D. Gordon, I. Stavrakakis, John Paul Gibson, Brendan Tierney, A. Becevel, A. Curley, M. Collins, W. O'Mahony, D. O’Sullivan
{"title":"Perspectives on computing ethics: a multi-stakeholder analysis","authors":"D. Gordon, I. Stavrakakis, John Paul Gibson, Brendan Tierney, A. Becevel, A. Curley, M. Collins, W. O'Mahony, D. O’Sullivan","doi":"10.1108/jices-12-2020-0127","DOIUrl":"https://doi.org/10.1108/jices-12-2020-0127","url":null,"abstract":"\u0000Purpose\u0000Computing ethics represents a long established, yet rapidly evolving, discipline that grows in complexity and scope on a near-daily basis. Therefore, to help understand some of that scope it is essential to incorporate a range of perspectives, from a range of stakeholders, on current and emerging ethical challenges associated with computer technology. This study aims to achieve this by using, a three-pronged, stakeholder analysis of Computer Science academics, ICT industry professionals, and citizen groups was undertaken to explore what they consider to be crucial computing ethics concerns. The overlap between these stakeholder groups are explored, as well as whether their concerns are reflected in the existing literature.\u0000\u0000\u0000Design/methodology/approach\u0000Data collection was performed using focus groups, and the data was analysed using a thematic analysis. The data was also analysed to determine if there were overlaps between the literature and the stakeholders’ concerns and attitudes towards computing ethics.\u0000\u0000\u0000Findings\u0000The results of the focus group analysis show a mixture of overlapping concerns between the different groups, as well as some concerns that are unique to each of the specific groups. All groups stressed the importance of data as a key topic in computing ethics. This includes concerns around the accuracy, completeness and representativeness of data sets used to develop computing applications. Academics were concerned with the best ways to teach computing ethics to university students. Industry professionals believed that a lack of diversity in software teams resulted in important questions not being asked during design and development. Citizens discussed at length the negative and unexpected impacts of social media applications. These are all topics that have gained broad coverage in the literature.\u0000\u0000\u0000Social implications\u0000In recent years, the impact of ICT on society and the environment at large has grown tremendously. From this fast-paced growth, a myriad of ethical concerns have arisen. The analysis aims to shed light on what a diverse group of stakeholders consider the most important social impacts of technology and whether these concerns are reflected in the literature on computing ethics. The outcomes of this analysis will form the basis for new teaching content that will be developed in future to help illuminate and address these concerns.\u0000\u0000\u0000Originality/value\u0000The multi-stakeholder analysis provides individual and differing perspectives on the issues related to the rapidly evolving discipline of computing ethics.\u0000","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132987672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ethical aspects of voice assistants: a critical discourse analysis of Indonesian media texts","authors":"Anisa Aini Arifin, T. Lennerfors","doi":"10.1108/jices-12-2020-0118","DOIUrl":"https://doi.org/10.1108/jices-12-2020-0118","url":null,"abstract":"Purpose\u0000Voice assistant (VA) technology is one of the fastest-growing artificial intelligence applications at present. However, the burgeoning scholarship argues that there are ethical challenges relating to this new technology, not the least related to privacy, which affects the technology’s acceptance. Given that the media impacts public opinion and acceptance of VA and that there are no studies on media coverage of VA, the study focuses on media coverage. In addition, this study aims to focus on media coverage in Indonesia, a country that has been underrepresented in earlier research.\u0000\u0000\u0000Design/methodology/approach\u0000The authors used critical discourse analysis of media texts, focusing on three levels (text, discourse practice and social practice) to study how VA technology was discussed in the Indonesian context and what power relations frame the representation. In total, 501 articles were collected from seven national media in Indonesia from 2010 to 2020 and the authors particularly focus on the 45 articles that concern ethics.\u0000\u0000\u0000Findings\u0000The ethical topics covered are gender issues, false marketing, ethical wrongdoing, ethically positive effects, misuse, privacy and security. More importantly, when they are discussed, they are presented as presenting no real critical problem. Regarding discursive practices, the media coverage is highly influenced by foreign media and most of the articles are directed to well-educated Indonesians. Finally, regarding social practices, the authors hold that the government ideology of technological advancement is related to this positive portrayal of VAs.\u0000\u0000\u0000Originality/value\u0000First, to provide the first media discourse study about ethical issues of VAs. Second, to provide insights from a non-Western context, namely, Indonesia, which is underrepresented in the research on ethics of VAs.","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126485981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Bidegain, A. Sagasta, Koldo Diaz Bizkarguenaga, Aitor Zuberogoitia, Eneko Antón, I. Rozas
{"title":"Youth and online privacy: a cross-border study in the Basque Country","authors":"E. Bidegain, A. Sagasta, Koldo Diaz Bizkarguenaga, Aitor Zuberogoitia, Eneko Antón, I. Rozas","doi":"10.1108/jices-06-2021-0069","DOIUrl":"https://doi.org/10.1108/jices-06-2021-0069","url":null,"abstract":"\u0000Purpose\u0000This study aims to explore the main concerns and attitudes Basque adolescents have regarding online privacy. It analyzes their motivations for sharing private information and the kind of information they share. Likewise, it examines whether they consider the potential consequences of revealing certain information online and analyzes if there are any differences between the motivations and attitudes of young people from Gipuzkoa and Labourd.\u0000\u0000\u0000Design/methodology/approach\u0000For this study, three methods were combined to collect the data in 17 schools in the Basque provinces of Gipuzkoa and Labourd: a survey carried out among 1,133 students, out of which 242 also completed a diary and 482 took part in discussion groups.\u0000\u0000\u0000Findings\u0000The data from this research does not fully support the “youth cultures of disclosure” (James, 2009) in the Basque Country; however, some of these practices have been observed.\u0000\u0000\u0000Originality/value\u0000Time spent online by adolescents has increased sharply in recent years. This increase has brought with it concerns about youth’s level of awareness regarding online privacy. This is the first cross-border study conducted in the Basque Country addressing this topic (in the Basque Autonomous Community, administratively belonging to Spanish territory, and in the Northern Basque Country, administratively in French territory).\u0000","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130987107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Young adults know that their issues are not represented in the news: Israeli young adults and mainstream news media","authors":"Benny Nuriely, M. Gigi, Yuval Gozansky","doi":"10.1108/jices-02-2021-0026","DOIUrl":"https://doi.org/10.1108/jices-02-2021-0026","url":null,"abstract":"\u0000Purpose\u0000This paper aims to analyze the ways socio-economic issues are represented in mainstream news media and how it is consumed, understood and interpreted by Israeli young adults (YAs). It examines how mainstream media uses neo-liberal discourse, and the ways YAs internalize this ethic, while simultaneously finding ways to overcome its limitations.\u0000\u0000\u0000Design/methodology/approach\u0000This was a mixed methods study. First, it undertook content analysis of the most popular Israeli mainstream news media among YAs: the online news site Ynet and the TV Channel 2 news. Second, the authors undertook semi-structured in-depth interviews with 29 Israeli YAs. The analysis is based on an online survey of 600 young Israelis, aged 18–35 years.\u0000\u0000\u0000Findings\u0000Most YAs did not perceive mainstream media as enabling a reliable understanding of the issues important to them. The content analysis revealed that self-representation of YAs is rare, and that their issues were explained, and even resolved, by older adults. Furthermore, most of YAs' problems in mainstream news media were presented using a neo-liberal perspective. Finally, from the interviews, the authors learned that YAs did not find information that could help them deal with their most pressing economic and social issue, in the content offered by mainstream media. For most of them, social media overcomes these shortcomings.\u0000\u0000\u0000Originality/value\u0000Contrary to research that has explored YAs’ consumerism of new media outlets, this article explores how YAs in Israel are constructed in the media, as well as the way in which YAs understand mainstream and new social media coverage of the issues most important to them. Using media content analysis and interviews, the authors found that Young Adults tend to be ambivalent toward media coverage. They understand the lack of media information: most of them know that they do not learn enough from the media. This acknowledgment accompanies their tendency to internalize the neo-liberal logic and conservative Israeli national culture, in which class and economic redistribution are largely overlooked. Mainstream news media uses neo-liberal discourse, and young adults internalize this logic, while simultaneously finding ways to overcome the limitations this discourse offers. They do so by turning to social media, mainly Facebook. Consequently, their behavior maintains the logic of the market, while also developing new social relations, enabled by social media.\u0000","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122382734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a political theory of data justice: a public good perspective","authors":"Chi-ying Kwok, Ngai Keung Chan","doi":"10.1108/jices-11-2020-0117","DOIUrl":"https://doi.org/10.1108/jices-11-2020-0117","url":null,"abstract":"\u0000Purpose\u0000This study aims to develop an interdisciplinary political theory of data justice by connecting three major political theories of the public good with empirical studies about the functions of big data and offering normative principles for restricting and guiding the state’s data practices from a public good perspective.\u0000\u0000\u0000Design/methodology/approach\u0000Drawing on three major political theories of the public good – the market failure approach, the basic rights approach and the democratic approach – and critical data studies, this study synthesizes existing studies on the promises and perils of big data for public good purposes. The outcome is a conceptual paper that maps philosophical discussions about the conditions under which the state has a legitimate right to collect and use big data for public goods purposes.\u0000\u0000\u0000Findings\u0000This study argues that market failure, basic rights protection and deepening democracy can be normative grounds for justifying the state’s right to data collection and utilization, from the perspective of political theories of the public good. The state’s data practices, however, should be guided by three political principles, namely, the principle of transparency and accountability; the principle of fairness; and the principle of democratic legitimacy. The paper draws on empirical studies and practical examples to explicate these principles.\u0000\u0000\u0000Originality/value\u0000Bringing together normative political theory and critical data studies, this study contributes to a more philosophically rigorous understanding of how and why big data should be used for public good purposes while discussing the normative boundaries of such data practices.\u0000","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114729323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust in technology: interlocking trust concepts for privacy respecting video surveillance","authors":"Sebastian Weydner-Volkmann, Linus Feiten","doi":"10.1108/jices-12-2020-0128","DOIUrl":"https://doi.org/10.1108/jices-12-2020-0128","url":null,"abstract":"\u0000Purpose\u0000The purpose of this paper is to defend the notion of “trust in technology” against the philosophical view that this concept is misled and unsuitable for ethical evaluation. In contrast, it is shown that “trustworthy technology” addresses a critical societal need in the digital age as it is inclusive of IT-security risks not only from a technical but also from a public layperson perspective.\u0000\u0000\u0000Design/methodology/approach\u0000From an interdisciplinary perspective between philosophy andIT-security, the authors discuss a potential instantiation of a “trustworthy information and communication technology (ICT)”: a solution for privacy respecting video surveillance. Here, strong data protection measures address grave concerns such as the threat of bulk biometric tracking of citizens. In a logical argument, however, the authors show that this technical notion of “trust” needs to be complemented by interlocking trust relations to justify public trust.\u0000\u0000\u0000Findings\u0000Based on this argument, the authors demonstrate that the philosophical position considering “trust in technology” to denote either “reliability” or “interpersonal trust” is too limited as it fails to address critical aspects of IT-security. In a broader, socio-technical sense, however, it is shown that several distinct accounts of trust – technical, interpersonal and institutional – should meaningfully interlock, to address concerns with ICTs.\u0000\u0000\u0000Originality/value\u0000This conceptual study demonstrates the potential of “trust in technology” for a more comprehensive evaluation of ICTs within the context of operation. Furthermore, it adds to the discussion of trust in IT-security by highlighting the layperson’s challenge of judging a technology’s trustworthiness. Vice versa, it contributes to Ethics of Technology by highlighting crucial IT-security needs.\u0000","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126326881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discovering social media topics and patterns in the coronavirus and election era","authors":"M. Hashemi","doi":"10.1108/JICES-04-2021-0039","DOIUrl":"https://doi.org/10.1108/JICES-04-2021-0039","url":null,"abstract":"\u0000Purpose\u0000This study aims to understand the relationship between politics and pandemics in shaping the characteristics and themes of people’s Tweets during the US 2020 presidential election. Additionally, the purpose is to detect misinformation and extremism, not only to help online social networks (OSN) to target such content more rapidly but also to provide a close to real-time picture of trending topics, misinformation, and extremism flowing on OSN. This could help authorities to identify the intents behind them and find out how and when they should address such content.\u0000\u0000\u0000Design/methodology/approach\u0000This study focuses on extracting and verifying knowledge from large-scale OSN data, at the intersection of the Coronavirus pandemic and the US 2020 presidential election. More specifically, this study makes manual, statistical and automatic inferences and extracts knowledge from over a million Tweets related to the two aforementioned major events. On the other hand, disinformation operations intensified in 2020 with the coincidence of the Coronavirus pandemic and presidential election. This study applies machine learning to detect misinformation and extreme opinions on OSN. Over one million Tweets have been collected by our server in real-time from the beginning of April 2020 to the end of January 2021, using six keywords, namely, Covid, Corona, Trump, Biden, Democrats and Republicans. These Tweets are inspected with regard to their topics, opinions, news, and political affiliation, along with misinformation and extremism.\u0000\u0000\u0000Findings\u0000Our analyses showed that the majority of these Tweets concern death tolls, testing, mask, drugs, vaccine, and travel bans. The second concern among these Tweets is reopening the economy and schools, unemployment, and stimulus bills. The third concern is related to the Coronavirus pandemic’s impacts on politics, voting, and misinformation. This highlights the topics that US voters on Twitter were most concerned about during this time period, among the multitude of other topics that politicians and news media were reporting or discussing. Automatic classification of these Tweets using a long short-term memory network revealed that Tweets containing misinformation formed between 0.5% and 1.1% of Coronavirus-related Tweets every month and Tweets containing extreme opinions formed between 0.5% and 3.1% of them every month, with its pick in October 2020, coinciding with the US presidential election month.\u0000\u0000\u0000Originality/value\u0000The originality of this study lies in establishing a framework to collect, process, and classify OSN data to detect misinformation and extremism and to provide a close to real-time picture of trending topics, misinformation, and extremism flowing on OSN.\u0000","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121671452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Four challenges to Confucian virtue ethics in technology","authors":"Morten Bay","doi":"10.1108/jices-01-2021-0004","DOIUrl":"https://doi.org/10.1108/jices-01-2021-0004","url":null,"abstract":"\u0000Purpose\u0000As interest in technology ethics is increasing, so is the interest in bringing schools of ethics from non-Western philosophical traditions to the field, particularly when it comes to information and communication technology. In light of this development and recent publications that result from it, this paper aims to present responds critically to recent work on Confucian virtue ethics (CVE) and technology.\u0000\u0000\u0000Design/methodology/approach\u0000Four critiques are presented as theoretical challenges to CVE in technology, claiming that current literature insufficiently addresses: overall applicability, collective ethics issues, epistemic overconfidence within technology corporations and amplification of epistemic overconfidence by the implementation of CVE. These challenges make use of general CVE literature and work on technology critique, political philosophy, epistemology and business ethics.\u0000\u0000\u0000Findings\u0000Implementing CVE in technology may yield some benefits, but these may be outweighed by other outcomes, include strengthening hierarchies, widening inequities, increasing, rather than limiting, predictive activity, personal data collection, misinformation, privacy violations and challenges to the democratic process.\u0000\u0000\u0000Originality/value\u0000Though not directly advocating against CVE, the paper reveals hitherto unidentified and serious issues that should be addressed before CVE are used to inform ethics guidelines or regulatory policies. It also serves as a foundation for further inquiry into how Eastern philosophy more broadly can inform technology ethics in the West.\u0000","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133807556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"What small businesses in developing country think of cybersecurity risks in the digital age: Indonesian case","authors":"Ratna Yudhiyati, Afrida Putritama, Diana Rahmawati","doi":"10.1108/jices-03-2021-0035","DOIUrl":"https://doi.org/10.1108/jices-03-2021-0035","url":null,"abstract":"\u0000Purpose\u0000This study aims to identify and analyse the issues faced by internet-based small businesses in developing countries regarding cybersecurity and document how these businesses address the risks.\u0000\u0000\u0000Design/methodology/approach\u0000This study used the qualitative method. Respondents were internet-based small businesses selected by using theoretical sampling. Data were collected by using interviews and observations. The validity of the analysis was ensured by using triangulation and member checking.\u0000\u0000\u0000Findings\u0000This study reveals that small businesses managed to identify the loss of physical and monetary assets as possible damage. However, only a few businesses identified loss of intangible assets as possible cyber risks. Most small businesses had used basic cybersecurity measures to protect data access and some primary business activities. Unfortunately, they rarely take initiatives in preventing and early detecting cyber risks.\u0000\u0000\u0000Research limitations/implications\u0000Findings of this study cannot be generalised as it aims to obtain new insights and document unexplored findings. Thus, if this study’s findings are going to be generalised, it is necessary to conduct an additional study. Secondly, this study did not assess how far small business had fulfilled the relevant information security framework as assessment required additional research, and this study only aimed to map the current situation in small businesses.\u0000\u0000\u0000Practical implications\u0000This study emphasised the importance of identifying valuable assets or resources when implementing cybersecurity measures. Focusing on security measures to protect identified assets from cyber risk will make the efforts more efficient and effective than using standardised cybersecurity measures. Third-party developers can also use this study to understand small businesses’ current cybersecurity implementation and their characters to design online platforms that suit these needs. Governments can also design educational activities that address small businesses’ lack of knowledge.\u0000\u0000\u0000Originality/value\u0000Most studies which focus on small businesses and information technology (IT) usually only discuss how they use IT. This study also brings new contributions by focusing on developing countries and specifically addresses internet-based technology cyber risk faced by e-commerce businesses. The qualitative method is used as most studies in e-commerce adoption were positivistic in nature, and inductive-based studies were rarely found on the topic.\u0000","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134431007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jillian Carmody, Samir Shringarpure, Gerhard Van de Venter
{"title":"AI and privacy concerns: a smart meter case study","authors":"Jillian Carmody, Samir Shringarpure, Gerhard Van de Venter","doi":"10.1108/jices-04-2021-0042","DOIUrl":"https://doi.org/10.1108/jices-04-2021-0042","url":null,"abstract":"\u0000Purpose\u0000The purpose of this paper is to demonstrate privacy concerns arising from the rapidly increasing advancements and use of artificial intelligence (AI) technology and the challenges of existing privacy regimes to ensure the on-going protection of an individual’s sensitive private information. The authors illustrate this through a case study of energy smart meters and suggest a novel combination of four solutions to strengthen privacy protection.\u0000\u0000\u0000Design/methodology/approach\u0000The authors illustrate how, through smart meter obtained energy data, home energy providers can use AI to reveal private consumer information such as households’ electrical appliances, their time and frequency of usage, including number and model of appliance. The authors show how this data can further be combined with other data to infer sensitive personal information such as lifestyle and household income due to advances in AI technologies.\u0000\u0000\u0000Findings\u0000The authors highlight data protection and privacy concerns which are not immediately obvious to consumers due to the capabilities of advanced AI technology and its ability to extract sensitive personal information when applied to large overlapping granular data sets.\u0000\u0000\u0000Social implications\u0000The authors question the adequacy of existing privacy legislation to protect sensitive inferred consumer data from AI-driven technology. To address this, the authors suggest alternative solutions.\u0000\u0000\u0000Originality/value\u0000The original value of this paper is that it illustrates new privacy issues brought about by advances in AI, failings in current privacy legislation and implementation and opens the dialog between stakeholders to protect vulnerable consumers.\u0000","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129841760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}