Themes (326)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 7 min
- The New York Times
- 2019
ICE, along with other law enforcement agencies, mined state driver’s license databases using facial recognition tech to track down undocumented immigrants and prosecute more cases.
- The New York Times
- 2019
-
- 7 min
- The New York Times
- 2019
ICE Used Facial Recognition to Mine State Driver’s License Database
ICE, along with other law enforcement agencies, mined state driver’s license databases using facial recognition tech to track down undocumented immigrants and prosecute more cases.
What responsibility do DMVs across the country have to protect the privacy of citizens? What levels of bias (human and machine) are discussed in this story? Given that, can AI ever be unbiased in both functionality and use?
-
- 7 min
- The New York Times
- 2019
The article discusses how to protect and delete DNA data from sites like 23andme. It mentions that many privacy policies for such companies are very brief and do not explain what data is stored and what happens to that data. Specifically, once genetic data is shared digitally with third party companies, it is nearly impossible to definitively erase, and there is an imminent possibility that this data could even be de-anonymized.
- The New York Times
- 2019
-
- 7 min
- The New York Times
- 2019
How to Protect Your DNA Data Before and After Taking an at-Home Test
The article discusses how to protect and delete DNA data from sites like 23andme. It mentions that many privacy policies for such companies are very brief and do not explain what data is stored and what happens to that data. Specifically, once genetic data is shared digitally with third party companies, it is nearly impossible to definitively erase, and there is an imminent possibility that this data could even be de-anonymized.
How might companies find a better way to present privacy policies to ensure that users don’t just simply click “agree” without reading? What concerns come with the loss of control over privacy of genetic data?
-
- 7 min
- The Washington Post
- 2013
Description of how targeted ads worked in the Obama re-election campaign, and why they were used. Specifically, the combination of the campaign buying advertising space in Google and ad companies tracking user activity across the web led to a robust targeted advertising campaign unlike anything seen before it.
- The Washington Post
- 2013
-
- 7 min
- The Washington Post
- 2013
Obama has aggressive Internet strategy to woo supporters
Description of how targeted ads worked in the Obama re-election campaign, and why they were used. Specifically, the combination of the campaign buying advertising space in Google and ad companies tracking user activity across the web led to a robust targeted advertising campaign unlike anything seen before it.
What type of data is mined for target advertising? How is human agency impacted by this type of political targeted advertising? How has this situation improved or gotten worse since 2013?
-
- 5 min
- ARS Technica
- 2019
Google records some audio and has language experts review it to improve language skills of the technology. However, this may raise privacy concerns as sometimes they record by accident when users aren’t trying to use the Google Assistant.
- ARS Technica
- 2019
-
- 5 min
- ARS Technica
- 2019
Google workers listen to your “OK Google” queries– one of them leaked recordings
Google records some audio and has language experts review it to improve language skills of the technology. However, this may raise privacy concerns as sometimes they record by accident when users aren’t trying to use the Google Assistant.
Do you use a virtual assistant? What for? Are you always conscious of what you are asking, or do you say things that you think no one is hearing?
-
- 7 min
- MIT Technology Review
- 2019
Autonomous vehicles could be subject to hacks by adversarial machine-learning, possibly perpetrated by out-of-work truck/Uber drivers and “adversarial machine learning”. The fact that vehicle algorithms can already be fairly easily tricked also raises concerns.
- MIT Technology Review
- 2019
-
- 7 min
- MIT Technology Review
- 2019
Hackers Are the Real Obstacle for Self-Driving Vehicles
Autonomous vehicles could be subject to hacks by adversarial machine-learning, possibly perpetrated by out-of-work truck/Uber drivers and “adversarial machine learning”. The fact that vehicle algorithms can already be fairly easily tricked also raises concerns.
Had you considered this big obstacle in self-driving? How would this risk impact the business of self-driving vehicles? What are the consequences of companies not fully understanding the machine algorithms that they use? Should we use self-driving vehicles when this threat stands?
-
- 5 min
- MIT Technology Review
- 2019
Discusses the issues that come with allowing private companies to fight back against cyber attacks by chasing hackers across the internet, including greater conflict with other countries and potential lawsuits.
- MIT Technology Review
- 2019
-
- 5 min
- MIT Technology Review
- 2019
Five reasons “hacking back” is a recipe for cybersecurity chaos
Discusses the issues that come with allowing private companies to fight back against cyber attacks by chasing hackers across the internet, including greater conflict with other countries and potential lawsuits.
Do we need international norms to help defuse tensions in the cyberspace? What are the “alternatives” to hacking back? Would data be safer if it was not digital?