I’m continuing here to share a series of articles I’ve written over the past several months for Christian Computing magazine on the Intelligence Revolution.
Every new technology introduces new capabilities that enable us to do things that previously weren’t possible or practical. As technologists, our job is to capture this new power for our organization. But every new technology also creates new potentials that represent risk to ourselves, our families, and the organizations that we serve. As technologists, we are also called on to manage this danger. In this post I’d like to discuss the dangers introduced by the Intelligence Revolution.
A friend of mine recently asked for my advice. He is pursuing a new career path and faced a decision. Taking one path would position him for systems development opportunities. The other path would position him for big data analytics opportunities. Because I believe that the Intelligence Revolution is happening, and I anticipate that there will continue to be a shortage of data scientists who can work with big data, and because his personal background and strengths are well aligned with data analysis, I told him that the big data analytics path would be one that could create tremendous value for him personally.
But I warned him that pursuing that path may be a challenge for him as a Christian. I believe that it is a path that will pass through many “grey areas” where his moral standards may be challenged.
What do I mean by grey areas? When we’re dealing with information, it’s easy to think of types of information that we should have no problem using (e.g. the user tells us they want us to use that data for our application to personalize results for them), and it’s easy to think of types of information that we know it would be wrong to use (e.g. secretly capturing the keystrokes when a user enters their credit card number and then using that information to make unauthorized charges to the user’s account).
Well some companies do exactly what I’ve described and their customers applaud them for it. When I log onto my Amazon account, I’m presented with recommendations based on what I’ve bought in the past, and even based on items I’ve simply browsed in the past. Sometimes it feels creepy, but most of the time I’m thankful for the recommendations and it helps me to find products that will meet my unique needs.
Other companies have been strongly criticized and their customer loyalty has suffered because of their use of similar customer usage information that they were using to improve the customer experience. For example, in 2011, the mobile phone industry suffered a serious black eye when someone discovered that virtually all smartphones had software that collected information about usage and reported it back to the mobile operators. The operators wanted this information because it provided precise location information and information about how well their network worked in each location. That told the operators where their customers went (and where they needed a network) and how well the network actually worked in those places. This enabled better investment decisions so that the operators could provide a better experience for their customers. Unfortunately, the software company (Carrier IQ) that the operators used was collecting information that didn’t seem necessary for the stated goal, and customers weren’t informed about the information being collected and how it was being used. Carrier IQ also didn’t respond well to the situation, all of which forced the mobile operators to remove the software from all their customers’ phones and made it much harder for the operators to provide a good network experience.
What Does That Mean for Us?
Hopefully those examples spell out the danger for us, both as consumers, and as technologists that are tasked with helping our organizations to leverage technology to best serve our constituents.
As consumers, we have to realize that businesses (and governments and others) have more and more information about us – not just what we do online, but in every transaction that we perform with anyone. How that information will be used will not be limited to the ways that we’ve explicitly requested and not even to the ways that companies have told us they would use the information. In a way, I guess, that may serve as encouragement to be “above reproach” in everything we do and perhaps may be a help in restraining sin. We know that God sees everything we do and even knows our heart, which should be motivation enough, but perhaps knowing that companies and men see our actions as well may cause some to act in a more Godly and honorable way. But it’s also rather scary, knowing that, unlike God, men are sinful and companies don’t always act in our best interests.
As technologists, we must view ourselves as wise stewards of the information that we have. Either explicitly or implicitly, those we serve have entrusted us with it and we must protect it and deal with it in an honorable manner, with right motives and a servant’s heart. But, just as Christ explained in the parable of the talents (Matthew 25), we shouldn’t just bury this treasure, we must maximize the value of it for the benefit of those that have entrusted us with it. We must capture the power of information to the good of those we serve and to the glory of God. Key to this will be right motives, transparency, security, and trust.