Kevinitu

Summary

The paper, introduces the concept of Ethical Design with the aim of empowering the user in the interaction with the Internet of Things (IoT). The paper raises the main challenges in the evolution of the Internet towards the IoT.  The challenges are to ensure that the personal data of individuals are protected no matter where or what form of processing is undertaken. According to the author the concept of privacy today should be revisited, as the amount of collected data from the IoT will be too difficult to control—and the complexity becomes even higher when attempting to determine which data are personal and which are not. However, the authors present their solution to the problem, the software Seckit, that enables users to decide what data that is made from them. Lastly the paper describes the potential implementation of the Ethical design concept.

All in all, the paper is build up by an introduction to the problem followed by a possible solution and ending with how this solution could be implemented into IoT devices. The paper bases its findings from many different research articles. Ex. (White House 2012), Weber (2015), (Weinberg et al. 2015; Article 29 Working Party 2014), Privacy Enhancing Technologies (PET) and the application of Privacy Enhancing Measures (PEM) remain limited (Cave et al. 2011), Nissenbaum (2015), And many more.

Select points of critique for the author to consider

 How does the author move from one idea to another? Are the transitions between the ideas effective?

I like the construction of the paper, it makes sense as there is an introduction to the problem, a possible solution and an implementation of the solution. The author does a good job introducing each section by letting the reader know what the next section is about and more importantly refers to earlier sections in the paper and external scientific papers for the reader that wants to delve more into the subject.

What is the intention of the text – teach, share knowledge, entertain?
I suggest that it could have been stated more clearly in the abstract whom this paper is intended for.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s