3 research outputs found

    Whose Side are Ethics Codes On? Power, Responsibility and the Social Good

    Full text link
    The moral authority of ethics codes stems from an assumption that they serve a unified society, yet this ignores the political aspects of any shared resource. The sociologist Howard S. Becker challenged researchers to clarify their power and responsibility in the classic essay: Whose Side Are We On. Building on Becker's hierarchy of credibility, we report on a critical discourse analysis of data ethics codes and emerging conceptualizations of beneficence, or the "social good", of data technology. The analysis revealed that ethics codes from corporations and professional associations conflated consumers with society and were largely silent on agency. Interviews with community organizers about social change in the digital era supplement the analysis, surfacing the limits of technical solutions to concerns of marginalized communities. Given evidence that highlights the gulf between the documents and lived experiences, we argue that ethics codes that elevate consumers may simultaneously subordinate the needs of vulnerable populations. Understanding contested digital resources is central to the emerging field of public interest technology. We introduce the concept of digital differential vulnerability to explain disproportionate exposures to harm within data technology and suggest recommendations for future ethics codes.Comment: Conference on Fairness, Accountability, and Transparency (FAT* '20), January 27-30, 2020, Barcelona, Spain. Correcte

    'Nothing Up My Sleeve': Information Warfare and the Magical Mindset

    No full text
    This chapter outlines how human factors have been, are being, and could be leveraged as key strategic tools in information warfare and online influence in general. The cyber domain is an informational space, and those who inhabit it (i.e. the majority of the inhabitants of the modern world) can all too easily fall prey to mis/disinformation, 'fake news', rumour, and propaganda. The chapter will examine the following questions: a. What are the key challenges facing those confronting the shifting contours of the informational environment? b. How can cyber security learn from the history of deception as a tool of influence; in particular, what can be gained from examining the interaction between the history of warfare and its connections with magic as an art form which relies on the manipulation of human cognition? c. How might the adoption of a 'magical mindset' enable us to both mitigate hostile influence operations and enable our own offensive capability

    Does the GDPR Help or Hinder Fair Algorithmic Decision-Making?

    No full text
    corecore