Abstract
This chapter is dedicated to the wide-ranging ethical implications of Big Data technology in a Digital Society. Exponential growth in the commercial use of the Internet has dramatically increased the volume and scope of data gathered and analyzed by datacentric business organizations. Big Data emerged as a term to summarize both the technical and commercial aspects of this growing data collection and analysis processes. Until now, much discussion of Big Data is focused on its transformational potential for technological innovation and efficiency; however, less attention was given to its ethical implications beyond the generation of commercial value. In this chapter, the authors investigate the wide-ranging ethical implications of Big Data technology. The authors inform that strategies behind Big Data technology require organizational systems, or business ecosystems, that leave them vulnerable to accidents associated with its commercial value and known as data accidents. These data accidents have distinct features and raise important concerns, including about data privacy in the time of the COVID-19 pandemic. In this chapter, the authors suggest methods of successful risk mitigation strategies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
George, G., Haas, M., Pentland, A.: Big data and management. Acad. Manag. J. 57(2), 321–326 (2014)
Lokshina, I.V., Durkin, B.J., Lanting, C.J.M.: Data analysis services related to the IoT and big data: strategic implications and business opportunities for third parties. Int. J. Interdisciplinary Telecommun. Netw. 9(2), 37–56 (2017)
Lokshina, I.V., Lanting, C.J.M., Durkin, B.J.: IoT and big data-driven data analysis services for third parties, strategic implications and business opportunities. Int. J. Soc. Ecol. Sustain. Develop. 9(3), 37–56 (2018)
Lokshina, I.V., Durkin, B.J., Lanting, C.J.M.: The IoT- and big data-driven data analysis services: KM, implications and business opportunities. Int. J. Knowl. Manage. 14(4), 88–107 (2018)
Lokshina, I., Durkin, B., Lanting, C. J. M.: IoT-and big data-driven data analysis services for third parties: business models, new ventures and potential horizons. In: Meghanathan, N. (ed.) Strategic Innovations and Interdisciplinary Perspectives in Telecommunications and Networking, pp. 256–289. (2019a)
Lokshina, I., Gregus, M., Thomas, W.: Application of integrated building information modeling, IoT and blockchain technologies in system design of a smart building. Proc. Comput. Sci. 160, 497–502 (2019)
Lokshina I., Zhong H.: Digital communications and a smart World. In: Kryvinska, N., Greguš, M. (eds.) Data-Centric Business and Applications. Lecture Notes on Data Engineering and Communications Technologies, vol. 20, Springer, Cham (2019)
Lokshina, I., Lanting, C., Durkin, B.: Evaluation of strategic opportunities and resulting business models for SMEs employing IoT in their data-driven ecosystems. In: Jennex, M. (ed.) Knowledge Management, Innovation, and Entrepreneurship in a Changing World. pp. 148–186. (2020)
Lokshina, I.V., Lanting, C.J.M.: Addressing ethical concerns of big data as a prerequisite for a sustainable big data industry. Int. J. Interdisciplinary Telecommun. Netw. 10(3), 34–52 (2018)
Lokshina, I.V., Lanting, C.J.M.: A Qualitative evaluation of IoT-driven eHealth: knowledge management, business models and opportunities, deployment and evolution. In: Proceedings of Hawaii International Conference on System Science (HICSS-51), pp. 4123–4132. Waikoloa, Hawaii (2018b)
Miller, Z.: Former NSA Chief was worried about ‘‘Enemy of The State’’ Reputation| TIME.com (2013). Retrieved from http://swampland.time.com/2013/06/07/formernsa-chief-was-worried-about-enemy-of-the-state-reputation
Jennex, M.E.: Big data, the internet of things, and the revised knowledge pyramid. ACM SIGMIS Database: the DATABASE for Adv. Info. Syst. 48(4), 69–79 (2017)
Marr, B.: Big data: Using SMART Big Data Analytics and Metrics to Make Better Decisions and Improve Performance. Wiley, Chichester, UK (2015)
Molok, N., Chang, S., Ahmad, A.: Information leakage through online social networking: opening the doorway for advanced persistence threats. In: Australian Information Security Management Conference (2012)
Sedayao, J., Bhardwaj, R.: Making big data, privacy, and anonymization work together in the enterprise: experiences and issues. Big Data Congress (2014)
Zaslavsky, A. Perera, C., Georgakopoulos, D.: Sensing as a service and big data. In: Proceedings of International Conference on Advances in Cloud Computing (ACC), pp. 21–29. (2012)
Committee on Commerce, Science, and Transportation.: Committee Announces Paper Hearing on Big Data and the Coronavirus. (Paper hearing titled Enlisting Big Data in the Fight Against Coronavirus on Thursday, April 9, 2020). Press Release (April 2, 2020). Retrieved from https://www.commerce.senate.gov/2020/4/committee-announces-paper-hearing-on-big-data-and-the-coronavirus
Ylijoki, O., Porras, J.: Perspectives to definition of big data: a mapping study and discussion. J. Innov. Manage. 4(1), 69–91 (2016). https://doi.org/10.24840/2183-0606_004.001_0006
Scarpino, S., Petri, G.: On the predictability of infectious disease outbreaks. Nature Commun. 10, 898 (2019)
Hong, W., Thong, J.: Internet privacy concerns: an integrated conceptualization and four empirical studies. MIS Q. 37(1), 275–298 (2013)
Jain, P., Gyanchandani, M., Khare, N.: Big data privacy: a technological perspective and review. J. Big Data 3(25) (2016). https://doi.org/10.1186/s40537-016-0059-y
Lokshina, I.V., Durkin, B.J.: Redesigning the healthcare model to address obesity problem using the integration of processes and mobile technologies: facing a worldwide epidemic in an innovative manner. Wireless Personal Commun. Springer, US 96(4), 5483–5498 (2017)
Lokshina, I.V., Durkin, B.J.: Using wireless and mobile technologies in e-healthcare on a wide scale: the issues and challenges to overcome. Int. J. Serv. Econ. Manage. 8(3), 133–151 (2018)
Lu, R., Zhu, H., Liu, X., Liu, J., Shao, J.: Toward efficient and privacy-preserving computing in big data era. IEEE Netw 28(1), 46–50 (2014)
Abdullah, N., Håkansson, A., Moradian, E.: Blockchain based approach to enhance big data authentication in distributed environment. In: International Conference on Ubiquitous and Future Networks. ICUFN, pp. 887–892. (2017)
Bambauer, D.: Ghost in the network. Univer. Pennsylvania Law Rev. 162(5), 1050 (2014)
Jacobs, A.: Pathologies of big data. ACM Queue 7(6) (2009)
Perera, C., Ranjan, R., Wang, L., Khan, S., Zomaya, A.: Big data privacy in the internet of things era. IT Professional 17(3), 32–39 (2015). https://doi.org/10.1109/MITP.2015.34
Fink, M., Harms, R., Hatak, I.: Nanotechnology and ethics: the role of regulation versus self-commitment in shaping researchers’ behavior. J. Bus. Ethics 109(4), 569–581 (2012)
Bateman, C., Valentine, S., Rittenburg, T.: Ethical decision making in a peer-to-peer file sharing situation: the role of moral absolutes and social consensus. J. Bus. Ethics 115(2), 229–240 (2013)
Witte, D.: Privacy deleted: is it too late to protect our privacy online? J. Internet Law 18(1), 1–28 (2013)
Nunan, D., Di Domenico, M.: Big data: a normal accident waiting to happen? J. Business Ethics 145, 481–491 (2017). https://doi.org/10.1007/s10551-015-2904-x
Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C., Byers, A.: Big data: The next frontier for innovation, competition, and productivity (2011). Retrieved from http://www.mckinsey.com/Insights/MGI/Research/Technology_and_Innovation/Big_data_The_next_frontier_for_innovation
Schlegelmilch, B., Oberseder, M.: Half a century of marketing ethics: shifting perspectives and emerging trends. J. Business Ethics 93(1), 1–19 (2010)
De George, R.: The Ethics of Information Technology and Business. Blackwell Publishing, Oxford, UK (2003)
Likhterman, S., Lokshina, I., Batugina, N.: The use of fuzzy models to estimate stability of mine constructions. In: Martens P.N. (ed.) Roof-bolting in Mining , ABRW Band 15, pp. 433-443. (1998)
Perrow, C.: Normal accident at three-mile Island. Society 18(5), 17–26 (1981)
Perrow, C.: Normal Accidents: Living with High Risk Technologies. Basic Books, New York (1984)
Perrow, C.: Normal Accidents: Living with High Risk Technologies, 2nd edn. Princeton University Press, New Jersey (1999)
Perrow, C.: Disasters evermore? reducing our vulnerabilities to natural, industrial, and terrorist disasters. Social Res: An Int Quarter 75(3), 733–752 (2008)
Perrow, C.: What’s needed is application, not reconciliation: a response to Shrivastava Sonpar and Pazzaglia. Hum. Relat. 62, 1391 (2009)
Pidgeon, N.: Retrospect: normal accidents. Nature 477(7365), 404–405 (2011)
Lokshina, I.V., Insinga, R.C.: Decision support system for ventilation operator based on fuzzy methods applied to identification and processing of gas-dynamic images. J. Electr. Eng. 54(9–10), 277–280 (2003)
Lokshina, I.V.: Intellectual support of investment decisions based on a clustering of the correlation graph of securities. WSEAS Trans. Syst. 1(2), 284–290 (2002)
Lokshina, I.V.: Expert system based on the fuzzy diagnostic model to support coal mine ventilation operator’s decisions. In: Grmela, A., Mastorakis, N. (eds) Advances in Intelligent Systems, Fuzzy Systems, Evolutionary Computation. pp. 118–122. WSEAS Press (2001)
Helmreich, R.: Managing human error in aviation. Sci. Am. 276(5), 62 (1997)
Dain, S.: Normal accidents: human error and medical equipment design. The Heart Surgery Forum#2002–180891, 5(3), 254–257 (2002). Retrieved from www.hsforum.com/vol5/issue3/2002-180891.html
Palmer, D., Maher, M.: A normal accident analysis of the mortgage meltdown. Res. Sociol. Organ. 30, 219–256 (2010)
Rosenthal, C.: Big data in the age of the telegraph (2014). Retrieved from http://www.mckinsey.com/insights/organization/big_data_in_the_age_of_the_telegraph
Kuechler, W.: Business applications of unstructured text. Commun. ACM 50(10), 86–93 (2007)
HM Government.: UK data capability strategy: seizing the data opportunity—Publications—GOV.UK (2013). Retrieved from https://www.gov.uk/government/publications/ukdata-capability-strategy
Hurwitz, J.: The Making of a (Big Data) President. Businessweek.com (2012). Retrieved from http://www.businessweek.com/articles/2012-11-14/the-making-of-a-big-datapresident
Kaczor, S., Kryvinska, N.: It is all about services—fundamentals. Drivers and Bus. Models The Soc. Serv. Sci. J. Serv. Sci. Res. Springer 5(2), 125–154 (2013)
Kryvinska, N.: Building consistent formal specification for the service enterprise agility foundation. Soc. Serv. Sci. J. Serv. Sci. Res. Springer 4(2), 235–269 (2012)
Molnár, E., Molnár, R., Kryvinska, N., Greguš, M.: Web intelligence in practice. Soc. Service Sci. J. Service Sci. Res. Springer 6(1), 49–172 (2014)
Marcus, G.: The web gets smarter. The New Yorker (2012). Retrieved from http://www.newyorker.com/culture/culturedesk/the-web-gets-smarter
Groves, P., Kayyali, B., Knott, D., Van Kuiken, S.: The “Big Data” Revolution in Healthcare. Center for US Health System Reform, McKinsey & Company, Accelerating value and innovation (2013)
Mayer-Schonberger, V., Cukier, K.: Big data: a revolution that will transform how we live, work, and think. Houghton Mifflin Harcourt, Boston, MA (2013)
McAffee, A., Brynjolfsson, E.: Big data: the management revolution. Harvard Bus. Rev. 90(10), 60–68 (2012)
Boyd, D., Crawford, K.: Critical questions for big data: provocations for a cultural, technological, and scholarly phenomenon. Info. Commun. Soc. 15(5), 662–679 (2012)
Warren, S., Brandeis, L.: The right to privacy. Harvard Law Rev IV 5, 193–220 (1890)
Zuboff, S.: In the Age of the Smart Machine: Machine: The Future of Work and Power. Basic Books, NY (1988)
Mundie, C.: Privacy pragmatism. Foreign Affairs 93(2), 28–38 (2014)
Diamond, J.: In: Guns Germs and Steel: The Fate of Human Societies. W. W. Norton & Company (1997)
Lindenbaum, S.: Kuru, prions, and human affairs: thinking about epidemics. Annu. Rev. Anthropol. 30, 363–85 (2001)
Wheeler, N.: Tracing outbreaks with machine learning. Nature Rev Microbiol 17, 269 (2019). https://doi.org/10.1038/s41579-019-0153-1
Bates, M.: Tracking disease: digital epidemiology offers new promise in predicting outbreaks. IEEE Pulse 8(1), 18–22 (2017)
GSMA.: GSMA guidelines on the protection of privacy in the use of mobile phone data for responding to the Ebola outbreak (October 2014). Retrieved from https://www.gsma.com/mobilefordevelopment/wp-content/uploads/2014/11/GSMA-Guidelines-on-protecting-privacy-in-the-use-of-mobile-phone-data-for-responding-to-the-Ebola-outbreak-October-2014.pdf
The Economist.: To curb covid-19. China is using its high-tech surveillance tools. Non-state firms are best equipped to track people’s movements and contacts (2020). https://www.economist.com/china/2020/02/29/to-curb-covid-19-china-is-using-its-high-tech-surveillance-tools
Mozur, P., Zhong, R., Krolik, A.: In Coronavirus fight, China gives citizens a color code, with red flags. The New York Times (March 1, 2020). Retrieved from https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html
European Commission (n.d.) 2018 Reform of EU data protection rules (2018). Retrieved from https://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_en#background
European Data Protection Board.: Statement by the EDPB Chair on the processing of personal data in the context of the COVID-19 outbreak (March 16, 2020). Retrieved from https://edpb.europa.eu/news/news/2020/statement-edpb-chair-processing-personal-data-context-covid-19-outbreak_en
Proposal for a Regulation of the European Parliament and of the Council, European Commission (2012). Retrieved from http://ec.europa.eu/digital-agenda/en/news/proposal-regulation-european-parliament-and-council-establishing-connecting-europe-facility
Ward, P.: Improving access to, use of, and outcomes from public health programs: the importance of building and maintaining trust with patients/clients. Frontiers Public Health 5, 22 (2017). https://doi.org/10.3389/fpubh.2017.00022
OECD.: Government at a Glance (2019). Retrieved from https://www.oecd.org/gov/government-at-a-glance-22214399.htm
Wang, C., Ng, C., Brook, R. (2020). Digital smartphone tracking for COVID-19—balancing public health and civil liberties. JAMA. Retrieved from https://jamanetwork.com/journals/jama/fullarticle/2762689
Heilbroner, R.: Do machines make history? Technol. Culture 8(3), 335–345 (1967)
Coates, J.: Computers and business? a case of ethical overload. J. Bus. Ethics 1(3), 239–248 (1982)
Anjaria, K., Mishra, A.: Information leakage analysis of software: how to make it useful to IT industries? Future Comput. Info. J. 2(1), 10–18 (2017). https://doi.org/10.1016/j.fcij.2017.04.002
Leveson, N.: Engineering a Safer World. MIT Press, Systems Thinking Applied to Safety (2016)
Leveson, N., Dulac, N., Marais, K., Carroll, J.: Moving beyond normal accidents and high reliability organizations: a systems approach to safety in complex systems. Organiz. Stud. 30(2–3), 227–249 (2009)
Shrivastava, S., Sonpar, K., Pazzaglia, F.: Normal accident theory versus high reliability theory: a resolution and call for an open systems view of accidents. Hum. Relat. 62(9), 1357–1390 (2009)
Cummings, L.: Normal accidents: living with high-risk technologies. Book Rev. Adminis. Sci. Quarter. 29(4), 630–632 (1984)
Rijpma, J.: Complexity, tight–coupling and reliability: connecting normal accidents theory and high reliability theory. J. Contingencies Crisis Manage. 5(1), 15–23 (1997)
Sagan, S.: The limits of safety: organizations, accidents, and nuclear weapons. Princeton University Press, Princeton, NJ (1993)
Bloomberg.: The Coronavirus May Be “Disease X” Health Experts Warned About (22 Feb 2020). Retrieved from https://www.bloombergquint.com/business/coronavirus-may-be-the-disease-x-health-agency-warned-about
Pillinger, M.: Virus travel bans are inevitable but ineffective. Foreign Policy (20 Feb 2020). Retrieved from https://foreignpolicy.com/2020/02/23/virus-travel-bans-are-inevitable-but-ineffective/
Science.: The coronavirus seems unstoppable. What should the world do now? (25 Feb 2020). https://www.sciencemag.org/news/2020/02/coronavirus-seems-un-stoppable-what-should-world-do-now
Cockcroft, A.: The netflix tech blog: a closer look at the christmas eve outage (2012). Retrieved from http://techblog.netflix.com/2012/12/a-closer-look-at-christmas-eve-outage.html
Amazon.: Summary of the December 24, 2012 Amazon ELB service event in the US-East Region (2012). Retrieved from http://aws.amazon.com/message/680587/
Brown, B., Court, D., McGuire, T.: Views from the front lines of the data-analytics revolution. Mckinsey.com (2014). Retrieved from http://www.mckinsey.com/insights/business_technology/views_from_the_front_lines_of_the_data_analytics_revolution
Snook, S.: Friendly Fire: The Accidental Shootdown of U.S. Black Hawks over Northern Iraq. Princeton University Press (2000)
Goel, S.: Is part of Chelsea Manning’s legacy increased surveillance? the conversation (January 20, 2017). Retrieved from https://theconversation.com/is-part-of-chelsea-mannings-legacy-increased-surveillance-71607
Shane, S.: The Age of Big Leaks, The New York Times (February 2, 2019). Retrieved from https://www.nytimes.com/2019/02/02/Sunday-review/data-leaks-journalism.html
Shane, S., Perlroth, N., Sanger, D.: Security breach and spilled secrets have shaken the N.S.A., The New York Times (November 12, 2017). Retrieved from https://www.nytimes.com/2017/11/12/us/nsa-shadow-brokers.html
Szoldra, P.: This is everything Edward Snowden revealed in one year of unprecedented top-secret leaks. Business Insider (September 16, 2016). Retrieved from https://www.businessinsider.com/snowden-leaks-timeline-2016-9
United Nations.: Senior officials sound alarm over food insecurity, warning of potentially ‘Biblical’ famine. In: Briefings to Security Council. Press Release (April 21, 2020). Retrieved from https://www.un.org/press/en/2020/sc14164.doc.htm
Leigh, D.: How 250,000 US embassy cables were leaked. The Guardian (November 28, 2010). Retrieved from https://www.theguardian.com/world/2010/nov/28/how-us-embassy-cables-leaked
Waterman, S.: NSA leaker Ed Snowden used banned thumb drive, exceeded access. The Washington Times (2013). Retrieved from https://www.washingtontimes.com/news/2013/jun/14/nsa-leaker-ed-snowden-used-banned-thumb-drive-exce/
Allen & Overy.: Big data—Annual review 2013—Allen & Overy (2013). Retrieved from http://www.allenovery.com/publications/en-gb/annualreview2013/global-local/Pages/Big-data.aspx
MacGregor, D.: 10 Public response to Y2K: social amplification and risk adaptation: or, ‘‘how I learned to stop worrying and love Y2K’’. In: Pidgeon, N., Kasperson, R., Slovic, P. (eds.) The Social Amplification of Risk (pp. 243). New York, Cambridge University Press (2003)
La Porte, T., Consolini, P.: Working in practice but not in theory: theoretical challenges of high-reliability organizations. J. Public Adm. Res. Theor. 1, 19–47 (1991)
Bygrave, L.: Data Privacy Law: An International Perspective. Oxford University Press, Oxford (2014)
Ashford, W.: Infosec 2014: Act now, but no new EU data protection law before 2017, says ICO (2014). Retrieved from http://www.computerweekly.com/news/2240219908/Infosec-2014-Act-now-but-no-new-EU-data-protection-law-before2017-says-ICO
Farivar, C.: EU data protection reform could start ‘trade war’, US official says (Wired UK) (2014). Retrieved from http://www.wired.co.uk/news/archive/2013-02/01/eu-data-protection-us-trade-war
Johnson, M., Egelman, S., Bellovin, S.: Facebook and privacy: it’s complicated. In: Symposium on Usable Privacy and Security (SOUPS) 2012, July 11–13 (2012)
De Mauro, A., Greco, M., Grimaldi, M.: A formal definition of big data based on its essential features. Library Rev. 65(3), 122–135 (2016). https://doi.org/10.1108/LR-06-2015-0061
Lokshina, I., Lanting, C.: Study on Wide-ranging Ethical Implications of Big Data Technology in a Digital Society: How Likely Are Data Accidents during COVID-19?. J. Business Ecosystems. 2(1), 32–57 (2021)
Roberts, K.: Some characteristics of high reliability organizations. Organ. Sci. 1, 160–177 (1990)
Wu, J., Leung, K., Leung, G.: Nowcasting and forecasting the potential domestic and international spread of the 2019-nCoV outbreak originating in Wuhan, China: a modelling study. Lancet 395, 689–697 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Lokshina, I.V., Lanting, C.J.M. (2021). Study on Wide-Ranging Ethical Implications of Big Data Technology in a Digital Society: How Likely Are Data Accidents in the COVID-19 Reality?. In: Kryvinska, N., Poniszewska-Marańda, A. (eds) Developments in Information & Knowledge Management for Business Applications . Studies in Systems, Decision and Control, vol 376. Springer, Cham. https://doi.org/10.1007/978-3-030-76632-0_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-76632-0_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-76631-3
Online ISBN: 978-3-030-76632-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)