The ability, especially of corporations or governments, to collect data that should not be publicly available.
Data Privacy (48)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 15 min
- The App Solutions
Overview of recommender systems, which are information filtering algorithms design to suggest content or products to a particular user.
- The App Solutions
-
- 15 min
- The App Solutions
5 types of recommender systems and their impact on customer experience
Overview of recommender systems, which are information filtering algorithms design to suggest content or products to a particular user.
How do information filtering algorithms work and learn? Are some types of recommender systems more generally ethical than others?
-
- 5 min
- Tech Crunch
- 2020
During Google’s attempt to merge with the company Fitbit, the NGO Amnesty International has provided warnings to the competition regulators in the EU that such a move would be detrimental to privacy. Based on Google’s historical malpractice with user data, since its status as a tech monopoly allows it to mine data from several different avenues of a user’s life, adding wearable health-based tech to this equation puts the privacy and rights of users at risk. Calls for scrunity of “surveillance capitalism” employed by tech giants.
- Tech Crunch
- 2020
-
- 5 min
- Tech Crunch
- 2020
No Google-Fitbit merger without human rights remedies, says Amnesty to EU
During Google’s attempt to merge with the company Fitbit, the NGO Amnesty International has provided warnings to the competition regulators in the EU that such a move would be detrimental to privacy. Based on Google’s historical malpractice with user data, since its status as a tech monopoly allows it to mine data from several different avenues of a user’s life, adding wearable health-based tech to this equation puts the privacy and rights of users at risk. Calls for scrunity of “surveillance capitalism” employed by tech giants.
When considering how companies and advertisers may use them, what sorts of personal statistics related to health and well-being should and should not be collected by mobile computing devices? How can devices originally built to stand on their own as one technological artifact become more convenient or harmful to a user when they become part of a technological architecture?
-
- 5 min
- Kinolab
- 2014
In this vignette, Matt describes his backstory as a member of an online community who used technology called “Z-eyes” to walk each other through activities such as flirting with women at bars. The Z-eyes technology directly streams all audiovisual data which his friend Harry experiences to his screen, and Matt is additionally able to use facial recognition and information searches to offer background information which enhances Harry’s plays.
- Kinolab
- 2014
Vicarious Digital Living
In this vignette, Matt describes his backstory as a member of an online community who used technology called “Z-eyes” to walk each other through activities such as flirting with women at bars. The Z-eyes technology directly streams all audiovisual data which his friend Harry experiences to his screen, and Matt is additionally able to use facial recognition and information searches to offer background information which enhances Harry’s plays.
What are some problems with technology such as this being invisible, in terms of privacy? Could this have legitimate therapeutic purposes, such as being a treatment for social anxiety? How should technology like Z-eyes be regulated?
-
- 10 min
- Kinolab
- 2016
In this episode, Kenny’s life is upended after hackers use malware to access a compromising video of Kenny on his laptop. Under the threat of this humiliating video being sent to everyone in his contacts, Kenny becomes a puppet of the hackers, forced to have his location services on and be tracked and contacted through his smartphone wherever he goes. Along with other puppets of the hackers, including a man named Hector who had an affair, he is forced to commit heinous acts such as a bank robbery and a fight to the death. Despite their compliance, the hackers release the puppets’ information anyway, leading to vast consequences in their personal lives.
- Kinolab
- 2016
Cyber Blackmailing and Compromising Data
In this episode, Kenny’s life is upended after hackers use malware to access a compromising video of Kenny on his laptop. Under the threat of this humiliating video being sent to everyone in his contacts, Kenny becomes a puppet of the hackers, forced to have his location services on and be tracked and contacted through his smartphone wherever he goes. Along with other puppets of the hackers, including a man named Hector who had an affair, he is forced to commit heinous acts such as a bank robbery and a fight to the death. Despite their compliance, the hackers release the puppets’ information anyway, leading to vast consequences in their personal lives.
Is anyone truly “alone” or “unwatched” when in the presence of their mobile computing devices? Whose responsibility is it to guard people against the dangers witnessed in this narrative? Do digital technologies need clearer and more thorough warnings about the possibilities of malware infecting a device? How can mobile computing devices and location tracking be manipulated to deprive people of autonomy? Are small individual steps such as covering up cameras enough to guard against these types of problems?
-
- 8 min
- Kinolab
- 2019
Chris is a ride-share driver who has taken passenger Jaden hostage, with the conditions of release being that he is connected with Billy Bauer, the CEO of social media company Smithereen, for a conversation. While the London police attempt to deal with the situation through negotiation, the management team at Smithereen uses several data mining techniques, including analysis of Chris’s various social media pages and audio data streaming from his device, to provide the police with a valuable and complete profile on Chris.
- Kinolab
- 2019
Social Media Data and Cooperation with Law Enforcement
Chris is a ride-share driver who has taken passenger Jaden hostage, with the conditions of release being that he is connected with Billy Bauer, the CEO of social media company Smithereen, for a conversation. While the London police attempt to deal with the situation through negotiation, the management team at Smithereen uses several data mining techniques, including analysis of Chris’s various social media pages and audio data streaming from his device, to provide the police with a valuable and complete profile on Chris.
Are things said on social media fair game for law enforcement to use against a person? Does this include data that a user might not even know a company has gathered on them? How might “abstractions” of a user formed by a social media company be misused to make a bad judgement about a person? Should social media information and profiles of users made by companies be used in attempts to stop crime or criminals before any wrongdoings are committed? What are the dangers of big data companies having a close relationship with law enforcement?
-
- 6 min
- Kinolab
- 2019
In an imagined future of London, citizens all across the globe are connected to the Feed, a device and network accessed constantly through a brain-computer interface. Kate Hatfield, a new mother, discovers that someone has hacked into the device in her head, and thus was able to access some of her lived memories. Later, the culprit of this hack is revealed to be her father-in-law Lawrence, who was attempting to implant the Feed into Bea, the new baby.
- Kinolab
- 2019
Consent and Control with Personal Data
In an imagined future of London, citizens all across the globe are connected to the Feed, a device and network accessed constantly through a brain-computer interface. Kate Hatfield, a new mother, discovers that someone has hacked into the device in her head, and thus was able to access some of her lived memories. Later, the culprit of this hack is revealed to be her father-in-law Lawrence, who was attempting to implant the Feed into Bea, the new baby.
What are the dangers that come with ‘backing up’ memory to some type of cloud account? What risks are posed by hackers and corporations that run such backing up services? Is there something special about the transient, temporary nature of human memory that should remain as it is? How much of our privacy are we willing to sacrifice in order for safety/connectivity? How should consent work in terms of installing a brain-computer interface into a person? Should a parent or other family member be able to decide this for a child?