tag:blogger.com,1999:blog-53008120135427824102024-02-08T09:03:19.927-05:00Ethical Guidance for Pervasive Information and Communication Technologies (PICT)Hardcover and eBook now available for purchase.Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.comBlogger173125tag:blogger.com,1999:blog-5300812013542782410.post-55990874245802555612014-08-04T14:05:00.000-04:002014-08-04T14:10:18.532-04:00Second review!!!<div style="text-align: right;">
<div style="text-align: left;">
I just stumbled across this short (but positive) <a href="http://www.cro3.org/content/51/10/51-5640.full" target="_blank">review</a> from <i><a href="http://www.cro3.org/" target="_blank">Choice Reviews Online</a>; </i>it recommends the book for all libraries. </div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
I also discovered that you can see excerpts from both reviews on the "<a href="http://www.springer.com/computer/general+issues/book/978-94-007-6832-1?detailsPage=reviews" target="_blank">Reviews</a>" tab on Springer's page for the book. (The tab is kind of inconspicuous.) </div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
If you spot any other reviews, please let me know.</div>
</div>
Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-4772055446617317202014-06-16T10:39:00.001-04:002014-06-16T10:39:23.163-04:00Review of the PICT book!!!This is the <a href="http://jpsl.org/archives/book-review-pict/" target="_blank">first review</a> I've seen of my book, <a href="http://ethicalpait.blogspot.com/p/normal-0-false-false-false-en-us-x-none.html"><i>Emerging Pervasive Information and Communication Technologies (PICT): Ethical Challenges, Opportunities and Safeguards</i></a>. It is mostly positive, but also challenges some aspects of the book.<br />
<br />
My favorite part is the last paragraph:<br />
<blockquote class="tr_bq">
In sum, this collection of essays is accessible and inviting. While the authors sometime uncover more questions than they answer, I take this to be a virtue of a collaborative work on emerging technology. The book would be suitable as an advanced undergraduate or graduate text, and is interesting for its variety of approaches as well as the many examples of PICT that are described herein.
</blockquote>
<blockquote class="twitter-tweet" lang="en">
Book review of the PICT book in the Journal of Philosophy, Science and Law <a href="http://t.co/ronxnknmQH">http://t.co/ronxnknmQH</a><br />
— Kenneth D. Pimple (@Ethical_PICT) <a href="https://twitter.com/Ethical_PICT/statuses/478538824029851649">June 16, 2014</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script>Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-86404977243800641462014-04-10T15:39:00.000-04:002014-04-10T15:39:22.630-04:00Call for Abstracts - Digital Ethics <i>Received via e-mail today - Ken</i><br />
<h3>
Call for Abstracts </h3>
<h2>
4th Annual International Symposium on Digital Ethics </h2>
The Center for Digital Ethics & Policy at Loyola University Chicago (<a href="http://digitalethics.org/">digitalethics.org</a>) will be holding its 4th Annual International Symposium on Digital Ethics on Nov 7th, 2014.<br />
<br />
We are looking for papers on digital ethics. Topics might include privacy, anonymity, grieving, free speech, intellectual property, hacking, scamming, surveillance, information mining, transparency, digital citizenship, and/or the ethical use of digital technologies in journalism, advertising and public relations.<br />
<br />
Paper abstracts should propose original research and be between 500 and 1,000 words in length (not including references).<br />
<br />
Authors invited to present papers will be eligible for up to $400 in travel funds to be able to attend the Chicago symposium. The author(s) of the Top Student Paper will be eligible for up to $1,000 in travel funds.<br />
<br />
Abstracts are due by midnight CST on April 15th, 2014, should follow APA or MLA.<br />
<br />
Authors of top papers will have the opportunity to have their work published in <i>Proceedings from the 4th Annual Symposium on Digital Ethics</i>.<br />
<br />
Send your submission in a MS Word document attachment to <a href="mailto:contact@digitalethics.org">contact@digitalethics.org</a>, and please write <i>Digital Ethics Symposium submission</i> in the subject line. Please send questions to the same email address.
Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-66213478073367854252014-04-10T15:22:00.000-04:002014-04-10T15:22:49.041-04:00Heartbleed and the National Academies Press<i>I found this amusing and wanted to share. - Ken</i> <br />
<blockquote class="twitter-tweet" lang="en">
The National Academies Press wants you to know that it is unaffected by Heartlbleed - and to peddle a few books | <a href="http://t.co/eJrWmWDczC">http://t.co/eJrWmWDczC</a><br />
— Kenneth D. Pimple (@Ethical_PICT) <a href="https://twitter.com/Ethical_PICT/statuses/454338252422406144">April 10, 2014</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script>
Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com3tag:blogger.com,1999:blog-5300812013542782410.post-7526620903144334222014-03-06T09:45:00.000-05:002014-03-06T09:45:30.331-05:00What is Pervasive ICT?<i>I wrote this description of PICT for <a href="http://ethicalpait.blogspot.com/2014/01/pict-at-appe.html" target="_blank">the 3 (!) events</a> in which I participated at the 2014 annual meeting of the <a href="http://appe.indiana.edu/" target="_blank">Association for Practical and Professional Ethics</a>. - Ken</i> <br />
<br />
Pervasive information and communication technology (PICT) is similar to ubiquitous computing (or ubicomp), pervasive computing, everyware, and ambient intelligence (AmI); it includes many different concrete artifacts, including sensors, tablets, and smartphones. Three characteristics distinguish PICT:<br />
<ul>
<li>It is, or could be, anywhere and everywhere – buildings, billboards, floors, restrooms, purses, pockets, coffee makers, pacemakers, eyeglasses, and the kitchen sink. </li>
<li>It detects, collects, organizes, acts upon, and transmits information, often wirelessly on the Internet. </li>
<li>Its presence and operation is often undetected by casual users, whether hidden physically (e.g., computer chips embedded in automobiles) or functionally. Functional invisibility occurs when a function or use of the technology is not announced (e.g., tracking online behavior), announced in a cryptic fashion (as in most terms of use), or becomes ambient through a process of familiarization, such as when smartphones become as ordinary as wallets and Facebook becomes a way of life. </li>
</ul>
Ethical challenges posed by PICT are new and emerging, as are the technologies themselves. Our panels will be exercises in anticipatory ethics – “ethical analysis aimed at influencing the development of new technologies.”[1]<br />
<br />
[1] Johnson, Deborah G. 2010. The role of ethics in science and engineering. <i>Trends in Biotechnology</i> 28(12): 589–590.<br />
<br />
<div style="text-align: right;">
Ken Pimple, PAIT Project Director</div>
Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-11986142506242459882014-03-05T08:58:00.000-05:002014-03-05T09:03:01.762-05:00"Bioethics and Information Technology" - new section in the Cambridge Quarterly of Healthcare Ethics<div style="text-align: left;">
<i>I learned recently that the <a href="http://journals.cambridge.org/action/displayJournal?jid=CQH" target="_blank">Cambridge Quarterly of Healthcare Ethics</a> is inaugurating a new section on bioethics and information technology. Below I've pasted the text from a memo distributed by the journal. - Ken</i></div>
<br />
<hr />
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
Dear Colleagues,</div>
<div style="text-align: left;">
<br />
It is now widely agreed that the future of the health professions is computational. That is, intelligent machines and other devices are becoming essential to practice and research in medicine, nursing, public health, etc. These technologies raise many interesting and important ethical, legal and social issues.</div>
<div style="text-align: left;">
<br />
This memo is to announce that the <i>Cambridge Quarterly of Healthcare Ethics</i>, a leading international bioethics journal, will this year launch a special section on "Bioethics and Information Technology." This section will feature original work on ethical, legal, policy and social aspects of the use of computing and information technology in health, biomedical research and the health professions. It is the goal of this section to apply CQ’s traditional standards of quality to this emerging field.</div>
<div style="text-align: left;">
<br />
Articles on ethical issues and the following are welcome; this is not an exhaustive list.</div>
<div style="text-align: left;">
<br />
Bioinformatics, biorepositories<br />
Business of health information technology<br />
Decision support systems and prognostic scoring systems<br />
Disability and health informatics<br />
Electronic health records<br />
Government regulation of health informatics tools<br />
Information and communications technology (ICT)<br />
International issues, including harmonization, best practices, etc.<br />
Internet and the World Wide Web<br />
Laboratory information management systems<br />
Mobile health<br />
Personal health records<br />
Public health informatics<br />
Privacy and confidentiality<br />
Professional-patient relationships<br />
Remote presence healthcare, medical homes, etc.<br />
Research and informatics<br />
Responsible Conduct of Research (RCR)<br />
Robots and digital/virtual companions<br />
Safety, quality and evaluation<br />
Social networking<br />
Software engineering and writing</div>
<div style="text-align: left;">
<br />
Author queries are encouraged. For more information or to submit a manuscript, email the Section Editor:</div>
<div style="text-align: left;">
<br />
Kenneth W. Goodman, Ph.D., FACMI<br />
University of Miami Miller School of Medicine<br />
kgoodman AT med DOT miami DOT edu</div>
<div style="text-align: left;">
<br />
Please share this notice with others who might be interested. More information about the journal, including guidelines for authors, is available at</div>
<div style="text-align: left;">
<br />
<div style="text-align: center;">
<a href="http://journals.cambridge.org/action/displayJournal?jid=CQH">http://journals.cambridge.org/action/displayJournal?jid=CQH</a></div>
</div>
Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-85327510681791817922014-03-03T15:50:00.000-05:002014-03-03T15:50:41.684-05:00Register now for Ethics'2014 <div style="text-align: right;">
<div style="font-family: "Book Antiqua"; font-size: 11pt; margin: 0in; text-align: left;">
<a href="https://www.xcdsystem.com/Ethics2014/attendee/index.cfm?ID=A36iOkG" target="_blank">Registration</a> is now open for <a href="http://sites.ieee.org/ethics-conference/" target="_blank"><b>2014 IEEE International Symposium on Ethics in Engineering, Science, and Technology:Ethics’2014</b></a>, to be held Friday-Saturday,
23-24 May, 2014 at the Chicago
Marriott O’Hare, Chicago, IL, USA.</div>
<div style="font-family: "Book Antiqua"; font-size: 11pt; margin: 0in; text-align: left;">
<br /></div>
<div style="font-family: "Book Antiqua"; font-size: 11pt; margin: 0in; text-align: left;">
The <a href="chrome-extension://oemmndcbldboiebfnladdacbdfmadadm/http://sites.ieee.org/ethics-conference/files/2013/04/Ethics2014FinalProgramGridv7.pdf" target="_blank">Program at a Glance</a> shows our panel on the PICT book on Saturday 9:45-11:15 am. I'll also be presenting a tutorial entitled "Working with Ethicists" on Friday, 9:30-10:30 am.</div>
<div style="font-family: "Book Antiqua"; font-size: 11pt; margin: 0in; text-align: left;">
<br /></div>
<div style="font-family: "Book Antiqua"; font-size: 11pt; margin: 0in; text-align: left;">
<a href="https://www.xcdsystem.com/Ethics2014/attendee/index.cfm?ID=A36iOkG" target="_blank">Register now!</a> I hope to see you in Chicago.</div>
<div style="font-family: "Book Antiqua"; font-size: 11pt; margin: 0in; text-align: left;">
<br /></div>
</div>
<div style="text-align: right;">
Ken Pimple, PAIT Project Director</div>
Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-30264969874577969202014-01-08T16:40:00.003-05:002014-01-08T16:40:49.954-05:00PICT at APPE <div style="text-align: left;">
The <a href="http://www.springer.com/computer/general+issues/book/978-94-007-6832-1" target="_blank">PICT book</a> will be featured three times at the upcoming <a href="http://appe.indiana.edu/annual-meeting/annual-meeting/" target="_blank">23rd annual meeting </a>of the <a href="http://appe.indiana.edu/" target="_blank">Association for Practical and Professional Ethics</a> (APPE). Registration fees increase January 17; <a href="http://appe.indiana.edu/annual-meeting/annual-meeting-registration/" target="_blank">act now</a> to secure your place!<br />
<br />
The meeting will convene at the Hyatt Regency Jacksonville, Riverfront Hotel in Jacksonville, Florida on February 27-March 2, 2014.<br />
<br />
If you need further incentive to attend the APPE meeting, check out <a href="http://go.iu.edu/PRI" target="_blank">Promoting Research Integrity: A Workshop for Research Faculty and Administrators</a>. <br />
<h2>
The events</h2>
</div>
<div style="text-align: left;">
</div>
<div style="text-align: left;">
<a href="http://appe.indiana.edu/annual-meeting/programs-for-authors/" target="_blank"><b>Author Meets the Critics </b></a>- Two eminent scholars will rip the book apart, I and two of the contributors will put up a brilliant defense, and the audience will set us all straight. The <i><b>critics </b></i>are Joseph R. Herkert, Arizona State U., and Kenneth W. Goodman, U. of Miami. The <i><b>defenders </b></i>are Cynthia M. Jones, U. of Texas-Pan American; Donald R. Searing, Syncere Systems; and me. The titles and abstracts of our chapters can be found below. <i>Date and time TBA.</i></div>
<div style="text-align: left;">
<br />
<b><a href="http://appe.indiana.edu/annual-meeting/programs-for-authors/" target="_blank">Lunch with an Author</a></b> - "The authors and their book titles are listed in the program and conference attendees sign-up in advance to have lunch with [the author(s)] in the hotel banquet hall (usually 8-10 people sitting at a round table.)" <i>February 28 or March 1, noonish</i>.<br />
<br />
<b><a href="http://appe.indiana.edu/annual-meeting/programs-for-authors/" target="_blank">Author Reception and Book Signing</a></b> - Friday, February 28, 6:30-7:30 p.m., just before the banquet<a href="https://draft.blogger.com/null" id="Chapters">.</a><br />
<h2>
The chapters</h2>
Kenneth D. Pimple, Chapter 1: <b>Introduction: The Impact, Benefits, and Hazards of PICT</b><br />
<blockquote class="tr_bq">
<a href="http://link.springer.com/chapter/10.1007/978-94-007-6833-8_1" target="_blank"><b>Abstract:</b></a> This chapter opens with an extended definition and description of pervasive information and communication technology (PICT) as a sociotechnical system – in brief, an intertwined system of social practices and the technologies that make the social practices possible which in turn spur technological revision and innovation that simultaneously modify or transform social practices in a never-ending spiral. It then describes the following ten chapters. Chapter 2 presents and analyzes three case studies of actual recent events that highlight key aspects of PICT. Chapters 3, 4, and 5 tackle surveillance from three different angles, but together provide a primer on the ethical issues involved. Chapters 3, 6, and 7 focus on health care, an area of significant growth for PICT. Chapter 8 considers a particular type of PICT – augmented reality – and reveals its far-from-obvious ramifications. Chapter 9 provides a different kind of case study as a social scientist describes her experience working with technologists developing PICT with the goal (successfully achieved) of making ethics a design goal. Chapters 10 and 11 focus more narrowly on ethical guidance for PICT.</blockquote>
Donald R. Searing and Elizabeth A. M. Searing, Chapter 2: <b>Three Case Studies</b><br />
<blockquote class="tr_bq">
<a href="http://link.springer.com/chapter/10.1007/978-94-007-6833-8_2" target="_blank"><b>Abstract:</b></a>
This chapter will introduce three real-world case studies involving
pervasive information and communication technology (PICT) systems and
the ethical issues which can arise during the development and deployment
of these systems and technologies. The sensor-effector system model
will be used to decompose the larger area of PICT into three areas of
focus: sensors, effectors, and the systems these elements form with
their control logic. Each of these areas will be examined through a
real-world example and discussion of the issues inherent in the
pervasive use of information technology in that area. In the first case,
our over-reliance on GPS systems will serve as an example of the issues
related to pervasive sensors. In the second case, the dangers of
computer viruses and worms such as Stuxnet will illustrate what can
arise with pervasive effectors. Finally, the Flash Crash experienced by
the stock markets in 2010 will exemplify what can occur when sensors,
effectors, and their control logic are combined into autonomous systems
and deployed pervasively throughout a world. </blockquote>
Cynthia M. Jones, Chapter 6: <b>Preserving Life, Destroying Privacy: PICT and the Elderly</b><br />
<blockquote class="tr_bq">
<a href="http://link.springer.com/chapter/10.1007%2F978-94-007-6833-8_6" target="_blank"><b>Abstract:</b></a> Issues of privacy are undeniably central moral concerns in pervasive information and communication technology (PICT), as many aspects of individual privacy seem to be unavoidable casualties of the increased ubiquity of such technologies. It appears that many people make this trade-off willingly, as attested by the number of users of Facebook, Google, and other technologies that routinely mine personal data for commercial use. This large and growing population may take it for granted that elderly people experiencing (or perceived as experiencing) increasing physical frailty, decreasing mental competence, and the concomitant reliance on health professionals and other caregivers should be expected to give up a degree of privacy if it means staying in their own homes rather than moving to a nursing home or assisted living facility. As the end of life approaches, it may seem to many that privacy is less important than comfort. This chapter examines the relationship between privacy, competency, paternalism, coercion, and the elderly – a group that will likely be among the first to have PICT forced upon them in their own homes, probably by their own adult offspring</blockquote>
Kenneth D. Pimple, Chapter 11: <b>Principles for the Ethical Guidance of PICT</b><br />
<blockquote class="tr_bq">
<a href="http://link.springer.com/chapter/10.1007/978-94-007-6833-8_11" target="_blank"><b>Abstract:</b></a> As used in this chapter, <i>principles </i>offer moral or ethical guidance at a level of specificity between those of foundational ethical theories, such as the Golden Rule or Immanuel Kant’s Categorical Imperative, and detailed rules of conduct, such as the 600-some commandments in the Hebrew Bible or the ever-expanding U.S. Code of Federal Regulations. In this chapter I describe the utility of a principle-based approach and offer a preliminary set of principles intended to provide practical guidance to people and organizations who create, distribute, use, and regulate pervasive information and communication technologies (PICT). My goal is to articulate principles at a level of abstraction that will facilitate (a) the creation of appropriate rules and (b) ethically sound decision-making and behavior in circumstances that no rules cover.</blockquote>
I hope to see you there! </div>
<div style="text-align: left;">
</div>
<div style="text-align: right;">
Ken Pimple, PAIT Project Director
</div>
Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com1tag:blogger.com,1999:blog-5300812013542782410.post-49175540163134477522014-01-04T13:30:00.001-05:002014-01-04T13:33:14.160-05:00PICT at Ethics'2014<div style="text-align: left;">
Join me and several of the contributors to <i>Emerging Pervasive Information and Communication Technologies (PICT): Ethical Challenges, Opportunities and Safeguards</i> (known to the cognoscenti as "the PICT book") at the 2014 <a href="http://sites.ieee.org/ethics-conference/" target="_blank">IEEE International Symposium on Ethics in Engineering, Science, and Technology</a> (<b>Ethics'2014</b> for short).<br />
<br />
The symposium will be held at the Chicago Marriott O’Hare, Chicago, IL, USA, on May 23-24, 2014. The PICT panel is scheduled for 9:45-11:15 on Saturday, May 24, in Grand Ballroom 6.<br />
<br />
The additional panelists are<br />
<ul>
<li>Francis
Harvey, U. of Minnesota</li>
<li>Cynthia
Jones, U. of Texas-Pan American</li>
<li>Keith W.
Miller, U. of Missouri-St. Louis</li>
<li>
Donald R. Searing, Syncere Systems</li>
<li>Katherine D.
Seelman, U. of Pittsburgh</li>
<li>Katie
Shilton, U. of Maryland-College Park</li>
</ul>
I'll let you know how to register for conference as soon as that information comes my way.<br />
<br />
I hope to see you in Chicago. It will be a grand time.<br />
<br /></div>
<div style="text-align: right;">
Ken Pimple, PAIT Project Director</div>
Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-89622822653162511452013-12-12T11:12:00.001-05:002013-12-12T11:13:25.437-05:00"Liberty and Security: A Town Hall Discussion"<blockquote class="twitter-tweet" lang="en">
Mini Conference at APPE, Mar 2014, Jacksonville FL - "Liberty and Security: A Town Hall Discussion" | <a href="https://twitter.com/APPEOnline">@APPEOnline</a> <a href="http://t.co/kjb02t5b1o">http://t.co/kjb02t5b1o</a><br />
— Kenneth D. Pimple (@TeachRCR) <a href="https://twitter.com/TeachRCR/statuses/411163501822873601">December 12, 2013</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script>Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-4576112146856957462013-11-07T09:56:00.000-05:002013-11-07T09:56:32.185-05:001st Call for papers: ACM Web Science Conference (WebSci14), June 23-26, 2014<div style="text-align: center;">
<span style="font-size: x-large;"><b><span style="font-family: Arial,Helvetica,sans-serif;">1st CALL FOR PAPERS</span></b></span></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<span style="font-size: large;"><b><span style="font-family: Arial,Helvetica,sans-serif;">ACM Web Science Conference (WebSci14)</span></b></span></div>
<div style="text-align: center;">
<span style="font-size: large;"><b><span style="font-family: Arial,Helvetica,sans-serif;">June 23-26, 2014</span></b></span></div>
<div style="text-align: center;">
<span style="font-size: large;"><b><span style="font-family: Arial,Helvetica,sans-serif;">Bloomington, Indiana, USA</span></b></span></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<b><span style="font-family: Arial,Helvetica,sans-serif;">websci14.org * @WebSciConf * #WebSci14</span></b></div>
<div style="text-align: center;">
</div>
<div style="text-align: center;">
<b><span style="font-family: Arial,Helvetica,sans-serif;">Deadline for papers: Feb. 23rd 2014</span></b></div>
<br />
Web Science is the emergent science of the people, organizations, applications, and of policies that shape and are shaped by the Web, the largest informational artifact constructed by humans in history. Web Science embraces the study of the Web as a vast universal information network of people and communities. As such, Web Science includes the study of social networks whose work, expression, and play take place on the Web. The social sciences and computational sciences meet in Web Science and complement one another: Studying human behavior and social interaction contributes to our understanding of the Web, while Web data is transforming how social science is conducted. The Web presents us with a great opportunity as well as an obligation: If we are to ensure the Web benefits humanity we must do our best to understand it.<br />
<br />
<b>Call for Papers</b><br />
<br />
The Web Science conference is inherently interdisciplinary, as it attempts to integrate computer and information sciences, communication, linguistics, sociology, psychology, economics, law, political science, philosophy, digital humanities, and other disciplines in pursuit of an understanding of the Web. This conference is unique in the manner in which it brings these disciplines together in creative and critical dialogue, and we invite papers from all the above disciplines, and in particular those that cross traditional disciplinary boundaries.<br />
<br />
Following the success of WebSci09 in Athens, WebSci10 in Raleigh, WebSci11 in Koblenz, WebSci 12 in Evanston, and WebSci13 in Paris, for the 2014 conference we are seeking papers and posters that describe original research, analysis, and practice in the field of Web Science, as well as work that discusses novel and thought-provoking ideas and works-in-progress.<br />
<br />
Possible topics for submissions include, but are not limited to, the following:<br />
<ul>
<li>Analysis of human behavior using social media, mobile devices, and online communities</li>
<li>Methodological challenges of analyzing Web-based large-scale social interaction</li>
<li>Data-mining and network analysis of the Web and human communities on the Web</li>
<li>Detailed studies of micro-level processes and interactions on the Web</li>
<li>Collective intelligence, collaborative production, and social computing</li>
<li>Theories and methods for computational social science on the Web</li>
<li>Studies of public health and health-related behavior on the Web</li>
<li>The architecture and philosophy of the Web</li>
<li>The intersection of design and human interaction on the Web</li>
<li>Economics and social innovation on the Web</li>
<li>Governance, democracy, intellectual property, and the commons</li>
<li>Personal data, trust, and privacy</li>
<li>Web and social media research ethics</li>
<li>Studies of Linked Data, the Cloud, and digital eco-systems</li>
<li>Big data and the study of the Web</li>
<li>Web access, literacy, and development</li>
<li>Knowledge, education, and scholarship on and through the Web</li>
<li>People-driven Web technologies, including crowd-sourcing, open data, and new interfaces</li>
<li>Digital humanities</li>
<li>Arts & culture on the Web or engaging audiences using Web resources</li>
<li>Web archiving techniques and scholarly uses of Web archives</li>
<li>New research questions and thought-provoking ideas</li>
</ul>
<b>Submission</b><br />
<br />
Web Science is necessarily a very selective single track conference with a rigorous review process. To accommodate the distinct traditions of its many disciplines, we provide three different submission formats: full papers, short papers, and posters. For all types of submissions, inclusion in the ACM DL proceedings will be by default, but not mandatory (opt-out via EasyChair). All accepted research papers (full and short papers) will be presented during the single-track conference. All accepted posters will be given a spot in the single-track lightning talk session, and room to present their papers during a dedicated poster session.<br />
<br />
<b>Full research papers</b> (5 to 10 pages, ACM double column, 20 mins presentation including Q&A)<br />
<br />
Full research papers should present new results and original work that has not been previously published. Research papers should present substantial theoretical, empirical, methodological, or policy-oriented contributions to research and/or practice.<br />
<br />
<b>Short research papers</b> (up to 5 pages, ACM double column, 15 mins presentation including Q&A)<br />
<br />
Short research papers should present new results and original work that has not been previously published. Research papers can present preliminary theoretical, empirical, methodological, or policy-oriented contributions to research and/or practice.<br />
<br />
Full and short paper submissions should be formatted according to the official ACM SIG proceedings template (WebSci archive format at <a href="http://www.acm.org/sigs/publications/proceedings-templates">http://www.acm.org/sigs/publications/proceedings-templates</a>).<br />
<br />
<b>Posters </b>(up to 6 pages, ACM abstract template, lightning talk + poster presentation)<br />
<br />
Extended abstracts for posters, which should be in English, can be up to 6 pages, and should be formatted according to the official ACM SIG abstract template (extended abstract format at <a href="https://www.dropbox.com/sh/pl130rtd134fxu6/hiyzXgWwTs">https://www.dropbox.com/sh/pl130rtd134fxu6/hiyzXgWwTs</a>).<br />
<br />
<b>Other creative submission formats</b> (flexible formats)<br />
<br />
Other types of creative submissions are also encouraged, and the exact format and style of presentation are open. Examples might include artistic performances or installations, interactive exhibits, demonstrations, or other creative formats. For these submissions, the proposers should make clear both what they propose to do, and any special requirements they would need to successfully do it (in terms of space, time, technology, etc.)<br />
<br />
Instructions for all types of submissions will be posted on the <a href="http://www.websci14.org/" target="_blank">WebSci14 conference website</a> soon.<br />
<br />
<b>Review</b><br />
<br />
The Web Science program committee consists of a program committeethat covers all relevant areas of Web Science. Each submission will be refereed by three PC members and one short meta review written by a Co-PC chair,to cover both the research background of each submission as well as the necessary interdisciplinary aspects.<br />
<br />
<b>(Optional) Archival Proceedings in the ACM Digital Library</b><br />
<br />
All accepted papers and posters will by default appear in the Web Science 2014 Conference Proceedings and can also be made available through the ACM Digital Library, in the same length and format of the submission unless indicated otherwise (those wishing not to be indexed and archived can opt out of the proceedings).<br />
<br />
<b>Deadlines (tentative)</b><br />
Full & Short Papers:<br />
<ul>
<li>23 February 2014: Submissions of full and short papers</li>
<li>13 April 2014: Notification of acceptance for papers</li>
<li>11 May 2014: Camera-ready version of papers and posters due</li>
</ul>
Late Breaking Posters:<br />
<ul>
<li>23 March 2014: Submissions of posters</li>
<li>13 April 2014: Notification of acceptance for posters</li>
<li>11 May 2014: Camera-ready version of posters due<i> </i></li>
</ul>
<i>Authors take note: </i>The official publication date is the date the proceedings are made available in the ACM Digital Library. This date may be up to two weeks prior to the first day of the conference. The official publication date affects the deadline for any patent filings related to published work. (If proceedings are published in the ACM Digital Library after the conference is over, the official publication date is the first day of the conference.)<br />
<b>Call for Workshops</b><br />
<br />
TBA - more information will be made available on the conference website soon<br />
<br />
<b>Conference calendar and rough program</b><br />
<ul>
<li>23 June 2014: workshops, opening reception and keynote</li>
<li>24 June 2014: keynote(s), technical program, poster reception</li>
<li>25 June 2014: keynote(s), technical program, social event</li>
<li>26 June 2014: keynote, technical program, closing<b> </b></li>
</ul>
<b>General chairs</b><ul>
<li>Fil Menczer, Indiana University</li>
<li>Jim Hendler, Rensselaer Polytechnic Institute</li>
<li>Bill Dutton, Oxford Internet Institute, University of Oxford</li>
</ul>
<b>Program chairs</b><br />
<ul>
<li>Markus Strohmaier, University of Koblenz and GESIS (Computing)</li>
<li>Ciro Cattuto, ISI Foundation (Physics)</li>
<li>Eric T. Meyer, Oxford Internet Institute, University of Oxford (Social Sciences)</li>
</ul>
<b>PC: TBA</b>Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-55707835748022304272013-11-03T14:29:00.000-05:002013-11-03T14:29:16.381-05:00"If a Young Child Wanders, Technology Can Follow"<blockquote class="twitter-tweet">
A 2-Way Wrist Radio is preferable to an embedded chip - "If a Young Child Wanders, Technology Can Follow" | <a href="https://twitter.com/nytimes">@NYTimes</a> <a href="http://t.co/qAZxd9pctV">http://t.co/qAZxd9pctV</a><br />
— Kenneth D. Pimple (@Ethical_PICT) <a href="https://twitter.com/Ethical_PICT/statuses/397082483495141377">November 3, 2013</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script>
Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-6398765631397853842013-10-27T11:46:00.002-04:002013-10-27T11:46:48.720-04:00"The Information-Gathering Paradox"<blockquote class="twitter-tweet">
Facebook, Google, Twitter, etc., collect data for the NSA; who knew? - "The Information-Gathering Paradox" | <a href="https://twitter.com/nytimes">@NYTimes</a> <a href="http://t.co/MEMvNfjJAU">http://t.co/MEMvNfjJAU</a><br />
— Kenneth D. Pimple (@Ethical_PICT) <a href="https://twitter.com/Ethical_PICT/statuses/394489719435718656">October 27, 2013</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script>
Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-11170183543450050042013-10-13T12:29:00.000-04:002013-10-13T12:29:36.836-04:00There's no escapeI keep this blog and <a href="https://twitter.com/Ethical_PICT" target="_blank">Twitter account</a>, and I edited a book on pervasive ICT, but I'm not a hard-core techie. I don't read any tech magazines, I don't go out looking for sources for this blog. I just scan a few sources daily or weekly, including <i>The New York Times</i>, and post interesting bits here or on my <a href="https://twitter.com/TeachRCR" target="_blank">@TeachRCR</a> Twitter account. My point is that I pretty much stumble across these things, which means they are pretty close to the line of common knowledge. Sometimes, like today, I find it a bit scary how creepy the in-the-pipeline technologies are, and I wonder what's out there, just a few steps behind.<br />
<br />
All of that was triggered by these two stories in the <i>Times</i>. The first is just about a handful of Google Glass wannabes. Irritating, invasive, privacy-decomposing - but we're getting braced for the flood.<br />
<blockquote class="twitter-tweet">
Cyborgs stalking us all - the actual zombie invasion? - "Seeking a Staredown With Google Glass" | <a href="https://twitter.com/nytimes">@NYTimes</a> <a href="http://t.co/S9QaDAb78c">http://t.co/S9QaDAb78c</a><br />
— Kenneth D. Pimple (@Ethical_PICT) <a href="https://twitter.com/Ethical_PICT/statuses/389412869558640640">October 13, 2013</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script>
But along with it comes this:<br />
<blockquote class="twitter-tweet">
Computational voice analysis and diagnosis of mood, personality - "In a Mood? Call Center Agents Can Tell" | <a href="https://twitter.com/nytimes">@NYTimes</a> <a href="http://t.co/1qITVvLKn6">http://t.co/1qITVvLKn6</a><br />
— Kenneth D. Pimple (@Ethical_PICT) <a href="https://twitter.com/Ethical_PICT/statuses/389413731236454401">October 13, 2013</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script>
Somebody give me a "Come on, now!"<br />
<br />
Here are my two favorite passages:<br />
<blockquote class="tr_bq">
The more invasive audio mining also has the potential to unnerve some consumers, who might squirm at the idea of an unknown operator getting an instant entree into their psyche.</blockquote>
That's an understatement.<br />
<blockquote class="tr_bq">
“It seems to me that the biggest risk of this technology is not that it violates people’s privacy, but that companies might believe in it and use it to make judgments about customers or potential employees,” says George Loewenstein, a professor of economics and psychology at Carnegie Mellon University. “That could end up being used to make arbitrary and potentially discriminatory decisions.”</blockquote>
I don't know about you, but to me this is a no-win proposition. If the software works as advertised, it's the most severe invasion of privacy we're likely to see until Isaac Asimov's pscyho-probe comes around. If it doesn't work, but people believe in it, it'll be another source of confusion and another tool in the power-abuser kit.Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-24650136040522761642013-10-12T10:56:00.001-04:002013-10-12T10:56:02.730-04:00"Google to Sell Users’ Endorsements"Has Google become yet another abomination upon the earth? On the bright side, we can all use it's own services to condemn it.<br />
<blockquote class="twitter-tweet">
Remember "don't be evil?" Say it ain't so, Google! - "Google to Sell Users’ Endorsements" | <a href="https://twitter.com/nytimes">@NYTimes</a> <a href="http://t.co/1XZpp2Y5jt">http://t.co/1XZpp2Y5jt</a><br />
— Kenneth D. Pimple (@Ethical_PICT) <a href="https://twitter.com/Ethical_PICT/statuses/389040678887374849">October 12, 2013</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script>
Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-9018197962032474312013-10-09T17:31:00.000-04:002013-10-09T17:31:59.122-04:00"Let's Build a More Secure Internet"<blockquote class="twitter-tweet">
Open source hardware for the Internet? Intriguing.... - "Let’s Build a More Secure Internet" | <a href="https://twitter.com/nytimes">@NYTimes</a> <a href="http://t.co/oq3Ot4fJQS">http://t.co/oq3Ot4fJQS</a><br />
— Kenneth D. Pimple (@Ethical_PICT) <a href="https://twitter.com/Ethical_PICT/statuses/388053298361561088">October 9, 2013</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script>Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-33951065816317036122013-10-08T15:41:00.000-04:002013-10-08T15:41:57.581-04:00"Researchers split over NSA hacking"<i>Here's the comment I posted to this news piece: </i><br />
<br />
In 1982, I graduated with a B.S. in mathematics. I was young and ignorant and naive, and the only math jobs I knew of were either college teaching or in the military-industrial complex. I didn't think I was good enough in math to go to graduate school and I didn't want to contribute to the war in Viet Nam, so I took another route.<br /><br />I later came to believe that we should not vilify people who work in industries that we deplore. If liberal academics (like me) condemn others like us except that they might apply for a job that happens to have military connections, only the very boldest will apply and the majority of applicants might well be militaristic jingoist fundamentalists intent on ushering in the apocalypse. (I came of age during the nuclear freeze movement and Secretary of Interior James Watt.)<br /><br />My characterization of "them" is intentionally exaggerated, but I hope you get the point: If people who share my values are shut out from certain areas of study, only people who don't share my values will have a voice. This is unacceptable in a democracy.<br />
<blockquote class="twitter-tweet">
My Q: Can working for spies temper their tendency toward abuse? - "Researchers split over NSA hacking" | <a href="https://twitter.com/NatureNews">@NatureNews</a> <a href="http://t.co/TY5RNFiWS4">http://t.co/TY5RNFiWS4</a><br />
— Kenneth D. Pimple (@Ethical_PICT) <a href="https://twitter.com/Ethical_PICT/statuses/387662582934282240">October 8, 2013</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script>
Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-72245453300710080932013-09-30T12:12:00.000-04:002013-09-30T12:12:08.163-04:00Smartphones for the blind and visually impaired<blockquote class="twitter-tweet">
A truly worthwhile use of smartphones - "Disruptions: Visually Impaired Turn to Smartphones to See Their World" <a href="http://t.co/b4t8K0Ibx9">http://t.co/b4t8K0Ibx9</a><br />
— Kenneth D. Pimple (@Ethical_PICT) <a href="https://twitter.com/Ethical_PICT/statuses/384711476688076800">September 30, 2013</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script>Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-35978439568334385782013-09-20T12:12:00.000-04:002013-09-20T12:13:16.009-04:00California privacy; people vs computer traders<blockquote class="twitter-tweet">
State-by-state online privacy? I'm not optimistic - "Sharing, With a Safety Net" | <a href="https://twitter.com/nytimes">@nytimes</a> <a href="http://t.co/dGYQxqeG7d">http://t.co/dGYQxqeG7d</a><br />
— Kenneth D. Pimple (@Ethical_PICT) <a href="https://twitter.com/Ethical_PICT/statuses/381086560117997568">September 20, 2013</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script>
<br />
<blockquote class="twitter-tweet">
The other face of the Flash Crash - "Computer Flaws Get Wry Smile From Humans Displaced" | <a href="https://twitter.com/nytimes">@nytimes</a> <a href="http://t.co/MazrxO2XiU">http://t.co/MazrxO2XiU</a><br />
— Kenneth D. Pimple (@Ethical_PICT) <a href="https://twitter.com/Ethical_PICT/statuses/381087353705476096">September 20, 2013</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script>Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-87498924241346632572013-09-19T11:50:00.001-04:002013-09-19T11:50:06.579-04:00PICT book now available in hardcover and eBook<blockquote class="twitter-tweet"><p>eBook now available for purchase - Emerging Pervasive ICT (PICT): Ethical Challenges, Opportunities, and Safeguards <a href="http://t.co/klg7GT7Imi">http://t.co/klg7GT7Imi</a></p>— Kenneth D. Pimple (@Ethical_PICT) <a href="https://twitter.com/Ethical_PICT/statuses/380716782555656192">September 19, 2013</a></blockquote>
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-55453736510430053262013-09-11T10:43:00.001-04:002013-09-11T10:44:25.922-04:00The book has arrived!<blockquote class="twitter-tweet">
Available NOW - Emerging Pervasive ICT (PICT): Ethical Challenges, Opportunities, and Safeguards <a href="http://t.co/klg7GT7Imi">http://t.co/klg7GT7Imi</a><br />
— Kenneth D. Pimple (@Ethical_PICT) <a href="https://twitter.com/Ethical_PICT/statuses/377804353857265664">September 11, 2013</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script>Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-29168100221639357072013-08-30T10:32:00.001-04:002013-08-30T10:32:44.234-04:00"The Face Scan Arrives"Homeland Security and the FBI are developing facial identification software. The author, Ginger McCall, suggests two policies to restrict the use of such technologies.<br />
<blockquote class="tr_bq">
First, facial-recognition databases should be populated only with images of known terrorists and convicted felons. Driver’s license photos and other images of “ordinary” people should never be included in a facial-recognition database without the knowledge and consent of the public.<br />
<br />
Second, access to databases should be limited and monitored. Officers should be given access only after a court grants a warrant. The access should be tracked and audited. The authorities should have to publicly report what databases are being mined and provide aggregate numbers on how often they are used.</blockquote>
I approve of the second policy 100%, but I wonder whether having the faces of ordinary people on file would tend to make the database more effective in identifying criminals. In some areas, having tons of data give systems greater power; when Netflix knows that I like movies A, B, and C, and that several hundreds of people who like A, B, and C also like movie D, it's a good guess that I'd like D, too. Is there an analog to this in facial recognition?<br />
<blockquote class="twitter-tweet">
Slouching toward Big Brother (or maybe not) - "The Face Scan Arrives" | <a href="http://t.co/F7mOok0vUw">http://t.co/F7mOok0vUw</a><br />
— Kenneth D. Pimple (@Ethical_PICT) <a href="https://twitter.com/Ethical_PICT/statuses/373449096188551171">August 30, 2013</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script>Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-5742859635145483972013-08-29T14:13:00.001-04:002013-08-29T14:13:23.039-04:00Free preview of the PICT book now available<blockquote class="twitter-tweet">
Free preview now available: Emerging Pervasive Information and Communication Technologies (PICT) <a href="http://t.co/4QoSpfKRYe">http://t.co/4QoSpfKRYe</a><br />
— Kenneth D. Pimple (@Ethical_PICT) <a href="https://twitter.com/Ethical_PICT/statuses/373145714160709632">August 29, 2013</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script>
Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-3796290543962744042013-08-26T16:35:00.001-04:002013-08-26T16:35:33.637-04:00PICT book projected publication date now September 30I am disappointed to announce that the publication date of our <a href="http://ethicalpait.blogspot.com/p/normal-0-false-false-false-en-us-x-none.html">book</a> has been pushed back another month. If I weren't monitoring Springer's Web page for the book, I wouldn't know about this myself. I have been given no explanation for the delay.<br />
<br />
<div style="text-align: right;">
Ken Pimple</div>
Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0tag:blogger.com,1999:blog-5300812013542782410.post-41413799393501385002013-08-21T16:26:00.001-04:002013-08-21T16:26:43.145-04:00"I Flirt and Tweet. Follow Me at #Socialbot."<blockquote class="twitter-tweet">
Is this scary, or just silly? - "I Flirt and Tweet. Follow Me at <a href="https://twitter.com/search?q=%23Socialbot&src=hash">#Socialbot</a>." | <a href="http://t.co/nxcbUd9vUA">http://t.co/nxcbUd9vUA</a><br />
— Kenneth D. Pimple (@Ethical_PICT) <a href="https://twitter.com/Ethical_PICT/statuses/370280066082537472">August 21, 2013</a></blockquote>
<script async="" charset="utf-8" src="//platform.twitter.com/widgets.js"></script>Kenneth D. Pimplehttp://www.blogger.com/profile/11506116115577376790noreply@blogger.com0