Responsible Computing Research Report

A Consensus Study Report

Earlier this year (2022) The committee on Responsible Computing Research of the National Academies of Sciences, Engineering and Medicine in the USA published a Consensus Study Report entitled Fostering Responsible Computing Research, Foundations and

The Committee members predominantly came from US universities (with one representative from Australia), but also included representatives from Microsoft, Google and the Carnegie Endowment for International Peace. It is a 100 page document, but the following conclusions and recommendations are all to be found in the summary.

Conclusions

The process led to the committee coming to three conclusions that underpin the report recommendations:  

Conclusion 1. To be responsible, computing research needs to expand to include consideration of ethical and societal impact concerns and determination of effective ways to address them.

Conclusion 2. To be responsible, computing research needs to engage the full spectrum of stakeholders and deploy rigorous methodologies and frameworks that have proven effective for identifying the complicated social dynamics that are relevant to these ethical and societal impact concerns.

Conclusion 3. For computing technologies to be used responsibly, governments need to establish policies and regulations to protect against adverse ethical and societal impacts. Computing researchers can assist by revealing limitations of their research results and identifying possible adverse impacts and needs for government intervention.

Recommendations

Recommendation 1. The computing research community should reshape the ways computing research is formulated and undertaken to ensure that ethical and societal consequences are considered and addressed appropriately from the start.

Recommendation 2. The computing research community should initiate projects that foster responsible computing research, including research that leads to societal benefits and ethical societal impact and research that helps avoid or mitigate negative outcomes and harms. Both research sponsors and research institutions should encourage and support the pursuit of such projects.

Recommendation 3. Universities, scientific and professional societies, and research and education sponsors should support the development of the expertise needed to integrate social and behavioral science and ethical thinking into computing research.

Recommendation 4. Computing research organizations—working with scientific and professional societies and research sponsors—should ensure that their computing faculty, students, and research staff have access to scholars with the expertise to advise them in examining potential ethical and societal implications of proposed and ongoing research activities, including ways to engage relevant groups of stakeholders. Computing researchers should seek out such advice.

Recommendation 5. Sponsors of computing research should require that ethical and societal considerations be interwoven into research proposals, evaluated in proposal review, and included in project reports.

Recommendation 6. Scientific and professional societies and other publishers of computing research should take steps to ensure that ethical and societal considerations are appropriately addressed in publications. The computing research community should likewise take steps to ensure that these considerations are appropriately addressed in the public release of artifacts.

Recommendation 7. Computing researchers who are involved in the development or deployment of systems should adhere to established best practices in the computing community for system design, oversight, and monitoring.

Recommendation 8. Research sponsors, research institutions, and scientific and professional societies should encourage computing researchers to engage with the public and with the public interest and support them in doing so.

All of which makes perfect sense, so why not take a look at the report yourself? There is lots of stuff about bias in data sets and other issues that we have addressed previously and It’s free to download here.

And take a look at what Mozilla have been doing here.

Computing Within Limits

LIMITS

I have just attended LIMITS 22, the eight annual workshop on computing within limits.

As the name suggests, the workshop addresses the role of computing in human societies affected by real-world limits, for example limits of extractive logics, limits to a biosphere’s ability to recover, limits to our knowledge, or limits to technological “solutions”.

Very much tied to the interests of the TechnologyBloggers website, this collection of researchers and practitioners aim to reshape the computing research agenda, grounded by an awareness that contemporary computing research is intertwined with ecological limits in general and climate- and climate justice-related limits in particular.

This was a virtual distributed workshop, with many participants joining hubs so that they could avoid travel but still attend a social event. I touched upon this as a model in my post about conferencing a few weeks ago.

I attended one of such hubs in Rotterdam (Netherlands), held at Varia, a space for developing collective approaches to everyday technology. There were a dozen people there, computer programmers, university lecturers and students and the likes, which made for interesting discussion during the break-out sessions and a very nice social mix.

I won’t go into the individual presentations too much, but would like to highlight a few of the questions addressed and point readers towards some resources.

What is the carbon footprint of streaming media?

Researchers estimate that streaming media accounts for about 1% of global carbon emissions. These emissions are created throughout the chain, with only a small percentage visible to users (the electricity that appears on their household bills), the vast majority hidden as it is produced during data storage, cooling, delivery, maintaining back-up systems and during a miriad of other processes (not to mention construction, mining of raw materials, etc).

This website offers lots of information, beginning with the startling revelation that ICT in general is estimated to use about 7% of all electricity used, so may contribute (depending how the electricity is produced) to up to almost 4% of global greenhouse gasses.

So the actual carbon footprint is very difficult to measure, with a range offered for watching a streamed film as equivalent to burning between 1.2 and 164 kilos of coal (depending on your calculations and not the film).

The large data centres providers often claim that they use clean energy for their centres, but this was also questioned as their mass use of this energy has been shown to monopolize access, at very least having an enormous effect on the local networks and sometimes resulting in others having to use fossil fonts,. Their green claims were described as cherry-picked.

Digital platforms

Well we all love a digital platform don’t we? Facilitating car sharing, what could be better than that? Well even here a critical perspective appears, as we have to add ICT emissions to real emissions if calculating the possible environmental implications. And not only that! For example, using one car instead of two halves the emissions for analytical purposes, but on top of this we should add the ICT emissions (which as we know are difficult to work out). But we can come up with an estimate. Then behavioural change might also come into play. People might drive further because they are sharing, some will share a car and leave the bike at home or not take the usual train. It all becomes rather murky.

Other discussions

Other questions arose: what are the implications of framing the discussion in terms of limits, rather than abundance? Could such a reframing bring in an ethics of care? Can we discuss the relationship between humans and nature and its ties to capitalism? What role can religion take? How important are imaginaries of the (technological) future? Does the public have the information required to understand the environmental implications of their choices?

As you can see, it was very stimulating.

Check out this website for a perspective.

And the Chaos Computer Club for another.

The papers are all available here so fill your boots.

What’s in Your Computer (and phone, and WiFi)?

gates

Lenovo

This week the news is full of Lenovo, a computer manufacturer that has been selling machines that they have already fitted with what some call Malware or just Adware. Magic in the machine indeed!

The mal/adware in question is made by a company called “Superfish.” The software is essentially an Internet browser add-on that injects ads onto websites you visit. Details here.

Besides taking up space in your computer, the add-on is also dangerous because it undermines basic computer security protocols.

That’s because it tampers with a widely-used system of official website certificates. That makes it hard for your computer to recognize a fake bank website. This means that you are more likely to give all of your personal data away, let nasty things into your computer, and allow people to monitor your use.

No good I hear you say, and all so that they can feed you adverts while you are browsing.

Hidden Extras?

But this news does bring up another question, what else is in the computer? What else is it programmed to do? The simple answer is that I and probably most of you do not know. We have bought a machine that does the things we want it to do, but who knows what else?

Now as I eat my breakfast, I like to read the ingredients on the side of the packet. It is good for language skills as it is usually in several languages. But can I do this with my computer? You don’t get much in the way of documentation with a $400 laptop. Certainly not considering what is inside it.

So the computer company in question have disabled something at their end and the problem is resolved. But if they tell you that they fixed the problem are you going to believe them? After they did something that put your computer and everything saved on it at risk? Or should you put a new operating system on the new machine, wipe the hard drive and start again?

Why do we trust these manufacturers when they consistently do things that are not in our interest? WiFi providers that con your computer into trusting fake certificates so that they can block certain sites (and read your mail or follow your searches)? Samsung that record your voice through your smart TV and send it non encrypted over the Internet to unnamed third parties, social media sites and search engines that collect your data, mobile phone companies that map your every movement, the list goes on.

So if you cannot trust wifi, or computer manufacturers, or Google, or Facebook, or Samsung to treat our data securely and correctly, who can you trust? And more to the point why are we giving them our lives to play with?