SlideShare a Scribd company logo
DIGITAL ANALYTICS
MATURITY
Governance,
Culture &
Adoption
Objectives &
Scope
Team & Expertise
Continuous
Improvement
Process &
Methodology
Tools, Data &
Technology
j.mp/DAMSAT
Analysts Are
Change
Agents
Uncover the
Unknown
Unknowns
Embrace Agile
or Die
Never Ask,
Always
Propose
Radical Analytics
DMAIC Is
Your BFF
Don’t Seek
Executive
Buy-In
Digital
Analytics is
Dead
Eat Your Own
Dog Food
bit.ly/radicalanalytic
There’s an imminent
and ever-present
peril faced by those
in positions of power.
Data is the
new oil
•Unscrupulous digging
•Waste disposal
•Traceability
•Bi-products
•Oligarchy
What’s your
breaking point?
Hackers infiltrated California family’s
Nest surveillance camera, sent
warning of incoming
North Korea missile attack
“Not our fault,
the driver was
too stupid to stay
on the road.”
Car
hacking
A basic Z-Wave hack exposes
up to 100M smart home
devices
There’s a consistent
pattern. When systems
become connected, they
get hacked.
Your apps know where you
were last night, and they’re
not keeping it secret
“I have nothing to hide”
“The info is already
public anyway”
“Any technology can be
used for good or evil”
“Everybody does it”
Every organization will
be breached
eventually.
First data leak of 2019: 772M
email addresses found in
public cache
DNA from
genealogy site
used to catch
suspected
Golden State
Killer
Facebook's '10
year challenge'
is just a
harmless
meme—right?
Today, hacks are
annoying. In the
future, they could kill.
Such powerful tools
also bring with them
new questions and
responsibilities.
Sergey Brin, Apr. 2018
AI is a fundamental
existential risk for
human civilization and
I don’t think people
fully appreciate that.
Elon Musk, Jul. 2017
I want to call attention
to the mortal danger
facing open societies
from the instruments
of control that machine
learning and artificial
intelligence can put in
the hands of repressive
regimes.
George Soros, World Economic
Forum, Jan. 2019
Cyber war as begun.
Florence Parly, France Defense
Secretary, Jan. 2019
Technology could result
in a new world war.
As a technical company,
don't be evil is not
enough.
Jack Ma, World Economic
Forum, Jan. 2019
China’s social
rating
video
Google Duplex
Turing Test
Voice Synthesis
►
https://youtu.be/cQ54GDm1eL0
"Everything is Fake”
Ex-Reddit CEO
1. Well being
2. Respect for autonomy
3. Protection of privacy and intimacy
4. Solidarity
5. Democratic participation
6. Equity
7. Diversity inclusion
8. Prudence
9. Responsibility
10. Sustainable development
Stéphane Hamel
Data is the raw material of my craft.
Supplemental material
Artificial Ignorance
• Virtual cannibalism
• Racist and sexist monster
• Destroying the competition
• Facebook chatbots shut down after developing their own language
• Face ID beat by a mask
• Alexa partying while owner was out
• Google Home Minis spied on their owners
• Facebook allowed ads to be targeted to "Jew Haters”
Rorschach
Test
“man is shot dead in
front of his screaming
wife.”
“a person is holding an
umbrella in the air.”
“man killed by speeding
driver.”
“a close up of a
wedding cake on a
table.”

More Related Content

Similar to Superweek 2019 - Hamel Hell

Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
centralohioissa
 
Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?Mathias Klang
 
Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible? Mathias Klang
 
Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma Mathias Klang
 
A Paranoid Peek at Social Media
A Paranoid Peek at Social MediaA Paranoid Peek at Social Media
A Paranoid Peek at Social MediaMathias Klang
 
Algocracy and the state of AI in public administrations.
Algocracy and the state of AI in public administrations.Algocracy and the state of AI in public administrations.
Algocracy and the state of AI in public administrations.
Sandra Bermúdez
 
Will technology set us free
Will technology set us freeWill technology set us free
Will technology set us freeMathias Klang
 
Chapter four AI and modern world part two.pptx
Chapter four AI and modern world part two.pptxChapter four AI and modern world part two.pptx
Chapter four AI and modern world part two.pptx
bestboybulshaawi
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...
CSIRO National AI Centre
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
Ayodeji Rotibi
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO Compliance
PECB
 
Living in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptxLiving in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptx
Froilan Cantillo
 
AI and its Effects on the Global World Order
AI and its Effects on the Global World OrderAI and its Effects on the Global World Order
AI and its Effects on the Global World Order
The Future Society
 
Goals, Risks and Countermeasures in the Artificial Intelligence Era
Goals, Risks and Countermeasures in the Artificial Intelligence EraGoals, Risks and Countermeasures in the Artificial Intelligence Era
Goals, Risks and Countermeasures in the Artificial Intelligence Era
Gabriele Graffieti
 
Have we poisoned the internet for good?
Have we poisoned the internet for good?Have we poisoned the internet for good?
Have we poisoned the internet for good?
Yoav Aviram
 
Merit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your SystemsMerit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your Systems
meritnorthwest
 
Panama Papers, or How To Coordinate a Secret in the Digital Age
Panama Papers, or How To Coordinate a Secret in the Digital AgePanama Papers, or How To Coordinate a Secret in the Digital Age
Panama Papers, or How To Coordinate a Secret in the Digital Age
Online News Association
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
Mext Metaverse
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
Kenneth Carnesi, JD
 

Similar to Superweek 2019 - Hamel Hell (20)

Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
 
Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?
 
Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?
 
Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma
 
A Paranoid Peek at Social Media
A Paranoid Peek at Social MediaA Paranoid Peek at Social Media
A Paranoid Peek at Social Media
 
Algocracy and the state of AI in public administrations.
Algocracy and the state of AI in public administrations.Algocracy and the state of AI in public administrations.
Algocracy and the state of AI in public administrations.
 
Will technology set us free
Will technology set us freeWill technology set us free
Will technology set us free
 
Chapter four AI and modern world part two.pptx
Chapter four AI and modern world part two.pptxChapter four AI and modern world part two.pptx
Chapter four AI and modern world part two.pptx
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO Compliance
 
Chapter2
Chapter2Chapter2
Chapter2
 
Living in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptxLiving in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptx
 
AI and its Effects on the Global World Order
AI and its Effects on the Global World OrderAI and its Effects on the Global World Order
AI and its Effects on the Global World Order
 
Goals, Risks and Countermeasures in the Artificial Intelligence Era
Goals, Risks and Countermeasures in the Artificial Intelligence EraGoals, Risks and Countermeasures in the Artificial Intelligence Era
Goals, Risks and Countermeasures in the Artificial Intelligence Era
 
Have we poisoned the internet for good?
Have we poisoned the internet for good?Have we poisoned the internet for good?
Have we poisoned the internet for good?
 
Merit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your SystemsMerit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your Systems
 
Panama Papers, or How To Coordinate a Secret in the Digital Age
Panama Papers, or How To Coordinate a Secret in the Digital AgePanama Papers, or How To Coordinate a Secret in the Digital Age
Panama Papers, or How To Coordinate a Secret in the Digital Age
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
 

More from Stéphane Hamel

The future of marketing - MBA Games 2021
The future of marketing - MBA Games 2021The future of marketing - MBA Games 2021
The future of marketing - MBA Games 2021
Stéphane Hamel
 
The Elasticity of Analytics Ethics - WaW Copenhagen, August 2020
The Elasticity of Analytics Ethics - WaW Copenhagen, August 2020The Elasticity of Analytics Ethics - WaW Copenhagen, August 2020
The Elasticity of Analytics Ethics - WaW Copenhagen, August 2020
Stéphane Hamel
 
The Doomsday Upon Us, Marketing Festival, Prague, March 2019
The Doomsday Upon Us, Marketing Festival, Prague, March 2019The Doomsday Upon Us, Marketing Festival, Prague, March 2019
The Doomsday Upon Us, Marketing Festival, Prague, March 2019
Stéphane Hamel
 
The elasticity of marketing & analytics ethics
The elasticity of marketing & analytics ethicsThe elasticity of marketing & analytics ethics
The elasticity of marketing & analytics ethics
Stéphane Hamel
 
Big Data - Chambre de Commerce de Québec
Big Data - Chambre de Commerce de QuébecBig Data - Chambre de Commerce de Québec
Big Data - Chambre de Commerce de Québec
Stéphane Hamel
 
Radical Analytics, Web à Québec, Mars 2017 (français)
Radical Analytics, Web à Québec, Mars 2017 (français)Radical Analytics, Web à Québec, Mars 2017 (français)
Radical Analytics, Web à Québec, Mars 2017 (français)
Stéphane Hamel
 
Radical Analytics, Superweek Hungary, January 2017
Radical Analytics, Superweek Hungary, January 2017Radical Analytics, Superweek Hungary, January 2017
Radical Analytics, Superweek Hungary, January 2017
Stéphane Hamel
 
Radical Analytics - SimpliLearn Webinar
Radical Analytics - SimpliLearn WebinarRadical Analytics - SimpliLearn Webinar
Radical Analytics - SimpliLearn Webinar
Stéphane Hamel
 
Naitre et Grandir - Enhanced eCommerce for Media
Naitre et Grandir - Enhanced eCommerce for MediaNaitre et Grandir - Enhanced eCommerce for Media
Naitre et Grandir - Enhanced eCommerce for Media
Stéphane Hamel
 
A contrarian view of Tag Management Systems
A contrarian view of Tag Management SystemsA contrarian view of Tag Management Systems
A contrarian view of Tag Management Systems
Stéphane Hamel
 
Measuring your Organization's Digital Analytics Maturity
Measuring your Organization's Digital Analytics MaturityMeasuring your Organization's Digital Analytics Maturity
Measuring your Organization's Digital Analytics Maturity
Stéphane Hamel
 
Big Data: What it means for the future of the digital analyst
Big Data: What it means for the future of the digital analystBig Data: What it means for the future of the digital analyst
Big Data: What it means for the future of the digital analyst
Stéphane Hamel
 
10 years of hard learned analytics wisdom in 20 minutes
10 years of hard learned analytics wisdom in 20 minutes10 years of hard learned analytics wisdom in 20 minutes
10 years of hard learned analytics wisdom in 20 minutes
Stéphane Hamel
 
Google Users' Great Event New York 2011
Google Users' Great Event New York 2011Google Users' Great Event New York 2011
Google Users' Great Event New York 2011
Stéphane Hamel
 
Médias sociaux et analytique
Médias sociaux et analytiqueMédias sociaux et analytique
Médias sociaux et analytique
Stéphane Hamel
 
Web Analytics Maturity Model
Web Analytics Maturity ModelWeb Analytics Maturity Model
Web Analytics Maturity Model
Stéphane Hamel
 
eMetrics Industry Insight (Washington D.C., 081020)
eMetrics Industry Insight (Washington D.C., 081020)eMetrics Industry Insight (Washington D.C., 081020)
eMetrics Industry Insight (Washington D.C., 081020)
Stéphane Hamel
 
eMetrics Industry Insight
eMetrics Industry InsighteMetrics Industry Insight
eMetrics Industry Insight
Stéphane Hamel
 
Journée Infopresse: web analytics
Journée Infopresse: web analyticsJournée Infopresse: web analytics
Journée Infopresse: web analytics
Stéphane Hamel
 
Introduction à l'analytique Web
Introduction à l'analytique WebIntroduction à l'analytique Web
Introduction à l'analytique Web
Stéphane Hamel
 

More from Stéphane Hamel (20)

The future of marketing - MBA Games 2021
The future of marketing - MBA Games 2021The future of marketing - MBA Games 2021
The future of marketing - MBA Games 2021
 
The Elasticity of Analytics Ethics - WaW Copenhagen, August 2020
The Elasticity of Analytics Ethics - WaW Copenhagen, August 2020The Elasticity of Analytics Ethics - WaW Copenhagen, August 2020
The Elasticity of Analytics Ethics - WaW Copenhagen, August 2020
 
The Doomsday Upon Us, Marketing Festival, Prague, March 2019
The Doomsday Upon Us, Marketing Festival, Prague, March 2019The Doomsday Upon Us, Marketing Festival, Prague, March 2019
The Doomsday Upon Us, Marketing Festival, Prague, March 2019
 
The elasticity of marketing & analytics ethics
The elasticity of marketing & analytics ethicsThe elasticity of marketing & analytics ethics
The elasticity of marketing & analytics ethics
 
Big Data - Chambre de Commerce de Québec
Big Data - Chambre de Commerce de QuébecBig Data - Chambre de Commerce de Québec
Big Data - Chambre de Commerce de Québec
 
Radical Analytics, Web à Québec, Mars 2017 (français)
Radical Analytics, Web à Québec, Mars 2017 (français)Radical Analytics, Web à Québec, Mars 2017 (français)
Radical Analytics, Web à Québec, Mars 2017 (français)
 
Radical Analytics, Superweek Hungary, January 2017
Radical Analytics, Superweek Hungary, January 2017Radical Analytics, Superweek Hungary, January 2017
Radical Analytics, Superweek Hungary, January 2017
 
Radical Analytics - SimpliLearn Webinar
Radical Analytics - SimpliLearn WebinarRadical Analytics - SimpliLearn Webinar
Radical Analytics - SimpliLearn Webinar
 
Naitre et Grandir - Enhanced eCommerce for Media
Naitre et Grandir - Enhanced eCommerce for MediaNaitre et Grandir - Enhanced eCommerce for Media
Naitre et Grandir - Enhanced eCommerce for Media
 
A contrarian view of Tag Management Systems
A contrarian view of Tag Management SystemsA contrarian view of Tag Management Systems
A contrarian view of Tag Management Systems
 
Measuring your Organization's Digital Analytics Maturity
Measuring your Organization's Digital Analytics MaturityMeasuring your Organization's Digital Analytics Maturity
Measuring your Organization's Digital Analytics Maturity
 
Big Data: What it means for the future of the digital analyst
Big Data: What it means for the future of the digital analystBig Data: What it means for the future of the digital analyst
Big Data: What it means for the future of the digital analyst
 
10 years of hard learned analytics wisdom in 20 minutes
10 years of hard learned analytics wisdom in 20 minutes10 years of hard learned analytics wisdom in 20 minutes
10 years of hard learned analytics wisdom in 20 minutes
 
Google Users' Great Event New York 2011
Google Users' Great Event New York 2011Google Users' Great Event New York 2011
Google Users' Great Event New York 2011
 
Médias sociaux et analytique
Médias sociaux et analytiqueMédias sociaux et analytique
Médias sociaux et analytique
 
Web Analytics Maturity Model
Web Analytics Maturity ModelWeb Analytics Maturity Model
Web Analytics Maturity Model
 
eMetrics Industry Insight (Washington D.C., 081020)
eMetrics Industry Insight (Washington D.C., 081020)eMetrics Industry Insight (Washington D.C., 081020)
eMetrics Industry Insight (Washington D.C., 081020)
 
eMetrics Industry Insight
eMetrics Industry InsighteMetrics Industry Insight
eMetrics Industry Insight
 
Journée Infopresse: web analytics
Journée Infopresse: web analyticsJournée Infopresse: web analytics
Journée Infopresse: web analytics
 
Introduction à l'analytique Web
Introduction à l'analytique WebIntroduction à l'analytique Web
Introduction à l'analytique Web
 

Recently uploaded

Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 

Recently uploaded (20)

Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 

Superweek 2019 - Hamel Hell

Editor's Notes

  1. I’m so glad to be here again for our annual group therapy! Background movie: https://www.videvo.net/video/fire-background-effect/1179/ Font: https://www.fontspace.com/chequered-ink/enter-the-harbinger
  2. On my first visit I shared the Digital Analytics Maturity Model because I was tired of seeing my clients and agencies having unrealistic expectations about their capabilities.
  3. Next came the Radical Analytics Manifesto – I thought there were systemic problems in the way we’ve been doing analytics. After skipping a year, here I am to share my thoughts about the doomsday upon us. No, no, I’m not talking about #Brexit or #Trump…
  4. Let’s face it - marketers played with their toys for 10 to 15 years – they despised IT while they enjoyed accessing nice 3D pie-charts showing without a shadow of a doubt how fantastic they were. The first time they had been so excited was when the BLINK HTML tag was introduced! Source: http://www.ymex.se/stat-adv/ https://www.lexiconn.com/ecommerce/shopsite/urchin.html
  5. Web analytics followed the path of the Web Master. It was democratized. Everybody and their dog jumped on the bandwagon. Who in his right mind wouldn’t want to be data driven, right? Of course everybody was complaining because complaining is just part of the job definition. Marketers claimed loud and clear how THEY were so smart, how THEY were so brilliant and destined to spend more on technology than any CIO or CTO and eventually take the CEO seat. Big Data was fun for a while, but it was all about the technology. Machine Learning and AI is the new craze - that’s the real thing! Source: http://www.ymex.se/stat-adv/ https://www.lexiconn.com/ecommerce/shopsite/urchin.html
  6. Ladies & gentlemen, the Sword of Damocles is over our heads. And here’s why. How do YOU define marketing? The best product/service for the benefits of your customers? Really? Or maybe how to manipulate target audiences so they do what you want them to do? Source: Damocles is a figure featured in a single moral anecdote commonly referred to as "the Sword of Damocles", an allusion to the imminent and ever-present peril faced by those in positions of power. Damocles was an obsequious courtier in the court of Dionysius II of Syracuse, a 4th-century BC tyrant of Syracuse, Sicily. Wikipedia
  7. Be forewarned I will include examples of data breach and tortured data. Before we begin… I need to put on some protection. https://www.reddit.com/r/funny/comments/8arm36/diy_foil_hat/
  8. For ordinary people not living in our data bubble, Cambridge Analytica was the first, shocking demonstration of what happens when data is abused at scale. Source: https://www.businessinsider.com/data-hacks-breaches-biggest-of-2018-2018-12#7-cambridge-analytica-87-million-15 https://medium.com/analytics-vidhya/analyzing-medium-posts-to-understand-impact-of-cambridge-analytica-scandal-5841f46703d6
  9. We are all data people, we are all marketers – don’t tell me you wouldn’t have been thrilled to work for Cambridge Analytica… because you would be lying. In reality, only 270,000 Facebook users actually installed the app “this is your digital life” but because of data sharing of friends and the network effect, Cambridge eventually got access to 87M profiles and users’ preferences and interests. What got them isn’t the fact they collected all this data. It’s not even the fact they used the data. No, the real issue is people found out about it! In a way, it’s all good until they realize they don’t have control – we’re all dependent on data just like we’re still dependent on oil to fuel our cars. https://www.businessinsider.com/data-hacks-breaches-biggest-of-2018-2018-12#7-cambridge-analytica-87-million-15 https://medium.com/analytics-vidhya/analyzing-medium-posts-to-understand-impact-of-cambridge-analytica-scandal-5841f46703d6 https://www.adweek.com/digital/a-researchers-quiz-app-deceptively-harvested-data-for-political-research-facebook-alleges/
  10. In fact, “data is the new oil” is just too good an analogy! Greed often lead to unscrupulous digging on private or protected lands The half-life of data is very short and few companies truly have plans for disposal Once in the Big Data pipeline, traceability is often impossible The primary purpose of data collection is quickly forgotten in favor of analysis bi-products And at a global level, just like oil, data is controlled and processed by an oligarchy Image: https://www.carbonbrief.org/analysis-decc-budget-details-show-limited-scope-for-cuts/stock-oil-refinery-night-uk-scotland
  11. As a consumer, when will you say “that’s enough”! Let me ask you – are you using an ad blocker? As a digital marketer and analyst, what would be YOUR limit?
  12. Let’s look at a few examples. Home assistants are invading our daily lives – a goldmine largely awaiting to be dug by marketers. They are super handy, they save time and literally transform our daily routines. https://www.chicoer.com/2019/01/22/it-was-five-minutes-of-sheer-terror-hackers-infiltrate-east-bay-familys-nest-surveillance-camera-send-warning-of-incoming-north-korea-missile-attack/ https://9to5google.com/2019/01/23/nest-cam-hack-nuclear-missile-password/
  13. But when hackers take control, it’s not as fun anymore. In this case, Google argue Nest itself didn’t really get hacked – it was just a case of bad password… I told my wife a home assistant would never set foot in our house – only to realize my Sony Bravia TV has built-in Android and its assistant is enabled by default and super easy to use… https://www.chicoer.com/2019/01/22/it-was-five-minutes-of-sheer-terror-hackers-infiltrate-east-bay-familys-nest-surveillance-camera-send-warning-of-incoming-north-korea-missile-attack/ https://9to5google.com/2019/01/23/nest-cam-hack-nuclear-missile-password/
  14. Vendors attitude is the same as if car manufacturers would have sit tight and witnessed people crash without ever thinking about seatbelts and airbags and said “he drove into a post, that’s his fault”.
  15. Speaking of cars… It is estimated that 98% of new vehicles will be connected through cellular networks by 2020.  “Security bugs and vulnerabilities to hackers increase with direct relation to lines of code. A Boeing Dreamliner has 15 million lines. A contemporary premium car has 100 million. An autonomous car has more than 300 million.” Will you trust you car? https://www.automobilemag.com/news/car-hacking-we-hack-autonomous-car/
  16. Another example. Smart home devices generates tons of data and are largely unexploited by marketers. They are definitely more expensive to buy then their older “dumb” versions – but who doesn’t want to save a few bucks by remotely lowering the temperature in the living room? Who doesn’t want to have the perfect shower temperature – every single time. The perfect toasts, the perfect brew of coffee? Call me old school – but tipping a toe in the freaking cold shower makes me feel alive. I don’t want my life to be regulated to perfection by robots and machines deciding what is good for me. At the heart of most smart home devices is MQTT – the Message Queuing Telemetry Transport protocol. The security company Avast found tens of thousands of open MQTT servers. This means hackers can open doors, turn on/off cameras and mics, change the temperature, turn on or off lights – or turn the shower to extreme hot or cold while you are in - mostly because people haven’t changed the default admin password… User error again! https://www.forbes.com/sites/thomasbrewster/2018/05/24/z-wave-hack-threatens-to-expose-100-million-smart-homes/ https://www.securitysales.com/automation/smart-home/why-smart-homes-high-risk-hacked/
  17. That’s not all - at the end of the day, smart homes devices are running code – and any code can be hacked. This is what happen when a five-year-old flaw lies in software that's been shipped to more than 100 million devices from 2,400 different vendors that are supposed to make our homes smarter and more secure… https://www.forbes.com/sites/thomasbrewster/2018/05/24/z-wave-hack-threatens-to-expose-100-million-smart-homes/
  18. David Barzilai, the chairman and co-founder of three-year-old Israeli cybersecurity firm Karamba. https://www.automobilemag.com/news/car-hacking-we-hack-autonomous-car/
  19. The NY Times published a fascinating article which demonstrates how oftentimes it’s not even hacked – we just give it away! Of course, there are ways to strengthen your privacy… if you find the way! User problem again! The 235 million locations data points they captured from more than 1.2 million unique devices during a three-day period in was the playground any of us would have loved to play into. https://www.nytimes.com/interactive/2018/12/10/business/location-data-privacy-apps.html
  20. For example, at least 75 companies receive anonymous, precise location data from apps whose users enable location services to get local news, weather or other information. Those businesses claim to track up to 200 million mobile devices in the United States only. So a car pulls up near a school at 7:30am
  21. The anonymous mobile device enters the playground. Google’s Android system was found to have about 1,200 apps with such code, compared with about 200 on Apple’s iOS. A single library which offers location-gathering code is used in more than 500 apps.
  22. The device – presumably a child or a teacher, enters the school at 8am and stays there until 3pm.
  23. And more than 40 other devices come here every weekdays and can be traced back to their respective homes. Imagine the same for nuclear plants, or churches and such. So what’s the problem?
  24. Here are the most common self-justifications we hear.
  25. Let’s be blunt and stop lying to ourselves. Every organization will be breached eventually. You will be breached. You, as an individual, will be have your data breached and abused. You, as an analyst, might think you are merely a cog in the wheel – you are doing nothing wrong, but you are contributing to the Devil’s work. Source: http://krowdthink.com/
  26. Those numbers are from Breach Level Index .com – they track data breaches. You want more examples? British Airways, A criminal hack affecting bookings made on the airline's website and app. 380,000 card payments were affected. Orbitz, Hackers accessed travel bookings in the website's system and got 880,000 payment card information and personal data such as billing addresses, phone numbers, and emails. T-Mobile, An international group of hackers accessed T-Mobile servers through an API and got about 2 million encrypted passwords and personal data, including account numbers, billing information, and email addresses. myPersonality. The app mishandled it’s 4M Facebook user data by sharing information with researchers as well as companies with only limited protections in place. Saks and Lord & Taylor. A hacking group called JokerStash put up for sale more than 5 million stolen credit and debit cards. Cathay Pacific. 860,000 passport numbers. Careem. 14M names, emails, phone and trip data. Timehop. 21 millions Ticketfly. 27 millions Facebook. 29 millions “highly sensible personal data” Google+. 52.5 millions MyHeritage. 92M email addresses – and they offer DNA tests… Quora. 100M MyFitnessPal. 150M Exactis. An aggregator of business and consumer data - 340M – pretty much every U.S. citizen Marriott. 500M Aadhar. Private info on 1.1B India residents including names, government ID, and connected services such as banks. Source: https://www.businessinsider.com/data-hacks-breaches-biggest-of-2018-2018-12 https://www.cbronline.com/news/global-data-breaches-2018 https://breachlevelindex.com/ https://cybermap.kaspersky.com/
  27. We’ve just started the year and there’s already a big data breach. https://www.exchange4media.com/digital-news/772-million-email-addresses-and-21-million-passwords-exposed-in-major-data-breach-94081.html https://www.mediapost.com/publications/article/330689/the-years-first-data-leak-horror-772-million-ema.html https://www.troyhunt.com/the-773-million-record-collection-1-data-reach/
  28. Here, we have a blatant example of data repurposed for a very different objective. More than three decades after his trail went cold, one of California's most prolific serial killers and rapists was caught by using online genealogical sites to find a DNA match. They didn’t say which genealogy site was used… but we can make a wild guess. They didn’t say either how they got to “patient zero”. But the Ancestry website is pretty clear about its disclosure to law enforcements. Ancestry Guide for Law Enforcement Contents of communications and any data relating to the DNA of an Ancestry user will be released only pursuant to a valid search warrant from a government agency with proper jurisdiction. United States law (the Genetic Information Nondiscrimination Act or “GINA”) generally makes it illegal for health insurance companies, group health plans, and most employers to discriminate against you based on your genetic information. Imagine the numerous ways in which this data could be abused! https://www.cbc.ca/news/world/dna-from-genealogy-site-used-to-catch-suspected-golden-state-killer-1.4637726 http://catlab.psy.vanderbilt.edu/palmeri/genealogy/tag/dna/ https://www.ancestry.ca/cs/legal/lawenforcement
  29. Some things might sound like conspiracy theories. Like this hypothesis the #10yearschallenge would be a way to train facial recognition algorithm. Some would argue they don’t even need this – and of course, Facebook denied initiating this meme. But hey! It wouldn’t be the first time Facebook does some social engineering would it be? A Wired article makes the point that thousands of people are voluntarily sharing two pictures, exactly 10 years apart, confirm their authenticity, and often provide additional context – in fact, just like Greg talked for Google Images indexing. Bogus pictures can easily be discarded with the existing level of image recognition. This more intelligent algorithm could be used to, say, age the picture of a child who has been abducted, or use it in ad displays that incorporate cameras or sensors and can adapt their message for age-group demographics and other visually recognizable characteristics and context. In fact, in China, vending machines can detect gender, age, weight, and even if your skin is dehydrated – all for the “good” purpose of offering you the best product. But what if insurance companies could detect you are aging faster than your cohort. Or as was the case in Orlando when police started using facial recognition from Amazon to track people who are suspected of having committed a crime, but soon realized they were at the same time tracking everyone – such as in “anyone protesting or whom they deemed an annoyance”… The thing is - you know what? It doesn’t matter if it’s a conspiracy theory – if it’s fake news – because it’s plausible and all the technology is available to do it today. https://www.wired.com/story/facebook-10-year-meme-challenge/
  30. And some of the most influential people are raising a flag… https://www.digitaltrends.com/cool-tech/smart-city-security-breaches-could-be-lethal/
  31. Am I worried? You bet I am – and I’m not alone – and you should be too. https://www.wired.com/story/mortal-danger-chinas-push-into-ai/ https://www.wired.com/story/elon-forget-killer-robots-focus-on-the-real-ai-problems/ https://www.macobserver.com/news/french-defence-secretary-cyber-war-has-begun/ https://www.freshplaza.com/article/9065522/alibaba-s-jack-ma-technology-could-result-in-a-new-world-war/
  32. The last statement from Jack Ma is particularly interesting considering Alibaba’s involvement in the social credit system in China.
  33. This isn’t a Black Mirror episode! China’s social rating has begun, and it’s an inspiring idea for other questionable country leaders, like Venezuela for example. In a year from now, every footstep, keystroke, like, dislike, social media contact, and posting will potentially affect social ratings. Personal “creditworthiness” or “trustworthiness” points will be used to reward and punish individuals and companies by granting or denying them access to public services like health care, travel, and employment. High-scoring individuals will find themselves in a “green channel,” where they can more easily access social opportunities, while those who take actions that are disapproved by the state will be “unable to move a step.” Creepy? Yet, for having spoken with some people in China, they see benefits in this system – it will make better citizens - or they didn’t tell the truth because they knew they were being monitored! So, I’m asking again: where’s the limit on data collection and doing things for the ”benefits” of consumers and citizens? Where is YOUR limit? Here’s a couple more interesting examples. https://www.wired.com/story/is-big-tech-merging-with-big-brother-kinda-looks-like-it/ https://www.wsj.com/video/in-china-using-big-data-as-big-brother/EFE6FB1C-FDC5-4EA5-B7D8-164FD41F7DD2.html https://www.wired.com/story/age-of-social-credit/
  34. At Google IO this year, Google Duplex clearly demonstrated the extent of voice recognition and synthesis. So much that some people said this passes the Turing Test – were it’s impossible to distinguish this is a non-human interaction. Of course, Google said the AI would disclose itself… yeah… right… maybe Google will, but others won’t. So this can be used for good, but also for evil. Image: https://www.engadget.com/2018/05/10/google-duplex-ai-identification/ Video: https://www.youtube.com/watch?v=D5VN56jQMWM
  35. Lyrebird is one of many who are working on realistic voice synthesis – the first sample sounds robotic, but I would challenge anyone to say the last one isn’t real. https://lyrebird.ai/custom-voice Another company, Nuance, who’s been in the voice business for a very long time, say they can use voice biometrics to authenticate people. There’s just one little problem… they got hit by hackers… twice… the first time it impacted the transcription service of their healthcare customers – bah… what could be the consequence, right? The 2nd time the hackers managed to put their hands on 45,000 customer records… but there were no indications if those records included voice signature too. Hello voice authentication! Making computers sound and respond like humans is here today. Imagine making them look like humans as well. Image: https://www.freepik.com/free-vector/colored-background-abstract-sound-wave_1112283.htm https://www.healthcareitnews.com/news/hackers-hit-nuance-again-2017-while-notpetya-cost-98-million-lost-revenue
  36. Worrying? A professor from the University of Washington who worked on this kind of deepfake said “every technology can be used in some negative way and so we all should work towards making sure it’s not going to happen”. That’s often the justification – everybody does it, it’s already there, I have nothing to hide, anything can be used for good or evil. To be honest, there are counter measures that are able to detect artificial voices and altered videos and pictures. But still… ---- Enter Artificial Intelligence (AI) and what is known as “deepfake” videos. The term “deepfake” is a synthesis of two words: deep learning and fake. Deep learning allows AI to understand things about you, like your face and body, from readily available images and video. Using a machine-learning technique called a Generative Adversarial Network (GAN), you only need to combine the source video and imagery into a targeted video to be used for the fake. Deepfakes are a recent phenomenon, emerging in 2017 as a threat initially involving the porn industry; unfortunately, Hollywood actresses like Scarlett Johansson were too easy of a target for deepfake porn videos. By the very nature of her work, there is a tremendous number of images and hundreds of hours of video with which to work. The result is a product that soon will be indistinguishable from the real thing. But this is only the beginning. This escalation has gotten the attention of our Department of Defense, specifically the Defense Advanced Research Projects Agency (DARPA). They’ve even been holding contests to create the best deepfake videos on the planet in order to test their new tools for ferreting out AI-generated photos, videos and even audio recordings. Video: https://youtu.be/cQ54GDm1eL0 https://thehill.com/opinion/technology/426536-the-age-of-deepfake-when-seeing-is-no-longer-necessarily-believing
  37. Ex-Reddit CEO came out of the closet and said it in plain text: Take something as seemingly simple as how we measure web traffic. Metrics should be the most real thing on the internet: They are countable, trackable, and verifiable, and their existence undergirds the advertising business that drives our biggest social and search platforms. Yet not even Facebook, the world’s greatest data–gathering organization, seems able to produce genuine figures. A single busted Chinese clickfarm had 10,000 phones. In another bust, 400,000 SIM cards were confiscated. Welcome to the century of fake-everything! https://www.zerohedge.com/news/2018-12-27/everything-fake-ex-reddit-ceo-confirms-internet-traffic-metrics-are-bullshit https://kotaku.com/inside-chinese-click-farms-1795287821 https://www.asiaone.com/asia/thai-police-bust-chinese-click-farm-seize-400000-sim-cards Image: http://nymag.com/intelligencer/2018/12/how-much-of-the-internet-is-fake.html
  38. Beyond the legal aspects of GDPR, beyond the human errors, and corporate greed, there needs to be a sense of dignity and ethics. Montreal as become a hub for artificial intelligence and they published the Montréal Declaration of Responsible AI – I think we should look into and embrace its principles. Well-being: The development and use of artificial-intelligence systems (AIS) must permit the growth of the well-being of all sentient beings. Respect for autonomy: AIS must be developed and used with respect for people’s autonomy, and with the goal of increasing people’s control over their lives and their surroundings. Protection of privacy and intimacy: Privacy and intimacy must be protected from intrusion by AIS and by data-acquisition and archiving systems. Solidarity: The development of AIS must be compatible with maintaining the bonds of solidarity among people and generations. Democratic participation: AIS must meet intelligibility, justifiability and accessibility criteria, and must be subjected to democratic scrutiny, debate and control. Equity: The development and use of AIS must contribute to the creation of a just and equitable society. Diversity inclusion: The development and use of AIS must be compatible with maintaining social and cultural diversity, and must not restrict the scope of lifestyle choices and personal experience. Prudence: Every person involved in AIS development must exercise caution by anticipating, as far as possible, the potential adverse consequences of AIS use, and by taking appropriate measures to avoid them. Responsibility: The development and use of AIS must not contribute to diminishing the responsibility of human beings when decisions must be made. Sustainable development: The development and use of AIS must be carried out so as to ensure strong environmental sustainability of the planet. https://www.montrealdeclaration-responsibleai.com/the-declaration
  39. Remember, it’s not because it’s a conspiracy theory that it can’t be done or it isn’t true… I’m Stéphane Hamel, and data is the raw material of my craft.
  40. Virtual cannibalism: For one simulation, we had two agents, naturally enough named Adam and Eve. Another agent was Stan, who wanted to be social but wasn’t very good at it, so was often hanging around and kind of lonely. If they experienced hunger around the time they saw Stan, they’d learn to associate food around the time they saw Stan. After a while… once they had eaten all the apples, they hate Stan. That was in the early 2000s. Racist and sexist monster: In 2016, Microsoft launched Tay.ai – a chatbot hidden behind the avatar of a 19-year-old girl. Tay was able to handle a variety of tasks; joking with users, commenting pictures, telling stories, playing games, and mirroring users’ statements back to them. One of the first things online users taught Tay was how to make offensive and racist statements. They had to shut her down after 16 hours. Destroying the competition: robots were trained to herd more sheep into a virtual pen than their competing robots. One robot get a single sheep in the pen and shot the door – than turned around and killed all the other bots… It strategized that it didn’t actually need to be good at herding sheep, it only needed to eliminate the competition in order to win. Facebook chatbots shut down after developing their own language: Facebook researchers found out that Alice and Bob had developed their own secret language and were carrying on conversations with each other. While the conversation transcript looks harmless, the researches wanted the bots to chat with humans but they had found a way to be more efficient than us, mere mortals… Alice and Bob were shut down after their conversations were discovered. Face ID beat by a mask: A week after the release of the iPhone X, hackers had gotten around the phone's signature Face ID facial recognition system. Using a 3D-printed, the iPhone X thought it was a human, and unlocked the phone. Alexa partying while owner was out: German police broke into an apartment after neighbors reported loud music early in the morning. The cause? Not a party, but an Amazon Echo randomly blasting music when the resident was out. Google Home Minis spied on their owners: security researchers discovered that some Google Home Minis had been secretly turning on, recording thousands of minutes of audio of their owners, and sending the files to Google. After noticing that his digital assistant had been turning on and trying to listen to the TV, one user checked Google's My Activity portal, where he found out the device had been recording him. Facebook allowed ads to be targeted to "Jew Haters”: Using Facebook's AI-driven, self-service platform to purchase ads, companies and brands can target their message to different demographics. Some of those demographics were created by an algorithm, not a human... https://blog.statsbot.co/creepy-artificial-intelligence-ebc3f76179a8 https://www.techrepublic.com/article/the-10-biggest-ai-failures-of-2017/
  41. The Rorschach test is a psychological test in which subjects' perceptions of inkblots are recorded and then analyzed using psychological interpretation. So what might possibly happen if we ask AI to interpret those? https://en.wikipedia.org/wiki/Rorschach_test
  42. In fact, the world's first psychopath AI is born from the fact that the data that is used to teach a machine learning algorithm can significantly influence its behavior. http://norman-ai.mit.edu/
  43. Let’s look at another one. Now transpose this to something else.