Sunday, February 23, 2020

Your Uber Will be Arriving Shortly

As a college student, I am no stranger to Uber. Whether it be taking one to a class I'm late for because I overslept, or simply because I need to replenish my stockpile of snacks, more often than not I find myself opening the Uber app to "call" a ride.

Are you my Uber?
In “Why we need better ethics for emerging technologies,” James Moor reflects on the concept that living in a period of technology promises dramatic change, in which it is not satisfactory to do ethics as usual. He argued that major technological upheavals require better ethical thinking in terms of being better informed and take meaningful ethical action in terms of being more proactive.

When we call for a ride on the Uber app, or any app that requires personal information like credit card numbers, phone numbers, or in this case drivers license data we rarely think about the implications of where the data is going and how it’s being used by either the app or the company behind it. However, in 2016 more people started to be aware of their data after a hacker was able to access the information of 50 million of Uber’s users as well as 7 million of its drivers. Of the drivers, 600,000 had their driver’s license numbers compromised. 

When Uber first launched in 2011, it was a fairly simple idea that people never even knew they needed. Moor claimed that technological advancements better society, but their novelty makes it difficult to predict ethical issues as situations may arise for which we do not have adequate policies for. The Massive data breach in 2016 was the epitome of what Moor reflects on. As more people, start using any particular technology and the tech increases its social impact it is obvious that the number of ethical concerns increases as well. Moor analyzed this phenomenon as well, terming it Moor's law.

The Uber breach highlights the failure of large corporations to adequately safeguard the private information of their customers. Not only are these breaches of security, but they are breaches of trust for consumers, as companies fail to disclose leaks until months or years later. There is still much education to be done, and discussion to be had, around proper protocols related to data breaches. 


Next time, think twice before you confirm your ride. I know I will.

11 comments:

  1. Hi Pratik, I thought your blog post was really well done! The topic really applies to the concepts from lecture and from the James Moor article. One thing that I would fix would be to remove the work cited and instead just hyperlink text directly to the place you found it. That way you don't need a works cited at the bottom and it adds engagement for the reader to interact with your article. Also you could work on spacing and formatting a little bit. Other than those two minor details, I think you did a fantastic job!

    ReplyDelete
  2. I think you did a good job addressing the issue at hand. I like how in your revision, you included the title of James Moor's work because that is an important piece of information. I think one place that you could improve upon is potentially talking about the implications of the hacking in 2016. How did Uber go about solving the problem? Were there any lawsuits? This would help the reader understand just how significant of a problem that hacking was. Another thing is that the spacing in between the paragraphs were inconsistent. Other than that, I think this was a great blog post.

    ReplyDelete
  3. Hi Pratik! Nice post. I think you did a good job tying in the readings from the start by using a relevant example like Uber, especially to us college kids who Uber regularly. I might recommend introducing the authors you use by their job titles rather than just their paper, just so we as readers understand if they're reputable or not - for example the difference between reading an opinion piece online or a published article in a scientific journal. Overall great job!

    ReplyDelete
  4. Great job on the post. You did a good job introducing the topic at hand, and bolstered the piece using a reading from class. Further, you did a great job integrating the important points from the reading, and this helped build the post. I enjoyed learning something about an app I frequently use, and that made me think differently about the service. All around, great job.

    ReplyDelete
  5. Hi Pratik, I think this is a very interesting topic, and you did a good job of explaining the issue. I like how you introduced the readings from class at the beginning and elaborated beyond. One thing that I recommend on improving is to introduce more about the author that you selected. Overall, nice work!

    ReplyDelete
  6. As an avid uber user, and with the current climate around advanced tech companies especially ride hailing apps, I felt the need to click and read this article. I like the use of Moor's law here to support your argument as it is certainly true that technological advancements lead to more and more ethical challenges. Where I was a little confused was where you introduced Moor's work. I think you can improve the usage of the reading by providing more information and context before mentioning the reading because otherwise it is slightly confusing until the reader gets to the paragraph below where you tie back to the reading. The best arguments integrate the readings and this is certainly close to being a very strong argument. I also completely forgot about the uber security breach, so it was very interesting to read about this again now that I'm learning why it is an even bigger deal than it seemed to be at the time. I would also maybe add a little brief about what measures uber as a company might be taking to mitigate the damages and further risks caused by their platform and hackers. Overall, nice use of the readings and good argument but definitely keep in mind how to make the article flow overall with the integration of the readings.

    ReplyDelete
  7. Hi Pratik!

    I thought you did a really amazing job with the arguments in your piece. I totally understood your points and how you connected to the readings.

    A small fix you could do is to make the "Are you my Uber?" text a bit bigger.

    A sentence to introduce who James Moor is.

    Overall, great job!

    ReplyDelete
  8. I enjoyed reading your post, and I like that you are bringing a real life situation in the spotlight. Your post sticks to your theme very well, and has a tightly written narrative that has paragraphs for each of the main points. I do think that when you are introducing the Moor work into your post, that you should probably provide more context in the surrounding paragraph, as it is just thrown out there in the beginning assuming the reader has heard of him, or has read his work. You can also add another image to enhance your work, as the one image you do have doesn't say much about your argument or post as a whole. Overall, it was an enjoyable read that shed light on a situation that I didn't know happened.

    ReplyDelete
  9. You article let me recall the fact that we need to sign the agreement before we use the app. We do not have any control over our private information after we signed the agreement and provide our information to the company. When we use an app, it looks like we have a trade with the company, where we pay for the service. Nevertheless, the fact is that we have less power than the company as they have the choice on how to deal with those private information.

    ReplyDelete
  10. Hi Pratik,

    Really interesting post! Data breaches are a topic that is only going to get more serious in the future and I liked your take on it. However I think events like the Uber data breach will happen regardless in the future. As companies increase their security on their data, attackers will only increase the methods in which they steal data. Choosing not to use services that are sometimes necessary because the off chance that they get hacked will be hard on most people. Any company could get hacked so unless you don't buy anything, your information is at risk. That's just how our society works now. Overall great post that states your point in a clear and short way.

    ReplyDelete
  11. Hi.
    You're post is much improved from the previous version. Incorporating the list breakdown of the technology stage described by Moor was a great addition, breaking up the content and making it more readable. Breaking up the longer paragraphs into shorter chunks was a good move also. Great work.

    ReplyDelete

Note: Only a member of this blog may post a comment.