Themes (326)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 15 min
- MIT Tech Review
- 2019
An attack in Saudi Arabia through malware known as Triton demonstrates that hackers, potentially even those belonging to nation-states, are willing to spend considerable time and money to hack into the increasing numbers of targets in industrial internets of things. Such cyber attacks could lead to unsafe workplaces and even catastrophes.
- MIT Tech Review
- 2019
-
- 15 min
- MIT Tech Review
- 2019
Triton is the world’s most murderous malware, and it’s spreading
An attack in Saudi Arabia through malware known as Triton demonstrates that hackers, potentially even those belonging to nation-states, are willing to spend considerable time and money to hack into the increasing numbers of targets in industrial internets of things. Such cyber attacks could lead to unsafe workplaces and even catastrophes.
Is the grand increase in industrial convenience and productivity worth the increased risk for cyber attacks? In what ways can using an internet of things to control certain systems increase and decrease workplace safety, especially in more volatile settings?
-
- 5 min
- Kinolab
- 1990
Data’s father reveals that he would like to give him an “emotions” chip in hopes that it will enhance his experience living among humans and increase his trust in others. However, Data is concerned after seeing how emotions cause his brother to seem more volatile.
- Kinolab
- 1990
Emotion Chip: Bringing Robotic Life Closer to Human Life
Data’s father reveals that he would like to give him an “emotions” chip in hopes that it will enhance his experience living among humans and increase his trust in others. However, Data is concerned after seeing how emotions cause his brother to seem more volatile.
Can we and should we program AI to have emotions? What implications do emotions have for AI rights? If humans count on AI for quick and objective decision making, what impact might AI emotions have on this goal?
-
- 2 min
- Kinolab
- 1990
With his homing signal activated, the android Data takes control of the USS Enterprise and its systems and blocks the human crew from stopping him. For further reading, see the narrative Triton is the world’s most murderous malware, and it’s spreading.
- Kinolab
- 1990
Data Takes Over: Robots and Humans in the Workplace
With his homing signal activated, the android Data takes control of the USS Enterprise and its systems and blocks the human crew from stopping him. For further reading, see the narrative Triton is the world’s most murderous malware, and it’s spreading.
What dangers can AI cause within institutions and systems, if it becomes remotely hijacked? Should AI ever be allowed to develop in such a way that they can block out human autonomy over a certain system?
-
- 2 min
- The Verge
- 2019
In this very short narrative, the Social Media Addiction Reduction technology Act is presented in the context of social networks and concerns around digital addiction.
- The Verge
- 2019
-
- 2 min
- The Verge
- 2019
New bill would ban autoplay videos and endless scrolling
In this very short narrative, the Social Media Addiction Reduction technology Act is presented in the context of social networks and concerns around digital addiction.
How do they work and what are the risks of digital addiction mechanisms? How to regulate digital content that can generate addictions?
-
- 4 min
- Kinolab
- 1982
Flynn codes a digital avatar, Clu, in an attempt to hack into the mainframe of ENCOM. However, when Flynn fails to get Clu past the virtual, video-game-like defenses, Clu is captured and violently interrogated by a mysterious figure in the virtual world.
- Kinolab
- 1982
Artificial Intelligence as Servants to Humans
Flynn codes a digital avatar, Clu, in an attempt to hack into the mainframe of ENCOM. However, when Flynn fails to get Clu past the virtual, video-game-like defenses, Clu is captured and violently interrogated by a mysterious figure in the virtual world.
How can we program AI to perform tasks remotely for us? How can AI be used to remotely hack into public or private systems? Does every program designed to complete a task, even programs such as malware, have a life of its own? What are potential consequences to training AI solely to do the bidding of humans?
-
- 3 min
- Kinolab
- 2017
Eleanor Shellstrop, a deceased selfish woman, ended up in the utopic afterlife The Good Place by mistake after her death. She spins an elaborate web of lies to ensure that she is not sent to be tortured in The Bad Place. In this narrative, she tracks her personal ethical point total with a technology which is compared to a Fitbit. In theory, the more good actions she completes, the higher her score will get. For another narrative on personal ratings/point tracking, see the narratives “Lacie Parts I and II” on the Black Mirror episode “Nosedive.”
- Kinolab
- 2017
Personal Statistics Tracking
Eleanor Shellstrop, a deceased selfish woman, ended up in the utopic afterlife The Good Place by mistake after her death. She spins an elaborate web of lies to ensure that she is not sent to be tortured in The Bad Place. In this narrative, she tracks her personal ethical point total with a technology which is compared to a Fitbit. In theory, the more good actions she completes, the higher her score will get. For another narrative on personal ratings/point tracking, see the narratives “Lacie Parts I and II” on the Black Mirror episode “Nosedive.”
Do corrupt motivations spoil moral deeds? Should digital technologies be used to track personal data that is more abstract that health statistics or number of steps taken? What would be the consequences if such ratings were public?