SlideShare a Scribd company logo
Info Sec, AI, and
Ethics
Kate Carruthers
Version 1.0
Nov 2018
Classification: PUBLIC
Nov 2018
Slides are up on SlideShare:
https://www.slideshare.net/carruthk
Agenda
1. The world is changing
2. Unforeseen consequences
3. Why ethics & diversity are important
4. What can be done?
How I got here…
Privacy
Cyber
Security
Ethics
Data
Governance
Nov 2018 Kate Carruthers | UNSW 4
Corporate IT
The world is
changing
Kate Carruthers | UNSW Nov 2018 7
Nov 2018 6
By Robin611 [CC BY-SA 3.0 (https://creativecommons.org/licenses/by-
sa/3.0)], from Wikimedia Commons, 30 March 2009
Remember Web 2.0?
Nov 2018 Kate Carruthers | UNSW 7
Source: https://www.economist.com/news/leaders/21721656-data-economy-demands-new-approach-antitrust-rules-worlds-most-valuable-resource
The world’s most valuable resource is no
longer oil, but data
Nov 2018 Kate Carruthers | UNSW 8
Because software is
eating the world…Marc Andreessen, Why Software Is Eating The World, 20 August 2011, Wall Street Journal,
https://www.wsj.com/articles/SB10001424053111903480904576512250915629460
By Kathy Simon [CC BY-SA 2.0
(https://creativecommons.org/licenses/by-sa/2.0)],
via Wikimedia Commons
Nov 2018 Kate Carruthers | UNSW 9
And hardware is helping
The old world
Nov 2018 Kate Carruthers | UNSW 10
Source: http://toolsqa.com/client-server/client-server-architecture-and-http-protocol/
Nov 2018 Kate Carruthers | UNSW 11
Source: https://read.acloud.guru/our-serverless-journey-part-2-908d76d03716
Unforeseen
consequences of
connectedness
Kate Carruthers | UNSW Nov 2018 8
Australians know all about
unintended consequences
This Photo by Unknown Author is licensed under CC BY-SA
This Photo by Unknown Author is licensed under CC BY-SA
This Photo by Unknown Author is licensed under CC BY-ND
Nov 2018 Kate Carruthers | UNSW 13
Weaponization of social media
The internet is changing war and politics
War and politics are changing the internet
Terrorists livestream their attacks
“Twitter wars” produce real-world casualties
Viral misinformation alters not just the result of battles, but the very
fate of nations
The result is that war, tech, and politics have blurred into a new kind of
battlespace that plays out on our smartphones
Nov 2018 Kate Carruthers | UNSW 14
Singer, Peter Warren, and Brooking, Emerson T.. Likewar: the
Weaponization of Social Media. Eamon Dolan/Houghton Mifflin
Harcourt, 2018.
Nov 2018 Kate Carruthers | UNSW 15
Nissen, Thomas Elkjer. The Weaponization Of Social Media: Characteristics of Contemporary Conflicts.
Royal Danish Defence College, 2015. https://www.stratcomcoe.org/thomas-nissen-weaponization-social-media
Nov 2018 Kate Carruthers | UNSW 16
"This [Stuxnet] has the whiff of
August 1945…"
"Someone, probably a nation-
state, just used a cyber
weapon in a time of peace…to
destroy what another nation
could only describe as their
critical infrastructure.”
"That's a big deal. That's never
happened before”
Gen. Michael Hayden, former NSA & CIA Director
Paul D. Shinkman, Former CIA Director: Cyber Attack Game-Changers Comparable to Hiroshima, US News, 20 Feb 2013,
https://www.usnews.com/news/articles/2013/02/20/former-cia-director-cyber-attack-game-changers-comparable-to-
hiroshima
By Llorenzi [CC BY-SA 3.0 (https://creativecommons.org/licenses/by-sa/3.0)], from
Wikimedia Commons, 16 Nov 2012
Nov 2018 Kate Carruthers | UNSW 17
“So much of the fabric of our [US] society
rests upon the bedrock of our IT. We
continue to digitize things; we store our
wealth and treasure there; we run
operations; we keep our secrets all in that
cyber domain.”Sanger, David E.. The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Crown Publishers., 2018.
Nov 2018 Kate Carruthers | UNSW 18
Cyber is the new
battlefield
& everything is cyber now
Nov 2018 Kate Carruthers | UNSW 19
https://www.huntsmansecurity.com/solutions/cyber-security-compliance/asd-essential-eight/
Even the
essential 8
will not
protect us
Boundary is no longer at your organisation's
firewalls - Identity is the boundary
Old world New world
Nov 2018 Kate Carruthers | UNSW 20
By Harald Mühlböck [GFDL (http://www.gnu.org/copyleft/fdl.html) or CC-BY-SA-3.0 (http://creativecommons.org/licenses/by-
sa/3.0/)], via Wikimedia Commons
By Audun Jøsang [CC BY 3.0
(https://creativecommons.org/licenses/by/3.0)], via Wikimedia Commons
Combine weaponized connectivity with
capitalism
Nov 2018 Kate Carruthers | UNSW 21
Source: https://sheepoverboard.com/trojans-cusp/
Source: https://twitter.com/jpwarren/status/1055548155410804736?s=11
Why Netflix Should Scare You More Than It Does, Huffpost, 11 Oct 2018, Todd Van Luling,
https://www.huffingtonpost.com.au/entry/netflix-scared-bad_us_5bbcd832e4b01470d055d4b3
Nov 2018 Kate Carruthers | UNSW 22
“Netflix pushes content
based on whether the
company’s algorithm
thinks it will make us
click and not
necessarily whether
that content will be
good or bad for us.”
May 2018 Kate Carruthers | UNSW 23
“Revealed: 50
million Facebook
profiles harvested
for Cambridge
Analytica in major
data breach”
https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election
Why ethics and
diversity are important
Kate Carruthers | UNSW Nov 2018 2
May 2018 Kate Carruthers | UNSW 25
Moral principles that govern a person's behaviour or the way
in which they conduct an activity…
“We ask ethical questions whenever we
think about how we should act. Being
ethical is a part of what defines us as
human beings.”
The Ethics Centre, Sydney
Ethics of:
•Data - how we generate, record & share data
•Algorithms - how we interpret data via artificial
intelligence, machine learning and robots
•Practices - devising responsible innovation and
professional codes to guide this emerging
science
Nov 2018 Kate Carruthers | UNSW 26
Luciano Floridi, Mariarosaria Taddeo, What is data ethics?
Phil. Trans. R. Soc. A 2016 374
20160360; DOI: 10.1098/rsta.2016.0360. Published 14 November 2016
Nov 2018 Kate Carruthers | UNSW 27
“Some of the key findings are intuitive:
participants prefer to save people over
animals, the young over the old, and more
rather than fewer. Other preferences are
more troubling: women over men,
executives over the homeless, the fit over
the obese.”
Seth Lazar, Colin Klein, Why we need more than just data to create ethical driverless cars, The Conversation, 25 October 2018,
https://theconversation.com/why-we-need-more-than-just-data-to-create-ethical-driverless-cars-105650
“Amazon
scraps
secret AI
recruiting
tool that
showed bias
against
women”
Amazon scraps secret AI recruiting tool that showed bias against women,
Jeffrey Dastin, 10 Oct 2018, Reuters https://www.reuters.com/article/us-amazon-com-jobs-automation-insight/amazon-scraps-secret-ai-
recruiting-tool-that-showed-bias-against-women-idUSKCN1MK08G
Nov 2018 Kate Carruthers | UNSW 29
Lavanchy, Maude. Amazon’s sexist hiring algorithm could still be better than a human, November 1, 2018, The
Conversation. https://theconversation.com/amazons-sexist-hiring-algorithm-could-still-be-better-than-a-human-105270
Algorithmic bias isn’t just sexist or racist
“An algorithm which simply optimizes cost-
effectiveness in ad delivery will deliver ads
that were intended to be gender-neutral in
an apparently discriminatory way, due to
crowding out."
Nov 2018 Kate Carruthers | UNSW 30
Lambrecht, A and Tucker, C E (2018) Algorithmic bias? An empirical study into apparent gender-based discrimination in
the display of STEM career ads. Management Science. ISSN 0025-1909 (In Press)
Nov 2018 Kate Carruthers | UNSW 31
Min Qi Wang, Alice F. Yan, Ralph V. Katz, Researcher Requests for Inappropriate Analysis and Reporting: A U.S. Survey of Consulting
Biostatisticians, Annals of Internal Medicine, October 2018, DOI 10.7326/m18-1230
1 in 4 statisticians say they
were asked to commit
scientific fraud
Nov 2018 Kate Carruthers | UNSW 32
McCarthy , Kieren. VW engineer sent to the clink for three years for emissions-busting code: James
Liang gets 40 months on the cooler and $200,000 fine, The Register, 25 Aug 2017,
https://www.theregister.co.uk/2017/08/25/vw_engineer_gets_3yrs_for_emissionbusting_sw/
Real world
consequences
Nov 2018 Kate Carruthers | UNSW 33
• For years we have assumed that
programming is a neutral act
• We also assumed that the default
human being was a white male
• We also assumed that software
would not have real world impacts
Nov 2018 Kate Carruthers | UNSW 34
1.Technology has no ethics. People
demonstrate ethics.
2.Technology inherits the biases of
its makers.
3.Therefore we need diversity and
formal mechanisms to reduce bias.
Nov 2018 Kate Carruthers | UNSW 35
Inclusion is the process that begets
diversity
Build inclusive practices and diversity
will come
What can be
done?
Kate Carruthers | UNSW Nov 2018 7
Things we can do
•New approaches to:
•Design & development of hardware & software
•Managing the emerging info sec threat landscape
•Regulation of data security and privacy
•New practices for designers, developers, and
business people
Nov 2018 Kate Carruthers | UNSW 37
Traditional approaches
Privacy by design
Security by design
Codes of ethics
Guidelines
Nov 2018 Kate Carruthers | UNSW 38
Privacy by Design
1. Proactive not Reactive; Preventative not Remedial
2. Privacy as the Default Setting
3. Privacy Embedded into Design
4. Full Functionality – Positive-Sum, not Zero-Sum
5. End-to-End Security – Full Lifecycle Protection
6. Visibility and Transparency – Keep it Open
7. Respect for User Privacy – Keep it User-Centric
May 2018 Kate Carruthers | UNSW 39
Source: https://www.ipc.on.ca/wp-content/uploads/Resources/7foundationalprinciples.pdf
OWASP Security by Design Principles
1.Minimize attack surface area
2.Establish secure defaults
3.Principle of Least privilege
4.Principle of Defence in depth
5.Fail securely
6.Don’t trust services
7.Ensure Separation of duties
8.Always avoid security by obscurity
9.Keep security simple
10.Fix security issues correctly
May 2018 Kate Carruthers | UNSW 40
Open Web Application Security Project https://www.owasp.org/index.php/Security_by_Design_Principles
May 2018 Kate Carruthers | UNSW 41
“Public agencies urgently need
a practical framework to assess
automated decision systems
and to ensure public
accountability.”
Source: Algorithmic Impact Assessments: A Practical Framework For Public Agency Accountability, Dillon Reisman, Jason Schultz, Kate Crawford, Meredith Whittaker, April 2018, https://ainowinstitute.org/aiareport2018.pdf
May 2018 Kate Carruthers | UNSW 42
Source: Algorithmic Impact Assessments: A Practical Framework For Public Agency Accountability, Dillon Reisman, Jason Schultz, Kate Crawford, Meredith Whittaker, April 2018, https://ainowinstitute.org/aiareport2018.pdf
House of Lords Artificial Intelligence
Committee 2017
The Lords’ report proposes five main principles for an AI code:
1. Artificial intelligence should be developed for the common good and benefit
of humanity
2. Artificial intelligence should operate on principles of intelligibility and fairness
3. Artificial intelligence should not be used to diminish the data rights or privacy
of individuals, families or communities
4. All citizens have the right to be educated to enable them to flourish mentally,
emotionally and economically alongside artificial intelligence
5. The autonomous power to hurt, destroy or deceive human beings should
never be vested in artificial intelligence
Nov 2018 Kate Carruthers | UNSW 43
Source: Report of Session 2017-19 - published 16 April 2017 - HL Paper 100
https://publications.parliament.uk/pa/ld201719/ldselect/ldai/100/10002.htm
Nov 2018 Kate Carruthers | UNSW 44
“Governor Jerry Brown
recently signed S.B. 1001,
a new law requiring all
“bots” used for purposes
of influencing a
commercial transaction
or a vote in an election to
be labeled. ”
Victory! Dangerous elements removed from California's bot-labeling bill, Jamie Williams & Jeremy Gillula, 5 October 2018 https://www.eff.org/deeplinks/2018/10/victory-dangerous-elements-removed-californias-bot-labeling-bill
© 2016 Maximus Renegade .... Licensed under CC-BY.
Nov 2018 Kate Carruthers | UNSW 45
Secure by Design
The [UK] Government's Code
of Practice for Consumer
Internet of Things (IoT)
Security for manufacturers,
with guidance for consumers
on smart devices at home.
Secure by Design, 7 March 2018,
UK Department for Digital, Culture, Media & Sport.
https://www.gov.uk/government/publications/secure-by-design
UK government guidance
1. No default passwords
2. Implement a vulnerability
disclosure policy
3. Keep software updated
4. Securely store credentials and
security-sensitive data
5. Communicate securely
6. Minimise exposed attack
surfaces
7. Ensure software integrity
8. Ensure that personal data is
protected
9. Make systems resilient to
outages
10. Monitor system telemetry data
11. Make it easy for consumers to
delete personal data
12. Make installation and
maintenance of devices easy
13. Validate input data
Nov 2018 Kate Carruthers | UNSW 46
https://www.gov.uk/government/publications/secure-by-design/code-of-practice-for-consumer-iot-security
Nov 2018 Kate Carruthers | UNSW 47
https://www.ethicscanvas.org/
Recap
• Data is the new oil
• Software is eating the world
• Hardware is helping it do so
• Weaponization of social media shows us power of unintended
consequences
• Cyber is now everyone’s problem
• We need to build in ethics & build diversity in teams
Contact me: k.carruthers@unsw.edu.au
SlideShare: https://www.slideshare.net/carruthk
Nov 2018 Kate Carruthers | UNSW 48
Some resources
• Luciano Floridi, Mariarosaria Taddeo. What is data ethics? Phil. Trans. R. Soc. A 2016 374
20160360; DOI: 10.1098/rsta.2016.0360. Published 14 November 2016
• Digital Enlightenment Forum: Digital Ethics. Workshop Report. (2016, March 1). Retrieved August 16,
2017, from
https://digitalenlightenment.org/sites/default/files/users/14/Digital%20Ethics%20Workshop%20Report%
20v2.pdf
• Maggiolini, Piercarlo. A deep study on the concept of digital ethics. (2014). Revista de Administração de
Empresas, 54(5), 585-591. https://dx.doi.org/10.1590/S0034-759020140511
• Lambrecht, A and Tucker, C E (2018) Algorithmic bias? An empirical study into apparent gender-based
discrimination in the display of STEM career ads. Management Science. ISSN 0025-1909 (In Press)
• Lavanchy, Maude. Amazon’s sexist hiring algorithm could still be better than a human,. November 1,
2018, The Conversation https://theconversation.com/amazons-sexist-hiring-algorithm-could-still-be-
better-than-a-human-105270
• Reisman, Dillon, Schultz, Jason, Crawford, Kate, Whittaker, Meredith. Algorithmic Impact Assessments: A
Practical Framework For Public Agency Accountability, April 2018,
https://ainowinstitute.org/aiareport2018.pdf
• McCarthy , Kieren. VW engineer sent to the clink for three years for emissions-busting code: James Liang
gets 40 months on the cooler and $200,000 fine, The Register, 25 Aug 2017,
https://www.theregister.co.uk/2017/08/25/vw_engineer_gets_3yrs_for_emissionbusting_sw/
• Singer, Peter Warren, and Brooking, Emerson T.. Likewar: the Weaponization of Social Media. Eamon
Dolan/Houghton Mifflin Harcourt, 2018.
• Sanger, David E.. The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Crown Publishers.,
2018.
Kate Carruthers | UNSW May 2018 8
Some resources
• AI Now Institute at New York University
• Causeit Data Ethics
• The BIG Data Ethics Cheat Sheet, Hackermoon
• Guidelines on Ethical Research
• IEEE AI and Ethics in Design course
http://innovationatwork.ieee.org/new-course-program-now-available-
ai-and-ethics-in-design/
• Tufts University course Ethics of AI, Robotics and Human-Robot
Interaction
• Digital Ethics Lab - Oxford Internet Institute - University of Oxford
• Georgetown University, Kennedy Institute of Ethics, Ethics Lab
• British Sociological Association
Kate Carruthers | UNSW May 2018 50

More Related Content

What's hot

Social media: balancing risk and control
Social media: balancing risk and controlSocial media: balancing risk and control
Social media: balancing risk and control
Kate Carruthers
 
Modelling Higher Education's digital future
Modelling Higher Education's digital future Modelling Higher Education's digital future
Modelling Higher Education's digital future
Kate Carruthers
 
The challenges of building a strong data infrastructure
The challenges of building a strong data infrastructureThe challenges of building a strong data infrastructure
The challenges of building a strong data infrastructure
Jeni Tennison
 
Where is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudWhere is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloud
Chris Swan
 
Citrix Security Survey Guide
Citrix Security Survey GuideCitrix Security Survey Guide
Citrix Security Survey Guide
Citrix
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
North Texas Chapter of the ISSA
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
Watchful Software
 
The BYTE Project
The BYTE Project The BYTE Project
The BYTE Project
Semantic Web Company
 
Introduction to TechRiot - Innosphere
Introduction to TechRiot - InnosphereIntroduction to TechRiot - Innosphere
Introduction to TechRiot - Innosphere
Matthew Bailey
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
Unisys Corporation
 
Mr. Blog Goes to Washington by Keith Reynolds
Mr. Blog Goes to Washington by Keith ReynoldsMr. Blog Goes to Washington by Keith Reynolds
Mr. Blog Goes to Washington by Keith Reynolds
L&T Co.
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challenges
Tom Kirby
 
Collaborative Working @ Digital Catapult - Digital Catapult - Michele Nati
Collaborative Working @ Digital Catapult - Digital Catapult - Michele NatiCollaborative Working @ Digital Catapult - Digital Catapult - Michele Nati
Collaborative Working @ Digital Catapult - Digital Catapult - Michele Nati
MicheleNati
 
IoT et blockchain : perspective R&D
IoT et blockchain : perspective R&DIoT et blockchain : perspective R&D
IoT et blockchain : perspective R&D
Living Things
 
Data ethics for developers
Data ethics for developersData ethics for developers
Data ethics for developers
anilramnanan
 
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
Data Con LA
 
ICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalJohn Weiler
 
Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?
John D. Johnson
 
Sustainable Open Data Markets
Sustainable Open Data MarketsSustainable Open Data Markets
Sustainable Open Data Markets
All Things Open
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir
 

What's hot (20)

Social media: balancing risk and control
Social media: balancing risk and controlSocial media: balancing risk and control
Social media: balancing risk and control
 
Modelling Higher Education's digital future
Modelling Higher Education's digital future Modelling Higher Education's digital future
Modelling Higher Education's digital future
 
The challenges of building a strong data infrastructure
The challenges of building a strong data infrastructureThe challenges of building a strong data infrastructure
The challenges of building a strong data infrastructure
 
Where is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudWhere is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloud
 
Citrix Security Survey Guide
Citrix Security Survey GuideCitrix Security Survey Guide
Citrix Security Survey Guide
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
 
The BYTE Project
The BYTE Project The BYTE Project
The BYTE Project
 
Introduction to TechRiot - Innosphere
Introduction to TechRiot - InnosphereIntroduction to TechRiot - Innosphere
Introduction to TechRiot - Innosphere
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
Mr. Blog Goes to Washington by Keith Reynolds
Mr. Blog Goes to Washington by Keith ReynoldsMr. Blog Goes to Washington by Keith Reynolds
Mr. Blog Goes to Washington by Keith Reynolds
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challenges
 
Collaborative Working @ Digital Catapult - Digital Catapult - Michele Nati
Collaborative Working @ Digital Catapult - Digital Catapult - Michele NatiCollaborative Working @ Digital Catapult - Digital Catapult - Michele Nati
Collaborative Working @ Digital Catapult - Digital Catapult - Michele Nati
 
IoT et blockchain : perspective R&D
IoT et blockchain : perspective R&DIoT et blockchain : perspective R&D
IoT et blockchain : perspective R&D
 
Data ethics for developers
Data ethics for developersData ethics for developers
Data ethics for developers
 
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
 
ICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_final
 
Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?
 
Sustainable Open Data Markets
Sustainable Open Data MarketsSustainable Open Data Markets
Sustainable Open Data Markets
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
 

Similar to Info Sec, AI, and Ethics

South By South Best 2018
South By South Best 2018 South By South Best 2018
South By South Best 2018
James Quinlan
 
Moving Forward with Digital Disruption: A Right Mindset
Moving Forward with Digital Disruption: A Right MindsetMoving Forward with Digital Disruption: A Right Mindset
Moving Forward with Digital Disruption: A Right Mindset
Bohyun Kim
 
Bigger than Any One: Solving Large Scale Data Problems with People and Machines
Bigger than Any One: Solving Large Scale Data Problems with People and MachinesBigger than Any One: Solving Large Scale Data Problems with People and Machines
Bigger than Any One: Solving Large Scale Data Problems with People and Machines
Tyler Bell
 
Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...
Philip Sheldrake
 
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Lars Hilse Global Thought Leader in #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
 
Mathews blockchain presentation
Mathews blockchain presentationMathews blockchain presentation
Mathews blockchain presentation
Michael Mathews
 
Smart City Cryptopolis
Smart City CryptopolisSmart City Cryptopolis
Smart City Cryptopolis
Melanie Swan
 
Algocracy and the state of AI in public administrations.
Algocracy and the state of AI in public administrations.Algocracy and the state of AI in public administrations.
Algocracy and the state of AI in public administrations.
Sandra Bermúdez
 
Injustice_Harm_Digital_Infrastructures.pptx
Injustice_Harm_Digital_Infrastructures.pptxInjustice_Harm_Digital_Infrastructures.pptx
Injustice_Harm_Digital_Infrastructures.pptx
MusfiqJony
 
Artificial Intelligence and implications for research outputs
Artificial Intelligence and implications for research outputsArtificial Intelligence and implications for research outputs
Artificial Intelligence and implications for research outputs
Danny Kingsley
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MIT
Chris Marsden
 
THE GREAT HACK.docx
THE GREAT HACK.docxTHE GREAT HACK.docx
THE GREAT HACK.docx
roselleportudo
 
Data Science Innovations : Democratisation of Data and Data Science
Data Science Innovations : Democratisation of Data and Data Science  Data Science Innovations : Democratisation of Data and Data Science
Data Science Innovations : Democratisation of Data and Data Science
suresh sood
 
Blockchain insider | Chapter 3 : Smart Money
Blockchain insider | Chapter 3 : Smart MoneyBlockchain insider | Chapter 3 : Smart Money
Blockchain insider | Chapter 3 : Smart Money
Koh How Tze
 
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
Martin Hamilton
 
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...
Markus Luczak-Rösch
 
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...
Geoffrey Fox
 
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Center...
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Center...Big Data Applications & Analytics Motivation: Big Data and the Cloud; Center...
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Center...
Geoffrey Fox
 
Data mining and homeland security rl31798
Data mining and homeland security rl31798Data mining and homeland security rl31798
Data mining and homeland security rl31798
Daniel John
 
International Journal of Communication 6 (2012), 2870–2893 193
International Journal of Communication 6 (2012), 2870–2893 193International Journal of Communication 6 (2012), 2870–2893 193
International Journal of Communication 6 (2012), 2870–2893 193
TatianaMajor22
 

Similar to Info Sec, AI, and Ethics (20)

South By South Best 2018
South By South Best 2018 South By South Best 2018
South By South Best 2018
 
Moving Forward with Digital Disruption: A Right Mindset
Moving Forward with Digital Disruption: A Right MindsetMoving Forward with Digital Disruption: A Right Mindset
Moving Forward with Digital Disruption: A Right Mindset
 
Bigger than Any One: Solving Large Scale Data Problems with People and Machines
Bigger than Any One: Solving Large Scale Data Problems with People and MachinesBigger than Any One: Solving Large Scale Data Problems with People and Machines
Bigger than Any One: Solving Large Scale Data Problems with People and Machines
 
Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...
 
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
 
Mathews blockchain presentation
Mathews blockchain presentationMathews blockchain presentation
Mathews blockchain presentation
 
Smart City Cryptopolis
Smart City CryptopolisSmart City Cryptopolis
Smart City Cryptopolis
 
Algocracy and the state of AI in public administrations.
Algocracy and the state of AI in public administrations.Algocracy and the state of AI in public administrations.
Algocracy and the state of AI in public administrations.
 
Injustice_Harm_Digital_Infrastructures.pptx
Injustice_Harm_Digital_Infrastructures.pptxInjustice_Harm_Digital_Infrastructures.pptx
Injustice_Harm_Digital_Infrastructures.pptx
 
Artificial Intelligence and implications for research outputs
Artificial Intelligence and implications for research outputsArtificial Intelligence and implications for research outputs
Artificial Intelligence and implications for research outputs
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MIT
 
THE GREAT HACK.docx
THE GREAT HACK.docxTHE GREAT HACK.docx
THE GREAT HACK.docx
 
Data Science Innovations : Democratisation of Data and Data Science
Data Science Innovations : Democratisation of Data and Data Science  Data Science Innovations : Democratisation of Data and Data Science
Data Science Innovations : Democratisation of Data and Data Science
 
Blockchain insider | Chapter 3 : Smart Money
Blockchain insider | Chapter 3 : Smart MoneyBlockchain insider | Chapter 3 : Smart Money
Blockchain insider | Chapter 3 : Smart Money
 
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
 
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...
 
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...
 
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Center...
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Center...Big Data Applications & Analytics Motivation: Big Data and the Cloud; Center...
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Center...
 
Data mining and homeland security rl31798
Data mining and homeland security rl31798Data mining and homeland security rl31798
Data mining and homeland security rl31798
 
International Journal of Communication 6 (2012), 2870–2893 193
International Journal of Communication 6 (2012), 2870–2893 193International Journal of Communication 6 (2012), 2870–2893 193
International Journal of Communication 6 (2012), 2870–2893 193
 

More from Kate Carruthers

Data Governance - a work in progress
Data Governance - a work in progressData Governance - a work in progress
Data Governance - a work in progress
Kate Carruthers
 
Future proof your career
Future proof your career  Future proof your career
Future proof your career
Kate Carruthers
 
Implementing Data Governance & ISMS in a University
Implementing Data Governance & ISMS in a UniversityImplementing Data Governance & ISMS in a University
Implementing Data Governance & ISMS in a University
Kate Carruthers
 
Taking disruption for granted
Taking disruption for grantedTaking disruption for granted
Taking disruption for granted
Kate Carruthers
 
The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...
Kate Carruthers
 
Building the sharing economy
Building the sharing economy Building the sharing economy
Building the sharing economy
Kate Carruthers
 
Hardware is Hard - Products are Hard Melbourne 2013
Hardware is Hard - Products are Hard Melbourne 2013Hardware is Hard - Products are Hard Melbourne 2013
Hardware is Hard - Products are Hard Melbourne 2013
Kate Carruthers
 
Social and technology trends for banking
Social and technology trends for bankingSocial and technology trends for banking
Social and technology trends for banking
Kate Carruthers
 
Internet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsInternet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business Models
Kate Carruthers
 
Crowdfunding
CrowdfundingCrowdfunding
Crowdfunding
Kate Carruthers
 
Your blog your brand - tips on getting started with your blog
Your blog your brand - tips on getting started with your blogYour blog your brand - tips on getting started with your blog
Your blog your brand - tips on getting started with your blog
Kate Carruthers
 
Social media for social good 2012
Social media for social good 2012Social media for social good 2012
Social media for social good 2012
Kate Carruthers
 
Whats the big idea with social media media140-2012
Whats the big idea with social media media140-2012Whats the big idea with social media media140-2012
Whats the big idea with social media media140-2012
Kate Carruthers
 
Failing in the right direction
Failing in the right directionFailing in the right direction
Failing in the right direction
Kate Carruthers
 
The Power of Social Business
The Power of Social BusinessThe Power of Social Business
The Power of Social BusinessKate Carruthers
 
Gathering11 - envisioning change
Gathering11 - envisioning changeGathering11 - envisioning change
Gathering11 - envisioning change
Kate Carruthers
 
Social innovation Sydney Case Study
Social innovation Sydney Case StudySocial innovation Sydney Case Study
Social innovation Sydney Case StudyKate Carruthers
 
Beta space | introduction websites
Beta space | introduction websitesBeta space | introduction websites
Beta space | introduction websites
Kate Carruthers
 
Leadership and the Digital Revolution
Leadership and the Digital RevolutionLeadership and the Digital Revolution
Leadership and the Digital Revolution
Kate Carruthers
 
#C3t The Command & Control of Twitter
#C3t The Command & Control of Twitter#C3t The Command & Control of Twitter
#C3t The Command & Control of Twitter
Kate Carruthers
 

More from Kate Carruthers (20)

Data Governance - a work in progress
Data Governance - a work in progressData Governance - a work in progress
Data Governance - a work in progress
 
Future proof your career
Future proof your career  Future proof your career
Future proof your career
 
Implementing Data Governance & ISMS in a University
Implementing Data Governance & ISMS in a UniversityImplementing Data Governance & ISMS in a University
Implementing Data Governance & ISMS in a University
 
Taking disruption for granted
Taking disruption for grantedTaking disruption for granted
Taking disruption for granted
 
The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...
 
Building the sharing economy
Building the sharing economy Building the sharing economy
Building the sharing economy
 
Hardware is Hard - Products are Hard Melbourne 2013
Hardware is Hard - Products are Hard Melbourne 2013Hardware is Hard - Products are Hard Melbourne 2013
Hardware is Hard - Products are Hard Melbourne 2013
 
Social and technology trends for banking
Social and technology trends for bankingSocial and technology trends for banking
Social and technology trends for banking
 
Internet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsInternet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business Models
 
Crowdfunding
CrowdfundingCrowdfunding
Crowdfunding
 
Your blog your brand - tips on getting started with your blog
Your blog your brand - tips on getting started with your blogYour blog your brand - tips on getting started with your blog
Your blog your brand - tips on getting started with your blog
 
Social media for social good 2012
Social media for social good 2012Social media for social good 2012
Social media for social good 2012
 
Whats the big idea with social media media140-2012
Whats the big idea with social media media140-2012Whats the big idea with social media media140-2012
Whats the big idea with social media media140-2012
 
Failing in the right direction
Failing in the right directionFailing in the right direction
Failing in the right direction
 
The Power of Social Business
The Power of Social BusinessThe Power of Social Business
The Power of Social Business
 
Gathering11 - envisioning change
Gathering11 - envisioning changeGathering11 - envisioning change
Gathering11 - envisioning change
 
Social innovation Sydney Case Study
Social innovation Sydney Case StudySocial innovation Sydney Case Study
Social innovation Sydney Case Study
 
Beta space | introduction websites
Beta space | introduction websitesBeta space | introduction websites
Beta space | introduction websites
 
Leadership and the Digital Revolution
Leadership and the Digital RevolutionLeadership and the Digital Revolution
Leadership and the Digital Revolution
 
#C3t The Command & Control of Twitter
#C3t The Command & Control of Twitter#C3t The Command & Control of Twitter
#C3t The Command & Control of Twitter
 

Recently uploaded

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Info Sec, AI, and Ethics

  • 1. Info Sec, AI, and Ethics Kate Carruthers Version 1.0 Nov 2018 Classification: PUBLIC Nov 2018
  • 2. Slides are up on SlideShare: https://www.slideshare.net/carruthk
  • 3. Agenda 1. The world is changing 2. Unforeseen consequences 3. Why ethics & diversity are important 4. What can be done?
  • 4. How I got here… Privacy Cyber Security Ethics Data Governance Nov 2018 Kate Carruthers | UNSW 4 Corporate IT
  • 5. The world is changing Kate Carruthers | UNSW Nov 2018 7
  • 6. Nov 2018 6 By Robin611 [CC BY-SA 3.0 (https://creativecommons.org/licenses/by- sa/3.0)], from Wikimedia Commons, 30 March 2009 Remember Web 2.0?
  • 7. Nov 2018 Kate Carruthers | UNSW 7 Source: https://www.economist.com/news/leaders/21721656-data-economy-demands-new-approach-antitrust-rules-worlds-most-valuable-resource The world’s most valuable resource is no longer oil, but data
  • 8. Nov 2018 Kate Carruthers | UNSW 8 Because software is eating the world…Marc Andreessen, Why Software Is Eating The World, 20 August 2011, Wall Street Journal, https://www.wsj.com/articles/SB10001424053111903480904576512250915629460 By Kathy Simon [CC BY-SA 2.0 (https://creativecommons.org/licenses/by-sa/2.0)], via Wikimedia Commons
  • 9. Nov 2018 Kate Carruthers | UNSW 9 And hardware is helping
  • 10. The old world Nov 2018 Kate Carruthers | UNSW 10 Source: http://toolsqa.com/client-server/client-server-architecture-and-http-protocol/
  • 11. Nov 2018 Kate Carruthers | UNSW 11 Source: https://read.acloud.guru/our-serverless-journey-part-2-908d76d03716
  • 13. Australians know all about unintended consequences This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY-SA This Photo by Unknown Author is licensed under CC BY-ND Nov 2018 Kate Carruthers | UNSW 13
  • 14. Weaponization of social media The internet is changing war and politics War and politics are changing the internet Terrorists livestream their attacks “Twitter wars” produce real-world casualties Viral misinformation alters not just the result of battles, but the very fate of nations The result is that war, tech, and politics have blurred into a new kind of battlespace that plays out on our smartphones Nov 2018 Kate Carruthers | UNSW 14 Singer, Peter Warren, and Brooking, Emerson T.. Likewar: the Weaponization of Social Media. Eamon Dolan/Houghton Mifflin Harcourt, 2018.
  • 15. Nov 2018 Kate Carruthers | UNSW 15 Nissen, Thomas Elkjer. The Weaponization Of Social Media: Characteristics of Contemporary Conflicts. Royal Danish Defence College, 2015. https://www.stratcomcoe.org/thomas-nissen-weaponization-social-media
  • 16. Nov 2018 Kate Carruthers | UNSW 16 "This [Stuxnet] has the whiff of August 1945…" "Someone, probably a nation- state, just used a cyber weapon in a time of peace…to destroy what another nation could only describe as their critical infrastructure.” "That's a big deal. That's never happened before” Gen. Michael Hayden, former NSA & CIA Director Paul D. Shinkman, Former CIA Director: Cyber Attack Game-Changers Comparable to Hiroshima, US News, 20 Feb 2013, https://www.usnews.com/news/articles/2013/02/20/former-cia-director-cyber-attack-game-changers-comparable-to- hiroshima By Llorenzi [CC BY-SA 3.0 (https://creativecommons.org/licenses/by-sa/3.0)], from Wikimedia Commons, 16 Nov 2012
  • 17. Nov 2018 Kate Carruthers | UNSW 17 “So much of the fabric of our [US] society rests upon the bedrock of our IT. We continue to digitize things; we store our wealth and treasure there; we run operations; we keep our secrets all in that cyber domain.”Sanger, David E.. The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Crown Publishers., 2018.
  • 18. Nov 2018 Kate Carruthers | UNSW 18 Cyber is the new battlefield & everything is cyber now
  • 19. Nov 2018 Kate Carruthers | UNSW 19 https://www.huntsmansecurity.com/solutions/cyber-security-compliance/asd-essential-eight/ Even the essential 8 will not protect us
  • 20. Boundary is no longer at your organisation's firewalls - Identity is the boundary Old world New world Nov 2018 Kate Carruthers | UNSW 20 By Harald Mühlböck [GFDL (http://www.gnu.org/copyleft/fdl.html) or CC-BY-SA-3.0 (http://creativecommons.org/licenses/by- sa/3.0/)], via Wikimedia Commons By Audun Jøsang [CC BY 3.0 (https://creativecommons.org/licenses/by/3.0)], via Wikimedia Commons
  • 21. Combine weaponized connectivity with capitalism Nov 2018 Kate Carruthers | UNSW 21 Source: https://sheepoverboard.com/trojans-cusp/ Source: https://twitter.com/jpwarren/status/1055548155410804736?s=11
  • 22. Why Netflix Should Scare You More Than It Does, Huffpost, 11 Oct 2018, Todd Van Luling, https://www.huffingtonpost.com.au/entry/netflix-scared-bad_us_5bbcd832e4b01470d055d4b3 Nov 2018 Kate Carruthers | UNSW 22 “Netflix pushes content based on whether the company’s algorithm thinks it will make us click and not necessarily whether that content will be good or bad for us.”
  • 23. May 2018 Kate Carruthers | UNSW 23 “Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach” https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election
  • 24. Why ethics and diversity are important Kate Carruthers | UNSW Nov 2018 2
  • 25. May 2018 Kate Carruthers | UNSW 25 Moral principles that govern a person's behaviour or the way in which they conduct an activity… “We ask ethical questions whenever we think about how we should act. Being ethical is a part of what defines us as human beings.” The Ethics Centre, Sydney
  • 26. Ethics of: •Data - how we generate, record & share data •Algorithms - how we interpret data via artificial intelligence, machine learning and robots •Practices - devising responsible innovation and professional codes to guide this emerging science Nov 2018 Kate Carruthers | UNSW 26 Luciano Floridi, Mariarosaria Taddeo, What is data ethics? Phil. Trans. R. Soc. A 2016 374 20160360; DOI: 10.1098/rsta.2016.0360. Published 14 November 2016
  • 27. Nov 2018 Kate Carruthers | UNSW 27 “Some of the key findings are intuitive: participants prefer to save people over animals, the young over the old, and more rather than fewer. Other preferences are more troubling: women over men, executives over the homeless, the fit over the obese.” Seth Lazar, Colin Klein, Why we need more than just data to create ethical driverless cars, The Conversation, 25 October 2018, https://theconversation.com/why-we-need-more-than-just-data-to-create-ethical-driverless-cars-105650
  • 28. “Amazon scraps secret AI recruiting tool that showed bias against women” Amazon scraps secret AI recruiting tool that showed bias against women, Jeffrey Dastin, 10 Oct 2018, Reuters https://www.reuters.com/article/us-amazon-com-jobs-automation-insight/amazon-scraps-secret-ai- recruiting-tool-that-showed-bias-against-women-idUSKCN1MK08G
  • 29. Nov 2018 Kate Carruthers | UNSW 29 Lavanchy, Maude. Amazon’s sexist hiring algorithm could still be better than a human, November 1, 2018, The Conversation. https://theconversation.com/amazons-sexist-hiring-algorithm-could-still-be-better-than-a-human-105270
  • 30. Algorithmic bias isn’t just sexist or racist “An algorithm which simply optimizes cost- effectiveness in ad delivery will deliver ads that were intended to be gender-neutral in an apparently discriminatory way, due to crowding out." Nov 2018 Kate Carruthers | UNSW 30 Lambrecht, A and Tucker, C E (2018) Algorithmic bias? An empirical study into apparent gender-based discrimination in the display of STEM career ads. Management Science. ISSN 0025-1909 (In Press)
  • 31. Nov 2018 Kate Carruthers | UNSW 31 Min Qi Wang, Alice F. Yan, Ralph V. Katz, Researcher Requests for Inappropriate Analysis and Reporting: A U.S. Survey of Consulting Biostatisticians, Annals of Internal Medicine, October 2018, DOI 10.7326/m18-1230 1 in 4 statisticians say they were asked to commit scientific fraud
  • 32. Nov 2018 Kate Carruthers | UNSW 32 McCarthy , Kieren. VW engineer sent to the clink for three years for emissions-busting code: James Liang gets 40 months on the cooler and $200,000 fine, The Register, 25 Aug 2017, https://www.theregister.co.uk/2017/08/25/vw_engineer_gets_3yrs_for_emissionbusting_sw/ Real world consequences
  • 33. Nov 2018 Kate Carruthers | UNSW 33 • For years we have assumed that programming is a neutral act • We also assumed that the default human being was a white male • We also assumed that software would not have real world impacts
  • 34. Nov 2018 Kate Carruthers | UNSW 34 1.Technology has no ethics. People demonstrate ethics. 2.Technology inherits the biases of its makers. 3.Therefore we need diversity and formal mechanisms to reduce bias.
  • 35. Nov 2018 Kate Carruthers | UNSW 35 Inclusion is the process that begets diversity Build inclusive practices and diversity will come
  • 36. What can be done? Kate Carruthers | UNSW Nov 2018 7
  • 37. Things we can do •New approaches to: •Design & development of hardware & software •Managing the emerging info sec threat landscape •Regulation of data security and privacy •New practices for designers, developers, and business people Nov 2018 Kate Carruthers | UNSW 37
  • 38. Traditional approaches Privacy by design Security by design Codes of ethics Guidelines Nov 2018 Kate Carruthers | UNSW 38
  • 39. Privacy by Design 1. Proactive not Reactive; Preventative not Remedial 2. Privacy as the Default Setting 3. Privacy Embedded into Design 4. Full Functionality – Positive-Sum, not Zero-Sum 5. End-to-End Security – Full Lifecycle Protection 6. Visibility and Transparency – Keep it Open 7. Respect for User Privacy – Keep it User-Centric May 2018 Kate Carruthers | UNSW 39 Source: https://www.ipc.on.ca/wp-content/uploads/Resources/7foundationalprinciples.pdf
  • 40. OWASP Security by Design Principles 1.Minimize attack surface area 2.Establish secure defaults 3.Principle of Least privilege 4.Principle of Defence in depth 5.Fail securely 6.Don’t trust services 7.Ensure Separation of duties 8.Always avoid security by obscurity 9.Keep security simple 10.Fix security issues correctly May 2018 Kate Carruthers | UNSW 40 Open Web Application Security Project https://www.owasp.org/index.php/Security_by_Design_Principles
  • 41. May 2018 Kate Carruthers | UNSW 41 “Public agencies urgently need a practical framework to assess automated decision systems and to ensure public accountability.” Source: Algorithmic Impact Assessments: A Practical Framework For Public Agency Accountability, Dillon Reisman, Jason Schultz, Kate Crawford, Meredith Whittaker, April 2018, https://ainowinstitute.org/aiareport2018.pdf
  • 42. May 2018 Kate Carruthers | UNSW 42 Source: Algorithmic Impact Assessments: A Practical Framework For Public Agency Accountability, Dillon Reisman, Jason Schultz, Kate Crawford, Meredith Whittaker, April 2018, https://ainowinstitute.org/aiareport2018.pdf
  • 43. House of Lords Artificial Intelligence Committee 2017 The Lords’ report proposes five main principles for an AI code: 1. Artificial intelligence should be developed for the common good and benefit of humanity 2. Artificial intelligence should operate on principles of intelligibility and fairness 3. Artificial intelligence should not be used to diminish the data rights or privacy of individuals, families or communities 4. All citizens have the right to be educated to enable them to flourish mentally, emotionally and economically alongside artificial intelligence 5. The autonomous power to hurt, destroy or deceive human beings should never be vested in artificial intelligence Nov 2018 Kate Carruthers | UNSW 43 Source: Report of Session 2017-19 - published 16 April 2017 - HL Paper 100 https://publications.parliament.uk/pa/ld201719/ldselect/ldai/100/10002.htm
  • 44. Nov 2018 Kate Carruthers | UNSW 44 “Governor Jerry Brown recently signed S.B. 1001, a new law requiring all “bots” used for purposes of influencing a commercial transaction or a vote in an election to be labeled. ” Victory! Dangerous elements removed from California's bot-labeling bill, Jamie Williams & Jeremy Gillula, 5 October 2018 https://www.eff.org/deeplinks/2018/10/victory-dangerous-elements-removed-californias-bot-labeling-bill © 2016 Maximus Renegade .... Licensed under CC-BY.
  • 45. Nov 2018 Kate Carruthers | UNSW 45 Secure by Design The [UK] Government's Code of Practice for Consumer Internet of Things (IoT) Security for manufacturers, with guidance for consumers on smart devices at home. Secure by Design, 7 March 2018, UK Department for Digital, Culture, Media & Sport. https://www.gov.uk/government/publications/secure-by-design
  • 46. UK government guidance 1. No default passwords 2. Implement a vulnerability disclosure policy 3. Keep software updated 4. Securely store credentials and security-sensitive data 5. Communicate securely 6. Minimise exposed attack surfaces 7. Ensure software integrity 8. Ensure that personal data is protected 9. Make systems resilient to outages 10. Monitor system telemetry data 11. Make it easy for consumers to delete personal data 12. Make installation and maintenance of devices easy 13. Validate input data Nov 2018 Kate Carruthers | UNSW 46 https://www.gov.uk/government/publications/secure-by-design/code-of-practice-for-consumer-iot-security
  • 47. Nov 2018 Kate Carruthers | UNSW 47 https://www.ethicscanvas.org/
  • 48. Recap • Data is the new oil • Software is eating the world • Hardware is helping it do so • Weaponization of social media shows us power of unintended consequences • Cyber is now everyone’s problem • We need to build in ethics & build diversity in teams Contact me: k.carruthers@unsw.edu.au SlideShare: https://www.slideshare.net/carruthk Nov 2018 Kate Carruthers | UNSW 48
  • 49. Some resources • Luciano Floridi, Mariarosaria Taddeo. What is data ethics? Phil. Trans. R. Soc. A 2016 374 20160360; DOI: 10.1098/rsta.2016.0360. Published 14 November 2016 • Digital Enlightenment Forum: Digital Ethics. Workshop Report. (2016, March 1). Retrieved August 16, 2017, from https://digitalenlightenment.org/sites/default/files/users/14/Digital%20Ethics%20Workshop%20Report% 20v2.pdf • Maggiolini, Piercarlo. A deep study on the concept of digital ethics. (2014). Revista de Administração de Empresas, 54(5), 585-591. https://dx.doi.org/10.1590/S0034-759020140511 • Lambrecht, A and Tucker, C E (2018) Algorithmic bias? An empirical study into apparent gender-based discrimination in the display of STEM career ads. Management Science. ISSN 0025-1909 (In Press) • Lavanchy, Maude. Amazon’s sexist hiring algorithm could still be better than a human,. November 1, 2018, The Conversation https://theconversation.com/amazons-sexist-hiring-algorithm-could-still-be- better-than-a-human-105270 • Reisman, Dillon, Schultz, Jason, Crawford, Kate, Whittaker, Meredith. Algorithmic Impact Assessments: A Practical Framework For Public Agency Accountability, April 2018, https://ainowinstitute.org/aiareport2018.pdf • McCarthy , Kieren. VW engineer sent to the clink for three years for emissions-busting code: James Liang gets 40 months on the cooler and $200,000 fine, The Register, 25 Aug 2017, https://www.theregister.co.uk/2017/08/25/vw_engineer_gets_3yrs_for_emissionbusting_sw/ • Singer, Peter Warren, and Brooking, Emerson T.. Likewar: the Weaponization of Social Media. Eamon Dolan/Houghton Mifflin Harcourt, 2018. • Sanger, David E.. The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Crown Publishers., 2018. Kate Carruthers | UNSW May 2018 8
  • 50. Some resources • AI Now Institute at New York University • Causeit Data Ethics • The BIG Data Ethics Cheat Sheet, Hackermoon • Guidelines on Ethical Research • IEEE AI and Ethics in Design course http://innovationatwork.ieee.org/new-course-program-now-available- ai-and-ethics-in-design/ • Tufts University course Ethics of AI, Robotics and Human-Robot Interaction • Digital Ethics Lab - Oxford Internet Institute - University of Oxford • Georgetown University, Kennedy Institute of Ethics, Ethics Lab • British Sociological Association Kate Carruthers | UNSW May 2018 50