Why Generation Z falls for online misinformation
We can all learn from how today’s young people evaluate truth online.
Why Generation Z falls for online misinformation Read MoreMajor topic areas.
We can all learn from how today’s young people evaluate truth online.
Why Generation Z falls for online misinformation Read MoreThe rise of social media and being always online is changing the nature of civic engagement.
How the next generation is reshaping political discourse Read MoreFor years, Big Tech has set the global AI research agenda. Now, groups like Black in AI and Queer in AI are upending the field’s power dynamics to build AI that serves people.
Inside the fight to reclaim AI from Big Tech’s control Read MoreThese documents cover enhancing the Trusted Internet Connections (TIC) program to fully support the implementation of IPv6 in federal IT systems. This information is also applicable to the private business sector and those interested in improving Internet security.
CISA Releases Guidance: IPv6 Considerations for TIC 3.0 Read MoreThis is an interactive video intro to flexbox and is comprised of 5 sections that walk through various parts of flexbox.
Flexbox Tutorial by Sean Fioritto Read MoreThese recommendations are meant to increase reliability, safety, and trustworthiness while increasing the benefits of AI technologies.
Responsible AI: Bridging From Ethics to Practice Read MoreLast year, three mathematicians published a viable method for hiding the inner workings of software. The paper was a culmination of close to two decades of work by multiple teams around the world to show that concept could work. The quest now is to find a way to make indistinguishability obfuscation (iO) efficient enough to become a practical reality.
Better Security Through Obfuscation Read MoreAftab Siddiqui, senior manager of Internet technology at the Internet Society, says the initial BGP protocol was conceived by experts at research institutions, defense organizations, and equipment vendors. “When they designed [BGP], it was based on the premise that everybody trusts each other,” Siddiqui says. “Fast-forward 30 years, I’m pretty sure we cannot claim that anymore.”
Fixing the Internet Read MoreTech unions represent a new twist on an existing form of worker organization, and they’re looking to disrupt the status quo of major tech companies like Google.
The Unionization of Technology Companies Read MoreWhen people build a database to manage reading lists or feed their neighbors, that’s coding—and culture.
‘Real’ Programming Is an Elitist Myth Read MoreIn honor of Cybersecurity Awareness Month 2021, the National Cyber Security Alliance and CybSafe have launched the world’s first Cybersecurity Attitudes & Behaviors Report. The research report is the first of its kind. It examines cybersecurity attitudes and behaviors of the general public, shedding light on one of the most important aspects of cyber risk – the human factor.
Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2021 Read MoreA majority of U.S. adults can answer fewer than half the questions correctly on a digital knowledge quiz, and many struggle with certain cybersecurity and privacy questions.
Americans and Digital Knowledge Read MoreA generation ago, a tool unleashed the power of business modeling—and created an entrepreneurial boom.
A Spreadsheet Way of Knowledge Read MoreSo, what can government and business leaders do to combat these attacks? And who’s responsible for improving our cybersecurity?
How America Can Reliably Resist Ransomware Read MoreAuthor’s Note: Have you been looking for a detailed-but-accessible case study of the Russian cyberespionage campaign that targeted SolarWinds (among others)? The following piece is adapted from my newly-released eCasebook “Cybersecurity Law, Policy, and Institutions” (v.3.1).
SolarWinds and the Holiday Bear Campaign: A Case Study for the Classroom Read MoreElectronic Life was created as a layman’s guide to computers. It explained simply, concisely and without jargon what computers really are, how to choose them, how to use them, how to think about them, how to live with them, how to get them to help you, how to keep them in their place, how to enjoy them. It described step-by-step instructions on what to do when you first approach a new computer to sound advice on how to stop your computer from causing trouble in the family. His message: Don’t be afraid of them, they’re only machines, they’re here to make your life easier, and, what’s more, they can be a lot of fun.
Electronic Life: How to Think About Computers Read MoreThe true, behind-the-scenes history of the people who built Silicon Valley and shaped Big Tech in America.
The Code: Silicon Valley and the Remaking of America Read MoreSophie Zhang, a former data scientist at Facebook, revealed that it enables global political manipulation and has done little to stop it.
She risked everything to expose Facebook. Now she’s telling her story. Read MoreThe company’s AI algorithms gave it an insatiable habit for lies and hate speech. Now the man who built them can’t fix the problem. [Not because he doesn’t want to, but because he is not allowed to as it would get in the way of profits.]
How Facebook got addicted to spreading misinformation Read MoreOne of the biggest sources of climate uncertainty is how clouds will behave. Caltech physicist Tapio Schneider is trying to give us some answers.
A powerful new model could make global warming estimates less vague Read More