All Narratives (328)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 5 min
- New York Times
- 2020
Decisions on whether or not law enforcement should be trusted with facial recognition are tricky, as is argued by Detroit city official James Tate. On one hand, the combination of the bias latent in the technology itself and the human bias of those who use it sometimes leads to over-policing of certain communities. On the other hand, with the correct guardrails, it can be an effective tool in getting justice in cases of violent crime. This article details the ongoing debate about how much facial recognition technology use is proper in Detroit.
- New York Times
- 2020
-
- 5 min
- New York Times
- 2020
A Case for Facial Recognition
Decisions on whether or not law enforcement should be trusted with facial recognition are tricky, as is argued by Detroit city official James Tate. On one hand, the combination of the bias latent in the technology itself and the human bias of those who use it sometimes leads to over-policing of certain communities. On the other hand, with the correct guardrails, it can be an effective tool in getting justice in cases of violent crime. This article details the ongoing debate about how much facial recognition technology use is proper in Detroit.
Who should be deciding on the guardrails surrounding the use of facial recognition technology? How can citizens have more control over when their face is being recorded or captured? Can there ever be enough guardrails to truly ensure that facial recognition technology can be used with no chance of bias?
-
- University of Houston
- 2015
The article explains what a BCI is, how it helps amputees, and how BCI technology continues to innovate.
- University of Houston
- 2015
Researchers Build Brain-Machine Interface To Control Prosthetic Hand
The article explains what a BCI is, how it helps amputees, and how BCI technology continues to innovate.
As BCI technologies continue to develop, what are ways that they could harm or benefit users or other stakeholders? Why do you think this study used the test subjects it did? What are the potential short and long term benefits and/or harms of using this particular group of subjects?
-
- TechCrunch+
- 2022
This article describes a cyberattack that leaked Revolut’s user’s data using social engineering.
- TechCrunch+
- 2022
-
- TechCrunch+
- 2022
Revolut confirms cyberattack exposed personal data of tens of thousands of users
This article describes a cyberattack that leaked Revolut’s user’s data using social engineering.
Who should be responsible for protecting against cyberattacks, specifically those which involve social engineering? Other than the customers of Revolut, who is impacted by this data leak? What are the harms that this data leak could cause these customers and other stakeholders?
-
- Center for Strategic and International Studies
- 2023
This article provides a timeline of significant cyber attacks since 2006 across the globe. It focuses on cyber attacks on government agencies, defense and high-tech companies, and economic crimes with losses of more than a million dollars.
- Center for Strategic and International Studies
- 2023
Significant Cyber Incidents
This article provides a timeline of significant cyber attacks since 2006 across the globe. It focuses on cyber attacks on government agencies, defense and high-tech companies, and economic crimes with losses of more than a million dollars.
What are the global impacts of these cyberattacks? What are the risks of the increased amount of both government and personal information online? How can cyberattacks isolated to one country have the potential to impact other nations?
-
- welivesercurity by eset
- 2022
This article reviews global impact of cybersecurity attacks and the steps the US and EU have taken to combat the issue. It explains the importance of collaboration between countries to fight this issue.
- welivesercurity by eset
- 2022
Cybersecurity: A global problem that requires a global answer
This article reviews global impact of cybersecurity attacks and the steps the US and EU have taken to combat the issue. It explains the importance of collaboration between countries to fight this issue.
Besides countries’ governments, who is responsible for preventing cyber threats? What are the benefits of collaboration between countries to prevent cybercrime? What are the roadblocks to this type of collaboration? What are important social factors to consider that may prevent governments from preventing cyber attacks originating from their own borders out to the global cyberspace?
-
- Maryville University
- 2016
This article talks about the global scope of cybersecurity threats and focuses on how there is a shortage of skilled technologists to combat the volume of threats.
- Maryville University
- 2016
-
- Maryville University
- 2016
Understanding Global Cybersecurity
This article talks about the global scope of cybersecurity threats and focuses on how there is a shortage of skilled technologists to combat the volume of threats.
How should countries be held accountable for intentionally or unintentionally contributing to global cybersecurity problems? What are the global impacts of the cybersecurity skilled technologist shortages? Who are the stakeholders of cybersecurity threats that seem to originate from one country and how does this impact the legitimacy and reputation of CS post-secondary programs and emerging technology sectors within that country?