Privacy (134)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 2 min
- Kinolab
- 2014
Nathan, the creator of the advanced humanoid robot Ava, explains to his employee Caleb that big data collected through smartphone cameras and microphones aided his attempts to make Ava’s features more human.
- Kinolab
- 2014
Big Data and its Reflection of Humanity
Nathan, the creator of the advanced humanoid robot Ava, explains to his employee Caleb that big data collected through smartphone cameras and microphones aided his attempts to make Ava’s features more human.
How can our digital consumer and search data be mined by tech companies for research? Does such a wide data net capture everything necessary about humanity? How does Google search mirror the human seeking of knowledge in digital form?
-
- 4 min
- Kinolab
- 1982
Flynn codes a digital avatar, Clu, in an attempt to hack into the mainframe of ENCOM. However, when Flynn fails to get Clu past the virtual, video-game-like defenses, Clu is captured and violently interrogated by a mysterious figure in the virtual world.
- Kinolab
- 1982
Artificial Intelligence as Servants to Humans
Flynn codes a digital avatar, Clu, in an attempt to hack into the mainframe of ENCOM. However, when Flynn fails to get Clu past the virtual, video-game-like defenses, Clu is captured and violently interrogated by a mysterious figure in the virtual world.
How can we program AI to perform tasks remotely for us? How can AI be used to remotely hack into public or private systems? Does every program designed to complete a task, even programs such as malware, have a life of its own? What are potential consequences to training AI solely to do the bidding of humans?
-
- 20 min
- Cory Doctorow
- 2014
Short Story outlining the breakdown of economic systems and the invasion of privacy when a private company becomes an arm of the state.
- Cory Doctorow
- 2014
-
- 20 min
- Cory Doctorow
- 2014
Scroogled
Short Story outlining the breakdown of economic systems and the invasion of privacy when a private company becomes an arm of the state.
How realistic does this story seem to you? Who gains the most power from digital information? What incentives do corporations have to protect user privacy? What incentives do users have to protect their own privacy?
-
- 7 min
- Vice
- 2021
In New Orleans, a city known for its history of racist policing, grassroots activists turned to precedent from other states to ban police use of surveillance and facial recognition technology through both public and private cameras.
- Vice
- 2021
-
- 7 min
- Vice
- 2021
How Musicians and Sex Workers Beat Facial Recognition in New Orleans
In New Orleans, a city known for its history of racist policing, grassroots activists turned to precedent from other states to ban police use of surveillance and facial recognition technology through both public and private cameras.
What responsibility do firms like Palantir have to make sure that their technology is used for undeniable good? Can cities like Oakland or New Orleans become the norm in terms of privacy from facial recognition while such firms exist?
-
- 5 min
- The Guardian
- 2021
Amazon’s Ring devices are creating a private network of video surveillance that can be accessed by governments and other public entities without a warrant.
- The Guardian
- 2021
-
- 5 min
- The Guardian
- 2021
Amazon’s Ring is the largest civilian surveillance network the US has ever seen
Amazon’s Ring devices are creating a private network of video surveillance that can be accessed by governments and other public entities without a warrant.
How might home security devices impact citizenship? What are the risks of a ubiquitous deployment of home surveillance systems? How does this narrative demonstrate the compounding of human and machine biases?
-
- 5 min
- The Atlantic
- 2019
U.S. Customs and Border Protection announces that hackers have stolen license-plate images and traveler’s ID photos from a subcontractor, which provides deeper insight to the dangers of big data held by government.
- The Atlantic
- 2019
-
- 5 min
- The Atlantic
- 2019
This is Exactly What Privacy Experts Said Would Happen
U.S. Customs and Border Protection announces that hackers have stolen license-plate images and traveler’s ID photos from a subcontractor, which provides deeper insight to the dangers of big data held by government.
Should we hold the government accountable for leaks in data protection? How should the affected individuals be compensated? Does the possibility of catching those accused of a certain crime or overstaying a visa justify the breach of privacy and surveillance of unsuspecting and unsuspicious people?