Madeleine Clare Elish presents “An AI Pattern Language,” coauthored with Tim Hwang. The publication is the culmination of two years of research and conversations with a range of industry practitioners working in intelligent systems and artificial intelligence. The work was supported by the John D. and Catherine T. MacArthur Foundation. You can purchase your own copy or download the PDF at autonomy.datasociety.net.
Kristian Lum will elaborate on the concept of “bias in, bias out” in machine learning with a simple, non-technical example. She will then demonstrate how applying machine learning to police records can result in the over-policing of historically over-policed communities. Using a case study from Oakland, CA, she will show one specific case of how predictive policing not only perpetuates the biases that were previously encoded in the police data, but – under some circumstances – actually amplifies those biases.
Ilana Gershon discusses how we all have moments in which someone’s use of new media baffles us, and we have to ask a friend how to respond. It often isn’t just the content of the message, it is also using that particular medium in that way which leaves us scratching our heads. In this talk, I discuss what anthropological concepts can help us understand our confusion. I will turn to LinkedIn as my case study and analyze the dilemmas people face when using LinkedIn as they look for a job. This will be my starting point to discuss how the newness of new media generates social dilemmas, especially for the people these days who are looking for a job.
Natasha Schüll – From the NSA scandal to Facebook’s controversial “mood experiment,” the past decade has seen heated debate over the ways that governments and corporations collect data on citizens and consumers, the ends to which they use it, and the threat this poses to civil liberties. Yet even as this discussion over surveillant monitoring unfolds, the public has embraced practices and products of self-tracking, applying sensor-laden patches, wristbands, and pendants to their own bodies.
Drawing on ethnographic fieldwork, this talk explores how mainstream self-tracking technologies – in their design, marketing, and use – increasingly part ways with the ethos of intensive self-attention found within the Quantified Self (QS) community, serving as digital compasses to guide consumers through the confounding, tempting, and sometimes toxic landscape of everyday choice making and lifestyle management (for instance, by regulating the micro-rhythms of their bites, steps, sips, and breaths). By offering them a way to fulfill the cultural demand for self-management while delegating the often tedious, sometimes existentially taxing labor involved in meeting that demand, such devices at once exemplify and short-circuit ideals of individual agency and responsibility.
In the story of self-tracking technology and its increasing automation, a certain ambivalence over the terms of contemporary selfhood comes to the fore. Are there any connections to be drawn between this ambivalence and broader debates over governmental and corporate surveillance, data privacy, and the possibility for resistance?
danah boyd weaves together her work on youth, privacy, and data-driven technologies, to examine the complicated social and cultural dynamics underpinning social media, the messiness of “big data,” and the problematic implications of using algorithms designed for one problem to address societal issues without accounting for unintended consequences.
Noel Hidalgo will journey through two fellowships — his Data & Society Fellowship and construction of a new fellowship for 21st century civic hackers. The first half of the discussion will focus on detailed lessons learned from working within the City’s civic technology community, collaborating with CUNY’s Service Corps students, building a municipal open data curriculum, and developing partnerships with the Mayor’s Office, Manhattan Borough President, and various City agencies.
Bruce Schneider describes how we have created a world where information technology permeates our economies, social interactions, and intimate selves. The combination of mobile, cloud computing, the Internet Things, persistent computing, and autonomy is resulting in something altogether different — a world-sized web. This World-Sized Web promises great benefits, but it is also vulnerable to a host of new threats from users, criminals, corporations, and governments. These threats can now result in physical damage and even death.
In this talk, Schneier will take a retrospective look back at what we have learned from past attempts to secure these systems. He will also push us forward to consider seriously what technologies, laws, regulations, economic incentives, and social norms we will need to secure them in the future.
Tracing her experiences as a mathematician and data scientist working in academia, finance, and advertising, Cathy O’Neil will walk us through what she has learned about the pervasive, opaque, and unaccountable mathematical models that regulate our lives, micromanage our economy, and shape our behavior. Cathy will examine how statistical models often pose as neutral mathematical tools, lending a veneer of objectivity to decisions that can severely harm people at critical life moments.
Cathy will also share her concerns around how these models are trained, optimized, and operated at scale in ways that she deems to be arbitrary and statistically unsound and can lead to pernicious feedback loops that reinforce and magnify inequality in our society, rather than rooting it out. She will also suggest solutions and possibilities for building mathematical models that could lead to greater fairness and less harm and suffering.
Patrick Ball discusses how data about mass violence can seem to offer insights into patterns: is violence getting better, or worse, over time? Is violence directed more against men or women? However, in human rights data collection, we (usually) don’t know what we don’t know — and worse, what we don’t know may be systematically different from what we do know.
This talk will explore the assumption that nearly every project using data must make: that the data are representative of reality in the world. We will explore how, contrary to the standard assumption, statistical patterns in raw data tend to be quite different than patterns in the world. Statistical patterns in data reflect how the data was collected rather than changes in the real-world phenomena data purport to represent.
Using analysis of killings in Iraq, homicides committed by police in the US, killings in the conflict in Syria, and homicides in Colombia, we will contrast patterns in raw data with data in estimated total patterns of violence. The talk will show how biases in raw data can be corrected through estimation, and explain why it matters in these countries, and more generally.
Recorded on 3/24/2016.
Mark Latonero and Paula Kift on digital passageways and borders in the movement of refugees. Numerous media reports have highlighted that refugees now increasingly rely on digital devices such as smartphones in order to traverse their perilous routes, contact lost family members, or find safe places before dark. But claims that “a smartphone” may be “the most important” tool for Syrian refugees misses the bigger picture. Phones, social media, mobile apps, online maps, instant messaging, translation websites, wire money transfers, cell phone charging stations, and Wi-Fi hotspots have all created a new digital infrastructure for global movement. This infrastructure is as critical to refugees today as roads or railways. But digital infrastructures for movement can just as easily be turned into infrastructures for control by governments, corporations, and even criminals. Indeed, governments are increasingly experimenting with similar digital technologies to reinforce their border controls—to collect, process, and instrumentalize data in order to interfere with the movement of “undesirable” migrants.
Mark and Paula will explore these tensions and discuss how this new digital infrastructure 1) facilitates and constrains the flow of data and people, 2) conceals and constructs identity and status, and 3) affects refugees’ fundamental rights to privacy, data protection, and asylum.