholders, or implementing the process on a small scale. An example of this is how social media platforms sometimes roll out changes to features, algorithms or presentation of information in smaller markets. This lets them test the implications and impacts of their changes to see how they will be accepted (or not) by users, and whether they will deliver on the other objectives of the company. For example, Facebook often trials changes to its news feed in discrete markets to see what the impact might be. In October 2017 it trialled a change to news feeds in six countries, which saw non-promoted posts moved out of the main news feed into a secondary feed. Posts from family, friends and paid-for promoted posts remained in the main news feed. The impact on users has been a dramatic drop in engagement with Facebook pages of up to 80 per cent (Glenday, 2017; Hern, 2017). Study ‘Study the results. Do they correspond with hopes and expectations? If not, what went wrong? Maybe we tricked ourselves in the first place and should make a fresh start’ (Deming, 2000). In this simple paragraph, Deming encapsulated what we need to do, and why simply ‘checking’ is not enough. You need to analyse the data you have about the processing activities and identify what has happened. This needs to be compared to the predictions and assumptions made during the ‘Plan’ phase. Importantly, it needs to be summarized to document what has been learnt and identify the process and information outcomes that have resulted from your activities. In a data ethics context, you might want to consider whether anyone raised unforeseen scenarios as you rolled out your new systems and processes. Did you get complaints or negative feedback? (Remember, in the E2IM framework complaints and feedback to the operational level of the organization are important signals that the ethic of the organization and the ethic of society might be misaligned and the information and/or process outcomes you are delivering are meeting expectations.) In the Facebook example above, studying the impact on the reach of nonpromoted sharing may illustrate that there is a negative for organizations

本书版权归Kogan Page所有

243

244

Data Ethics

that have built their models on free content distribution through Facebook, as opposed to paid-for content. Cynics might suggest that this meets Facebook’s objective of increasing its paid-for advertising revenues. However, further study of the processing and potential outcomes might reveal that this has a social benefit in curtailing the ‘fake news’ epidemic that dogged the organization through 2017. Changes made by Facebook to the News Feed algorithm in October 2017 appear to have addressed content published by organizations differently to previous changes in this processing. Act If the sole medium of expression for ethics is action, to paraphrase Jane Addams, then this phase of the PDSA cycle is perhaps the most pertinent. Deming (2000) sets out three options that you have at this point in the cycle: ●●

adopt the change;

●●

abandon the change;

●●

go around again, changing some of the input variables.

These decisions will be informed by the analysis in the ‘Study’ phase of the cycle. But that analysis will require you to have made some predictions about what the outcomes should be and whether they will be acceptable to your customer or other stakeholders.

Special and common causes in Deming’s ‘System of Profound Knowledge’ Deming identified two categories of defect that could occur in a process. He termed these ‘special causes’ and ‘common causes’. Special causes are things that happen due to unforeseen circumstances or changes in the processes in your organization and are outside your control. Common causes of defect are those things that contribute to defects and errors that are inherent in the processes of your organization and are within the control of management. Deming’s advice to management was that they needed to use statistical techniques such as statistical process control to identify special causes and common causes, and prevent the former while reducing the frequency of the latter. This can only be done by addressing the processes that were creating the product. At the heart of Deming’s approach to quality management is the principle that quality is something that is designed into products and the processes that are creating them. Defects detected through inspection have already

本书版权归Kogan Page所有

Information ethics as an information quality system

been created, so mass inspection is not going to stop errors from happening. At best, it will mitigate the impact of defects being released to the customer, but it will not stop errors from happening. Deming was clear: if the process is producing defective products, the problem lies in the means and methods of production and this is where remedial action should be taken. In the context of the E2IM framework, Deming’s guidance on special and common causes and the importance of designing quality into the process means that your organization needs to consider the business, information and technology perspectives of your information management strategy and processes in order to consider how you might avoid special causes of ethical defect or common causes of ethical issues. The key lesson in this context is that it is not the responsibility or accountability of your front-line operational staff when a systemic ethical issue arises (what Deming would term a ‘common cause’; what we would term an issue in the ‘ethic of the organization’), rather it is the responsibility of management to address the underlying systemic root causes (in the case of ethical information management, this may include processes, governance, corporate culture and underlying business models, as well as technologies). Deming also stressed the importance of what he referred to as a ‘Theory of Knowledge’ and the understanding of fundamental principles when it came to improving quality. This included understanding when something was a special cause or a common cause: ‘Best efforts are essential. Unfortunately, best efforts, people charging this way and that way without guidance of principles, can do a lot of damage’ (Deming, 1986: 19). Failure to properly analyse and address systemic issues that lead to quality problems leads to inefficient, ineffective and often unsustainable approaches to improving quality. While Deming was referring to principles of management in the first instance, a rereading of his work from an ethics perspective highlights the importance of ‘Big P’ principles in the organization – the effective development of the ethic of the organization in a way that is aligned with the ethic of society to consistently deliver the information and process outcomes expected by your organization’s stakeholders.

Mapping Deming’s principles to an information ethics case study In Out of the Crisis, Deming famously said that ‘In God we trust, everyone else must bring data’. While the relationship of Deming’s principles to information ethics makes intuitive sense when we consider ethics in general as a

本书版权归Kogan Page所有

245

246

Data Ethics

quality system, it would probably be helpful to relate it to a concrete case example. Charlie Warzel’s October 2017 BuzzFeed article ‘How people inside Facebook are reacting to the company’s election crisis’, on the reaction of staff inside Facebook to the coverage of the social network’s role, is instructive in this regard as it addresses a number of the points we have discussed earlier in this chapter. ‘Many employees feel like they are part of an unjust narrative that has spiralled out of control’ According to Warzel, inside Facebook ‘many in the company’s rank and file are frustrated. They view the events of the last month and those that preceded it as part of an unjust narrative that has spiraled out of control, unchecked’. Facebook staff reportedly feel the company is being scapegoated for a range of other factors that may have influenced the US presidential election in 2016, and potentially other votes around the world. However, as Warzel describes it: ‘as the drumbeat of damning reports continues, the frustration and fundamental disconnect between Facebook’s stewards and those wary of its growing influence grow larger still’ (Warzel, 2017). This describes a clear disconnect between the ethic of society and the ethic of the organization that raises fundamental questions around the ethical management of information and data. Also, it is symptomatic of a culture of fear (a fear of ‘speaking truth to power’ about the culture and structures of the organization and the impact of the process and information outcomes delivered) and highlights a culture of slogans, exhortations and targets that have become ingrained in the organization to the extent that external criticism is considered by some in an adversarial way. ‘Things are organized quantitively at Facebook’ In Warzel’s (2017) article he interviews a former Facebook engineer who describes the quantitative culture of the organization. The company was more concerned about the volume of links that users were sharing rather than the content that was being shared. The focus was quantitative rather than qualitative data. The quantitative data was easy to measure. Not only that, but the performance management and reward structures in Facebook are linked to those metrics. Considering the content that was being shared ‘simply wasn’t one of their business objectives’. Here we see two of Deming’s 14 points and at least one of the 7 diseases at play, creating an environment in which the organization did not question the key metric, and did not consider the interplay between the sharing of data and the well-documented ‘filter bubble’ phenomenon that the platform’s algorithmic processes contributed to, leading to an increased proliferation of

本书版权归Kogan Page所有

Information ethics as an information quality system

partisan content. As Warzel describes it, ‘the platform’s design pushes its users into echo chambers filled with only the news and information they already want, rather than the potentially unpopular information they might need’ (Warzel, 2017). Missed opportunities? According to Warzel’s article, in 2015 a Facebook engineer noticed something odd in Facebook’s data about link sharing. The top 25 results included a small number of sites that were essentially aggregators for hyper-partisan content but appeared to be among the most widely read websites on the site. The engineer shared this information in an internal discussion forum, but for a quantitatively data-driven company, Facebook seemed to be unable to appreciate the potential for this to have been a ‘special cause’ of defect in its processes and in the process and information outcomes that the people using its platform were experiencing. Within the PDSA cycle, Facebook seems to have missed an opportunity to study what was happening and to understand whether this data represented an outlier, an error in the data, or a special cause of defect. For example, the application of a simple ‘five whys’ analysis might have helped direct further quantitative analysis of the sharing to determine why these aggregator sites were so prominent in the top 25 shared sites. One hypothesis that might have been tested would be if the sharing of content on Facebook followed a normal statistical distribution in terms of the type of content being shared, and if this pattern of sharing was outside the expected statistical distribution. This type of analysis could also have looked at why content, described by one former senior employee as ‘liberal media stuff’, wasn’t shared or read, which suggests there was an awareness in Facebook that its content sharing was not following a normal statistical distribution – and which might have been an alert that the filter bubbles Facebook creates were becoming biased towards political and social narratives. According to Alex Kantrowitz (2016), while it ‘was likely never the company’s intent to create a system that encouraged people to hear only what they wanted – whether or not it was true – Facebook didn’t get here by accident’. The haste with which the platform moved to implement a link-sharing button in its mobile feed in 2012 set in motion a chain of data decisions that may have resulted in the exacerbation of fake news and filter bubbles. The changes to sharing functionality let people share quickly on mobile, without much thought. But, as Kantrowitz points out, on mobile people are less likely to take the time to provide comments on their shares that provide context. This metadata about the motive for the share or any ‘editorial’ comment by the sharer was potentially lost.

本书版权归Kogan Page所有

247

248

Data Ethics

Create constancy of purpose Add to this a shift in strategy coupled with a shift in Facebook’s purpose, as expressed by Mark Zuckerberg to be a ‘personalized newspaper for every person in the world’ (Kantrowitz, 2016). Being metrics driven, Facebook introduced ‘quality improving’ measures that Kantrowitz describes as ‘well-intentioned but fundamentally flawed’ as it served to reinforce filter bubbles and confirmation bias by not showing people stories that the algorithms said they would disagree with. This, again, is another example of Facebook managing by visible numbers to drive up another key metric – the amount of time a user spends on Facebook each day. Warzel (2017) also highlights this problem when he writes that ‘those inside the company continue to struggle with what, exactly, the company is, and what it is responsible for’. Within the ethic of the organization this lack of constancy of purpose poses problems. Within the ethic of society there have been growing calls for Facebook and other companies that provide ‘news’ and engagement through an algorithmic feed to be regulated, whether as media companies or publishers, or through a regulation promoting algorithmic transparency and accountability (Ingram, 2017; Jackson, 2021; United States Senate Committee on Commerce, Science and Transportation, 2021). In response to the ‘fake news’ crisis, Facebook has done analysis of how its platform is used, and introduced changes in its news feed algorithms to weed out individuals who are prolific posters (Wagner, 2017). Its more notable change to its news feed algorithms came in 2018, when the news feed was overhauled to prioritize the metric of ‘meaningful social interactions’ (or MSI). According to Facebook public statements, this was in response to external research that pointed to negative psychological effects of people passively using Facebook as a news source (Ginsberg and Burke, 2017). However, the quantitative metric for ‘meaningful social interactions’ prioritized engagement and resharing, which increased outrage, toxicity, sharing of misinformation and hate. According to internal documents leaked to the Wall Street Journal by whistleblower Frances Haughen, staff internal memos shared concern that ‘Misinformation, toxicity, and violent content are inordinately prevalent among reshares’, and internal reports shared concern about ‘long term effects on democracy’. According to the leaked documents, Mark Zuckerberg actively resisted changes to address ‘false and divisive content’ that might affect the ‘MSI’ metric (Hagey and Horwitz, 2021). In 2021, after public opprobium questioning the role Facebook played in the political radicalization and organizing of the 6 January insurrection in the United States,

本书版权归Kogan Page所有

Information ethics as an information quality system

Facebook has been drip-feeding announcements of changes to reduce emphasis on political content, changes which Zuckerberg had previously resisted (Hagey and Horwitz, 2021; Stepanov, 2021). The friction between the ethic of the organization and the ethic of society became difficult to navigate without an announced change of practice. When the first edition of this book was published in early 2018, we asked whether society accepts advertising dollars as a proxy for veracity and validity of content, or will Facebook have to return to human editors, like the newspapers it had sought to displace. We asked whether Facebook considered the impact on legitimate organizations who distribute content through its platform, or the people who work for it, and the impact on legitimate grassroots movements and small businesses who lack the finances to pay for promoted adverts, particularly in developing countries. The other question is whether Facebook’s model for planning and executing changes to it platform fully considers the impacts on stakeholders, and whether Facebook’s ‘very scale might estrange it from how other people see the world’ (Madrigal, 2017). Later in 2018, Facebook quietly acknowledged that it facilitated the genocide of the Rohyngya in Myanmar (BSR, 2018). An independent report on Facebook’s role in genocide in Myanmar, fuelled by the Myanmar military’s systematic use of Facebook in its ethnic cleansing campaign, found that, despite the fact that Facebook was so widespread in Myanmar it basically was the internet for most people in Myanmar, Burmese language moderation was severely under-resourced. Facebook did not respond adequately to repeated alerts of hateful speech and fomenting genocide. In 2015, it had only two people who could speak Burmese to moderate posts, and three years later the situation had not been much improved (Stacklow, 2018). A 2021 class action lawsuit against Meta (formerly Facebook) on behalf of the Rohingya cites Facebook’s awareness that engagement (or MSI) as a metric prioritizes ‘hateful, outraged, and politically extreme content (especially content attacking a perceived ‘out-group’)’ arguing that ‘Facebook has determined through years of study and analysis: hate and toxicity fuel its growth far more effectively than updates about a user’s favorite type of latte.’1 In examining the various scandals and Mark Zuckerberg apology tours of the past decade, it’s possible to identify symptoms of both special causes and common causes in Facebook’s core processes, and common causes in the priorities revealed by the decisions of Meta’s leadership. In 2021, Frances Haughen’s whistleblowing and testimony to the US Congress about practices she’d observed as former Facebook lead product manager working on civic

本书版权归Kogan Page所有

249

250

Data Ethics

misinformation and counter-espionage described an even stronger ethical mismatch between Facebook’s focus on metrics for success and its public commitments. She stated that Facebook’s internal research had uncovered harms that it deliberately hid and underplayed while promoting the ‘safety’ of its product. I saw that Facebook repeatedly encountered conflicts between its own profits and our safety. Facebook consistently resolved those conflicts in favor of its own profits. The result has been a system that amplifies division, extremism, and polarization – and undermining societies around the world. In some cases, this dangerous online talk has led to actual violence that harms and even kills people. (United States Senate Committee on Commerce, Science and Transportation, 2021)

The root causes that made Facebook a tool of genocide in Myanmar have not been addressed and, at the time of publication, the same patterns of and outcomes are being seen in Ethiopia (Cornish, Donevan and Bior, 2021). Meta’s (formerly Facebook’s) current actions could be summarized as a rebranding and a pivot to focusing on virtual reality – a range of technosocial spaces with even trickier problems with moderation and the complexities of human behaviour – while removing funding from or winding down features such as CrowdTangle, a tool used by social scientists to analyse the systemic issues of misinformation on Facebook.

Defining and measuring ‘good’ in the context of information quality Just as with ethics, information quality management requires you to have some mechanism for defining and measuring what ‘good’ is.2 It also requires formal processes and methods to plan for, design for and ensure controls for Table 8.4  Definitions of information quality Practitioner

Definition of quality applied to information and data

Larry P English

Consistently meeting or exceeding knowledge worker and end-customer expectations (English, 1999)

Dr Thomas C Redman

Data are of high quality if those who use them say so. Usually, high-quality data must be both free of defects and possess features that customers desire (Redman, 2008)

Danette McGilvray The degree to which information and data can be a trusted source for and/or all required uses. (McGilvray, 2008)

本书版权归Kogan Page所有

Information ethics as an information quality system

good-quality information. Of course, just as in debating what is ‘ethical’, there are a variety of schools of thought on the topic of what quality information is and how best to measure it. Table 8.4 summarizes definitions of ‘information quality’ from several key writers in the field of information quality management. All the authors in Table 8.4 are strong advocates of a quality systems approach to the management of information in the organization in order to ensure the consistent delivery of the desired information and process outcomes. According to DAMA International (2017): ‘Formal data quality management is similar to continuous quality management for other products. It includes managing data through its life cycle by setting standards, building quality into the processes that create, transform and store data, and measuring data against standards’. Regardless of which definition of data or information quality you prefer, all methodologies for the management of information quality require you to measure some aspect of the information to give you an indication of whether the processes in your organization are producing the right quality of information in the right way. Depending on the context of your processing, different aspects of your information will be more important from a quality perspective. This is the intangible information equivalent of checking that the ingredients you are putting in a meal are the right ones for the recipe, are fresh enough and are present in the right quantities. In the same way as an absence of onions from your meringue mix is a good indicator that you have avoided a culinary quality disaster, the context of the processing drives the criticality of certain quality characteristics and the significance of high or low values.

Adapting information quality methods for ethical information management Information quality management is about more than just measuring the quality characteristics of your data. You need to be sure you are addressing the right issues, and you need to be certain you are tackling the root causes of information quality issues in the organization. There are a multitude of methodologies and best practices identified and documented for information quality management, and reviewing all of them would take a book in its own right. If you are new to the topic and want to learn more, we provide a list of recommended reading for information quality at the end of this chapter. For the purposes of this chapter, we have picked one methodology

本书版权归Kogan Page所有

251

252

Figure 8.2  Danette McGilvray’s Ten Steps to Quality Data and Trusted Information™ process

1 Define business need and approach

2 Analyse information environment

7 Prevent future data errors

3 Assess data quality 5 Identify root causes

6 Develop improvement plans

4 Assess business impact

9 Implement controls 8 Correct current data errors

10 Communicate actions and results SOURCE Copyright © 2005–2008 Danette McGilvray, Granite Falls Consulting, Inc. Used by permission. Excerpted from Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information™ by Danette McGilvray; published by Morgan Kaufmann Publishers. Copyright © 2008 Elsevier Inc. All rights reserved

本书版权归Kogan Page所有

Table 8.5  Example data quality dimensions from Danette McGilvray Data quality dimension (McGilvray)

Definition (McGilvray)

Comment (authors)

Data specification

A measure of the existence, completeness, quality and documentation of standards, data models, business rules, metadata and reference data

This dimension addresses the quality of how well the artefacts we would expect to see in the Zachman framework are defined or exist in the organization

Data integrity fundamentals

A measure of the existence, validity, structure, content and other basic characteristics of the data

This includes data quality metrics such as completeness, and general conformity to requirements or standards that relate to the data

Duplication

A measure of the unwanted duplication existing within or Duplication is a common problem in data quality. From an across systems for a particular field, record or data set ethical perspective, tackling duplication can become a problem where staff are incentivized/rewarded for volume of records (eg number of customers)

Perception, A measure of the perception of and confidence in the relevance, trust quality of the data; the importance, value and relevance of the data to business needs

This is a critical metric that has a strong analogue in information ethics

Transactability

A measure of the degree to which data will produce the desired business transaction or outcome

In the context of the E2IM model, this dimension is an important one – how likely is your organization to be able to deliver the required process or information outcomes?

Accuracy

A measure of the correctness of the content of the data Accuracy is usually measured either against the real-world (which requires an authoritative source to be defined and thing (accuracy against reality) or against an approved accessible) valid surrogate source

Consistency A measure of the equivalence of information stored or and used in various data stores, applications and systems, synchronization and the processes for making data equivalent

253

本书版权归Kogan Page所有

In the context of the E2IM model, this dimension can be a useful surrogate for the quality of governance and architecture for information in the organization

254

Data Ethics

by our friend and mentor Danette McGilvray to use as an example. However, our comments are generally applicable to other methodologies that build from a quality systems approach to information management. Within Danette’s methodology she sets out a straightforward 10-step iterative approach to managing information quality projects (Figure 8.2). When you break things down into simple, straightforward steps it can really help to get people in your organization engaged with solving the problem or improving the situation. As an iterative approach, people following this process can circle back to previous steps in the process to elaborate on detail or develop a deeper understanding of data quality issues as more information becomes available. In addition to these steps, Danette also describes a holistic framework for information quality that mirrors many of the interrogatives from the Zachman framework we discussed in Chapter 7 (the ‘who, how, what, where and when’ of the information processing in the organization). This highlights the importance of understanding the overall environment in which the information is being processed and used, so that you can tackle quality problems. McGilvray provides some useful definitions of information quality metrics (she uses the term ‘data quality dimensions’) that organizations might apply. When describing her data quality dimensions, Danette categorizes data quality metrics based on how they might generally be assessed, measured or managed. This reflects the fact that different dimensions, and the specific granular metrics that they include, can require different tools, techniques and processes to measure and manage. The data quality dimensions are outlined in Table 8.5. (Note, Table 8.5 does not include the full list of data quality characteristics identified by Danette McGilvray, and we recommend that if you want to learn more about this topic you seek out a copy of McGilvray’s book. There are a range of other authors in this field whose published methodologies set out a range of other data quality dimensions and measurable quality characteristics. We have included some in the Further reading section at the end of this chapter.)

Adapting the Ten-Steps™ for ethics In our consulting and training work in Castlebridge, we have adapted Danette’s process as a tool for supporting data privacy and information ethics projects. It is important for you to have a structured approach to engaging in the analysis and discussion of information-ethics issues in your organization.

本书版权归Kogan Page所有

Table 8.6  Mapping the Ten Steps to E2IM Key steps in McGilvray’s Ten-Steps™

E2IM Ethical perspective

Define business need and approach

Define and agree the business need (issue/opportunity/goal) to be addressed, and the approach being taken

From the perspective of the E2IM framework, when you do this you need to consider the information and process outcomes you are seeking to deliver. Where you have to review in response to an ethical issue arising, it is useful to have a clearly defined statement of the purpose for your processing of information and the approach that is being taken

Analyse information environment

Gather, compile and analyse information about the current situation and the information environment and information life cycle

Understanding the information environment is essential in an ethics review context. Apart from the technology environment, it is important to consider and to take time to correctly identify who your stakeholders are and the ethic of society that is communicated through feedback received from these stakeholders

Assess data quality

Evaluate data quality for the data You need to evaluate the quality of data and data processing from the quality dimensions that are applicable perspective of the relevant ethical dimensions applicable to the processing to the issue. This provides the basis for determining root causes and improvements/corrections

Assess business impact

Determine the impact of poor-quality data on the business. This helps support business case development for improvements

Identify root causes

Identify and prioritize the true root Identify and prioritize the true root causes of the ethical quality problems causes of the data quality problems identified and develop specific recommendations to address them and develop specific recommendations

(continued) 255

本书版权归Kogan Page所有

The key question to address here is whether the processing can be done legally or ethically, and what the impacts would be on the organization of a legal or ethical issue arising

256

Table 8.6  (Continued) Key steps in McGilvray’s Ten-Steps™ Develop improvement plans

E2IM Ethical perspective Finalize specific recommendations for action to address root causes

Finalize specific recommendations for action to address root causes. From an E2IM perspective, we close a loop here because if the organization is unwilling to invest in addressing the root causes of ethical issues, they will remain ‘live’ and the organization’s leadership will need to take a conscious decision to proceed with processing that has been identified as having ethical issues or legal issues. This may result in future legal liability for the organization or individuals

Prevent future Implement solutions that address root errors causes of data-quality issues

Implement solutions that address root causes of ethical issues

Correct Implement steps to make appropriate current errors data corrections

Implement steps to remedy legacy ethical issues. This may present challenges for any organization with historic ethical breaches that may give rise to legal liability, but it is arguably worse to allow historic unethical practices to go unreviewed and unresolved. Again, organization leadership has to take a conscious decision on what to do, or not to do, in this context

Implement controls

Monitor and verify improvements and document decisions taken. Continuously monitor successful ethical improvements to ensure behaviours have changed and outcomes are being consistently delivered

Monitor and verify improvements implemented and maintain improved results by standardizing, documenting and continuously monitoring successful improvements

Communicate Document and communicate the results Document and communicate the results of your ethical assessments, actions and of quality tests and improvements made improvements made and the results of those improvements results to processes

本书版权归Kogan Page所有

Figure 8.3  A ten-step framework for ethical information management Assess ethical impact from ethic of society/stakeholder perspective 3 Assess quality of information (ethical perspective) 1 Define business need and approach

5 Identify root causes of ethical issues

2 Analyse information environment

Cannot be done ethically or legally

7 Prevent future information ethics issues

9 Implement controls

6 Develop improvement plans 8 Fix current ethical/ compliance issues

4 Assess business impact

Issues cannot be addressed in a cost-effective manner 10 Communicate actions and results SOURCE Adapted from McGilvray’s Ten Steps™

257

本书版权归Kogan Page所有

258

Data Ethics

The key challenge you will tend to face is keeping the discussion of ethical issues grounded and to avoid the creation of a ‘talking shop’ where issues are debated but do not translate into tangible action. It is important you have a simple process to keep activities focused as the translation of ethics into action is the key that organizations tend to struggle with in the accelerating Information Age. It is important to note that Danette McGilvray’s Ten Steps to Quality Data and Trusted Information™ is not a linear process. The process of executing information and data quality improvement is iterative, and in her book Danette is explicit that you can circle back to earlier steps in the process whenever needed and to reflect iterative elaboration of detail as issues are explored or business needs become clarified (McGilvray, 2008). Building on the iterative nature of the Ten Steps™ (Table 8.6), the key modifications we have made to Danette’s process are to explicitly add in feedback loops that direct you to reassess your business need and approach when you encounter ethical issues that are either ‘showstoppers’ or for which remedies cannot be implemented in a cost-effective manner (Figure 8.3). In this respect, our adaptation applies the iterative principles of the Deming/Shewhart PDSA cycle in a very direct manner for this ethical context.

Developing ethical information quality dimensions As discussed earlier, the quality of information is something that can be, to a greater or lesser extent, objectively measured. It is outside the scope of this book to explore all the different quality characteristics you might use to measure the quality of information. For our purposes it is enough that you understand that the quality of information is something that can be measured and managed using a variety of techniques. The importance of having a metric of quality is that it allows you to demonstrate the scale of a problem, and to demonstrate improvement arising from remedial actions you might take to improve the quality of information in your organization. It also helps take what can often be abstract concepts and solidify them for discussion. One of the challenges we face when discussing ethical information management is taking the abstract concepts such as Kant’s formulation of the categorical imperatives and turning them into something that is quantifiable in the same way, even if only by way of measures that are proxies for ethical concepts.

本书版权归Kogan Page所有

Information ethics as an information quality system

Some characteristics of ethical data management: outcomes of ethical information management The E2IM framework stresses the importance of considering the information and process outcomes of any processing activity, and the overarching measure of ethical ‘quality’ is how well your organization addresses the alignment of the ethic of the organization with the ethic of society. Below we describe some dimensions for the quality of information ethics. These are intended as a guide and are not prescriptive. Just as in the traditional information quality domain, we expect and welcome debate and discussion on these topics.

Utility A measure of to what extent the information and/or process outcomes will do good in society or will promote happiness. This quality follows directly from Irish philosopher Francis Hutcheson’s definition of the principle of utility: ‘that action is best, which procures the greatest happiness for the greatest numbers’ (Hutcheson, 1726). This characteristic is very broadly defined but may at the same time be useful for its broadness of definition. This characteristic is one of the dimensions of the Castlebridge utility/invasiveness model discussed in Chapter 10. Some metrics you may look for are stakeholder satisfaction, the degree to which your process or outcome solves a problem, etc. At a more operational and functional level, you can also look at this characteristic as a measure of ‘usefulness’ to individuals or to society.

Beneficence/non-maleficence A measure of the extent to which the process or processing promotes wellbeing, or the extent to which the processing supports physical well-being and the good of society in a way that doesn’t cause harm. This is an ethical dimension we inherit from medical ethics. Fundamentally, the primary measure for this characteristic is to avoid causing harm. The harm to be considered may be an impact on other rights and freedoms of individuals. At a broader and more philosophical level, this characteristic may overlap with utility or may be a counterweight metric. However, it is best regarded as a separate characteristic to allow for recognition of issues as you drill down to more granular levels of analysis. Something may have very high utility but create a significant risk of maleficence in its use, which would need to be balanced in some way. The ‘filter bubble’ in social media is an

本书版权归Kogan Page所有

259

260

Data Ethics

example of something that may have utility but carries with it a high degree of maleficence, given its potential to be misused or abused.

Justice/fairness Justice is a key virtue in virtue ethics, and it is one of the foundational principles in more recent normative ethics frameworks. It is a clear expected outcome for ethical information management. In this context, justice and fairness can be defined as a measure of the extent to which your processing results in equal treatment of people or even increased equality. Information outcomes and process outcomes that rank strongly on the dimension of justice/fairness will result in the equal and fair treatment of people, results or distribution of resources. Those that do not will result in some curtailment of equality, some bias against individuals and some unfairness in the distribution of resources. This quality characteristic is a key metric that has been identified in questions of algorithmic accountability, as we discussed in Chapters 4 and 5, where we observed questions regarding the outcomes of algorithmic decision making disproportionately better or worse for one group or subset of people.

Verity/non-deceptiveness Verity as a data characteristic relates to the integrity, truthfulness, honesty or accuracy of your representation, construction, or the results of information management. It is best defined as a measure of how closely your processing activities and use of data match what you had declared your processing to be. Verity/ non-deceptiveness is an external corollary to traditional information quality metrics such as McGilvray’s internal ‘quality of information specification’ or ‘perception, relevance and trust’. The emergence of transparency as a key requirement in data privacy laws globally is an example of the importance of this dimension in the context of ethical information management. However, the changes to vehicle enginetesting standards being developed in response to the Volkswagen emissions scandal, along with the sanctions taken against the company and individual managers, also highlights the importance of this as a measurable ethical quality dimension. Activities with a low verity/non-deceptiveness score could be labelled corrupt/misleading, which raises issues in the context of the justice/fairness dimension.

本书版权归Kogan Page所有

Information ethics as an information quality system

Autonomy Autonomy involves respect for people’s self-determination. In the context of dimensions of ethical information management, autonomy is the measure of the extent to which the outcome of your process respects or infringes on people’s self-determination or ability to choose an action for themselves. This measure is influenced by the extent to which people are able to make their wishes known in relation to the processing, whether the design of a system or process is transparent in allowing choice or whether it suppresses true, informed choice. An information imbalance where an individual ‘agrees’ to something they are not aware of agreeing to does not represent a true choice, which constrains their autonomy and could also be considered a defect in the context of the verity/non-deceptiveness dimension. Likewise, obfuscation through information overload – that makes it harder for people to understand their choices – also can constrain autonomy. In the broader context, processing that removes the potential for choice from an individual by, for example, not making information about a product, service or other benefit available to them based on the processing of data about them, or which results in constrained choices for that person in the exercise of other rights or freedoms, would also be processing that would impact on autonomy. This characteristic is incredibly important to consider in creating clear, transparent communication to inform people’s decision making and allow them to understand the choices they make, or are made on their behalf, through your processing of information.

Privacy/non-invasiveness Privacy/non-invasiveness is a measure of the level of intrusion into the personal life, relationships, correspondence or communications of the individual or a group of individuals as a result of the processing activity or the information outcome or process outcome that is delivered. It is not a measure of compliance with privacy laws, although this may be a factor you might consider in an analysis. One aspect of privacy/non-invasiveness is the level of autonomy or choice that an individual can exercise over the processing of data about them. For example, the analysis of the metadata of your communications on private chat applications and your public communications on social media may reveal a significant amount about you, your personality or other aspects of your identity such as sexual orientation. While this might have utility, and may have beneficence, it may still be highly intrusive.

本书版权归Kogan Page所有

261

262

Data Ethics

Privacy/non-invasiveness may be a singular dimension at a macro level of analysis, but as you dig deeper into understanding the root causes and underlying ethical issues in the processing of information in the organization you may want to focus your assessments by considering necessity and proportionality of processing of personal data.

Necessity Necessity is a measure of the extent to which the proposed processing is addressing an issue that, if left unaddressed, may result in harm to or have some other detrimental effect on society or a section of society. This is based on the analysis of the collective body of the EU’s Data Privacy Regulators, the Article 29 Working Party, which has been reconstituted since the end of May 2018 as the European Data Protection Board (Article 29 Working Party, 2010). It is also a measure of the extent to which specific processing is necessary to achieve a stated information or process outcome. In this context it is a corollary of McGilvray’s ‘Transactability’ dimension of data quality. Rather than considering the degree to which the data will produce the desired outcome, ‘Necessity’ considers whether the desired outcome requires the processing of the information at all.

Proportionality Proportionality is best defined in this context as a measure of the degree to which the interference in privacy, and the potential infringement or curtailment of other rights, caused by the measure, is counterbalanced by the benefit to society or a section of society arising from the objective being pursued. A key ethical test is to determine if the same objective could be achieved with a more limited impact on individuals and their autonomy.

Impact on human rights and freedoms Ethical data use will uphold or protect the human rights of individuals, based on Kant’s declaration that we should treat people as an ends in and of themselves, not just a means to an end. This dimension is a measure of the degree to which the proposed processing upholds or protects rights, or curtails or constrains them. There will, inevitably, be balances to be identified between competing rights, and between the competing rights of different stakeholders.

本书版权归Kogan Page所有

Information ethics as an information quality system

Among the rights to consider in this context is the right to human dignity. The extent to which your management of information contributes to the upholding of this right is, arguably, a fundamental ethical question and a critical quality metric. After all, as Kaoru Ishikawa told us earlier in this chapter: ‘in management, the first concern of the company is the happiness of people who are connected with it. If the people do not feel happy and cannot be made happy, that company does not deserve to exist’ (Ishikawa, 1985).

Environmental sustainability Sustainability as a metric would measure the benefits of the data processing envisaged against the environmental effects of the development or procurement and ongoing usage of the computing technologies required by its design. To what extent is the carbon cost of this data processing justified by the outcomes? Is there a way to achieve the desired outcomes with reduced environmental impact? We propose these quality characteristics for ethical information management as a starting point for discussion and revision. The corresponding definitions, concepts and principles are long debated, but may still be acted upon. The underpinning principles and concepts are complex, as are humans and their actions and decisions, and the contexts in which people act. There will, inevitably, be overlaps and interconnectedness between the different dimensions. You will probably have noticed that not only do many of these characteristics have multiple layers of definition at different levels but they may be interrelated with each other. You may also have noticed that some of these quality characteristics for ethical data bear similarities to some of the ethical principles for Big Data and AI that have been variously introduced over the years (and discussed briefly in Chapter 5). A standardized set of principles is a useful place to start for defining your quality characteristics for ethical data use. To move from a guiding principle to a quality characteristic, you will need to consider: ●●

How do I describe a meaningful and measurable outcome of processing data in accordance with this principle?

●●

What do I expect that outcome to look like?

●●

Who experiences the effects of the outcomes?

●●

Also... what am I missing? What can other perspectives and experiences add to this definition?

本书版权归Kogan Page所有

263

264

Data Ethics

Having a defined set of dimensions of quality in ethical information management, much like a 10-step framework for assessing impacts, provides an essential starting point for discussions. To decide what metrics you can look at, you will need to agree on and communicate a useful definition for context, but you will also need to remember that human problems and solutions are much more complex than mechanical errors or software bugs. From a quality control perspective, you must remember that you will not be able to capture all aspects in your metrics. As Deming cautioned, you need to stop managing by the visible numbers and metrics in the organization and study the root causes of ethical issues in your organization’s processing of information. Based on that learning, you will then need to align the business, information and technology strategies, and governance of the organization to ensure the right information and process outcomes are delivered consistently.

Chapter summary In this chapter we introduced the concept of data ethics as a quality system. We: ●● ●●

●● ●●

●●

●●

●●

●●

Examined the concept of data ethics as an information quality system. Identified the role of normative business ethics in the delivery of quality or quality outcomes. Explored a methodology for information quality assessment. Explored the parallels between information quality management and ethical data management. Identified how information quality management principles and techniques can be applied to support ethical data management objectives. Related ethics and data ethics concepts to the work of W Edwards Deming. Mapped an information ethics assessment and improvement approach to a proven information quality management methodology. Applied the theory of quality management practices to real-world scenarios to diagnose the root cause of issues such as ‘fake news’.

本书版权归Kogan Page所有

Information ethics as an information quality system

The key takeaway from this chapter is that once you begin to consider stakeholders in the definition of your ethical framework for the organization, you very quickly find that quality management principles and practices can be applied to help develop, communicate, measure and manage many aspects of your ethical enterprise information management initiatives.

Questions 1 What does it mean to consider data ethics as a quality systems problem? 2 We are adopting new technologies and technology-driven business models at a rapid pace. What other lessons can we learn from manufacturing quality and other quality management practices to help avoid ethical cul-de-sacs in new technologies? 3 What proxy metrics for ethical information management behaviours can you identify in your organization?

Notes 1 edelson.com/wp-content/uploads/doevmetacomplaint.pdf (archived at https:// perma.cc/NRP9-BY7N)

2 For the purposes of this book we use the terms ‘information quality’ and ‘data quality’ synonymously. There are technical and semantic differences between the concepts of information and data and their quality characteristics. Suffice it to say that information is data in a context that allows it to be used to make or inform decisions.

Further reading Beckford, J (2002) Quality: A critical introduction, 2nd edn, Routledge, Abingdon Deming, W E and Orsini, J N (2013) The Essential Deming: Leadership principles from the father of quality management, McGraw-Hill, New York Halis, M, Akova, O and Tagraf, H (2007) The relationship between ethics and quality: conflicts and common ground, Serbian Journal of Management, 2 (2), pp 127–45

本书版权归Kogan Page所有

265

266

Data Ethics Ishikawa, K (1985) What Is Total Quality Control? The Japanese way, PrenticeHall, Englewood Cliffs, NJ Redman, T C (2000) Data Quality: The field guide, Digital Press, Boston, MA Walton, M (1988) The Deming Management Method, Perigee, New York

References Article 29 Working Party (2010) Opinion 3/2010 on the principle of accountability, 13 July, ec.europa.eu/justice/article-29/documentation/opinion-recommendation/ files/2010/wp173_en.pdf (archived at https://perma.cc/EJU9-2HLV) BSR (2018) Human Rights Impact Assessment: Facebook in Myanmar, October, about.fb.com/wp-content/uploads/2018/11/bsr-facebook-myanmar-hria_final. pdf (archived at https://perma.cc/4W3T-59G9) Cornish, A, Donevan, C and Bior, A (2021) Facebook is under new scrutiny for its role in Ethiopia’s conflict, NPR, 11 October, www.npr.org/2021/10/11/ 1045084676/facebook-is-under-new-scrutiny-for-its-role-in-ethiopias-conflict (archived at https://perma.cc/7Q9V-WM78) DAMA International (2017) DAMA DMBOK: Data Management Body of Knowledge, 2nd edition, Technics Publications, Basking Ridge, NJ Deming, W E (1986) Out of the Crisis, MIT Press, Boston, MA Deming, W E (2000) The New Economics for Industry, Government, Education, 2nd edn, MIT Press, Cambridge, MA English, L P (1999) Improving Data Warehouse and Business Information Quality: Methods for reducing costs and increasing profits, Wiley, New York Ginsberg, D and Burke, M (2017) Hard Questions: Is spending time on social media bad for us? Meta, 15 December, about.fb.com/news/2017/12/hardquestions-is-spending-time-on-social-media-bad-for-us/ (archived at https:// perma.cc/TU6D-957Y) Glenday, J (2017) Facebook signals end to news feed reach for non-promoted posts, The Drum, 24 October, www.thedrum.com/news/2017/10/24/facebook-signalsend-news-feed-reach-non-promoted-posts (archived at https://perma.cc/7NYZCSGD) Griffith, E (2016) Facebook users are sharing fewer personal updates and it’s a big problem, Fortune, 7 April, fortune.com/2016/04/07/facebook-sharing-decline/ (archived at https://perma.cc/6SBJ-XW33) Hagey, K and Horwitz, J (2021) Facebook tried to make its platform a healthier place. It got angrier instead, Wall Street Journal, 15 September, www.wsj.com/ articles/facebook-algorithm-change-zuckerberg-11631654215 (archived at https://perma.cc/2ZPB-JJT3)

本书版权归Kogan Page所有

Information ethics as an information quality system Haque, U (2016) The reason Twitter’s losing active users, Harvard Business Review, 12 February, hbr.org/2016/02/the-reason-twitters-losing-active-users (archived at https://perma.cc/A2EL-QPF4) Hern, A (2017) Facebook moving non-promoted posts out of news feed in trial, The Guardian, 23 October, www.theguardian.com/technology/2017/oct/23/ facebook-non-promoted-posts-news-feed-new-trial-publishers (archived at https://perma.cc/SMB9-AHJZ) Hutcheson, F (1726) An Inquiry into the Original of Our Ideas of Beauty and Virtue, Liberty Fund Inc, Dublin, oll.libertyfund.org/title/leidhold-an-inquiryinto-the-original-of-our-ideas-of-beauty-and-virtue-1726-2004 (archived at https://perma.cc/SVE5-4U4A) Ingram, M (2017) Facebook and Google need to be regulated, says British news industry, Fortune, 9 March, fortune.com/2017/03/09/facebook-google-regulated/ (archived at https://perma.cc/4U8Q-77VE) Ishikawa, K (1985) What is Total Quality Control? The Japanese way, PrenticeHall, Englewood Cliffs, NJ Jackson, L (2021) How should we limit Facebook’s power? New York Times, 8 October, www.nytimes.com/2021/10/08/podcasts/facebook-regulation.html (archived at https://perma.cc/A3X9-9SJW) Kantrowitz, A (2016) How the 2016 election blew up in Facebook’s face, BuzzFeed, 21 November, www.buzzfeed.com/alexkantrowitz/2016-electionblew-up-in-facebooks-face (archived at https://perma.cc/MUY9-XVGZ) Madrigal, A C (2017) When the Facebook traffic goes away, The Atlantic, 24 October, www.theatlantic.com/technology/archive/2017/10/when-thefacebook-traffic-goes-away/543828/ (archived at https://perma.cc/42B9-8X3U) McGilvray, D (2008) Executing Data Quality Projects: Ten steps to quality data and trusted information, Morgan Kaufmann, Burlington, MA Moen, R D and Norman, C L (2010) Circling back: Clearing up myths about the Deming Cycle and seeing how it keeps evolving, Quality Progress, 43 (11), November, 22–28 Pace, L A (1999) The ethical implications of quality, Electronic Journal of Business Ethics and Organization Studies, 4 (1), jyx.jyu.fi/dspace/handle/123456789/25323 (archived at https://perma.cc/X8ZV-E92N) Redman, T C (2008) Data Driven: Profiting from your most important business asset, Harvard Business Review Press, Boston, MA Stepanov, A (2021) Reducing political content in News Feed, Meta, 10 February, about.fb.com/news/2021/02/reducing-political-content-in-news-feed/ (archived at https://perma.cc/V2RM-DPQY) Reijers, W et al (2016) A Common Framework for Ethical Impact Assessment, Satori, October, satoriproject.eu/media/D4.1_Annex_1_EIA_Proposal.pdf (archived at https://perma.cc/RL2R-Z59V)

本书版权归Kogan Page所有

267

268

Data Ethics Stacklow, S (2018), August 15 Why Facebook is losing the war on hate speech in Myanmar, Reuters, 15 August, www.reuters.com/investigates/special-report/ myanmar-facebook-hate/ (archived at https://perma.cc/5AL6-7K82) Stimson, W A (2005) A Deming inspired management code of ethics, Quality Progress, 38 (2), February, 67–75 United States Senate Committee on Commerce, Science and Transportation (2021) Statement of Frances Haugen, 4 October, www.commerce.senate.gov/services/ files/FC8A558E-824E-4914-BEDB-3A7B1190BD49 (archived at https://perma. cc/XGE9-K89V) Wagner, K (2017) Facebook found a new way to identify spam and false news articles in your News Feed, Vox, 30 June, www.vox.com/2017/6/30/15896544/ facebook-fake-news-feed-algorithm-update-spam (archived at https://perma.cc/ YN95-ETNW) Warzel, C (2017) How people inside Facebook are reacting to the company’s election crisis, BuzzFeed, 20 October, www.buzzfeed.com/charliewarzel/howpeople-inside-facebook-are-reacting-to-the-companys (archived at https://perma. cc/GU8D-BDB7)

本书版权归Kogan Page所有

269

Information ethics and data governance

09

What will we cover in this chapter? In this chapter we explore in more detail the relationship between information ethics and data governance. By the end of this chapter you will:

●● ●●

●●

●●

●●

●●

●●

Understand the role of data governance in the E2IM framework. Understand how data governance supports ethics, with reference to the ‘fake news’ scandals that have plagued social media. Be able to explain models of data governance with reference to classic forms of governance in other spheres. Be able to explain how the model of governance adopted can affect ethical decisions and outcomes. Be able to explain how the ethic of the individual is supported in the E2IM framework by effective, principles-led data governance. Be able to explain information stewardship as an ethical concept in the context of a principles-based data governance framework. Understand the relationship between maturity of data governance practices and the maturity of your information ethics.

本书版权归Kogan Page所有

270

Data Ethics

Introduction In Chapter 5 we introduced some background concepts of data governance in our discussion of fundamental data management disciplines in the context of the ethics of data management. In this chapter you will get a more detailed insight into how effective data governance structures in your organization enable, and are enabled by, effective information ethics practices. At the heart of this interaction is the fact that core principles for the handling of information form the bedrock of effective data governance. Without clearly defined principles for what constitutes acceptable or unacceptable practices in the handling of information in the organization, and Figure 9.1  Data governance in the E2IM framework

Strategic

Business

Information

Technology

Business strategy and governance

Information strategy and governance

Technology strategy and governance

Data governance

Structural/ tactical

Business architecture and planning

Information architecture and planning

Technology architecture and planning

Operations

Business process management and execution

Management and application of information

Management and exploitation of IT Services

Stakeholder

本书版权归Kogan Page所有

Process outcome

Information outcome

Expectation

Information ethics and data governance

without appropriate controls and oversight frameworks to ensure the right things are being done, it is inevitable that ethical issues and associated legal liabilities will arise for organizations. Effective data governance spans the strategic and structural layers of the strategic information model the E2IM framework builds from. It must include business strategy and governance, business planning, technology strategy and governance, and technology architecture and planning. Above all, it must focus on the appropriate governance of the information assets of the organization, to ensure that the required information and process outcomes are consistently delivered, which is something we measure through the quality systems approaches to information management discussed in Chapter 8. Figure 9.1 highlights how data governance spans the strategic and structural/tactical levels of the E2IM framework and encompasses elements of business strategy, information strategy, technology strategy, and the design of the operational structures that support the execution of these strategies.

How data governance supports ethics As we discussed in the introductory chapter to this book, the innovator’s dilemma in information management often arises in contexts where codified laws or standards do not yet exist. In these contexts, one of the key functions of an effective data governance framework is the codification of the rules about ‘how to decide how to decide’ (Data Governance Institute, nd). While this is important even in the context of scenarios where there are regulatory requirements or guidelines in place, when the organization is ‘boldly going where no one has gone before’ it becomes even more important to have predefined methods and practices for making critical data decisions and documenting the organization’s rationale for those decisions. An ethics-based framework for data governance decisions supports a wider ethics-based approach to information management, particularly in scenarios where codified standards or laws lag behind the technological capabilities available, and supports a wider ethics-based approach to information management. It enables and coordinates the definition and communication of ethical values in setting and enforcing data-related policies, standards, and processes. It ensures a clear escalation and remediation path to raise any ethical issues regarding data access, quality, ownership, standards, security, usage and management.

本书版权归Kogan Page所有

271

272

Data Ethics

A well-defined data governance framework interacts with civil or criminal governance functions of external regulators or enforcement agencies in the context of regulatory compliance. It helps to maintain the organization’s ability to meet compliance standards set by external regulatory bodies by supporting a proactive approach to risk identification and mitigation. This is particularly important when the organization is operating in an area that is applying information technology or data-processing capabilities in a novel way, or where the proposed technology or processing represents a significant change in the state of the art. An ethically aligned approach to data governance ensures an ethical alignment of all the other data management disciplines that may be brought to bear in any project or process. It ensures that there is evidence of debate while defining the processing activity. Furthermore, it creates an environment in which ethical issues can be identified in a timely manner and escalated for decision and resolution. If we consider the Facebook example in Chapter 8, a clear data governance and stewardship failing arose in the context of ‘fake news’ when a Facebook engineer identified something unusual in the data, a preponderance of extreme content aggregators and publishers in the top 25 sources of shared content (Warzel, 2017). Charlie Warzel reports that the engineer in question raised the issue in an internal discussion forum. The response to the issue was a discussion that ‘was brief – and uneventful’. In Warzel’s article a red flag for governance issues stands out as he reports that the engineer in question described the response they received as being ‘a general sense of “Yeah, this is pretty crazy, but what do you want us to do about it?”’ This would suggest a lack of appropriate, and appropriately formalized, systems of governance over information that might have helped Facebook get ahead of the ethical issues raised by ‘fake news’ and the filter bubble. It would seem there were no agreed-upon models of how to decide what to decide, and no defined principles against which an issue like this could be assessed and prioritized. Tellingly, there seems to have been no formal escalation path to raise the issue and track it to a resolution. It is not entirely one-way traffic between governance and ethics. A strong ethical culture supports and enables effective data governance in organizations in several key areas. Ultimately, governance of any kind includes a strong ethics component. This manifests in the style and method of governance, and the ethos applied to communicating and promoting governance in the organization. This ethic of the organization is an essential part of effective data governance, and part of that ethic may be the need to formally recognize that information is something that needs to be governed. It also

本书版权归Kogan Page所有

Information ethics and data governance

manifests itself in how the organization handles conflicts of ethical values and priorities between the ethic of the organization and the ethic of society – as well as between the ethic of the individual in the organization, in how they execute their duties and tasks for handling data.

Principles and modes of governance One of the fundamental principles of governance, whether data governance, organization governance or governance in general, is that you are always doing some form of governance and it is a conscious choice for you and your organization to make as to what mode of governance you apply. There tend to be four distinct approaches to governance in organizations, and society in general. These are set out in Table 9.1. For example, we have worked with organizations that embraced the philosophies of Agile development or Agile management. The executive teams Table 9.1  General modes of governance! Governance mode

General description

Anarchy

Individual process owners or end users have decision rights and there are no formal mechanisms for exercising decision rights, with decisions made locally on an ad hoc basis (Weill and Woodham, 2002)

Dictatorship/Feudal

Single decision maker at the most senior level in the organization or business unit. The dictator/monarch may delegate decision rights to direct reports. (Often results in people working around the dictator.)

Oligarchy/Federal

Governance rights are shared by a combination of senior executives across the organization in a leadership forum. Decision rights are federated out based on defined and agreed models such as service-level agreements (SLAs) (based on Weill and Woodham, 2002)

Democracy

Direct engagement with frontline staff and/or external stakeholders. In a traditional ‘government’ model, it is the importance of the voice of the citizen being recognized in the execution of governance decisions. In an information management context, it reflects the need to consider the ‘voice of the customer’ in critical decisions

本书版权归Kogan Page所有

273

274

Data Ethics

in these organizations usually espoused a belief that they were not doing governance. However, they had taken a conscious choice to apply a specific mode of governance in their projects (in this case democracy as all stakeholders had a say in the backlog prioritization exercises). If you have ever run a Scrum session or managed a Kanban board in an Agile development project you will know that there can be a lot of operational governance in using Agile methods (if you are doing them right). From a data ethics perspective, each of these generic modes of governance can have strengths and weaknesses (see Table 9.2). Another key principle of governance is that the motivation for why data governance is being introduced in your organization must be clearly communicated. This choice taken in this context sets the ‘tone at the top’ within which governance decisions and risk assessments will be taken. We discussed the importance of ‘tone at the top’ back in Chapter 4 and it has recurred as Table 9.2  Modes of governance with ethics considerations Governance mode

Potential strengths (from ethics perspective)

Anarchy

●●

Potential for faster response to front-line issues

Potential weaknesses (from ethics perspective) ●● ●●

●●

Dictatorship/ Feudal

●●

●●

Oligarchy/ Federal

●●

●●

Democracy

本书版权归Kogan Page所有

●●

●●

Clear articulation of single vision of ethics and values

●● ●●

Clear escalation point for issues Collaborative leadership model

Inconsistent approaches Decisions taken by individuals who may not be fully aware of all facts/ implications Potentially more likely to be prone to individual bias Potentially prone to individual bias May lead to a ‘groupthink’ risk where strong personality dominates ethical discussion

●●

May lead to slower decisions

●●

Groupthink may still be an issue

Supports crossorganization alignment Open and engaged Inclusive of disparate opinions

●●

●●

Minority opinions may be drowned out Will lead to slower decision-making processes

Information ethics and data governance

a theme in Chapter 6. This ‘tone at the top’ needs to find its expression in guiding principles that can be readily cascaded and communicated throughout the organization. The DAMA DMBOK (DAMA International, 2017: 76) tells us that ‘guiding principles are the foundation of DG policy’. Of course, it is not enough to declare your organization’s mission is ‘Don’t be evil’; clearly articulated precepts of what ‘evil’ is and how it might best be avoided are essential to avoid falling afoul of ethical issues in information management (Lawler, 2015). Likewise, in the context of an organizational ‘tone at the top’ that demands that staff ‘move fast and break things’, or that emphasizes the stability of the technical infrastructure (the ‘Technology’ vertical in the E2IM framework model in Figure 9.1), should we be surprised when the organization struggles to consistently apply or meet ethical standards in how it governs data (Murphy, 2014)? John Ladley (2012) has described the importance of principles in data governance as follows: ‘Principles are statements of philosophy. Think of them as a bill of rights – core beliefs that form the anchor for all policies and behaviours around information asset management (IAM). They are beliefs to be applied every day as guidance for procedures and decision-making efforts.’ While organizations can begin to develop policy-absent formal principles, data governance initiatives that are not grounded on articulated statements of information philosophy invariably end up being very narrowly focused and reactive, which leads to challenges in sustaining the governance disciplines. This is compounded further when the ‘tone at the top’ decides to declare ‘mission accomplished’ on a data governance initiative. Data governance initiatives that are underpinned by a clear set of principles are more likely to achieve sustainable change.

Defining principles The DAMA DMBOK defines a number of principles for data governance. Some of these are directly applicable to the discussion of information ethics. Their application is constrained somewhat by their focus on the financial perspective of information governance such as data valuation. However, they can be mapped to the requirements of an information ethics initiative and provide a starting point for the development of ethical principles. Yet we should not forget that fundamental ethical principles themselves can be

本书版权归Kogan Page所有

275

276

Data Ethics

restated as data management principles, and that governance principles need to be underpinned by a guiding business strategy or philosophy. This means that in defining your principles for ethical information governance you will need to consider what normative theory of business ethics your organization is aspiring to and what business objectives you are seeking to support in an ethically appropriate manner. This is an essential aspect of ensuring an alignment of your ‘tone at the top’ with the ‘action in the middle’ to ensure you consistently deliver the right ‘outcomes on the ground’. This process will require sincere engagement from senior management to be effective and it is important, in John Ladley’s words, ‘to spend time with the implications and ramifications of the principles’ as you will need to be able to explain the rationale and understand the implications of that rationale for the policies and procedures that will flow from your principles. Table 9.3 sets out some principles drawn from the DAMA DMBOK and explores their ethical perspective. In addition to these generally applicable principles for data governance programmes, Robert Seiner, another independent data governance consultant, highlights four other core principles (shown in Table 9.4) that should be considered when developing a data governance initiative (Seiner, 2014). Robert Seiner tells us that ‘the simpler we stay with our concepts around data governance, the easier it is for people in our organizations to understand what data governance is all about’ (Seiner, 2014). This is true. But a review of the example principles outlined above reveals precious little about the ethical principles that the organization applies to the processing and management of data. These kinds of principles are needed, in conjunction with the many other excellent principles for data management, to provide a properly rounded and holistic statement of principles for the ethical governance of information in the organization. What might these additional ethical principles be? Recall our discussion of principles back in Chapter 3. Organizations can refer to industry standards, legislation, regulatory guidance and a range of other sources when seeking to identify their data ethics principles. It is essential that these principles, however they are developed or defined, are translated into actionable policies, procedures and processes and can be evidenced through measurable outcomes. Given the range of public sources of starting points for data ethics principles, how your organization translates ethical principles into management practices will be a source of competitive advantage.

本书版权归Kogan Page所有

Table 9.3  DMBOK data governance principles through ethics lens Generic DG principle Accountability principle

Description

Ethical perspective

An organization must identify individuals who are Accountability is a function of the consequentialist ethical principle. If ultimately accountable for data and content of all types. the required standards are not met, there must be mechanisms for holding the organization and leadership to account. This is an explicit principle in the EU’s GDPR (Data Privacy) legislation.

Asset Principle Data and content of all types are assets and have characteristics of other assets. They should be managed, secured and accounted for as other material or financial assets.

From an ethical perspective, it is important to know where the data you are processing is stored, how it is managed and how it is secured.

Due Diligence Principle

Ethically, this is the principle of avoiding maleficence in the processing or management of information.

If a risk is known, it must be reported. If a risk is possible, it must be confirmed. Data risks include risks related to poor data management practices.

Going Concern Data and content are critical to successful, ongoing Principle business operations and management (ie they are not viewed as temporary means to achieve results or merely as a business by-product).

Ethically, this principle comes close to the Kantian formulation of ‘Treat people as ends in themselves’, but falls short. However, the emphasis on ‘going concern’ implies a longer-term planning and governance window, potentially aligning with stakeholder theory model of ethics.

Liability Principle

There is a financial liability connected to data or content This is a consequentialist restatement of the accountability principle. based on regulatory and ethical misuse or However, it expresses the consequence from the perspective of the mismanagement. organization only.

Quality Principle

The meaning, accuracy and life cycle of data and content Again, the ethical component that is missing is the motivation other can affect the financial status of the organization. than financial impact to the organization.

Risk Principle

There is risk associated with data and content. This risk This is a utilitarian/consequentialist ethical principle at work. We have must be formally recognized, either as a liability or through a thing that creates risk, therefore we need to formally manage that incurring costs to manage and reduce the inherent risk. risk and mitigate it (or accept consequences).

SOURCE Adapted from DAMA DMBOK

277

本书版权归Kogan Page所有

278

Data Ethics

CASE STUDY  Ethical principles driving data decisions at LEGO LEGO is a good example of how ethical principles have informed its strategies, practices and processes for how it handles the data of its most valued customers – the 50 million children who play in its online universes (Hasselbalch and Tranberg, 2016). LEGO has determined that the children who use its platform are the ends that its platform serves, supporting their creativity and enabling communication in a safe and secure manner. According to Hasselbalch and Tranberg, LEGO opted not to use social media connect buttons – despite many children already being on social media platforms – because it could not get assurances as to what data would be gathered from its sites. In this way, LEGO affirmed an information-centric variation on an existing core principle of corporate responsibility in the organization – that it is accountable for the social and environmental behaviour of its physical suppliers. Another key ethical principle LEGO has applied is that it wants to remain in control of what happens to the data about its customers. As a result of this, LEGO hosts all its data in Denmark; it doesn’t use free third-party analytics tools; it encourages children to use pseudonyms to protect their identities; and it complies with age verification and parental consent rules under COPPA and the GDPR. In the context of the E2IM model, this also shows that LEGO has taken the time to identify and define who its stakeholders are. While parents might be the purchasers of LEGO kits, the ultimate customer is the child (or child-at-heart) who plays with the LEGO kits and interacts with the LEGO online universes. Case study questions 1 How might the ethical principles underpinning LEGO’s information strategy in

this context be expressed? 2 What situational modifiers might arise in LEGO to discourage the use of

technologies that track identifiable users of its universe? 3 How does the E2IM model help explain the relationship between LEGO’s

business ethics and strategy, its information ethics and strategy, and the implementation of specific technology services and functionality in its online environments?

本书版权归Kogan Page所有

Information ethics and data governance

CASE STUDY  Ethical information governance at Apple Apple also has well-defined ethical principles for information management. Speaking at the CPDP conference in Brussels in early 2017, Jane Horvath, then Senior Director of Global Privacy at Apple, outlined some of the core principles it applies in the development of its products and services (CPDP Conferences, 2017). The ethical principles espoused by Apple include: ●●

Right and wrong is determined from the perspective of its customers.

●●

Technology should enable individuals to control their data.

●●

Data is processed on devices.

●●

Where server-side responses are required, the data is collected with an identifier that is not tied to any other identifier.

●●

Data is the customer’s, not Apple’s.

●●

Privacy is strategically and deliberately designed into products.

These principles are key cornerstones that Apple has developed its product strategy around, avoiding the rush to monetize its customers’ data directly but instead seeking to develop capabilities in its devices that allow advanced functionality to be deployed with minimal server-side processing of data that would identify an individual user of an Apple device or service. Mapping them to the E2IM model, you can see a very strong alignment of principles. Apple defines ‘ethical’ from the perspective of its customer, just as the E2IM framework requires organizations to consider the ethical expectations of their customers in the context of the information and process outcomes that are delivered. It also influences the architectural choices that Apple make in the design of its services. Data that is gathered has to be processed on the device rather than being processed in Apple’s data centres at an individual or identifiable level. Data that has to be processed on the server side has a pseudonymous identifier associated with it. These are conscious design choices that inevitably reduce the granularity of data that Apple gathers about its customers. By having a clearly articulated set of ethical principles for information, Apple is able to implement appropriate governance and controls to ensure that the information and process outcomes experienced by its customers meet their ethical expectations.

本书版权归Kogan Page所有

279

280

Data Ethics

Case study questions 1 What might Apple be losing by adopting these kinds of ethical information

principles? 2 What differences do you see between the approach Apple is adopting and the

approaches adopted by Facebook or Google, or other companies in the information industry? 3 What ethical framework (see Chapters 1 and 2) best describes Apple’s

approach? 4 In recent years, moves by Apple to implement new capabilities in response to

global challenges highlight the complexity of implementing principles. Consider the following examples. Do you think Apple made the right decisions in line with their principles? a. Apple moved to develop a Covid-19 exposure notification capability available to governments during the pandemic. They built it into their operating system in a way which required a decentralized approach to be taken so that governments using the app could not collect tracking information centrally. b. Apple moved to implement scanning all iCloud accounts for image fingerprints matching child sexual abuse (CSA) material, but reversed their decision in the face of public outcry over invasion of privacy rights.

Table 9.4  Core data governance principles (Seiner) Principle

Description

Ethical perspective

Recognize data as a valued and strategic asset

The organization must shift perspective from ‘my data’ to ‘our data’

From ethical perspective, this principle would need to articulate the value of outcomes arising from the processing or use of data

Assign clearly defined accountability

The organization must define data governance as everyone’s responsibility

This is an articulation of a consequentialist frame for ethics and is a restatement of the accountability principle outlined above

Manage data to follow internal and external rules and regulations

Data must be governed to avoid risk and compliance issues

This is essentially a statement of a shareholder theory minimalist approach to ethics that risks setting the bar low for ethics

本书版权归Kogan Page所有

(continued)

Information ethics and data governance

Table 9.4  (Continued) Principle

Description

Ethical perspective

Consistently define and manage data quality across the data life cycle

Right first time, every This quality systems principle time could be supportive of information ethics if ‘right first time’ was defined with reference to the dimensions of ethical information quality defined in this book

SOURCE Adapted from Seiner (2014)

Looking at these two case studies, and considering the various ethical frameworks we discussed in earlier chapters, we can start to formulate some candidate ethical principles for data governance (Table 9.5). Note that these are candidate principles. You will need to define and develop principles that are appropriate to your organization. Ideally, you should align these information ethics principles with existing statements of business ethics and business values in the organization. A key point about these principles when you define them for your own organization is they must be simple for people to understand, and the rationale, benefits and implications of the principles must be communicable and must be capable of being translated into policies, procedures and governance controls. This hierarchy of governance is an important concept, particularly in the context of ethical information management. It is through this cascading of values that your organization brings the ethic of society and the ethic of the organization into alignment. Table 9.5  Example ethical principles for data governance Ethical principle

Description

People are an end in The processing of data about people in the and of themselves, organization is done in a way that respects them and not a means to an end their privacy The arbiter of our ethics is the customer, through the outcomes they experience

The information and process outcomes that our stakeholders experience, and the degree to which those experiences match expectations, is the benchmark for our ethical standards

The customer owns their data. We use it on trust

Data that is obtained from or about our customers is their data. We use it on trust and must ensure we are transparent and truthful about what we will do with that information

本书版权归Kogan Page所有

(continued)

281

282

Data Ethics

Table 9.5  (Continued) Ethical principle

Description

The only mode of expression for ethics is action

It is not enough to talk about information ethics, we must design our information handling processes in an ethical manner, and design ethics in

The processing of data We need to design our processes for acquiring, should be designed to analysing and using data in a way that serves mankind, serve mankind delivering utility, equality and supporting dignity, while avoiding unnecessary invasion of privacy or infringement of other fundamental rights First, do no harm

When engaging in any processing of information, we must aim to avoid information or process outcomes that cause harm or loss to people

Accountability follows the data life cycle

Everyone in the organization is accountable for how they obtain and use data, and have an obligation to ensure the effective stewardship of information to ensure the appropriate information and process outcomes are consistently delivered

Figure 9.2  The hierarchy of principles to outcomes

Principles Principles inform policies Policies

Governance

本书版权归Kogan Page所有

Policies guide procedures

Procedures

Processes

Controls Controls mitigate risk through prevention, or detection and remedial action

Outcomes

Procedures are executed through processes

Quality is measured through experience of outcomes

Information ethics and data governance

Ultimately, the more understandable the core ethical principles that are applied to your organization’s information management practices are, the more likely it is that individuals will interpret and apply policies and procedures correctly. Equally importantly, where there is a gap in the defined policies and procedures, clearly defined ethical principles should encourage and support individuals to make appropriate choices to deliver ‘fit for purpose’ information and process outcomes (Figure 9.2).

Information stewardship and the ethic of the individual One of the ethical principles we identified in the last part of this chapter was the principle of accountability throughout the life cycle of the information. We expressed this accountability in the terms of stewardship, which is a term we encountered first back in Chapter 5 where we introduced the DAMA DMBOK and some of its core management disciplines. In the context of ethical information management, effective information stewardship in the context of a formally defined and designed information governance framework is essential. To recap, information stewardship is usually defined along these lines: ‘An approach to information/data governance that formalizes accountability for managing information resources on behalf of others and for the best interests of the organization’ (McGilvray, 2008). From an information ethics perspective you need to consider expanding this definition. As it is defined usually, information stewardship is strongly linked to the ethic of the organization as it focuses on the ‘best interests of the organization’ and does not explicitly consider the interests of those who are outside the organization, the stakeholders in wider society. As such, the current definitions of information stewardship risk falling into a shareholder theory normative model of ethics. However, this is actually not consistent with the fundamental concept of stewardship, which is generally recognized as ‘the acceptance or assignment of responsibility to shepherd and safeguard the valuables of others’ (Wikipedia, nd). We might also want to consider the definition of stewardship in ISO 20121:2012, the standard for environmentally sustainable event management, which defines the concept as the ‘responsibility for sustainable development shared by all those whose actions affect environmental performance, economic activity and social progress, reflected as both a value and a practice by individuals, organizations, communities and competent authorities’ (ISO, 2012). From an ethical perspective, this definition of stewardship creates a broader set of principles and values and also reflects a broader perspective on who the stakeholders are in the information and process outcomes you

本书版权归Kogan Page所有

283

284

Data Ethics

are trying to deliver through your management and processing of information. It also highlights the importance of the practice of stewardship. In this context, we would define ethical information stewardship as follows: Ethical information stewardship is an approach to information/data governance that formalizes responsibility and accountability for sustainable information management shared by all those whose actions affect the information and process outcomes experienced by stakeholders, inside the organization and in wider society, expressed as both a value and a practice by individuals, organization communities and competent authorities.

This definition of information stewardship from an ethical perspective reflects a number of key aspects of ethics and governance. Among these is the idea of sustainable information management. By this we mean that the processing and management of information is sustainable from both the perspective of the organization and other stakeholders. This is consistent with a stakeholder theory normative ethical framework. Furthermore, the definition incorporates a reference to the ‘sole medium of expression’ for ethics – action. The definition above also highlights the various data governance structures that organizations tend to put in place. The DAMA DMBOK (DAMA International, 2017) identifies the generic structures listed below. Your organization may choose to call them by different names, and not all levels are implemented in every organization. We have also expanded on the DAMA definitions slightly for this text: ●●

●●

●●

Data Governance Steering Committee: the primary and highest authority organization for data governance in your organization. Operating as a cross-functional group of senior executives, it is responsible for oversight, support and funding of data governance activities. Consists of a crossfunctional group of executives. They may be aligned with other top-level steering committees in the organization such as risk or audit committees. They are the competent authority for final decisions on information/data management policies, strategies, principles and definitions. Data Governance Council: an executive-level line-of-business-level coordinating council responsible for managing and overseeing the execution of data governance initiatives and acting as a first level of escalation for issues. They are the competent authority for second-line escalation of data governance issues in the organization. Data Governance Office: responsible for day-to-day management and coordination of data standards and definitions across the organization and across all data management disciplines in the organization. Consists of

本书版权归Kogan Page所有

Information ethics and data governance

coordinating roles such as data stewards or data owners. They are the competent authority for the coordination and management of definitions and standards in the organization. ●●

Data Stewardship Teams: communities of interest focused on one or more specific subject areas or projects. They consist of business and technical data stewards and collaborate on defining data definitions and standards in the organization. They are also the ‘eyes and ears’ of the data governance function. Data stewardship teams are an organization community addressing data issues. They are sometimes referred to as ‘communities of practice’ or ‘stewardship forums’.

These governance structures serve to support different levels of information/ data stewardship in the organization. These structures are, in effect, the lines that link the different boxes in the E2IM framework. They are the formal, and semi-formal, lines of communication that ensure alignment between business, information and technology verticals in the organization, and ensure alignment across the different levels in the organization. As you learnt in Chapter 5, there are different data stewardship roles that can be defined at the different operating levels of the organization (see Figure 5.3). It is important, particularly in the context of transversal issues such as ethics, that you avoid defining stewardship roles rigidly based on the concepts of ‘business’ or ‘IT’ stewards. The people performing these roles do so due to their relationship with data and information in the organization. Figure 9.3  The Castlebridge 3DC stewardship model (simplified version)

Operational

Tactical

Strategic

Doer

本书版权归Kogan Page所有

Definer

Decider

Coordinator

285

286

Data Ethics

Ideally, they are ‘self-selecting’ and the structures you implement in your data governance framework will recognize their efforts and enable them to be more successful and to contribute more. Even where they are appointed, the structures that are put in place for data governance in your organization should work to support effective alignment around common standards, both in the context of technical standards and definitions but also in the context of ethical standards and values in the organization. The E2IM model we introduced in Chapter 7 (see Figure 7.4) illustrates the alignment challenge that needs to be addressed and provides a basis for establishing the various roles and responsibilities that need to be filled, and establishes a basis for alignment of the ethic of the organization with the ethic of society in the context of information management. This brings us to an important point. As with many things in life and business, ethical information management, and the associated data governance activities, are ultimately about ensuring alignment of people towards a common vision, a common cause and a common way of working. How this is implemented, and how successful that implementation will be, is a factor of the ethic of the individual. The ethic of the individual represents the bundle of beliefs, perceptions and values that we each bring to the organization and constitutes the lens through which we view and interpret the ethic of the organization and the various policies, standards and guidance that might exist in relation to ensuring the consistent delivery of appropriate information and process outcomes. The disconnects and conflicting priorities that this can give rise to are issues that need to be managed through effective governance and a clear ‘tone from the top’. Steven Feldman describes the ‘split personality’ problem that faces business managers like this, describing a ‘single-minded pursuit of profit that sometimes has difficulty even bridling itself at the boundaries of the law’ in conflict with the fact that ‘business managers are socialized in communities where virtues of honesty, fairness, and trustworthiness are held in high regard’ (Feldman, 2007). The challenge in your organization is to define and communicate ethical values for information management that people can align with the ethic of the individual that they bring to work. Some of your colleagues may instinctively get the importance of ethical information management and may readily adopt and adapt to a stakeholder theory or social justice model of ethics. Others may default to a ‘do the minimum necessary to tick a box and move on’ approach that aligns more with a shareholder theory normative model. You may find you have some hard-core consequentialists in your organization. The opportunity that is presented through effective stewardship roles and supporting data governance structures in the organization is that for-

本书版权归Kogan Page所有

Information ethics and data governance

malized stewardship roles and responsibilities for the promotion of ethics and ethical principles can help support and sustain necessary changes in the ethic of the organization.

Communication of ethical values and supporting ethical values through stewardship and governance Communication is a cornerstone of data governance. In order for data governance to be successful, it must be implemented and communicated as something dynamic and responsive to change. It cannot be a set of stated values and policies and procedures that sit on a shelf or somewhere in your mess of a SharePoint server, never to be referred to again. Data governance values and policies must be communicated and embedded into your ways of working, in different stages of design development and execution. The organization’s ethical value must be communicated in ways that people in the organization relate to, and that they can adopt in alignment with their individual ethics. As an example of supporting ethical value through stewardship and governance, Apple’s stewardship around data privacy involves the engagement of data privacy experts within product development teams early in the design and development processes in the organization. This is a formal stewardship function as part of the ethic of the organization that serves to support, and is supported by, the ethics of the individual. However, in other organizations you will often see conflict between the ethic of the individual and the ethic of the organization, and even the ethic of society. This conflict needs to be managed through agreed-upon models for decision making. Handled well, conflicts of this kind can improve the alignment between the ethic of the organization and the ethic of society – after all, the individuals in your organization are also members of society. Handled badly, this may result in the development of groupthink in the organization, in which individual concerns are not given due consideration. In such cases, your organization may find itself facing whistleblowing, brand damage or other impacts. The Facebook ‘fake news’ example discussed in Chapter 8 (Warzel, 2017) is a good example of where the ethic of the individual can run into problems with the ethic of the organization. In that case, an individual engineer identi-

本书版权归Kogan Page所有

287

288

Data Ethics

fied something that looked unusual in the data about content sharing. This was raised through a discussion forum. But in the absence of agreed-upon models and methods for escalating issues like this (such as agreed models for root cause analysis and upwards reporting for guidance or action), the signal that there was a potential problem in the news feeds was missed. The ethic of the organization was driven by quantifiable numbers, but did not stretch to looking behind those numbers to perform a qualitative analysis – the ‘Study’ part of the Deming/Shewhart PDSA cycle we have discussed elsewhere. This is consistent with research into organizational and individual ethical decision making, which highlights the importance of the dominant ethic of the organization when individuals are making ethical decisions (Elango et al, 2010). The researchers found (unsurprisingly) that ‘managers come to ethical decision making with their own experiences and values, but they also are influenced by the ethical standards and practices they observe in the workplace’. This is something we would understand intuitively, but it is starkly laid out in the academic research. Other research in this area also highlights the importance of planned change in this context, including the importance of providing information and training (Sullivan, 2004). In Sullivan’s research the statistical data indicated that accounting students’ use of professional judgement increased after being given four hours of training on the relevant professional code of conduct, and demonstrates the positive impact that ethics instruction can have in the organization. But, as to the question of why good people sometimes allow bad things to happen, the work of Linda Trevino (1986) provides a model to represent and explain this (see Figure 9.4). This model will also look very familiar in the context of an organizational model for data governance. Trevino presents an interactionist model for the relationship between the ethics of the individual and the ethical context of the organization, which work together to produce ethical or unethical behaviours. In Trevino’s model, ethical dilemmas are first filtered through the individual’s own moral filters (the ethic of the individual). Trevino builds on the work of Kohlberg (Kohlberg and Kramer, 1969) in this area to identify three key stages of moral development: ●●

Preconventional – the individual is concerned with personal impacts to them, including punishment or rewards, and they tend to stick to rules for the sake of penalty avoidance. This mirrors closely at the individual level the ethos of shareholder theory that we see at the organizational level.

本书版权归Kogan Page所有

Figure 9.4  The ethic of the individual in E2IM Ego strength (confidence of individual)

Field dependence (do they have support?)

Locus of control (what do they feel they can influence?)

Individual moderators Process outcome

Ethical issue

Stage of cognitive moral development [ETHIC OF THE INDIVIDUAL]

Quality of ethic

Action taken/ decision made

Stakeholder experience [ETHIC OF SOCIETY]

Information outcome

Situational modifiers

Contextual factors * Immediate job context * Reinforcement * Other pressures

Organization culture and governance * Normative structure * Role models and behaviours * Responsibility/ accountability

Nature of the work * Role taking – can individual ‘step up’ and contribute? * Resolution of moral conflict

Ethic of the organization

本书版权归Kogan Page所有

289

SOURCE Adapted from Trevino’s interactionalist model for ethical decision making in organizations

290

Data Ethics ●●

●●

Conventional – at this level the individual displays stereotypical ‘good’ behaviour and does what is expected of them by people close to them. At this stage, individuals seek to fulfil obligations they have entered into with others and to meet expectations. As individuals mature at this level, they increasingly focus on contributions to society or to the group. In many respects, this echoes stakeholder theory as a normative ethical model at the organization level. Principled – at this level the individual is focused on the ‘social contract’ and social justice and supporting individual rights. They are aware that different groups may hold different values and they seek to find balance where possible. At the most ‘mature’, the individual follows self-chosen ethical principles that guide their actions.

Trevino identifies a few other individual factors that will affect the ultimate outcome of an ethical decision. If the person has good impulse control and follows their convictions they will tend to make more consistent ethical decisions. If they are dependent on external referents and validation, they may be more likely to carry out an unethical act if asked to by a superior, or if they are unaware of or are shielded from consequences stemming from that act. Finally, the ‘locus of control’ that the person feels they have over events in their lives. People who have an internal locus of control believe their efforts deliver outcomes and take a great deal of personal responsibility for their actions. People with an external locus of control are less likely to take personal responsibility for the ethical outcomes of their actions. In the context of the organizational influences, Trevino identified several factors that can influence the ethical development of individuals. Among these is the influence of ‘role taking’, the ability to be centrally involved in the communications and decision making of the group, especially when placed in democratic leadership roles. This sounds an awful lot like the coordinator role of a data steward, where the individual needs to exercise ‘soft power’ to guide and develop standards and practices in the organization. The organization culture around stewardship therefore is a key influencer of how individuals in the organization will evolve their ethical frameworks. Organization culture sets behavioural norms, and the collective norms about what is or is not appropriate behaviour will influence the actions of the individual. These norms not only guide the individual’s decisions about what is ‘right’ in the context of the organization, but they also define who the individual (and by extension the organization) perceives as being responsible for remedying the issues.

本书版权归Kogan Page所有

Information ethics and data governance

Aligning Trevino’s model with the E2IM framework, we establish that the ethic of the individual is a factor of their personal cognitive moral development. However, in an organizational context, even the most ethical person can suffer as a result of individual moderators that affect or impair their ability to act or decide in congruence with their personal moral code. For this to be counterbalanced, there needs to be effective situational modifiers that support ethical conduct through the ethic of the organization. These situational modifiers need to support individuals in acting ethically, and should clearly set out what ‘ethical’ is in the context of the organization. The interplay between the ethic of the individual and the ethic of the organization in the context of an action or a decision that is being taken about or with information results in a series of outcomes that the ethic of society then judges to be either acceptable or not. Appropriate structures and frameworks are therefore needed, and must be planned for to ensure appropriate alignment of the ethic of the individual with the ethic of the organization, and ultimately with the ethic of society. Research (Maclagan, 1983; Schwartz, 1968) has shown that an awareness of the consequences of actions on others, and an ascription of responsibility to oneself, are necessary conditions for the activation of the ethic of the individual in an organization context. Where the culture diffuses responsibility for actions or ethical outcomes to others, this can lead to people claiming they were ‘acting under orders’ or seeking some other entity to remedy the situation (such as Facebook staff looking to governments to regulate the ‘fake news’ issues). In designing your information stewardship model for ethics, it is essential therefore that: ●●

●●

●●

●●

Individuals are given a chance to engage and be involved in role taking as democratic leaders. Supports should be in place to give people a normative structure for discussing ethical issues in information management. Ethics should be made relevant and relatable to the immediate context of the individual’s job. There should be clear mechanisms for consequences to be identified and understood, both in terms of consequences for the external stakeholders affected by actions, but also in the context of consequences within the overall governance structure of the organization.

本书版权归Kogan Page所有

291

292

Data Ethics

Using storytelling to communicate values Stories and narrative are key tools to help communicate the ethic of the organization and help people anchor their own individual ethical framework to a concrete example. Stories and storytelling are one of the most important ways we have to teach and share our culture. Think back to how you learnt some of your first lessons or explored some of your first questions about morals and ethics. Globally, cultures give different emphasis and prestige to the place of stories in their culture, whether they are seen as a part of ‘non-essential’ entertainment as is often the case in the way contemporary US culture may deprioritize it, or as sacred, vital and essential to cultural identity, history and understanding of the universe, as in Indigenous Australian culture. In all cases, though, storytelling is universally a way our cultures and values are transmitted. The stories we know, their images and archetypes, give us concrete images to anchor abstract concepts and values. Storytelling can stretch our imaginative and empathetic powers, and we use it to frame possible ethical problems that we haven’t personally encountered in concrete ways. We can use extended metaphors to approach difficult issues in slightly different ways. Science-fiction authors have tangled with the implications of some of the questions we are now facing in reality. We’ve borrowed new concepts from these imaginary futures that examined the author’s present. The word ‘robot’ comes from a 1920 play by Czech writer Karel Cˇapek, R.U.R (Rossum’s Universal Robots). Isaac Asimov took the ideas and possible threat of Cˇapek’s robot revolt and created hypothetical ‘Laws of Robotics’ that might prevent a ‘robot’ uprising. Now, even though we are not facing the question of a self-aware autonomous artificial being, we are facing immediate problems of what types of ethical or moral ‘laws’ we need to encode in our creations. This can be a powerful tool for shaping common understanding of what we envision of our values and standards. Deming’s 14 points for transformation, which we discussed back in Chapter 8 (see Table 8.1 for a refresher on these principles) begin by advising organizations to adopt a ‘new philosophy’ and to ensure a ‘constancy of purpose’. The adoption of a ‘new philosophy’ of ethical information management requires the organization to package and communicate specific messages about the ethical values and standards that are expected of individuals in the organization. What does the expected behaviour look like? How will we know we have achieved it? When using stories and narrative in this way, it is important that you understand the fundamentals of crafting your narrative.

本书版权归Kogan Page所有

Information ethics and data governance

To engender a broad-based action, your story will need to be communicable, relatable and, above all else, true to the vision you have for the future ethic of the organization and how it will align with the ethic of society. Stephen Denning has identified a number of common narrative objectives or goals for culture change in an organization. In doing so, he suggests several different categories or types of story, each serving a distinct purpose. For example, a ‘springboard story’ is a narrative pattern used to spark action and gather support for broad-based action to achieve an objective. Another narrative pattern is the ‘transmitting values’ pattern, which often takes the form of a fable or a parable and includes details of desired behaviours in the ethic of the organization (Denning, 2000, 2011). Increasingly, change managers are turning to old established and well-trodden principles and practices of storytelling to communicate the meaning, objective and vision for changes to the ethic of the organization. Your story needs to take into account the needs of the organization. But above all, it must be true and consistent with reality. A true story isn’t just a story that lacks inaccuracies. You can mislead using facts and statistics, just as well as you can tell the truth using fiction. People may not immediately detect the lack of consistency with reality or a greater context, but perceived deception will result in a loss of trust. Even subtle misinformation in factual headlines can have ongoing effects. Researchers have studied the effects of misleading newspaper headlines. Even when misconceptions are corrected by correct representation in the full article, can still lead to ‘misperceptions and misinformed behavioral intentions’ (Ecker et al, 2014). The recognized tendency for many newspapers to use misleading headlines has directly impacted people’s willingness to trust the Fourth Estate, and this lack of trust has been weaponized with a direct impact on society. If you tell factually correct stories that go against a greater emotional truth or the spirit of ethical engagement, you risk losing trust and engagement. It is the equivalent of a process that while technically compliant violates the ethical outcome characteristic of verity/non-deceptiveness. It’s important to remember, though, that while these culturally transmitted ideas have power and help shape our understanding of things, they can also result in misunderstanding of reality. In our fiction we create models of the world in varying relations to reality. In doing so, we create assumptions about the world, about humanity, and consequences of actions. These can be wonderful tools for teaching, and incredibly useful tools for teasing out complexities of ethical issues and their possible impacts. But no fiction or model can completely match the complexity of reality, and our models will also carry with them assumptions and blind spots.

本书版权归Kogan Page所有

293

294

Data Ethics

Information ethics and the separation of duties Another key aspect of effective data governance is the development of an effective separation of duties between oversight and execution in the context of information management processes. This is also sometimes referred to as the ‘segregation of duties’ (SOD). This is, in and of itself, an ethical value relating to the governance and execution of processes. According to the American Institute of Certified Public Accountants: ‘The principle of SOD is based on shared responsibilities of a key process that disperses the critical functions of that process to more than one person or department’ (AICPA, nd). While generally considered an accounting concept, separation of duties is also a prudent risk-management concept. In the context of information management, it means that no part of the organization should be defining what ‘right’ is in relation to the required information and process outcomes as well as being accountable for the management of data to achieve goals. We see this in action in the field of software quality, where it is not good practice to allow a developer to test their own code before production release. We also see it in the EU’s General Data Protection Regulation (GDPR), which explicitly requires that data protection officers are independent of influence in the performance of their oversight and monitoring tasks. Ultimately, separation of duties is a backstop control against the ethic of the individual to ensure that, at a minimum, people in the organization execute their functions in a way that helps avoid conflicts between different ethical perspectives. In the context of Trevino’s model discussed earlier in this chapter, separation of duties gives you a normative culture, a defined mechanism for addressing moral conflict, and a mechanism for ensuring awareness of consequences of actions. Therefore, when defining and developing your frameworks for ethical information governance it is important to consider how you would implement an equivalent separation of duties for ethical decisions about information management, as you would for the governance of the financial accounting or procurement functions of your organization.

Information ethics and risk perception A key function of data governance is to ensure that information-related risks are managed appropriately. Risk is defined in ISO 31000 (ISO, 2018) as the ‘effect of uncertainty on objectives’. Traditionally, organizations assess risk from the perspective of risk to the organization or the organiza-

本书版权归Kogan Page所有

Information ethics and data governance

tion’s objectives. This is a very strong cultural norm in most organizations and can form part of the ethic of the organization. However, this internal focus can constrain the perspective of the organization and may result in unethical decisions being taken. In Chapter 4 and subsequent chapters we discussed the Volkswagen emissions scandal as a reference example. In this case, the organization sought to manage the risk of failing emissions tests by designing its engine management system so that it would pass the tests. From an internal perspective, the stated objective to pass emissions tests appears to have been interpreted as a requirement to pass the tests at all costs. However, the ethic of society was that people wanted to be able to rely on the data provided regarding vehicle emissions, as did governments that used that data for wider social policy planning around issues such as healthcare (fewer emissions means fewer people with chronic respiratory conditions) and climate change (reduced greenhouse gas emissions means targets in climate change agreements might be met). This highlights a very critical aspect of risk management and governance in the context of information ethics. It is essential that the organization’s risk management and governance approach for information and data consider the impacts on external stakeholders as a result of the information and process outcomes that are delivered. This is actually an explicit feature of legislation such as the EU’s GDPR, which requires the risk to the data privacy of individuals and the risks to the rights and freedoms enabled by data privacy rights to be considered when conducting or designing any information-processing activity. From a normative ethics perspective this represents a shift from a shareholder-theory model, where the prime emphasis is placed on protecting the bottom line of the organization, to a stakeholder-theory model, where there needs to be a broader identification of stakeholders and a balancing of competing interests and objectives. This means risks to both the individual and the organization need to be considered, and formal structures and processes are required to ensure that those decisions are taken objectively and are recorded.

Data review boards Data review boards are an adaptation from the field of life sciences where mandatory ethics checks through institutional review boards or ethics re-

本书版权归Kogan Page所有

295

296

Data Ethics

view boards are required before human subject experimentation. They were adopted as a governance and oversight tool after various human-subject experimentation scandals mentioned elsewhere in this book, and the findings of the Belmont Report. Review boards provide a formal mechanism in the organization to ensure that there is broad input and insight into the organization as to the measures necessary to identify and address ethical issues that may arise from the use of new technologies or engagement with particular technology suppliers. They also can be engaged to assess ethical risks arising from the design, development or adoption of new data products or services. They can provide an independent best practice review function to ensure that the organization is implementing data ethics principles and practices consistently and that those practices remain up to date and relevant, given changes in technology, social awareness or best practice evolution. In practice, they are another layer of data governance applied to the ethical review of data handling in the organization. They may form part of the executive steering committee for the governance of data in the organization. However, as the review board will need to have expertise and insight into data ethics practices and considerations, it is advisable to ensure that there is relevant expertise either on the board or available to the board, if one is convened. It is essential to avoid a review board becoming another layer of internal ‘rubber stamping’ of existing decisions. The same objectives of review and preventative evaluation of proposals and plans for the use of data in the organization might also be met by building an ethics review step into the formal agenda of any decision-gating or quality assurance sign offs that the organization may deploy as part of its general quality management system or project management life cycle, subject to there being appropriate escalation procedures defined as part of your data governance framework to ensure that ethical questions are addressed rather than being waved through to check a box in a task list.

Information ethics and data governance maturity In the discussion of stewardship and the ethic of the individual, we mentioned the idea that individuals tend to evolve their cognitive model of ethics over time as they age and mature. The hope is that, as you grow and experience life, your frame of reference for ethics evolves and you have the potential to become more principled, which Kohlberg aligned with concepts we find in social justice ethical models rather than the more utilitarian or con-

本书版权归Kogan Page所有

Information ethics and data governance

sequentialist models. Of course, not everyone evolves and matures at the same pace. Indeed, it is a constant challenge of the human condition that some people do not mature their cognitive model of ethics beyond a causeand-effect consequentialist frame of thinking. Similarly, data management practices in organizations evolve and mature. Data management capability maturity models are defined in terms of a progression through a number of stages, with each stage representing a certain desired set of process characteristics or capabilities. Just as people ideally mature in their ethical capability, organizations should also, ideally, mature in their information management capabilities. Unfortunately, just as people sometimes get stuck at a particular level, organizations can also struggle to break through to the next level of maturity in their management practices for information. According to the DAMA DMBOK (DAMA International, 2017), common labels applied to different levels of information management capability include: ●●

Level 0 – Absence of capability

●●

Level 1 – Initial or ad hoc: success depends on the competence of individuals

●●

Level 2 – Repeatable: minimum process discipline is in place

●●

Level 3 – Defined: standards are set and used

●●

Level 4 – Managed: processes are quantified and controlled

●●

Level 5 – Optimized: process improvement goals are quantified

To find out more about the theory and practice of data-management maturity models, and to learn about some of the more common frameworks that exist, we would recommend you look at the relevant section of the DAMA DMBOK, as a detailed discussion of the topic is outside the scope of this chapter. For our purposes, it is enough for you to understand that at each level of maturity in an organization the formalization of processes, controls and governance increases and the emphasis shifts from firefighting of issues to management of processes and, ultimately, to continuous improvement of processes. Improved processes in turn lead to improved certainty of process and information outcomes. If you consider data management maturity from the perspective of information ethics, the increased formalization, consistency and scalability of your organization’s information management practices bring with it a number of factors that contribute to better ethical decision making by individuals and promote better alignment of the ethic of the individual with the ethic of the organization and, ultimately, with the ethic of society (Table 9.6).

本书版权归Kogan Page所有

297

298

Data Ethics

Table 9.6  Information management maturity and ethical maturity Maturity Data management level characteristics

Ethical dimension

Level 0

●●

●●

●●

Level 1

●●

●●

●●

●●

Level 2

●●

●●

●●

●●

Level 3

本书版权归Kogan Page所有

●●

●● ●●

No organized data management practices

●●

No formal processes General-purpose data management, with no formal governance Reliance on a few key experts Roles and responsibilities are managed within silos

No formalized consequences

●●

No normative structures

●●

No clearly defined authority

●●

●● ●●

●●

●●

Some roles and responsibilities defined

●●

Roles are not dependent solely on specific experts

●●

Organizational awareness of data quality and other issues and concepts Scalable data management processes institutionalized across the organization Co-ordinated policy definition

No referent models for behaviour

●●

Data quality issues are pervasive but not addressed Consistent tools and role definitions exist to support process execution

Limited situational moderators

●●

●●

Formal process definition and centralized design processes ●●

Referent models rely on a few core people Limited role taking Ethics/governance are not linked to job context

Increasingly structured normative systems Authority for decision making is increasingly defined Role taking increases through increased opportunities Clearer linking of ethics and governance to job context

Normative structures are more widely standardized across the organization Governance and ethics are increasingly embedded in job context Formalized structures for accountability and consequences (continued)

Information ethics and data governance

Table 9.6  (Continued) Maturity Data management level characteristics

Ethical dimension

Level 4

●●

●●

●●

●●

Level 5

●●

●●

Institutional knowledge enables prediction of results and improves risk management A well-formed centralized planning and governance structure

●●

●●

Strong normative structures exist and are centralized Referent models are available against which ethical standards can be evaluated Structures exist for resolution of ethical/moral issues

Data management includes performance metrics Processes and outcomes are highly predictable Focus is on continuous improvement

●●

●●

Strong role taking by staff in improvement processes Referent models based on prior learning exist

As your organization’s information management maturity increases, the range of situational modifiers identified in Trevino’s model likewise increase. This increases the likelihood that individuals will act in accordance with the ethic of the organization. However, in the absence of an effective data governance culture that focuses on the information and process outcomes that are expected by society, you may still struggle to be seen as an organization that is managing information ethically. For that reason it is important to have effective feedback loops in place to ensure that feedback from society is identified and acted upon.

Building a governance framework for information ethics It is important for you to realize that implementing a governance framework for information ethics does not require your organization to pursue a strategy based on YABGE (yet another building governance effort).1 What it requires is the design of a data governance framework that explicitly recognizes the role of and need for ethics and ethical oversight of information management processes and practices. It is equally important to formally recognize ethical information management as a component of your overall data governance framework. In designing your data governance organization, you should also ensure that it is flexible enough to support the evolution of data management in the organization and can scale to the challenges

本书版权归Kogan Page所有

299

300

Data Ethics

and opportunities in an increasingly complex information management and information ethics landscape. You need to consider several key factors as you architect the structures for your governance model. ●●

●●

●●

●●

●●

●●

Cultural norms (about data): are there potential barriers or cultural obstacles to implementing or improving governance structures and processes in the organization? Cultural norms (about ethics): what is the dominant ethical culture or bias in the organization? What is the ethic of the organization? Data governance practices: how and by whom are decisions about data made currently in your organization? What are the rules for deciding how to decide? How work is organized and executed: what is the relationship between governance and project/operational execution? What committee structures or forums are in place to manage the oversight and execution of ethical principles? How reporting structures are organized: is your organization structured around centralized, decentralized, hierarchical or flat reporting models? What is the potential for role taking in your current governance models? How do your current reporting models support or impede alignment of data governance and ethical principles with the individual’s perception of their role and the context of their job function? How will you align your data governance and ethics function with the existing organizational hierarchy of your organization? Skill levels: what are the skill levels among staff in relation to data management, data governance and ethics? What levels of skills are needed?

A key aspect of data governance for ethical information management is the need to formally create a structure within the organization where ethical issues and principles can be discussed and debated as part of the policy formulation and governance function. This needs to be formally convened and should ideally sit parallel to the data governance function within the organization. However, it may share resources and representation. Another approach would be to formally include the discussion of ethics and ethical issues as a formal item on the agenda of the data governance council. A significant risk is that the ethics forum in your organization could become a ‘talking shop’ for ethical topics. It is essential that the charter and operating model for your ethics forum links it to formal policy and practice issues that are overseen by the data governance function and the execution

本书版权归Kogan Page所有

Information ethics and data governance

Figure 9.5  An example governance framework for ethics and data governance Senior management team reports Data protection/ privacy officer

represented reports

sits on

Ethics forum

reports

advises

represented

Data governance steering

sits on

advises

Functional business units

Chief data officer

sits on

attends represented on

reports

supports

IT enablement/ technology

of information management processes and functions in the organization. As with all data governance frameworks, its effectiveness is only measurable through the actions taken and the outcomes achieved. The model outlined in Figure 9.5 is one possible approach to integrating your ethics forum into your data governance framework. It ensures that your ethics discussions are linked to real business problems and challenges, and ensures a centralized control of oversight of the execution of information management processes in line with those ethical principles. By engaging your information stewardship model as part of the design of your overall governance framework you can create the normative structures and roletaking opportunities for your data stewards. Ethical information management does not happen by accident. Your data governance structures are an essential component of the architecture for ethics in your organization that is essential to ensure alignment between the ethic of the organization and the ethic of society, while at the same time ensuring you are able to support individuals in your organization to make consistently ethical decisions.

Change management Change management can be described as the process of defining the descriptions of the things that need to be changed, the ways in which they will be

本书版权归Kogan Page所有

301

302

Data Ethics

changed, and then overseeing and governing the evolution and roll-out of that change so that the desired results are delivered. To give a more formal definition, it is the collective term for all approaches to preparing and supporting individuals, teams and organizations in making organizational change, including methods and practices to support the redirection or reallocation of resources or the realignment of values and cultural norms within the organization. It entails the development of reward structures, development of metrics to measure the effectiveness of the change, and needs to realistically address a time period of between one and three years. Change management is a necessary discipline to enable data governance in an organization, and it will be fundamental to implementing ethics initiatives or programmes as well. In the context of ethical information management, change management is the process that the organization must implement and work through to adapt and align the ethic of the organization with the ethic of society. This may be an internal change within the organization, implementing new methods, processes and practices, such as ethical impact assessments and data governance functions for ethics. Alternatively, it could be an externally facing change where the organization is seeking to influence the ethic of society. For the purposes of this chapter we will focus on the issues raised by the internal change, but many of the same issues, principles and approaches are applicable to both scenarios. Change does not happen overnight and it is also notoriously difficult to do, with failure rates in change management initiatives reaching up to 70 per cent. It is critical that it is managed and coordinated so as to avoid dead-end initiatives, loss of trust, and damage to the credibility of the E2IM function and its leadership. As part of the planning for effective change, it is important to understand: ●●

Why change fails

●●

The triggers for effective change

●●

The barriers to change

●●

How people experience change

One of the most important laws of change is that organizations are made up of people. Therefore, to effect change in the ethic of the organization, you will need to effect change in the ethic of the individual. Merely announcing that you are adopting an ethical approach to information management does not magically mean that the following day in the office there will be no data skulduggery or misalignment with the ethic of society. Buying a technology

本书版权归Kogan Page所有

Information ethics and data governance

doesn’t introduce change to the organization. Organizational change takes place when people behave differently because they see the value in doing so, both to the organization and to them, and sometimes to society as a whole. Another fundamental of change management is that people will not accept a change that is imposed upon them. They will also resist change that affects any aspect of their role that has become part of their self-identity. Peter Senge (1990) describes this in his book The Fifth Discipline. It is not so much that people resist change, but that they resist being changed. You might be telling them that the process outcome or method is wrong and needs to be changed, but they are hearing that they are wrong and need to be changed. People are more likely to engage with change if they have had the opportunity to contribute to the change and if they can understand the vision and values behind the change. This is similar to Trevino’s work on individual ethical decision making in organizations. When your colleagues have had an opportunity to engage in role taking in the change process they are more likely to be engaged with the process.

Managing transition, not change Another common mistake that people make is not realizing that they are managing a transition, not a change. Different people in the organization will embrace and adapt to the change at different paces. Change management expert William Bridges defines transition as the psychological process that people go through to come to terms with the new situation. While many people think of change solely in terms of a new beginning, Bridges recognizes that change involves moving through three distinct phases, starting with the ending of the existing state (Table 9.7). Endings are difficult because people need to let go of existing conditions. People then enter the neutral zone, in which the existing state has not quite ended and the new state has not quite begun. Change is complete when the new state is established. Of these three, the neutral zone is the least predictable and most confusing, because it is a mix of old and new. If the people in the organization do not transition through the neutral zone, then the organization is at risk of slipping back into old habits and failing to sustain the change. According to Bridges (2009), the single biggest reason that organizational changes fail is that people driving change rarely think about endings and therefore do not manage the impact of endings on people. He describes the problem like this: ‘Most organizations try to start with a beginning, rather than finishing with it. They pay no attention to endings. They do not

本书版权归Kogan Page所有

303

304

Data Ethics

Table 9.7  Bridges’ transition model Transition phase

Description

The ending

●●

●●

●●

The Neutral Zone

●●

●●

●●

●●

The New Beginning

本书版权归Kogan Page所有

●●

●●

Ethical change implications

When we acknowledge that there are things we need to let go of

Changing ethical behaviour can be challenging as it requires people to accept that the things they have been doing When we recognize that we may be wrong, or even have lost something unlawful. This is particularly the Example: changing jobs – case where the organization even when an individual chooses to change jobs, there relies on the ethic of the are still losses such as losing individual close working friends When the old way has The problem that can arise in finished but the new way isn’t this context in quality systems here yet change or ethical change is that the old way is sometimes When everything is in flux and it feels like no one knows perceived as the ‘easy way’ or the ‘better way’, particularly what they should be doing where there is a lack of clarity When things are confusing around the end-goals. and disorderly Individuals may fall back on the Example: moving house – the old ethic of the organization or first few days or even months may rely on their personal after moving, the new house ethics (ethic of the individual) is not home yet and things when unsure what to do are quite probably in turmoil When the new way feels comfortable, right and the only way

Individuals will reach this phase at different paces. Much will be influenced by their ethic of the individual and personal Example: moving to a new home – after a few months in moral development, but the effectiveness of the situational the neutral zone of turmoil, modifiers that are you come to a stage when implemented as part of ethical you have settled into your change in the organization will new environment (and have be essential to embedding the perhaps found your new desired behaviours in the favourite coffee shop) organization

Information ethics and data governance

acknowledge the existence of the neutral zone, and then wonder why people have so much difficulty with change’. When experiencing a change, all individuals go through all three phases. But they go at different speeds, depending on factors such as past experience, personal preferred style, the degree of involvement in recognizing the problem and developing possible solutions, and the extent to which they feel pushed towards a change rather than moving towards it voluntarily. Bridges makes it clear that while the first task of the change manager is to understand the destination (vision) and how to get there, the role of the transition management is to convince people that they need to start the journey and to keep them on the right track. When managing change and transition, the role of the change agent, and of any manager or leader in the process, is to help people recognize the process and the stages of a transition as something that is perfectly natural. The following checklist summarizes the key points that managers should be aware of as they help people transition:

Checklist for managing transition The ending ✔

Help everyone to understand the current problems and why the change is necessary.



Identify who is likely to lose what. Remember that loss of friends and close working colleagues is just as important to some as status and power is to others.



Losses are subjective. The things one person may grieve about may mean nothing to someone else. Accept the importance of subjective losses. Don’t argue with others about how they perceive the loss and don’t be surprised at what you may consider to be an ‘overreaction’.



Expect and accept signs of grieving and acknowledge those losses openly and sympathetically.



Define what is over and what isn’t. People must make the break at some time and trying to cling on to old ways prolongs difficulties.



Treat the past with respect. People have probably worked extremely hard in what may have been very difficult conditions. Recognize that and show that it is valued.



Show how ending something ensures the things that matter to people are continued and improved.

本书版权归Kogan Page所有

305

306

Data Ethics



Give people information and do it again and again and again in a variety of ways. Give people written information to go away and read, as well as the opportunity to talk and ask questions.



Use an internal stakeholder analysis to map out how best to approach different individuals – understand how their perspectives might need to be engaged to initiate the change and what the likely points of resistance might be.

The neutral zone ✔

Recognize this as a difficult time that everyone goes through.



Get people involved and working together and give them time and space to experiment and test new ideas.



Help people to feel that they are still valued.



Particularly praise someone who had a good idea even if it didn’t work as expected. The Plan-Do-Study-Act (PDSA) model encourages trying things out and learning from each cycle.



Give people information and do it again and again and again in a variety of ways.



Provide feedback about the results of the ideas being tested and decisions made.

The new beginning ✔

Do not force a beginning before its time in the ethic of the individual.



Ensure people know what part they are to play in the new system.



Make sure that policies, procedure and priorities are clear; do not send mixed messages.



Plan to celebrate the new beginning and give the credit to those who have made the change.



Give people information and do it again and again in a variety of ways.

Reflecting on the reactions of social media and ‘Big Tech’ companies and their staff to the various ethical crises and scandals that have beset these firms since at least 2016, we can see the beginning of an ending in which individuals are struggling to understand what the problem is and what the destination needs to be for their new beginning.

本书版权归Kogan Page所有

Information ethics and data governance

Bridges is not the only one to point out some of the key reasons why change management initiatives often fail. In Leading Change, John P Kotter, one of the most respected researchers in the field of change management, outlines eight reasons why organizations fail to execute change (Kotter, 2012). These are particularly pertinent in the context of information and data management. The eight common mistakes provide perspective on issues that commonly arise in information management projects:

Error #1: allowing too much complacency According to Kotter, the biggest mistake people make when trying to change organizations is plunging ahead without first establishing a high-enough sense of urgency among their peers and superiors. Kotter’s analysis provides valuable pointers for change managers looking to avoid the errors of others. Change agents often: ●● ●●

●●

●●

●●

overestimate their ability to force big changes on the organization; underestimate how difficult it can be to shift people out of their comfort zones; don’t see how their actions and approach might reinforce the status quo by driving up defensiveness; rush in where angels fear to tread – kicking off change activities without sufficient communication of what change is required or why change is required (the vision); confuse urgency with anxiety, which in turn leads to fear and resistance as stakeholders retrench (often quite literally) in their silos.

While it is tempting to think that in the face of organizational crisis complacency would not be a problem, often the opposite is the case. Stakeholders often cling to the status quo in the face of too many (often conflicting) demands for change (which are often processed as ‘if everything is important, then nothing is important’). Again, if we look at the response of Facebook staff to the criticisms of the company, they are faced with demands for change from a number of perspectives (‘fake news’, abuse of data privacy, potential competition-law issues in the EU and elsewhere). Therefore, there is a resistance to change.

Error #2: failing to create a sufficiently powerful ‘guiding coalition’ Kotter identifies that change requires leadership commitment. Major change is almost impossible without active support from the head of the organization and without a coalition of other leaders coming together to guide the

本书版权归Kogan Page所有

307

308

Data Ethics

change. Leadership engagement is especially important in data governance efforts, as these require significant behavioural change. Without commitment from top leaders, short-term self-interest will outweigh the argument for the long-term benefits of better governance. A ‘guiding coalition’ is a powerful and enthusiastic team of volunteers from across the organization that helps to put new strategies into effect and transform the organization.

Error #3: underestimating the power of vision Urgency and a strong guiding team are useless without a clear, sensible vision of the change. The vision provides the context of the change effort. It helps people understand the meaning of any individual component of the change. A welldefined and communicated vision can help drive the level of energy required to properly implement the change. Without a public statement of vision to guide decision making, every choice risks becoming a debate and any action could derail the change initiative or undermine it. Vision is not the same thing as planning or programme management. The vision is not the project plan or project charter or a detailed breakdown of all the components of the change.

A vision must be a clear and compelling statement of where the change is leading You need to have a clear and compelling vision. This is sometimes called the ‘elevator pitch’, but that is the wrong approach. Your vision needs to be sufficiently thought through that you can articulate the key next steps to get there and it needs to be compelling enough that people will: 1) want to go there with you; and 2) that some of them might want to take the lead through broad-based action. The vision must also be communicable – capable of being shared, in an intact manner, by your co-workers in a way that engenders a positive and engaged response. Communicating vision means connecting with people. For ethical information management initiatives, the vision must articulate the challenges with existing data management practices, the benefits of improvement, and the path to get to a better future state.

本书版权归Kogan Page所有

Information ethics and data governance

Error #4: undercommunicating the vision by a factor of 10, 100 or 1,000 Even if everyone agrees that the current situation is unsatisfactory, people will still not change unless they perceive the benefits of change as a significant improvement over the status quo. Consistent, effective communication of the vision, followed by action, is critical to successful change management. Kotter advises that communication comes in both words and deeds. Congruence between the two are critical for success, as ‘Do as I say, not as I do’ is the quickest way to kill a change effort. To an extent, the guiding coalition should assist with developing, communicating and refining the communication of the vision. It is important to measure how well the change vision is branded and communicated.

Error #5: permitting obstacles to block the vision New initiatives fail when people feel disempowered by huge obstacles in their path, even when they fully embrace the need for and direction of the proposed change. As part of its transformation, the organization must identify: ●●

●●

●●

How roadblocks that exist in people’s heads can be overcome (are they fear-based, stemming from lack of knowledge, or some other cause?). What roadblocks exist due to organizational structures – such as narrow job categories or performance appraisal systems – that force people to choose between the vision or their own self-interest? What roadblocks exist due to people who refuse to adapt to the new set of circumstances and who make demands that are inconsistent with the transformation? If key members of the organization make the right noises about the change vision but fail to alter their behaviours or reward the required behaviours, or continue to operate in incompatible ways, the execution of the vision will falter and could fail.

Kotter calls on ‘smart people’ in organizations to confront these obstacles. If they do not, others will feel disempowered and change will be undermined.

Error #6: failing to create short-term wins Real change takes time. Anyone who has ever embarked on a fitness regime or a weight-loss plan knows that the secret to keeping going is to have regular milestone targets that keep up momentum and motivation. Anything that involves a long-term commitment and investment of effort and resources requires some element of early and regular feedback of success.

本书版权归Kogan Page所有

309

310

Data Ethics

Complex change efforts require short-term goals in support of long-term objectives. Meeting these goals allows the team to celebrate and maintain momentum. The key thing is to create the short-term win rather than merely hoping for it. In successful transformations, managers actively establish early goals, achieve these goals and reward the team. Without systematic efforts to guarantee success, change is likely to fail.

Error #7: declaring victory too soon All too often in change projects, particularly ones stretching over several years, there is a temptation to declare success at the first major performance improvement. Quick wins and early wins are powerful tools to keep up momentum and morale. However, any suggestion that the job is done is usually a mistake. Until the changes are embedded in the culture of the organization, new approaches are fragile and old habits and practices can reassert themselves. Kotter suggests that changing an entire company can take three to ten years.

Error #8: neglecting to anchor changes firmly in the corporate culture Until new behaviours are embedded into the social norms and shared values of an organization they are subject to decay and degradation as soon as the focus of the change effort is removed. This is the equivalent of Bridges’ ‘neutral zone’. Kotter is clear: you ignore culture at your peril when engaging in any change activity. To combat these common errors, Kotter proposes an eight-step model for major change. Kotter’s model provides a framework within which each of these issues can be addressed in a way that supports sustainable long-term change. Each step is associated with one of the fundamental errors that undermine transformation efforts. In the context of ethical information management, we suggest you approach this model for change as a continuous improvement process. As the organization develops its maturity in ethical information management, it is likely that the ethic of the organization will go through the same stages of moral evolution as the ethic of the individual. Therefore, constant management is needed to ensure that the gains you have attained are secured and sustained while at the same time ensuring that you are alert to changes in the ethic of society that might need you to further evolve your ethical information management culture.

本书版权归Kogan Page所有

Information ethics and data governance

Chapter summary In this chapter you have learnt: ●● ●●

●●

●●

●●

●●

●●

●●

The role of data governance in the E2IM framework. The critical role of defined data governance structures when faced with ethical issues. You have learnt that the absence of defined protocols for addressing ethical issues can result in significant problems not being addressed in a timely or appropriate manner. How to describe your current data governance models with reference to classic governance frameworks. Coupled with a basic understanding of maturity models, you understand more how to identify the ethical goals for your data governance initiatives. You understand how the ethic of the individual is supported in the E2IM framework by effective, principles-led data governance and how effective, transparent and accessible data governance frameworks are essential to ensuring that the ethic of the individual, the ethic of society and the ethic of the organization are aligned. To be able to explain information stewardship as an ethical concept in the context of a principles-based data governance framework. You have learnt how two leading companies use simple ethical principles to guide their decisions on information management and information exploitation at the design stage of their activities. You have learnt the importance of consciously designing your data governance framework for information ethics to ensure you have the right resources, skills, structures and practices in place. You have learnt that your data governance framework needs to be underpinned by robust and communicable statements of principles and values. In an ethical information management context, these principles should be aligned with clear statements of ethical values and should be placed in the context of a clear normative structure for ethical decision making. These principles should be supported by clear roles, responsibilities and accountabilities for decisions about ethics in information.

本书版权归Kogan Page所有

311

312

Data Ethics

Questions 1 Is it possible to implement ethical information management without effective data governance systems?

2 What ethical information management principles would you like to see adopted by the organization you work for?

3 What ethical information management principles would attract you to an organization, as a customer or as an employee? Why?

Note 1 The original draft of this did not say ‘building’ but Katherine made Daragh clean up the language…

Further reading DAMA International (2017) DAMA DMBOK: Data Management Body of Knowledge, Technics Publications, Basking Ridge, NJ Denning, S (2000) The Springboard: How storytelling ignites action in knowledgeera organizations, KMCI Press Denning, S (2011) The Leader’s Guide to Storytelling: Mastering the art and discipline of business narrative, Jossey-Bass, San Francisco, CA Floridi, L (2016) The Fourth Revolution: How the infosphere is reshaping human reality, Oxford University Press, Oxford Kotter, J P (2012) Leading Change, Harvard Business Review Press, Boston, MA Ladley, J (2012) Data Governance: How to design, deploy, and sustain an effective data governance program, Morgan Kaufmann, Waltham, MA Saunders, G and Lockridge, T M (2010) Ethics and culture: Is there a relationship? International Business & Economics Research Journal, 9 (1), 111–16 Seiner, R (2014) Non-Invasive Data Governance: The path of least resistance and greatest success, Technics Publications, Basking Ridge, NJ

References AICPA (nd) Segregation of Duties [Online] us.aicpa.org/interestareas/ informationtechnology/resources/value-strategy-through-segregation-of-duties (archived at https://perma.cc/JJ7Q-8NEU)

本书版权归Kogan Page所有

Information ethics and data governance Bridges, W (2009) Managing Transitions: Making the most of change, 3rd edn, Nicholas Brealey Publishing. London CPDP Conferences (2017) CPDP 2017: Ethics, observational platforms, mathematics, and fundamental rights, www.youtube.com/watch?v=nK_ T6KLc6l0 (archived at https://perma.cc/G55D-TPSY) DAMA International (2017) DAMA DMBOK: Data Management Body of Knowledge, Technics Publications, Basking Ridge, NJ Data Governance Institute (nd) Data Governance Basics, datagovernance.com/ the-data-governance-basics Denning, S (2000) The Springboard: How storytelling ignites action in knowledgeera organizations, KMCI Press Denning, S (2011) The Leader’s Guide to Storytelling: Mastering the art and discipline of business narrative, Jossey-Bass, San Francisco, CA Ecker, U K H, Lewandowsky, S, Chang, E P and Pillai, R (2014) The effects of subtle misinformation in news headlines, Journal of Experimental Psychology: Applied, 20 (4), 323–35, dx.doi.org/10.1037/xap0000028 (archived at https:// perma.cc/L9H6-LZW4) Elango, B, Paul, K, Kundu, S and Paudel, S K (2010) Organizational ethics, individual ethics, and ethical intentions in international decision-making, Journal of Business Ethics, 97 (4), 543–61 Feldman, S P (2007) Moral business cultures: The keys to creating and maintaining them, Organizational Dynamics, 36 (2), 156–70 Hasselbalch, G and Tranberg, P (2016) Data Ethics: The new competitive advantage, PubliShare, Copenhagen ISO (2012) ISO 20121:2012 Event sustainability management systems – Requirements with guidance for use, International Organization for Standardization, Geneva, www.iso.org/obp/ui#iso:std:iso:20121:ed-1:v1:en (archived at https://perma.cc/76PR-M6XX) ISO (2018) ISO 31000:2018 Risk management – Principles and guidelines, International Organization for Standardization, Geneva, www.iso.org/ standard/65694.html (archived at https://perma.cc/XC7Z-SQ3A) Kohlberg, L and Kramer, R (1969) Continuities and discontinuities in childhood and adult moral development, Human Development, 12 (2), 93–120 Kotter, J P (2012) Leading Change, Harvard Business Review Press, Boston, MA Ladley, J (2012) Data Governance: How to design, deploy, and sustain an effective data governance program, Morgan Kaufmann, Waltham, MA Lawler, R (2015) Alphabet replaces Google’s ‘Don’t be evil’ with ‘Do the right thing’, Engadget, 2 October, www.engadget.com/2015-10-02-alphabet-do-theright-thing.html (archived at https://perma.cc/XLY2-GBGD) McGilvray, D (2008) Executing Data Quality Projects: Ten steps to quality data and trusted information, Morgan Kaufmann, Burlington, MA

本书版权归Kogan Page所有

313

314

Data Ethics Maclagan, P (1983) The concept of responsibility: Some implications for ­organisational behaviour and development, Journal of Management Studies, 20 (4), pp 411–23 Murphy, S (2014) Facebook changes its ‘Move Fast and Break Things’ motto, Mashable, 30 April, mashable.com/2014/04/30/facebooks-new-mantra-movefast-with-stability (archived at https://perma.cc/P3K3-RCNT) Schwartz, S (1968) Words, deeds, and the perception of consequences and ­responsibility in action situations, Journal of Personality and Social Psychology, 10 (3), 232–42 Seiner, R (2014) Non-Invasive Data Governance: The path of least resistance and greatest success, Technics Publications, Basking Ridge, NJ Senge, P (1990) The Fifth Discipline, Doubleday, New York Sullivan, G R (2004) [accessed 20 October 2017] Enhancing public trust in the accounting profession using professional judgment rather than personal judgment in resolving accounting ethics dilemmas, digitalcommons.liberty.edu/ cgi/viewcontent.cgi?article=1038&context=fac_dis (archived at https://perma.cc/ EU2T-P4PC) Trevino, L K (1986) Ethical decision making in organizations: A person–situation interactionist model, The Academy of Management Review, 11 (3), 601–17 Warzel, C (2017) How people inside Facebook are reacting to the company’s election crisis, BuzzFeed News, 20 October, www.buzzfeed.com/charliewarzel/ how-people-inside-facebook-are-reacting-to-the-companys (archived at https:// perma.cc/7MB3-AKMG) Weill, P and Woodham, R (2002) Don’t just lead, govern: Implementing effective IT governance, MIT Sloan School of Management Working Paper No 4237-02, April, dspace.mit.edu/bitstream/handle/1721.1/1846/4237-02.pdf?sequence=2 (archived at https://perma.cc/6CZN-Y5L2) Wikipedia (nd) Stewardship, en.wikipedia.org/wiki/Stewardship (archived at https://perma.cc/U4C6-TQ83)

本书版权归Kogan Page所有

315

Information ethics and risk

10

Tools and methods for identifying and managing ethical risk

What will we cover in this chapter? This chapter will discuss the concept of assessing ethical risks and impacts through the comparable and more established concepts of privacy impact analyses and data protection impact assessments. Examples of key questions you should be asking and answering in this planning process include:

●● ●●

●●

What are the potential real-world impacts of your information process? Does your new idea for a product, service or other process create a win–win situation or is it potentially predatory or harmful? Are you overlooking a potentially easily solvable issue that, if not addressed, could cost a great deal in terms of reputational damage or reactive efforts to fix?

You will learn about the concepts of ethical impact assessments in the context of a quality systems-based approach to ethical information management. By the end of this chapter, you will have a deeper understanding of the relationship between planning for quality, risk management and ethical ­information management practices.

Introduction Effective risk management is a key component of any management system. In Chapter 8 we discussed the concept of ethical information management as a

本书版权归Kogan Page所有

316

Data Ethics

quality system. This is an important conceptual connection in the design of the E2IM framework for ethical information management. Your objective in the ethical management of information is to ensure that the information and process outcomes that are delivered to your stakeholders in society meet the ethical expectations of your stakeholders, such as supporting rights to privacy or enabling the support of or improvement of human dignity or freedom of expression. Tom Peters (2015) describes management as ‘the arrangement and animation of human affairs in pursuit of desired outcomes’. As we introduced in Chapter 8 and discussed further in Chapter 9, if you consider ethical information management as a quality system, you can begin to seek out principles and practices from other domains of management and information management to help you build ethics into information management. By adopting and adapting proven methods to support the ­arrangement and animation of your information management affairs, you can consistently delight your stakeholders with outcomes that are aligned with the ethic of society or exceed the positive expectations of society as to what good information management practices and ethics can be. You have also seen how information management is on the brink of a crisis of confidence as the ethical risks and pitfalls of new technologies we are adopting are becoming more apparent in the mainstream. In many respects, we are facing a crisis, just as manufacturing faced a quality crisis in the 1980s (see Table 10.1). One of the subtexts of the E2IM framework and the approach we have taken to this book is that there are patterns, principles and practices in history that we can learn from. In Table 10.1 we have taken some statements from a paper presented to the American Society for Quality (ASQ) in 1986 (Juran, 1986). You can see some interesting parallels with the challenges we face today. In Juran’s 1986 paper he introduced a fundamental concept of quality management that has become known as the Juran Quality Trilogy (Figure 10.1). The underlying concept of the Juran Quality Trilogy is that managing for quality consists of three basic quality-oriented processes: ●●

quality planning

●●

quality control

●●

quality improvement

Juran viewed these as being universal processes that exist across a range of activities, but he explicitly called out quality planning as the starting point for all things quality. As he put it: ‘The starting point is quality planning – creating

本书版权归Kogan Page所有

Information ethics and risk

Table 10.1  Mapping Juran’s quality crisis to information ethics challenges Joseph Juran statements (paraphrased for brevity)

Ethical information management equivalent

There is a crisis in quality. The most obvious outward evidence is the loss of sales to foreign competition and the huge costs of poor quality

There is a crisis in information ethics. The most obvious evidence is the concerns about algorithmic bias and the potential for misuse of big-data technologies and the huge risks of abuse

The crisis will not go away in the foreseeable future. Competition in quality will go on and on. So will the impact of poor quality on society

The crisis will not go away in the foreseeable future. Technological evolution will go on and on. So will the impact of poor consideration of ethical issues on society

Our traditional ways are not adequate to deal with the quality crisis. Our adherence to those traditional ways has helped to create the crisis

Our traditional approaches to IT project management are not adequate to deal with the ethical crisis. In a sense our adherence to those traditional ways has helped create the crisis

Charting a new course requires that we create a universal new way of thinking about quality – a way applicable to all functions and to all levels in the hierarchy

Charting a new course requires that we create a universal way of thinking about ethics in information management – a way applicable to all functions and all levels in the hierarchy

An essential element in meeting the quality crisis is to arm upper managers with experience and training in how to manage for quality, and to do so with a sense of urgency

An essential element in meeting the information ethics crisis is to arm upper managers with experience and training in how to ethically manage information, and to do so with a sense of urgency

Charting a new course also requires that we design a basis for management of quality that can readily be implanted into the company’s strategic business planning and has minimal risk of rejection by the company’s immune system

Charting a new course also requires that we design a basis for management of information ethics that can readily be implanted into the company’s strategic business planning and has minimal risk of rejection by the company’s immune system

本书版权归Kogan Page所有

317

318

Data Ethics

Figure 10.1  The Juran Quality Trilogy

Planning

Control

Quality

Improvement

a process that will be able to meet established goals and do so under operating conditions. The subject matter of the planning can be anything’ (Juran, 1986). This is precisely what we are seeking to achieve from the perspective of ethical information management, the creation of a process (or set of processes) that will be able to meet established ethical goals and do so under operating conditions. Our subject matter is data and information, which might be directly about people or might indirectly relate to them, or which may lead to outcomes that are positive or negative for individuals or society. What is required is a planning process where the uncertainties around the alignment of business, information and technology domains are addressed to ensure the consistent delivery of information and/or process outcomes that are ethically acceptable to society. As with any other potential product or project, it is worthwhile for you to conduct an assessment to identify potential issues affecting your proposed processing activities as early as possible in the life cycle of a process or initiative. This should then inform your planning for how to address the ethical issues or considerations that may arise.

Looking for parallel models Juran drew parallels between his Quality Trilogy and the trilogy of processes that exist in the financial management function of the organization (budgeting, cost control and cost reduction). When discussing his Quality Trilogy in 1986, he described how he would ‘look sideways’ at how finance is managed, to call out the parallels. In the spirit of Juran, you need to look

本书版权归Kogan Page所有

Information ethics and risk

sideways at other models of quality management for information to identify approaches and methodologies that might bring forth parallels that your ethical information-planning process can be modelled on. This is an important consideration given the sentiments expressed by Juran in Table 10.1 in relation to the need for a speed of implementation of skills and training in quality management, and the need to do it in a way that does not meet with excessive resistance from the organization: ●●

●●

You need to be able to train management quickly in how to do these types of assessments and to understand how to manage for ethical information and process outcomes. You need to be able to introduce processes for ethical information planning into the organization in a manner that will have ‘minimal risk of rejection by the company’s immune system’ (Juran, 1986).

By taking a quality systems approach to ethical information management, you can readily identify parallels with the planning principles of i­ nformation quality management and data governance. However, a closer parallel can be found in the disciplines of Privacy by Design and Privacy Engineering.

Privacy by Design Privacy by Design is an approach to designing and developing information management and processing systems that requires privacy and human values to be taken into account throughout the entire life cycle of the design, build and operation of the system. The concept of Privacy by Design was popularized by Dr Ann Cavoukian when she was serving as the Information and Privacy Commissioner for the Province of Ontario in Canada (Cavoukian, 2011). Privacy by Design is characterized by seven foundational principles that map to fundamental principles of quality management, as set out in Table 10.2. Note that these are essentially statements of ethical principles relating to privacy and security applied to the design of information processes. It should be no surprise therefore that Dr Cavoukian has more recently published an updated set of principles specifically for the development of AI Ethics by Design (Cavoukian, 2017).

本书版权归Kogan Page所有

319

320

Data Ethics

Table 10.2  Privacy by Design principles 1

Proactive not reactive; preventative not remedial

2

Privacy as the default setting

3

Privacy embedded into design

4

Full functionality – positive-sum, not zero-sum

5

End-to-end security – full life-cycle protection

6

Visibility and transparency – keep it open

7

Respect for user privacy – keep it user-centric

Ethics by Design Following on from the development of Privacy by Design, in the past few years researchers and policymakers have promoted Ethics by Design as a concept and approach to managing information and ensuring data systems are designed and implemented ethically, embedding adherence to ethical principles into the design and development processes. The European Commission has proposed that ‘ethics by design’ should be a key part of an approach to and regulatory framework for artificial intelligence (European Commission, 2021). Ethics by Design as a concept is not a unitary or widely adopted framework with a standardized set of principles like the Privacy by Design framework developed by Cavoukian, nor is it a single concept specific to data ethics. The phrase ‘ethics by design’ has been used in other contexts to describe design principles for promoting ethical behaviour (World Economic Forum, 2020). However, it is most commonly used in the context of data ethics in a meaning parallel to Privacy by Design: embedding consideration of ethical principles into the design and development of data processing systems and technologies at the beginning of the process, as opposed to the common tendency to consider ethics only after the fact when someone has identified harms already occurring, at which point the difficulty and costs of remedying identified issues are exponentially higher, incurring what Casey Fiesler and Natalie Garrett (2020) call ‘ethical debt’. As they put it, ‘a “move fast and break things” mentality results in limited testing and deployment of software that isn’t ready’, and while bugs incurred in software development through this may be viewed as ‘bad tech’ and result in ‘technical debt’ as the cost of fixing things later grows, when the bugs cause societal harms, the tech is seen as ‘unethical tech’.

本书版权归Kogan Page所有

Information ethics and risk

Table 10.3  European Commission ethical requirements for AI systems 1

Human agency: AI systems must not negatively affect human autonomy, freedom or dignity

2

Privacy and data governance: AI systems must not violate the right to privacy and to personal data protection. They MUST use data that is necessary, non-biased, representative and accurate

3

Fairness: AI systems must be developed with an inclusive, fair and non-discriminatory agenda

4

Well-being: Steps must be taken to ensure that AI systems do not cause individual, social or environmental harm, rely on harmful technologies, influence others to act in ways that cause harm or lend themselves to function creeps

5

Accountability and oversight: Human oversight and accountability are required to ensure conformance to these principles and address non-compliance

6

Transparency: AI systems should be as transparent as possible to their stakeholders and to their end users-

Ethics by Design in this context is explicitly risk-based. This is the approach the EU is taking with its proposed development of a regulatory framework for AI, which follows the risk-based focus of the General Data Protection Regulation by focusing on a risk-centred regulatory framework for the development and implementation of AI systems. The foundational policies for the statutory and regulatory framework for artificial intelligence proposed by the EU specifically cite ethics by design as a requirement to mitigate risk. This is summarized in a report from the European Commission-funded SIENNA Project as the main requirements for AI and robotics systems, as a parallel to Privacy by Design principles (see Table 10.3). It is worth pointing out that one of the flaws identified in the proposed EU Artificial Intelligence Act is that it has difficulty framing a difference between ‘intelligent systems’ and other large-scale data-intensive systems. From a regulatory perspective this is problematic, but it reflects our perspective that the focus should be on ethical use and management of data and minimizing risks of harms to people, and adapting existing tools and methods familiar to ethicists and information management professionals, rather than looking for new principles for ‘big data ethics’, ‘computer ethics’ or ‘AI ethics’ as separate things.

本书版权归Kogan Page所有

321

322

Data Ethics

Privacy engineering Where Privacy by Design, and its cousin AI Ethics by Design, are concerned with defining design principles for privacy and AI ethics, Privacy Engineering is concerned with getting things built with privacy baked in and improving the function. Privacy engineering takes methodologies and practices from software engineering, information management and business process engineering, among other disciplines, to enable you to implement the development of systems and technologies that support Privacy by Design principles. The underlying concepts of privacy engineering are best explained in books by Michelle Dennedy (Dennedy, Finneran and Fox, 2014) and Ian Oliver (2014). It is outside the scope of this chapter to dive deeply into the detail on those topics. What we will focus on, however, is the model that Dennedy describes for the privacy engineering process. This process encompasses the three elements of the Juran Quality Trilogy and provides a model we can adapt to represent the process for engineering ethics into information processes (Figure 10.2; Table 10.4).

Figure 10.2  The privacy engineering development process Goals of the organization

Goals of the individual

Privacy policy

Requirements

Procedures and processes

Privacy awareness training

Quality assurance

SOURCE Adapted from Dennedy, Finneran and Fox (2014)

本书版权归Kogan Page所有

Quality assurance feedback

Privacy mechanisms

Information ethics and risk

Table 10.4  Mapping privacy engineering to Juran’s Quality Trilogy Juran Quality Trilogy component

Privacy engineering development step

Planning

●●

Control

Improvement

Understanding goals of organization and individuals

●●

Privacy policy

●●

Requirements

●●

Procedures and processes

●●

Privacy awareness training

●●

Quality mechanisms

●●

Quality assurance

●●

Quality assurance feedback

One of the key tools used in the planning and quality assurance phases of privacy engineering is a privacy impact assessment (Dennedy, Finneran and Fox, 2014). Privacy impact assessments (PIAs) are a process that can help you identify, prioritize and mitigate privacy-related risks during the design and development of systems and processes. They help you implement Privacy by Design principles as an ethos in the development life cycle. As a governance tool, privacy impact assessments ensure regulatory compliance and adherence to standards by making sure the rules are defined and applied to your proposed processing activities. In some situations, and locations, privacy impact assessments may be a statutory or contractual requirement. In many jurisdictions, they are a requirement for public-sector bodies or bodies receiving public funds. Under the EU General Data Protection Regulation, Data Protection Impact Assessments (DPIAs) are required in many cases. Impact assessments may also be required as part of contractual terms of a project. The EU’s Article 29 Working Party (or the European Data Protection Board as they have been known since 25 May 2018) also explicitly references the need to conduct DPIAs as an iterative process where individual steps may need to be repeated as ‘the development process progresses because the selection of certain technical or organizational measures may affect the severity or likelihood of the risks posed by the processing’ (Article 29 Working Party, 2017). While the EU regulatory requirement for DPIAs grew out of global standards for PIAs, the emphasis in EU Data Protection law on the impact of data processing on the ‘rights and freedoms’ of people broadens the scope of DPIAs to greater ethical impacts. The potential impacts for assessment include not only the right to privacy, but the other fundamental rights and freedoms enshrined in

本书版权归Kogan Page所有

323

324

Data Ethics

the EU Charter for Fundamental Rights, creating a bridge between narrowscope PIAs and broader assessments of ethical risks and impacts. Other reasons why organizations would consider carrying out a privacy impact assessment include: ●●

●●

Risk management – in addition to data privacy risks, other risks such as ethical risks can be identified. The organization can also identify risks associated with the internal culture and ways of thinking about data. A DPIA requires you to make formal decisions about what you will do about those risks. Organizational learning – this goes to Juran’s point about needing to develop management competence in these areas. DPIAs can help the organization learn about and better understand data privacy risks, the nature of its data flows, and the perspectives of its stakeholders and customers on data issues.

It is good practice to conduct your DPIAs iteratively and review at different stages in the development and implementation of a project. This allows for iterative elaboration of detail and refinement of your plan. It also allows the DPIA process to be used as a quality control and validation process to make sure that the things you had identified as needing to be done are actually done.

Reflecting the concerns of individuals and society One key element of the regulatory guidance on privacy impact assessments globally, in particular in the European Union, is the clear focus on the need for the assessments to reflect privacy concerns of individuals and society. In this context, the PIA or DPIA requires the organization to assess the ‘privacy risk appetite’ of society to ensure that the developed solutions and processes meet the expectations and needs of society. This is explicitly referenced in Dennedy’s recognition of the need to address both the goals of the organization as well as the goals and requirements of the individuals affected by your proposed use of data.

Towards ethical information engineering? This requirement in data protection impact assessments to consider the external stakeholder’s concerns and expectations is entirely consistent with the stakeholder expectation component of the E2IM framework. After all, the objective of ethical enterprise information management is to ensure that the

本书版权归Kogan Page所有

Information ethics and risk

Figure 10.3  The ethical information engineering process Ethic of the organization

Ethic of society

Ethics policies and governance

Requirements

Procedures and processes

Ethics awareness training

Quality assurance feedback

Ethics control mechanisms

Quality assurance

right outcomes are being delivered to the stakeholders in society. In that context, we can reimagine the E2IM framework as a variation on Dennedy’s Privacy Engineering process. Just like Dennedy’s model, the various stages in this process map to Juran’s Quality Trilogy (Figure 10.3). Just like the discipline of Privacy Engineering, the planning process requires you to conduct some form of assessment to enable you to determine questions of policy and requirements for implementation of your processes, training and controls. That assessment will also provide a quality assurance function by enabling you to check if the things you determined needed to be done actually were done. In short: effective ethical information engineering requires an ethical impact assessment.

The E2IM ethical impact assessment model Because you are not reinventing the wheel when it comes to conducting your ethical impact assessment (EIA), at this point you should be able to identify methods and processes from privacy impact assessments or other risk assessment processes in your organization that you can adopt and adapt. If not, the rest of this chapter provides an overview of a model approach you can use.

本书版权归Kogan Page所有

325

326

Data Ethics

Principles Privacy by Design provides a strong core set of design principles that can guide a privacy impact assessment. But where can you look to find equivalent principles for ethics? By drawing on and distilling the ethical principles and models we discussed in the first half of this book, we have codified five basic interrogative rules to help formulate your starting position for analysis. These interrogatives seek a positive outcome as a determiner of ethical action. Where the positive contribution to the social good is not the priority, it balances the priorities against the social ethic of the necessity of preserving human rights. An action with an outcome that violates these rights may be expected to come into conflict with the societal ethic that regards human rights as a fundamental priority. As modern information management capabilities may process, combine or link, and make available vast amounts of information, it is important to consider the outcomes resulting from data processing that are not the focus or intended outcome. This test will need to consider not just the intended outcome but other anticipated possible outcomes. We explored these questions in Chapter 9 with some worked example scenarios. You will recall that these questions can often be straightforward to answer, but can, and should, provoke debate, particularly where the data that is proposed to be processed is particularly sensitive or the potential impacts on individuals are significantly far-reaching. For example, in the context of individuals with diminished or diminishing capacity to make informed choices about how their information is processed, what ethical issues might arise? We will use this scenario as a reference in the rest of this chapter.

Scenario: applications of lifelogging technology for Alzheimer’s patients An organization is developing advanced lifelogging capabilities to aid people suffering from conditions affecting their memory and cognitive processes. Day-to-day actions and events are recorded to serve as a reviewable record of events, acting, in effect, as a prosthetic memory. Question 1: Does it preserve human dignity? Does it enhance human dignity? As this application of technological advancements might possibly do a great deal to ease the distress of a person suffering from conditions such as Alzheimer’s disease, it could very much enhance the dignity of the person.

本书版权归Kogan Page所有

Information ethics and risk

Question 2: Does it preserve the autonomy of the human? The planned capabilities of the technology would help to preserve the autonomy of the device-wearer. However, the lifelogging technology would by its nature record the interactions of the device-wearer with other people, capturing their personal data as well. Controls would need to be implemented to take their autonomy into account, including the possibility of choosing not to have their data processed. Question 3: Is it necessary and proportionate? In the context of the device-wearer, the processing would likely be necessary and proportionate. However, the question of necessary and proportional processing also arises in the context of the other people the device-wearer comes into contact with. Measures should be taken to ensure that processing of the personal information of these people is minimized, particularly if there are no measures in place to ensure free and informed consent. Question 4: Does it uphold the common good? This application of technology is primarily focused on the enhancement of individuals’ dignity, but it could also be argued that its availability would also be of more general benefit to communities as a whole. Family and friends of a person affected by Alzheimer’s disease might also benefit from its use. Developments in care to aid members of a community are likely to improve the community as a whole.

Good governance requires decision-making processes to be recorded. If you are to ensure the alignment of the ethic of the organization with the ethic of society, and if you are to properly recognize controls and other situational modifiers for the ethic of the individual (Trevino, 1986), a more formal analysis of the ethical issues and risks in the proposed processing activity is r­ equired. This is especially the case if you want to be able to audit your processing later, or if you want to support the development of effective organizational learning about ethics and their application in information management. To that end, you need a process!

Process In our consulting work, we like to find models and methods that we can use over and over again to simplify the execution of processes for clients. In our experience, if you are trying to get management in an organization to adopt a

本书版权归Kogan Page所有

327

328

Data Ethics

new way of doing something, it should be as simple as possible. Ideally, it should also be a process that can be applied to different aspects of the organization. Our impact assessment framework is an adaptation of Danette McGilvray’s ‘Ten steps to trusted information process’ (McGilvray, 2008). This process works well as it is a simple, structured method that follows a clear and logical flow. In our consulting work, we use this methodology for privacy impact assessments (PIAs) and ethical impact assessments (EIAs). As it is grounded in quality management principles and methods, it is a perfect fit for the quality systems-based approach to ethical information management that you will be applying through the E2IM framework. In addition, it provides a relatively standardized way of working for management and staff who may already be looking at information quality problems and opportunities in your organization. Finally, this framework allows for iterative loops and refinement of the proposed processing activities, depending on the ethical or privacy issues that are identified (Figure 10.4). This methodology also supports a clear separation of duties between the assessment phase and the remediation/implementation phase of the process. This is in line with good practice in data governance (Figure 10.5). This approach to structuring an EIA allows for a common set of process steps to be conducted regardless of the scale of the PIA or the range of jurisdictional variants on recommended PIA process steps that a project may require. It also allows for iterative review through the assessment phase if additional detail is required to identify root causes, inform improvement plans or understand the impacts of proposed processing on individuals.

The inputs and outputs of the process In this section, we outline the key process steps for the EIA. Note that the impact assessment phase of this method, set out below, extends to Step 6: ‘develop improvement plans’. The actual implementation of recommendations and requirements from an impact assessment is the responsibility of the teams in your organization who are developing and implementing the proposed processing activities or information management systems. The objective of the assessment is to identify requirements for processes and procedures, training or other control mechanisms for ethical outcomes that need to be designed in to avoid or mitigate ethical risks.

Step 1: define business need and approach Clarity on the goal is an essential part of quality management. You need to think about what the desired information and process outcomes are that

本书版权归Kogan Page所有

Figure 10.4  Castlebridge ethical impact assessment methodology Assess ethical impact from ethic of society/stakeholder perspective Prevent future information ethics issues

Assess quality of information (ethical perspective)

Define business need and approach

Cannot be done ethically or legally

Implement controls

Develop improvement plans

Fix current ethical/ compliance issues

Assess business impact

Issues cannot be addressed in a cost-effective manner Communicate actions and results

329

本书版权归Kogan Page所有

Identify root causes of ethical issues

Analyse information environment

330

Figure 10.5  Castlebridge ethical impact assessment method – phases highlighted Impact assessment

Remediation

Assess ethical impact from ethic of society/stakeholder perspective Prevent future information ethics issues

Assess quality of information (ethical perspective)

Define business need and approach

本书版权归Kogan Page所有

Identify root causes of ethical issues

Analyse information environment

Cannot be done ethically or legally

Implement controls

Develop improvement plans

Fix current ethical/ compliance issues

Assess business impact

Issues cannot be addressed in a cost-effective manner Communicate actions and results

Information ethics and risk

you are aiming to deliver. Without that clarity, there is a risk of misunderstanding, miscommunication or failure to identify critical risks. This process begins with a requirement for a clear statement of the business need and approach for the proposed processing. This is an important first step in the methodology as it supports the following key functions: 99 Determination of what kind of assessment is required. Are you going to constrain your analysis to just the privacy and privacy-derived outcomes in a privacy impact assessment, or are you conducting a broader ethical impact assessment? 99 Defining the purpose of the proposed processing. What is the objective? What are the information and process outcomes you are trying to achieve? 99 Identifying if there are multiple purposes and outcomes potentially to be achieved within the proposed processing, and identifying if there might be conflicts between those goals. 99 Identifying the proposed benefits from the proposed processing of information. 99 Identifying the relevant stakeholders and beneficiaries of the proposed processing. 99 Define processing activities that are not in scope for the impact assessment. This definition of your need and approach will be an important reference throughout the rest of the assessment, and indeed will be an important reference point for data governance and other control activities after the proposed information processing and management capability is deployed. You can derive your business need and approach from the project charter or scope documents for a given project. For an ethical information assessment, the focus in this instance is on the proposed processing of information, and information and process outcomes that your organization is ­looking to deliver as a result. It is important in the definition of the business need and approach that attention be paid to the needs of and benefits to individuals as stakeholders. This is an essential requirement to ensure that you are considering what the expectation of the ethic of society would be in the context of your processing activities, and who that society is made up of. It is critical at this point to ensure this is done to ensure that an appropriate stakeholder theory normative approach to ethics can be applied. As a principle, it is one we find articulated in legal concepts such as the ‘Neighbour Principle’ in tort law.1 This principle

本书版权归Kogan Page所有

331

332

Data Ethics

holds that ‘one must take reasonable care to avoid acts or omissions that could reasonably be foreseen as likely to injure one’s neighbour’. Your ‘neighbour’ in turn is defined as ‘someone who was so closely and directly affected by the act that one ought to have them in contemplation as being so affected when directing one’s mind to the acts or omissions in question’ (Oxford Reference, nd). In the context of data privacy impact assessments, the European Data Protection Board also explicitly references the need to conduct assessments as an iterative process where individual steps may need to be repeated as ‘the development process progresses because the selection of certain technical or organizational measures may affect the severity or likelihood of the risks posed by the processing’ (Article 29 Working Party, 2017). The same is true of ethical impact ­assessments. As more information is learnt about the nature and purpose of processing and the potential complexities or social issues that might arise, it is likely that the process will need to be revisited to reassess decisions taken. In such a context, it is important to refer back to the original statement of business need and approach, determine if the ethical risks identified in relation to the proposed processing are appropriate in the context of the business need, and update the statement of business need and approach or your assessment of risk, as appropriate. As such, it is very important to define and capture the initial statement of business need and approach in a structured format (Table 10.5). In our example of the lifelogging application for people suffering from memory loss or other cognitive impairment, the statement of business need and approach would look something like in Table 10.6. Table 10.5  Business need and approach template We want to

Describe the information-processing activity that is the subject of the ethical impact assessment. This should be sufficiently detailed to help you and your colleagues assess and identify potential ethical challenges

So that we can

Describe the organization capability that the processing is intended to provide or the social problem that the information processing is intended to address

Which will deliver the following benefits

Describe the intended benefits to the organization and to stakeholders. Focus should be on the outcomes in terms of information and process outcomes and the impact of those outcomes

To the following stakeholders

Describe the stakeholders, both internal and external, who it is intended will benefit from the proposed processing activity or whose data will be processed as part of this activity

本书版权归Kogan Page所有

Information ethics and risk

Table 10.6  Example statement of business need and approach We want to

Provide a 24/7 recording capability through audio and video recording using wearable and smartphone applications. We will use machine-learning processes to categorize and tag ‘memories’ with relevant metadata and provide a web-based or app-based search portal for users

So that we can

Provide a prosthetic memory by delivering a searchable repository of interactions and events that the user will have been party to

Which will deliver the following benefits

This will allow people with a cognitive or memory impairment to operate and live more independently through the provision of memory prompts or confirmation evidence for events they may misremember or forget entirely

To the following stakeholders

The persons with cognitive impairment, their families and friends, third parties who may have their image or other data recorded or stored, medical practitioners, carers

Step 2: analyse information environment In this phase of the framework we gather, compile and analyse information about the current situation and information environment, as well as the proposed processing. The goal of this phase is to develop an understanding of the landscape the proposed processing will take place in. The objective is to identify the components of the business, information and technology environment that will need to be aligned, and also to identify the driving ethic of the organization and relevant ethic of society that will need to be matched to ensure the information and process outcomes meet expectations. In conducting this analysis, it is useful to consider the environment from four distinct perspectives or ‘compass points’ (see Figure 10.6): ●●

Social (putting the processing in the context of society and the organization culture).

●●

Technical (considering the technical architecture and design).

●●

Legal (considering the legal issues that might affect the processing).

●●

Moral (considering the ethical and moral dimensions of the proposed processing).

本书版权归Kogan Page所有

333

334

Data Ethics

Figure 10.6  The four compass points for ethical impact assessment

Social

Technical

• Is there any research on society’s attitudes?

• What is the technology architecture?

• Have other organizations carried out similar projects?

• What are the data flows? • How novel is the processing?

• What is the internal culture in the organization?

• What technology risks have been identified?

• What are stakeholder expectations?

• What are the technical requirements and processes?

Legal

Moral

• What regulatory rules might apply?

• Is it supporting or enhancing human dignity?

• What guidance is available from relevant regulators?

• Does it preserve the autonomy of the person?

• What internal governance structures and rules apply?

• Is the processing necessary and proportionate? • Does it uphold a common good?

It is important to be clear about how you are engaging the ethic of society and seeking to understand their expectations. Key questions you need to answer at the ‘Social’ compass point include: ●●

What are the attitudes of people in society to the type of processing proposed?

●●

What are the attitudes of people in society to the proposed benefits?

●●

Are the proposed benefits credible to society?

●●

●●

Have you engaged with people to find out this information? Have you used surveys, commissioned research, sought out existing research, etc? What experiences exist in other jurisdictions for similar things?

In the context of the ‘Moral’ compass point, you need to have a structured method to tap into the views of the people in your organization, and potentially representatives of your external stakeholders. Surveys and facilitated 本书版权归Kogan Page所有

Information ethics and risk

brainstorming can be very effective techniques to elicit information. One method that we use with clients is a form of silent brainstorming that poses the ethical question in a structured way. The utility/invasiveness matrix  The method for this is actually quite simple. In a facilitated workshop, you present the statement of business need and approach to the group. On a Post-it note, or using an electronic voting process, each participant ranks the proposed processing on a scale of 1 to 10 (low to high) along two axes: ●●

●●

Utility ranks the degree to which the proposed processing and its associated information and/or process outcomes will do good in society or will promote happiness. Invasiveness is the measure of the level of intrusion into the personal life, relationships, correspondence or communications of the individual or a group of individuals as a result of the processing activity or the information outcome or process outcome that is delivered.

Participants are then asked to record their ‘margin for error’ on that ranking scale. This is the level of ‘wriggle room’ that they think might exist in the application of trade-offs and balancing rights and obligations. It is essential, however, that this part of the process is done SILENTLY after a discussion of the proposed business need and approach. This is to help avoid groupthink and to allow for individuals to have an opportunity for role taking and to avoid the ranking being dominated by the views of a single dominant or persuasive voice. The facilitator should collect the scores and the margins for error and plot these on the four-box matrix in Figure 10.7. Each respondent’s coordinates map out a box indicating their personal ‘moral space’ for the proposed processing. Overlaying each respondent’s ‘moral space’ on top of each other, the facilitator can quickly identify the zone of consensus. This zone is what the group who have been taking part indicate is their ‘ethical risk appetite’ for the proposed processing. This area of ‘ethical risk appetite’ will sit somewhere in the four quadrants of the utility/invasiveness grid: ●●

●●

●●

High utility–low invasive initiatives are relative no-brainers. The ethical risks are potentially far outweighed by the benefits to individuals or society. High utility–highly invasive initiatives need to have additional controls, checks and balances, or other factors considered to reduce the level of invasiveness or at least provide some level of redress and balance. Low utility–highly invasive initiatives need to be reconsidered to see how the invasiveness can be reduced or the utility increased.

本书版权归Kogan Page所有

335

Data Ethics

Figure 10.7  The utility versus invasiveness matrix 10

Utility

336

1

●●

Invasiveness

10

Low utility–low invasiveness initiatives are not adding any value to society but are unlikely to be causing any great harm.

In the context of our lifelogging example, the processing would likely be rated quite invasive but also of high utility and supportive of human dignity. Therefore, it is important to understand how critical the impact might be on the ability to implement.

Steps 3 and 4: assess information privacy quality and business impact The next steps in the process occur in parallel. These relate to the assessment of the ‘quality of information privacy’ in the proposed processing activity. The objective here is to begin the process of risk assessment and evaluation by identifying critical issues that will prevent the proposed initiative proceeding as initially scoped. Examples of these showstoppers could include: ●● ●●

●●

lack of a legal basis for conducting the processing; the proposed scope and scale of processing not meeting the necessity or proportionality requirements under GDPR; the proposed processing being highly invasive and of limited utility.

In the first instance, our methodology proposes a review of the defined business need and approach to determine if the identified issues can be remedied through a refinement of or clarification of either the need or the approach to be taken.

本书版权归Kogan Page所有

Information ethics and risk

Figure 10.8  Reviewing business need and approach – the utility/invasiveness goals 10

Utility

Reduce invasiveness

Increase utility

1

Invasiveness

10

The strategy here is to seek to increase utility or reduce invasiveness or restructure the proposed processing to address any blatant illegality (Figure 10.8). Once the business need and approach has been reviewed to determine if it can be amended, the organization should conduct a second review of the information environment and assess quality of information privacy again, particularly if the remediation/mitigation resulted in a change to its proposed information architecture or environment, to determine if findings of that review still hold or if new issues or risks are identified. For our lifelogging scenario, we will assume that there is no critical showstopper. There is no legal issue that is terminal to the execution of the processing, but there are a range of root causes that need to be identified and mitigated to reduce the invasiveness of the proposed processing and maximize its utility. For example, is it possible to reduce the level of recording or increase the awareness of third parties that there is recording taking place?

Step 5: identify root causes For ethical issues that have been identified that are not terminal to the proposed project, it is necessary to identify the root causes of the issues and gaps identified. This is important as it ensures that the correct remediation is applied to address the correct problem. It also allows for identification and determination of interim measures that might be applied.

本书版权归Kogan Page所有

337

338

Data Ethics

The root-cause identification should be conducted through a facilitated workshop. This may be conducted as an onsite workshop or as an offsite review and voting cycle. This phase is grounded on several key assumptions derived from quality management principles: ●● ●●

●●

●●

Any issue identified may have multiple potential root causes. Addressing one or more issues will reduce the inherent risk, but will leave residual risks to be considered, particularly where lower-priority root causes are not addressed. The focus should be on identifying what the root causes are for any individual failure mode (in this case, a privacy-impacting issue). To determine the appropriate solution, we need to identify the relevant root cause.

In the context of conducting the assessment, it is important to consider the probability and impact of an issue or risk from the perspective of the data subject as well. Likewise, the probability of detection should be addressed from both the internal (existence of an internal detective control) perspective and from the customer/data subject perspective (how easy would it be for them to demonstrate that the failure mode and root cause existed and impacted on their fundamental rights?). Quality management techniques for root-cause analysis should be used here, such as ‘five whys’ analysis and fishbone diagrams. ‘Five whys’ analysis is as uncomplicated as it sounds. It requires you to ask ‘why’ five times about a particular problem or issue until you have identified what the precipitating root cause is. A fishbone or Ishikawa diagram is a tool for clustering those root causes based on common factors such as people, process, management and technology factors.

Five whys analysis The five whys analysis method is relatively straightforward. You define your problem statement (in our case, the ethical dilemma we are faced with) and then you ask ‘Why?’ a number of times to get to the real root cause and the solution that addresses that most appropriately in light of any constraints that may exist (e.g. budget). For example, if the problem you are facing is

本书版权归Kogan Page所有

Information ethics and risk

birds leaving droppings on your car if it is parked outside your house for a while, you might proceed as follows: ●●

●●

●●

●●

●●

●●

Q: Why are birds leaving droppings on my car? A: Because it is parked outside and because birds are well fed. Q: Why are birds well fed? A: We have fruit trees in the back garden, as do our neighbours. Q: Why can’t we get rid of the fruit trees? A: Our neighbours like them, as do we. Q: Why are bird droppings landing on my car? A: It is parked outside with no cover. Q: Why don’t I buy a car cover or build a garage? A: No space or money to build a garage. Why don’t I buy a car cover?

Fishbone diagrams A fishbone diagram (Figure 10.9) is a quality management tool used to cluster common root causes together to help identify the critical areas of a problem leading to an issue. You write your problem statement at the ‘head’ of the fish and you identify the contributing areas as the ‘ribs’, with each root cause you identify being an offshoot of one of the ‘ribs’ of the fish. Figure 10.9  An example of a fishbone diagram [People]

[Process] [cause]

[Equipment] [cause] [cause]

[cause] [cause]

[cause] [cause]

[cause]

[cause] [Problem]

[cause] [cause] [cause]

[Materials]

[cause]

[cause] [cause] [cause]

[Environment]

[cause] [cause]

[Management]

Fishbone diagrams are often called ‘Ishikawa diagrams’ because their first use is credited to Kaoru Ishikawa.

本书版权归Kogan Page所有

339

340

Data Ethics

For our lifelogging example, one potential root cause is the issues arising from the automated processing of people’s data for the generation of the metadata to support search. It might also be the case that there are concerns about the retention of identifiable data in the form of video. Therefore, the improvement plans might need to focus on security, disclosure of processing purposes, and potentially the provision of technology to support redaction of faces in videos.

Step 6: develop improvement plans Once you have identified the root causes for the ethical issues in your information management processes, you need to make your plans to do something about it. At this point in the process you are aiming to define requirements for: ●●

processes, procedures and controls;

●●

training and awareness;

●●

ethics mechanisms.

A key requirement of this phase in the process is that the remedial action proposed should be mapped directly to one or more identified root causes. You should then conduct a business-case analysis on the proposed remedial actions and may choose not to implement one or more of the proposed actions. Likewise, if the cost of implementing remedial actions of any kind is prohibitive, it should trigger an immediate review of the originally proposed business need and approach, or your senior management team need to sign off on the fact that they are choosing to engage in a form of processing that has been assessed to be unethical, and potentially unlawful. Even where you fund all possible remediation actions, there will always be a level of risk that the ethic of society and the expectations of individuals in society will not be aligned with the ethic of the organization and that your information and process outcomes will not deliver the desired results. This can happen where the public perception and awareness of the impacts on utility, invasiveness, beneficence and the other ethical characteristics we identified in Chapter 8 differ from the perception of those values held by the organization and the individuals in the organization. This is similar to the perception of quality in manufactured goods or information when the customer expects something different to what the manufacturer has produced. To put it another way, when people become aware of the impacts that can arise due to misuse or abuse of a technology, it may change the risk calculation for your ethical balancing act.

本书版权归Kogan Page所有

Information ethics and risk

You should also be clear about who is responsible for delivering the mitigating actions and by when. This is an important audit and verification control for post-implementation review of the PIA process to ensure that all things that were to be done have been done. Controls should be designed and defined at this point as they are part of the improvement process. You might not execute or implement these controls until the end of the remediation phase, but the earlier you consciously begin designing, the earlier you can pilot and test these controls for effectiveness. In this context, controls can include (non-exhaustive list): ●●

●●

●●

Organizational: {{

training

{{

implementing governance controls

{{

revised policies and procedures

Technological: {{

implement user access controls

{{

detection and logging of access to data

{{

data masking or anonymization/pseudonymization technologies

Customer/user facing: {{ {{

{{

●●

changes to data privacy statements/notices changes to how information is presented and communicated about data-processing activities provision of controls for data subjects regarding the exercise of their rights

Society facing: {{

lobbying for legislative change

{{

educating mass market on benefits (utility) of processing

Step 10: communicate We skip straight to Step 10 at this point because assessment is not concerned with remediation, although this step is common to both high-level phases. This step is a key supporting activity across the entire life cycle of the ethical impact assessment process. It relates to the need to document key findings and outputs during the activity. It is not an ‘end of project’ activity but is rather an ongoing regular process. It is important to be clear about who the stakeholders are, who you are communicating with and what their role will

本书版权归Kogan Page所有

341

342

Data Ethics

be. Are you seeking feedback? Are you seeking direct input? Will you be conducting ongoing testing of assumptions? Are you just letting people know that you are still in existence? Communication is a key element internally for driving ethical changes in information management, aligning the ethic of the individual with the ethic of society. It is also a critical process for ensuring alignment between the ethic of the organization and the ethic of society. These communication processes will not happen by accident and need to be properly designed and managed in order to be effective.

Supporting and extending the methodology The European Union has funded research into ethical impact assessments with a number of large-scale research projects including the Satori project, Project SHERPA, the SIENNA project and the PROTECT European Training Network, which supports early stage researchers investigating methods to protect rights and interests of individuals impacted by the continuous largescale analysis of personal data. The aim of the first-named Satori project was to develop a common EU-wide framework for the ethical assessment of research and innovation. Over four years the project looked at a range of issues and perspectives on the question of ethical impact assessments. Project SHERPA examined various issues in the ethical and human rights implications of ‘smart information systems’ such as big data analytics, ‘smart cities’ and AI, and the SIENNA project researched such impacts in emerging technology areas such as human genomics, human enhancement and ­ human–machine interaction. In addition, the ADAPT Centre for Digital Content Technology (the lead body in the PROTECT-ITN), based in Trinity College Dublin, has produced an Ethics Canvas application to help project teams and innovators think through the ethical implications of their proposed development (ADAPT Centre, 2017). Their outputs provide useful resources for individuals and organizations looking to develop their own in-house ethical impact assessment methodology. Among the issues that the Satori project (2017) has examined are: ●● ●●

●●

the different types of assessment you might perform; what types of ethical values, issues and principles might arise in different types of assessment; understanding the trade-offs that might arise as a result of decisions made in ethical impact assessments.

本书版权归Kogan Page所有

Information ethics and risk

It is outside the scope of this chapter, and indeed this book, to review and summarize the entirety of these outputs, but we recommend them as a valuable reference resource for information from policy guidelines to concrete tools.

The Ethics Canvas The Business Model Canvas, developed by Alex Osterwalder, is a strategic management template that is used for developing and documenting business models. The Adapt Centre developed an Ethics Canvas in 2017 (ADAPT Centre, 2017; Pandit et al, 2018). This model allows project teams and innovators to examine the ethical implications of any project. It uses similar structures to the Business Model Canvas to guide a structured brainstorming activity around any proposed use of data or technology. Among the areas for consideration are: ●●

●● ●●

●●

●● ●●

●●

The identification of affected stakeholders, either individuals or groups, who will be affected by the proposed initiative. Impacts on behaviour arising from the application. World views and perspectives (including ethical perspectives) that need to be considered. Points of conflict between stakeholder groups and their competing rights and interests. The implications of a failure of the product or service. The potential negative impacts arising from resource consumption (e.g. climate impacts, data privacy impacts or impacts on employment). Actions that can be taken to mitigate the ethical impacts.

The Ethics Canvas can be used in tandem with the model outlined above for ethical impact assessment to provide a structured approach to assessing ­impacts.

The ODI Data Ethics Canvas The Open Data Institute in the UK based its Data Ethics Canvas on the model developed by the ADAPT Centre. The ODI’s Canvas asks more data-specific questions but follows a similar structured brainstorming approach, with an emphasis on the objective of open data. You can find further information on the ODI’s Data Ethics Canvas on the ODI’s website (ODI, 2021).

本书版权归Kogan Page所有

343

344

Data Ethics

Chapter summary In this chapter we have: ●● ●●

●●

●●

Discussed ethical impact management as a risk-based approach. Introduced the concepts of privacy by design, ethics by design and privacy engineering. Set out a methodology for conducting ethical impact assessments in an information management context. This methodology is grounded in proven quality management principles and an established information quality management framework.

Questions 1 What is the value in adopting a structured and standardized approach to ethical impact assessments? 2 What other tools, techniques or methods from quality management might be applicable in this context? 3 There is a strong conceptual link between quality management, information quality management, data privacy and ethical information management. What are the differences that exist and why are they important? 4 What would you identify as the critical components of a methodology for running ethical impact assessments in your organization?

Note 1 Tort law is the law of civil wrongs. It is the field of law you litigate in if you have slipped on the wet floor in a shopping mall. Is it ethical for a shopping mall not to provide adequate notice of the wet floor and appropriate barriers? If you ignore the barriers and notices, is it ethical that the shopping mall would need to pay for your injuries?

本书版权归Kogan Page所有

Information ethics and risk

Further reading Article 29 Working Party (2017) Guidelines on Data Protection Impact Assessment (DPIA) and determining whether processing is ‘likely to result in a high risk’ for the purposes of regulation 2016/679, 4 April, ec.europa.eu/newsroom/document. cfm?doc_id=44137 (archived at https://perma.cc/U7RM-VXNC) Brey, P A E (2012) Anticipating ethical issues in emerging IT, Ethics and Information Technology, 14 (4), 305–17 BSR (2017) Case Study: Telia Company: Human rights impact assessments, Business for Social Responsibility, 12 July, bsr.org/en/our-insights/case-study-view/teliacompany-human-rights-impact-assessments (archived at https://perma.cc/3YZQCTNH) Burgess, J P et al (2018) EDPS Ethics Advisory Group Report 2018, European Data Protection Supervisor, edps.europa.eu/sites/edp/files/publication/18-01-25_eag_ report_en.pdf (archived at https://perma.cc/5AX2-TRLL) De Hert, P, Kloza, D and Wright, D (eds) (2012) Recommendations for a privacy impact assessment framework for the European Union, PIAF, November, piafproject.files.wordpress.com/2018/03/piaf_d3_final.pdf (archived at https:// perma.cc/SG68-JCRJ) Epley, N and Tannenbaum, D (2017) Treating ethics as a design problem, Behavioral Science & Policy, 3 (2), 72–84, 10.1353/bsp.2017.0014 (archived at https:// perma.cc/ES4R-Z96T) European Commission (2021) Ethics by design and ethics of use approaches for artificial intelligence, 25 November, ec.europa.eu/info/funding-tenders/ opportunities/docs/2021-2027/horizon/guidance/ethics-by-design-and-ethics-ofuse-approaches-for-artificial-intelligence_he_en.pdf (archived at https://perma. cc/26PS-J5Y6) Moor, J H (2005) Why we need better ethics for emerging technologies, Ethics and Information Technology, 7 (3), 111–19 Nissenbaum, H (2009) Privacy in Context: Technology, policy, and the integrity of social life, Stanford University Press, Stanford, CA Pasquale, F (2016) The Black Box Society: The secret algorithms that control money and information, Harvard University Press, Cambridge, MA Satori (2017) Satori, satoriproject.eu/ (archived at https://perma.cc/T24E-PJZQ) Telia Company (2017) Human Rights Impact Assessment – Telia Sweden, May, www.teliacompany.com/globalassets/telia-company/documents/sustainability/ hria/human-rights-impact-assessment-telia-sweden.pdf (archived at https:// perma.cc/KRU4-ZHLG) Vallor, S (2016) Technology and the Virtues: A philosophical guide to a future worth wanting, Oxford University Press, New York Wright, D (2011) A framework for the ethical impact assessment of information technology, Ethics and Information Technology, 13 (3), 199–226

本书版权归Kogan Page所有

345

346

Data Ethics

References ADAPT Centre (2017) Online Ethics Canvas, ethicscanvas.org/ (archived at https:// perma.cc/9TPU-QVFF) Article 29 Working Party (2017) Guidelines on Data Protection Impact Assessment (DPIA) and determining whether processing is ‘likely to result in a high risk’ for the purposes of regulation 2016/679, 4 April, ec.europa.eu/newsroom/document. cfm?doc_id=44137 (archived at https://perma.cc/85QD-SM68) Cavoukian, A (2011) Privacy by Design: The 7 foundational principles, Privacy by Design, Information and Privacy Commissioner of Ontario [download], www.ipc.on.ca/wp-content/uploads/Resources/7foundationalprinciples.pdf (archived at https://perma.cc/KG3E-P56W) Cavoukian, A (2017) AI Ethics by Design, Ryerson University [download], www.ryerson.ca/content/dam/pbdce/papers/AI_Ethics_by_Design.docx (archived at https://perma.cc/HG69-A5P3) Dennedy, M, Finneran, T R and Fox, J (2014) The Privacy Engineer’s Manifesto: Getting from policy to code to QA to value, ApressOpen, Berkeley, CA European Commission. (2021) Ethics By Design and Ethics of Use Approaches for Artificial Intelligence. https://ec.europa.eu/info/funding-tenders/opportunities/ docs/2021-2027/horizon/guidance/ethics-by-design-and-ethics-of-useapproaches-for-artificial-intelligence_he_en.pdf (archived at https://perma.cc/ GSE2-PHR7) Fiesler, C and Garrett, N (2020) Ethical tech starts with addressing ethical debt, Wired, 16 September, www.wired.com/story/opinion-ethical-tech-starts-withaddressing-ethical-debt/ (archived at https://perma.cc/2KXS-5K5Q) Juran, J (1986) The quality trilogy: A universal approach to managing for quality, pages.stern.nyu.edu/~djuran/trilogy1.doc (archived at https://perma.cc/Q6GMENBC) McGilvray, D (2008) Executing Data Quality Projects: Ten steps to quality data and trusted information, Morgan Kaufmann, Boston, MA ODI (2021) The Data Ethics Canvas, Open Data Institute, 28 June, theodi.org/ article/the-data-ethics-canvas-2021 (archived at https://perma.cc/9N59-23ZW) Oliver, I (2014) Privacy Engineering: A data flow and ontological approach, CreateSpace Independent Publishing Platform Oxford Reference (nd) Neighbour principle, www.oxfordreference.com/view/ 10.1093/oi/authority.20110803100227619 (archived at https://perma.cc/F267WCF7) Pandit, H et al (2018) Discussing ethical impacts in research and innovation: The Ethics Canvas, Harshp.com, harshp.com/presentations/2018/HCC13-EthicsCanvas/ HCC13_Ethics_Canvas_2018.pdf (archived at https://perma.cc/7G8Q-PK89)

本书版权归Kogan Page所有

Information ethics and risk Peters, T (2015) Management… the arrangement and animation of human affairs in  pursuit of desired outcomes, Tom Peters, tompeters.com/wp-content/uploads/ 2016/08/Management_collective_behavior_032215A-1.pdf (archived at https:// perma.cc/54BY-E3KR) Satori (2017) Satori, satoriproject.eu/ (archived at https://perma.cc/T24E-PJZQ) Trevino, L K (1986) Ethical decision making in organizations: A person–situation interactionist model, The Academy of Management Review, 11 (3), 601–17 World Economic Forum (2020) Ethics by design: An organizational approach to responsible use of technology, white paper, December, www3.weforum.org/docs/ WEF_Ethics_by_Design_2020.pdf (archived at https://perma.cc/TT8D-VXU8)

本书版权归Kogan Page所有

347

348

Data ethics: the 11 bigger picture What will we cover in this chapter? Data is a critical organization asset for entities of all sizes. The last 20 years have seen a rapid explosion in how data management can impact the lives of individuals at scale, whether through the potential for new ways to measure data about people or the implementation of technologies that allow us to process data in new ways that can impact on individuals and on society. The increasing datafication and digitalization of society means that we cannot look at questions of data ethics in isolation. Tackling the ethical issues in data today and into the future will need us to influence the ethic of individuals, the ethic of organizations and the ethic of society. In this chapter we will:

●●

●●

●●

Discuss how data ethics requires investment in data literacy and data competencies for both people working in organizations as well as in broader society. Discuss how data ethics is a social change as much as an organizational change, and the role that organizations may have to play in developing ethical data awareness in society. Highlight the need for broad-based education and awareness of ethics as it applies to data, and of how data can be used unethically, including consideration of data ethics in education syllabuses for academic and professional education.

Introduction The phrase ‘moral panic’ and the related sociological concept is credited to Stanley Cohen, a South African sociologist, who coined the term in the

本书版权归Kogan Page所有

Data ethics: the bigger picture

1970s (Cohen, 1972). In Cohen’s book he analyses the reaction of the British public to the rivalry between the ‘Mods’ and the ‘Rockers’, two teenage subcultures in the late 1960s and 1970s immortalized in the movie Quadrophenia. Moral panics happen when a condition, episode or group of people becomes identified and defined as a threat to the values and interests of society, often based on exaggerated or entirely fictitious representations of the seriousness, extent, typicality or inevitability of harm. In Cohen’s model, a moral panic follows an identifiable life cycle. First, something or someone is perceived and defined as a threat to social norms. Then the news media and community members depict the threat in simplistic and symbolic ways that spread organically. This then triggers a widespread public concern (fuelled by how the media reports the issues). Policymakers and regulators then respond to the threat with new laws or policies (regardless of whether the threat is real or imagined). The final stage of moral panic is that the actions taken trigger a social change in the community, which may or may not be to the benefit of society as a whole. So, are we facing a moral panic about the ethics of data? Arguably we are in some instances but we certainly are not in all. Certainly, the litany of inflated expectations about the potential benefits of data-driven technologies hasn’t helped, nor has the adoption of ‘black box’ approaches, or the pop culture narratives and tropes about artificial intelligence that we discussed way back in Chapter 5. However, there are clear and appreciable social and societal risks arising from issues such as algorithmic filtering, automated decision making based on biased data sets, and the application of machine learning and algorithmic work management. The relatively easy availability of data, the low financial cost of storage capacity, and the significant advances in technologies and tools for mining raw data for valuable insights and information has the potential to significantly improve society, giving us the tools we need to improve the human condition globally. These tools have an undeniable dark side, so we must try to develop frameworks for use where the benefits are maximized and outweigh the negatives to the greatest degree possible. In the words of Floridi and Taddeo (2016): ‘Overlooking ethical issues may prompt negative impact or social rejection’. This is, in part, where we stand with the moral panic question. Ethical issues have been, for too long, overlooked in the development of and implementation of data management capabilities. Floridi and Taddeo add that ‘over-emphazising the protection of individual rights in the wrong contexts may lead to regulations that are too rigid’. This, they argue could hobble the chances of harnessing the social

本书版权归Kogan Page所有

349

350

Data Ethics

value of data. What we are faced with, ultimately, is what is referred to in social policy as a ‘wicked problem’ to which there is no single solution or for which, due to its social complexity, there is no definable stopping point. The defining characteristics of a wicked problem are defined by Conklin (2005) as: 1 We don’t understand the problem until we have developed a solution. 2 Wicked problems have no stopping rule. 3 Solutions to wicked problems are not right or wrong. 4 Every wicked problem is essentially unique and novel. 5 Every solution is a ‘one-shot’ operation that has a cumulative effect, but solutions will spawn new problems. 6 Wicked problems have no given alternative solutions. It is a matter of creativity and judgement to devise solutions and choose between them. For data management professionals and business leaders who are trained to think in terms of definable and measurable goals and challenges, tackling the data ethics challenge can seem daunting. It is necessary to develop a multi-pronged approach to addressing these issues that address the ethic of the individual, the ethic of the organization, and the ethic of society.

Tackling the wicked problem The only thing one can be sure of when tackling a wicked problem is that any solution that is simple, elegant and obvious is almost certainly wrong. This can often be a sign that the proposed solution is imposing a purely technical view on a technosocial problem. Conklin (2005) identifies two general approaches that are adopted to tackling wicked problems: studying the problem and taming the problem. A tame problem is one that has a well-defined problem statement, has a stopping point, can be objectively evaluated, can be categorized along with similar problems, has a limited set of alternative solutions, and has solutions that can be easily tried and abandoned. Most wicked problems have elements to them that are tame and lend themselves to easy solutions. Studying the problem can quickly descend into paralysis by analysis. Back in Chapter 3 we discussed the need to move discussions of data ethics from the episteme to the practical and actionable. This is a similar challenge. If we spend too long pondering what the correct action is, the window to act will be gone. Therefore, we need to break the wicked problem down into

本书版权归Kogan Page所有

Data ethics: the bigger picture

solvable and actionable chunks, hoping that the cumulative effect of multiple actions will bring us closer to the ultimate answer. Approaches to taming a wicked problem include defining a solvable sub-problem, deciding to assert the problem is solved (this requires considerable authority), defining some objective parameters for measuring success, reframing the problem as ‘just like’ another problem that has been solved, declaring a shortlist of possible solutions and focusing on those, or simply giving up on trying to find an answer. We do not advocate giving up, nor do we consider constraining our choices to be a long-term solution, nor can we ethically stand over declaring ‘mission accomplished’ on data ethics and hoping nobody notices the problem is still there. So, what can we do to narrow the problem down to some actionable things where we might have relevant experience of solutions to draw on? A consistent theme that is emerging from organizations and groups that are examining both data ethics and the delivery of sustainable value through data management is the fundamental importance of education and the development of ‘data literacy’. However, this is not just education in the context of technical skills in the use of information management technologies. The emerging consensus is that education is needed to help raise awareness in society of the reality of data management and the real capabilities and, for that matter, the real risks arising from data management technologies. This must be addressed in tandem with developing data literacy and data management skills and understanding among technical roles and business roles within organizations, including executive leadership. Our education also needs to consider how legislators and regulators can be educated on the emerging trends and technologies, but also on the historic good practices for managing data, and managing data ethically.

Beyond data literacy: data acumen While data literacy has become an emerging buzzword in data management in the past few years, its origins can be traced back to the 1990s when the term was associated with the ‘knowledge and understanding sufficient to lead, use, and inform decision-making’ (Keller and Shipp, 2021). The early literature recognized topics such as quantitative literacy and statistical literacy as part of the bundle of skills needed for people to be data literate. Through a

本书版权归Kogan Page所有

351

352

Data Ethics

combination of maturity of thinking and vendor and consultancy branding, the term ‘data literacy’ today has evolved to mean the collection of skills and abilities needed to do data science. For example, Panetta (2021) defines data literacy as: ‘the ability to read, write and communicate data in context’. Data acumen is our preferred term, as it addresses the concept of data literacy in the context of the role a person is playing in relation to the information and the level of competence they need to make use of the information or carry out their work function. Data acumen is defined as the ‘ability to make good judgements about the use of data to support problem solutions’ (Keller et al, 2020). Data acumen is defined by Castlebridge as ‘data competence in context’ and it represents a spectrum of data literacy skills and competencies that are related to the role a person is performing in a given process. Data acumen is essential to helping people who are working with data develop the necessary theory of knowledge to understand their role, responsibilities and what is expected of them. W Edwards Deming highlighted the importance of a theory of knowledge in his work on quality management. From an academic perspective, there is a growing recognition internationally that the application of ethics to data management and emergent technologies such as artificial intelligence and their ethical use requires a multidisciplinary approach to develop appropriate skills and competencies in application developers, researchers, implementers and policymakers. For example, the Epower Data Governance research programme in Maynooth University (https://www.empower-datagovernance.ie/) is looking at these issues, along with other aspects of data governance for social good. At the Empower Data Governance Symposium in Dublin in November 2022, industry and academic collaborators examined the key opportunities and barriers for data management across several perspectives: enterprise strategy, delivering data value, open data, bias in AI, and policy and strategy.1 Across the board the focus groups identified training, data literacy, data education, and developing awareness and understanding as key barriers and opportunities to be addressed to ensure the delivery of data management innovations that meet socioethical requirements. Similar trends are emerging globally in professional certifications and industry frameworks, and there is also a growing recognition in industry that data literacy and the understanding and application of data management fundamentals in support of the implementation of AI is key to successful implementation (Redman, 2018).

本书版权归Kogan Page所有

Data ethics: the bigger picture

The UNESCO Recommendation on the Ethics of AI (UNESCO, 2021) explicitly raises the issue of data literacy and education in the context of AI and digitalization, particularly as education and information are two of the central domains of UNESCO’s mission. The Recommendation highlights that ‘living in digitalizing societies requires new educational practices, ethical reflection, critical thinking, responsible design practices and new skills, given the implications for the labour market, employability and civic participation’ (p 6). The Recommendation also raises explicitly the need to develop public awareness of AI and the value of data through ‘open and accessible education, civic engagement, digital skills’ and, notably, ethics training. Furthermore, this awareness building needs to include media and information literacy, which are called out as topics distinct from data literacy or digital skills. In terms of what those competencies and skills need to be, there is a wide range of perspectives, with UNESCO’s DigComp framework (Law et al, 2018) providing a global reference framework spanning competencies from device and software operation to career-relevant digital skills (Table 11.1). The European Union’s Digital Competency Framework (Vuorikari, Kluzer and Punie, 2022) echoes the UNESCO framework to a large degree, but was updated in March 2022 to include explicit reference to competencies for people relating to AI, including competencies in the ethics of AI, the environmental impacts of AI, and the societal and social impacts of modern datadriven analytics-based business models and tools. These frameworks are useful when we are considering the full scope of data literacy and competencies in society at large. By addressing skills gaps at this level and encouraging people to learn and understand more about how data can be used for social good, improve their ability to interact with data-driven systems and processes, and be better informed about the potential issues and risks that may arise, we create the necessary foundations for people to be conscious of potential ethical issues associated with data or data-related technologies. This, in turn, can help promote the responsible adoption of data-related technologies to benefit individuals and society, discouraging the adoption of less-beneficent tools, and informing social discussion of the ethics of data use in and for society. To develop and promote ethically responsible data and technology use we must invest in the ‘human factors’ of knowledge, skill and understanding. However, within organizations many of the data literacy skills we need to develop fall within the category of ‘career-related’ skills on these generic frameworks and, as such, there can be a lack of clarity as to what skills

本书版权归Kogan Page所有

353

354

Data Ethics

Table 11.1  The UNESCO DigComp Framework summarized Career-related Competencies

●●

●●

Problem Solving

●●

●●

Safety

●●

●●

●●

Digital Content Creation

●● ●●

●●

Communication and Collaboration

●●

●●

●●

Information and Data Literacy

●●

●● ●●

Device and Software Operations

本书版权归Kogan Page所有

●● ●●

To operate specialized digital technologies and to understand, analyse and evaluate Specialized data, information and digital content for a particular field To identify needs and problems and to resolve conceptual problems and problem situations in digital environments To use digital tools to innovate processes and products. To keep up to date with the digital evolution To protect devices, content, personal data and privacy in digital environments To protect physical and psychological health, and to be aware of digital technologies for social well-being and social inclusion To be aware of the environmental impact of digital technologies and their use To create and edit digital content To improve and integrate information and content into an existing body of knowledge while understanding how copyright and licenses are to be applied To know how to give understandable instructions for a computer system Able to interact, communicate and collaborate through digital technologies while being aware of cultural and generational diversity Able to participate in society through public and private digital services and participatory citizenship Able to manage one’s digital identity and reputation Able to articulate information needs, to locate and retrieve digital data, information and content Able to judge the relevance of the source and its content Able to store, manage and organize digital data, information and content Able to identify and use hardware tools and technologies Able to identify data, information and digital content needed to operate software tools and technologies

Data ethics: the bigger picture

might be needed. The Open Data Institute’s Data Skills Framework (ODI, 2020) provides a structured approach for organizations to identify what data-related skills they need to develop as part of achieving an appropriate level of data acumen in the organization. In the ODI Framework (Figure 11.1), the data worker roles are represented on the right-hand side of the model. The left-hand side of the model addresses the ‘soft’ skills, business skills and social skills necessary to ensure successful and sustainable data initiatives. Working ethically with data is represented as a management and leadership competence area. A person who is fully data literate would have an awareness of the key topics across the entire framework. From a data ethics perspective, what is required is for people in the organization who are working with data to be able to understand and identify ethical issues in their proposed use of data and to understand the importance of appropriate safeguards to mitigate harms. This is arguably a much broader skill set than what is represented in the ODI framework. Figure 11.1  The ODI Data Skills Framework

Introducing data BUSINESS MANAGEMENT LEADERSHIP

Classifying data Working ethically

Creating value Governing access

Innovating with data

Building communities

Measuring success Achieving sustainability Prioritizing action

FOUNDATION ENGINEERING ANALYSIS

Standardizing data Cleaning data

Using platforms Finding insights

Managing change/risk

Designing services

本书版权归Kogan Page所有

Boosting usability

Linking data Visualizing data

Applying statistics Using data analytics

Developing strategy Trend analysis

Developing policy Leading change

Interacting with data Making data intelligent

355

356

Data Ethics

Educating the ethic of the individual In Chapter 9 we set out a framework for ethical information management that built on the work of Linda Trevino and others. That model considered the ‘ethic of the individual’ and their personal state of cognitive moral development as an important factor in achieving ethical outcomes. In the context of the ‘bigger picture’ for data ethics, we need to consider this individual both as a worker in an organization doing ‘data things’ and as an individual living in society and engaging with data and data-related processes on a daily basis. As a worker, this individual will need to have sufficient understanding of how their personal ethical principles can be exercised in the context of their role in the organization. They will need to have an appropriate understanding of the data management skills they are applying to identify and react to ethical issues that might arise. Equally, they will need to have sufficient understanding of and competence in their data management skills that they will be able to take appropriate actions when faced with an ethical issue in their day-to-day activities. As a private individual outside of their work context, this same person will need to have sufficient understanding of how technology works, how to interact with it, how data-related processes and technologies work, and the risks of poor-quality data, badly trained machine-learning processes and the potential impacts of automated decisions on them as individuals. They will also need to have an understanding of their rights as individuals in respect of their data and in respect of data-driven outcomes that might affect them. All these learning objectives can be mapped to the digital literacy frameworks outlined earlier and to the ODI’s Data Literacy Framework. Of course, as this person is promoted at work, is assigned to a more specialized role, or is given responsibilities in the organization that increase the complexity of ethical questions they may face, then they will be expected to demonstrate higher levels of proficiency in data-related skills, including higher proficiency in identifying, understanding and working to address ethical issues that may arise in relation to the processing of data in the organization. This is where the influence of professional bodies as professional educators and moderators of ethical behaviour through professional codes of conduct or ethical codes for their members become important individual moderators of ethical behaviour, but only where an individual is aware of them and understands how the principles can be applied in a particular context. Therefore,

本书版权归Kogan Page所有

Data ethics: the bigger picture

ongoing professional education of the individual to raise awareness and understanding of ethical issues in data management is important. Equally, the adoption of professional education in data management disciplines by professional bodies outside the traditional ‘data management’ domain is also important. For example, the Open Data Institute has developed a partnership with the Institute of Directors in the UK to deliver training to directors on data governance. Castlebridge has developed short courses in data ethics for organizations such as the Institute of Bankers. This type of industry partnership approach is essential to developing an ethical data fluency for individuals in organizations where they are able to identify and discuss ethical issues in a way that results in decisions and actions being taken. As data acumen in the societal context represents a potentially exhaustive range of skills and competencies to be developed, and as the development of individual data acumen within an organization is driven by the context and needs of that organization and the abilities and needs of the learner, it is outside the scope of this book to provide a detailed recipe for what specific education and training interventions would be required.

Educating the ethic of the organization The ethic of the organization is, at its simplest, the culture of the organization combined with the situational moderators of ethical behaviour that are implemented through the governance structures for data and the reward structures for delivery of outcomes in the organization. Therefore, the ethic of the organization starts with the ethical principles for data management that the organization espouses, as discussed back in Chapter 3. It develops, however, through the design and implementation of the governance and reward systems in the organizations and the behaviours that are rewarded or punished. While the organization is comprised of individuals, many or all of whom might receive appropriate training and skills development to educate the ‘ethic of the individual’, it is important that we consider how the ethic of the organization might also be educated. After all, as the author Upton Sinclair (1994) wrote: ‘It is difficult to get a man to understand something, when his salary depends upon his not understanding it!’ As discussed in an earlier chapter, the development of industry standards or industry codes of conduct represent a key mechanism for educating the ethic of the organization. Of course, the other way is to flout ethical norms

本书版权归Kogan Page所有

357

358

Data Ethics

and legal requirements and, as a result, avail of the undesired learning outcome of enforcement action against you. In contexts where the legislative environment has yet to catch up with the technological capabilities and data management possibilities that an organization might seek to exploit, often a self-regulatory approach based on well-defined ethical principles is required. However, in such cases it is essential that organizations have appropriate data governance structures in place to give effect to its ethical data principles, with appropriate consequences for nonconformity. Situational moderators of ethical behaviour such as this are critical to the adoption of any ‘self-regulatory’ model or hybrid regulatory model, along with investment in developing the ‘ethic of the individual’ as part of the safeguards and controls within the organization’s data ethics framework. When it comes to educating the ethic of the organization, few approaches work better than benchmarking the organization’s level of data ethics maturity. This allows the organization to develop a snapshot of where it is on its data ethics journey and then identify what areas of data literacy/data acumen it needs to prioritize development of. The ODI’s Data Ethics Maturity Model (ODI, 2022) is a useful tool in this regard to help organizations develop a baseline benchmark and map out a road map for what they need to do to develop the ethic of the organization. The ODI’s maturity model defines six key themes or dimensions of a maturity framework, mapped against five possible levels of maturity. These levels of maturity are defined in an organization through questions describing practices, outcomes or measures that exist in the organization. For example, if the organization has no defined data strategy and if data governance is viewed as a legal and regulatory issue, it would score as a Level 1 in the ‘Organizational governance and internal oversight’ dimension. Many of the practices defined in the ODI’s maturity model are ultimately good practice for data management in general, such as ensuring alignment with business and data strategies. Therefore, addressing gaps or weaknesses in the data ethics maturity will necessitate a maturing of data management practices and a development of data acumen in those areas where the organization is weak based on the maturity assessment. The Data Ethics Canvas discussed in Chapter 10 is another useful tool to help educate the ethic of the organization and develop data acumen within the organization as to the ethical issues and safeguards that relate to your organization and its strategic goals.

本书版权归Kogan Page所有

Data ethics: the bigger picture

Educating the ethic of society In the E2IM model discussed in Chapter 9, the ethic of society, and in particular the expectations of society of what ethical behaviour should be, represent a key quality threshold for organizations in respect of the processing of data. Society is made up of individuals. So, in an ideal world, educating individuals on data and data-related technologies and data ethics issues should address the need to educate the ethic of society. However, in addition to educating the individual employee in the necessary data skills and competencies to enable them to use data-related technologies sensibly with an awareness of risks, and also to enable them to execute data-related roles in an ethical manner, educating the ethic of society may involve having to educate elected representatives, the media, legislators and regulators on the reality of data management and on the ethical issues, risks and opportunities arising from the use of data and associated technologies. One approach that is being adopted to address this need is the concept of a regulatory sandbox. A regulatory sandbox is, at its simplest, a test-bed environment in which potential uses of data and associated technologies can be experimented with, without enforcement action being taken by a regulator if the processing would normally infringe on regulations. It allows novel technologies to be tested but also allows the bounds and application of current laws to be stretched, and any requirement for regulatory or legislative changes to support the ethical and appropriately safeguarded use of the technology to be identified, based on real experience not hypothetical speculation. In many respects, the regulatory sandbox is a mechanism that allows several of the key characteristics of a wicked problem to be short-circuited. It provides a mechanism by which we can build a solution before we fully understand the problem; it is a one-shot deal as it is intended to spawn problems and allow identification of solutions, and it invites the use of creativity and judgement to come up with appropriate solutions and designs in an environment where the regulatory bodies have removed some, if not most, of the risk of failure. The concept of the regulatory sandbox was pioneered by the UK’s Financial Conduct Authority to enable market innovation. It allows businesses to test new ideas without immediately incurring all the regulatory

本书版权归Kogan Page所有

359

360

Data Ethics

consequences that would arise in a real-world deployment. However, there is a risk that sandboxes could be abused by unscrupulous and unethical businesses to gain an advantage in the market, and appropriate safeguards, controls and oversight are essential (Quan, nd). This is why financial services regulators, among others, are shifting towards thematic sandboxes with stricter entry criteria (Duff, 2019). For example, Norway’s Data Protection Authority established a Responsible AI Sandbox in 2021 (Datatilsynet, nd). Among the small number of projects selected are projects looking to develop machine-learning and AI processes to detect the risk of heart failure, arguably a significantly beneficial project that might not have happened without the sandbox structure.

Educating to mitigate ‘ethics washing’ To overcome ethics washing in data management we need to make it easier to make ethical choices and take ethical actions. This means educating individuals so that they have sufficient data ethics acumen that they know where to look for the catch in the service or initiative being presented to them as the hallmark of the provider’s ethical credentials. It also means providing them with enough data acumen in the various data management skills and knowledge domains that they will be able to ask informed questions to verify the claims being made by the service provider. For example, the announcement of an ethics board or steering committee is often considered an indicator of an organization’s commitment to data ethics. However, it is worth probing behind such announcements to find out if the review board has any teeth, and can they actually influence the governance of the organization or are they just window dressing? When Google famously disbanded its AI Ethics Oversight committee within a week of it being established, that sent a clear message that there was not the level of commitment to an independent oversight board as its original announcement might have suggested (Johnson and Lichfield, 2019). Writing for the Carnegie Council for Ethics in International Affairs, Rosenthal and Wallach (2022) set out a stark perspective on ethics washing: ‘there is a struggle for the ethical high ground. Corporations want to be seen as virtuous – or at least not an enemy of the good.’ In this context, the quest for a ‘tick box’ approach to data ethics needs to be considered. Rosenthal

本书版权归Kogan Page所有

Data ethics: the bigger picture

and Wallach are blunt in their assessment that: ‘The various approaches to ethics should not be reduced to algorithms for determining what is absolutely right and good. Each approach underscores differing considerations that we would like to have factored into good decision-making.’ Therefore, it is important that we ensure individuals, regulators and policymakers have the appropriate toolkits available to them to help them understand the trade-offs and different considerations that need to be factored into good ethical decision making, while at the same time being able to peel back the covers on snake oil and misdirection from ethics washers.

Education on ethics Part of the complexity of this wicked problem is that, much like the biased training data for facial recognition systems or voice assistants, the model through which much of our ethical discourse in the data management profession has been shaped has been largely trained on the writings and teachings of philosophers who tend to be white, western and at least middle class in the perspectives they bring. This is not a criticism but does describe the problem we face. For example, the focus on individualism and individual rights that underpins much of Western deontological or consequentialist ethics may serve to constrain our choices and debates around what the right things to do are from an ethical perspective. The feminist ethic of care or the collective and social values of Ubuntu may provide us with alternative perspectives that unlock the debate and reframe the alignment between the ethic of the organization, the ethic of society and the ethic of the individual. Does this mean that every data management professional needs to attain a doctorate in philosophy in order to make sensible decisions? It does not. The summaries provided in Chapter 2 of this book provide ample food for thought and any self-directed learner who wants to find out more is free to explore the extensive references and recommended reading. But it does require sufficient grounding in ethics as a discipline to know that there are different schools of thought and that there are cultural differences in ethical approaches that may need to be considered in the design of any solution or system. Ultimately, while it would make life infinitely simpler if there was a simple universal ethics subroutine we could call upon to normalize and standardize all aspects of data ethics and regulation, sadly this is not the case. Humanity has spent most of the last few thousand years struggling with dif-

本书版权归Kogan Page所有

361

362

Data Ethics

ferent value systems and ways of perceiving and understanding the world. It is unlikely the data management profession (who struggle with definitions of simple concepts like ‘customer’) or researchers in computer science and AI (who regularly publish peer reviewed papers based on theories from 19th and early 20th century social sciences which have been long since thoroughly discredited), will solve this riddle any time soon. However, as Rosenthal and Wallach (2022) put it: ‘A re-envisioning of ethics should center around its function as a tool for helping make difficult decisions where values, needs, and goals conflict.’

Conclusion For a variety of reasons, the challenge of data ethics meets many if not all of the criteria for being a wicked problem. Tackling this challenge from a policy and regulatory perspective will require, first and foremost, an investment in education and awareness-building for a variety of stakeholders, from the general public to the executive leadership of organizations, and from the data professional to the elected legislator. Any one simple solution to a wicked problem is inevitably wrong. Therefore it is important to engender a robust interdisciplinary approach to the ethical issues raised by the uses of data, and have and develop engaged legislators and regulators who will seek to educate themselves about the realities of data and data-related technologies and the ethical issues, risks and opportunities that can arise. Tools such as regulatory sandboxes provide an imperfect but valuable approach to effectively prototyping the impacts of innovative processing to assess the ethical and regulatory impacts that might arise. To develop a robust data acumen in organizations and in society, there will need to be appropriate cooperation and collaboration between academia, industry and independent think tanks. Much of this work has already started but it will be essential from a policy perspective that academia is appropriately funded to be able to support the development of data acumen in society as much as it has been funded to support the development of machine learning and artificial intelligence applications in society. The last word is left to the Digital Ethics Expert Group of the Scottish Government (Digital Ethics Expert Group, 2022): Education, awareness and regulation will be the key tools to help foster a sustainable digital society.

本书版权归Kogan Page所有

Data ethics: the bigger picture

Chapter summary In this chapter, we have looked at the adoption of data processing technologies, from the punch card at the dawn of the modern Information Age to the latest advances in AI and machine learning. ●●

●●

●●

We have discussed how advances in technology represent, at their core, social and societal changes. We have looked at the crucial importance of broad-based digital education and data competencies development for individuals, organizations, legislators and regulators in the ethical dimension of these social and societal changes. We have discussed examples of wicked problems, including countering bias in data and data-driven outcomes, ensuring informed discussion and debate about new technologies, and countering disinformation of all kinds, including ethics washing.

Note 1 At the time of writing (November 2022), the output report from this Symposium was not available as it happened two days before writing on this chapter was finalized. The comments here are based on Daragh’s notes as a participant, and the outputs will be published on the Empower website in due course. https://empower-datagovernance.ie

References Cohen, S (1972) Folk Devils and Moral Panics, Routledge, Abingdon Conklin, J (2005) Dialogue Mapping: Building shared understanding of wicked problems, Wiley, Chichester Datatilsynet (nd) Sandbox for responsible artificial intelligence, www.datatilsynet. no/en/regulations-and-tools/sandbox-for-artificial-intelligence/ (archived at https://perma.cc/2PRM-VAH7) Digital Ethics Expert Group (2022) Building Trust in the Digital Era: Achieving Scotland’s aspirations as an ethical digital nation, Scottish Government, November, www.gov.scot/publications/building-trust-digital-era-achievingscotlands-aspirations-ethical-digital-nation/documents/ (archived at https:// perma.cc/ME85-24NP)

本书版权归Kogan Page所有

363

364

Data Ethics Duff, S (2019) A growing trend in financial regulation: Thematic sandboxes, CGAP, 14 February, www.cgap.org/blog/growing-trend-financial-regulation-thematicsandboxes (archived at https://perma.cc/R2EQ-SWKQ) Floridi, L and Taddeo, M (2016) What is data ethics? Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 374 (2083), doi.org/10.1098/rsta.2016.0360 (archived at https://perma.cc/ULH5F9R7) Johnson, B and Lichfield, G (2019) Hey Google, sorry you lost your ethics council, so we made one for you, MIT Technology Review, 6 April, www.technologyreview. com/2019/04/06/65905/google-cancels-ateac-ai-ethics-council-what-next/ (archived at https://perma.cc/WB9L-M96G) Keller, S and Shipp, S (2021) Data acumen in action, Notices of the American Mathematical Society, 68 (9), 1468–77 Keller, S, Shipp, S S, Schroeder, A D and Korkmaz, G (2020) Doing data science: A framework and case study, Harvard Data Science Review, 2 (1), doi.org/10.1162/99608f92.2d83f7f5 (archived at https://perma.cc/983E-PLX8) Law et al (2018) A Global Framework of Reference on Digital Literacy Skills for Indicator 4.4.2, UNESCO Institute for Statistics, June, uis.unesco.org/sites/ default/files/documents/ip51-global-framework-reference-digital-literacy-skills2018-en.pdf (archived at https://perma.cc/2SUD-74A4) ODI (2020) Data Skills Framework, Open Data Institute, 4 May, theodi.org/article/ data-skills-framework/#1561999285194-8defa99a-39a52584-8cfe (archived at https://perma.cc/4VYG-TSU8) ODI (2022) Data Ethics Maturity Model: benchmarking your approach to data ethics, Open Data Institute, 28 March, theodi.org/article/data-ethics-maturitymodel-benchmarking-your-approach-to-data-ethics/ (archived at https://perma. cc/6NTT-R467) Panetta, K (2021) A data and analytics leader’s guide to data literacy, Gartner, 26 August, www.gartner.com/smarterwithgartner/a-data-and-analytics-​leadersguide-to-data-literacy (archived at https://perma.cc/A38R-JLKE) Quan, D (nd) A few thoughts on regulatory sandboxes, Stanford Center on Philanthropy and Civil Society, pacscenter.stanford.edu/a-few-thoughts-onregulatory-sandboxes/ (archived at https://perma.cc/DAD6-MST3) Redman, T C (2018) If your data is bad, your machine learning tools are useless, Harvard Business Review, 2 April, hbr.org/2018/04/if-your-data-is-bad-yourmachine-learning-tools-are-useless (archived at https://perma.cc/V8JA-GWLG) Rosenthal, J H and Wallach, W (2022) Ethics as we know it is gone. It’s time for ethics re-envisioned, Carnegie Council for Ethics in International Affairs, 13 May, www.carnegiecouncil.org/media/series/presidents-desk/ethics-reenvisioned (archived at https://perma.cc/6AZY-UFEA) Sinclair, U (1994) I, Candidate for Governor: And how I got licked, reprint, University of California Press, Berkeley and Los Angeles, CA

本书版权归Kogan Page所有

Data ethics: the bigger picture UNESCO (2021) Recommendation on the Ethics of Artificial Intelligence, 23 November, www.unesco.org/en/legal-affairs/recommendation-ethics-artificialintelligence (archived at https://perma.cc/78SG-EKZN) Vuorikari, R, Kluzer, S and Punie, Y (2022) DigComp 2.2: The Digital Competence Framework for Citizens – With new examples of knowledge, skills and attitudes, Publications Office of the European Union, Luxembourg, publications.jrc.ec.europa.eu/repository/handle/JRC128415 (archived at https:// perma.cc/58CY-4TFV)

本书版权归Kogan Page所有

365

366

And in conclusion… In 2017, when we were invited to write the first edition of this book, there was a relatively sparse field of references to choose from and the issues of ethics applied to data were still more often than not seen as the purview of academics and activists, often in isolation from each other. However, there was a growing awareness of the need for more ethical approaches to data management and the development of better ways of managing the ethical trade-offs that arise even when trying to use data for social benefit. As we wrote in the conclusion to the first edition: At a macro level, 2017 has seen a litany of issues come to the mainstream about how data is being processed by social media companies, and there is a growing concern about the potential impacts on people of the privacy-infringing technologies that have been developed to catalogue and index the minutiae of our daily lives. But on the other hand, the same core technologies can be applied in different ways and deliver benefit to people and society through the delivery of capabilities such as crop management... (O’Keefe and O Brien, 2018)

The moral panic of 2017 and 2018 has moved relatively quickly to the point where authorities worldwide are beginning to legislate and regulate for the ethics of AI. And in doing so we have begun to see that this is a wicked problem that requires many strands of a solution to be woven, not least the need to recognize differences in ethical and cultural frames that influence people and societies, and the fact that it can be difficult to regulate a fog. Where we had a handful of references in 2017, people at the beginning of their journey into the ethics of data management and the ethics of artificial intelligence today are faced with the opposite challenge: information overload arising from the multitude of governmental, NGO and other frameworks for ethics in data that have emerged over the past five years.

本书版权归Kogan Page所有

And in conclusion

Within this we would raise a note of concern: the focus on the ‘shiny’ world of artificial intelligence and machine learning means that the data ethics world risks falling into the same trap as has befallen other data management fields such as data quality or data governance. Writing in 2020, Tom Redman and John Ladley berated the data management profession for having failed. In their call-to-action piece for industry online publication Dataversity, they wrote: We have taken first steps, securing beachheads in quality and governance. We’ve created the foundations, and specified ‘the who’ and ‘the how.’ We’ve proven these really work and we’ve published the case studies in places like Harvard Business Review and Sloan Management Review, on company sites, and in industry forums. Despite this progress, too few enjoy the enormous benefits of high-quality data or the oversight that governance is intended to provide. We’ve not yet gotten our inter-related and required disciplines into mainstream business practice. It is time to get off the beach and move inland. (Redman and Ladley, 2020)

The focus on the ethics of artificial intelligence risks is obscuring the need for appropriate ethics in the management and processing of all data. But if we ignore this, we do ourselves – and the potential benefits of machine learning – a significant disservice. After all, today’s inventory data is tomorrow’s predictive model for your supply chain process. Successful and sustainable AI processes that serve and benefit society cannot be built on lowquality, poorly managed and questionably obtained data. Redman and Ladley’s admonition of the data management profession is relevant to those of us seeking to promote the adoption of ethical data management practices. They advise removing technology from the conversation and ensuring that there is clarity on the strategy, the organization structures and the processes. The same is true of data ethics. This is not something you can buy in a shrink-wrapped software package. It requires organizations to consider what they want to use data for (their strategy), what their values and principles are, and what organization structures they will put in place to ensure that they can deliver consistently to those ideals. We need blueprints (architecture) and stakeholder engagement to help develop the ethical foundations for data management in our organizations. Finally, Redman and Ladley called on data professionals to focus on the outcomes and to avoid creating abstract artefacts. This is equally applicable to data ethics professionals. We need to ensure that the principles that we

本书版权归Kogan Page所有

367

368

And in conclusion

create are translated into actionable policies and procedures. We need to ensure that the oversight and steering committees that are created have actual clout and teeth. We need to ensure that the education of society and of staff in organizations on data ethics topics is relevant to their roles, grounded in clear principles, and enables broad-based ethical actions at the social and at the organization level. And, we need to ensure that ‘ethics’ is not simply a shiny clean-looking veneer covering extractive and exploitative practices. This means we need to do solid work on developing a language for data ethics in our organizations and helping the organization identify its bedrock data principles. It means doing solid work to put in place real oversight and governance, not debating the abstract epistemological concepts of ethics. This means broadening our frame of understanding of what ethics is to include perspectives from other cultures and different societal perspectives. Data ethics is in the Harvard Business Review and the Sloan Management Review. It is discussed at industry forums. We now need to join with our data management cousins to get our interrelated and required disciplines into mainstream business practice. As we wrote in the conclusion to the first edition of this book: We have been here before, and we will be here again. Rather than considering data ethics to be a radically new concept, you need to learn the lessons of the data quality and data governance communities. There are fundamental concepts and principles that we can apply to framing and addressing these problems, in the same way as information quality stood on the shoulders of manufacturing quality and data governance stands on the shoulders of frameworks and practices for governing other asset classes in the organization, you need to understand ethical concepts and principles and understand how to translate them into actionable values and operative models in your organization.

As we finish writing this edition, we can see a case study in data management and data ethics playing out in the acquisition of the social media site Twitter by Elon Musk. On one hand, we might question the ethics of decisions he has taken since acquiring the platform, which have included mass firings, often in breach of local labour laws in the countries Twitter operates in. However, a significant consequence has been a spike in the user base of alternative social networks such as Mastodon (Delouya, 2022). Mastodon operates differently and, due to its federated structure, does not have a centralized administration function or a ‘one-size-fits-all’ set of ethical values. Each set of server administrators can apply their own standards. And

本书版权归Kogan Page所有

And in conclusion

within the wider federated universe of servers, bad actors can be blocked at the individual level or at the level of the server they post from. It also operates on a crowdfunded model rather than an advertising-funded model, with users contributing to the running costs of servers, and volunteers taking on administration and content moderation duties. There is also no algorithm filtering content and promoting content. As users migrate from Twitter however, the ethic of society within the Mastodon community may change. There has been an extensive effort by long-standing Mastodon users to provide education and support for people migrating over from Twitter to help them understand the cultural norms that have developed in the Mastodon communities since the platform became available in 2016. However, some keen observers of sociotechnical systems have been challenging assumptions underlying dominant ‘ethics of society’ in the ‘Fediverse’ and demonstrating problems that the technical solutions in the federated structure are not fit to address. While Elon Musk’s business decisions have decimated the moderation and compliance teams tasked with people’s safety on Twitter, data ethicists such as Sasha CostanzaChock have pointed out that the standard of relying on volunteer labour for moderation on Mastodon instances is unsustainable, and that the ‘Fediverse’ will need to develop infrastructure and governance processes to meet the challenges of mass adoption and to address the potential harms at a human level, not simply looking for technical solutions to social problems (CostanzaChock, 2022). It is early days, but perhaps the practical level and public nature of these conversations may signal a new stage of maturity in our approaches to the ethics of data has begun to take hold as individuals seek to collectively establish some new social norms and behaviours, and to consider the governance and structures needed to support them. We will have to wait and see. It is difficult to make predictions from chaos, but one constant is that every new development in the way we use data will uncover ethical questions on how the data may be used and how we can mitigate the risks of harm and promote human flourishing with that data.

References Costanza-Chock, S (2022) @[email protected], Mastodon, 21 November, mastodon.lol/@schock/109383950563020172 (archived at https://perma.cc/ S8EP-S25V)

本书版权归Kogan Page所有

369

370

And in conclusion Delouya, S (2022) Elon Musk’s takeover of Twitter has translated into huge user growth – for upstart social media platforms like Mastodon and Tumblr, according to new data, Insider, 12 November, www.businessinsider.com/ elon-musk-twitter-takeover-user-growth-rivals-mastodon-tumblr-2022-11 (archived at https://perma.cc/477G-FZZS) O’Keefe, K and O Brien, D (2018) Ethical Data and Information Management: Concepts, tools and methods, Kogan Page, London Redman, D and Ladley, J (2020) Data management has failed! And presented us a historic opportunity, Dataversity, 18 May, www.dataversity.net/data-­ management-has-failed-and-presented-us-an-historic-opportunity/ (archived at https://perma.cc/QLQ7-TZH2)

本书版权归Kogan Page所有

371

INDEX NB: page numbers in italic indicate figures or tables 3DC framework  148–49, 150 simplified  285 ADAPT Centre for Digital Content Technology 342 Ethics Canvas  343 ad blockers  8 Addams, Jane  59–60, 90, 124, 244 ‘affect labelling’  114 African Charter on Human and Peoples’ Rights  54 Age of Surveillance Capitalism, The  69 Agile 273–74 Algorithm Watch  85, 86, 86, 112 Amazon 69 AWS 129 operational analytics on  161 Amsterdam Information Model  205–07, 215 Apple 181 ethical information governance  279–80 iPhone  3, 110 FBI access to  184–85, 194 stewardship 287 VPN networks in China  183–85, 194, 196 Aristotle  50, 51, 85 Article 29 Working Party  124, 127, 262, 323 see also European Data Protection Board (EDPB) artificial intelligence (AI)  5, 158–64 AI Ethics by Design  320–21, 321 AI Regulation, proposed  2, 164 Artificial Intelligence Act  321 and bias  153, 163–64 carbon cost of  30–31 and the data life cycle  161–62 ethical frameworks for  84, 102–03 development of  84 enforcement of  85, 86 societal vs organizational ethics  85

本书版权归Kogan Page所有

Guidelines for Ethical AI  70 OpenAI 164 and science fiction  140–41 technologies and tools  160–61 Asimov, Isaac  292 Bara case  218–19 Belmont Report  11, 55, 296 Benn, Stanley I  27 Berners-Lee, Tim  12 big data  5, 25, 110, 159, 221–25, 235 and bias  163–64 carbon cost of  30 EDPS vision  41, 41, 221, 221–25 in education  112–16 and the electoral process  116–21 Birhane, Abeba  62, 63, 69, 86 Bluetooth 36 Boulamwini, Joy  126 Brexit referendum, 2016  10, 118, 120 Bridges, William  303–05, 307, 310 Bunge, Mario  25, 41 business intelligence  109, 115, 117, 156–58, 193 Business Model Canvas  343 Buttarelli, Giovanni  41, 70, 110, 224 Cˇapek, Karel  292 carbon costs of data processing 29–35 AI technologies  30–31 data centres  31–32 mitigating carbon tracking  32 data efficiency  33 data minimization  33 renewable energy  33–34 Carbon Literacy Project  32 care ethics  60–62 Carmille, René  142, 143–44, 166–67 case law, impact of  97–100 categorical imperative, the  52 see also Kant, Immanuel Cavoukian, Ann  319 CCTV  13–14, 57

372

Index change management  301–10 defining 301–02 failure, avoiding  302, 303, 307–10 communication 309 complacency 307 corporate culture  310 ‘guiding coalition’, your  307–08 roadblocks 309 short-term wins  309–10 time, taking  310 vision 308 transitions, managing  303–06, 304 Charter of Fundamental Rights  55, 97, 100, 102, 122, 324 chatbots  163, 193 ChatGPT 164 Citibank 146 Clinton, Hillary see US presidential election, 2016 cloud computing  15, 31, 33, 189 cognitive bias  119 Cohen, Stanley  348 ‘common good’ see ‘social justice’ Confucius 50 consequentialist ethics  56–57, 361 contractualism 55 Corbyn, Jeremy  118 Costanza-Chock, Sasha  369 Course Signals  112–13 Covid-19 pandemic  3, 68, 71, 114, 125, 127, 185 CrowdTangle 250 DAMA International  109, 142 see also Data Management Body of Knowledge (DMBOK) data acumen  164, 352, 355, 357, 358, 362 data analytics  108–32 access to  129–30 automated remote proctoring  125–27 balancing tests  127–29, 128 and consent  121 defining 109 and privacy  121–29 acquisition 122 action 124–25 analysis 123–24 and regulatory reporting  130–32 and ‘tone at the top’  110–12, 113, 120, 130, 131 unstructured 161 see also big data data characteristics, ethical  259–63 ‘data citizens’  157

本书版权归Kogan Page所有

data colonialism  66–69 data dashboards  3 ‘data-driven dilemma’, the  11–12 Data Ethics Canvas  343, 358 Data Ethics Framework UK 91–93, 92 US 93–94, 94 ‘data exhaust’, the  11 data governance  144–49 3DC framework  148–49, 150 accountability and stewardship  148–49, 283–91, 285 ‘ethic of the individual’  286, 288–91, 289 data review boards  295–96 defining 145 and ethics  271–73, 274 framework, building a  299–301, 301 key tasks in  147–48 maturity models for  296–99 and ethics  298–99 modes of  273, 274 principles in candidate principles, formulating  281–82 in DMBOK  277 principles to outcomes  282 Seiner principles  280–81 risk perception in  294–95 separation of duties  147, 147, 294, 328 storytelling in  292–93 ‘data lakehouse’  156 data life cycle  120, 122, 157–58 and artificial intelligence (AI)  161–62 data literacy  164–65, 351–55 data management  141–44 defining 142 ‘DMBOK Evolved Wheel’  142, 143 Data Management Body of Knowledge (DMBOK)  109, 110, 156 data governance principles  275, 276, 277 data policy  88 data-management maturity  297 ‘DMBOK Evolved Wheel’  142, 143 stewardship  283, 284 ‘data mesh’  156 data minimization  33 data mining  160 data modelling  153–56, 154 conceptual 154 logical 154 physical 154 Data Protection Directive  12

Index Data Protection Impact Assessments (DPIAs)  242, 323–24 data quality  115, 250–51 data quality management  149, 151–53 and bias  153 causes of poor quality data  151 data profiling  151 dimensions of  253 Ten Steps to Quality Data and Trusted Information  252, 258 mapped to E2IM  255–56, 257 data review boards  295–96 ‘data science’  5, 108, 112, 129 data visualization  161 data warehousing  109, 115, 116, 117, 156–58 Dauenhauer-Pendley, Lizza  68 Declaration of Independence  54 deep learning  6, 30, 131 Dehaye, Paul-Olivier  119 Deming, W Edwards  152, 231 ‘7 deadly diseases of management’  58, 232, 239, 240, 246, 264 14 points for transformation  235, 236–38, 246, 292 Deming cycle see Plan-Do-Study-Act (PDSA) cycle ‘Motivation for Quality’ questions  242 quality, defining  233 ‘special causes’ and ‘common causes’ 244–45 ‘theory of knowledge’  193, 245, 352 Dennedy, Michelle  322, 324 Denning, Stephen  293 deontological ethics  52–55, 56, 361 Descartes, Rene  62 ‘Design Justice’  63 Devlin, Barry  156 Digital Competency Framework  353, 354 digital waste  29 E2IM framework see Ethical Enterprise Information Management (E2IM) framework electronic waste (e-waste)  29 ‘emotion recognition’  114 environment, data ethics and  27–32, 263 episteme  85–86, 90, 350 ‘ethical algorithm’, your  49 ethical architecture see Zachman Framework for Enterprise Architecture ‘ethical debt’  71–72, 320

本书版权归Kogan Page所有

Ethical Enterprise Information Management (E2IM) framework  215, 231, 259, 316, 359 Amsterdam Information Model  205–07, 215 big data, EDPS vision for  221, 221–25 Castlebridge Model  206, 207 and change management  302 data governance in  270, 270–71 ethical impact assessment model  325–43, 329, 330 ethical information engineering process, the  325 ‘ethic of society’, the  213, 215 ‘ethic of the individual’  289, 291 ‘ethic of the organization’  213, 215 Henderson and Venkatraman model  204, 205 mapped to the Ten Steps  255–56 ‘special causes’ and ‘common causes’ 244–45 Ethical Guidelines for Trustworthy AI 102 ethical impact assessments (EIAs)  325–43, 329, 330 design principles  326–27 process steps business need  328, 331–32, 333 communication 341–42 environment, assessing the  333–36, 334 improvement planning  340–41 quality of information privacy, assessing the  336–37 root-cause analysis  337–40 research projects into  342–43 Ethics Canvas  343 ODI Data Ethics Canvas  343, 358 ‘ethic of society’, the  72–73, 73, 91, 177 and data governance  273, 287 education for  359–60 in ethical frameworks  213, 215 translation to organizational ethics  85, 88, 95 ‘ethic of the individual’  73, 74–75, 177 and data governance  286, 288–91, 289 education for  356–57 ‘ethic of the organization’  73, 73–74 architecting for  177–78 and data governance  272–73, 287 education for  357–58 in ethical frameworks  213, 215

373

374

Index Ethics by Design  320–21, 321 ‘ethics washing’  31, 34, 70–71 mitigating 360–61 European Convention on Human Rights  27, 54 European Court of Human Rights  54 European Data Protection Board (EDPB)  99, 127, 262, 323, 332 European Data Protection Supervisor (EDPS)  9, 40, 221–22 ‘big data ethics’  41, 41 eye contact  114 Facebook  209, 231, 307 analytics 123 and Deming’s principles  246–50 in the electoral process  117, 118, 119, 120, 217 ‘fake news’ on  217, 244, 272, 287–88 governance 272 promoted posts  243–44 Rohyngya, genocide of  249 suicidal intent, monitoring for 124–25 WhatsApp, acquisition of  4 Factory Acts  10 Fair Information Practices  122 ‘fake news’  217, 247, 248, 272, 287, 307 Feldman, Steven  210, 216, 222 Fiesler, Casey and Garrett, Natalie  71, 72 Fifth Discipline, The  303 ‘filter bubbles’  118, 119, 209, 246–47, 248, 259–60, 272 Financial Conduct Authority  359 first principles, of data ethics  35–36, 235 scenarios, example  36–40 fishbone diagrams  338, 339, 339 fitness trackers  4, 5, 6 ‘five whys’ analysis  338–39 Ford, Henry  231 Ford Motor Company  8 Friedman doctrine, the  57 Fuller, Buckminster  29 Gebru, Timnit  126 General Data Protection Regulation (GDPR)  54–55, 95, 99, 336 codes of conduct  99 and company values  96 data acquisition  122 data governance  146 Data Protection Impact Assessments (DPIAs) 323

本书版权归Kogan Page所有

and the electoral process  121 ‘legitimate interests of the data controller’ 12 risk management focus  121, 295, 321 ‘segregation of duties’ (SOD)  294 ‘serving mankind’  13, 25 Generally Accepted Accounting Principles (GAAP)  82, 82–83, 85 Gilligan, Carol  60–61 Google  3, 54, 69, 159, 181 AI Ethics Oversight committee 360 Bard 164 in the electoral process  117 ‘ethics washing’  31 Google Glass  4 legislation, lobbying on  196–97 Guidelines for Ethical AI  70 Gurrin, Cathal  51–52 Haque, Umair  232 Haughen, Frances  248, 249–50 Hay, David  177, 187 Heidegger, Martin  24, 25, 146 Held, Virginia  61 Higgins, Michael D  90 High-Level Expert Group on AI  99 Hobbes, Thomas  55, 64 Horvath, Jane  279 human right, privacy as a  26–27, 35 Hutcheson, Francis  259 ‘illusion of memory’, the  23–24 individual ethics see ‘ethic of the individual’ industry standards  100–02 information quality, defining  250, 250–51 ‘innovator’s dilemma’, the  12–13 Instagram 209 Institute of Electrical and Electronics Engineers Standards Association (IEEE)  13, 235 International Automotive Task Force (IATF) 28 International Financial Reporting Standards 82 International Organization for Standardization (ISO)  28, 235 ISO 9001  234 ISO 9004  234 ISO 20121:2012  283 ISO 26000:2010  100–01, 103 ISO 31000  294 ISO 37301:2021  100, 101–02

Index Internet of Things (IoT)  6, 10, 110, 235 Ishikawa, Kaoru  232, 234, 263 Juran Quality Trilogy  316–19, 317, 318, 322, 323 justice ethics see ‘social justice’ Kant, Immanuel  27, 52–53, 64, 258 first formulation  52–53 racism of  66 second formulation  40, 42, 53, 64, 97, 116, 120, 218, 262 Kantrowitz, Alex  247 Kennedy, John F  117 Kiernan, Aoife  31 Kohlberg, Lawrence  29, 60, 61, 288 Kotter, John  307–10 Ladley, John  82, 87, 88, 145, 275, 276 ‘law of unintended consequences’  22 Leading Change  307 legislation, impact of  97–100 ‘legitimate interests’  12, 14 LEGO 27 ‘lifelogging’  4, 7, 326–27, 332, 336 Locke, John  55 machine learning  5–6, 22, 35, 141, 158–64, 367 and bias  49, 63, 122, 163–64 data quality  152, 153 ‘emotion recognition’  114 environmental impact of  31, 33 Maes, Rik  204 Maˉori world views  65–66 Mastodon 368–69 McGilvray, Danette  254, 260, 262, 328 McGovern, Gerry  29 McNamara, Robert  8 Mencius 50 Meta  69, 183, 193, 209 Galactica 163 legislation, lobbying on  196–97 ‘Life Stages’  183 ‘Ray-Ban Stories’  4 see also Facebook Microsoft 71 Azure 129 Tay 163 Mill, John Stuart  56 Moore’s law  30 ‘moral panics’  248–49 Mutiro, Blessing  63

本书版权归Kogan Page所有

natural language processing  5 ‘Neighbour Principle’  331 Nussbaum, Martha  51 Obama, Barack  117 ontology, defining  172–73 OpenAI 164 Open Data Institute (ODI)  164, 357 Data Ethics Canvas  343, 358 Data Ethics Maturity Model  358 Data Skills Framework  355, 355, 356 operational analytics  161 Organisation for Economic Co-operation and Development (OECD) 96 organizational ethics see ‘ethic of the organization’ Osterwalder, Alex  343 Out of the Crisis  232, 235, 242, 245 Pace, Larry  231, 232 ‘Persönlichkeitsrecht’  26–27 Peters, Tom  316 phronesis  85–86, 90 Plan-Do-Study-Act (PDSA) cycle  240–44, 247, 258, 288 Act 244 Do 243 Plan 241–42 Study 243–44 Plato  23, 50, 174 policy, defining  87, 88, 89 predictive analytics  109, 160 prescriptive analytics  160–61 principle, defining  82 components of  88 vs policy  88 Privacy by Design  37, 242, 319, 320, 322, 323, 326 privacy engineering  322, 322–25, 323 Data Protection Impact Assessments (DPIAs)  242, 323–24 privacy impact assessments (PIAs)  221, 242, 323–24, 328 privacy impact assessments (PIAs)  221, 242, 323–24, 328 professional organizations, frameworks for  84, 103 Project SHERPA  342 PROTECT European Training Network 342 psychographic targeting  8–9

375

376

Index ‘quality’, defining  231, 233 ‘Quantified Self’, the  4, 6

stockholder theory see shareholder theory surveillance capitalism  69–70

Rape Crisis Network Ireland  226 Rawls, John  55, 60 Ray-Ban 4 Redman, Tom and Ladley, John  367 regulatory sandboxes  359–60, 362 relational ethics  59–66 care ethics  60–62 non-Western frameworks Maˉori world views  65–66 ubuntu  62, 63–65, 69, 361 rights-based ethics  26–27, 35, 54–55 ‘right to privacy’, the  26 risk management  315–43 data governance  294–95 ethical impact assessment model 325–43 Ethics by Design  320–21, 321 General Data Protection Regulation (GDPR)  121, 295, 321 Juran Quality Trilogy  316–19, 317, 318, 322, 323 Privacy by Design  37, 242, 319, 320, 322, 323, 326 privacy engineering  322, 322–25, 323 Data Protection Impact Assessments (DPIAs)  242, 323–24 privacy impact assessments (PIAs)  221, 242, 323–24, 328 Rohyngya, genocide of  249 Russo-Ukraine War  185

Taiuru, Karaitiana  65, 66 taxonomical approach  87–90 Technology and the Virtues  51 telematics 4 Te Mana Raraunga  66, 69 Ten Steps to Quality Data and Trusted Information  252, 258 text analytics  7 text mining  160 ‘tone at the top’  110–12, 114, 120, 130, 184, 208, 274–75 Trevino, Linda  288, 290–91, 299, 303, 356 Tronto, Joan  61 Trump, Donald see US presidential election, 2016 Tuskegee syphilis experiments  10–11 Twitter  120, 231 Elon Musk, acquisition by  368, 369 Samaritans Radar  7, 124, 183

Samaritans Radar  7, 124, 183 Sánchez-Andrade Nuño, Bruno  129, 130 Sarbanes-Oxley Act  146 Satori project  240, 342 Scanlon, T M  55 Seiner, Robert  276 Senge, Peter  303 sentiment analysis  7, 160 separation of duties  147, 147, 294, 328 shareholder theory  57–58, 178, 288, 295 Shewhart, Walter  240 SIENNA Project  321, 342 Sinclair, Upton  357 Snapchat 4 Soapbox Labs  152 ‘social justice’  55, 178, 233–34, 286, 290, 296 societal ethics see ‘ethic of society’ Socrates 174 stakeholder theory  57, 58, 178, 290, 295

本书版权归Kogan Page所有

ubuntu  62, 63–65, 69, 361 UK Data Ethics Framework  91–93, 92 UNESCO DigComp framework  353, 354 Recommendation on the Ethics of AI 353 UN Global Pulse  3 Universal Declaration of Human Rights  54 US Bill of Rights  54 US Federal Data Strategy Data Ethics Framework 93–94, 94 US Indigenous Data Sovereignty Network 69 US presidential election, 2016  10, 118, 119, 120, 246 Usual Suspects, The  123 utilitarianism  56–57, 218–21 risk-impact analysis  219–20 utility/invasiveness matrix  335–36, 336, 337 Vallor, Shannon  51 value/invasiveness matrix  14 value statements  95–96 van der Sloot, Bart  26 van Maanen, Gijs  86 Vietnam war, the  8 virtual private network (VPN) services  8 in China  183–84, 194, 196 virtue ethics  50–52, 260 Volkswagen  28–29, 108, 131–32, 212

Index Warren, Samuel D and Brandeis, Louis D  26, 27, 41 Warzel, Charlie  246–47, 248, 272 WhatsApp 4 What We Owe to Each Other  55 ‘wicked problem’, data ethics as a  350–51 Young, Peter  209 Zachman Framework for Enterprise Architecture 171–97, 175, 203, 205 ‘allegory of the cave’, the  174, 176 Architect perspective  176, 180, 189–92, 190 ‘architecture’, defining  176 Business manager perspective  180, 185–89, 186

本书版权归Kogan Page所有

Engineer perspective  180, 192–93 Enterprise perspective  180, 194–95 ‘Executive’ perspective  177, 178, 181–85, 182 ‘granularity, issue of’  194–95 implementation challenges  195–97 and the long term  197 Motivation column  178–81, 179, 203, 242 as an ontology  172–73, 197 Technician perspective  180, 193 Zachman, John  172, 197 Zeide, Elana  116 Zoom 71 Zuboff, Shoshana  68, 70 Zuckerberg, Mark  217, 248, 249

377

378

本书版权归Kogan Page所有

THIS PAGE IS INTENTIONALLY LEFT BLANK

本书版权归Kogan Page所有

379

THIS PAGE IS INTENTIONALLY LEFT BLANK

380

本书版权归Kogan Page所有

THIS PAGE IS INTENTIONALLY LEFT BLANK