An Oscar-Nominated Documentary About Fine Dining and Life After Prison | The New Yorker
“Knife Skills” doesn’t provide a simple redemption story. It is a chance to get to know a group of people in a specific time and place and to feel the energy of a good idea in action; we, like the participants, hope for its success and worry about potential defeat. Recidivism is common among former inmates, drug relapses by former addicts are pernicious, and the first year of reëntry is an especially perilous time. The film portrays this sensitively and straightforwardly, and with an effort to provide just enough context.
ee  narrative  soros  prison  justice  recidivism 
13 days ago
Center for Humane Technology
(Tristan Harris's new gig) Our world-class team of deeply concerned former tech insiders and CEOs intimately understands the culture, business incentives, design techniques, and organizational structures driving how technology hijacks our minds.

Since 2013, we’ve raised awareness of the problem within tech companies and for millions of people through broad media attention, convened top industry executives, and advised political leaders. Building on this start, we are advancing thoughtful solutions to change the system.
13 days ago
The House That Spied on Me
When you buy a smart device, it doesn’t just belong to you; you share custody with the company that made it.
ee  iot  surveillance  isp 
13 days ago
Find engineering teams that share your values | Key Values
My previous lives, as I like to call them, might seem disjointed, but they were all people-centric. Everything I have ever done has put a premium on interpersonal relationships, which is why the engineering world seems so odd to me.

I decided to do freelance web development for a couple of years before joining a company because I wanted to get to understand this new world. Consulting allowed me to learn about the diversity of working styles, team dynamics, and engineering cultures that exist at different companies. I thought, “Now that I know what I care about and what I’m looking for, it’ll be easy for me to find the right job on the right team.”
design  job  values  ee 
16 days ago
People Are Using AI to Create Fake Porn of Their Friends and Classmates - Motherboard
growing community of redditors who create fake porn videos of celebrities using existing video footage and a machine learning algorithm. This algorithm is able to take the face of a celebrity from a publicly available video and seamlessly paste it onto the body of a porn performer. Often, the resulting videos are nearly indecipherable from reality. It’s done through a free, user-friendly app called FakeApp.
ai  business  pornography  evidence  fake 
16 days ago
Can an Algorithm Tell When Kids Are in Danger? - The New York Times
Had the decision been left solely to Byrne — as these decisions are left to screeners and their supervisors in jurisdictions around the world — that might have been the end of it. He would have, in industry parlance, screened the call out. That’s what happens to around half of the 14,000 or so allegations received each year in Allegheny County — reports that might involve charges of serious physical harm to the child,
ee  algorithms 
22 days ago
The Follower Factory - The New York Times
“Social media is a virtual world that is filled with half bots, half real people,” said Rami Essaid, the founder of Distil Networks, a cybersecurity company that specializes in eradicating bot networks. “You can’t take any tweet at face value. And not everything is what it seems.”
twitter  socialmedia  bots  ee 
24 days ago
Fitness app Strava lights up staff at military bases - BBC News
Many years ago, operational security was a relatively simple matter of not being physically overheard by the enemy.

Think of the British WWII poster with the slogan "Careless Talk Costs Lives".

Well, no more. Our modern electronic age means that we all move around with a number of "signatures"; we send and receive a variety of signals, all of which can be tracked. And as the episode with the exercise tracker shows, you do not need to be an American or Russian spy to be able to see and analyse these signals.

Russian troops have been tracked in Ukraine or in Syria by studying their social media interactions or geo-location data from their mobile phone images.

Each piece of evidence is a fragment, but when added together it could pose a significant risk to security - in this case highlighting the location of formerly secret bases or undisclosed patterns of military activity.
gps  data  strava  heatmap  security  ee 
24 days ago
Russian Trolls Are Only Part of the Problem - The New York Times
Twitter does not seem to comprehend that non-automated content, including from American accounts, is a huge part of the disinformation ecosystem. Its amplification of neo-Nazi rhetoric, abusive content and false or misleading stories spread by accounts with huge numbers of followers all affected rhetoric surrounding the 2016 election. Other than supporting a few small media literacy programs, Twitter doesn’t seem to have a plan for eliminating the problematic content that originates within America’s own borders.
ee  russia  disinformation  twitter 
27 days ago
Digital Currencies and Blockchain in the Social Sector | Stanford Social Innovation Review
One important next step is the creation of a central body to help surface new solutions, and guide blockchain and digital currency application in the social impact sector. There are also many questions to answer about how blockchain will intersect with the Internet of Things and artificial intelligence (a whole other conversation). While we should encourage experimentation across the board through the usual innovation labs, hackathons, investments in social entrepreneurs, field-based projects, and collaborative-building, the field could also benefit from a coordinating body. Ultimately, we need to devise new standards and best practices so that we can better infuse the human factor into new technology solutions that hold tremendous potential to address social and environmental issues. Fortunately, the building blocks are already there.
ee  blockchain 
4 weeks ago
‘Interrupters’ Peek at Social Media to Stop Street Violence - The New York Times
Under the program, the violence interrupters spend at least two hours a day monitoring social media for signs of risky behavior, like threats of violence, photos with weapons or expressions of grief or emotional stress, Mr. Polanco said. They focus on people ages 16 to 25. If an alarming post or photo is found, a worker reaches out to the young person.
ee  predictive_policing  pre-crime  socialmedia  conflict 
4 weeks ago
Washington Monthly | How to Fix Facebook—Before It Fixes Us
By Roger McNamee
An early investor explains why the social media platform’s business model is such a threat — and what to do about it.
5 weeks ago
Chinese woman discovers that her iPhone X can be unlocked by her friend’s face
According to Jiangsu Broadcasting Corporation, Yan, a woman from Nanjing, China, was offered two refunds from Apple after her colleague managed to unlock both her iPhone X that had faulty facial recognition function.

It wasn’t just a fluke either, as her colleague was able to unlock both devices on every attempt.

The two women are not related to each other.
china  facialrecognition  iphone  security  km 
6 weeks ago
Beijing bets on facial recognition in a big drive for total surveillance
Now they can see who’s coming and going, and by combining artificial intelligence with a huge national bank of photos, the system in this pilot project should enable police to identify what one police report, shared with The Washington Post, called the “bad guys” who once might have slipped by.
surveillance  china  socialcredit  km 
6 weeks ago
The next front in the net neutrality war: Feds versus the states - Recode
To start, a coalition of state attorneys general, led by New York, pledged on Thursday that they would sue the FCC to stop its rollback from taking place. Meanwhile, policymakers in at least two states — California and Washington — said they’d try on their own to prevent companies like AT&T, Charter, Comcast* and Verizon from blocking websites, slowing down web traffic or prioritizing their movies, music and other content above their rivals’ offerings.
ee  netneutrality  states 
6 weeks ago
What the New Wave of Millennial Leaders Means for the Nonprofit World - The Chronicle of Philanthropy
How Millennials Lead

Creativity. Transparency. And higher wages for everyone. Here’s what the next generation of CEOs has in store for the nonprofit world.
ee  engine_room 
6 weeks ago
Selective Exposure to Misinformation: Evidence from the consumption of fake news during the 2016 U.S. presidential campaign
-heavily concentrated among w/most conservative info diets
-Facebook key vector of exposure
-fact-checks did not reach those exposed
FakeNews  elections  facebook  research  km 
7 weeks ago
Mapping the anti-vaccination movement on Facebook
Over the past decade, anti-vaccination rhetoric has become part of the mainstream discourse regarding the public health practice of childhood vaccination. These utilise social media to foster online spaces that strengthen and popularise anti-vaccination discourses. In this paper, we examine the characteristics of and the discourses present within six popular anti-vaccination Facebook pages. We examine these large-scale datasets using a range of methods, including social network analysis, gender prediction using historical census data, and generative statistical models for topic analysis (Latent Dirichlet allocation). We find that present-day discourses centre around moral outrage and structural oppression by institutional government and the media, suggesting a strong logic of ‘conspiracy-style’ beliefs and thinking. Furthermore, anti-vaccination pages on Facebook reflect a highly ‘feminised’ movement ‒ the vast majority of participants are women. Although anti-vaccination networks on Facebook are large and global in scope, the comment activity sub-networks appear to be ‘small world’. This suggests that social media may have a role in spreading anti-vaccination ideas and making the movement durable on a global scale.
platforms  anti-vax  fb  km 
7 weeks ago
The Verge 2017 tech report card: Uber
Let’s recap: Uber CEO Travis Kalanick joins President Trump’s business council, and faces an immediate backlash; Uber is accused of undermining a taxi driver protest at JFK airport; the #DeleteUber hashtag goes viral; Susan Fowler speaks her mind; Waymo files its lawsuit; a self-driving Uber runs a red light; a self-driving Uber crashes; Travis Kalanick is caught on camera being a jerk; we learn about Uber executives visiting a South Korean escort bar; Apple threatens to remove Uber from the App Store; “Greyball;” “Hell;” Anthony Levandowski pleads the Fifth; Anthony Levandowski is fired; Uber considers smearing a rape victim in India; many Uber executives resign; Kalanick resigns; Lyft outpaces Uber; London bans Uber; the new CEO apologizes; a failed auto-leasing program is canceled; a major Uber investor sues Kalanick, who countersues; Uber is subject to five separate criminal investigations; Uber is fined for enabling unqualified drivers; a data hack exposes personal information of 57 million riders and drivers; the hacker is paid off and the hack is covered up; and (last but not least) Uber’s secret spying unit is exposed, and it sounds insane.
uber  km 
7 weeks ago
Ad targeters are pulling data from your browser’s password manager
According to new research from Princeton's Center for Information Technology Policy, [password] managers are being exploited as a way to track users from site to site. The researchers examined two different scripts — AdThink and OnAudience — both of are designed to get identifiable information out of browser-based password managers. The scripts work by injecting invisible login forms in the background of the webpage and scooping up whatever the browsers autofill into the available slots. That information can then be used as a persistent ID to track users from page to page, a potentially valuable tool in targeting advertising.
advertising  privacy  km 
7 weeks ago
A Reality Check: Algorithms in the Courtroom
A response to the NY times article that delves into the details of:
"How well does pretrial risk assessment work in practice, what do the tools actually measure, and how are the tools related to the life-shaping decisions reformers care most about?"
algorithms  km 
9 weeks ago
Even Imperfect Algorithms Can Improve the Criminal Justice System
In courtrooms across the country, judges turn to computer algorithms when deciding whether defendants awaiting trial must pay bail or can be released without payment. The increasing use of such algorithms has prompted warnings about the dangers of artificial intelligence. But research shows that algorithms are powerful tools for combating the capricious and biased nature of human decisions.
algorithms  km 
9 weeks ago
Can Facebook and Google Be Disrupted?
“I’ve just been in sort of a state of frustration for a decade over this stuff,” Pasquale says. “Because I think it’s just so obvious that unless you have massive intervention at this point, you just have a massive, self-reinforcing accumulation of data, money, and power at these companies.”

“Self-reinforcing” is the key problem of the power dynamic inside Silicon Valley. Google’s size is inextricable from its success; the more people that search, the better its results are. A similar loop plays out on Facebook: The more friends that sign on, the better it is to use; the better it is to use, the more people sign on to it.

Both network effects and path dependence derive from the same simple fact: The major players in contemporary Silicon Valley aren’t just software service providers, or purveyors of consumer technology, but “platforms” — that is, whole marketplaces unto themselves. As Pasquale puts it, “There’s no natural market force that’s going to replace these companies,” in part because “essentially they are not participants in markets, they make markets.”
monopoly  facebook  Google  km 
10 weeks ago
« earlier      
a2k accesstocommunications accesstomedicines accountability acta activism advertising advocacy africa agnotology agriculture ai algorithms amazon analysis anonymous apple audio bh big bigdata bigdata; blocking blogging book books brazil businessmodels canada censorship china circumvention citizenmedia competition conference copyright copyright_enforcement creativecommons crowdsourcing crypto cybercrime cybersecurity cyberwar darius data data-driven_journalism data; dataprotection dataretention datavisualisation david dc ddos development digest digitalgurus dns drm drones education ee eff egypt elections em encryption enforcement ethics eu europe europeancommission event events facebook facialrecognition fairuse fakenews filetype:pdf filtering foi france freeexpression freespeech fta funding futureofthebook generics genetics genomics germany globalvoices google governance government grantee grantees hacking hacktivism health healthcare hjd humanrights identity india innovation intermediary_liability internet internet_governance internetfreedomtm interview ip ipr iran jc jerzy jh journalism kenya killswitch km latinamerica law legal_cases legislation libraries lobbying mapping media media:document mexico mh microsoft mobile moocs mysociety netneutrality networked-public-sphere news nigeria nki nsa oa oer ogp okf oped open openaccess opendata opengovernment openscience opensource p2p pakistan patent patents philanthropy piracy podcast policy politics politicsofalgorithms prism privacy protest public_sphere publicdomain publicsphere publishing reform regulation report research resources robots russia science search security socialmedia sopa southafrica spectrum surveillance technology threestrikes tools tpp trade transparency tunisia tvi twitter uk un us usa ushahidi vf video visualization whistleblowing wikileaks wikipedia wipo youth youtube

Copy this bookmark:



description:


tags: