(1) Introduction1
1 All hyperlinks in the footnotes were last accessed October 2017. 2 http://www.pokemon.com/us/pokemon-video-games/pokemon-go/ 3 http://expandedramblings.com/index.php/pokemon-go-statistics/ 4 https://games.slashdot.org/story/16/10/11/2110219/pokemon-go-could-add-283-million-years-to-users- lives-says-study
and
, which in the latter case
1977): All these, and many more pioneers
Here, Facebook's role
10 http://fortune.com/2017/05/22/facebook-censorship-transparency/ 11 https://www.theguardian.com/news/2017/may/21/revealed-facebook-internal-rulebook-sex-terrorism- violence 12 http://www.telegraph.co.uk/news/2017/06/16/facebook-using-artificial-intelligence-combat-terrorist- propaganda/ 13 https://www.theguardian.com/technology/2017/apr/07/google-to-display-fact-checking-labels-to-show-if-
14 https://www.forbes.com/sites/kalevleetaru/2017/02/17/how-twitters-new-censorship-tools-are-the- pandoras-box-moving-us-towards-the-end-of-free-speech/
15 https://www.wired.com/2016/09/google-facebook-microsoft-tackle-ethics-ai/ 16 Wiener was, however, sceptical: "Again and again I have heard the statement that learning machines cannot subject us to any new dangers, because we can turn them off when we feel like it. But can we? To turn a machine off effectively, we must be in possession of information as to whether the danger point has come. The mere fact that we have made the machine does not guarantee that we shall have the proper information to do this." (N. Wiener (1948, 1961): Cybernetics, or control and communication in the animal and the machine). 17 http://www.dailymail.co.uk/sciencetech/article-3624671/Google-s-AI-team-developing-big-red-button- switch-systems-pose-threat.html
a pure information request. Quoting the authors:
One key aspect here is that whereas
also implies replacing (core duties of) human professionals by algorithms. Digitalization and
read (Baron, 2015). Piper (2012):
(2.2) Museums, Archives and Libraries
21 See (abstract presented at QQML2016). http://www.isast.org/images/e-_Book_of_Abstracts_final_2016_v9.pdf (p60)
items, not just books. Morris (2009:4):
, and quoting Marlene Manoff (on page 112):
32 https://en.wikipedia.org/wiki/Information_school 33 https://www2.archivists.org/node/14804 34 https://www.quora.com/How-would-you-explain-the-difference-between-a-librarian-and-an-archivist 35 https://www2.archivists.org/usingarchives/whatarearchives 36 https://www2.archivists.org/about-archives 37 Piper (2012:20):
38 One idea to make the ordering of books easier is to have strict maximum number of books in a library. Perec (1985:148-155) sets it at 361, but he also notes that (p152) "Disorder in a library is not serious in itself;
shelves.". While I think, or maybe even know, this holds for small, personal libraries, it is generally not true. 39 Habeat Librarius et registrum omnium librorum ordinatum secundum facultates et
author's translation). 40 Perec (1985:152-153), Edwards (2009:106-111) and Petroski (in the appendix "Order, order") list many options for shelving books and ordering them by their characteristics. 41 https://www2.archivists.org/usingarchives/appendix 42 See also the discussion on “retail libraries” in (van Otterlo, 2016b). 43 See also the three Librarian movies (2004) (http://www.imdb.com/title/tt0412915/) and (2006) (http://www.imdb.com/title/tt0455596/) and (2008) (http://www.imdb.com/title/tt1146438/) about the librarian of an imaginary archive containing things like Noah's Ark and Pandora's Box. Furthermore the Indiana Jones movie series (https://en.wikipedia.org/wiki/Indiana_Jones) features many archeological treasure hunts. Other popular hunts in archives and libraries can be found in "National treasure" (http://www.imdb.com/title/tt0368891/) and its sequel "Book of secrets" (http://www.imdb.com/title/tt0465234/), and of course Name of the Rose (http://www.imdb.com/title/tt0091605/). Yet another series of movies centered around the idea of libraries and archives are: The Da Vinci Code (http://www.imdb.com/title/tt0382625/), Angels and Demons
anyone wanted to know the location of an ancient, forgotten book, he did not ask Malachi, but Jorge. Jorge: “You
By finding
tomorrow again. Overall, (guideline H): Both Eco's libraries instate mostly physical barriers
(http://www.imdb.com/title/tt0808151/), and Inferno (http://www.imdb.com/title/tt3062096/). A good advertisement for archives comes from the Millennium Series (https://en.wikipedia.org/wiki/Millennium_(novel_series)) where the mystery is solved after many hours of labour in the company archives. 44 In 1986 a movie based on the book came out, with Sean Connery in the role of William of Baskerville; here I base some of the text on both the movie and the book. 45 This is an obvious reference to Jorge Luis Borges, the blind librarian, see (Manguel, 2006:248-249). Borges was the blind librarian of the National Library of Argentina for years (the third blind librarian in there). Borges acknowledged the irony of God giving him both all these books, as well as darkness. 46 In “De Bibliotheca” (1981); Dutch translation (“De bibliotheek”) by Martine Vosmaer (1988:12-16).
(Markuson, 1963:13-14):
47 See Bozdag (2013) for additional pointers to the literature on gatekeepers, a phenomenon studied extensively in Media studies and journalism, see also (Granka, 2010). 48 https://en.wikipedia.org/wiki/Library_of_Alexandria 49 Gooding and Terras (2017) survey the typical use of Babel and Alexandria as metaphors for the digital library. 50 Otlet created the Mundaneum, a physical manifestation of the idea of universal libraries and universal access. Otlet is a fascinating figure in documentation (information science) with key contributions such as the Mundaneum, the universal Dewey decimal system (UDC), the Universal Book (similar to Gessner's work) and other things such as the universal atlas, the World Palace, and the utopian dream of a World City and ideas on the League of Nations. Pointers for further information: https://en.wikipedia.org/wiki/Mundaneum https://en.wikipedia.org/wiki/Paul_Otlet and Wright (2014), Borner (2010), Boyd Rayward (1992, 2010).
In addition, his ideas are not
(3) Ethical Aspects of Information Access
(3.1) Ethics
According to Kizza (2013:3) Morality is
,
and
.
As Laudon defines it (1995:34): “Ethics is about the decision making and actions of free human beings. When faced with alternative courses of action or alternative goals to pursue, ethics helps us to make the correct decision. Ethics helps provide answers to questions like 'What should I do? What should we do? What goals should we pursue? What laws should we have? What collective behavior should we all pursue?'
To make it even simpler (Laudon 1995:34):
or
. A rule-based decision in traffic would be not
consequentialists. Here, ethical decisions are made according to implementing John Stuart Mill's utilitarianism, which (Laudon 1995):
.
society at large), and terrorists would go to jail (negative consequence for a very small group). However, it
53 One very good way to look at ethical dilemmas is to cast them into a scenario (Wright et al. 2014). That is, even though scientific and governmental reports can help to assess the impact and dangers of developments – such as new technologies – it often helps to also consider a more narrative account in the form of a scenario or fiction novel. Famous books such as Brave New World by Aldous Huxley and 1984 by George Orwell have caused generations to think deeply about technology, surveillance and the organization of society. Eco's story about the library too is a good scenario for archival ethics, and it can also be used to understand contemporary developments in algorithms (van Otterlo, 2016a). With a scenario, other ways become available to look at the degree of impact, the degree of uncertainty and new points of view, for a particular development. As Wright at al. say (2014:325):
identifying stakeholders, applications, risks, drivers and technologies, one can try to imagine the various consequences of new developments. 54 http://www.telegraaf.nl/binnenland/27257015/__AIVD_kraakt_WhatsApp__.html
but also included are
– where
(3.3) The Ethics of Access
55 This topic has a long history, but recently some interesting developments have happened. A group of four librarians fought a gag order by the FBI in which (under the Patriot Act) they had to hand over library records, and not even talk about it. They are called the Connecticut Four (
got reunited again to fight the same issues now again https://americanlibrariesmagazine.org/blogs/the- scoop/connecticut-four-librarians-fbi-overreach/
“Librarians, archivists and other information workers had to face ethical conflicts and ethical dilemmas long before digital media and the Internet started to reshape the whole information sphere. Francis Bacon's aphorism knowledge is power (scientia potentia est) refers to the fact that limited access to information and restricted education were are prerequisites of ruling elites in pre- and non-democratic societies.” Danielson (1989:53): “Providing fair access to archives may appear to be a fundamentally simple operation, until one
sheer volume of paper being generated, searches for specific documents become complicated and time consuming. The consistency of reference assistance, which can significantly reduce searching time and the
56 An interesting case here is the one on Cybersyn, the socialist big-data-avant-la-lettre project from the seventies in Chile, which was extensively described by Eden Medina in her fascinating book “Cybernetic Revolutionaries” from 2011. In 2014 Evgeny Morozov wrote a piece in the New Yorker on the exact same project (http://www.newyorker.com/magazine/2014/10/13/planning-machine). This created some controversy because some people accused Morozov of plagiarism, and quite interestingly, his rebuttal consisted of showing photographs of his own extensive search efforts in the archives of Stafford Beer (the main person in the Cybersyn project). The issue was never fully resolved (http://leevinsel.com/blog/2014/10/11/an- unresolved-issue-evgeny-morozov-the-new-yorker-and-the-perils-of-highbrow-journalism).
(1.4) and
(1.6). Such
“The Archivist should endeavour to promote access to records to the fullest extent consistent with the public interest, but he should carefully observe any proper restrictions on the use of records”.
“Archives are made accessible to everyone, while respecting the pertinent laws and the rights of individuals, creators, owners and users”.
“The Archivist should respond courteously and with a spirit of helpfulness to reference requests.”
“The Archivist should not profit from any commercial exploitation of the records in his custody.”
“It is not sufficient for archivists to hold and preserve materials: they also facilitate the use of their collections and make them known.”
“Archivists endeavour to inform users of parallel research by others using the same materials, and, if the individuals concerned agree, supply each name to the other party.”
“When there are apparent conflicts between such goals and either the policies of some institutions or the practices of some archivists, all interested parties should refer to this code of ethics and the judgment of experienced archivists.”
.
to state that
(4) Transformation to the Digital World
64 The start of this direction was only roughly ten years ago The Petabyte Age https://www.wired.com/2008/06/pb-intro/ (Mitchell 2009) Mining Our Reality http://www.cs.cmu.edu/~tom/pubs/Science2009_perspective.pdf (Anderson 2008) 65 This phenomenon is called “the end of theory” since it breaks with standard scientific methodology. 66 See for example Barcelona (http://www.smartcityexpo.com/barcelona) and other cities. 67 See for example East-Germany's Stasi and the great movie about it http://www.imdb.com/title/tt0405094/ 68 See the Rathenau Report on “Working in the Robot Society (2015) https://www.rathenau.nl/nl/node/766 The Rathenau Insitute publishes many reports on the digital society and its implications, see https://www.rathenau.nl/nl/publicaties
where interaction between people is actively discouraged." However, the complete opposite is now starting
. As Alter (2012) writes: "Your e-book is reading you."
72 There are many opportunities and incentives for book publishers and sellers to create systems in which quantified aspects of “reading” are coupled to (monetary reward for) “writing”. Amazon's new way of paying can be based on the data obtained from their Kindle e-reader (http://fortune.com/2015/06/24/amazon-kindle-
interaction tracking and government interests in reading habits.
77 https://www.theguardian.com/technology/2015/jul/23/panopticon-digital-surveillance-jeremy-bentham 78 https://en.wikipedia.org/wiki/Algorithm 79 Science, special issue on how A.I. is transforming science http://science.sciencemag.org/content/357/6346/
80 http://www.wired.co.uk/article/google-vizier-black-box-optimisation-machine-learning-cookies 81 https://www.technologyreview.com/s/602317/self-driving-cars-can-learn-a-lot-by-playing-grand-theft-auto/ 82 Goverments, universities and large companies are assessing the sudden rise of the powerful technology of A.I. See for example the report from the field itself (Stone et al, 2016) and some other examples such as: Andrew C. Scott José R. Solórzano Jonathan D. Moyer Barry B. Hughes (2017) Modeling Artificial Intelligence and Exploring its Impact, working paper, Pardee Center for International Futures http://pardee.du.edu/sites/default/files/ArtificialIntelligenceIntegratedPaper_V6_clean.pdf
Executive Office of the President National Science and Technology Council Committee on Technology (2016) Preparing for the Future of Artificial Intelligence (2016) https://obamawhitehouse.archives.gov/sites/default/files/whitehouse_files/microsites/ostp/NSTC/preparing_fo
Jacques Bughin, Eric Hazan, Sree Ramaswamy, Michael Chui, Tera Allas, Peter Dahlström, Nicolaus Henke, Monica Trench (2017) Artificial Intelligence: The Next Digital Frontier, discussion paper, McKinsey Global Institute.
(4.2) Digitalized Archives and Libraries
But, as Zastrow notes (2013:17):
. The
, Trend 3 that
and Trend 5 says that
preservation. Cox (2007): He continues “ What would happen if we
(everything is continuously connected). Noh (2015): “However, library 4.0. must not only include softwarebased approaches, but also other technology such as makerspaces, Google Glass, context-aware technology, digitalization of contents, big data, cloud computing and augmented reality.”
AI
(2013:18):
88 http://dp.la 89 http://www.europeana.eu 90 http://books.google.com 91 https://www.wired.com/2017/04/how-google-book-search-got-lost/ 92 https://www.theatlantic.com/technology/archive/2017/04/the-tragedy-of-google-books/523320/ 93 See https://www.theatlantic.com/technology/archive/2015/10/fair-use-transformative-leval-google-
customer base of public libraries (http://www.debibliotheken.nl/fileadmin/documenten/vereniging/2008_de-klant-is- koningin_handboek_openbare_bibliotheken.pdf). Nowadays, public libraries themselves are utilizing their data assets to improve various library services.
openbare bibliotheekvoorzieningen" (December 2016) on the formation of a nation-wide collection for public libraries. (https://www.kb.nl/sites/default/files/docs/191216_gez._collectieplan_definitief.pdf)
libraries, and in augmented with a data warehouse storing transaction and patron records for a large percentage of libraries. This creates one big database with core information about the public library in the
(5) The Ethics of Algorithms
bank, specifying that . Now this
specified as , and let us assume it
communicated by Google (), Facebook (
) and
(2016a:32): The
99 https://arxiv.org/pdf/1702.05437.pdf 100http://observer.com/2015/08/stephen-hawking-elon-musk-and-bill-gates-warn-about-artificial-intelligence/
101https://futureoflife.org/ai-open-letter/ 102https://academic.oup.com/nsr/article/doi/10.1093/nsr/nwx045/3789514/Machine-learning-challenges-and-
105See (in Dutch) this article for more “surveillance metaphors”: https://decorrespondent.nl/1237/zo-kunnen-
of the science fiction writer Asimov about our time, which are remarkably accurate, see: http://www.bbc.com/news/technology-27069716 and http://www.wired.co.uk/article/asimov-2014- technology-predictions
110https://phys.org/news/2016-09-dutch-police-probe-fatal-tesla.html 111 http://blog.chron.com/techblog/2011/02/jeopardy-watsons-more-interesting-when-it-fails/ 112https://www.cleanenergywire.org/factsheets/dieselgate-timeline-germanys-car-emissions-fraud-scandal 113http://www.politico.eu/article/amsterdam-tourism-airbnb-crime-netherlands/ 114https://www.theguardian.com/cities/2016/oct/06/the-airbnb-effect-amsterdam-fairbnb-property-prices-
(5.3.1) Algorithms that Infer
The first type consists of algorithms that reason, infer and search. These
widely available." Furthermore, Warner and Stone (1970:137): "At present we achieve some privacy because
in this that it is likely to come about unless the public shows unusual vigilance." Warner and Stone (1970:148) also note that "Threats to privacy which are not commonly known or recognized as such thus
them, who can doubt that there will be greater and ever greater leakage and abuse?" An additional problem
social and behavioral empirical research on privacy reviewed here suggest that policy approaches that rely exclusively on informing or “empowering” the individual are unlikely to provide adequate protection against the risks posed by recent information technologies. Consider transparency and control, two principles conceived as necessary conditions for privacy protection. The research we highlighted shows that they may provide insufficient protections and even backfire when used apart from other principles of privacy protection.”
algorithms. Let us take the sentence
118 https://translate.google.com/?hl=nl 119 http://www.wired.co.uk/article/google-artificial-intelligence-poetry 120 https://www.wordseye.com/ 121 http://www.wikihow.com/Main-Page 122 https://en.wikipedia.org/wiki/Semantic_Web 123 https://www.theverge.com/2017/6/15/15807096/google-mobile-ai-mobilenets-neural-networks 124 https://petapixel.com/2016/10/08/keegan-online-photo-coach-critiques-photos/ 125 https://www.google.com/recaptcha/intro/android.html http://www.captcha.net/
131 https://www.technologyreview.com/s/602949/ai-has-beaten-humans-at-lip-reading/ 132 https://futurism.com/skype-can-now-translate-your-voice-calls-into-10-different-languages-in-real-time/ 133 https://www.facebook.com/notes/facebook-data-science/the-formation-of-love/10152064609253859/
of "35 pounds in euros" or "opening hours of Albert Heijn in Nijmegen", but I would not like a search engine to (try) to answer questions like "is it ok for Israel to close down the Palestinian areas?" or "is there a
135 http://searchengineland.com/library/google/hummingbird-google 136 https://www.theguardian.com/books/2016/sep/28/google-swallows-11000-novels-to-improve-ais- conversation 137 https://www.theguardian.com/technology/right-to-be-forgotten 138 https://algorithmwatch.org/en/watching-the-watchers-epstein-and-robertsons-search-engine-
(5.3.2) Algorithms that Learn
Lammerant (2016:146): Facebook's news feeds but also Netflix's
140 https://www.theverge.com/2016/3/24/11297050/tay-microsoft-chatbot-racist 141 As a matter of fact, it becomes similar to a Turing test (https://en.wikipedia.org/wiki/Turing_test) 142 http://www.businessinsider.com/siri-vs-google-assistant-cortana-alexa-2016-11?
143 https://www.technologyreview.com/s/608841/why-500-million-people-in-china-are-talking-to-this-ai/ 144 See also the hilarious Southpark episode on these assistants: http://www.ibtimes.com/south-park-
145 https://www.wired.com/2017/02/murder-case-tests-alexas-devotion-privacy/ 146 https://www.engadget.com/2016/06/13/machines-can-generate-sound-effects-that-fool-humans/ 147 https://www.youtube.com/watch?v=JGAIfWG2MQQ 148 https://www.wired.com/2009/07/predictingssn/ 149 https://www.wired.com/2017/04/googles-dueling-neural-networks-spar-get-smarter-no-humans-required/
150 https://machinelearningmastery.com/inspirational-applications-deep-learning/ 151 http://www.sciencemag.org/news/2017/07/how-ai-detectives-are-cracking-open-black-box-deep-learning
(5.3.3.) Algorithms that Optimize
152 https://en.wikipedia.org/wiki/AOL_search_data_leak 153 https://www.theguardian.com/technology/2017/sep/12/artificial-intelligence-face-recognition-michal-
155 http://chalkdustmagazine.com/features/menace-machine-educable-noughts-crosses-engine/ 156 https://en.wikipedia.org/wiki/Operant_conditioning_chamber 157 https://en.wikipedia.org/wiki/Behavioural_Insights_Team
(5.3.4.) Physical Manifestations
act. Or more precisely:
161 https://socialmediaweek.org/blog/2017/07/lurkers-on-top/ 162 https://www.trouw.nl/home/horeca-klaagt-over-vals-spel-bij-iens~ae080a6b/ 163 https://en.wikipedia.org/wiki/R.U.R. 164 https://en.wikipedia.org/wiki/Shakey_the_robot 165 https://www.bostondynamics.com/ 166 http://www.mobilemanipulation.org/ 167 http://www.irobot.com/For-the-Home/Vacuuming/Roomba.aspx 168 Many good movies exist about how that would look like (See: I Robot, the Bicentennial man, A.I., and
Robot and Frank, for some examples). An excellent, fairly realistic, series is “Real Humans” (http://www.imdb.com/title/tt2180271/)
(5.3.5.) Superintelligence
2015) will come, which is176 . For some
170 http://snackbot.org/about-public.html 171 http://www.mykeepon.com/ 172 https://en.wikipedia.org/wiki/Uncanny_valley 173 https://www.wired.com/2017/04/robots-arent-human-make/ 174 https://www.wired.com/brandlab/2015/04/rise-machines-future-lots-robots-jobs-humans/ 175 https://www.wired.com/2017/08/robots-will-not-take-your-job/ 176 https://en.wikipedia.org/wiki/Technological_singularity 177 https://en.wikipedia.org/wiki/The_Singularity_Is_Near 178 https://www.forbes.com/2009/06/18/cosmist-terran-cyborgist-opinions-contributors-artificial-intelligence-
(Wright:97): “It would call for a new breed of professional, what Otlet called a "documentalist." Unlike the
(6.1) The Documentalist Singularity It took ages to get permission, but yesterday evening I finally got THE mail. I consider myself lucky, since I really needed access to the archives to finish my article. Other people would ask why would an assistant professor in technology ethics would like to see those old-fashioned paper documents about the introduction of Mindbook, the company that grew out of the long gone Facebook corporation. Since, their summaries are already on Archipedia. Who is interested in paper documents anymore? Well I am. I never felt comfortable with all this digital.. eh stuff.. anyway. People are physical, and they like physical things. Well.. at least that's my opinion. And besides… I don't trust Archipedia; they have appeared in so many algorithmic trials for information manipulation, but they always use their right-to-silence and nobody is been able to crack their summarization code. I need to take a look myself. I enter the red building next to the rocket station and turn right after getting through the bio-scanner. Paul, a robot from the CODEMENTALIST-5000 series is waiting at the desk. His emotional module can use an update, I catch myself thinking. I only get a nod and a metallic “hello, how can I help you?”, so much unlike the newer models that can really lighten your day with their big smiles and warm voices. I answer the way I am supposed to do, with a clear question and context: “Hello Paul, I'd like to see all documents containing discussions on the use of advanced mind models, especially whole brain simulations, of Facebook users prior to the formation of Mindbook. I also would like to look at pictures and footage of the meetings that include people from the legal department, and can you please provide me with additional CV information of these people? Thank you.” Paul knew from prior contact that I would be coming to the archive myself; otherwise he would have downloaded the interpreted documents, or DOC-INTERPRETs as they call them here, to my communicator. Now he only sends the requested CVs and projects an interactive map of the archive a floor below which will guide me to the right boxes. Since Paul scans and stores all items (including photos and a shallow semantic analysis of texts), and organizes them in the physical space, he knows where I have to go. At least, that is what I have to believe since there is no way of knowing what is in the complete archive. While going downstairs, I sense excitement from my side on how optimized and effective my routing past all the right boxes, 16 in total, is. Five more boxes are off limits for me though. It turns out another researcher has a similar research question in parallel, and his (or her?) combined scientific h-index and social media coverage is so much higher than mine. Also, according to an analysis of the planned social activities in our agendas, and our biophysical energy levels in combination with the predicted moist weather in the next weeks, Paul estimates that I will
not put enough hours in my analysis of the documents and my writing anyway. Sure… I need to stop eating snacks and boost my metabolism… but come on… who does Paul think he is? My doctor? According to Paul the overall estimated impact of the other researcher publishing the material alone is higher when I do not interfere. I have no other option than to accept, but I don't think it's fair. Archival robots such as Paul are built to optimize their impact since they too get ranked. Of course, everyone gets ranked, and so are archival robots. Paul needs to optimize the use and costs of the archive while at the same time striking a balance between preventing possible negative impact on the donor organization Mindbook, and stimulating positive impact from researchers and journalists publishing the right kind of information, again according to Mindbook. Oh well… the rest of the day I look at the documents, trying to find what I am looking for. The surveillance-sensors watch my every move while interacting with the documents, which helps them to further optimize the archive, so they say. Well..they sure also use them for the projected advertisements that are appearing on the electronic walls for me. Hey… yes indeed… I do need a snack… my hands are trembling…. How did they know? Oh… never mind.
most probable person interested in this particular collection.
that we can ensure that they will behave according to our own moral values. How can we do that?
(6.2) Some Solutions
an algorithmic transparency standard which calls for human involvement and transparency about the data
information, visualization to succinctly communicate the workings of an algorithm, and developing ML methods that can be explained in ways that humans can readily understand. Probably the most effective way he proposes is to make algorithmic presence known to the user at all times.
built-in (such as privacy-by-design, and transparency-enabling technologies) or where (data) protection is
182 https://autoriteitpersoonsgegevens.nl/nl/onderwerpen/beveiliging/meldplicht-datalekken 183 https://ico.org.uk/for-organisations/data-protection-reform/overview-of-the-gdpr/ 184 General Dat Protection Regulation (GDPR) http://www.eugdpr.org/more-resources-1.html
(6.3) Learning to Behave Well
that one is only interested in how an action on one object changes the distance between that and another into
185 The real challenge is often generalization: ”We’re always learning from experience by seeing some examples and then applying them to situations that we’ve never seen before. A single frightening growl or bark may lead a baby to fear all dogs of similar size – or, even animals of every kind. How do we make generalizations from fragmentary bits of evidence? A dog of mine was once hit by a car, and it never went down the same street again – but it never stopped chasing cars on other streets.” (Minsky, 1985, Society of Mind, Section 19.8). 186 See the intriguing experiments by Karl Sims: http://www.karlsims.com/evolved-virtual-creatures.html
heavy, and one cannot place an object on a ball-shaped object. Various ML systems exist where this
(Russell and
my favorite food. Dennett (2013:78): "Anything that is usefully and voluminously predictable from the
see for example:
(6.5) Research Strategy for Ethical Codementalists: The IntERMeDIUM approach
Anderson (2007:16):
terms. Anderson and Anderson (2007:17): our view, lies not only in who is making the ethical judgments (the machine versus the human programmer) but also in the ability to justify ethical judgments that only an explicit representation of
188 See for inspiration the movie Bicentennial Man (http://www.imdb.com/title/tt0182789/) 189 https://www.theverge.com/2017/10/18/16495548/deepmind-ai-go-alphago-zero-self-taught
between humans and machines.
ACM (1992) Association of Computing Machinery
https://www.acm.org/about-acm/acm-code-of-ethics-and-professional-conduct
ALA (2008) American Library Association Professional Code of Ethics
http://www.ala.org/advocacy/proethics/codeofethics/codeethics
ICA-DL (2011) Universal Declaration on Archives
http://www.ica.org/en/universal-declaration-archives
SAA (1955) Society of American Archivists Code of Ethics (1948-1965)
https://historyhub.history.gov/docs/DOC-1031
SAA (1992) Society of American Archivists Code of Ethics
http://ethics.iit.edu/ecodes/node/4559
SAA (2005) Society of American Archivists Code of Ethics
SAA (2012) Society of American Archivists Code of Ethics
http://www2.archivists.org/statements/saa-core-values-statement-and-code-of-ethics
ICOM (2013) ICOM Code of Ethics for Museums
http://icom.museum/fileadmin/user_upload/pdf/Codes/code_ethics2013_eng.pdf
PL (1993) Professional charter for librarians in public libraries in the Netherlands
http://www.ifla.org/files/assets/faife/codesofethics/netherlands.pdf
IFLA (2012) International Federation of Library Associations and Institutions Code of ethics for Librarians
and other Information Workers (2012?)
http://www.ifla.org/news/ifla-code-of-ethics-for-librarians-and-other-information-workers-full-version
KVAN (1997) Royal Dutch Association for Archivist Code of Ethics
http://kvan.nl/images/PDF/Beroepscode_voor_Archivarissen.pdf
Aabø S. and Audunson R. (2012) Use of library space and the library as place, Library & Information
Science Research, 34(2), pp138-149
Abel D., MacGlashan J., & Littman M. L. (2016). Reinforcement Learning as a Framework for Ethical
Decision Making. In AAAI Workshop: AI, Ethics, and Society.
Acquisti A., Brandimarte L. and Loewenstein G. (2015) Privacy and human behavior in the age of
information, Science, Vol. 347, Issue 6221, pp. 509-514, 30 Jan 2015
Allison D. A. (2013) The patron-driven library: A practical guide for managing collections and services in
the digital age. Chandos Inf. Prof. Series
Alter A. (2012) Your E-Book is Reading You, The Wall Street Journal, 29th June
Anderson C. (2008) The End of Theory: The Data Deluge Makes the Scientific Method Obsolete, Wired
Magazine
Anderson M. and Anderson S.L. (2007) Machine Ethics: Creating an Ethical Intelligent Agent, AI Magazine
28, pp15-26
Anderson R. (2011) Collections 2021: The future of the library collection is not a collection, Serials 24(3),
pp211-215
Anthes G. (2016) Search Engine Agendas, Communications of the ACM, 59(4), pp19-21
Baase S. (2013) A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology, fourth edition,
Pearson
Baggini J. and Fosl P.S. (2007) The Ethics: A Compendium of Ethical Concepts and Methods, Blackwell
Publishing,
Baron N.S. (2015) Words Onscreen: The Fate of Reading in a Digital World, Oxford University Press
Bdiwi M. And Suchy J. (2012) Library Automation using Different Structures of Vision-Force Robot Control and Automatic Decision System, Proceedings of the International Conference on Intelligent Robots and
Systems, pp1677-1682
Birkbak A. and Carlsen H.B. (2016a) The public and its algorithms: comparing and experimenting with
calculated publics, chapter 1, pp21-34, in: Algorithmic life, Amoore, L. and Piotukh, V. (eds.) Routledge
Birkbak, A. & Carlsen H.B. (2016b) The World of Edgerank: Rhetorical Justifications of Facebook’s News
Feed Algorithm, Computational Culture: a journal of software studies
Bonnefon J.-F., Shariff A. and Rahwan I. (2016) The social dilemma of autonomous vehicles, Science 352,
pp1573-1576
Borner K. (2010) Atlas of Science: Visualizing what we know, MIT Press
Bostrom N. and Yudkowsky E. (2011) The Ethics of Artificial Intelligence: In Cambridge Handbook of
Artificial Intelligence, eds. William Ramsey & Keith Frankish, Cambridge University Press
boyd, danah and Crawford, Kate, Six Provocations for Big Data (September 21, 2011). A Decade in Internet
Time: Symposium on the Dynamics of the Internet and Society, September 2011. Available at SSRN:
https://ssrn.com/abstract=1926431 or http://dx.doi.org/10.2139/ssrn.1926431
Boyd Rayward W. (1992) The legacy of Paul Otlet, pioneer of information science, The Australian Library
Journal, 41(2), pp90-102
Boyd Rayward W. (2010) Mundaneum: Archives of Knowledge (Occasional Papers).
Bozdag E. (2013) Bias in Algorithmic Filtering and Personalization, Ethics of Information Technology,
15:209
Brunton F. and Nissenbaum H. (2013) Political and Ethical Perspectives on Data Obfuscation, in: Privacy,
due process and the computational turn, Hildebrandt and de Vries (eds.), Routledge.
Buchanan, G.R. 2010. The fused library: integrating digital and physical libraries with location-aware
sensors. In Proceedings of the 10th annual joint conference on Digital libraries (JCDL '10). ACM, New York, NY, USA, pp. 273-282.
Butler D. (2016) Tomorrow's world: A world where everyone has a robot: why 2040 could blow your mind,
Nature, vol 530, pp 398-401, 24 February 2016
Chin J.and Wong G. (2016) China’s New Tool for Social Control: A Credit Rating for Everything, Wall
Street Journal, Nov. 28, 2016
Clement T., Hagenmaier W. and Knies, J.L. (2013) Toward a Notion of the Archive of the Future:
Impressions of Practice by Librarians, Archivists, and Digital Humanities Scholars, The Library Quarterly,
83(2), pp112-130
Contissa, G., Lagioia, F. and Sartor, G. (2017) The Ethical Knob: ethically-customisable automated vehicles
and the law, Artificial Intelligence and Law, 25(3), pp. 365-378.
Cox R.J (2007) Machines in the archives: Technology, and the coming transformation of archival reference,
First Monday, 12(11)
Cox R.J. (2008) Archival ethics: The truth of the matter, Journal of the American Society for Information
Science and Technology 59(7), pp 1128-1133,
Crawford A. (2015) The Meaning of the Library: A Cultural History, Princeton University Press, Princeton,
UK
de Hert P. and Lammerant H. (2016) Predictive Profiling and its Legal Limits: Effectiveness Gone Forever?
In van der Sloot et al. (2016)
Dennett D.C. (2013). Intuition Pumps and Other Tools for Thinking. New York: W. W. Norton & Company
Diakopoulos N. (2016) Accountability in Algorithmic Decision Making, Communications of the ACM,
59(2), pp56-62
Danielson, E.S. (1989) The ethics of access, American Archivist, 52, pp 52-62
Domingos P. (2012) A Few Useful Things to Know About Machine Learning, Communications of the ACM,
55(10), pp78-87
Domingos P. (2015) The Master Algorithm: How the Quest for the Ultimate Learning Machine Will Remake
Our World, INGRAM PUBLISHER SERVICES US
Eco U. (1980) The Name of the Rose, Vintage, Random House Publishing, London UK
Edwards B. (2009). Libraries and learning resource centres. Architectural Press (Elsevier). 2nd edition,
Chapter 4: Space and Interior Design.
Eslami E., Rickman A., Vaccaro K., Aleyasen A., Vuong A., Karahalios K., Hamilton K., and Sandvig C.
(2015) I always assumed that I wasn't really that close to [her]": Reasoning about invisible algorithms in
news feeds, in Proceeding CHI '15 Proceedings of the 33rd Annual ACM Conference on Human Factors in
Computing Systems, pp153-162
Etzioni A. and Etzioni O. (2016) Designing AI Systems that Obey Our Laws and Values Communications of
the ACM, 59(9), pp29-31
Ferguson S., Thornley C. and Gibb F. (2016) Beyond codes of ethics: How library and information
professionals navigate ethical dilemmas in a complex and dynamic information environment, International
Journal of Information Management, 36(4), pp543-556
Fernandez, P. (2016) Through the looking glass: envisioning new library technologies, Library Hi Tech
News, 3, pp20-23
Ferrara E., Varol O., Davis C., Menczer F. and Flammini A. (2016) The Rise of Social Bots,
Communications of the ACM, 59(7), pp96-104
Flach P. (2012). Machine learning. Cambridge University Press
Floridi L. (2014) The 4th revolution: How the infosphere is reshaping human reality, paperback version,
Oxford University Press
Forbus, K.D. (2016) Software Social Organisms: Implications for Measuring AI Progress, AAAI Spring
Symposium
Ford M. (2013) Could Artificial Intelligence Create an Unemployment Crisis? Communications of the ACM, 56(7), pp37-39
Garoogian R. (1991). Librarian/patron confidentiality: an ethical challenge. Library Trends 40(2), pp216-233
Gomez-Uribe C.A. and Hunt N. (2015) The Netflix Recommender System: Algorithms, Business Value, and
Innovation. ACM Transactions Manage. Inf. Syst. 6, 4, Article 13
Goodall, N.J. (2014) Machine Ethics and Automated Vehicles, Road Vehicle Automation, Lecture Notes in
Mobility, Springer
Goodall N.J. (2016) Can you program ethics into a self-driving car? IEEE Spectrum 53(6)
Gooding, P. and Terras, M. (2017) Inheriting library cards to Babel and Alexandria: contemporary metaphors for the digital library, International Journal on Digital Libraries, 18(3), pp. 207-222.
Granka, L.A. (2010) The Politics of Search: A Decade Retrospective, The Information Society 26(5)
Hahn, J. (2011) "Location‐based recommendation services in library book stacks", Reference Services
Review, Vol. 39 Issue: 4, pp.654-674.
Hellman E. (2015) Toward the Post-Privacy Library? Public policy and technical pragmatics of tracking and
marketing, American Libraries Magazine, june 16
Herring M.Y. (2014) Are libraries obsolete? An argument for relevance in the digital age, McFarland &
Company Inc., Publishers, North Carolina, U.S.A.
Jones E.A. And Janes W.J. (2012) Anonymity in a World of Digital Books: Google Books, Privacy and the
Freedom to Read, Policy & Internet, 2(4), pp43-75
Jones N. (2014) The learning machines, Nature, 505, pp146-148 http://www.nature.com/news/computer-
science-the-learning-machines-1.14481
Jordan M.I. and Mitchell T.M. (2015) Machine learning: Trends, perspectives, and prospects, Science,
349(6245), pp255-260
Juznic P., Urbanija J., Grabrijan E., Miklavc S., Oslaj D. and Svoljsak S. (2001) Excuse me, how do I
commit suicide? Access to ethically disputed items of information in public libraries, Library Management,
22(1/2), pp75-79, MCB University Press
Kallberg M. (2012) Archivists 2.0: Redefining the archivist's profession in the digital age, Records
Management Journal, 22(2), pp98-115
Keizer W. (2017) Twintig Jaar Bibliotheekvernieuwing: Halfslachtige Poging tot Focus, Tempo en Regie,
N.E. Brand, Huizen
Kirchhoff T., Schweibenz W. and Sieglerschmidt J. (2009) Archives, libraries, museums and the spell of
ubiquitous knowledge, Archival Science, 8(4), pp251-266
Kizza J.M. (2013) Ethical and Social Issues in the Information Age, Springer
Kirkpatrick K. (2015) The moral challenges of driverless cars. Communications of the ACM 58(8) (July
2015), pp19-20
Kosinski M. and Stillwell D. and Graepel, Y. (2013) Private Traits and Attributes are Predictable from Digital Records of Human Behavior. Proceedings of the National Academy of Sciences, 110(15), pp5802-5805.
Krakovsky M. (2016) Reinforcement Renaissance, Communications of the ACM, Vol. 59 No. 8, Pages 12-14
Kuipers B. (2016). Human-Like Morality and Ethics for Robots. In AAAI-16 Workshop on. Artificial
Intelligence, Ethics and Society.
Kwanya T. and Stilwell C. and Underwood P.G. (2012) Intelligent Libraries and Apomediators:
Distinguishing between Library 3.0 and Library 2.0, Journal of Librarianship and Information Science,
45(3), pp187-197
Lancaster F.W. (1982) Libraries and Librarians in an Age of Electronics, Information Resources Press
Lankes R.D. (2011) The Atlas of New Librarianship, The MIT Press, Cambridge Massachusetts
Laudon K.C. (1995) Ethical concepts and information technology, Communications of the ACM, 38(12),
pp33-39
Lee M.K., Kusbit D., Metsky E. and Dabbish L. (2015) Working with Machines: The Impact of Algorithmic
and Data-Driven Management on Human Workers. In Proceedings of the 33rd Annual ACM Conference on
Human Factors in Computing Systems (CHI '15), pp1603-1612
Li R., Huang Z., Kurniawan E. and Ho C.K. (2015) AuRoSS: An autonomous robotic shelf scanning system.
IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), pp6100–6105
Lichocki P., Billard A., and Kahn P.H. (2011). The ethical landscape of robotics: Bringing ethics into the
design and use of robots. IEEE Robotics and Automation Magazine, 18(1), pp39-50.
Licklider, J.C.R. (1965) Libraries of the Future, MIT Press, Cambridge Massachusetts
Littman M.L., Topcu U, Fu J., Isbell Jr. C.L., Min W. and MacGlashan J. (2017) Environment-Independent
Task Specifications via {GLTL}, CoRR abs/1704.04341, http://arxiv.org/abs/1704.04341
Liu G. (2011) The Application of Intelligent Agents in Libraries: a Survey, Program, 45(1), pp78-97
Loftus H.E. and Kent A. (1956) Automation in the Library: An annotated Bibliography, American
Documentation, 7(2), pp110-126
Logan R.K. and McLuhan M. (2016) The Future of the Library: From Electric Media to Digital Media, Peter Lang Publishing, New York
Lynch C. (2017) The rise of reading analytics and the emerging calculus of reader privacy in the digital
world, First Mondy 22(4), april, [S.l.],Available at:
<http://firstmonday.org/ojs/index.php/fm/article/view/7414/6096>
Manguel A. (2006) The Library at Night, Yale University Press
Marcum, D. (2014) Archives, Libraries, Museums: Coming Back Together? Library and Information
Science, 49(1), pp 74-89, doi:10.1353/lac.2014.0001
Markuson B.E. (1963, ed.) Libraries and Automation, Proceedings of the Conference on Libraries and
Automation held at Airlie Foundation, Warrenton, Virginia.
Mayer-Schoenberger V. and Cukier K. (2013) Big Data: A Revolution that will Transform how We Live,
Work and Think. John Murray Publishers, UK
McCarthy, J. (2007) What is artifical intelligence?, unpublished, Stanford University, http://www-
formal.stanford.edu/jmc/whatisai/
McCartney R. and Anderson M. (1996) The believability of Road Runner cartoons: logical consistency
conquers unreality, AAAI Technical Report WS-96-03
Medina E. (2011) Cybernetic Revolutionaries: Technology and Politics in Allende’s Chile, The MIT Press
Medina E. (2015) Rethinking algorithmic regulation, Kybernetes, 44(6/7), pp1005-1019
Metz C. (2016) The Rise of A.I. What the AI Behind AlphaGo Can Teach Us About Being Human, Wired
05.19.16
Metz C. (2016) AI Is Transforming Google Search. The Rest of the Web Is Next, Wired, 02.04.16
Mitchell T.M. (2009) Mining Our Reality, Science, Vol. 326, Issue 5960, pp. 1644-1645, 18 Dec 2009
Mittelstadt B.D., Allo P., Taddeo M., Wachter S. and Floridi L. (2016) The ethics of algorithms: Mapping the debate, Big Data & Society, 3(2)
Moldovan B., Moreno P., van Otterlo M., Santos-Victor J. and De Raedt L. (2012) Learning Relational
Affordance Models for Robots in Multi-Object Manipulation Tasks, IEEE International Conference on
Robotics and Automation (ICRA), pp4373-4378
Morris S.L. (2009) An Introduction to Archives for Librarians, Libraries Research Publications, Paper 103.
http://docs.lib.purdue.edu/lib_research/103 (E1)
Nerdinger W. (2011a) Die Weisheit baut Zich Ein Haus, (in German) Prestel, Muenchen
Nerdinger W. (2011b) Von Alexandria zum Digitalen Babel – Der Traum von der Universalbibliothek, in:
Nerdinger (2011a)
Nilsson, N.J. (2010) The Quest for Artificial Intelligence, Cambridge University Press
Ng I.C.L. and Wakenshaw S.Y.L. (2017) The Internet-of-Things: Review and research directions,
International Journal of Research in Marketing, 34, p3-21
Noh Y. (2015) Imagining library 4.0: Creating a model for future libraries, The journal of academic
librarianship, 41(6), pp786-797
Palfrey J. (2015) Bibliotech: Why Libraries Matter More than Ever in the Age of Google, Basic Books,
Perseus, USA
Pariser E. (2011) The Filter Bubble: What The Internet Is Hiding From You, Penguin Books
Paulus M.J. Jr. (2011) Reconceptualizing Academic Libraries and Archives in the Digital Age, Libraries and
the Academy 11(4), pp939-952
Perec G. (1985) Brief Notes on the Art and Manner of Arranging One's Books, reprinted in Species of Spaces and Other Pieces (2008) Penguin Classics
Petroski, H. (1999) The Book on the Book Shelf, Vintage
Pickering A (2010) The Cybernetic Brain: Sketches of Another Future, University of Chicago Press
Piper A. (2012) Book was here: Reading in Electronic Times, University of Chicago Press
Pistono F. and Yampolskiy R.V. (2016) Unethical Research: How to Create a Malevolent Artificial
Intelligence, In proceedings of Ethics for Artificial Intelligence Workshop (AI-Ethics-2016). pp1-7
Poole D. and Mackworth A. (2010) Artificial Intelligence: Foundations of Computational Agents, Cambridge University Press
Preisig A.V., Rösch H. and Stückelberger, C. (2014) Ethical Dilemmas in the Information Society: How
Codes of Ethics Help to Find Ethical Solutions, Chapter 1, Globethics.net
Puschmann C. and Bozdag E. (2014) Staking out the unclear ethical terrain of online social experiments,
Internet Policy Review 3(4)
Richards N.M. (2012) The Perils of Social Reading, Legal Studies Research Paper Series, Washington
University, No 12-03-06, http://ssrn.com/abstract=2031307
Richards, N.M. (2014) Four Privacy Myths, Washington School of Law, Working paper
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2427808
https://intellectualprivacyblog.wordpress.com/2014/05/23/four-privacy-myths/
Richards N.M. (2015) Intellectual Privacy: Rethinking Civil Liberties in the Digital Age, Oxford University
Press, Oxford, UK
Richards N.M. and Smart W.D. (2016) How should the law think about robots? Chapter 1, in Robot Law,
Calo R., Froomkin A.M. and Kerr I. (eds.) pp3–22, Edward Elgar Publishing
Richardson K. (2016) Sex Robot Matters: Slavery, the Prostituted, and the Rights of Machines, IEEE
Technology and Society Magazine, 35(2)
Rubel, A. (2014) Libraries, Electronic Resources, and Privacy: The Case for Positive Intellectual Freedom,
The Library Quarterly 84(2), pp183-208
Russell S.J. and Norvig P. (2009) Artificial Intelligence: A Modern Approach (3rd ed.). Pearson Education
Schwartz H.A., Eichstaedt J.C., Kern M.L., Dziurzynski L., Ramones S.M., Agrawal M., Shah. A., Kosinski
M., Stillwell, D., Seligman M.E.P. and Ungar. L.H. (2013) Personality, Gender and Age in The Language of
Social Media: The Open-Vocabulary Approach, PLOS One, Volume 8, Issue 9, pp 1-15.
Shanahan M. (2015) The Technological Singularity, The MIT Press
Sharkey N. (2009) The Robot Arm of the Law Grows Longer", Computer 42, pp113-115
Sharkey N. and Sharkey A. (2006) Artificial intelligence and natural magic, Artifical Intelligence Review,
25(1-2), pp9-19
Silver S., Huang A., Maddison C.J., Guez A., Sifre L., van den Driessche G., Schrittwieser J., Antonoglou I.,
Panneershelvam V., Lanctot M., Dieleman S., Grewe D., Nham J., Kalchbrenner N., Sutskever I., Lillicrap
T., Leach M., Kavukcuoglu K., Graepel T. and Hassabis D. (2016) Mastering the game of Go with deep
neural networks and tree search, Nature, vol. 529 (2016), pp. 484-503
Soares, N. (2015) The Value Learning Problem - Machine Intelligence Research Institute, Technical report
2015-4
Sommer R. (1969) Personal Space: The behavioral basis of design, Prentice-Hall, Inc.
Steinert S. (2014) The Five Robots - A Taxonomy for Roboethics, International Journal of Social Robots
6:249-260
Stone, P., Brooks R., Brynjolfson E., Calo R., Etzioni O., Hager G., Hirschberg J., Kalyanakrishnan S.,
Kamer E., Kraus S., Leyton-Brown K., Parkes D., Press W., Saxenian A., Shah J., Tambe M. and Teller A.
(2016) Artificial Intelligence and Life in 2030: One Hundred Year Study on Artificial Intelligence - Report of the 2015-2016 Study Panel, Stanford University, Stanford, CA
Sütfeld L.R., Richard G., König P. and Gordon P. (2017) Using Virtual Reality to Assess Ethical Decisions in Road Traffic Scenarios: Applicability of Value-of-Life-Based Models and Influences of Time Pressure,
Frontiers in Behavioral Neuroscience, 11, pp122
Svensson M., and Rosengren C. and Astrom, F. (2016) Digitalization and Privacy: A systematic literature
review, Lund, Lund University (Media-Tryck).
Talley N.B. (2016) Imagining the Use of Intelligent Agents and Artificial Intelligence in Academic Law
Libraries, 108 Law Libr. J. 383 (2016)
Tanz J. (2016) Soon We Won’t Program Computers. We’ll Train Them Like Dogs, Wired Magazine 05-17-16
Taylor J. and Yudkowsky E. and LaVictoire P. and Critch A. (2017) Alignment for Advanced Machine
Learning Systems, Machine Intelligence Research Institute, unpublished,
https://intelligence.org/2016/07/27/alignment-machine-learning/
Tene O. and Polonetsky J. (2014) A Theory of Creepy: Technology, Privacy, and Shifting Social Norms, Yale Journal of Law and Technology, 16(1)
Thomas M.A. (2000) Redefining Library Space: Managing the Co-Existence of Books, Computers, and
Readers, Journal of Academic Librarianship, 26(6), pp408-15
Torres-Vargas G.A. (2005) World Brain and Mundaneum: the ideas of Wells and Otlet concerning universal
acces, The journal of information and knowledge management systems, 35(3), pp156-165
Tutt A. (2017) An FDA for Algorithms, 69 Admin. L. Rev. 83 (2017)
van Est R. and Gerritsen J. (2017) Human Rights in the Robot Age: Challenges arising from the use of
robotics, artificial intelligence, and virtual and augmented reality , The Hague, Rathenau Insituut
van der Sloot B., Broeders D., and Schrijvers E. (eds.) (2016) Exploring the Boundaries of Big Data,
Netherlands Scientific Council for Government Policy (WRR) report, Amsterdam University Press
van Otterlo M. (2009) The Logic of Adaptive Behavior, IOS Press
van Otterlo M. (2013) A machine learning perspective on profiling, in: Privacy, due process and the
computational turn, Hildebrandt and de Vries (eds.), Routledge, pp41-64
van Otterlo M. (2014a) Automated Experimentation in Walden 3.0. : The Next step in Profiling, Predicting,
Control and Surveillance in: Surveillance and Society, volume 12, number 2
van Otterlo M. (2014b) Broadening the Privacy Concept in the Digital Age: Adjusting rights?), unpublished,
position paper prepared for the Amnesty International Strategic Investigations Symposium on surveillance
and Human Rights, november 2014
van Otterlo M. (2016b) Project BLIIPS: Making the Physical Public Library more Intelligent through
Artificial Intelligence, Qualitative and Quantitative Methods in Libraries (QQML) 5: 287-300, 2016
van Otterlo M. (2016a) The libraryness of calculative devices, chapter 2, pp35-54, in: Algorithmic life,
Amoore, L. and Piotukh, V. (eds.) Routledge
van Otterlo M. (2016b) Project BLIIPS: Making the Physical Public Library more Intelligent through
Artificial Intelligence, Qualitative and Quantitative Methods in Libraries (QQML) 5: pp287-300
van Otterlo M., and Feldberg F. (2016). Van kaas naar big data: Data Science Alkmaar, het living lab van
NoordHolland noord. Bestuurskunde, 1, pp29–34
van Otterlo M. (2017) Technical fixes and ethical challenges for activity monitoring in physical public
libraries through big data and artificial intelligence --- Invited talk at the 9th International Conference on
Qualitative and Quantitative Methods in Libraries (QQML2017) in Limerick, Ireland (May 2017)
van Otterlo, M. and Warnaar, M. (2017) Towards Optimizing the Public Library: Indoor Localization in
Semi-Open Spaces and Beyond, proceedings of the Benelux Conference on Machine Learning (Benelearn-
2017)
Vanderbilt T. (2013) In-depth: The future of search, Wired, Friday 4 January 2013
Vinge V. (1993) The Coming Technological Singularity: How to Survive in the Post-Human Era
https://www-rohan.sdsu.edu/faculty/vinge/misc/singularity.html
Waller, V (2009) The relationship between public libraries and Google: Too much information. First Monday, [S.l.], Available at: <http://firstmonday.org/ojs/index.php/fm/article/view/2477/2279>.
Walsh, A. (2011) "Blurring the boundaries between our physical and electronic libraries: Location‐aware
technologies, QR codes and RFID tags", The Electronic Library, Vol. 29 Issue: 4, pp.429-437.
Warner W. and Stone M. (1970) The Data Bank Society: Organizations, computers and social freedom,
George Allen and Unwin LTd., Great Britain
Wasik B. (2013) In the Programmable World, All Our Objects Will Act as One, Wired Magazine (05-14-13)
White A.P. (2008) The 'Universal Library' returns in digital form, Libellarium, Volume 1, Number 1, pp 111-
130
Wiering M.A. and van Otterlo M. (2012) Reinforcement Learning: State-of-the-Art, Springer-Verlag
Winget M. (2013) A Meditation on Social Reading and Its Implications for Preservation, De Gruyter, 42(1),
pp1-14.
Wright A. (2014) Cataloging the World: Paul Otlet and the Birth of the Information Age, Oxford University
Press, Oxford, UK.
Wright D., Finn R., Gellert R., Gutwirth S., Schütz P., Friedewald M., Venier S. and Mordini E. (2014)
Ethical dilemma scenarios and emerging technologies Technological Forecasting and Social Change, vol 87, pp325-336
Youyou W., Kosinski M. and Stillwell D. (2015) Computer-based personality judgments are more accurate
than those made by humans, PNAS 2015 112 (4) 1036-1040;
Zastrow, J. (2013), Digital Changes Everything: The Intersection of Libraries and Archives, THE OPINION
PIECE, 33(9)
Zuboff, S. (2015) Big Other: Surveillance Capitalism and the Prospects of an Information Civilization,
Journal of Information Technology (2015) 30, pp75–89