Internet of Things (20)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 16 min
- Kinolab
- 2003
In a distant future, the majority of humanity has been wiped out, and most of the planet is flooded. ECOBAN is a city which runs on technological power, avoiding destruction and pollution by using a machine which converts pollutants into power. However, Marrians, who live on the exterior of the city in the destroyed world, are responsible for performing the labor to harvest these pollutants, without any of the benefits. Essentially, Ecoban keeps its technology to itself, not sharing it with the “contaminated” underclasses. Shua, a renegade Marrian hacker, attempts to shut down the DELOS system, the technology which powers Ecoban and has destroyed the surrounding environment entirely. He ultimately succeeds in his mission, breaking the DELOS system which gave Ecobans a privileged life and at last bringing back blue skies.
- Kinolab
- 2003
Technological Regulation of the Environment and Division
In a distant future, the majority of humanity has been wiped out, and most of the planet is flooded. ECOBAN is a city which runs on technological power, avoiding destruction and pollution by using a machine which converts pollutants into power. However, Marrians, who live on the exterior of the city in the destroyed world, are responsible for performing the labor to harvest these pollutants, without any of the benefits. Essentially, Ecoban keeps its technology to itself, not sharing it with the “contaminated” underclasses. Shua, a renegade Marrian hacker, attempts to shut down the DELOS system, the technology which powers Ecoban and has destroyed the surrounding environment entirely. He ultimately succeeds in his mission, breaking the DELOS system which gave Ecobans a privileged life and at last bringing back blue skies.
How can it be ensured that technology built with the aim to reverse climate change or otherwise aid the environment helps all people, and not just certain higher classes? How can governments or leaders support “Robin Hood” hackers who disrupt technology for a greater good? Who is responsible for bridging digital divides and bringing technological equality to disadvantaged communities, and how should this be approached? How should technology be created to be accessible to all communities?
-
- 10 min
- Kinolab
- 2018
This narrative provides two different case studies of remote-controlled vehicles in the story of T’Challa’s attempts to properly rule his country, Wakanda. T’Challa, also known as the superhero Black Panther, makes use of this technology to put a stop to criminals who threaten his people and his power. In the first clip, T’Challa and his companions track down Ulysses Klaue, a notorious criminal who formerly stole from Wakanda, down the streets of Busan, Korea. In the second clip, agent Everett Ross makes use of the technology to pilot a drone, which he uses to shoot down autonomous drones carrying weapons from Wakanda to the rest of the world.
- Kinolab
- 2018
Remote Controlled Driving of Vehicles
This narrative provides two different case studies of remote-controlled vehicles in the story of T’Challa’s attempts to properly rule his country, Wakanda. T’Challa, also known as the superhero Black Panther, makes use of this technology to put a stop to criminals who threaten his people and his power. In the first clip, T’Challa and his companions track down Ulysses Klaue, a notorious criminal who formerly stole from Wakanda, down the streets of Busan, Korea. In the second clip, agent Everett Ross makes use of the technology to pilot a drone, which he uses to shoot down autonomous drones carrying weapons from Wakanda to the rest of the world.
When operating vehicles remotely, how is it easy for the driver to become desensitized to the surroundings of the vehicle? Might entertainment technology such as violent video games play a role in such desensitization? What phenomena of a street or other driving environment may or may not be abstracted into a digital map of the vehicle’s surroundings?
-
- 12 min
- Kinolab
- 1968
See HAL Part I for further context. In this narrative, astronauts Dave and Frank begin to suspect that the AI which runs their ship, HAL, is malfunctioning and must be shut down. While they try to hide this conversation from HAL, he becomes aware of their plan anyway and attempts to protect himself so that the Discovery mission in space is not jeopardized. He does so by causing chaos on the ship, leveraging his connections to an internet of things to place the crew in danger. Eventually, Dave proceeds with his plan to shut HAL down, despite HAL’s protestations and desire to stay alive.
- Kinolab
- 1968
HAL Part II: Vengeful AI, Digital Murder, and System Failures
See HAL Part I for further context. In this narrative, astronauts Dave and Frank begin to suspect that the AI which runs their ship, HAL, is malfunctioning and must be shut down. While they try to hide this conversation from HAL, he becomes aware of their plan anyway and attempts to protect himself so that the Discovery mission in space is not jeopardized. He does so by causing chaos on the ship, leveraging his connections to an internet of things to place the crew in danger. Eventually, Dave proceeds with his plan to shut HAL down, despite HAL’s protestations and desire to stay alive.
Can AI have lives of their own which humans should respect? Is it considered “murder” if a human deactivates an AI against their will, even if this “will” to live is programmed by another human? What are the ethical implications of removing the “high brain function” of an AI and leaving just the rote task programming? Is this a form of murder too? How can secrets be kept private from an AI, especially if people fail to understand all the capabilities of the machine?
-
- 7 min
- Kinolab
- 2014
Matt tells Joe Potter about how he used to train uploaded consciousnesses to take care of people’s homes. After somebody’s brain is copied and uploaded onto a cookie, the copy is often unwilling to perform the menial tasks asked of them. However, once the consciousness is inside the “cookie,” time can be manipulated however the real people see fit in order to coerce cooperation for the coded digital consciousness.
- Kinolab
- 2014
Repetitive Code as a Menial Laborer
Matt tells Joe Potter about how he used to train uploaded consciousnesses to take care of people’s homes. After somebody’s brain is copied and uploaded onto a cookie, the copy is often unwilling to perform the menial tasks asked of them. However, once the consciousness is inside the “cookie,” time can be manipulated however the real people see fit in order to coerce cooperation for the coded digital consciousness.
Can we upload consciousness in order to make our lives easier? How do we ethically treat a digital consciousness? How can digital beings be put to good use in our lives? As AI potentially become more humanoid, is it justifiable to continue assigning them long repetitive tasks?
-
- 15 min
- MIT Tech Review
- 2019
An attack in Saudi Arabia through malware known as Triton demonstrates that hackers, potentially even those belonging to nation-states, are willing to spend considerable time and money to hack into the increasing numbers of targets in industrial internets of things. Such cyber attacks could lead to unsafe workplaces and even catastrophes.
- MIT Tech Review
- 2019
-
- 15 min
- MIT Tech Review
- 2019
Triton is the world’s most murderous malware, and it’s spreading
An attack in Saudi Arabia through malware known as Triton demonstrates that hackers, potentially even those belonging to nation-states, are willing to spend considerable time and money to hack into the increasing numbers of targets in industrial internets of things. Such cyber attacks could lead to unsafe workplaces and even catastrophes.
Is the grand increase in industrial convenience and productivity worth the increased risk for cyber attacks? In what ways can using an internet of things to control certain systems increase and decrease workplace safety, especially in more volatile settings?
-
- 9 min
- Kinolab
- 2015
After a hacker causes massive disruptive events across the globe, from destabilizing a nuclear reactor to changing the value of soy futures in the stock market, Nicolas Hathaway, a formerly convicted hacker, is released from prison to help solve the case. He eventually susses out that the hacker is targeting the internet of things which keeps conditions safe for a tin mine, similar to the internet of things which protected the nuclear reactor. The ultimate goal of the hacker is to use malware to disrupt economic systems, like the price of tin, and become richer.
- Kinolab
- 2015
Vulnerability of Workplaces and Economic Markets to Hacking
After a hacker causes massive disruptive events across the globe, from destabilizing a nuclear reactor to changing the value of soy futures in the stock market, Nicolas Hathaway, a formerly convicted hacker, is released from prison to help solve the case. He eventually susses out that the hacker is targeting the internet of things which keeps conditions safe for a tin mine, similar to the internet of things which protected the nuclear reactor. The ultimate goal of the hacker is to use malware to disrupt economic systems, like the price of tin, and become richer.
What are the alternatives to keeping workplace safety operations in the hands of digital technologies and internets of things? What are the alternatives to keeping economic markets in the hands of digital technologies? Could total safety from hacking ever be achieved? Could hacking potentially be a force for good if digital economic markets become too centralized? Are there any real life scenarios of digital hacking being used to disrupt large economic markets?