SlideShare a Scribd company logo
1 of 31
Extracts and Addendums:
Ethics & Crowd Computing
Matt Lease
School of Information @mattlease
University of Texas at Austin ml@ischool.utexas.edu
What about context?
By minimizing context, greater task efficiency
can often be achieved
– e.g. “Can you name who is in this photo?”
2
Context & Informed Consent
• But people need context for informed consent
• Who will benefit from it and how?
Jonathan Zittrain, Harvard 3
What about requestor fraud?
• Refusing to pay for work, installing malware
• Using crowds to defeat online metrics/security
4
Robert Sim, MSR Summit’12
5
What about regulation?
• Wolfson and Lease. Look before you leap: Legal pitfalls of
crowdsourcing. Proceedings of the American Society for
Information Science and Technology (ASIS&T), 2011.
• As usual, technology is ahead of the law
– employment law
– patent inventorship
– data security and the Federal Trade Commission
– copyright ownership
– securities regulation of crowdfunding
• Take-away: don’t panic, but be mindful
– Understand risks of “just in-time compliance”
6
Who are
the workers?
• A. Baio, November 2008. The Faces of Mechanical Turk.
• P. Ipeirotis. March 2010. The New Demographics of
Mechanical Turk
• J. Ross, et al. Who are the Crowdworkers? CHI 2010.
7
What about ethics?
• Six Silberman, Lilly Irani, and Joel Ross. Ethics and
tactics of professional crowdwork. XRDS: Crossroads,
The ACM Magazine for Students 17.2 (2010): 39-43.
– “How should we… conceptualize the role of these people
who we ask to power our computing?”
– Power dynamics
– “Abstraction hides detail”
• Fort, Karën, Gilles Adda, and K. Bretonnel Cohen.
Amazon mechanical turk: Gold mine or coal mine?.
Computational Linguistics 37.2 (2011): 413-420.
– “…opportunities for our community to deliberately
value ethics above cost savings.”
8
Davis et al. (2010) The HPU.
HPU
9
HPU: “Abstraction hides detail”
10
Requester Fraud on MTurk
“Do not do any HITs that involve: filling in
CAPTCHAs; secret shopping; test our web page;
test zip code; free trial; click my link; surveys or
quizzes (unless the requester is listed with a
smiley in the Hall of Fame/Shame); anything
that involves sending a text message; or
basically anything that asks for any personal
information at all—even your zip code. If you
feel in your gut it’s not on the level, IT’S NOT.
Why? Because they are scams...”
11
Fraud example
• Is this really the requester’s captcha?
12
Captcha Fraud
• Severity?
13
• “…not only do malicious crowd-sourcing
systems exist, but they are rapidly growing…”
14
Digital Dirty Jobs
• The Googler who Looked at the Worst of the Internet
• Policing the Web’s Lurid Precincts
• Facebook content moderation
• The dirty job of keeping Facebook clean
• Even linguistic annotators report stress &
nightmares from reading news articles!
15
Crowdsourcing and Vigilantism
• http://searchenginewatch.com/article/2221527/Western-Human-Flesh-
Search-Chases-Wrong-Guy
16
What about freedom?
• Crowdsourcing vision: empowering freedom
– work whenever you want for whomever you want
• Risk: people being compelled to perform work
– Chinese prisoners farming gold…
– Digital sweat shops? Digital slaves?
– We really don’t know (and need to learn more…)
– Traction? Human Trafficking at MSR Summit’12
17
Mechanical Turk is Not Anonymous
Matthew Lease, Jessica Hullman, Jeffrey P. Bigham, Michael S. Bernstein, Juho Kim,
Walter S. Lasecki, Saeideh Bakhshi, Tanushree Mitra, and Robert C. Miller.
Online: Social Science Research Network, March 6, 2013
ssrn.com/abstract=2190946
Worker Privacy
Each worker is assigned an alphanumeric ID
19
Requesters see only Worker IDs
20
Safeguarding Personal Data
•
“What are the characteristics of MTurk workers?... the MTurk
system is set up to strictly protect workers’ anonymity….”
21
Broad Perception of Anonymity
22
`
Amazon profile page
URLs use the same
IDs used on MTurk !
Who knew?
23
Workers’ Views: Survey & Forums
• “... my reviewer profile is linked to my Mturk number! I had
no idea...”
• “...Amazon needs to separate the Mturk numbers from
seller numbers to protect our privacy…”
• “I think this is outrageous though. Makes me concerned
about trusting privacy agreements.”
• “Mine pulled up my Amazon wish list which revealed my
identity. It seems to me that so called ”anonymous” tasks
on mTurk (like surveys) are not anonymous after all.”
24
Risks to
Workers
• Inadvertent disclosure of PII or private data
• Loss of blind hiring practices online
• Greater risk of exploitation, reputation damage,
loss of income, or even physical harm…
25
Risks to Researchers
• Exposing participants to undocumented risks
• Having disclosed WorkerIDs (e.g., online)
• Having not restricted access to the internally
– Potential harm to participants
– Lack of compliance with Federal/IRB governance
of human subjects research
– Being required to discard collected data
– Delays or inability to conduct future MTurk studies
26
Risks to Service Provider
• Workers/Requesters abandoning MTurk
• The US Federal Trade Commission (FTC) has
recently begun to aggressively protect consumers
from data breaches by commercial entities,
including release of supposedly “anonymous” data
– Inadequate protection of customer records: BJWC
– De-anonymized customer records: AOL, Netflix
– Did workers have a reasonable expectation of privacy
in their use of MTurk which has been violated? 27
The Future of Crowd Work, CSCW’13
Kittur, Nickerson, Bernstein, Gerber,
Shaw, Zimmerman, Lease, and Horton
28
Additional References
• Paul Hyman. Software Aims to Ensure Fairness in Crowdsourcing Projects.
Communications of the ACM, Vol. 56 No. 8, Pages 19-21, August 2013.
• Irani, Lilly C. The Ideological Work of Microwork. In preparation, draft
available online.
• Irani, Lilly C., and Six Silberman. Turkopticon: Interrupting worker
invisibility in amazon mechanical turk. ACM SIGCHI Conference, 2013.
• Adda, Gilles, et al. Crowdsourcing for language resource development:
Critical analysis of amazon mechanical turk overpowering use. Proceedings
of the 5th Language and Technology Conference (LTC). 2011.
• Adda, Gilles, and Joseph J. Mariani. Economic, Legal and Ethical analysis of
Crowdsourcing for Speech Processing. (2013).
• Harris, Christopher G., and Padmini Srinivasan. Crowdsourcing and Ethics.
Security and Privacy in Social Networks. 67-83. 2013.
• Harris, Christopher G. Dirty Deeds Done Dirt Cheap: A Darker Side to
Crowdsourcing. IEEE 3rd conference on social computing (socialcom). 2011.
• Horton, John J. The condition of the Turking class: Are online employers
fair and honest?. Economics Letters 111.1 (2011): 10-12.
29
A Few Legal References
• Felstiner, Alek. Working the Crowd: Employment
and Labor Law in the Crowdsourcing Industry.
Berkeley Journal of Employment and Labor Law
32.1 (2011).
• Felstiner, Alek. Sweatshop or Paper Route?: Child
Labor Laws and In-Game Work. Proceedings of
CrowdConf (2010).
• Zittrain, Jonathan. Ubiquitous human computing.
Philosophical Transactions of the Royal Society A:
Mathematical, Physical and Engineering Sciences
366.1881 (2008): 3813-3821.
30
Join the conversation online
• Crowdwork-ethics: “an informal and
occasional newsletter for researchers
interested in ethical issues in crowd work.”
– Email Six Silberman to subscribe (manual)
31

More Related Content

What's hot

Codes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of CodeCodes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of CodeMark Underwood
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017Steve Mckee
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityFreedom House
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...IJCSIS Research Publications
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were assimba35
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write upvictoriahoo
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Has Internet of Things really happened?
Has Internet of Things really happened? Has Internet of Things really happened?
Has Internet of Things really happened? Opher Etzion
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and BadTzar Umang
 
Ethics in Data Science and Machine Learning
Ethics in Data Science and Machine LearningEthics in Data Science and Machine Learning
Ethics in Data Science and Machine LearningHJ van Veen
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismInternet Law Center
 
Presentation slides
Presentation slidesPresentation slides
Presentation slidesandrewdyoung
 

What's hot (20)

Codes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of CodeCodes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of Code
 
Exposing the Hidden Web
Exposing the Hidden WebExposing the Hidden Web
Exposing the Hidden Web
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber security
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were as
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write up
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Has Internet of Things really happened?
Has Internet of Things really happened? Has Internet of Things really happened?
Has Internet of Things really happened?
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
 
Ethics in Data Science and Machine Learning
Ethics in Data Science and Machine LearningEthics in Data Science and Machine Learning
Ethics in Data Science and Machine Learning
 
Information filtering
Information filteringInformation filtering
Information filtering
 
Chapter 5_dp-_pertemuan_7_8
 Chapter 5_dp-_pertemuan_7_8 Chapter 5_dp-_pertemuan_7_8
Chapter 5_dp-_pertemuan_7_8
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and Terrorism
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 

Viewers also liked

Plays Well with Others: How Collaboration and Crowdsourcing are Changing Lega...
Plays Well with Others: How Collaboration and Crowdsourcing are Changing Lega...Plays Well with Others: How Collaboration and Crowdsourcing are Changing Lega...
Plays Well with Others: How Collaboration and Crowdsourcing are Changing Lega...Robert Ambrogi
 
Publist sciex 2
Publist sciex 2Publist sciex 2
Publist sciex 2computerss
 
Toward Effective and Sustainable Online Crowd Work
Toward Effective and Sustainable Online Crowd WorkToward Effective and Sustainable Online Crowd Work
Toward Effective and Sustainable Online Crowd WorkMatthew Lease
 
Beyond Mechanical Turk: An Analysis of Paid Crowd Work Platforms
Beyond Mechanical Turk: An Analysis of Paid Crowd Work PlatformsBeyond Mechanical Turk: An Analysis of Paid Crowd Work Platforms
Beyond Mechanical Turk: An Analysis of Paid Crowd Work PlatformsMatthew Lease
 
Systematic Review is e-Discovery in Doctor’s Clothing
Systematic Review is e-Discovery in Doctor’s ClothingSystematic Review is e-Discovery in Doctor’s Clothing
Systematic Review is e-Discovery in Doctor’s ClothingMatthew Lease
 
Bonner Leader Program Financial Aid and Recruitment: 2016 Bonner New Director...
Bonner Leader Program Financial Aid and Recruitment: 2016 Bonner New Director...Bonner Leader Program Financial Aid and Recruitment: 2016 Bonner New Director...
Bonner Leader Program Financial Aid and Recruitment: 2016 Bonner New Director...Bonner Foundation
 
Holding Students Accountable: 2016 Bonner New Directors Meeting
Holding Students Accountable: 2016 Bonner New Directors MeetingHolding Students Accountable: 2016 Bonner New Directors Meeting
Holding Students Accountable: 2016 Bonner New Directors MeetingBonner Foundation
 
Colposcopy nstrumentation and principles on how to do 22
Colposcopy nstrumentation and principles on how to do 22Colposcopy nstrumentation and principles on how to do 22
Colposcopy nstrumentation and principles on how to do 22Tariq Mohammed
 
Ctg interpretation and mangment
Ctg interpretation and mangmentCtg interpretation and mangment
Ctg interpretation and mangmentnermine amin
 
『ライターと制作者のメディアの作り方』WordCamp Tokyo2015
『ライターと制作者のメディアの作り方』WordCamp Tokyo2015『ライターと制作者のメディアの作り方』WordCamp Tokyo2015
『ライターと制作者のメディアの作り方』WordCamp Tokyo2015Hiroki Saiki
 
Ejercicos diapositivas
Ejercicos diapositivasEjercicos diapositivas
Ejercicos diapositivasjorge ortega
 
Philosophy - Lesson 1 - What is Philosophy
Philosophy - Lesson 1 - What is PhilosophyPhilosophy - Lesson 1 - What is Philosophy
Philosophy - Lesson 1 - What is PhilosophyRMPSuccess
 

Viewers also liked (17)

Plays Well with Others: How Collaboration and Crowdsourcing are Changing Lega...
Plays Well with Others: How Collaboration and Crowdsourcing are Changing Lega...Plays Well with Others: How Collaboration and Crowdsourcing are Changing Lega...
Plays Well with Others: How Collaboration and Crowdsourcing are Changing Lega...
 
Pechakucha
PechakuchaPechakucha
Pechakucha
 
Publist sciex 2
Publist sciex 2Publist sciex 2
Publist sciex 2
 
SHILPI
SHILPISHILPI
SHILPI
 
cv Biswajit.
cv Biswajit.cv Biswajit.
cv Biswajit.
 
Toward Effective and Sustainable Online Crowd Work
Toward Effective and Sustainable Online Crowd WorkToward Effective and Sustainable Online Crowd Work
Toward Effective and Sustainable Online Crowd Work
 
Beyond Mechanical Turk: An Analysis of Paid Crowd Work Platforms
Beyond Mechanical Turk: An Analysis of Paid Crowd Work PlatformsBeyond Mechanical Turk: An Analysis of Paid Crowd Work Platforms
Beyond Mechanical Turk: An Analysis of Paid Crowd Work Platforms
 
Systematic Review is e-Discovery in Doctor’s Clothing
Systematic Review is e-Discovery in Doctor’s ClothingSystematic Review is e-Discovery in Doctor’s Clothing
Systematic Review is e-Discovery in Doctor’s Clothing
 
Bonner Leader Program Financial Aid and Recruitment: 2016 Bonner New Director...
Bonner Leader Program Financial Aid and Recruitment: 2016 Bonner New Director...Bonner Leader Program Financial Aid and Recruitment: 2016 Bonner New Director...
Bonner Leader Program Financial Aid and Recruitment: 2016 Bonner New Director...
 
Holding Students Accountable: 2016 Bonner New Directors Meeting
Holding Students Accountable: 2016 Bonner New Directors MeetingHolding Students Accountable: 2016 Bonner New Directors Meeting
Holding Students Accountable: 2016 Bonner New Directors Meeting
 
Colposcopy nstrumentation and principles on how to do 22
Colposcopy nstrumentation and principles on how to do 22Colposcopy nstrumentation and principles on how to do 22
Colposcopy nstrumentation and principles on how to do 22
 
Ctg interpretation and mangment
Ctg interpretation and mangmentCtg interpretation and mangment
Ctg interpretation and mangment
 
『ライターと制作者のメディアの作り方』WordCamp Tokyo2015
『ライターと制作者のメディアの作り方』WordCamp Tokyo2015『ライターと制作者のメディアの作り方』WordCamp Tokyo2015
『ライターと制作者のメディアの作り方』WordCamp Tokyo2015
 
Los conectores
Los conectoresLos conectores
Los conectores
 
Lsng đh5
Lsng đh5Lsng đh5
Lsng đh5
 
Ejercicos diapositivas
Ejercicos diapositivasEjercicos diapositivas
Ejercicos diapositivas
 
Philosophy - Lesson 1 - What is Philosophy
Philosophy - Lesson 1 - What is PhilosophyPhilosophy - Lesson 1 - What is Philosophy
Philosophy - Lesson 1 - What is Philosophy
 

Similar to Crowdsourcing & ethics: a few thoughts and refences.

Mechanical Turk is Not Anonymous
Mechanical Turk is Not AnonymousMechanical Turk is Not Anonymous
Mechanical Turk is Not AnonymousMatthew Lease
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 
Injustice_Harm_Digital_Infrastructures.pptx
Injustice_Harm_Digital_Infrastructures.pptxInjustice_Harm_Digital_Infrastructures.pptx
Injustice_Harm_Digital_Infrastructures.pptxMusfiqJony
 
Privacy in AI/ML Systems: Practical Challenges and Lessons Learned
Privacy in AI/ML Systems: Practical Challenges and Lessons LearnedPrivacy in AI/ML Systems: Practical Challenges and Lessons Learned
Privacy in AI/ML Systems: Practical Challenges and Lessons LearnedKrishnaram Kenthapadi
 
Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)Paolo Missier
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021andygustafson
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityOlivier Busolini
 
Black Box Learning Analytics? Beyond Algorithmic Transparency
Black Box Learning Analytics? Beyond Algorithmic TransparencyBlack Box Learning Analytics? Beyond Algorithmic Transparency
Black Box Learning Analytics? Beyond Algorithmic TransparencySimon Buckingham Shum
 
"Taming the machine" - Wie regulieren wir disruptive Technologien?
"Taming the machine" - Wie regulieren wir disruptive Technologien?"Taming the machine" - Wie regulieren wir disruptive Technologien?
"Taming the machine" - Wie regulieren wir disruptive Technologien?Hans Bellstedt Public Affairs GmbH
 
Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.Amber Butler
 
TCEA 2024 Dr. Maureen Yoder AI / ChatGPT
TCEA 2024  Dr. Maureen Yoder AI / ChatGPTTCEA 2024  Dr. Maureen Yoder AI / ChatGPT
TCEA 2024 Dr. Maureen Yoder AI / ChatGPTmaureenyoder
 
Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...
Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...
Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...Gerd Leonhard
 

Similar to Crowdsourcing & ethics: a few thoughts and refences. (20)

Mechanical Turk is Not Anonymous
Mechanical Turk is Not AnonymousMechanical Turk is Not Anonymous
Mechanical Turk is Not Anonymous
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Injustice_Harm_Digital_Infrastructures.pptx
Injustice_Harm_Digital_Infrastructures.pptxInjustice_Harm_Digital_Infrastructures.pptx
Injustice_Harm_Digital_Infrastructures.pptx
 
Privacy in AI/ML Systems: Practical Challenges and Lessons Learned
Privacy in AI/ML Systems: Practical Challenges and Lessons LearnedPrivacy in AI/ML Systems: Practical Challenges and Lessons Learned
Privacy in AI/ML Systems: Practical Challenges and Lessons Learned
 
Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Ethics in Technology Handout
Ethics in Technology HandoutEthics in Technology Handout
Ethics in Technology Handout
 
Black Box Learning Analytics? Beyond Algorithmic Transparency
Black Box Learning Analytics? Beyond Algorithmic TransparencyBlack Box Learning Analytics? Beyond Algorithmic Transparency
Black Box Learning Analytics? Beyond Algorithmic Transparency
 
"Taming the machine" - Wie regulieren wir disruptive Technologien?
"Taming the machine" - Wie regulieren wir disruptive Technologien?"Taming the machine" - Wie regulieren wir disruptive Technologien?
"Taming the machine" - Wie regulieren wir disruptive Technologien?
 
Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.
 
TCEA 2024 Dr. Maureen Yoder AI / ChatGPT
TCEA 2024  Dr. Maureen Yoder AI / ChatGPTTCEA 2024  Dr. Maureen Yoder AI / ChatGPT
TCEA 2024 Dr. Maureen Yoder AI / ChatGPT
 
Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...
Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...
Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...
 
Seeing and talking about Big Data, Farida Vis, AHRC Subject Assocations
Seeing and talking about Big Data, Farida Vis, AHRC Subject AssocationsSeeing and talking about Big Data, Farida Vis, AHRC Subject Assocations
Seeing and talking about Big Data, Farida Vis, AHRC Subject Assocations
 

More from Matthew Lease

Automated Models for Quantifying Centrality of Survey Responses
Automated Models for Quantifying Centrality of Survey ResponsesAutomated Models for Quantifying Centrality of Survey Responses
Automated Models for Quantifying Centrality of Survey ResponsesMatthew Lease
 
Key Challenges in Moderating Social Media: Accuracy, Cost, Scalability, and S...
Key Challenges in Moderating Social Media: Accuracy, Cost, Scalability, and S...Key Challenges in Moderating Social Media: Accuracy, Cost, Scalability, and S...
Key Challenges in Moderating Social Media: Accuracy, Cost, Scalability, and S...Matthew Lease
 
Explainable Fact Checking with Humans in-the-loop
Explainable Fact Checking with Humans in-the-loopExplainable Fact Checking with Humans in-the-loop
Explainable Fact Checking with Humans in-the-loopMatthew Lease
 
Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...
Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...
Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...Matthew Lease
 
AI & Work, with Transparency & the Crowd
AI & Work, with Transparency & the Crowd AI & Work, with Transparency & the Crowd
AI & Work, with Transparency & the Crowd Matthew Lease
 
Designing Human-AI Partnerships to Combat Misinfomation
Designing Human-AI Partnerships to Combat Misinfomation Designing Human-AI Partnerships to Combat Misinfomation
Designing Human-AI Partnerships to Combat Misinfomation Matthew Lease
 
Designing at the Intersection of HCI & AI: Misinformation & Crowdsourced Anno...
Designing at the Intersection of HCI & AI: Misinformation & Crowdsourced Anno...Designing at the Intersection of HCI & AI: Misinformation & Crowdsourced Anno...
Designing at the Intersection of HCI & AI: Misinformation & Crowdsourced Anno...Matthew Lease
 
But Who Protects the Moderators?
But Who Protects the Moderators?But Who Protects the Moderators?
But Who Protects the Moderators?Matthew Lease
 
Believe it or not: Designing a Human-AI Partnership for Mixed-Initiative Fact...
Believe it or not: Designing a Human-AI Partnership for Mixed-Initiative Fact...Believe it or not: Designing a Human-AI Partnership for Mixed-Initiative Fact...
Believe it or not: Designing a Human-AI Partnership for Mixed-Initiative Fact...Matthew Lease
 
Mix and Match: Collaborative Expert-Crowd Judging for Building Test Collectio...
Mix and Match: Collaborative Expert-Crowd Judging for Building Test Collectio...Mix and Match: Collaborative Expert-Crowd Judging for Building Test Collectio...
Mix and Match: Collaborative Expert-Crowd Judging for Building Test Collectio...Matthew Lease
 
Fact Checking & Information Retrieval
Fact Checking & Information RetrievalFact Checking & Information Retrieval
Fact Checking & Information RetrievalMatthew Lease
 
Your Behavior Signals Your Reliability: Modeling Crowd Behavioral Traces to E...
Your Behavior Signals Your Reliability: Modeling Crowd Behavioral Traces to E...Your Behavior Signals Your Reliability: Modeling Crowd Behavioral Traces to E...
Your Behavior Signals Your Reliability: Modeling Crowd Behavioral Traces to E...Matthew Lease
 
What Can Machine Learning & Crowdsourcing Do for You? Exploring New Tools for...
What Can Machine Learning & Crowdsourcing Do for You? Exploring New Tools for...What Can Machine Learning & Crowdsourcing Do for You? Exploring New Tools for...
What Can Machine Learning & Crowdsourcing Do for You? Exploring New Tools for...Matthew Lease
 
Deep Learning for Information Retrieval: Models, Progress, & Opportunities
Deep Learning for Information Retrieval: Models, Progress, & OpportunitiesDeep Learning for Information Retrieval: Models, Progress, & Opportunities
Deep Learning for Information Retrieval: Models, Progress, & OpportunitiesMatthew Lease
 
The Rise of Crowd Computing (July 7, 2016)
The Rise of Crowd Computing (July 7, 2016)The Rise of Crowd Computing (July 7, 2016)
The Rise of Crowd Computing (July 7, 2016)Matthew Lease
 
The Rise of Crowd Computing - 2016
The Rise of Crowd Computing - 2016The Rise of Crowd Computing - 2016
The Rise of Crowd Computing - 2016Matthew Lease
 
The Rise of Crowd Computing (December 2015)
The Rise of Crowd Computing (December 2015)The Rise of Crowd Computing (December 2015)
The Rise of Crowd Computing (December 2015)Matthew Lease
 
Toward Better Crowdsourcing Science
 Toward Better Crowdsourcing Science Toward Better Crowdsourcing Science
Toward Better Crowdsourcing ScienceMatthew Lease
 
The Search for Truth in Objective & Subject Crowdsourcing
The Search for Truth in Objective & Subject CrowdsourcingThe Search for Truth in Objective & Subject Crowdsourcing
The Search for Truth in Objective & Subject CrowdsourcingMatthew Lease
 
Multidimensional Relevance Modeling via Psychometrics & Crowdsourcing: ACM SI...
Multidimensional Relevance Modeling via Psychometrics & Crowdsourcing: ACM SI...Multidimensional Relevance Modeling via Psychometrics & Crowdsourcing: ACM SI...
Multidimensional Relevance Modeling via Psychometrics & Crowdsourcing: ACM SI...Matthew Lease
 

More from Matthew Lease (20)

Automated Models for Quantifying Centrality of Survey Responses
Automated Models for Quantifying Centrality of Survey ResponsesAutomated Models for Quantifying Centrality of Survey Responses
Automated Models for Quantifying Centrality of Survey Responses
 
Key Challenges in Moderating Social Media: Accuracy, Cost, Scalability, and S...
Key Challenges in Moderating Social Media: Accuracy, Cost, Scalability, and S...Key Challenges in Moderating Social Media: Accuracy, Cost, Scalability, and S...
Key Challenges in Moderating Social Media: Accuracy, Cost, Scalability, and S...
 
Explainable Fact Checking with Humans in-the-loop
Explainable Fact Checking with Humans in-the-loopExplainable Fact Checking with Humans in-the-loop
Explainable Fact Checking with Humans in-the-loop
 
Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...
Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...
Adventures in Crowdsourcing : Toward Safer Content Moderation & Better Suppor...
 
AI & Work, with Transparency & the Crowd
AI & Work, with Transparency & the Crowd AI & Work, with Transparency & the Crowd
AI & Work, with Transparency & the Crowd
 
Designing Human-AI Partnerships to Combat Misinfomation
Designing Human-AI Partnerships to Combat Misinfomation Designing Human-AI Partnerships to Combat Misinfomation
Designing Human-AI Partnerships to Combat Misinfomation
 
Designing at the Intersection of HCI & AI: Misinformation & Crowdsourced Anno...
Designing at the Intersection of HCI & AI: Misinformation & Crowdsourced Anno...Designing at the Intersection of HCI & AI: Misinformation & Crowdsourced Anno...
Designing at the Intersection of HCI & AI: Misinformation & Crowdsourced Anno...
 
But Who Protects the Moderators?
But Who Protects the Moderators?But Who Protects the Moderators?
But Who Protects the Moderators?
 
Believe it or not: Designing a Human-AI Partnership for Mixed-Initiative Fact...
Believe it or not: Designing a Human-AI Partnership for Mixed-Initiative Fact...Believe it or not: Designing a Human-AI Partnership for Mixed-Initiative Fact...
Believe it or not: Designing a Human-AI Partnership for Mixed-Initiative Fact...
 
Mix and Match: Collaborative Expert-Crowd Judging for Building Test Collectio...
Mix and Match: Collaborative Expert-Crowd Judging for Building Test Collectio...Mix and Match: Collaborative Expert-Crowd Judging for Building Test Collectio...
Mix and Match: Collaborative Expert-Crowd Judging for Building Test Collectio...
 
Fact Checking & Information Retrieval
Fact Checking & Information RetrievalFact Checking & Information Retrieval
Fact Checking & Information Retrieval
 
Your Behavior Signals Your Reliability: Modeling Crowd Behavioral Traces to E...
Your Behavior Signals Your Reliability: Modeling Crowd Behavioral Traces to E...Your Behavior Signals Your Reliability: Modeling Crowd Behavioral Traces to E...
Your Behavior Signals Your Reliability: Modeling Crowd Behavioral Traces to E...
 
What Can Machine Learning & Crowdsourcing Do for You? Exploring New Tools for...
What Can Machine Learning & Crowdsourcing Do for You? Exploring New Tools for...What Can Machine Learning & Crowdsourcing Do for You? Exploring New Tools for...
What Can Machine Learning & Crowdsourcing Do for You? Exploring New Tools for...
 
Deep Learning for Information Retrieval: Models, Progress, & Opportunities
Deep Learning for Information Retrieval: Models, Progress, & OpportunitiesDeep Learning for Information Retrieval: Models, Progress, & Opportunities
Deep Learning for Information Retrieval: Models, Progress, & Opportunities
 
The Rise of Crowd Computing (July 7, 2016)
The Rise of Crowd Computing (July 7, 2016)The Rise of Crowd Computing (July 7, 2016)
The Rise of Crowd Computing (July 7, 2016)
 
The Rise of Crowd Computing - 2016
The Rise of Crowd Computing - 2016The Rise of Crowd Computing - 2016
The Rise of Crowd Computing - 2016
 
The Rise of Crowd Computing (December 2015)
The Rise of Crowd Computing (December 2015)The Rise of Crowd Computing (December 2015)
The Rise of Crowd Computing (December 2015)
 
Toward Better Crowdsourcing Science
 Toward Better Crowdsourcing Science Toward Better Crowdsourcing Science
Toward Better Crowdsourcing Science
 
The Search for Truth in Objective & Subject Crowdsourcing
The Search for Truth in Objective & Subject CrowdsourcingThe Search for Truth in Objective & Subject Crowdsourcing
The Search for Truth in Objective & Subject Crowdsourcing
 
Multidimensional Relevance Modeling via Psychometrics & Crowdsourcing: ACM SI...
Multidimensional Relevance Modeling via Psychometrics & Crowdsourcing: ACM SI...Multidimensional Relevance Modeling via Psychometrics & Crowdsourcing: ACM SI...
Multidimensional Relevance Modeling via Psychometrics & Crowdsourcing: ACM SI...
 

Recently uploaded

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 

Recently uploaded (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

Crowdsourcing & ethics: a few thoughts and refences.

  • 1. Extracts and Addendums: Ethics & Crowd Computing Matt Lease School of Information @mattlease University of Texas at Austin ml@ischool.utexas.edu
  • 2. What about context? By minimizing context, greater task efficiency can often be achieved – e.g. “Can you name who is in this photo?” 2
  • 3. Context & Informed Consent • But people need context for informed consent • Who will benefit from it and how? Jonathan Zittrain, Harvard 3
  • 4. What about requestor fraud? • Refusing to pay for work, installing malware • Using crowds to defeat online metrics/security 4
  • 5. Robert Sim, MSR Summit’12 5
  • 6. What about regulation? • Wolfson and Lease. Look before you leap: Legal pitfalls of crowdsourcing. Proceedings of the American Society for Information Science and Technology (ASIS&T), 2011. • As usual, technology is ahead of the law – employment law – patent inventorship – data security and the Federal Trade Commission – copyright ownership – securities regulation of crowdfunding • Take-away: don’t panic, but be mindful – Understand risks of “just in-time compliance” 6
  • 7. Who are the workers? • A. Baio, November 2008. The Faces of Mechanical Turk. • P. Ipeirotis. March 2010. The New Demographics of Mechanical Turk • J. Ross, et al. Who are the Crowdworkers? CHI 2010. 7
  • 8. What about ethics? • Six Silberman, Lilly Irani, and Joel Ross. Ethics and tactics of professional crowdwork. XRDS: Crossroads, The ACM Magazine for Students 17.2 (2010): 39-43. – “How should we… conceptualize the role of these people who we ask to power our computing?” – Power dynamics – “Abstraction hides detail” • Fort, Karën, Gilles Adda, and K. Bretonnel Cohen. Amazon mechanical turk: Gold mine or coal mine?. Computational Linguistics 37.2 (2011): 413-420. – “…opportunities for our community to deliberately value ethics above cost savings.” 8
  • 9. Davis et al. (2010) The HPU. HPU 9
  • 11. Requester Fraud on MTurk “Do not do any HITs that involve: filling in CAPTCHAs; secret shopping; test our web page; test zip code; free trial; click my link; surveys or quizzes (unless the requester is listed with a smiley in the Hall of Fame/Shame); anything that involves sending a text message; or basically anything that asks for any personal information at all—even your zip code. If you feel in your gut it’s not on the level, IT’S NOT. Why? Because they are scams...” 11
  • 12. Fraud example • Is this really the requester’s captcha? 12
  • 14. • “…not only do malicious crowd-sourcing systems exist, but they are rapidly growing…” 14
  • 15. Digital Dirty Jobs • The Googler who Looked at the Worst of the Internet • Policing the Web’s Lurid Precincts • Facebook content moderation • The dirty job of keeping Facebook clean • Even linguistic annotators report stress & nightmares from reading news articles! 15
  • 16. Crowdsourcing and Vigilantism • http://searchenginewatch.com/article/2221527/Western-Human-Flesh- Search-Chases-Wrong-Guy 16
  • 17. What about freedom? • Crowdsourcing vision: empowering freedom – work whenever you want for whomever you want • Risk: people being compelled to perform work – Chinese prisoners farming gold… – Digital sweat shops? Digital slaves? – We really don’t know (and need to learn more…) – Traction? Human Trafficking at MSR Summit’12 17
  • 18. Mechanical Turk is Not Anonymous Matthew Lease, Jessica Hullman, Jeffrey P. Bigham, Michael S. Bernstein, Juho Kim, Walter S. Lasecki, Saeideh Bakhshi, Tanushree Mitra, and Robert C. Miller. Online: Social Science Research Network, March 6, 2013 ssrn.com/abstract=2190946
  • 19. Worker Privacy Each worker is assigned an alphanumeric ID 19
  • 20. Requesters see only Worker IDs 20
  • 21. Safeguarding Personal Data • “What are the characteristics of MTurk workers?... the MTurk system is set up to strictly protect workers’ anonymity….” 21
  • 22. Broad Perception of Anonymity 22
  • 23. ` Amazon profile page URLs use the same IDs used on MTurk ! Who knew? 23
  • 24. Workers’ Views: Survey & Forums • “... my reviewer profile is linked to my Mturk number! I had no idea...” • “...Amazon needs to separate the Mturk numbers from seller numbers to protect our privacy…” • “I think this is outrageous though. Makes me concerned about trusting privacy agreements.” • “Mine pulled up my Amazon wish list which revealed my identity. It seems to me that so called ”anonymous” tasks on mTurk (like surveys) are not anonymous after all.” 24
  • 25. Risks to Workers • Inadvertent disclosure of PII or private data • Loss of blind hiring practices online • Greater risk of exploitation, reputation damage, loss of income, or even physical harm… 25
  • 26. Risks to Researchers • Exposing participants to undocumented risks • Having disclosed WorkerIDs (e.g., online) • Having not restricted access to the internally – Potential harm to participants – Lack of compliance with Federal/IRB governance of human subjects research – Being required to discard collected data – Delays or inability to conduct future MTurk studies 26
  • 27. Risks to Service Provider • Workers/Requesters abandoning MTurk • The US Federal Trade Commission (FTC) has recently begun to aggressively protect consumers from data breaches by commercial entities, including release of supposedly “anonymous” data – Inadequate protection of customer records: BJWC – De-anonymized customer records: AOL, Netflix – Did workers have a reasonable expectation of privacy in their use of MTurk which has been violated? 27
  • 28. The Future of Crowd Work, CSCW’13 Kittur, Nickerson, Bernstein, Gerber, Shaw, Zimmerman, Lease, and Horton 28
  • 29. Additional References • Paul Hyman. Software Aims to Ensure Fairness in Crowdsourcing Projects. Communications of the ACM, Vol. 56 No. 8, Pages 19-21, August 2013. • Irani, Lilly C. The Ideological Work of Microwork. In preparation, draft available online. • Irani, Lilly C., and Six Silberman. Turkopticon: Interrupting worker invisibility in amazon mechanical turk. ACM SIGCHI Conference, 2013. • Adda, Gilles, et al. Crowdsourcing for language resource development: Critical analysis of amazon mechanical turk overpowering use. Proceedings of the 5th Language and Technology Conference (LTC). 2011. • Adda, Gilles, and Joseph J. Mariani. Economic, Legal and Ethical analysis of Crowdsourcing for Speech Processing. (2013). • Harris, Christopher G., and Padmini Srinivasan. Crowdsourcing and Ethics. Security and Privacy in Social Networks. 67-83. 2013. • Harris, Christopher G. Dirty Deeds Done Dirt Cheap: A Darker Side to Crowdsourcing. IEEE 3rd conference on social computing (socialcom). 2011. • Horton, John J. The condition of the Turking class: Are online employers fair and honest?. Economics Letters 111.1 (2011): 10-12. 29
  • 30. A Few Legal References • Felstiner, Alek. Working the Crowd: Employment and Labor Law in the Crowdsourcing Industry. Berkeley Journal of Employment and Labor Law 32.1 (2011). • Felstiner, Alek. Sweatshop or Paper Route?: Child Labor Laws and In-Game Work. Proceedings of CrowdConf (2010). • Zittrain, Jonathan. Ubiquitous human computing. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 366.1881 (2008): 3813-3821. 30
  • 31. Join the conversation online • Crowdwork-ethics: “an informal and occasional newsletter for researchers interested in ethical issues in crowd work.” – Email Six Silberman to subscribe (manual) 31