Corporate actions and behaviors with excessive CO2e.
Open access peer-reviewed article
This Article is part of THE SPECIAL ISSUE: APPLIED AI IN CYBER SECURITY, LED BY EDUARD BABULAK, NATIONAL SCIENCE FOUNDATION (NSF), UNITED STATES OF AMERICA
Article metrics overview
205 Article Downloads
View Full Metrics
Article Type: Review Paper
Date of acceptance: April 2023
Date of publication: May 2023
DoI: 10.5772/acrt.18
copyright: ©2023 The Author(s), Licensee IntechOpen, License: CC BY 4.0
To better understand how we can help reduce the climate crisis, this research examined user computing activities in detail to analyze and identify eWaste actions causing unknown catastrophic climate degradation. Countless individuals are oblivious to the damage and devastation being caused to the climate by even a single user. As the world becomes more technologically based than ever before, the global impact on the planet has never been greater. This study examines in great detail end-users’ normal computer usage to identify where, how, and why they are generating excess eWaste. We argue that the resultant data collected will provide support for our theory, positing that increasing consumer awareness of better computational practices can lead to positive actions to reduce eWaste. This research study utilized a multiple case study approach to achieve our stated research objectives; recognizing computer actions identified as most detrimental to the climate by level of eWaste (CO2e output) and introducing alternative user actions that are ethical, green, and produce less eWaste. In addition to helping reduce the overall user-level carbon footprint and eWaste output, the sustainability of these alternative user actions can be maintained with zero reduction in privacy or security for end users. Results from this study contribute to the extant body of literature across multiple disciplines, including privacy, green computing, information system science and technology, cybersecurity, and sustainable computing.
privacy
information systems
climate crisis
user behavior theory
carbon footprint
information security
green computing
electronic cookies
eWaste
case study methodology
Author information
The
Due to the increased contribution to the climate crisis, it is essential to adopt environmentally sustainable technology and computing actions to ensure the overall health of our planet. We investigate the problem presented in this research by examining corporate and user actions to determine their level of eWaste output. During data collection and data analysis, computational actions are categorized as either end-user or corporate based on (i) the nature of the action being executed, (ii) the relationship of the user and the action, (iii) the location of the action being taken, and (iv) the duplicability of the action.
In this study, secondary data sources were first analyzed to discover actions and behaviors causing significant climate damage by both corporations and end-users. Next, the identified set of actions and behaviors were assessed and evaluated to determine their individual climate output measured in terms of eWaste. Finally, to compare and identify green, sustainable computing actions and behaviors users can implement, an exhaustive analysis was completed to determine an alternative set of acceptable computing actions and behavior options for consumers. This list of activities was matched with the previously identified alternative user actions to ensure they are ethical, sustainable, green, and produce less eWaste while maintaining data integrity, security, and privacy.
Literature review examining the nature and impact of user actions on the climate crisis across multiple disciplines, including Privacy [1, 2], Green Computing [3], Information System Science and Technology [4, 5], Cybersecurity [6], Sustainable Computing [7–9], and various climate domains [10, 11], has exposed a gap in the research: minimal research exploration examining the negative impact individual user actions have based on carbon dioxide equivalent (CO2e) emissions and carbon output (eWaste) [1, 2, 6, 7], and [9].
To the best of our knowledge, while prior research has explored the problem in different ways to “Go Green” [3, 7, 9, 11, 12], this research is the first of its kind to explore and evaluate individual actions and behavioral practices to determine an estimated, quantifiable emission and eWaste output associated with daily computational tasks. This project examines in detail both corporate actions and behaviors and end-user actions, behaviors, and online security habits, during normal computer usage to identify excess eWaste from wasteful carbon emissions. While reducing the overall carbon footprint and minimizing eWaste output, the sustainability of the presented alternative corporate and end-user actions and behaviors can be implemented and maintained with zero reduction in privacy or increased security concerns for users.
Technology as a medium has become the lifeblood of society for both end users and corporations. Increased reliance on today’s technology has dramatically increased the amount of CO2e emissions released into the atmosphere, causing catastrophic damage on a global scale. To better understand how we can help to reduce the climate crisis, this research investigated in detail, the actions and behaviors to identify eWaste causing unknown catastrophic climate degradation. Due to the increased contribution to the climate crisis, it is essential to adopt environmentally sustainable technology and computing actions to ensure the overall health of our planet.
The climate crisis is an area of concern that has affected most academic disciplines. Many researchers have focused their efforts on how various issues are associated with a negative impact on the climate crisis with varying degrees of scope and success. Miotti
Within the technology domain,
Harm to our environment comes from various domains relating to both end users and corporations, including production [1], home-Use computing [2–4], cloud computing [5–7], eWaste of physical technology and computing parts and components [8, 9, 22], Computer and Software Engineering [23], Virtualization [12], IT Services [24], Computer Science [10], Green Technology [11, 25, 26] and more. While literature evidence exists to support a growing concern across research domains over the environmental damage caused by eWaste, “Technology” as a category remains one of the most damaging due to its potential for long-term catastrophic degradation to our planetary requirements needed for life [1, 2, 4, 25] and [27]. Despite this concern, and an abundance of research evidence indicating widespread damage and the potential for destruction to the environment, manifested in the current climate crisis, there has only been minimal research exploring the use of technology and devices in a sustainable and green manner [1, 3–5], and [28]. Moreover, minimal research has been committed to better understanding the role that corporations and individuals play in reducing emission waste [2, 3, 6], and carbon output [7, 9].
Within the current body of literature, evidence indicates the potential to reduce the current climate crisis by increasing end-user and organizational awareness of alternative sustainable computational practices. Moreover, despite the growing popularity, not only are green practices and sustainable actions in IT [29] slow to be introduced, but eco-friendly strategies that
A multiple case study research design was utilized in this research study, allowing us to analyze multiple use cases in which the individual user or corporate entity have conducted research resulting in decreased carbon emissions in the
All actions identified, whether alternative or detrimental, were evaluated, analyzed, and assessed. During data aggregation, data assessment was completed to identify carbon emissions, alternative actions, and poor computational actions contributing to the climate crisis. Furthermore, through our analysis, this study was able to develop and introduce a set of sustainable computational practices that minimize the overall environmental impact of carbon emissions without any compromise in user privacy and security concerns.
To properly analyze the negative impact actions and behaviors from end users and corporations are having on our environment, we must first identify specific actions and behaviors causing significant eWaste; determined by CO2e emissions and carbon output. To effectively discern the source and nature, we separated corporate actions and behaviors from end-user actions and behaviors and evaluated their negative climate impact and eWaste separately.
Corporations are one of the most prolific carbon abusers today [11, 30, 31]. Through the course of routine business procedures, several activities occur with high frequency within corporate environments that have a catastrophic impact on the climate crisis through eWaste and abuse. Extensive analysis of the extant body of literature highlighted this ongoing concern [32, 33] and enabled us identify to several significant problematic actions and behaviors. Current corporate activities (Table 1) being implemented associated with excess carbon output causing CO2e eWaste include,
Corporate action or behaviors | |
---|---|
(i) | Corporate virtualization |
(ii) | Inefficient software design |
(iii) | Website abuse |
(iv) | Cookie tracking |
End-user actions or behaviors | |
---|---|
(i) | Privacy |
(ii) | Power management |
(iii) | Laptops over desktops |
(iv) | Computer software |
While corporations are some of the biggest carbon abusers on the planet [5] from their operating procedures, end users are not without fault [12]. After determining the negative climate impact of corporate actions and behavior, it was necessary to perform the same actions for end users.
Analysis of the extant body of literature examining end-user actions and behaviors allowed us to identify several damaging activities end users routinely commit, based on carbon emissions [12] (Table 2). These actions and behaviors are identified as having extremely high levels of CO2e output and are considered eWaste [9]. These activities include,
These identified activities are are occurring at an alarmingly high rate by corporations and end users while unintentionally causing massive climate damage. While the associated carbon output is concerning, this research indicates that most users are unaware of the individual level of harm they are causing from their actions and behaviors.
The focal point of our research was discovering abusive and wasteful technological activities by corporations and end users. To identify the most harmful activities, by CO2e output, our data sample focused on corporate and end-user actions and behaviors executed during normal business and computer activities. To ensure our data sample contained only valid data, to successfully and accurately identify current actions and behaviors being implemented by corporations and end users, we developed a custom, hybrid data collection model for use during the data collection and data filtering processes.
Identifying all relevant and related actions and behaviors event data for end users and corporations began first with determining eligibility for potential inclusion in the data sample. For reproducibility, and extending this research exploration to future research projects, it was paramount to maintain a process of data duplicability relating to all data collection and data analysis procedures within this investigation. Based on previous case study research within the extant body of literature [1–3, 6, 7, 9], we created a custom hybrid model for our data collection methodology based on the most successful data collection procedures identified and implemented by preceding authors in this domain. During data identification, collection, and filtering, the custom-designed five-step hybrid process was deployed to ensure that only relevant computational actions were kept for analysis.
Listed in Table 3 are the five procedural steps taken during execution of the custom hybrid process that ensured a valid sample of corporate and end-user actions and behaviors.
| Data identification |
| Data collection |
| Data filtering |
| Confounding data (removal) |
| Duplicate data (removal) |
Sequential progression through the individual steps allowed the systematic and methodical completion of the data collection and data filtering processes and was necessary to build a complete and total data sample set for investigation in this study. Details for each of the individual steps are provided:
Confounding events were accounted for by implementing a dedicated time buffer; a period of time −1-Day
To enable the successful completion of our study, data identification, collection, and filtering were completed in multiple stages. Using a framework based on a
In our research, we focused our literature review across the Technology domain as a whole, with in-depth analysis across multiple disciplines, including privacy, green computing, information system science and technology, cybersecurity, sustainable computing, and various climate domains to ensure an exhaustive sample that included all related and relevant data.
To achieve our objectives, we investigated actions and behaviors contributing the most to the climate crisis through eWaste and excessive emissions. To determine which actions and behaviors are associated with producing the most eWaste, determined by excessive carbon output, we needed to calculate (numerically) the CO2e output for actions and behaviors.
Computation and extrapolation of all identified (and projected) CO2e output and emission levels (eWaste) for identified actions and behaviors associated with a corporate or end-user event in this investigation were completed using calculation and formula information presented by Cucchietti
Many sites use these cookies to track user data (i.e. shopping cart, preferences, etc.). Companies such as Google Analytics utilize 3rd party cookies to provide users with personalized ads relevant to topics they might be interested in [5]. Google Analytics currently has cookies present on over 550,000 unique websites [5]. In total, online advertising outputs 11 to 159 million tons of CO2e [5]. As seen in Table 3, cookie tracking can contribute to 428.6 metric tons of CO2e per month from cookie traffic within a single site (Netflix.com) [5].
A fascinating example demonstrating the negative impact that
Table 4 represents a categorical breakdown of corporate actions and associated eWaste CO2e output emissions:
Actions | eWaste (CO2e output emissions) | |
---|---|---|
(i) | Corporate virtualization | ∼126.72 g/day |
(ii) | Inefficient software design | ∼1,187 g/h |
(iii) | Website abuse | ∼5.81 metric tons/month |
(iv) | Cookie tracking | ∼428.6 metric tons/month |
When comparing the electricity consumption of idle and busy laptops versus desktops, data show that overall, laptops produce less carbon emissions [35]. A desktop with monitor consumes an estimated 0.181 kWh [35] when used. Utilizing our formula and multiplying the estimated kWh by the 475 g of CO2e results in 85.975 total CO2e output. Meanwhile, a laptop being used consumes an estimated 0.049 kWh. Utilizing our formula translated the estimated kWh into 23.275 CO2e output [35].
This inefficient development coincides with the previously mentioned
Actions | eWaste (CO2 output emissions) | |
---|---|---|
(i) | Privacy (Cookies) | ∼11,442 metric tons/month (1200 Company sample) |
(ii) | Power management disabled | ∼101.65 g/h |
(iii) | Laptops over desktop | Laptop: ∼23.275 g/h Desktop: ∼85.975 g/h |
(iv) | Harmful websites | YouTube: ∼1.169 g/page visit |
The main objective of a case study approach is to examine and analyze the nature of a specific item of research interest and its impact in a real-world setting. Moreover, the overreaching objective of a
It is argued in this study that corporations and end-users’ perceived lack of accountability, responsibility, and awareness of detrimental actions contributing negatively towards the climate crisis is the leading factor impeding positive change. On this basis, we posit that once these alternative sustainable actions are presented, corporations and end users will act ethically to help reduce their role in the current climate crisis. There were two objectives in this research examination: (1) identifying, discovering, and evaluating the carbon output of computational actions and behaviors from corporate entities and end users (2) introducing an alternative set of green, sustainable actions, and behaviors emitting less carbon output and reducing eWaste. To accomplish our research goals, data analysis was performed in multiple stages.
To enable the successful completion of our study, data identification, collection, filtering, and analysis were completed in multiple stages. Using a framework based on a
There were two goals for this research investigation; to examine in detail the environmental impact, eWaste output, and contributions that corporate and end-user actions and behaviors have on the ongoing climate crisis and to identify and present an alternative set of actions and behaviors for corporations and end users to implement that are sustainable and green, reduce eWaste output, and minimize their carbon footprint.
To accomplish the stated research objectives, exhaustive data analysis was conducted across multiple stages. First, secondary corporate data sources were analyzed to recognize computer actions that are most detrimental to the climate by the level of eWaste (CO2e and carbon emissions output). Second, an alternative set of user actions was identified and evaluated to determine their individual climate output measured in terms of eWaste to compare and identify acceptable green computing actions. An exhaustive analysis was then completed to determine an acceptable level of safe computer usage action options for consumers matched against the previously identified alternative user actions. This competitive analysis ensured the newly identified actions and behaviors are ethical, sustainable, and green, while producing less overall eWaste. While reducing the overall user-level carbon footprint and eWaste output, the sustainability of these alternative user behaviors will be maintained with zero reduction in privacy or security concerns for end-users.
Allows a corporation to run more than one system at a time but causes massive eWaste. To minimize energy consumption within data centers, corporate entities can adopt server virtualization. Thus, leading to a decrease of 17.153 g of CO2e emissions annually [26]. To put in perspective the overall impact this small change can have on reducing the current climate crisis, a large organization that is not utilizing cloud virtualization can save at least 40%–60% of CO2e by switching solely to a cloud infrastructure [11].
Discovered to cause excess carbon output due to increased energy consumption [2, 8]. Minimizing onsite developers can reduce transportation carbon emissions. Ensuring project deadlines are being met will help minimize wasted labor hours, thus limiting carbon output per faculty. Lastly, requiring developers to ensure the software is performing as efficiently as possible will allow for decreased energy usage, thus reducing carbon emissions for both users and corporations [8].
Corporations contribute excess eWaste through ineffective, old, and incompatible code requiring excessive overhead to run and manage [28]. Improvements to website efficiency can decrease their overall carbon footprint. Such improvements can be done to the websites speed in which pages render, caching of static assets, setting explicit width and height of image elements, removal of unnecessary code, and hosting on a webserver using renewable energy sources [37].
Cookies are inherently designed to TRACK and SPY ON end-users’ computing habits, online activity, and internet preferences under the guise of convenience [7, 30]. Alternatives to cookie tracking are currently lacking on a large scale, however Google has recently announced their intention to create what they call the “The Privacy Sandbox” [38], an in-development industry-wide initiative that will improve user privacy across the web and Android Platform. This solution will limit the intrusive tracking of users and provide safe alternatives to existing technology by removing 3rd party cookies from Chrome browser in 2023 [38]. This initiative will not only increase user privacy but will also decrease the overall energy consumption and CO2e emissions of current cookie tracking [5] and [38]. Although it is unclear the impact “The Privacy Sandbox” will have on the environment, it can be assumed that a decrease in third-party cookies will lead to a decrease in energy consumption caused by said cookies; leading to a reduction in atmospheric CO2e output [5] and [38].
The concern for end users, in terms of CO2e output and eWaste emissions, is associated with cookies and ad tracking [7, 12]. Alternative actions users can take to lessen their cookie carbon footprint would be to reject all non-essential cookies when browsing websites. Oftentimes, there will be a box that appears on screen, asking the user to accept the site’s cookies, and usually designed in a way where it appears that the “Accept All Cookies” button is the only option. However, there is usually an additional button present that allows you to reject all non-essential/non-functional cookies as well.
Bad practices cause unnecessary emission of excess eWaste by end users, associated with normal computing tasks when interacting with technology devices [6, 11, 35]. One alternative solution would be to enable the power management features within the desktop device. Standard power management features may trigger the monitor to enter low-power sleep mode after about 15 min of inactivity, and the computer to enter sleep or hibernate mode after about 30 min of inactivity. Enacting these features will result in an estimated 1,554.30 kWh saved annually, the equivalent to reducing 738,292.50 g of CO2e emissions annually [39]. Additional examples of
An area of contention where users are choosing desktop computers over laptops, to the detriment of the environment via excess eWaste [25]. Alternative options exist for end users, including utilizing a less power-hungry laptop over a desktop whenever possible. In order to be as green as possible, it would also be beneficial for an end user to use a laptop certified by Energy Star; usually denoted by their
Alternative actions to avoid excessive carbon output include limiting time spent on harmful websites, limiting visits to said websites, and advocating for more eco-friendly websites.
The final sample contained a series of actions and behaviors of corporations and end users discovered to be causing the most damage to the climate crisis. Identification of activities expelling the most carbon eWaste was essential in achieving our research objectives, presenting an alternative set of actions and behaviors that can be implemented by corporations and end-users to reduce their overall carbon footprint (eWaste) while maintaining data integrity and privacy.
Harmful user actions and behaviors were identified for corporations and end users, based on level of carbon output (eWaste) [8, 10]. We then investigated the data to determine a series of alternative, green, and sustainable actions and behaviors to reduce carbon output, minimize eWaste, and maintain privacy.
(1)
Organizations have a moral obligation to account for their direct impact on the climate crisis. This equates to accepting responsibility for excess carbon output (eWaste) they produce while simultaneously making plans for becoming
Table 6 represents the breakdown of corporate actions and behaviors with identified alternative green and sustainable actions or behaviors to reduce eWaste CO2e output:
Actions and behaviors | Alternative actions or behavior (green and sustainable) | |
---|---|---|
(i) | Corporate virtualization | – Switching to fully virtualized cloud computing servers |
(ii) | Inefficient software design | – Minimize on-site developers – Minimize wasted labor by sticking to project deadlines – Ensure software energy efficiency |
(iii) | Website abuse | – Improve page rendering speed – Cache static assets – Explicitly set the width and height of images – Remove unnecessary code – Host web server using renewable energy |
(iv) | Cookie tracking | – Use cookie alternatives such as Google’s “The Privacy Sandbox” |
(2)
End users produce an excessive amount of carbon output and contribute greatly to the climate crisis [10]. It is posited that users unwittingly contribute excess eWaste due to a lack of awareness and education of the actual amount of carbon dioxide equivalent (CO2e) they are producing during their daily computer use. By providing end users with facts, figures, and knowledge regarding their contribution to climate degradation, we believe individuals will choose to make positive changes. Through our study, we first identified actions and behaviors users currently engage in causing high carbon output (eWaste).
Similar to corporations, end users have a moral obligation to account for their direct role in the climate crisis and making an active effort to become
Table 5 represents identified end-user actions and their associated eWaste CO2e output emissions. In support of our research objectives, Table 7 represents end-user actions and behaviors with identified alternative green and sustainable actions or behaviors to reduce eWaste CO2e output:
Actions and behaviors | Alternative actions or behavior (green and sustainable) | |
---|---|---|
(i) | Privacy (cookies) | – Reject all non-essential cookies – Occasionally clear browser cookies. |
(ii) | Power management | – Enable power management features |
(iii) | Laptops over desktop | – Using laptops when possible – Looking for Energy Star certified devices |
(iv) | Harmful Websites | – Limit visits to harmful sites – Advocate for websites to become more eco-friendly |
The main objective of this study was to analyze eWaste output for corporate behavior and individual actions. A secondary objective was to introduce alternative sustainable computational practices that can be adopted by both corporate entities and individual users without a loss of data integrity or privacy. The resultant research presented within this manuscript helps advance the fight against the climate crisis. By successfully identifying actions and behaviors causing the most damage to the environment, and simultaneously introducing a series of alternative ethical actions and behaviors that are sustainable and green, we offer a solution capable of reducing the negative impact on the environment through technology abuse without a loss of data integrity or privacy.
It is argued in this study that end users’ perceived lack of responsibility and awareness of detrimental actions that contribute negatively towards the climate crisis is the leading factor impeding positive change. Once these alternative sustainable actions are presented, end users will be able to act and help reduce the current climate crisis.
This research was able to (1) identify abusive actions and behaviors by corporations and end-users, (2) quantitatively determine the magnitude and negative impact that specified corporate and end-user actions have on contributing to the raging climate crisis (based on CO2e output and emissions), and (3) present a set of alternative, safe actions and behaviors that are both green and sustainable, that provide an opportunity to reduce their impact on the climate crisis.
As a contributing source of research reference, this multiple case study investigation adds to the extant body of literature across multiple disciplines. The resultant analysis serves as a basis for continued research exploration into how we can collectively work together to reduce our direct impact on the climate. In addition, this research also serves as a scientific reference resource for academics and researchers interested in better understanding how individual actions within the technology domain can have a devastating effect on the global fight against climate degradation. Future research opportunities exist to extend this research investigation to make further contributions in this domain, specifically founded in observing computing actions and behaviors for eWaste output.
This research adds to the body of literature across multiple disciplines and helps to bridge an identified research gap; identifying user actions and behaviors causing the most climate damage by carbon output (eWaste) and presenting an alternative set of green and sustainable actions. During the study, however, there were several limitations that present an opportunity for future research consideration: (1) Identifying additional sources for data aggregation will allow more refined accuracy levels when validating results, (2) developing more accurate models to calculate CO2e output levels for actions and behaviors, and (3) creating a more robust methodology to determine user actions causing excess eWaste, will facilitate future green computing research with actionable results.
Extending from the presented research limitations, it is recommended to continue this research stream exploring
To better understand how we can help to reduce the climate crisis, this research investigation will examine user computing behaviors in detail to analyze and identify eWaste causing unknown catastrophic climate degradation. Countless individuals are oblivious to the damage and devastation being caused to the climate by even a single user. As the world we live in becomes more technologically based than ever before, the global impact on the planet has never been greater. This project will examine in great detail an end-user’s normal computer usage and online security habits to identify where, how, and why they are generating excess eWaste. It is hypothesized that the resultant data collected will showcase support for our theory, positing that increasing consumer awareness of better computational practices can lead to positive actions to reduce the current climate crisis.
This research study utilized a multiple case study approach to satisfy the research objectives. First, secondary data sources were identified and analyzed to recognize actions and behaviors identified as most detrimental to the climate by the level of eWaste (CO2e and carbon emission output). Second, additional user actions and behaviors were identified, evaluated, and quantitatively measured to determine their individual CO2e output. Once assessed, we collectively identified an acceptable set of safe, alternative actions and behaviors that were ethical, sustainable, and green, to achieve the stated research object in this study. While simultaneously producing less eWaste and reducing the overall user-level carbon footprint and eWaste output, the new set of alternative actions and behaviors can be implemented and maintained with zero reduction in privacy or security concerns for users. Results from this study contribute to the extant body of literature across multiple disciplines, including privacy, green computing, information system science and technology, cybersecurity, and climate control.
The authors declare no conflict of interest.
Written by
Article Type: Review Paper
Date of acceptance: April 2023
Date of publication: May 2023
DOI: 10.5772/acrt.18
Copyright: The Author(s), Licensee IntechOpen, License: CC BY 4.0
© The Author(s) 2023. Licensee IntechOpen. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited.
Impact of this article
205
Downloads
349
Views
1
Crossref Citations
1
Dimensions Citations
Join us today!
Submit your Article