{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:55:31Z","timestamp":1777895731936,"version":"3.51.4"},"reference-count":71,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7,1]]},"abstract":"<p>Notwithstanding the potential of IoT to revolutionise our personal and social lives, the absence of a solid framework of ethics may lead to situations where smart devices are used in ways uncongenial to the moral fabric of a society. In this work, the authors seek to provide a conceptual framework toward incorporating ethics in IoT. They employ the concept of object for each smart device in order to represent ethics relevant to its context. Moreover, the authors propose dedicating a separate ethics layer in the protocol stack of smart devices to account for socio-cultural ethical aspects of a society. The ethics layer enables us to account for ethical responsibilities of smart devices vis-a-vis society so that inadvertent physical, emotional or psychological harm to human beings is avoided. Such mechanism ensures that devices operate ethically not only at individual level but also at D2D level to give rise to high order ethical structures e.g. ethical home, ethical office, ethical university, ethical city, etc.<\/p>","DOI":"10.4018\/ijt.2018070106","type":"journal-article","created":{"date-parts":[[2018,6,28]],"date-time":"2018-06-28T13:45:52Z","timestamp":1530193552000},"page":"62-76","source":"Crossref","is-referenced-by-count":5,"title":["Eventuality of an Apartheid State of Things"],"prefix":"10.4018","volume":"9","author":[{"given":"Sahil","family":"Sholla","sequence":"first","affiliation":[{"name":"Computer Science and Engineering Department, National Institute of Technology Srinagar, India"}]},{"given":"Roohie Naaz","family":"Mir","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, National Institute of Technology Srinagar, India"}]},{"given":"Mohammad Ahsan","family":"Chishti","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, National Institute of Technology Srinagar, India"}]}],"member":"2432","reference":[{"key":"IJT.2018070106-0","unstructured":"Alexander, L. (2016, April). Do Google\u2019s \u201cunprofessional hair\u201d results show it is racist? The Guardian. Retrieved from www.theguardian.com\/technology\/2016\/apr\/08\/does-google-unprofessional-hair-results-prove-algorithms-racist-"},{"key":"IJT.2018070106-1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-006-0004-4"},{"key":"IJT.2018070106-2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511978036"},{"key":"IJT.2018070106-3","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2006.64"},{"key":"IJT.2018070106-4","first-page":"1759","article-title":"MedEthEx\u202f: A Prototype Medical Ethics Advisor.","volume":"Vol. 2,","author":"M.Anderson","year":"2006","journal-title":"Proceedings of the 18th conference on Innovative applications of artificial intelligence"},{"key":"IJT.2018070106-5","unstructured":"Crawford, K. (2016, June). Artificial Intelligence\u2019s White Guy Problem. The New York Times. Retrieved from https:\/\/www.nytimes.com\/2016\/06\/26\/opinion\/sunday\/artificial-intelligences-white-guy-problem.html"},{"key":"IJT.2018070106-6","unstructured":"Asilomar. (2017). A. I. Principles. Retrieved July 30, 2017, from https:\/\/futureoflife.org\/ai-principles\/"},{"key":"IJT.2018070106-7","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-016-9754-5"},{"key":"IJT.2018070106-8","doi-asserted-by":"publisher","DOI":"10.1145\/3036698"},{"key":"IJT.2018070106-9","doi-asserted-by":"crossref","unstructured":"Bertrand, M., & Mullainathan, S. (2003). Are Emily and Greg More Employable than Lakisha And Jamal? A Field Experiment on Labor Market Discrimination. NBER. Retrieved from http:\/\/www.nber.org\/papers\/w9873","DOI":"10.3386\/w9873"},{"key":"IJT.2018070106-10","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2014.2301854"},{"key":"IJT.2018070106-11","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139046855.020"},{"key":"IJT.2018070106-12","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2006.82"},{"key":"IJT.2018070106-13","unstructured":"Brown, I., Crump, J., Boos, D., Dutton, W., Kinder, K., & Kortuem, G. \u2026 Marshall, R. (2013). The Societal Impact of the Internet of Things. BCS, 14. Retrieved from http:\/\/www.bcs.org\/upload\/pdf\/societal-impact-report-feb13.pdf"},{"key":"IJT.2018070106-14","doi-asserted-by":"publisher","DOI":"10.5840\/monist197760134"},{"key":"IJT.2018070106-15","unstructured":"Burrows, L. (2016, September). What artificial intelligence will look like in 2030. Harvard Gazette. Retrieved from news.harvard.edu\/gazette\/story\/2016\/09\/what-artificial-intelligence-will-look-like-in-2030\/"},{"key":"IJT.2018070106-16","doi-asserted-by":"publisher","DOI":"10.1126\/science.aal4230"},{"key":"IJT.2018070106-17","unstructured":"Chatila, R., Firth-Butterfield, K., & Karachalios, J. C. H. K. (2017, March). IEEE Global Initiative Aims to Advance Ethical Design of AI and Autonomous Systems. IEEE Spectrum. Retrieved from http:\/\/spectrum.ieee.org\/automaton\/robotics\/artificial-intelligence\/ieee-global-initiative-ethical-design-ai-and-autonomous-systems"},{"issue":"5","key":"IJT.2018070106-18","doi-asserted-by":"crossref","first-page":"249","DOI":"10.3103\/S0005105510050031","article-title":"On the brink of the information society.","volume":"44","author":"A. I.Chernyi","year":"2010","journal-title":"Automatic Documentation and Mathematical Linguistics"},{"key":"IJT.2018070106-19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"IJT.2018070106-20","doi-asserted-by":"publisher","DOI":"10.1145\/2838739.2838834"},{"key":"IJT.2018070106-21","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2016.7473148"},{"key":"IJT.2018070106-22","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-018-9450-z"},{"key":"IJT.2018070106-23","doi-asserted-by":"publisher","DOI":"10.1007\/s10506-011-9112-5"},{"key":"IJT.2018070106-24","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2015.43"},{"key":"IJT.2018070106-25","doi-asserted-by":"crossref","unstructured":"Edelman, B., & Luca, M. (2014). Digital Discrimination: The Case of Airbnb.com. HBS. Retrieved from http:\/\/www.hbs.edu\/faculty\/PublicationFiles\/Airbnb_92dd6086-6e46-4eaf-9cea-60fe5ba3c596.pdf","DOI":"10.2139\/ssrn.2377353"},{"key":"IJT.2018070106-26","unstructured":"Forster, K. (2016, May). More than 30 men \u201crape teenage girl in Rio\u201d and post video on Twitter. The Independent. Retrieved from http:\/\/www.independent.co.uk\/news\/world\/americas\/rio-olympics-rape-girl-video-twitter-twitter-video-uploaded-a7052106.html"},{"key":"IJT.2018070106-27","author":"B.Friedman","year":"1997","journal-title":"Human values and the design of computer technology"},{"key":"IJT.2018070106-28","unstructured":"Friedman, B., Kahn Jr., P. H., & Borning, A. (2006). Value Sensitive Design and Information Systems. Human-Computer Interaction and Management Information Systems: Foundations, 1-27."},{"key":"IJT.2018070106-29","doi-asserted-by":"publisher","DOI":"10.1145\/230538.230561"},{"key":"IJT.2018070106-30","unstructured":"German parents told to destroy Cayla dolls over hacking fears. (2017, February). BBC News. Retrieved from http:\/\/www.bbc.com\/news\/world-europe-39002142"},{"key":"IJT.2018070106-31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05990-7_9"},{"key":"IJT.2018070106-32","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2016.7473149"},{"key":"IJT.2018070106-33","unstructured":"Drozdiak, N. & Schechner, S. (2017, June). Google slapped with $2.7 Billion EU Fine Over Search Results. The Wall Street Journal. Retrieved from www.wsj.com\/articles\/google-slapped-with-2-7-billion-eu-fine-over-search-results-1498556971"},{"key":"IJT.2018070106-34","unstructured":"Haag, A., Mills, K. & Hepkins, F. (2014). The Human Rights Implications of Killer Robots. Human Rights Watch. Retrieved August 7, 2017, from https:\/\/www.hrw.org\/report\/2014\/05\/12\/shaking-foundations\/human-rights-implications-killer-robots"},{"key":"IJT.2018070106-35","unstructured":"Hart, R. (2017, July). If you\u2019re not a white male, artificial intelligence\u2019s use in healthcare could be dangerous. Quartz."},{"key":"IJT.2018070106-36","unstructured":"Hewlett-Packard. (2015). Internet of Things Research Study 2015 Report, 6. Retrieved from http:\/\/www8.hp.com\/h20195\/V2\/GetPDF.aspx\/4AA5-4759ENW.pdf"},{"key":"IJT.2018070106-37","unstructured":"Honolulu bans texting while crossing streets in bid to curb injuries. (2017, July). BBC News. Retrieved from http:\/\/www.bbc.com\/news\/world-us-canada-40765087"},{"key":"IJT.2018070106-38","doi-asserted-by":"publisher","DOI":"10.1126\/science.aal1053"},{"key":"IJT.2018070106-39","unstructured":"Impact of automation on developing countries puts up to 85% of jobs at risk. (2016, January). Oxford Martin School. Retrieved from https:\/\/www.oxfordmartin.ox.ac.uk\/news\/201601_Technology_at_Work_2"},{"key":"IJT.2018070106-40","author":"S.Jasanoff","year":"2016","journal-title":"The Ethics of Invention: Technology and the Human Future"},{"key":"IJT.2018070106-41","author":"P.Lin","year":"2011","journal-title":"Robot ethics: the ethical and social implications of robotics"},{"key":"IJT.2018070106-42","doi-asserted-by":"publisher","DOI":"10.1332\/policypress\/9781847428837.001.0001"},{"key":"IJT.2018070106-43","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-022-6.ch001"},{"key":"IJT.2018070106-44","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-022-6"},{"key":"IJT.2018070106-45","doi-asserted-by":"publisher","DOI":"10.4018\/ijt.2015010105"},{"key":"IJT.2018070106-46","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-015-9367-8"},{"key":"IJT.2018070106-47","unstructured":"Manyika, J., Chui, M., Bughin, J., Dobbs, R., Bisson, P., & Marrs. (2013). Disruptive technologies: Advances that will transform life, business, and the global economy. McKinsey Global Institute, (May), 163. Retrieved from http:\/\/www.mckinsey.com\/insights\/business_technology\/disruptive_technologies%5Cnhttp:\/\/www.chrysalixevc.com\/pdfs\/mckinsey_may2013.pdf"},{"key":"IJT.2018070106-48","doi-asserted-by":"publisher","DOI":"10.1177\/0020852314564308"},{"key":"IJT.2018070106-49","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I.2014.7019829"},{"key":"IJT.2018070106-50","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2015.2393007"},{"key":"IJT.2018070106-51","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2498304"},{"key":"IJT.2018070106-52","author":"C.O\u2019Neil","year":"2016","journal-title":"Weapons of math destruction: How big data increases inequality and threatens democracy"},{"key":"IJT.2018070106-53","unstructured":"Orcutt, M. (2016, December). Security Experts Warn Congress That the Internet of Things Could Kill People. MIT Technology Review. Retrieved from https:\/\/www.technologyreview.com\/s\/603015\/security-experts-warn-congress-that-the-internet-of-things-could-kill-people\/"},{"key":"IJT.2018070106-54","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1140.001.0001","author":"R. W.Picard","year":"2000","journal-title":"Affective computing"},{"key":"IJT.2018070106-55","unstructured":"Police drone can be hacked with $40 kit, says researcher. (2016, March). BBC News. Retrieved from http:\/\/www.bbc.com\/news\/technology-35709676"},{"key":"IJT.2018070106-56","unstructured":"Radcliffe, J. (2011). Hacking medical devices for fun and insulin: Breaking the human SCADA system. In Black Hat Conference Presentation Slides. Retrieved from https:\/\/media.blackhat.com\/bh-us-11\/Radcliffe\/BH_US_11_Radcliffe_Hacking_Medical_Devices_WP.pdf"},{"key":"IJT.2018070106-57","unstructured":"Report of the 2016 Informal Meeting of Experts on Lethal Autnomous Weapons Systems (LAWS): United Nations. (2016). Retrieved from https:\/\/www.unog.ch"},{"key":"IJT.2018070106-58","doi-asserted-by":"crossref","unstructured":"Ridley-siegert, T. (2015). Data privacy: What the consumer really thinks. Journal of Direct, Data and Digital Marketing Practice, 17(1), 30\u201335.","DOI":"10.1057\/dddmp.2015.40"},{"key":"IJT.2018070106-59","unstructured":"Sandvig, C., Hamilton, K., Karahalios, K., & Langbort2, C. (2014). Auditing Algorithms\u202f: Research Methods for Detecting Discrimination on Internet Platforms. In \u201cData and Discrimination: Converting Critical Concerns into Productive Inquiry,\u201d a preconference at the 64th Annual Meeting of the International Communication Association, Seattle, WA (pp. 1\u201323)."},{"key":"IJT.2018070106-60","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2017.7942323"},{"key":"IJT.2018070106-61","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2017.93"},{"key":"IJT.2018070106-62","unstructured":"Stanford University. (2016). Artificial Intelligence and Life in 2030. Retrieved from https:\/\/ai100.stanford.edu\/"},{"key":"IJT.2018070106-63","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-022-6.ch014"},{"key":"IJT.2018070106-64","doi-asserted-by":"publisher","DOI":"10.1145\/2460276.2460278"},{"key":"IJT.2018070106-65","unstructured":"Valasek, C., & Miller, C. (2013). Adventures in Automotive Networks and Control Units. Technical White Paper, 99. Retrieved from http:\/\/www.ioactive.com\/pdfs\/IOActive_Adventures_in_Automotive_Networks_and_Control_Units.pdf"},{"key":"IJT.2018070106-66","unstructured":"Valentino-Devries, J., Singer-Vine, J., & Soltani, A. (2012, December). Websites Vary Prices, Deals Based on Users\u2019 Information. The Wall Street Journal. Retrieved from www.wsj.com\/articles\/SB10001424127887323777204578189391813881534"},{"key":"IJT.2018070106-67","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-6970-0"},{"key":"IJT.2018070106-68","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195374049.001.0001"},{"key":"IJT.2018070106-69","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2017.2670223"},{"key":"IJT.2018070106-70","author":"K. S.Young","year":"2011","journal-title":"Internet addiction: A handbook and guide to evaluation and treatment. Internet addiction: A handbook and guide to evaluation and treatment"}],"container-title":["International Journal of Technoethics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=208950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T00:07:39Z","timestamp":1651882059000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJT.2018070106"}},"subtitle":["An Ethical Perspective on the Internet of Things"],"short-title":[],"issued":{"date-parts":[[2018,7,1]]},"references-count":71,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijt.2018070106","relation":{},"ISSN":["1947-3451","1947-346X"],"issn-type":[{"value":"1947-3451","type":"print"},{"value":"1947-346X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,1]]}}}