Abstract
The infrastructure of our information and communication networks is quickly developing. All over the world, researchers are successfully working on higher capacity data transmission and on connectivity enhancement. Traditional limitations of time, space and quantity are gradually loosing their grip on the availability and accessibility of information and communication. These developments will change the world for the better in many ways. They can, however, have drawbacks as well. These are primarily concerned with the societal impact of the broader use of the technologies after they have been introduced into the market. In this chapter, we ask in which stage of the process of designing, developing, producing and introducing into the market of the technology these consequences should be identified, and by whom this should be done. We also focus on the responsibilities for addressing and solving these drawbacks. In this latter part of the essay, we detach ourselves a little from the practical setting of fast and ubiquitous networks and address a recently often heard claim, i.e., that reflection on the social, moral and legal aspects of technology should primarily take place in the phase of development so that solutions of possible problems can be quasi built into the device. We take a critical stance towards this claim and argue that concern and care for the social, moral and legal aspects should take place during the whole process, by different parties to the extent of their specific capacities and possibilities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Referemces
Abelson, H., Anderson, R., Bellovin, S.M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Neumann, P.G., Rivest, R.L., Schiller, J.I., and Schneier, B. (1998) The risks of key recovery, key escrow and trusted third party encryption; A report by an ad hoc group of cryptographers and computer scientists. www.cdt.org/crypto/risks.
Akdeniz, Y. (1998) No Chance for Key Recovery: Encryption and International Principles of Human and Political Rights. In: 4th International Conference on Ethical Issues of Information Technologies,Ethicomp 98, Rotterdam.
Compaine, B.M. (2001) The Digital Divide: Facing a Crisis or Creating a Myth, Cambridge MA: The MIT Press.
Cotter, D., Manning, R.J., Blow, K.J., Ellis, A.D., Kelly, A.E., Nesset, D., Phillips, I.D., Poustie, A.J., and Rogers, D.C. (1999), Nonlinear optics for high-speed digital information processing. Science, 286, pp. 1523–1528.
Custers, B.H.M. (2003) Effects of Unreliable Group Profiling by Means of Data Mining. In: G. Grieser, Y. Tanaka and A. Yamamoto (eds.) Lecture Notes in Artificial Intelligence, Proceedings of the 6th International Conference on Discovery Science (DS 2003) Sapporo, Japan. Berlin, Heidelberg, New York: Springer-Verlag, Vol. 2843, pp. 290–295.
Custers, B.H.M. (2004) The Power of Knowledge, Tilburg: Wolf Legal Publishers.
Custers, B.H.M. (2008) Tapping and Data Retention in Ultrafast Communication Networks, Journal of International Commercial Law and Technology, 3(2), pp. 94–100.
Etzioni, A. (1999) The Limits of Privacy, New York: Basic Books.
Friedman, B., Kahn, P.H., Jr., and Borning, A. (2006). Value Sensitive Design and information systems. In: P. Zhang and D. Galletta (eds.) Human-Computer Interaction in Management Information Systems: Foundations, Armonk, New York; London, England: M.E. Sharpe, pp. 348–372.
Miller, D.A.B. (2004) Ultrafast Digital Processing. In A. Miller, D.M. Finlayson, and D.T. Reid (eds.) Ultrafast Photonics, Bristol, Philadelphia: Institute of Physics Publishing.
Mossberger, K., Tolbert, C.J., and Stansbury, M. (2003) Virtual Inequality: Beyond the Digital Divide, Washington DC: Georgetown University Press.
Pear, R, (2004) In a Shift, Bush Moves to Block Medical Suits. http://query.nytimes.com/gst/ fullpage.html?sec=health&res=9B05EED6173DF936A15754C0A9629C8B63 (accessed on 14th August 2007).
Raessens, B. (2001) E-Business, Your Business. Utrecht: Lemma.
Schaller, R.R. (1997) Moore’s Law: Past, Present and Future, Spectrum, IEEE, Volume 34, June 1997, pp. 52–59.
Van Dijk J.A.G.M. (2005) The Deepening Divide: Inequality in the Information Society, Thousand Oaks CA: Sage Publications.
Vedder, A. (2002) What people think about the reliability of medical information on the Internet. In: I. Alvarez, T. Ward Bynum, J. Alvaro de Assis Lopes, and S. Rogerson, (eds.) The Transformation of Organisations in the Information Age: Social and Ethical Implications.Lisboa: Universidade Lusiada, pp. 281–292.
Vedder, A. (2005) Expert knowledge for non-experts: Inherent and contextual risks of misinformation. ICES, Journal of Information, Communication and Ethics in Society, 3, 113–119.
Vedder, A. and Robert W. (2003) Reliability of information on the Internet: Some distinctions. Ethics and Information Technology,5, pp. 211–215.
Vedder, A. and Daan L. (2006) Reliability and security of information. Journal for Information, Communication and Ethics in Society, 4(1), pp. 3–6.
Vedder, A.H. et al. (2007) Van Privacyparadijs tot Controlestaat? Misdaad- en Terreurbestrijding in Nederland aan het Begin van de 21ste eeuw. Studies Rathenau Instituut (Ext. rep. 49). Den Haag: Rathenau Instituut.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media B.V.
About this chapter
Cite this chapter
Vedder, A., Custers, B. (2009). Whose Responsibility Is It Anyway? Dealing with the Consequences of New Technologies. In: Sollie, P., Düwell, M. (eds) Evaluating New Technologies. The International Library of Ethics, Law and Technology, vol 3. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-2229-5_3
Download citation
DOI: https://doi.org/10.1007/978-90-481-2229-5_3
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-2228-8
Online ISBN: 978-90-481-2229-5
eBook Packages: Humanities, Social Sciences and LawPhilosophy and Religion (R0)