Skip to main content

Whose Responsibility Is It Anyway? Dealing with the Consequences of New Technologies

  • Chapter
Evaluating New Technologies

Part of the book series: The International Library of Ethics, Law and Technology ((ELTE,volume 3))

Abstract

The infrastructure of our information and communication networks is quickly developing. All over the world, researchers are successfully working on higher capacity data transmission and on connectivity enhancement. Traditional limitations of time, space and quantity are gradually loosing their grip on the availability and accessibility of information and communication. These developments will change the world for the better in many ways. They can, however, have drawbacks as well. These are primarily concerned with the societal impact of the broader use of the technologies after they have been introduced into the market. In this chapter, we ask in which stage of the process of designing, developing, producing and introducing into the market of the technology these consequences should be identified, and by whom this should be done. We also focus on the responsibilities for addressing and solving these drawbacks. In this latter part of the essay, we detach ourselves a little from the practical setting of fast and ubiquitous networks and address a recently often heard claim, i.e., that reflection on the social, moral and legal aspects of technology should primarily take place in the phase of development so that solutions of possible problems can be quasi built into the device. We take a critical stance towards this claim and argue that concern and care for the social, moral and legal aspects should take place during the whole process, by different parties to the extent of their specific capacities and possibilities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Referemces

  • Abelson, H., Anderson, R., Bellovin, S.M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Neumann, P.G., Rivest, R.L., Schiller, J.I., and Schneier, B. (1998) The risks of key recovery, key escrow and trusted third party encryption; A report by an ad hoc group of cryptographers and computer scientists. www.cdt.org/crypto/risks.

  • Akdeniz, Y. (1998) No Chance for Key Recovery: Encryption and International Principles of Human and Political Rights. In: 4th International Conference on Ethical Issues of Information Technologies,Ethicomp 98, Rotterdam.

    Google Scholar 

  • Compaine, B.M. (2001) The Digital Divide: Facing a Crisis or Creating a Myth, Cambridge MA: The MIT Press.

    Google Scholar 

  • Cotter, D., Manning, R.J., Blow, K.J., Ellis, A.D., Kelly, A.E., Nesset, D., Phillips, I.D., Poustie, A.J., and Rogers, D.C. (1999), Nonlinear optics for high-speed digital information processing. Science, 286, pp. 1523–1528.

    Article  Google Scholar 

  • Custers, B.H.M. (2003) Effects of Unreliable Group Profiling by Means of Data Mining. In: G. Grieser, Y. Tanaka and A. Yamamoto (eds.) Lecture Notes in Artificial Intelligence, Proceedings of the 6th International Conference on Discovery Science (DS 2003) Sapporo, Japan. Berlin, Heidelberg, New York: Springer-Verlag, Vol. 2843, pp. 290–295.

    Google Scholar 

  • Custers, B.H.M. (2004) The Power of Knowledge, Tilburg: Wolf Legal Publishers.

    Google Scholar 

  • Custers, B.H.M. (2008) Tapping and Data Retention in Ultrafast Communication Networks, Journal of International Commercial Law and Technology, 3(2), pp. 94–100.

    Google Scholar 

  • Etzioni, A. (1999) The Limits of Privacy, New York: Basic Books.

    Google Scholar 

  • Friedman, B., Kahn, P.H., Jr., and Borning, A. (2006). Value Sensitive Design and information systems. In: P. Zhang and D. Galletta (eds.) Human-Computer Interaction in Management Information Systems: Foundations, Armonk, New York; London, England: M.E. Sharpe, pp. 348–372.

    Google Scholar 

  • Miller, D.A.B. (2004) Ultrafast Digital Processing. In A. Miller, D.M. Finlayson, and D.T. Reid (eds.) Ultrafast Photonics, Bristol, Philadelphia: Institute of Physics Publishing.

    Google Scholar 

  • Mossberger, K., Tolbert, C.J., and Stansbury, M. (2003) Virtual Inequality: Beyond the Digital Divide, Washington DC: Georgetown University Press.

    Google Scholar 

  • Pear, R, (2004) In a Shift, Bush Moves to Block Medical Suits. http://query.nytimes.com/gst/ fullpage.html?sec=health&res=9B05EED6173DF936A15754C0A9629C8B63 (accessed on 14th August 2007).

  • Raessens, B. (2001) E-Business, Your Business. Utrecht: Lemma.

    Google Scholar 

  • Schaller, R.R. (1997) Moore’s Law: Past, Present and Future, Spectrum, IEEE, Volume 34, June 1997, pp. 52–59.

    Article  Google Scholar 

  • Van Dijk J.A.G.M. (2005) The Deepening Divide: Inequality in the Information Society, Thousand Oaks CA: Sage Publications.

    Google Scholar 

  • Vedder, A. (2002) What people think about the reliability of medical information on the Internet. In: I. Alvarez, T. Ward Bynum, J. Alvaro de Assis Lopes, and S. Rogerson, (eds.) The Transformation of Organisations in the Information Age: Social and Ethical Implications.Lisboa: Universidade Lusiada, pp. 281–292.

    Google Scholar 

  • Vedder, A. (2005) Expert knowledge for non-experts: Inherent and contextual risks of misinformation. ICES, Journal of Information, Communication and Ethics in Society, 3, 113–119.

    Google Scholar 

  • Vedder, A. and Robert W. (2003) Reliability of information on the Internet: Some distinctions. Ethics and Information Technology,5, pp. 211–215.

    Article  Google Scholar 

  • Vedder, A. and Daan L. (2006) Reliability and security of information. Journal for Information, Communication and Ethics in Society, 4(1), pp. 3–6.

    Google Scholar 

  • Vedder, A.H. et al. (2007) Van Privacyparadijs tot Controlestaat? Misdaad- en Terreurbestrijding in Nederland aan het Begin van de 21ste eeuw. Studies Rathenau Instituut (Ext. rep. 49). Den Haag: Rathenau Instituut.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media B.V.

About this chapter

Cite this chapter

Vedder, A., Custers, B. (2009). Whose Responsibility Is It Anyway? Dealing with the Consequences of New Technologies. In: Sollie, P., Düwell, M. (eds) Evaluating New Technologies. The International Library of Ethics, Law and Technology, vol 3. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-2229-5_3

Download citation

Publish with us

Policies and ethics