News Article (130)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 10 min
- The Atlantic
- 2014
When the Apple Health app first released, it lacked one crucial component: the ability to track menstrual cycles. This exclusion of women from accessible design of technology is not the exception but rather the rule. This results from problems inherent to the gender imbalance in technology workplaces, especially at the level of design. Communities such as the Quantified Self offer spaces to help combat this exclusive culture.
- The Atlantic
- 2014
-
- 10 min
- The Atlantic
- 2014
How Self-Tracking Apps Exclude Women
When the Apple Health app first released, it lacked one crucial component: the ability to track menstrual cycles. This exclusion of women from accessible design of technology is not the exception but rather the rule. This results from problems inherent to the gender imbalance in technology workplaces, especially at the level of design. Communities such as the Quantified Self offer spaces to help combat this exclusive culture.
In what ways are women being left behind by personal data tracking apps, and how can this be fixed? How can design strategies and institutions in technology development be inherently sexist? What will it take to ensure glaring omissions such as this one do not occur in other future products? How can apps that track and promote certain behaviors avoid being patronizing or patriarchal?
-
- 10 min
- Slate
- 2021
Using the tale of Art History Professor François-Marc Gagnon, whose video lectures were used to instruct students even after his death, this article raises questions about how technologies such as digital memory and data streaming for education in the time of coronavirus may ultimately undervalue the work of educators.
- Slate
- 2021
-
- 10 min
- Slate
- 2021
How a Dead Professor Is Teaching a University Art History Class
Using the tale of Art History Professor François-Marc Gagnon, whose video lectures were used to instruct students even after his death, this article raises questions about how technologies such as digital memory and data streaming for education in the time of coronavirus may ultimately undervalue the work of educators.
What are the largest possible detriments to automating teaching, both for students and for educators? If large amounts of data from a given course or discipline were used to train an AI to teach a course, what would such a program do well, and what aspects of education would be missed? How can educators have more personal control over the digital traces of their teaching? At what point might broader access to educational materials through digital networks actually harm certain groups of people?
-
- 5 min
- Wired
- 2020
As means of preserving deceased loved ones digitally become more and more likely, it is critical to consider the implications of technologies which aim to replicate and capture the personality and traits of those who have passed. Not only might this change the natural process of grieving and healing, it may also have alarming consequences for the agency of the dead. For the corresponding Black Mirror episode discussed in the article, see the narratives “Martha and Ash Parts I and II.”
- Wired
- 2020
-
- 5 min
- Wired
- 2020
The Ethics of Rebooting the Dead
As means of preserving deceased loved ones digitally become more and more likely, it is critical to consider the implications of technologies which aim to replicate and capture the personality and traits of those who have passed. Not only might this change the natural process of grieving and healing, it may also have alarming consequences for the agency of the dead. For the corresponding Black Mirror episode discussed in the article, see the narratives “Martha and Ash Parts I and II.”
Should anyone be allowed to use digital resurrection technologies if they feel it may better help them cope? With all the data points that exist for internet users in this day and age, is it easier to create versions of deceased people which are uncannily similar to their real identities? What would be missing from this abstraction? How is a person’s identity kept uniform or recognizable if they are digitally resurrected?
-
- 7 min
- Amnesty International
- 2021
Amnesty International released a statement detailing its opposition of widespread use of facial recognition technology for mass surveillance purposes based on its misuse and unfair impacts over Black communities and the chilling effect which it would create on peaceful protest.
- Amnesty International
- 2021
-
- 7 min
- Amnesty International
- 2021
AMNESTY INTERNATIONAL CALLS FOR BAN ON THE USE OF FACIAL RECOGNITION TECHNOLOGY FOR MASS SURVEILLANCE
Amnesty International released a statement detailing its opposition of widespread use of facial recognition technology for mass surveillance purposes based on its misuse and unfair impacts over Black communities and the chilling effect which it would create on peaceful protest.
Is more accurate facial recognition technology a good thing or a bad thing? How would FRT be weaponized to justify policing policies that are already unfair toward Black communities? Why is anonymity important, both in protest scenarios and elsewhere? Can anyone be anonymous in the age of digital technology? What amount of anonymity is appropriate?
-
- TechCrunch+
- 2022
This article describes a cyberattack that leaked Revolut’s user’s data using social engineering.
- TechCrunch+
- 2022
-
- TechCrunch+
- 2022
Revolut confirms cyberattack exposed personal data of tens of thousands of users
This article describes a cyberattack that leaked Revolut’s user’s data using social engineering.
Who should be responsible for protecting against cyberattacks, specifically those which involve social engineering? Other than the customers of Revolut, who is impacted by this data leak? What are the harms that this data leak could cause these customers and other stakeholders?
-
- Center for Strategic and International Studies
- 2023
This article provides a timeline of significant cyber attacks since 2006 across the globe. It focuses on cyber attacks on government agencies, defense and high-tech companies, and economic crimes with losses of more than a million dollars.
- Center for Strategic and International Studies
- 2023
Significant Cyber Incidents
This article provides a timeline of significant cyber attacks since 2006 across the globe. It focuses on cyber attacks on government agencies, defense and high-tech companies, and economic crimes with losses of more than a million dollars.
What are the global impacts of these cyberattacks? What are the risks of the increased amount of both government and personal information online? How can cyberattacks isolated to one country have the potential to impact other nations?