The ability, especially of corporations or governments, to collect data that should not be publicly available.
Data Privacy (50)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 15 min
- The App Solutions
Overview of recommender systems, which are information filtering algorithms design to suggest content or products to a particular user.
- The App Solutions
-
- 15 min
- The App Solutions
5 types of recommender systems and their impact on customer experience
Overview of recommender systems, which are information filtering algorithms design to suggest content or products to a particular user.
How do information filtering algorithms work and learn? Are some types of recommender systems more generally ethical than others?
-
- 5 min
- Gizmodo
- 2020
The data privacy of employees is at risk under a new “Productivity Score” program started by Microsoft, in which employers and administrators can use Microsoft 365 platforms to collect several metrics on their workers in order to “optimize productivity.” However, this approach causes unnecessary stress for workers, beginning a surveillance program in the workplace.
- Gizmodo
- 2020
-
- 5 min
- Gizmodo
- 2020
Microsoft’s Creepy New ‘Productivity Score’ Gamifies Workplace Surveillance
The data privacy of employees is at risk under a new “Productivity Score” program started by Microsoft, in which employers and administrators can use Microsoft 365 platforms to collect several metrics on their workers in order to “optimize productivity.” However, this approach causes unnecessary stress for workers, beginning a surveillance program in the workplace.
How are excuses such as using data to “optimize productivity” employed to gather more data on people? How could such a goal be accomplished without the surveillance aspect? How does this approach not account for a diversity of working methods?
-
- 10 min
- Kinolab
- 2016
In this episode, Kenny’s life is upended after hackers use malware to access a compromising video of Kenny on his laptop. Under the threat of this humiliating video being sent to everyone in his contacts, Kenny becomes a puppet of the hackers, forced to have his location services on and be tracked and contacted through his smartphone wherever he goes. Along with other puppets of the hackers, including a man named Hector who had an affair, he is forced to commit heinous acts such as a bank robbery and a fight to the death. Despite their compliance, the hackers release the puppets’ information anyway, leading to vast consequences in their personal lives.
- Kinolab
- 2016
Cyber Blackmailing and Compromising Data
In this episode, Kenny’s life is upended after hackers use malware to access a compromising video of Kenny on his laptop. Under the threat of this humiliating video being sent to everyone in his contacts, Kenny becomes a puppet of the hackers, forced to have his location services on and be tracked and contacted through his smartphone wherever he goes. Along with other puppets of the hackers, including a man named Hector who had an affair, he is forced to commit heinous acts such as a bank robbery and a fight to the death. Despite their compliance, the hackers release the puppets’ information anyway, leading to vast consequences in their personal lives.
Is anyone truly “alone” or “unwatched” when in the presence of their mobile computing devices? Whose responsibility is it to guard people against the dangers witnessed in this narrative? Do digital technologies need clearer and more thorough warnings about the possibilities of malware infecting a device? How can mobile computing devices and location tracking be manipulated to deprive people of autonomy? Are small individual steps such as covering up cameras enough to guard against these types of problems?
-
- 8 min
- Kinolab
- 2019
Chris is a ride-share driver who has taken passenger Jaden hostage, with the conditions of release being that he is connected with Billy Bauer, the CEO of social media company Smithereen, for a conversation. While the London police attempt to deal with the situation through negotiation, the management team at Smithereen uses several data mining techniques, including analysis of Chris’s various social media pages and audio data streaming from his device, to provide the police with a valuable and complete profile on Chris.
- Kinolab
- 2019
Social Media Data and Cooperation with Law Enforcement
Chris is a ride-share driver who has taken passenger Jaden hostage, with the conditions of release being that he is connected with Billy Bauer, the CEO of social media company Smithereen, for a conversation. While the London police attempt to deal with the situation through negotiation, the management team at Smithereen uses several data mining techniques, including analysis of Chris’s various social media pages and audio data streaming from his device, to provide the police with a valuable and complete profile on Chris.
Are things said on social media fair game for law enforcement to use against a person? Does this include data that a user might not even know a company has gathered on them? How might “abstractions” of a user formed by a social media company be misused to make a bad judgement about a person? Should social media information and profiles of users made by companies be used in attempts to stop crime or criminals before any wrongdoings are committed? What are the dangers of big data companies having a close relationship with law enforcement?
-
- 6 min
- Kinolab
- 2019
In an imagined future of London, citizens all across the globe are connected to the Feed, a device and network accessed constantly through a brain-computer interface. Kate Hatfield, a new mother, discovers that someone has hacked into the device in her head, and thus was able to access some of her lived memories. Later, the culprit of this hack is revealed to be her father-in-law Lawrence, who was attempting to implant the Feed into Bea, the new baby.
- Kinolab
- 2019
Consent and Control with Personal Data
In an imagined future of London, citizens all across the globe are connected to the Feed, a device and network accessed constantly through a brain-computer interface. Kate Hatfield, a new mother, discovers that someone has hacked into the device in her head, and thus was able to access some of her lived memories. Later, the culprit of this hack is revealed to be her father-in-law Lawrence, who was attempting to implant the Feed into Bea, the new baby.
What are the dangers that come with ‘backing up’ memory to some type of cloud account? What risks are posed by hackers and corporations that run such backing up services? Is there something special about the transient, temporary nature of human memory that should remain as it is? How much of our privacy are we willing to sacrifice in order for safety/connectivity? How should consent work in terms of installing a brain-computer interface into a person? Should a parent or other family member be able to decide this for a child?
-
- 9 min
- Kinolab
- 2010
On a fall night in 2003, Harvard undergrad and computer programming genius Mark Zuckerberg sits down at his computer and heatedly begins working on a new idea. In a fury of blogging and programming, what begins in his dorm room as a small site among friends soon becomes a global social network and a revolution in communication. A mere six years and 500 million friends later, Mark Zuckerberg is the youngest billionaire in history… but for this entrepreneur, success leads to both personal and legal complications.
- Kinolab
- 2010
Facebook Origins and Control Over Photos
On a fall night in 2003, Harvard undergrad and computer programming genius Mark Zuckerberg sits down at his computer and heatedly begins working on a new idea. In a fury of blogging and programming, what begins in his dorm room as a small site among friends soon becomes a global social network and a revolution in communication. A mere six years and 500 million friends later, Mark Zuckerberg is the youngest billionaire in history… but for this entrepreneur, success leads to both personal and legal complications.
With increased sophistication of hacking, are anyone’s photos ever private in a digital space? When personal photos are uploaded to digital platforms for one purpose, how can users ensure that they are not used for another purpose? Has Facebook truly evolved beyond its roots of using photos to make binary judgements about people, or will this “hot or not” program always be a part of its character? How are women in particular targeted and impacted by privacy of photos? How does this narrative highlight some of the problems with the use of Facebook today? How did Facebook’s “coolness,” along with its apparent lack of cost for use, help it corner markets and make unfathomable profits?