The Emerging Ethics of Humancentric GPS Tracking and Monitoring

The Global Positioning System (GPS) is increasingly being adopted by private and public enterprise to track and monitor humans for location-based services (LBS). Some of these applications include personal locators for children, the elderly or those suffering from Alzheimer's or memory loss, and the monitoring of parolees for law enforcement, security or personal protection purposes. The continual miniaturization of the GPS chipset means that receivers can take the form of wristwatches, mini mobiles and bracelets, with the ability to pinpoint the longitude and latitude of a subject 24/7/365. This paper employs usability context analyses to draw out the emerging ethical concerns facing current humancentric GPS applications. The outcome of the study is the classification of current state GPS applications into the contexts of control, convenience, and care; and a preliminary ethical framework for considering the viability of GPS location-based services emphasizing privacy, accuracy, property and accessibility.

[1]  Ioannis-Evangelos Papasliotis Mining for data and personal privacy: reflections on an impasse , 2005 .

[2]  R. Mason Four ethical issues of the information age , 1986 .

[3]  A. Masters,et al.  Humancentric Applications of RFID Implants: The Usability Contexts of Control, Convenience and Care , 2005, Second IEEE International Workshop on Mobile Commerce and Services.

[4]  B. W. Martin WatchIt. A fully supervised identification, location and tracking system , 1995, Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology.

[5]  Katina Michael,et al.  Humancentric applications of precise location based services , 2005, IEEE International Conference on e-Business Engineering (ICEBE'05).

[6]  Terry Thomas,et al.  ‘Tracking’ Sex Offenders , 1996 .

[7]  T. Honderich The Oxford Companion to Philosophy , 1995 .

[8]  Frank Stajano,et al.  RFID is x-ray vision , 2005, CACM.

[9]  John Iovine PIC Microcontroller Project Book , 2000 .

[10]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[11]  Jan Blom,et al.  Contextual and cultural challenges for user mobility research , 2005, CACM.

[12]  Simson L. Garfinkel,et al.  RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.

[13]  Robert P. Minch,et al.  Legal and Ethical Implications of Employee Location Monitoring , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[14]  Barbara P. Buttenfield,et al.  Spying With Maps: Surveillance Technologies and the Future of Privacy , 2003 .

[15]  Katina Michael,et al.  Microchipping People: The Rise of the Electrophorus , 2005 .

[16]  Efraim Turban,et al.  Electronic Commerce 2002: A Managerial Perspective , 2002 .

[17]  Robert Neil,et al.  Keeping track. , 2019, Materials management in health care.

[18]  Morris Williams,et al.  Wearable computing and the geographies of urban childhood: working with children to explore the potential of new technology , 2003, IDC '03.

[19]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.

[20]  Ruth Sander Losing our minds. , 2005, Nursing older people.

[21]  Thad Starner,et al.  Using GPS to learn significant locations and predict movement across multiple users , 2003, Personal and Ubiquitous Computing.

[22]  Janice Loh,et al.  Technology applied to address difficulties of Alzheimer patients and their partners , 2004 .

[23]  Atul Gawande Call My Cell , 2003 .

[24]  K. Shimizu,et al.  Location system for dementia wandering , 2000, Proceedings of the 22nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (Cat. No.00CH37143).

[25]  James Hant,et al.  Usage of commercial satellite systems for homeland security communications , 2003, 2003 IEEE Aerospace Conference Proceedings (Cat. No.03TH8652).

[26]  Christine Perakslis,et al.  Social acceptance of RFID as a biometric security method , 2005, Proceedings. 2005 International Symposium on Technology and Society, 2005. Weapons and Wires: Prevention and Safety in a Time of Fear. ISTAS 2005..

[27]  Allison Druin,et al.  The role of children in the design of new technology , 2002 .

[28]  James W. Davis,et al.  Real-time closed-world tracking , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[29]  John Weckert Trust and monitoring in the workplace , 2000, University as a Bridge from Technology to Society. IEEE International Symposium on Technology and Society (Cat. No.00CH37043).