Privacy (137)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 15 min
- n/a
- 2017
An exploration of Venmo transactions for five different randomly selected users. On Venmo, all transactions are public by default, and users can take certain steps to make this information private.
- n/a
- 2017
-
- 15 min
- n/a
- 2017
Public by Default: The Tales of Venmo
An exploration of Venmo transactions for five different randomly selected users. On Venmo, all transactions are public by default, and users can take certain steps to make this information private.
If you have Venmo, do you have in on private or public mode? Have you ever thought about what having your transactions publicised could lead to? Who could use information like what you are hungry for or your relationships to other people, and how?
-
- 7 min
- TED
- 2017
Predictive policing software such as PredPol may claim to be objective through mathematical, “colorblind” analyses of geographical crime areas, yet this supposed objectivity is not free of human bias and is in fact used as a justification for the further targeting of oppressed groups, such as poor communities or racial and ethnic minorities. Further, the balance between fairness and efficacy in the justice system must be considered, since algorithms tend more toward the latter than the former.
- TED
- 2017
-
- 7 min
- TED
- 2017
Justice in the Age of Big Data
Predictive policing software such as PredPol may claim to be objective through mathematical, “colorblind” analyses of geographical crime areas, yet this supposed objectivity is not free of human bias and is in fact used as a justification for the further targeting of oppressed groups, such as poor communities or racial and ethnic minorities. Further, the balance between fairness and efficacy in the justice system must be considered, since algorithms tend more toward the latter than the former.
Should we leave policing to algorithms? Can any “perfect” algorithm for policing be created? How can police departments and software companies be held accountable for masquerading bias as the objectivity of an algorithm?
-
- 7 min
- Wired
- 2019
Internet users should start considering private browsers such as Duckduckgo to promote privacy and prevent personalized search results and ads. Many different pieces of software, including browsers by larger tech companies, are beginning to take this approach of erasing data, blocking outside tracking, or preventing cookies.
- Wired
- 2019
-
- 7 min
- Wired
- 2019
It’s Time to Switch to a Privacy Browser
Internet users should start considering private browsers such as Duckduckgo to promote privacy and prevent personalized search results and ads. Many different pieces of software, including browsers by larger tech companies, are beginning to take this approach of erasing data, blocking outside tracking, or preventing cookies.
Consider if the privacy-oriented browsers described in the article were the default. Whose interests would this work towards? Whose interests would this work against?
-
- 5 min
- The New York Times
- 2019
In New York City, biometrics were used as a step in the investigation process, and thus combined with human oversight to help identify criminals and victims alike.
- The New York Times
- 2019
-
- 5 min
- The New York Times
- 2019
How Biometrics Makes You Safer
In New York City, biometrics were used as a step in the investigation process, and thus combined with human oversight to help identify criminals and victims alike.
How does facial recognition technology facilitate challenging investigations? Do you believe police use of facial recognition is as transparent and pure as this article makes it seem? Where could bias enter this system of using facial recognition technology?
-
- 5 min
- Wired
- 2019
Non-profit companies such as Thorn and the Canadian Centre for Child Protection are using existing software, particularly facial recognition algorithms, to discover ways to become more proactive in fighting child pornography and human trafficking on the dark web.
- Wired
- 2019
-
- 5 min
- Wired
- 2019
How Facial Recognition is fighting child sex trafficking
Non-profit companies such as Thorn and the Canadian Centre for Child Protection are using existing software, particularly facial recognition algorithms, to discover ways to become more proactive in fighting child pornography and human trafficking on the dark web.
How has technology facilitated underground illegal activities, such as child trafficking? How has technology also facilitated fighting back against them? What is your opinion on the debate on whether or not law enforcement should have extensive access to facial recognition technology or machine learning algorithms?
-
- 7 min
- MIT Technology Review
- 2019
Autonomous vehicles could be subject to hacks by adversarial machine-learning, possibly perpetrated by out-of-work truck/Uber drivers and “adversarial machine learning”. The fact that vehicle algorithms can already be fairly easily tricked also raises concerns.
- MIT Technology Review
- 2019
-
- 7 min
- MIT Technology Review
- 2019
Hackers Are the Real Obstacle for Self-Driving Vehicles
Autonomous vehicles could be subject to hacks by adversarial machine-learning, possibly perpetrated by out-of-work truck/Uber drivers and “adversarial machine learning”. The fact that vehicle algorithms can already be fairly easily tricked also raises concerns.
Had you considered this big obstacle in self-driving? How would this risk impact the business of self-driving vehicles? What are the consequences of companies not fully understanding the machine algorithms that they use? Should we use self-driving vehicles when this threat stands?