Loading...
|
Please use this identifier to cite or link to this item:
https://nccur.lib.nccu.edu.tw/handle/140.119/152410
|
Title: | 以互補性觀點探討冷鏈無人機應用倫理 An Investigation of Addressing Cold Chain Drone Delivery Ethical Concerns: A Complementary View |
Authors: | 李如芹 Lee, Ju-Chin |
Contributors: | 杜雨儒 Tu, Yu-Ju 李如芹 Lee, Ju-Chin |
Keywords: | 無人機 無人駕駛飛行器 UAV 倫理 道德問題 冷鏈 疫苗 互補性資產 最後一哩路配送 drone unmanned aerial vehicles UAV ethics ethical concerns cold chain vaccine complementary assets last-mile delivery |
Date: | 2024 |
Issue Date: | 2024-08-05 12:06:47 (UTC+8) |
Abstract: | 利用無人機進行配送成為近年來最後一哩路配送系統的一個方案,鑑於 COVID-19 大流行導致疫苗需求大增,且最後一哩路配送被廣泛地認為是整個配送過程中最昂貴的一段,因此冷鏈最後一哩路配送系統的效率更顯重要。 了解這一領域的倫理是必須且重要的,因為新技術的引入往往在初期容易忽略倫理考量,包括隱私、準確性、財產和可及性、安全性和正確性等概念。透過分析這些倫理問題,加上技術和非技術的互補資產,闡明進入這一行業所需的考量。 本研究採用系統性的文獻回顧法,檢索多個商業及科技資料庫後篩選出與本文研究相關之論文進行探討。以道德六大框架為基礎進行整理,旨在降低產業的道德風險並推廣產業發展。 In light of the heightened demand for vaccines due to the COVID-19 pandemic in 2020, the necessity for an efficient cold chain last-mile delivery system has become increasingly apparent. This is especially crucial since last-mile delivery is widely recognized as the most expensive segment of the overall delivery process. Consequently, the use of drones for this purpose has emerged as a popular solution in recent years. However, it’s crucial to recognize the significance of ethics in this field, as the introduction of new technology often leads to oversight or neglect of ethical considerations, including Privacy, Accuracy, Property, and Accessibility (PAPA), Safety, and Justice. Addressing these ethical concerns forms the primary motivation for implementing this study. We utilize these ethical concerns, along with technical and non-technical complementary assets, to clarify the considerations necessary for entering this industry. |
Reference: | Abbasi, M. A., Memon, Z. A., Syed, T. Q., Memon, J., & Alshboul, R. (2017). Addressing the future data management challenges in iot: A proposed framework. International Journal of Advanced Computer Science and Applications, 8(5). Ahn, T., Seok, J., Lee, I., & Han, J. (2018). Reliable flying iot networks for uav disaster rescue operations. Mobile Information Systems, 2018. Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A., & Chaumette, S. (2017). Security, privacy and safety evaluation of dynamic and static fleets of drones. 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC), 1–12. Ashok, A., Brison, M., & LeTallec, Y. (2017). Improving cold chain systems: Challenges and solutions. Vaccine, 35(1ㄗㄠ7), 2217–2223. Atlam, H., Alenezi, A., Walters, R., Wills, G., et al. (2017). An overview of risk estimation techniques in risk-based access control for the internet of things. Atlam, H. F., Alassafi, M. O., Alenezi, A., Walters, R. J., & Wills, G. B. (2018). Xacml for building access control policies in internet of things. IoTBDS, 253–260. Atlam, H. F., Alenezi, A., Alassafi, M. O., & Wills, G. (2018). Blockchain with internet of things: Benefits, challenges, and future directions. International Journal of Intelligent Systems and Applications, 10(6), 40–48. Atlam, H. F., Walters, R. J., & Wills, G. B. (2018). Internet of nano things: Security issues and applications. Proceedings of the 2018 2nd international conference on cloud and big data computing, 71–77.
Atlam, H. F., & Wills, G. B. (2020). Iot security, privacy, safety and ethics. Digital twin technologies and smart cities, 123–149. Ayamga, M., Akaba, S., & Nyaaba, A. A. (2021). Multifaceted applicability of drones: A review. Technological Forecasting and Social Change, 167, 120677. Balaji, S., Nathani, K., & Santhakumar, R. (2019). Iot technology, applications and challenges: A contemporary survey. Wireless personal communications, 108, 363–388. Baldini, G., Botterman, M., Neisse, R., & Tallacchini, M. (2018). Ethical design in the internet of things. Science and engineering ethics, 24, 905–925. Bhatt, K., Pourmand, A., & Sikka, N. (2018). Targeted applications of unmanned aerial vehicles (drones) in telemedicine. Telemedicine and e-Health, 24(11), 833–838. Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems users have to fear? using fear appeals to engender threats and fear that motivate protective security behaviors. MIS quarterly, 39(4), 837–864. Chatterjee, S., & Sarker, S. (2013). Infusing ethical considerations in knowledge management scholarship: Toward a research agenda. Journal of the Association for Information Systems, 14(8), 1. Chatterjee, S., Sarker, S., & Valacich, J. S. (2015). The behavioral roots of information systems security: Exploring key factors related to unethical it use. Journal of Management Information Systems, 31(4), 49–87. Chen, P.-z. (2023). An investigation of iot ethical concerns, 5–12. Christmann, P. (2000). Effects of “best practices”of environmental management on cost advantage: The role of complementary assets. Academy of Management journal, 43(4), 663–680.
Chung, S. H., Sah, B., & Lee, J. (2020). Optimization for drone and drone-truck combined operations: A review of the state of the art and future directions. Computers & Operations Research, 123, 105004. Colombo, M. G., Grilli, L., & Piva, E. (2006). In search of complementary assets: The determinants of alliance formation of high-tech start-ups. Research policy, 35(8), 1166–1199. Comes, T., Bergtora Sandvik, K., & Van de Walle, B. (2018). Cold chains, interrupted: The use of technology and information for decisions that keep humanitarian vaccines cool. Journal of Humanitarian Logistics and Supply Chain Management, 8(1), 49–69. De Boeck, K., Decouttere, C., & Vandaele, N. (2020). Vaccine distribution chains in low-and middle-income countries: A literature review. Omega, 97, 102097. Elkhodr, M., Shahrestani, S., & Cheung, H. (2016). The internet of things: New interoperability, management and security challenges. arXiv preprint arXiv:1604.04824. Esper, T. L., Jensen, T. D., Turnipseed, F. L., & Burton, S. (2003). The last mile: An examination of effects of online retail delivery strategies on consumers. Journal of Business logistics, 24(2), 177–203. European Sting. (2023). How drones are transforming access to healthcare in india [Accessed on October 15, 2023]. https://europeansting.com/2023/09/04/how- drones-are-transforming-access-to-healthcare-in-india/ Federal Aviation Administration. (2021). Integration pilot program - faa unmanned aircraft systems. Fortune Business Insights. (2022). Commercial drone market [Report ID: FBI102171].
Gal, U., Hansen, S., & Lee, A. S. (2022). Research perspectives: Toward theoretical rigor in ethical analysis: The case of algorithmic decision-making systems. Journal of the Association for Information Systems, 23(6), 1634–1661. Golubovic, N., Wolski, R., Krintz, C., & Mock, M. (2019). Improving the accuracy of outdoor temperature prediction by iot devices. 2019 IEEE International Congress on Internet of Things (ICIOT), 117–124. Gürkaynak, G., Yılmaz, I., Yeşilaltay, B., & Bengi, B. (2018). Intellectual property law and practice in the blockchain realm. Computer law & security review, 34(4), 847–862. Haidari, L. A., Brown, S. T., Ferguson, M., Bancroft, E., Spiker, M., Wilcox, A., Ambikapathi, R., Sampath, V., Connor, D. L., & Lee, B. Y. (2016). The economic and operational value of using drones to transport vaccines. Vaccine, 34(34), 4062–4067. Hughes, A., & Morton, M. S. S. (2006). The transforming power of complementary assets. MIT Sloan Management Review. Hui, K.-L., Kim, S. H., & Wang, Q.-H. (2017). Cybercrime deterrence and international legislation. Mis Quarterly, 41(2), 497–524. InsightAce Analytic. (2023). Global vaccine cold chain logistics market [Accessed: 2023-12-03]. Knopf, J. W. (2006). Doing a literature review. PS: Political Science & Politics, 39(1), 127–132. Lagkas, T., Argyriou, V., Bibi, S., & Sarigiannidis, P. (2018). Uav iot framework views and challenges: Towards protecting drones as “things”. Sensors, 18(11), 4015. Lai, X., Yang, T., Wang, Z., & Chen, P. (2019). Iot implementation of kalman filter to improve accuracy of air quality monitoring and prediction. Applied Sciences, 9(9), 1831.
Lin, H., & Bergmann, N. W. (2016). Iot privacy and security challenges for smart home environments. Information, 7(3), 44. Lin, J., Long, W., Zhang, A., & Chai, Y. (2020). Blockchain and iot-based architecture design for intellectual property protection. International Journal of Crowd Science, 4(3), 283–293. Mason, R. O. (1986). Four ethical issues of the information age. MIS quarterly, 5–12. Mingers, J., & Walsham, G. (2010). Toward ethical information systems: The contribution of discourse ethics. MIS quarterly, 833–854. Moher, D., Liberati, A., Tetzlaff, J., & Altman, D. (2009). Group p (2009) preferred reporting items for systematic reviews and meta-analyses: The prisma statement. bmj 339: B2535. Mohsan, S. A. H., Zahra, Q. u. A., Khan, M. A., Alsharif, M. H., Elhaty, I. A., & Jahid, A. (2022). Role of drone technology helping in alleviating the covid-19 pandemic. Micromachines, 13(10), 1593. Popescul, D., & Georgescu, M. (2014). Internet of things–some ethical issues. The USV Annals of Economics and Public Administration, 13(2 (18)), 208–214. Ranieri, L., Digiesi, S., Silvestri, B., & Roccotelli, M. (2018). A review of last mile logistics innovations in an externalities cost reduction vision. Sustainability, 10(3), 782. Rother, E. T. (2007). Systematic literature review x narrative review. Acta paulista de enfermagem, 20, v–vi. Sarkis-Onofre, R., Catalá-López, F., Aromataris, E., & Lockwood, C. (2021). How to properly use the prisma statement. Systematic Reviews, 10(1), 1–3. Shafique, K., Khawaja, B. A., Sabir, F., Qazi, S., & Mustaqim, M. (2020). Internet of things (iot) for next-generation smart systems: A review of current challenges,
future trends and prospects for emerging 5g-iot scenarios. Ieee Access, 8, 23022–23040. Sham, R., Siau, C. S., Tan, S., Kiu, D. C., Sabhi, H., Thew, H. Z., Selvachandran, G., Quek, S. G., Ahmad, N., & Ramli, M. H. M. (2022). Drone usage for medicine and vaccine delivery during the covid-19 pandemic: Attitude of health care workers in rural medical centres. Drones, 6(5), 109. Slabinac, M. (2015). Innovative solutions for a “last-mile”delivery–a european experience. Business Logistics in Modern Management. Snyder, H. (2019). Literature review as a research methodology: An overview and guidelines. Journal of business research, 104, 333–339. Tawalbeh, L., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2020). Iot privacy and security: Challenges and solutions. Applied Sciences, 10(12), 4102. Teece, D. J. (1986). Profiting from technological innovation: Implications for integration, collaboration, licensing and public policy. Research policy, 15(6), 285–305. Teece, D. J. (1988). Capturing value from technological innovation: Integration, strategic partnering, and licensing decisions. Interfaces, 18(3), 46–61. The Verge. (2021, March 9). Drone delivery helps maintain vaccine cold chain in ghana [Accessed on October 15, 2023]. https://www.theverge.com/2021/3/9/22320965/drone-delivery-vaccine-ghana- zipline-cold-chain-storage Ukil, A., Bandyopadhyay, S., & Pal, A. (2014). Iot-privacy: To be private or not to be private. 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 123–124. Wang, N. (2021). “as it is africa, it is ok”? ethical considerations of development use of drones for delivery in malawi. IEEE Transactions on Technology and Society, 2(1), 20–30.
Williams, B. A., Jones, C. H., Welch, V., & True, J. M. (2023). Outlook of pandemic preparedness in a post-covid-19 world. npj Vaccines, 8(1), 178. Xiao, Y., & Watson, M. (2019). Guidance on conducting a systematic literature review. Journal of planning education and research, 39(1), 93–112. Ziegeldorf, J. H., Morchon, O. G., & Wehrle, K. (2014). Privacy in the internet of things: Threats and challenges. Security and Communication Networks, 7(12), 2728–2742. |
Description: | 碩士 國立政治大學 資訊管理學系 111356019 |
Source URI: | http://thesis.lib.nccu.edu.tw/record/#G0111356019 |
Data Type: | thesis |
Appears in Collections: | [資訊管理學系] 學位論文
|
Files in This Item:
File |
Description |
Size | Format | |
601901.pdf | | 1149Kb | Adobe PDF | 0 | View/Open |
|
All items in 政大典藏 are protected by copyright, with all rights reserved.
|