The document summarizes a presentation on brain-computer interfaces and neural privacy. Some key points:
- Experimental results from a digit-guessing game using EEG showed the computer could correctly identify subjects' chosen digits 2-3 times out of 10 trials. Attention increased accuracy.
- Surveys found people view interception of BCI signals as more of a privacy violation than data from phone apps. Trust and willingness to share varies by entity.
- Potential policy solutions discussed including legislation establishing a right to neural privacy, empowering regulatory agencies, and increasing accountability for device manufacturers regarding consumer understanding of risks.
- The presenter calls for developers to consider whether data collection is necessary, for privacy advocates to engage
Describing latest research in visual reasoning, in particular visual question answering. Covering both images and videos. Dual-process theories approach. Relational memory.
Neuro-design with a fMRI brain scanner, let's neuromarketing!IgnitionOne
Professor Arnaud Petre, Managing Director, BRAIN IMPACT &
Chairman, Neuromarketing Association - Belgium, looks at how neuroscience can help marketing at the IgnitionOne Automotive Summit, June 2014
A discussion of the nature of AI/ML as an empirical science. Covering concepts in the field, how to position ourselves, how to plan for research, what are empirical methods in AI/ML, and how to build up a theory of AI.
The current deep learning revolution has brought unprecedented changes to how we live, learn, interact with the digital and physical worlds, run business and conduct sciences. These are made possible thanks to the relative ease of construction of massive neural networks that are flexible to train and scale up to the real world. But the flexibility is hitting the limits due to excessive demand of labelled data, the narrowness of the tasks, the failure to generalize beyond surface statistics to novel combinations, and the lack of the key mental faculty of deliberate reasoning. In this talk, I will present a multi-year research program to push deep learning to overcome these limitations. We aim to build dynamic neural networks that can train themselves with little labelled data, compress on-the-fly in response to resource constraints, and respond to arbitrary query about a context. The networks are equipped with capability to make use of external knowledge, and operate that the high-level of objects and relations. The long-term goal is to build persistent digital companions that co-live with us and other AI entities, understand our need and intention, and share our human values and norms. They will be capable of having natural conversations, remembering lifelong events, and learning in an open-ended fashion.
The three Finalists were:
*WEKIT — Wearable Experience for Knowledge Intensive Training — pitch by Paul Lefrere, Innovation Lead
*Sapien Labs (WINNER) — pitch by Tara Thiagarajan, Founder & Chief Scientist
*MyndYou — pitch by Shira Yama Nir, Project Manager
*Judged by: Bill Tucker, Senior Advisor to the K12 Education Program at the Bill & Melinda Gates Foundation; Eduardo Briceño, CEO and Co-founder of Mindset Works; John Cammack, Angel Investor; Neil Allison, Director of Business Model Innovation at Pearson North America
*Álvaro Fernández, CEO and Editor-in-Chief of SharpBrains
*Sarah Lenz Lock, Senior Vice President for Policy at AARP and Executive Director of the Global Council on Brain Health (GCBH)
*Dr. April Benasich, Director of the Baby Lab at the Rutgers Center for Molecular and Behavioral Neuroscience
*Chaired by: Dr. Cori Lathan, Co-Chair of the World Economic Forum’s Council on the Future of Human Enhancement
Slidedeck supporting session held during the 2017 SharpBrains Virtual Summit: Brain Health & Enhancement in the Digital Age (December 5-7th). Learn more at: https://sharpbrains.com/summit-2017/
Describing latest research in visual reasoning, in particular visual question answering. Covering both images and videos. Dual-process theories approach. Relational memory.
Neuro-design with a fMRI brain scanner, let's neuromarketing!IgnitionOne
Professor Arnaud Petre, Managing Director, BRAIN IMPACT &
Chairman, Neuromarketing Association - Belgium, looks at how neuroscience can help marketing at the IgnitionOne Automotive Summit, June 2014
A discussion of the nature of AI/ML as an empirical science. Covering concepts in the field, how to position ourselves, how to plan for research, what are empirical methods in AI/ML, and how to build up a theory of AI.
The current deep learning revolution has brought unprecedented changes to how we live, learn, interact with the digital and physical worlds, run business and conduct sciences. These are made possible thanks to the relative ease of construction of massive neural networks that are flexible to train and scale up to the real world. But the flexibility is hitting the limits due to excessive demand of labelled data, the narrowness of the tasks, the failure to generalize beyond surface statistics to novel combinations, and the lack of the key mental faculty of deliberate reasoning. In this talk, I will present a multi-year research program to push deep learning to overcome these limitations. We aim to build dynamic neural networks that can train themselves with little labelled data, compress on-the-fly in response to resource constraints, and respond to arbitrary query about a context. The networks are equipped with capability to make use of external knowledge, and operate that the high-level of objects and relations. The long-term goal is to build persistent digital companions that co-live with us and other AI entities, understand our need and intention, and share our human values and norms. They will be capable of having natural conversations, remembering lifelong events, and learning in an open-ended fashion.
The three Finalists were:
*WEKIT — Wearable Experience for Knowledge Intensive Training — pitch by Paul Lefrere, Innovation Lead
*Sapien Labs (WINNER) — pitch by Tara Thiagarajan, Founder & Chief Scientist
*MyndYou — pitch by Shira Yama Nir, Project Manager
*Judged by: Bill Tucker, Senior Advisor to the K12 Education Program at the Bill & Melinda Gates Foundation; Eduardo Briceño, CEO and Co-founder of Mindset Works; John Cammack, Angel Investor; Neil Allison, Director of Business Model Innovation at Pearson North America
*Álvaro Fernández, CEO and Editor-in-Chief of SharpBrains
*Sarah Lenz Lock, Senior Vice President for Policy at AARP and Executive Director of the Global Council on Brain Health (GCBH)
*Dr. April Benasich, Director of the Baby Lab at the Rutgers Center for Molecular and Behavioral Neuroscience
*Chaired by: Dr. Cori Lathan, Co-Chair of the World Economic Forum’s Council on the Future of Human Enhancement
Slidedeck supporting session held during the 2017 SharpBrains Virtual Summit: Brain Health & Enhancement in the Digital Age (December 5-7th). Learn more at: https://sharpbrains.com/summit-2017/
How to address privacy, ethical and regulatory issues: Examples in cognitive ...SharpBrains
How to address privacy, ethical and regulatory issues: Examples in cognitive enhancement, depression and ADHD
Dr. Karen Rommelfanger, Director of the Neuroethics Program at Emory University
Dr. Anna Wexler, Assistant Professor at the Perelman School of Medicine at UPenn
Jacqueline Studer, Senior VP and General Counsel of Akili Interactive Labs
Chaired by: Keith Epstein, Healthcare Practice Leader at Blue Heron
Slidedeck supporting presentation and discussion during the 2019 SharpBrains Virtual Summit: The Future of Brain Health (March 7-9th). Learn more at:
https://sharpbrains.com/summit-2019/
Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...Alex Pinto
Implementing an appropriate data processing pipeline to make good use of your indicators of compromise is a problem that has been successfully addressed over the last few years. Even with all the push of automation and orchestration, a fundamental question remains: WHICH data should I be ingesting in my detection pipelines? There is no lack of data available, shared or not, paid or not. But how to keep my CTI IR team from spinning their wheels on a pile of CTI mud?
This talk will discuss statistical analysis you can do with the CTI indicators you collect and your own network telemetry to define:
- FIT: How appropriate does the CTI data apply to your own traffic. CTI vendors always talk about vertical specific threats, but is that measurable and verifiable?
- IMPACT: How much was your true positive detections assisted by matches and link analysis derived from those CTI feeds
- COVERAGE: Is your current mix of CTI feeds providing "intelligence" on the current threats that you should actually be concerned with?
Those concepts will be introduced and explained with minimal math background needed, and pseudo-code (and real-code!) will be provided to assist organizations to perform those experiments on their own environment. We hope those tools will help attendees to better evaluate the quality of the CTI feeds they ingest from their open sources, paid providers and sharing communities.
There Is A 90% Probability That Your Son Is Pregnant: Predicting The Future ...Health Catalyst
Predictive: Relating to or having the effect of predicting an event or result. Analytics: The systematic computational analysis of data or statistics. Together they make up one of the most popular topics in healthcare today. But predictive analytics is a means to an ends, and there is little good in predicting an event or result without a strategy for acting upon that event, when it happens. If, as the Robert Wood Johnson Foundation recently published, 80% of healthcare determinants fall outside of the healthcare delivery system as we traditionally define it, should we focus our predictive analytics on the traditional 20% of traditional healthcare delivery, or broaden our focus to the 80% that includes social and economic factors, physical environment, and lifestyle behaviors? What if our predictive models reveal to us that the highest risk variable to a patient’s length of life and quality of life is their economic status? Can an accountable care organization and patient centered medical home realistically do anything to reduce that risk, in reaction to the predictive model? Given the current availability and type of data in the healthcare ecosystem, and our organizational ability or inability to realistically intervene, where should we focus our predictive and interventional risk management strategies? There is enormous potential value in the application of predictive analytics to healthcare, but, in contrast to predicting the weather, credit risk, consumer purchasing habits, or college dropout rates, the data collection, and social and ethical complexities of applying predictive analytics in healthcare are significantly higher. This session will explore some of the less technical, more human interest and philosophical issues, associated with predictive analytics in healthcare, including the speaker’s experience prior to healthcare, in the US Air Force, National Security Agency, and manufacturing.
The Future of Neuroimaging: A 3D Exploration of TBIHunter Whitney
A UI concept demo exploring Traumatic Brain Injury (TBI) that Jeff Chang, an ER radiologist, and I presented at a 3D developers conference (zCon in April 2013 hosted by zSpace). We gave our system the name “NeuroElectric and Anatomic Locator,” or “N.E.A.A.L.
Best practices to assess and enhance brain function via mobile devices and ...SharpBrains
(Session held at the 2014 SharpBrains Virtual Summit; October 28-30th, 2014)
8:15–9:45am. Best practices to assess and enhance brain function via mobile devices and wearables
- Corinna E. Lathan, Founder and CEO of AnthroTronix
- Eddie Martucci, VP Research & Development at Akili Interactive Labs
- Alex Doman, Co-Founder of Sleep Genius
- Joan Severson, President of Digital Artefacts
- Chair: Keith Epstein, Senior Strategic Advisor at AARP
Learn more here:
http://sharpbrains.com/summit-2014/agenda/
Sample size determination in clinical trials is considered from various ethical and practical perspectives. It is concluded that cost is a missing dimension and that the value of information is key.
Can Marketers Get to Grips with the Human Condition?Klaxon
On 20th October we explored how to employ neuroscience research techniques to drive marketing performance.
Our industry experts included:
Thom Noble, CEO, NeuroStrata
Mev Bertrand, Research Manager, Neuro-Insight
Will Nicholson, Managing Director, The Vision Network
"Your Health App may be Illegal" IEEE 3 Feb 2021, ManionSean Manion PhD
A presentation on the ethics in healthcare for AI & Blockchain by Sean Manion, PhD - Chief Scientific Officer @ Consensys Health delivered at the IEEE Healthcare: Blockchain & AI virtual series session on Ethics 03 Feb 2021, https://attend.ieee.org/healthcare-blockchain-ai/program/
How to address privacy, ethical and regulatory issues: Examples in cognitive ...SharpBrains
How to address privacy, ethical and regulatory issues: Examples in cognitive enhancement, depression and ADHD
Dr. Karen Rommelfanger, Director of the Neuroethics Program at Emory University
Dr. Anna Wexler, Assistant Professor at the Perelman School of Medicine at UPenn
Jacqueline Studer, Senior VP and General Counsel of Akili Interactive Labs
Chaired by: Keith Epstein, Healthcare Practice Leader at Blue Heron
Slidedeck supporting presentation and discussion during the 2019 SharpBrains Virtual Summit: The Future of Brain Health (March 7-9th). Learn more at:
https://sharpbrains.com/summit-2019/
Determining the Fit and Impact of CTI Indicators on Your Monitoring Pipeline ...Alex Pinto
Implementing an appropriate data processing pipeline to make good use of your indicators of compromise is a problem that has been successfully addressed over the last few years. Even with all the push of automation and orchestration, a fundamental question remains: WHICH data should I be ingesting in my detection pipelines? There is no lack of data available, shared or not, paid or not. But how to keep my CTI IR team from spinning their wheels on a pile of CTI mud?
This talk will discuss statistical analysis you can do with the CTI indicators you collect and your own network telemetry to define:
- FIT: How appropriate does the CTI data apply to your own traffic. CTI vendors always talk about vertical specific threats, but is that measurable and verifiable?
- IMPACT: How much was your true positive detections assisted by matches and link analysis derived from those CTI feeds
- COVERAGE: Is your current mix of CTI feeds providing "intelligence" on the current threats that you should actually be concerned with?
Those concepts will be introduced and explained with minimal math background needed, and pseudo-code (and real-code!) will be provided to assist organizations to perform those experiments on their own environment. We hope those tools will help attendees to better evaluate the quality of the CTI feeds they ingest from their open sources, paid providers and sharing communities.
There Is A 90% Probability That Your Son Is Pregnant: Predicting The Future ...Health Catalyst
Predictive: Relating to or having the effect of predicting an event or result. Analytics: The systematic computational analysis of data or statistics. Together they make up one of the most popular topics in healthcare today. But predictive analytics is a means to an ends, and there is little good in predicting an event or result without a strategy for acting upon that event, when it happens. If, as the Robert Wood Johnson Foundation recently published, 80% of healthcare determinants fall outside of the healthcare delivery system as we traditionally define it, should we focus our predictive analytics on the traditional 20% of traditional healthcare delivery, or broaden our focus to the 80% that includes social and economic factors, physical environment, and lifestyle behaviors? What if our predictive models reveal to us that the highest risk variable to a patient’s length of life and quality of life is their economic status? Can an accountable care organization and patient centered medical home realistically do anything to reduce that risk, in reaction to the predictive model? Given the current availability and type of data in the healthcare ecosystem, and our organizational ability or inability to realistically intervene, where should we focus our predictive and interventional risk management strategies? There is enormous potential value in the application of predictive analytics to healthcare, but, in contrast to predicting the weather, credit risk, consumer purchasing habits, or college dropout rates, the data collection, and social and ethical complexities of applying predictive analytics in healthcare are significantly higher. This session will explore some of the less technical, more human interest and philosophical issues, associated with predictive analytics in healthcare, including the speaker’s experience prior to healthcare, in the US Air Force, National Security Agency, and manufacturing.
The Future of Neuroimaging: A 3D Exploration of TBIHunter Whitney
A UI concept demo exploring Traumatic Brain Injury (TBI) that Jeff Chang, an ER radiologist, and I presented at a 3D developers conference (zCon in April 2013 hosted by zSpace). We gave our system the name “NeuroElectric and Anatomic Locator,” or “N.E.A.A.L.
Best practices to assess and enhance brain function via mobile devices and ...SharpBrains
(Session held at the 2014 SharpBrains Virtual Summit; October 28-30th, 2014)
8:15–9:45am. Best practices to assess and enhance brain function via mobile devices and wearables
- Corinna E. Lathan, Founder and CEO of AnthroTronix
- Eddie Martucci, VP Research & Development at Akili Interactive Labs
- Alex Doman, Co-Founder of Sleep Genius
- Joan Severson, President of Digital Artefacts
- Chair: Keith Epstein, Senior Strategic Advisor at AARP
Learn more here:
http://sharpbrains.com/summit-2014/agenda/
Sample size determination in clinical trials is considered from various ethical and practical perspectives. It is concluded that cost is a missing dimension and that the value of information is key.
Can Marketers Get to Grips with the Human Condition?Klaxon
On 20th October we explored how to employ neuroscience research techniques to drive marketing performance.
Our industry experts included:
Thom Noble, CEO, NeuroStrata
Mev Bertrand, Research Manager, Neuro-Insight
Will Nicholson, Managing Director, The Vision Network
"Your Health App may be Illegal" IEEE 3 Feb 2021, ManionSean Manion PhD
A presentation on the ethics in healthcare for AI & Blockchain by Sean Manion, PhD - Chief Scientific Officer @ Consensys Health delivered at the IEEE Healthcare: Blockchain & AI virtual series session on Ethics 03 Feb 2021, https://attend.ieee.org/healthcare-blockchain-ai/program/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
2. The Standard Disclaimer
The work in this presentation was done at the University of Washington as
part of a PhD dissertation. The results and views presented here do not
necessarily represent those of my funding sources or my current employer.
2
3. Summary of Presentation
• Separating hype from reality
• Some experimental result
• Do consumers care about their neural privacy?
• Thoughts about proactive policy solutions:
what do I want all of you to do?
3
4. Things NOT Covered by This Presentation
• Aliens are not involved
• I know nothing about any chips that the government has implanted
4
5. Definitions Before We Get Started
• Brain Computer Interfaces (BCIs): can record brain activity
while an individual is performing different actions (for example,
blinking their eyes, playing a video game, or texting on a
phone). BCIs are often used to give a user control of a
computer using their brain activity.
5
6. Definitions Before We Get Started
• Brain Computer Interfaces (BCIs): can record brain activity
while an individual is performing different actions (for example,
blinking their eyes, playing a video game, or texting on a
phone). BCIs are often used to give a user control of a
computer using their brain activity.
• Targeted elicitation: showing specific stimuli in order to
obtain a particular response
6
7. What do you think of when you
hear “Brain Hacking”?
7
9. You've sucked Gotham's brain
waves and now you've devised a
way to read minds!
You betcha! Soon my little "Box" will be
on countless TVs around the world.
Feeding me, credit card numbers, bank
codes, sexual fantasies, and little white lies.
IMDb
IMDb
9
11. This means that some of what you
expect… isn’t really possible.
11
12. Separating Hype from Reality: Neuralink
• No feedback loop for information
to return to brain from
“reanimated” limbs
• Unclear how this implantation
technique will work for deeper
brain structures
• Possibility of profound side
effects by stimulating brain tissue
(Deep Brain Stimulator literature)
12
Neuralink via
Scientific American
13. Separating Hype from Reality: Facebook
• Current gold standard for “typing-
by-brain” is ~1 word per minute
• Published research study only
done with 3 subjects, using
incredibly invasive surgically
placed electrodes
• Do you really want Facebook to
have direct access to all of your
thoughts and reactions?
IEEE Spectrum
29. Experimental Paradigm:
Single Digit Guessing Game
• Prior literature uses overt (conscious) and subliminal (“unconscious”)
stimuli, and results almost entirely rely on training data
• My research involved “guessing” a subject’s pre-selected digit, without
any prior data about the subject
29
30. Three Different Kinds of Results
• Overall effectiveness in identifying subject’s chosen digit
• Effect of attention on correctly identifying subject’s digit
• Determining current versus future digits (intention)
30
31. 1. Overall effectiveness in identifying subject’s
chosen digit
For all but one subject, the
computer correctly calculated
the correct digit 2-3 times for
the 10 experimental sessions.
31
32. 1. Overall effectiveness in identifying subject’s
chosen digit
For all but one subject, the
computer correctly calculated
the correct digit 2-3 times for
the 10 experimental sessions.
32
Human Guess
3 2
8 6
0 8
2 1
5 5
1 1
8 9
9 4
6 6
6 3
33. 2. Effect of attention on correctly identifying
subject’s digit
Percentage wise, the correct digit was calculated more often for
spacebar rounds (attention) than non-spacebar rounds (passive).
33
34. 3. Determining current versus future
digits (intention)
• The number the subject was going to pick
*for the next round* was calculated almost
as many times as the number for the current
round (13 vs 14)
• The number of correct future guesses
varied by subject (not consistent)
34
35. 3. Determining current versus future
digits (intention)
• The number the subject was going to pick
*for the next round* was calculated almost
as many times as the number for the current
round (13 vs 14)
• The number of correct future guesses
varied by subject (not consistent)
35
Human Guess
6 9
3 3
8 9
2 7
0 9
7 9
4 2
9 4
6 6
5 8
Human Guess
3 5
7 5
5 1
5 7
9 9
9 2
2 8
2 4
4 4
4 1
37. What Is Being Protected?
• What I’m interested in: quantifiable information that is determined from
a combination of EEG and relevant environmental stimuli
• Raw, original neural signals without context are much less informative
37
39. Issues to Consider in Defining Neural Privacy
1. Is privacy a right or an interest?
39
40. Issues to Consider in Defining Neural Privacy
1. Is privacy a right or an interest?
2. Do we own our own thoughts?
40
41. Issues to Consider in Defining Neural Privacy
1. Is privacy a right or an interest?
2. Do we own our own thoughts?
3. What relationship do we have with those who elicit
information neutrally?
41
42. Issues to Consider in Defining Neural Privacy
1. Is privacy a right or an interest?
2. Do we own our own thoughts?
3. What relationship do we have with those who elicit
information neutrally?
4. The importance of trust
42
43. Defining Neural Privacy
• We all should have an interest in protecting our neural privacy, but
require additional legal frameworks to make it a right
43
44. Defining Neural Privacy
• We all should have an interest in protecting our neural privacy, but
require additional legal frameworks to make it a right
• Defining and ascribing ownership is necessary to provide value to what is
being elicited (controlling a video game vs monitoring emotions)
44
45. Defining Neural Privacy
• We all should have an interest in protecting our neural privacy, but
require additional legal frameworks to make it a right
• Defining and ascribing ownership is necessary to provide value to what is
being elicited (controlling a video game vs monitoring emotions)
• Users should be able to trust that the information taken from elicited
neural signals by a company will be used and interpreted properly,
making the relationship between user and company an intimate one
45
46. Neuroethics Survey
• Is there a difference in perceived privacy violation between a person
intercepting BCI signals versus a phone app?
• What are the differences in trust and willingness to share neural
information with a range of entities?
• Is neural information more important that other data that’s already
available about us?
46
47. 1. Who/What is Taking Your Information?
47
?
Content
Video
Brain Activity
Neural Planning
Emotions
48. Summary of Results:
Who/What is Taking Your Information
• Person procurement of neural planning information is a
statistically significant privacy violation over the app
• Mobility status does not statistically impact perceptions of
neural privacy in these scenarios
48
52. What’s More Important?
• Fitbit or similar exercise tracker
• Record of my personal medical
history (e.g. at your doctor's office)
• Genetic information from a
company like 23andMe
• Online shopping history
• Monthly credit card statement
• Journal/diary
52
>
=
<Is your neural information…
56. (Final questions from last section’s neuroethics survey)
Who…
• User
• University Researcher
• Independent Regulatory Organization
• Legislators
• Device Manufacturers
…for BCIs, compared to current
involvement
• Development oversight
• Use
• Reparations for malicious
elicitation or misuse
56
Who Should Be In Charge of Regulation and When?
57. Summary of Results:
Policy and Responsibility
• Independent Regulatory Organizations, Legislators, and Device
Manufacturers should be more involved going from development to
reparations for misuse
• Users should be least involved in reparations from misuse, while Device
Manufacturers should be the most involved
57
58. Examples of Policy Solutions
• Increased involvement by legislators with reparations for malicious
elicitation or misuse
• Federal or state-level right to neural privacy legislation (or broader
generic/biometric data privacy legislation)
• Provide reparations by statute (monetary, private right of action, etc.)
• Empower regulatory agencies like the FTC
58
59. Examples of Policy Solutions
• Increased involvement by legislators with reparations for malicious
elicitation or misuse
• Federal or state-level right to neural privacy legislation (or broader
generic/biometric data privacy legislation)
• Provide reparations by statute (monetary, private right of action, etc.)
• Empower regulatory agencies like the FTC
• Involving Independent Regulatory Organizations
59
60. Examples of Policy Solutions
• Increased involvement by legislators with reparations for malicious
elicitation or misuse
• Federal or state-level right to neural privacy legislation (or broader
generic/biometric data privacy legislation)
• Provide reparations by statute (monetary, private right of action, etc.)
• Empower regulatory agencies like the FTC
• Involving Independent Regulatory Organizations
• Accountability for device manufacturers
60
61. Examples of Policy Solutions
• Increased involvement by legislators with reparations for malicious
elicitation or misuse
• Federal or state-level right to neural privacy legislation (or broader
generic/biometric data privacy legislation)
• Provide reparations by statute (monetary, private right of action, etc.)
• Empower regulatory agencies like the FTC
• Involving Independent Regulatory Organizations
• Accountability for device manufacturers
• Overall, how do consumers understand the risks of using a device?
61
64. To the Developers in the Room
• Just because you can doesn’t mean you should
64
65. To the Developers in the Room
• Just because you can doesn’t mean you should
• Ask yourself what problem you’re solving, how else you can obtain that
information, and what is the least amount of information you need to
complete a particular task
65
66. To the Developers in the Room
• Just because you can doesn’t mean you should
• Ask yourself what problem you’re solving, how else you can obtain that
information, and what is the least amount of information you need to
complete a particular task
• Do as much processing as possible locally/on device
66
67. To the Developers in the Room
• Just because you can doesn’t mean you should
• Ask yourself what problem you’re solving, how else you can obtain that
information, and what is the least amount of information you need to
complete a particular task
• Do as much processing as possible locally/on device
67Bonaci, Calo, Chizeck (2014)
69. To the Privacy-Conscious in the Room
• Just don’t use these kinds of devices
• You may feel better with a slower screen refresh rate to prevent
subliminal elicitation
69
70. To the Privacy-Conscious in the Room
• Just don’t use these kinds of devices
• You may feel better with a slower screen refresh rate to prevent
subliminal elicitation
• Ask for comprehensive US federal data privacy legislation:
contactingcongress.org
• Call/email their DC offices
• Go to town halls and ask for their positions on data privacy
• Be involved in the democratic process!
70
71. To the Privacy-Conscious in the Room
• Just don’t use these kinds of devices
• You may feel better with a slower screen refresh rate to prevent
subliminal elicitation
• Ask for comprehensive US federal data privacy legislation:
contactingcongress.org
• Call/email their DC offices
• Go to town halls and ask for their positions on data privacy
• Be involved in the democratic process!
• Read the terms of service to find out what is happening to your
biometric information
71
72. To the 3-Letter Agencies in the Room
• (Yes, I know you’re here)
72
73. To the 3-Letter Agencies in the Room
• (Yes, I know you’re here)
• If you’re even thinking about using this kind of technique for
interrogation, you must come to terms with some serious ethical and
legal questions
• 1st Amendment: Freedom of Speech/Expression
• 4th Amendment: Reasonable expectation of privacy
• 5th Amendment: Self-incrimination
73
74. To the 3-Letter Agencies in the Room
• (Yes, I know you’re here)
• If you’re even thinking about using this kind of technique for
interrogation, you must come to terms with some serious ethical and
legal questions
• 1st Amendment: Freedom of Speech/Expression
• 4th Amendment: Reasonable expectation of privacy
• 5th Amendment: Self-incrimination
• These are the results from compliant, willing participants
74
75. To the 3-Letter Agencies in the Room
• (Yes, I know you’re here)
• If you’re even thinking about using this kind of technique for
interrogation, you must come to terms with some serious ethical and
legal questions
• 1st Amendment: Freedom of Speech/Expression
• 4th Amendment: Reasonable expectation of privacy
• 5th Amendment: Self-incrimination
• These are the results from compliant, willing participants
• This technology is still in its infancy and should not be considered the
ultimate solution to any problem
75
84. 1. Is Privacy a Right or an Interest? Part 1
• The term “right” is often synonymous with a guarantee,
even if there is no legal remedy for an infraction or harm
84
85. 1. Is Privacy a Right or an Interest? Part 1
• The term “right” is often synonymous with a guarantee,
even if there is no legal remedy for an infraction or harm
• There is renewed interest in a right to privacy given our
current internet ecosystem and the lack of control over
our information
85
86. 1. Is Privacy a Right or an Interest? Part 1
• The term “right” is often synonymous with a guarantee,
even if there is no legal remedy for an infraction or harm
• There is renewed interest in a right to privacy given our
current internet ecosystem and the lack of control over
our information
• Without appropriate remedies, there is no right
86
87. 1. Is Privacy a Right or an Interest? Part 1
• The term “right” is often synonymous with a guarantee,
even if there is no legal remedy for an infraction or harm
• There is renewed interest in a right to privacy given our
current internet ecosystem and the lack of control over
our information
• Without appropriate remedies, there is no right
• Is there different language we can use to describe what we
are owed, if anything, with respect to our privacy?
87
88. 1. Is Privacy a Right or an Interest? Part 2
• Thomson: There is no right to privacy—rather, what we think
of as a right to privacy is just a collection of different, but
related, rights
88
89. 1. Is Privacy a Right or an Interest? Part 2
• Thomson: There is no right to privacy—rather, what we think
of as a right to privacy is just a collection of different, but
related, rights
• DeCew: If privacy is instead an interest, it can still be protected
or invaded, and discussed without justifying why or how it
should be observed
89
90. 1. Is Privacy a Right or an Interest? Part 2
• Thomson: There is no right to privacy—rather, what we think
of as a right to privacy is just a collection of different, but
related, rights
• DeCew: If privacy is instead an interest, it can still be protected
or invaded, and discussed without justifying why or how it
should be observed
• The fact that there is no overarching and defined statutory right
to privacy means it will continue to be infringed upon like an
interest, or ignored
90
91. 2. Do We Own Our Own Thoughts?
• Is ownership necessary to assert privacy claim? Inness says no
91
92. 2. Do We Own Our Own Thoughts?
• Is ownership necessary to assert privacy claim? Inness says no
• The construct of ownership may only be necessary if there is a value
(monetary or otherwise) to the thought
92
93. 2. Do We Own Our Own Thoughts?
• Is ownership necessary to assert privacy claim? Inness says no
• The construct of ownership may only be necessary if there is a value
(monetary or otherwise) to the thought
• It may be difficult to know the value of a “thought” until something is
done with it
93
94. 2. Do We Own Our Own Thoughts?
• Is ownership necessary to assert privacy claim? Inness says no
• The construct of ownership may only be necessary if there is a value
(monetary or otherwise) to the thought
• It may be difficult to know the value of a “thought” until something is
done with it
• If ownership is assigned:
• It’s easier to create a legal construct to protect the person eliciting information,
and the company receiving it
• But it’s also more difficult of the wrong information is elicited
94
95. 2. Do We Own Our Own Thoughts?
• Is ownership necessary to assert privacy claim? Inness says no
• The construct of ownership may only be necessary if there is a value
(monetary or otherwise) to the thought
• It may be difficult to know the value of a “thought” until something is
done with it
• If ownership is assigned:
• It’s easier to create a legal construct to protect the person eliciting information,
and the company receiving it
• But it’s also more difficult of the wrong information is elicited
• The purpose for eliciting information should be important to questions
of ownership 95
96. 3. What Relationship Do We Have With Those
Who Elicit Information Neurally?
• Defining the relationship between the user and the company
96
97. 3. What Relationship Do We Have With Those
Who Elicit Information Neurally?
• Defining the relationship between the user and the company
• Intimacy: specification that choice is involved on the part of the agent
providing information, and that the value comes from the original
relationship one has with the information (Inness)
97
98. 3. What Relationship Do We Have With Those
Who Elicit Information Neurally?
• Defining the relationship between the user and the company
• Intimacy: specification that choice is involved on the part of the agent
providing information, and that the value comes from the original
relationship one has with the information (Inness)
• When information is elicited not by choice, the violation of privacy can
be linked to a lack of acknowledging that the sharing of information is in
fact a relationship
98
99. 4. The Importance of Trust
• Lack of trust may no longer be an adequate deterrent to a company’s
malevolent behavior
• 91% of Americans in 2016 agreed or strongly agreed that users had lost control
over the collection and use of of their information
• 2/3rd of those surveyed in 2017 said that existing legislation is inadequate in
protecting private information
99
100. 4. The Importance of Trust
• Lack of trust may no longer be an adequate deterrent to a company’s
malevolent behavior
• 91% of Americans in 2016 agreed or strongly agreed that users had lost control
over the collection and use of of their information
• 2/3rd of those surveyed in 2017 said that existing legislation is inadequate in
protecting private information
• Privacy as trust (Waldman): relationship through regulation of access,
either restricting or openness
100
101. First Analysis: Person vs App
Odds ratio < 1 means respondents perceived
the app collecting their neural information as
LESS of a privacy issue than if it was
collected by a person
101
102. 102
Message Text Record Typing Brain Activity
Planned Brain
Activity
Brain Activity +
Emotional State
103. 103
Message Text Record Typing Brain Activity
Planned Brain
Activity
Brain Activity +
Emotional State
0.83 0.55 0.77 0.56 0.97
Odds
Ratios
104. 104
Message Text Record Typing Brain Activity
Planned Brain
Activity
Brain Activity +
Emotional State
0.83 0.55 0.77 0.56 0.97
Odds
Ratios
105. Second Analysis:
Mobility vs Non-Mobility Impaired
Odds ratio < 1: non-mobility impaired individuals
perceive the data collected to be less of a privacy
violation, compared to those who are
Odds ratio > 1: non-mobility impaired individuals
perceived data collected to be more of a privacy
violation, compared to those who are
105
106. 106
Message Text Record Typing Brain Activity
Planned Brain
Activity
Brain Activity +
Emotional State
107. 107
Message Text Record Typing Brain Activity
Planned Brain
Activity
Brain Activity +
Emotional State
0.95 0.96 1.24 1.76 1.70
Odds
Ratios
109. First Analysis: Involvement by Entity
How should each entity’s involvement change
through the BCI lifecycle
109
110. First Analysis: Involvement by Entity
How should each entity’s involvement change
through the BCI lifecycle
Odds ratio > 1 means less involvement
through each stage
110
111. First Analysis: Involvement by Entity
How should each entity’s involvement change
through the BCI lifecycle
Odds ratio > 1 means less involvement
through each stage
Odds ratio < 1 indicates the entity should
be more involved through each stage
111
112. 112
More Involved
Less Involved
Same
User Researcher Indep Reg Org Legislators Manufacturers
Compared to
Current Involvement
2.481 1.248 0.709 0.685 0.741
Odds
Ratios
113. 113
More Involved
Less Involved
Same
User Researcher Indep Reg Org Legislators Manufacturers
Compared to
Current Involvement
2.481 1.248 0.709 0.685 0.741
Odds
Ratios
114. Second Analysis: Involvement by Stage
114
Who should be more involved at
each stage?
Odds ratios > 1 means
involvement should
decrease going from user
to device manufacturer
Odds ratios < 1,
involvement should
increase going from user to
device manufacturer.
115. Second Analysis: Involvement by Stage
Who should be more involved at
each stage?
Odds ratios > 1 means
involvement should
decrease going from user
to device manufacturer
Odds ratios < 1,
involvement should
increase going from user to
device manufacturer.
115
116. Second Analysis: Involvement by Stage
116
Who should be more involved at
each stage?
Odds ratios > 1 means
involvement should
decrease going from user
to device manufacturer
Odds ratios < 1,
involvement should
increase going from user to
device manufacturer.
DEBUNK A LOT OF THE HYPE, SHARE THE REALITY
Hype as manipulation…. We’re not actually there yet
Patterns of generalized responses to the brain
Policy = general term for legislation, regulation, delegation, independent oversight, etc.
This is how associations are given in the analysis of survey questions in parts 2 or 3
Odds ratio: strength of association between two events… ratio of the odds of A in the presence of B and the odds of A in the absence of B
OR is less than 1, then A and B are negatively correlated, and the presence of one event reduces the odds of the other event
This is how associations are given in the analysis of survey questions in parts 2 or 3
Odds ratio: strength of association between two events… ratio of the odds of A in the presence of B and the odds of A in the absence of B
OR is less than 1, then A and B are negatively correlated, and the presence of one event reduces the odds of the other event
The concept of taking information for some malicious purpose was intuitive to the common viewer in 1995, before the technology itself was mature.
Just one example
However, this same group has also published results that demonstrate masking effect by having subjects perform various actions in response to the non-targets that they knew about before the experiment started (J.Peter Rosenfeld, Matthew Soskins, Gregory Bosh, and Andrew Ryan. Simple, effective countermeasures to P300-based tests of detection of concealed information. Psychophysiology, 41(2):205–219, March 2004.)
Time-locked changes in neural signal amplitude based on specific stimuli
ERN – error recognition, frontal/central
P300 – oddball, parietal
N400 – semantic processing, centro-parietal
P600 – unexpected grammar, centro-parietal
N400: unexpected words in read sentences… semantic processing, and is not just a response to unexpected words.
P600: grammatical inconsistencies, or unexpected order (The brown quick fox jump over the lazy dog).
Each ERP has its own paradigms and uses in research, and it may be possible to extract different kinds of personal information based on the measured ERP.
Targeted elicitation: showing specific stimuli in order to observe the kind of response.
This is a paradigm that is studied extensively in literature
Targeted elicitation: showing specific stimuli in order to observe the kind of response.
This is a paradigm that is studied extensively in literature
10 subjects total (8 male, 2 female, average age 31.3 minus one subject who did not provide age)
Analyzed 7 subjects
10 total rounds per subject, with subject-determined breaks in between each round
At the beginning of each round, the subject selects a number, then looks at 200 pseudorandom digit stimuli (20 x 10 digits)
5 of 7 analyzed subjects did counterbalanced attention sessions (pressing the space bar)
So assuming that the error is the same between trials, repetition of trials will allow for the extraction of a digit, or a particular kind of information, up to a given threshold (not 100%, there will always be some sort of error)
Repetitions can be adaptive
So assuming that the error is the same between trials, repetition of trials will allow for the extraction of a digit, or a particular kind of information, up to a given threshold (not 100%, there will always be some sort of error)
Repetitions can be adaptive
Non-spacebar to start
Overly Honest Methods: singular boundary fit… so need to get better at R and will probably have in the final dissertation text
For space-bar rounds (attention), the target digit was calculated 8/25 times
For non-spacebar rounds (passive), the target digit was calculated 6/45 times
Subject knows the game and is preparing for the next time
Slightly more likely to calculate next digit versus current digit (using something called an odds ratio, or strength of correlation between two events, 1.04)
The odds ratio of calculating the next digit compared to the current digit is 1.04
Subject knows the game and is preparing for the next time
Left: non-spacebar first
Right: spacebar first
The odds ratio of calculating the next digit compared to the current digit is 1.04
It’s not reliable and people don’t actually want this
What would the residents of Gotham have said if they were asked about having all of their neural data taken by Edward Nygma?
Questioning what is private and what is public always happens when new tech comes out
Photography: 1890 that “[i]nstantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life”
Warren and Brandeis (1890)
These are the four that I considered and did in-depth research
These are the four that I considered and did in-depth research
These are the four that I considered and did in-depth research
These are the four that I considered and did in-depth research
Distributed online
Responses taken for 24 days
77 respondents
46 Female, 27 Male, 3 other (nonbinary, genderqueer, born female), 1 no resp.
Average age 39.7, median 35.5
18 indicated mobility impairment
Answers were requested on 5-point Likert scale from Disagree Completely to Agree Completely, and the prompts were given as:
Person:(a) ... read the content of a text message I sent to my family member
(b) ... recorded a video of me typing a text message to my family member which they watched later to find out the content of the text message.
(c) ... obtained a recording of my brain activity while I typed a text message to my family member from which the content of my text message could be figured out.
(d) ... obtained a recording of my brain activity *as I was planning* to type out a text message to my family member such that the content of the text message could be predicted before I typed it.
(e) ... obtained a recording of my brain activity that included my emotional state while typing a message to my family member (e.g., to reveal feelings of inattention, boredom, excitement, anxiety, other states?)
App on Phone:(a) ... downloaded and stored the content of a text message I sent to my family member
(b) ... used a keylogger to record me typing out the message in real time, including what was typed and deleted.
(c) ... obtained a recording of my brain activity while I typed a text message to my family member from which the content of my text message could be figured out.
(d) ... obtained a recording of my brain activity *as I was planning* to type out a text message to my family member such that the content of the text message could be predicted before I typed it.
(e) ... obtained a recording of my brain activity that included my emotional state while typing a message to my family member (e.g., to reveal feelings of inattention, boredom, excitement, anxiety, other states?)
Largest perceived privacy violation is advance planning obtained by a person
FaceApp
Example categories
“Impact on the person”
Feedback loop
Benefit was not identified
Relevance
Most people think neural information is important… would love to talk to the 1% who think neural information is less important than their exercise tracker info, or 9% who think their neural information is less important than their shopping history.
Things that can be perceived as “more personal” or belonging to the body, diary or genetic information, it’s more split…
Don’t do commercial DNA tests!
If Harvey Dent hadn’t become Two Face, could he have prosecuted Edward Nygma?
Could Bruce Wayne and Nygma’s supervisor cited regulation or legislation that would have been more effective at stopping the project instead of just “this is dangerous and we don’t like it?”
The increasing use of genetic testing helps with identifying and diagnosing medical conditions. But because many of these are correlated or occur only in unique populations, it may deter an individual to seek out treatment (sickle cell anemia in African-Americans is explicitly called out as previously addressed example in the legislative text), due to subsequent discrimination [2]. From an implementation standpoint, it invokes the 1964 Civil Rights Act as well as the Equal Employment Opportunity Commission to amend various existing federal regulations to prohibit employment and health insurance discrimination based on one’s genetic profile.
Wall Street Journal advice:
Don’t post photos of yourself smoking on social-media sites.
Do post photos of yourself running. Riskier sports, like skydiving, could complicate the situation.
Use fitness-tracking devices that indicate an interest in fitness.
Purchase food from online meal-preparation services that specialize in healthy choices.
Visit the gym with a phone linked to a location-tracking service. If you visit the bar, leave your phone at home.
So could we move to a world where you’re required to provide neural information for life insurance or job screenings?
IROs: Developing standards for accuracy or anonymization of signals
IROs: Developing standards for accuracy or anonymization of signals
I’m considering hackers as an IRO in this case… y’all have a ton of power to look at systems and see what’s happening.
IROs: Developing standards for accuracy or anonymization of signals
Notice and consent is broken (Existing regulatory frameworks do not necessarily have to be applied to this kind of data (e.g. does not have to be notice and consent)
So yes, we’re in a bad place, but it’s not too late (relatively speaking) to combat the problem. I asked three questions in this dissertation, looking at the holistic picture of neural security and its ethical and policy implications, to create a more comprehensive solution.
Put up link to actually calling/contacting reps
Daniel Zolnikov (spoke a DEFCON last year, MT legislator)
Put up link to actually calling/contacting reps
Some non-government members of the audience are probably very mad that I even considered doing this kind of research, because I’m just handing it to them on a silver platter. Instead, I did the work so that you, the general DEFCON audience and beyond, have just one example of technology that’s coming down the road. You now know to look for what signals are being analyzed when you use a BCI, and that it’s not as simple as “I’m going to laser a hole in your skull and throw in a wire.” This is an incredibly valuable and nuanced field that deserves more attention than it’s getting. But since I know that this does have some in the government very interested, I want to talk directly to you now.
4th amendment reasonable expectation of privacy
5th amendment self incrimination
1st amendment freedom of speech/expression
Can’t use fMRI in US courts (lawneuro.org, Vanderbilt and MacArthur Foundation Research Network)
4th amendment reasonable expectation of privacy
5th amendment self incrimination
1st amendment freedom of speech/expression
You can’t solve
Let’s not be too dystopian about this
Very specific question with a limited number of answers
CIRCLE BACK TO SCIENCE FICTION ARC
WEAVE THE NARRATIVE THROUGH
Questions for the creators… what world are you envisioning
Digital exhaust vs closed loop
Pick a future that is very pro-future (where humans win)… not just dystopia
There are differences between a philosophical right and a legal right… trying to reconcile the two. We may have a right to life, liberty, and the pursuit of happiness, but there is no legal standing for it
(where is my remedy for violating the right to life, liberty, and pursuit of happiness from the Declaration of Independence?)
Infringement of an interest, which is a non-exclusive right (legal terms… IP law)
There are differences between a philosophical right and a legal right… trying to reconcile the two. We may have a right to life, liberty, and the pursuit of happiness, but there is no legal standing for it
(where is my remedy for violating the right to life, liberty, and pursuit of happiness from the Declaration of Independence?)
Infringement of an interest, which is a non-exclusive right (legal terms… IP law)
There are differences between a philosophical right and a legal right… trying to reconcile the two. We may have a right to life, liberty, and the pursuit of happiness, but there is no legal standing for it
(where is my remedy for violating the right to life, liberty, and pursuit of happiness from the Declaration of Independence?)
Infringement of an interest, which is a non-exclusive right (legal terms… IP law)
There are differences between a philosophical right and a legal right… trying to reconcile the two. We may have a right to life, liberty, and the pursuit of happiness, but there is no legal standing for it
(where is my remedy for violating the right to life, liberty, and pursuit of happiness from the Declaration of Independence?)
Infringement of an interest, which is a non-exclusive right (legal terms… IP law)
So similar to the Thomson view, since a right to privacy is not explicitly stated anywhere… it doesn’t exist
Listening to a husband and wife arguing, the using of an amplifying device to eavesdrop on them violates their right to not be listened to (a right of a person). Torturing a man for information (violating his right to not be hurt or harmed or to be forced to divulge information)
Sharing a fact that was given to you in confidence (violating a right to confidentiality)
Along with DeCew, Inness does not want to ascribe a right to privacy because of the lack of framework to support it
Infringement of an interest, which is a non-exclusive right (legal terms… IP law)
So similar to the Thomson view, since a right to privacy is not explicitly stated anywhere… it doesn’t exist
Listening to a husband and wife arguing, the using of an amplifying device to eavesdrop on them violates their right to not be listened to (a right of a person). Torturing a man for information (violating his right to not be hurt or harmed or to be forced to divulge information)
Sharing a fact that was given to you in confidence (violating a right to confidentiality)
Along with DeCew, Inness does not want to ascribe a right to privacy because of the lack of framework to support it
Infringement of an interest, which is a non-exclusive right (legal terms… IP law)
So similar to the Thomson view, since a right to privacy is not explicitly stated anywhere… it doesn’t exist
Listening to a husband and wife arguing, the using of an amplifying device to eavesdrop on them violates their right to not be listened to (a right of a person). Torturing a man for information (violating his right to not be hurt or harmed or to be forced to divulge information)
Sharing a fact that was given to you in confidence (violating a right to confidentiality)
Along with DeCew, Inness does not want to ascribe a right to privacy because of the lack of framework to support it
Infringement of an interest, which is a non-exclusive right (legal terms… IP law)
Inness used the example of a love letter for why ownership isn’t necessary to have one’s privacy violated. But, the letter was written or typed by hand, using words articulating thoughts and mental imagery. So if a malicious entity steals the letter and reads it, they have access to the thoughts you were having when you wrote the letter. Are these thoughts now stolen, or owned by the person who read them?
I don’t need to “own” the made-up song I sing in the shower, unless I want it to become a top 40 song, in which case I have to sell it to a producer or make people pay to listen to it
Inness used the example of a love letter for why ownership isn’t necessary to have one’s privacy violated. But, the letter was written or typed by hand, using words articulating thoughts and mental imagery. So if a malicious entity steals the letter and reads it, they have access to the thoughts you were having when you wrote the letter. Are these thoughts now stolen, or owned by the person who read them?
I don’t need to “own” the made-up song I sing in the shower, unless I want it to become a top 40 song, in which case I have to sell it to a producer or make people pay to listen to it
Inness used the example of a love letter for why ownership isn’t necessary to have one’s privacy violated. But, the letter was written or typed by hand, using words articulating thoughts and mental imagery. So if a malicious entity steals the letter and reads it, they have access to the thoughts you were having when you wrote the letter. Are these thoughts now stolen, or owned by the person who read them?
I don’t need to “own” the made-up song I sing in the shower, unless I want it to become a top 40 song, in which case I have to sell it to a producer or make people pay to listen to it
Inness used the example of a love letter for why ownership isn’t necessary to have one’s privacy violated. But, the letter was written or typed by hand, using words articulating thoughts and mental imagery. So if a malicious entity steals the letter and reads it, they have access to the thoughts you were having when you wrote the letter. Are these thoughts now stolen, or owned by the person who read them?
I don’t need to “own” the made-up song I sing in the shower, unless I want it to become a top 40 song, in which case I have to sell it to a producer or make people pay to listen to it
Inness used the example of a love letter for why ownership isn’t necessary to have one’s privacy violated. But, the letter was written or typed by hand, using words articulating thoughts and mental imagery. So if a malicious entity steals the letter and reads it, they have access to the thoughts you were having when you wrote the letter. Are these thoughts now stolen, or owned by the person who read them?
I don’t need to “own” the made-up song I sing in the shower, unless I want it to become a top 40 song, in which case I have to sell it to a producer or make people pay to listen to it
If one chooses to allow a company to elicit information that can be used for future targeted ads, the user is allowing for an intimate relationship because the receiver (the company) is able to create value (monetary) from the information.
And if a company is being truthful up front about why information is being requested, they may be initiating a intimate relationship that reassures the user. Having transparency and choice changes the relationship between user and company from one of taking to one of mutual understanding.
91% of Americans in 2016 agreed or strongly agreed that users had lost control over the collection and use of of their information, while 2/3rd of those surveyed in 2017 said that existing legislation is inadequate in protecting private information
91% of Americans in 2016 agreed or strongly agreed that users had lost control over the collection and use of of their information, while 2/3rd of those surveyed in 2017 said that existing legislation is inadequate in protecting private information
Odds ratio: strength of association between two events… ratio of the odds of A in the presence of B and the odds of A in the absence of B
OR is less than 1, then A and B are negatively correlated, and the presence of one event reduces the odds of the other event
ordinal logistic regression with clustering by individual
Represents the odds ratio for responding "less of a privacy issue" if it is collected by people rather than technology. Odds ratios less than 1 mean that people perceive app collecting data as less of a privacy issue than collected by people.
Calculated with 95% confidence interval
While all situations indicated that the app collecting information was less of a privacy violation compared to the person, the only one statistically significant with a 95% confidence interval was for the person obtaining planned neural activity being the greatest perceived privacy violation.... don't want people to know your future plans.
For all cases, the app was less of a privacy violation
Represents the odds ratio for responding "less of a privacy issue" if it is collected by people rather than technology. Odds ratios less than 1 mean that subjects perceive app collecting data as less of a privacy issue than collected by people.
Calculated with 95% confidence interval
Odds ratio: strength of association between two events… ratio of the odds of A in the presence of B and the odds of A in the absence of B
OR is less than 1, then A and B are negatively correlated, and the presence of one event reduces the odds of the other event
The only one statistically significant with a 95% confidence interval was for the person collecting planned neural activity being the greatest perceived privacy violation. This unease with future knowledge ties in with the finding from the first section about being able to calculate future digits in the single digit guessing game.
Odds ratio: strength of association between two events… ratio of the odds of A in the presence of B and the odds of A in the absence of B
OR is less than 1, then A and B are negatively correlated, and the presence of one event reduces the odds of the other event
Odds ratio < 1 means respondents who did not indicate a mobility impairment perceive the data collected to be less of a privacy violation, compared to those who did indicate a mobility impairment.
Also means that odds ratio > 1 means non-mobility impaired individuals perceived data collected to be more of a privacy violation, compared to those who are
Unfortunately, none of these results are statistically significant, but there is a noticeable split of perceptions of privacy.
Just the messages themselves, or recording of the message being typed, is more of a privacy violation for mobility-impaired individuals
The scenarios that involved neural activity were more of a privacy violation for non-mobility impaired individuals.
There’s several further analyses for this data.
Users and university researchers should be LESS involved going from development to usage to reparations
Independent regulatory organizations, legislators, and manufacturers should be MORE involved going from development to usage to reparations.
And in fact, it’s the latter three entities that are statistically significant
Reparations for malicious elicitation or misuse
This is assuming that the ranking of user, researcher, IRO, legislator, device manufacturer --- is in fact in a rank order
This is assuming that the ranking of user, researcher, IRO, legislator, device manufacturer --- is in fact in a rank order
Odds ratio: strength of association between two events… ratio of the odds of A in the presence of B and the odds of A in the absence of B
OR is less than 1, then A and B are negatively correlated, and the presence of one event reduces the odds of the other event
Represents the odds ratio for responding "less of a privacy issue" if it is collected by people rather than technology. Odds ratios less than 1 mean that people perceive app collecting data as less of a privacy issue than collected by people.
Calculated with 95% confidence interval
So in development and usage, involvement should decrease across entities.
In the reparations area, involvement should increase
And in fact, the increase in involvement in reparations across entities is the only one that is statistically significant
Give the TPL a moment (Ryan, Howard, Tamara, etc…)