The document provides an overview of an information security, artificial intelligence, and ethics presentation given by Kate Carruthers. The presentation discusses how the world is changing due to increased connectivity and data collection. It highlights some unforeseen negative consequences that have emerged, such as the weaponization of social media and cyber attacks. The presentation emphasizes the importance of ethics and diversity in AI and technology development to avoid biases and ensure technologies are developed for the benefit of humanity. It provides examples of approaches that can be taken, such as privacy by design, security by design, codes of ethics, and regulations.
How to get started on your data governance journey and support your cyber and information security programs. Presented at the AISA Cyber Conference Canberra March 2021
How to get started on your data governance journey and support your cyber and information security programs. Presented at the AISA Cyber Conference Canberra March 2021
The challenges of building a strong data infrastructureJeni Tennison
In the 21st century, data is infrastructure for our economy, just like roads. In this session, Jeni will talk about the big challenges of building a strong data infrastructure: challenges of equality of access, challenges of privacy and trust, and the technical challenges of discovery and interoperability.
This recent survey from Citrix and Wakefield Research examines consumer attitudes toward the privacy and security of personal and work data as well as trust with vendors to protect personal information like social security numbers and mailing addresses. Learn more at http://www.citrix.com/
Presentation: The BYTE Project - by Rachel Finn, Trilateral Research & Consulting (UK), at the European Data Economy Workshop taking place back to back to SEMANTiCS2015 on 15 September 2015 in Vienna
Quick overview of the TechRiot IoT business acceleration program presented to businesses in Fort Collins.
Copyright and property of Matthew Bailey 2016
Privacy and Security by Design Spotlight Presentation at HIMMS Privacy and Security Forum, December 5th 2016. Presented by Jeff R. Livingstone, PhD, Vice President and Global Lead, Life Sciences & Healthcare, Unisys Corporation.
Expanded top ten_big_data_security_and_privacy_challengesTom Kirby
There is some really great stuff coming out of the CSA working & research groups these days. I found this particular research paper from the big data working group to be extremely relevant and useful
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...Data Con LA
The jury is still out on whether Edward Snowden was a hero, traitor, or schmuck. Regardless of the scarlet letter we want to hang around his neck, we should thank him for helping bring the discussion of big data privacy and security to the public square. This session examines the issues of big data privacy and security in the context of the six-stage (big) data lifecycle: create, store, use, share, archive, and destroy.
IQPC Enterprise IT Security Exchange, March 10, 2013
This presentation looks at the risks and rewards and security and privacy implications of Big Data Analytics.
All Things Open 2014 - Day 1
Wednesday, October 22nd, 2014
Jason Hare
Director of Open Data of the Open Data Institute
Open Government/Open Data
Sustainable Open Data Markets
ThinAir speaking session on endpoint data visibility and healthcare security compliance by Brian Reed. Connect with us on LinkedIn or twitter @thinairlabs for more details and live demo
Moving Forward with Digital Disruption: A Right MindsetBohyun Kim
A keynote presented at the MentorNJ In-Person Networking Event 2018 organized by LibraryLinkNJ -The New Jersey Library Cooperative, held at Monroe Township, NJ. on October 5, 2018.
http://librarylinknj.org/MentorNJ/programs/networking-event-2018
The challenges of building a strong data infrastructureJeni Tennison
In the 21st century, data is infrastructure for our economy, just like roads. In this session, Jeni will talk about the big challenges of building a strong data infrastructure: challenges of equality of access, challenges of privacy and trust, and the technical challenges of discovery and interoperability.
This recent survey from Citrix and Wakefield Research examines consumer attitudes toward the privacy and security of personal and work data as well as trust with vendors to protect personal information like social security numbers and mailing addresses. Learn more at http://www.citrix.com/
Presentation: The BYTE Project - by Rachel Finn, Trilateral Research & Consulting (UK), at the European Data Economy Workshop taking place back to back to SEMANTiCS2015 on 15 September 2015 in Vienna
Quick overview of the TechRiot IoT business acceleration program presented to businesses in Fort Collins.
Copyright and property of Matthew Bailey 2016
Privacy and Security by Design Spotlight Presentation at HIMMS Privacy and Security Forum, December 5th 2016. Presented by Jeff R. Livingstone, PhD, Vice President and Global Lead, Life Sciences & Healthcare, Unisys Corporation.
Expanded top ten_big_data_security_and_privacy_challengesTom Kirby
There is some really great stuff coming out of the CSA working & research groups these days. I found this particular research paper from the big data working group to be extremely relevant and useful
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...Data Con LA
The jury is still out on whether Edward Snowden was a hero, traitor, or schmuck. Regardless of the scarlet letter we want to hang around his neck, we should thank him for helping bring the discussion of big data privacy and security to the public square. This session examines the issues of big data privacy and security in the context of the six-stage (big) data lifecycle: create, store, use, share, archive, and destroy.
IQPC Enterprise IT Security Exchange, March 10, 2013
This presentation looks at the risks and rewards and security and privacy implications of Big Data Analytics.
All Things Open 2014 - Day 1
Wednesday, October 22nd, 2014
Jason Hare
Director of Open Data of the Open Data Institute
Open Government/Open Data
Sustainable Open Data Markets
ThinAir speaking session on endpoint data visibility and healthcare security compliance by Brian Reed. Connect with us on LinkedIn or twitter @thinairlabs for more details and live demo
Moving Forward with Digital Disruption: A Right MindsetBohyun Kim
A keynote presented at the MentorNJ In-Person Networking Event 2018 organized by LibraryLinkNJ -The New Jersey Library Cooperative, held at Monroe Township, NJ. on October 5, 2018.
http://librarylinknj.org/MentorNJ/programs/networking-event-2018
Bigger than Any One: Solving Large Scale Data Problems with People and MachinesTyler Bell
The informatic challenges of 2013 and beyond are bigger than any one company. This presentation provides an overview of a number of recent, successful crowd-sourced and community-driven applications that combine ‘Big Data’ approaches with Community involvement. The speaker dives into the numbers and specific details of Factual’s approach to large-scale, multi-authored data collection and aggregation, and how the company’s data ethos and business positioning dictates both the shape of its technology and its vision of large-scale, collective data ecosystems.
Discussing the Global Commision on Internet Governance statement, Toward a So...Philip Sheldrake
The Global Commission on Internet Governance (ourinternet.org) published a statement 15th April 2015 for the Global Conference on Cyberspace meeting in The Hague. It calls on the global community to build a new social compact between citizens and their elected representatives, the judiciary, law enforcement and intelligence agencies, business, civil society and the Internet technical community, with the goal of restoring trust and enhancing confidence in the Internet.
This stack frames my contribution to a discussion of the statement at the Web Science Institute event 8th June 2015.
The presentation of a public hearing of the European Parliament in Brussels, Belgium in 2018. Expert witness Lars Hilse was heard on the risks of cyber terrorism against critical infrastructure and public places.
Thesis: to reconceive and more empoweringly enact relationships with authority, a new sensibility is required, that of the cryptocitizen. This is the skillset of determining oneself as an economic and political agent in the world of digital network technologies. In the cryptopolis smart city of the future, one goal could be enabling the flourishing of a multi-species society of machine, algorithm, and human.
Algocracy and the state of AI in public administrations.Sandra Bermúdez
AI, as technical approach to solve problems, now is deploying in social systems and public administrations. What are the effects? the challenges? should we fear? What should we do?
Artificial Intelligence and implications for research outputsDanny Kingsley
A talk for UKSG online seminar "Publication to press: Building trust in research communication" held on 27 June 2023.
Abstract:
General AI observations:
* AI probably won’t kill us, but there are risks to identity and reputation
* Regulation around AI is starting but the big corporations are trying to control the discourse
Observations about AI and research publishing
* AI can help with the research process – but it's not a replacement for critical thinking
* The current research publishing environment is full of problems both with and without ChatGPT
* AI is a challenge for the open movement & reproducibility and is likely to feed the paper mill tsunami
Posit: AI is currently the whipping boy for our research assessment system
Conclusion: We need to change the research assessment system
Data Science Innovations : Democratisation of Data and Data Science suresh sood
Data Science Innovations : Democratisation of Data and Data Science covers the opportunity of citizen data science lying at the convergence of natural language generation and discoveries in data made by the professions, not data scientists.
Blockchain insider | Chapter 3 : Smart MoneyKoh How Tze
What we have now is truly borderless, programmable money
backed by immutable computer systems based on pure logic & mathematics.
3.1 ABCDs That Are Changing The World
3.2 A Century of Technology Innovation
3.3 Two Monetary Worlds
3.4 Three Phases of Cryptocurrencies
Corporate Currency
CBDC, Central Bank-issued Digital Currency
The Money Flower
Money Trees
3.5 The Creation of Capital In Its Simplest Form
3.6 Incentivizing Good Behaviour
Smart Mobility - Ethical Driving and Data Sharing
Resilient City - Impactful Positive Behaviors
Social Contributions - Datanomics
3.7 Bringing Down Borders
Assets Backed Tokens
Security Token Offering
Do We Need A Nation-State Backed Crypto Exchange?
Blockchaining Sukuk
3.8 Summary
Programmable Money for Effective Resources Distribution
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018Martin Hamilton
In this talk for BETT 2018 I take a look at a few of the socio-technical trends that are set to have a big impact on universities and colleges in 2018 from blockchain to Brexit, and data vandalism to UK spaceports. I look at some approaches that institutions can take to help plan for an uncertain future, and consider how the community can mobilise to protect the progressive values that now often seem to be under threat.
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...Markus Luczak-Rösch
Slides of a public "Spotlight Lecture" given at Victoria University of Wellington on Tuesday, 17th April 2018. The purpose of the lecture was to inform the general public and policy makers about the recent facebook-Cambrige Analytica case and discuss possible ways out of the dilemma where large data monopolies accumulate and sell personal data at scale.
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...Geoffrey Fox
Motivating Introduction to MOOC on Big Data from an applications point of view https://bigdatacoursespring2014.appspot.com/course
Course says:
Geoffrey motivates the study of X-informatics by describing data science and clouds. He starts with striking examples of the data deluge with examples from research, business and the consumer. The growing number of jobs in data science is highlighted. He describes industry trend in both clouds and big data.
He introduces the cloud computing model developed at amazing speed by industry. The 4 paradigms of scientific research are described with growing importance of data oriented version. He covers 3 major X-informatics areas: Physics, e-Commerce and Web Search followed by a broad discussion of cloud applications. Parallel computing in general and particular features of MapReduce are described. He comments on a data science education and the benefits of using MOOC's.
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Center...Geoffrey Fox
Motivating Introduction to MOOC on Big Data from an applications point of view https://bigdatacoursespring2014.appspot.com/course
Course says:
Geoffrey motivates the study of X-informatics by describing data science and clouds. He starts with striking examples of the data deluge with examples from research, business and the consumer. The growing number of jobs in data science is highlighted. He describes industry trend in both clouds and big data.
He introduces the cloud computing model developed at amazing speed by industry. The 4 paradigms of scientific research are described with growing importance of data oriented version. He covers 3 major X-informatics areas: Physics, e-Commerce and Web Search followed by a broad discussion of cloud applications. Parallel computing in general and particular features of MapReduce are described. He comments on a data science education and the benefits of using MOOC's.
Whats the big idea with social media media140-2012Kate Carruthers
Talk given at Media140 Perth 2012
More detailed notes on the talk here:
http://katecarruthers.com/blog/2012/05/whats-the-big-idea-with-social-media-media140/
Talk about the digital revolution and open leadership at the Smart Services CRC Conference, Brisbane Australia, Dec 2010
http://www.smartservicescrc.com.au/
On a Socially Constructed Twitter & Applications of the Philosophy of Data. Paper presented by Brian Ballsum-Stanton (@DenubisX) at the ICCIT_10 Conference in Seoul South Korea
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
6. Nov 2018 6
By Robin611 [CC BY-SA 3.0 (https://creativecommons.org/licenses/by-
sa/3.0)], from Wikimedia Commons, 30 March 2009
Remember Web 2.0?
7. Nov 2018 Kate Carruthers | UNSW 7
Source: https://www.economist.com/news/leaders/21721656-data-economy-demands-new-approach-antitrust-rules-worlds-most-valuable-resource
The world’s most valuable resource is no
longer oil, but data
8. Nov 2018 Kate Carruthers | UNSW 8
Because software is
eating the world…Marc Andreessen, Why Software Is Eating The World, 20 August 2011, Wall Street Journal,
https://www.wsj.com/articles/SB10001424053111903480904576512250915629460
By Kathy Simon [CC BY-SA 2.0
(https://creativecommons.org/licenses/by-sa/2.0)],
via Wikimedia Commons
9. Nov 2018 Kate Carruthers | UNSW 9
And hardware is helping
10. The old world
Nov 2018 Kate Carruthers | UNSW 10
Source: http://toolsqa.com/client-server/client-server-architecture-and-http-protocol/
11. Nov 2018 Kate Carruthers | UNSW 11
Source: https://read.acloud.guru/our-serverless-journey-part-2-908d76d03716
13. Australians know all about
unintended consequences
This Photo by Unknown Author is licensed under CC BY-SA
This Photo by Unknown Author is licensed under CC BY-SA
This Photo by Unknown Author is licensed under CC BY-ND
Nov 2018 Kate Carruthers | UNSW 13
14. Weaponization of social media
The internet is changing war and politics
War and politics are changing the internet
Terrorists livestream their attacks
“Twitter wars” produce real-world casualties
Viral misinformation alters not just the result of battles, but the very
fate of nations
The result is that war, tech, and politics have blurred into a new kind of
battlespace that plays out on our smartphones
Nov 2018 Kate Carruthers | UNSW 14
Singer, Peter Warren, and Brooking, Emerson T.. Likewar: the
Weaponization of Social Media. Eamon Dolan/Houghton Mifflin
Harcourt, 2018.
15. Nov 2018 Kate Carruthers | UNSW 15
Nissen, Thomas Elkjer. The Weaponization Of Social Media: Characteristics of Contemporary Conflicts.
Royal Danish Defence College, 2015. https://www.stratcomcoe.org/thomas-nissen-weaponization-social-media
16. Nov 2018 Kate Carruthers | UNSW 16
"This [Stuxnet] has the whiff of
August 1945…"
"Someone, probably a nation-
state, just used a cyber
weapon in a time of peace…to
destroy what another nation
could only describe as their
critical infrastructure.”
"That's a big deal. That's never
happened before”
Gen. Michael Hayden, former NSA & CIA Director
Paul D. Shinkman, Former CIA Director: Cyber Attack Game-Changers Comparable to Hiroshima, US News, 20 Feb 2013,
https://www.usnews.com/news/articles/2013/02/20/former-cia-director-cyber-attack-game-changers-comparable-to-
hiroshima
By Llorenzi [CC BY-SA 3.0 (https://creativecommons.org/licenses/by-sa/3.0)], from
Wikimedia Commons, 16 Nov 2012
17. Nov 2018 Kate Carruthers | UNSW 17
“So much of the fabric of our [US] society
rests upon the bedrock of our IT. We
continue to digitize things; we store our
wealth and treasure there; we run
operations; we keep our secrets all in that
cyber domain.”Sanger, David E.. The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Crown Publishers., 2018.
18. Nov 2018 Kate Carruthers | UNSW 18
Cyber is the new
battlefield
& everything is cyber now
19. Nov 2018 Kate Carruthers | UNSW 19
https://www.huntsmansecurity.com/solutions/cyber-security-compliance/asd-essential-eight/
Even the
essential 8
will not
protect us
20. Boundary is no longer at your organisation's
firewalls - Identity is the boundary
Old world New world
Nov 2018 Kate Carruthers | UNSW 20
By Harald Mühlböck [GFDL (http://www.gnu.org/copyleft/fdl.html) or CC-BY-SA-3.0 (http://creativecommons.org/licenses/by-
sa/3.0/)], via Wikimedia Commons
By Audun Jøsang [CC BY 3.0
(https://creativecommons.org/licenses/by/3.0)], via Wikimedia Commons
21. Combine weaponized connectivity with
capitalism
Nov 2018 Kate Carruthers | UNSW 21
Source: https://sheepoverboard.com/trojans-cusp/
Source: https://twitter.com/jpwarren/status/1055548155410804736?s=11
22. Why Netflix Should Scare You More Than It Does, Huffpost, 11 Oct 2018, Todd Van Luling,
https://www.huffingtonpost.com.au/entry/netflix-scared-bad_us_5bbcd832e4b01470d055d4b3
Nov 2018 Kate Carruthers | UNSW 22
“Netflix pushes content
based on whether the
company’s algorithm
thinks it will make us
click and not
necessarily whether
that content will be
good or bad for us.”
23. May 2018 Kate Carruthers | UNSW 23
“Revealed: 50
million Facebook
profiles harvested
for Cambridge
Analytica in major
data breach”
https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election
25. May 2018 Kate Carruthers | UNSW 25
Moral principles that govern a person's behaviour or the way
in which they conduct an activity…
“We ask ethical questions whenever we
think about how we should act. Being
ethical is a part of what defines us as
human beings.”
The Ethics Centre, Sydney
26. Ethics of:
•Data - how we generate, record & share data
•Algorithms - how we interpret data via artificial
intelligence, machine learning and robots
•Practices - devising responsible innovation and
professional codes to guide this emerging
science
Nov 2018 Kate Carruthers | UNSW 26
Luciano Floridi, Mariarosaria Taddeo, What is data ethics?
Phil. Trans. R. Soc. A 2016 374
20160360; DOI: 10.1098/rsta.2016.0360. Published 14 November 2016
27. Nov 2018 Kate Carruthers | UNSW 27
“Some of the key findings are intuitive:
participants prefer to save people over
animals, the young over the old, and more
rather than fewer. Other preferences are
more troubling: women over men,
executives over the homeless, the fit over
the obese.”
Seth Lazar, Colin Klein, Why we need more than just data to create ethical driverless cars, The Conversation, 25 October 2018,
https://theconversation.com/why-we-need-more-than-just-data-to-create-ethical-driverless-cars-105650
28. “Amazon
scraps
secret AI
recruiting
tool that
showed bias
against
women”
Amazon scraps secret AI recruiting tool that showed bias against women,
Jeffrey Dastin, 10 Oct 2018, Reuters https://www.reuters.com/article/us-amazon-com-jobs-automation-insight/amazon-scraps-secret-ai-
recruiting-tool-that-showed-bias-against-women-idUSKCN1MK08G
29. Nov 2018 Kate Carruthers | UNSW 29
Lavanchy, Maude. Amazon’s sexist hiring algorithm could still be better than a human, November 1, 2018, The
Conversation. https://theconversation.com/amazons-sexist-hiring-algorithm-could-still-be-better-than-a-human-105270
30. Algorithmic bias isn’t just sexist or racist
“An algorithm which simply optimizes cost-
effectiveness in ad delivery will deliver ads
that were intended to be gender-neutral in
an apparently discriminatory way, due to
crowding out."
Nov 2018 Kate Carruthers | UNSW 30
Lambrecht, A and Tucker, C E (2018) Algorithmic bias? An empirical study into apparent gender-based discrimination in
the display of STEM career ads. Management Science. ISSN 0025-1909 (In Press)
31. Nov 2018 Kate Carruthers | UNSW 31
Min Qi Wang, Alice F. Yan, Ralph V. Katz, Researcher Requests for Inappropriate Analysis and Reporting: A U.S. Survey of Consulting
Biostatisticians, Annals of Internal Medicine, October 2018, DOI 10.7326/m18-1230
1 in 4 statisticians say they
were asked to commit
scientific fraud
32. Nov 2018 Kate Carruthers | UNSW 32
McCarthy , Kieren. VW engineer sent to the clink for three years for emissions-busting code: James
Liang gets 40 months on the cooler and $200,000 fine, The Register, 25 Aug 2017,
https://www.theregister.co.uk/2017/08/25/vw_engineer_gets_3yrs_for_emissionbusting_sw/
Real world
consequences
33. Nov 2018 Kate Carruthers | UNSW 33
• For years we have assumed that
programming is a neutral act
• We also assumed that the default
human being was a white male
• We also assumed that software
would not have real world impacts
34. Nov 2018 Kate Carruthers | UNSW 34
1.Technology has no ethics. People
demonstrate ethics.
2.Technology inherits the biases of
its makers.
3.Therefore we need diversity and
formal mechanisms to reduce bias.
35. Nov 2018 Kate Carruthers | UNSW 35
Inclusion is the process that begets
diversity
Build inclusive practices and diversity
will come
37. Things we can do
•New approaches to:
•Design & development of hardware & software
•Managing the emerging info sec threat landscape
•Regulation of data security and privacy
•New practices for designers, developers, and
business people
Nov 2018 Kate Carruthers | UNSW 37
39. Privacy by Design
1. Proactive not Reactive; Preventative not Remedial
2. Privacy as the Default Setting
3. Privacy Embedded into Design
4. Full Functionality – Positive-Sum, not Zero-Sum
5. End-to-End Security – Full Lifecycle Protection
6. Visibility and Transparency – Keep it Open
7. Respect for User Privacy – Keep it User-Centric
May 2018 Kate Carruthers | UNSW 39
Source: https://www.ipc.on.ca/wp-content/uploads/Resources/7foundationalprinciples.pdf
40. OWASP Security by Design Principles
1.Minimize attack surface area
2.Establish secure defaults
3.Principle of Least privilege
4.Principle of Defence in depth
5.Fail securely
6.Don’t trust services
7.Ensure Separation of duties
8.Always avoid security by obscurity
9.Keep security simple
10.Fix security issues correctly
May 2018 Kate Carruthers | UNSW 40
Open Web Application Security Project https://www.owasp.org/index.php/Security_by_Design_Principles
41. May 2018 Kate Carruthers | UNSW 41
“Public agencies urgently need
a practical framework to assess
automated decision systems
and to ensure public
accountability.”
Source: Algorithmic Impact Assessments: A Practical Framework For Public Agency Accountability, Dillon Reisman, Jason Schultz, Kate Crawford, Meredith Whittaker, April 2018, https://ainowinstitute.org/aiareport2018.pdf
42. May 2018 Kate Carruthers | UNSW 42
Source: Algorithmic Impact Assessments: A Practical Framework For Public Agency Accountability, Dillon Reisman, Jason Schultz, Kate Crawford, Meredith Whittaker, April 2018, https://ainowinstitute.org/aiareport2018.pdf
43. House of Lords Artificial Intelligence
Committee 2017
The Lords’ report proposes five main principles for an AI code:
1. Artificial intelligence should be developed for the common good and benefit
of humanity
2. Artificial intelligence should operate on principles of intelligibility and fairness
3. Artificial intelligence should not be used to diminish the data rights or privacy
of individuals, families or communities
4. All citizens have the right to be educated to enable them to flourish mentally,
emotionally and economically alongside artificial intelligence
5. The autonomous power to hurt, destroy or deceive human beings should
never be vested in artificial intelligence
Nov 2018 Kate Carruthers | UNSW 43
Source: Report of Session 2017-19 - published 16 April 2017 - HL Paper 100
https://publications.parliament.uk/pa/ld201719/ldselect/ldai/100/10002.htm
45. Nov 2018 Kate Carruthers | UNSW 45
Secure by Design
The [UK] Government's Code
of Practice for Consumer
Internet of Things (IoT)
Security for manufacturers,
with guidance for consumers
on smart devices at home.
Secure by Design, 7 March 2018,
UK Department for Digital, Culture, Media & Sport.
https://www.gov.uk/government/publications/secure-by-design
46. UK government guidance
1. No default passwords
2. Implement a vulnerability
disclosure policy
3. Keep software updated
4. Securely store credentials and
security-sensitive data
5. Communicate securely
6. Minimise exposed attack
surfaces
7. Ensure software integrity
8. Ensure that personal data is
protected
9. Make systems resilient to
outages
10. Monitor system telemetry data
11. Make it easy for consumers to
delete personal data
12. Make installation and
maintenance of devices easy
13. Validate input data
Nov 2018 Kate Carruthers | UNSW 46
https://www.gov.uk/government/publications/secure-by-design/code-of-practice-for-consumer-iot-security
47. Nov 2018 Kate Carruthers | UNSW 47
https://www.ethicscanvas.org/
48. Recap
• Data is the new oil
• Software is eating the world
• Hardware is helping it do so
• Weaponization of social media shows us power of unintended
consequences
• Cyber is now everyone’s problem
• We need to build in ethics & build diversity in teams
Contact me: k.carruthers@unsw.edu.au
SlideShare: https://www.slideshare.net/carruthk
Nov 2018 Kate Carruthers | UNSW 48
49. Some resources
• Luciano Floridi, Mariarosaria Taddeo. What is data ethics? Phil. Trans. R. Soc. A 2016 374
20160360; DOI: 10.1098/rsta.2016.0360. Published 14 November 2016
• Digital Enlightenment Forum: Digital Ethics. Workshop Report. (2016, March 1). Retrieved August 16,
2017, from
https://digitalenlightenment.org/sites/default/files/users/14/Digital%20Ethics%20Workshop%20Report%
20v2.pdf
• Maggiolini, Piercarlo. A deep study on the concept of digital ethics. (2014). Revista de Administração de
Empresas, 54(5), 585-591. https://dx.doi.org/10.1590/S0034-759020140511
• Lambrecht, A and Tucker, C E (2018) Algorithmic bias? An empirical study into apparent gender-based
discrimination in the display of STEM career ads. Management Science. ISSN 0025-1909 (In Press)
• Lavanchy, Maude. Amazon’s sexist hiring algorithm could still be better than a human,. November 1,
2018, The Conversation https://theconversation.com/amazons-sexist-hiring-algorithm-could-still-be-
better-than-a-human-105270
• Reisman, Dillon, Schultz, Jason, Crawford, Kate, Whittaker, Meredith. Algorithmic Impact Assessments: A
Practical Framework For Public Agency Accountability, April 2018,
https://ainowinstitute.org/aiareport2018.pdf
• McCarthy , Kieren. VW engineer sent to the clink for three years for emissions-busting code: James Liang
gets 40 months on the cooler and $200,000 fine, The Register, 25 Aug 2017,
https://www.theregister.co.uk/2017/08/25/vw_engineer_gets_3yrs_for_emissionbusting_sw/
• Singer, Peter Warren, and Brooking, Emerson T.. Likewar: the Weaponization of Social Media. Eamon
Dolan/Houghton Mifflin Harcourt, 2018.
• Sanger, David E.. The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Crown Publishers.,
2018.
Kate Carruthers | UNSW May 2018 8
50. Some resources
• AI Now Institute at New York University
• Causeit Data Ethics
• The BIG Data Ethics Cheat Sheet, Hackermoon
• Guidelines on Ethical Research
• IEEE AI and Ethics in Design course
http://innovationatwork.ieee.org/new-course-program-now-available-
ai-and-ethics-in-design/
• Tufts University course Ethics of AI, Robotics and Human-Robot
Interaction
• Digital Ethics Lab - Oxford Internet Institute - University of Oxford
• Georgetown University, Kennedy Institute of Ethics, Ethics Lab
• British Sociological Association
Kate Carruthers | UNSW May 2018 50