
Information: ‘I’ vs. ‘We’ vs. ‘They’
Assessments concerning privacy can hardly be completely neutral and may underlie some cultural bias.
Information: ‘I’ vs. ‘We’ vs. ‘They’ Read MoreAssessments concerning privacy can hardly be completely neutral and may underlie some cultural bias.
Information: ‘I’ vs. ‘We’ vs. ‘They’ Read MoreComputer science education cannot fix its internal injustices and external harms to society if it aims only to broaden participation. Instead, institutional change is required.
Toward Justice in Computer Science through Community, Criticality, and Citizenship Read MoreWe cannot put the genii back in the bottle, but we can ensure human control.
A Call to Action Read MoreThere is promising, if somewhat slow, progress on making facial recognition software less biased.
The Troubling Future for Facial Recognition Software Read MoreTechnology without morality is barbarous; morality without technology is impotent.—Freeman Dyson
Technology’s Impact on Morality Read MoreThe tech giants are paying millions of dollars to the operators of clickbait pages, bankrolling the deterioration of information ecosystems around the world.
How Facebook and Google fund global misinformation Read MoreOur challenge is to ensure new technologies support us as humans, not ceding our control to them, or letting them make us dumber.
We Are Not Users: Gaining Control Over New Technologies Read MoreAs financial pressures on climate risk and reputation grow, computing industry executives have made new commitments to reduce carbon emissions and impact.
Good, Better, Best: How Sustainable Should Computing Be? Read MoreUkraine claims to have doxed Russian troops and spies, while hacktivists are regularly leaking private information from Russian organizations.
Russia Is Leaking Data Like a Sieve Read MoreIn Bounty Everything: Hackers and the Making of the Global Bug Marketplace, researchers Ryan Ellis and Yuan Stevens provide a window into the working lives of hackers who participate in “bug bounty” programs—programs that hire hackers to discover and report bugs or other vulnerabilities in their systems.
Bounty Everything: Hackers and the Making of the Global Bug Marketplace Read MoreWhile the Russian invasion rages on the ground, companies that operate data-collecting satellites find themselves in an awkward position.
High Above Ukraine, Satellites Get Embroiled in the War Read MoreOn Friday, online access was curtailed by both Russian censors and Western businesses as the war in Ukraine became a reason for moves that limited free access to the Internet.
A new iron curtain is descending across Russia’s Internet Read MoreThe decision to block an “expert” level cyberattack has caused controversy inside Google after it emerged that the hackers in question were working for a US ally.
Google’s top security teams unilaterally shut down a counterterrorism operation Read MoreThe deposit could power millions of clean-energy car batteries. There’s just one roadblock: a rare, fragile species of buckwheat, for which a mine might mean extinction.
The Lithium Mine Versus the Wildflower Read MoreI haven’t been online in almost two decades. Being able to would help me prepare for life after my release.
Why prisoners like me need internet access Read MoreTechnology doesn’t rule us. We direct it, but often by inaction.
The dangerous appeal of technology-driven futures Read MoreSophie Zhang, a former data scientist at Facebook, revealed that it enables global political manipulation and has done little to stop it.
She risked everything to expose Facebook. Now she’s telling her story. Read MoreTechnology has completely transformed the global food supply system, yet still hasn’t brought an end to hunger. For that to happen, the choices we need to make are political, not technological.
Technology can help us feed the world, if we look beyond profit Read MoreDark patterns are user interfaces that benefit an online service by leading users into making decisions they might not otherwise make. Some dark patterns deceive users while others covertly manipulate or coerce them into choices that are not in their best interests.
Dark Patterns: Past, Present, and Future. The evolution of tricky user interfaces. Read MoreThere are very few legal limits on what governments can do with even the most personal data once they have it.
Who Has Access to Your Smartphone Data? Read More