Privacy (134)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 7 min
- Wired
- 2019
Internet users should start considering private browsers such as Duckduckgo to promote privacy and prevent personalized search results and ads. Many different pieces of software, including browsers by larger tech companies, are beginning to take this approach of erasing data, blocking outside tracking, or preventing cookies.
- Wired
- 2019
-
- 7 min
- Wired
- 2019
It’s Time to Switch to a Privacy Browser
Internet users should start considering private browsers such as Duckduckgo to promote privacy and prevent personalized search results and ads. Many different pieces of software, including browsers by larger tech companies, are beginning to take this approach of erasing data, blocking outside tracking, or preventing cookies.
Consider if the privacy-oriented browsers described in the article were the default. Whose interests would this work towards? Whose interests would this work against?
-
- 5 min
- The New York Times
- 2019
In New York City, biometrics were used as a step in the investigation process, and thus combined with human oversight to help identify criminals and victims alike.
- The New York Times
- 2019
-
- 5 min
- The New York Times
- 2019
How Biometrics Makes You Safer
In New York City, biometrics were used as a step in the investigation process, and thus combined with human oversight to help identify criminals and victims alike.
How does facial recognition technology facilitate challenging investigations? Do you believe police use of facial recognition is as transparent and pure as this article makes it seem? Where could bias enter this system of using facial recognition technology?
-
- 5 min
- Wired
- 2019
Non-profit companies such as Thorn and the Canadian Centre for Child Protection are using existing software, particularly facial recognition algorithms, to discover ways to become more proactive in fighting child pornography and human trafficking on the dark web.
- Wired
- 2019
-
- 5 min
- Wired
- 2019
How Facial Recognition is fighting child sex trafficking
Non-profit companies such as Thorn and the Canadian Centre for Child Protection are using existing software, particularly facial recognition algorithms, to discover ways to become more proactive in fighting child pornography and human trafficking on the dark web.
How has technology facilitated underground illegal activities, such as child trafficking? How has technology also facilitated fighting back against them? What is your opinion on the debate on whether or not law enforcement should have extensive access to facial recognition technology or machine learning algorithms?
-
- 7 min
- MIT Technology Review
- 2019
Autonomous vehicles could be subject to hacks by adversarial machine-learning, possibly perpetrated by out-of-work truck/Uber drivers and “adversarial machine learning”. The fact that vehicle algorithms can already be fairly easily tricked also raises concerns.
- MIT Technology Review
- 2019
-
- 7 min
- MIT Technology Review
- 2019
Hackers Are the Real Obstacle for Self-Driving Vehicles
Autonomous vehicles could be subject to hacks by adversarial machine-learning, possibly perpetrated by out-of-work truck/Uber drivers and “adversarial machine learning”. The fact that vehicle algorithms can already be fairly easily tricked also raises concerns.
Had you considered this big obstacle in self-driving? How would this risk impact the business of self-driving vehicles? What are the consequences of companies not fully understanding the machine algorithms that they use? Should we use self-driving vehicles when this threat stands?
-
- 5 min
- MIT Technology Review
- 2019
Discusses the issues that come with allowing private companies to fight back against cyber attacks by chasing hackers across the internet, including greater conflict with other countries and potential lawsuits.
- MIT Technology Review
- 2019
-
- 5 min
- MIT Technology Review
- 2019
Five reasons “hacking back” is a recipe for cybersecurity chaos
Discusses the issues that come with allowing private companies to fight back against cyber attacks by chasing hackers across the internet, including greater conflict with other countries and potential lawsuits.
Do we need international norms to help defuse tensions in the cyberspace? What are the “alternatives” to hacking back? Would data be safer if it was not digital?
-
- 5 min
- The New York Times
- 2019
As the case study of Baltimore demonstrates, cyber crime against governments for ransom of digital cash is not an uncommon practice.
- The New York Times
- 2019
-
- 5 min
- The New York Times
- 2019
Hackers Holding Baltimore Hostage
As the case study of Baltimore demonstrates, cyber crime against governments for ransom of digital cash is not an uncommon practice.
How can hacking affect whole cities? Should entire cities trust digital systems to contain all of their important information?