The Special Session “Digital and Societal Transformations” took place during IEEE International Symposium on Technology and Society (ISTAS) 2021 on 31 October 2021…. Read More
The volume under review is a selection of declassified FBI documents, reproduced in facsimile, from the Cold War era files of 16 people (15 men and one woman) described as scientists.
Just as the “autonomous” in lethal autonomous weapons allows the military to dissemble over responsibility for their effects, there are civilian companies leveraging “AI” to exert control without responsibility.
And so we arrive at “trustworthy AI” because, of course, we are building systems that people should trust and if they don’t it’s their fault, so how can we make them do that, right? Or, we’ve built this amazing “AI” system that can drive your car for you but don’t blame us when it crashes because you should have been paying attention. Or, we built it, sure, but then it learned stuff and it’s not under our control anymore—the world is a complex place.
Social trust is violated when surveillance technologies fuel clandestine campaigns to construct oppressive systems used to control (and punish) members of society.
National security issues arise when IoT reporting reveals information about troop movements and locations.
As technological advances disrupt existing markets and value networks, change can outpace our ability to adapt.
Australian Aboriginal sovereignty is no longer just about Aboriginal communities retaining rights to their own land. The most brutal types of dispossession are the latest forms of data retention, decreased privacy, and unwarranted use of this personal data as a result of activities being collected, analyzed, and intelligently manipulated by geographically remote entities, all thanks to the Internet.
Using biometric technology to identify and monitor people raises human rights concerns. In particular, biometrics are often associated with intrusions into privacy.
During the last century a variety of surveillance technologies have arrived, have been deployed, and have had impacts on society,… Read More
The Circle. By Dave Eggers. Knopf, 2013. Reviewed by Scott D. Eldridge. Have you taken the plunge and purchased one… Read More
By Gary T. Marx, University of Chicago Press, 2016. Reviewed by Donna L. Halper It goes without saying that we… Read More
Governments and corporations gather, store, and analyze the tremendous amount of data we chuff out as we move through our… Read More
Members of the “Internet Governance, Security, Privacy and the Ethical Dimension of ICTs in 2030” Panel at the 2016 WSIS… Read More
George Orwell once observed that “the ages in which the dominant weapon is expensive or difficult to make will tend… Read More
Anecdotally, most people know that the video technology they use in everyday life is changing at an alarmingly fast pace…. Read More
In June 2013, Edward Snowden burst onto the world media scene. He had worked as a contractor for the U.S…. Read More