Article Preview
TopIntroduction
Hyperconnectivity threats originate from the theoretically unlimited number of objects and subsystems that the IoT connects. They are therefore multi-parental, varied, and infinitely inter-infectious, with security and privacy being the most prominent at issue (Eltayeb, 2017); they are but symptomatic of the chronic and complicated data protection problem (Alohali & Vassilakis, 2017) and do not change the technology-driven information-intensive environment. The problem remains the same: hacking continues despite sophisticated countermeasures for and enormous spending on protecting data; the root cause of the problem remains the same: people are still indifferent to or disrespect ethics. The need for a pragmatic remedy becomes more pressing than ever.
Ethical Computing, the backbone of a remedial framework (Lee, 2015d), is assistive in delivering a near-ideal solution, a solution that ensures the ethical issues are identified and duly considered. Ethical Matrix, a newly added tool for sifting/analyzing/evaluating the intertwined issues/threats, identifying the stakeholders, and assembling their views against the values they hold. The precondition for operationalizing the framework is a requisite competence and an additive. The solution covers the ethical dimension of the problem and the ethical impact of the resultant action. It is therefore better than the incumbent methods adopted by industry, which miss or ignore the ethical dimension. It is good enough as it is restrictive due to the vicious circle effect – mitigating rather than eradicating; and it is henceforth an improvement to the status quo. In view of the poor results of data protection and a lack of effective method, the proposed remedial framework deserves serious consideration.