"Carceral technologies such as facial and voice recognition, predictive policing, and risk assessment instruments are often designed for environments where people have lost their rights." Faculty ...
"This phenomenon can no longer be explained through the rubric of ‘surveillance capitalism’ since the point is not merely to make money by tracking what users do." Faculty Associate Nick Couldry and ...
486 PC - a term used to describe a class of personal computers based on Intel's 486 microprocessor. While the 486 can support a Web browser and many older applications, it is usually limited in its ...
"Without the appropriate safeguards, AI for Good initiatives can be easily manipulated to serve as a new method of innovation arbitrage." Affiliate Rumman Chowdhury critiques the unchecked deployment ...
"The history of love and the history of technology have always been intertwined." Faculty Associate Moira Weigel explores how dating apps, algorithms, and AI chatbots shape modern romance, building on ...
"Border technologies heighten the historical violence of colonialism and imperialism while failing to address the root causes of forced migration." Faculty Associate Petra Molnar examines the human ...
RSM Visiting Scholar Allison Stanger believes that Elon Musk’s new involvement with government is unlikely to be altruistic.
Affiliates Bruce Schneier and Nathan Sanders warn of the risks posed by DOGE’s extreme approach to AI implementation.
"The question facing Americans isn’t whether government needs modernization – it’s whether they’re willing to sacrifice democracy in pursuit of Musk’s version of efficiency." Berkman Affiliate Allison ...
Bruce Schneier and Davi Ottenheimer argue that “the U.S. government has experienced what may be the most consequential security breach in its history.” ...
"Using AI to make government more efficient is a worthy pursuit, and this is not a new idea." Berkman Affiliate Nathan E. Sanders and Bruce Schneier examine the implications of AI-driven government ...
"The U.S. government has experienced what may be the most consequential security breach in its history—not through a sophisticated cyberattack or an act of foreign espionage, but through official ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results