Privacy (137)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 5 min
- MIT Technology Review
- 2019
Discusses the issues that come with allowing private companies to fight back against cyber attacks by chasing hackers across the internet, including greater conflict with other countries and potential lawsuits.
- MIT Technology Review
- 2019
-
- 5 min
- MIT Technology Review
- 2019
Five reasons “hacking back” is a recipe for cybersecurity chaos
Discusses the issues that come with allowing private companies to fight back against cyber attacks by chasing hackers across the internet, including greater conflict with other countries and potential lawsuits.
Do we need international norms to help defuse tensions in the cyberspace? What are the “alternatives” to hacking back? Would data be safer if it was not digital?
-
- 5 min
- The New York Times
- 2019
As the case study of Baltimore demonstrates, cyber crime against governments for ransom of digital cash is not an uncommon practice.
- The New York Times
- 2019
-
- 5 min
- The New York Times
- 2019
Hackers Holding Baltimore Hostage
As the case study of Baltimore demonstrates, cyber crime against governments for ransom of digital cash is not an uncommon practice.
How can hacking affect whole cities? Should entire cities trust digital systems to contain all of their important information?
-
- 10 min
- The New York Times
- 2019
Databases of people’s faces are being compiled without their knowledge by companies and researchers (including social media companies or dating sites), with many shared around the world and fueling the advancement of facial recognition technology.
- The New York Times
- 2019
-
- 10 min
- The New York Times
- 2019
Facial Recognition Tech is Growing Stronger, Thanks to Your Face
Databases of people’s faces are being compiled without their knowledge by companies and researchers (including social media companies or dating sites), with many shared around the world and fueling the advancement of facial recognition technology.
How comfortable would you feel knowing that your face is in various databases and is being use, in some cases, to fuel their machine learning algorithms? As of right now, Google and Facebook, who are said to have the largest facial databases of all, do not share their information, but might they? And what would happen if they did?
-
- 28 min
- Cornell Tech
- 2019
Pre-trial risk assessment is part of an attempted answer to mass incarceration. Data sometimes answers a different question than the ones we’re trying to answer (data based on riskiness before incarceration, not how dangerous they are later). Essentially, technologies and algorithms which end up in contexts of social power differentials can often be abused to further cause injustice against people accused of a crime, for example. Numbers are not neutral and can even be a “moral anesthetic,” especially if the sampled data has confounding variables that collectors ignore. Engineers designing technology do not always envisage ethical questions when making decisions that ought to be political.
- Cornell Tech
- 2019
Algorithms in the Courtroom
Pre-trial risk assessment is part of an attempted answer to mass incarceration. Data sometimes answers a different question than the ones we’re trying to answer (data based on riskiness before incarceration, not how dangerous they are later). Essentially, technologies and algorithms which end up in contexts of social power differentials can often be abused to further cause injustice against people accused of a crime, for example. Numbers are not neutral and can even be a “moral anesthetic,” especially if the sampled data has confounding variables that collectors ignore. Engineers designing technology do not always envisage ethical questions when making decisions that ought to be political.
Would you rely on a risk-assessment algorithm to make life-changing decisions for another human? How can the transparency culture which Robinson describes be created? How can we make sure that political decisions stay political, and don’t end up being ultimately answered by engineers? Can “fairness” be defined by a machine?
-
- 10 min
- MEL Beta
- 2019
The continued existence of pirating websites such as The Pirate Bay demonstrates how digital technologies can be used against institutions such as copyright, and further designates the idea of a completely free and open internet.
- MEL Beta
- 2019
-
- 10 min
- MEL Beta
- 2019
After 15 Years, The Pirate Bay Still Can’t Be Killed
The continued existence of pirating websites such as The Pirate Bay demonstrates how digital technologies can be used against institutions such as copyright, and further designates the idea of a completely free and open internet.
Why are communities online so hard to shut down? Can the internet ever be entirely free and open, as the founders of TPB discuss? What would be the consequences of this? Is the digital world decreasing the value of art forms such as recorded songs or films?
-
- 15 min
- MIT Tech Review
- 2019
An attack in Saudi Arabia through malware known as Triton demonstrates that hackers, potentially even those belonging to nation-states, are willing to spend considerable time and money to hack into the increasing numbers of targets in industrial internets of things. Such cyber attacks could lead to unsafe workplaces and even catastrophes.
- MIT Tech Review
- 2019
-
- 15 min
- MIT Tech Review
- 2019
Triton is the world’s most murderous malware, and it’s spreading
An attack in Saudi Arabia through malware known as Triton demonstrates that hackers, potentially even those belonging to nation-states, are willing to spend considerable time and money to hack into the increasing numbers of targets in industrial internets of things. Such cyber attacks could lead to unsafe workplaces and even catastrophes.
Is the grand increase in industrial convenience and productivity worth the increased risk for cyber attacks? In what ways can using an internet of things to control certain systems increase and decrease workplace safety, especially in more volatile settings?