This extraordinary book explains the engine that has catapulted the Internet from backwater to ubiquity-and reveals that it is sputtering precisely because of its runaway success. With the unwitting ...help of its users, the generative Internet is on a path.
The science of fake news Lazer, David M J; Baum, Matthew A; Benkler, Yochai ...
Science (American Association for the Advancement of Science),
03/2018, Volume:
359, Issue:
6380
Journal Article
Peer reviewed
Addressing fake news requires a multidisciplinary effort
The rise of fake news highlights the erosion of long-standing institutional bulwarks against misinformation in the internet age. Concern over ...the problem is global. However, much remains unknown regarding the vulnerabilities of individuals, institutions, and society to manipulations by malicious actors. A new system of safeguards is needed. Below, we discuss extant social and computer science research regarding belief in fake news and the mechanisms by which it spreads. Fake news has a long history, but we focus on unanswered scientific questions raised by the proliferation of its most recent, politically oriented incarnation. Beyond selected references in the text, suggested further reading can be found in the supplementary materials.
Adversarial attacks on medical machine learning Finlayson, Samuel G; Bowers, John D; Ito, Joichi ...
Science (American Association for the Advancement of Science),
03/2019, Volume:
363, Issue:
6433
Journal Article
Peer reviewed
Emerging vulnerabilities demand new conversations
With public and academic attention increasingly focused on the new role of machine learning in the health information economy, an unusual and ...no-longer-esoteric category of vulnerabilities in machine-learning systems could prove important. These vulnerabilities allow a small, carefully designed change in how inputs are presented to a system to completely alter its output, causing it to confidently arrive at manifestly wrong conclusions. These advanced techniques to subvert otherwise-reliable machine-learning systems—so-called adversarial attacks—have, to date, been of interest primarily to computer science researchers (
1
). However, the landscape of often-competing interests within health care, and billions of dollars at stake in systems' outputs, implies considerable problems. We outline motivations that various players in the health care system may have to use adversarial attacks and begin a discussion of what to do about them. Far from discouraging continued innovation with medical machine learning, we call for active engagement of medical, technical, legal, and ethical experts in pursuit of efficient, broadly available, and effective health care that machine learning will enable.
The Generative Internet Zittrain, Jonathan L
Harvard law review,
05/2006, Volume:
119, Issue:
7
Journal Article
Peer reviewed
The generative capacity for unrelated and unaccredited audiences to build and distribute code and content through the Internet to its tens of millions of attached personal computers has ignited ...growth and innovation in information technology and has facilitated new creative endeavors. It has also given rise to regulatory and entrepreneurial backlashes. A further backlash among consumers is developing in response to security threats that exploit the openness of the Internet and of PCs to third-party contribution. A shift in consumer priorities from generativity to stability will compel undesirable responses from regulators and markets and, if unaddressed, could prove decisive in closing today's open computing environments. This Article explains why PC openness is as important as network openness, as well as why today's open network might give rise to unduly closed endpoints. It argues that the Internet is better conceptualized as a generative grid that includes both PCs and networks rather than as an open network indifferent to the configuration of its endpoints. Applying this framework, the Article explores ways - some of them bound to be unpopular among advocates of an open Internet represented by uncompromising end-to-end neutrality - in which the Internet can be made to satisfy genuine and pressing security concerns while retaining the most important generative aspects of today's networked technology.
Reflections on Internet Culture Zittrain, Jonathan L
Journal of visual culture,
12/2014, Volume:
13, Issue:
3
Journal Article
Peer reviewed
In these edited remarks originally given at ROFLCon in May 2012, Jonathan Zittrain muses on the nature of memes and their relationships to their creators as well as to broader culture and to ...politics. The distributed environment of the internet allows memes to morph and become distanced from their original intentions. As meme culture becomes more and more assimilated into popular culture, subcultures like those of Reddit or 4chan have begun to re-conceptualize their own role from just meme propagators to cultural producers. Memes can gain commercial appeal, much to the chagrin of their creators. More strangely, memes can gain political traction and affiliation, like American conservative commentator Bill O’Reilly’s ‘You can‘t explain that’ or Anonymous’ ‘Low Orbit Ion Cannon’. Can meme culture survive becoming not just the property of geeks and nerds, but part of the commercial and political world?
Reports on a new generation of Internet controls that establish a new normative terrain in which surveillance and censorship are routine.
Internet filtering, censorship of Web content, and online ...surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous “Great Firewall of China” is one of the first national Internet filtering systems. Today the new tools for Internet controls that are emerging go beyond mere denial of information. These new techniques, which aim to normalize (or even legalize) Internet control, include targeted viruses and the strategically timed deployment of distributed denial-of-service (DDoS) attacks, surveillance at key points of the Internet's infrastructure, take-down notices, stringent terms of usage policies, and national information shaping strategies. Access Controlled reports on this new normative terrain. The book, a project from the OpenNet Initiative (ONI), a collaboration of the Citizen Lab at the University of Toronto's Munk Centre for International Studies, Harvard's Berkman Center for Internet and Society, and the SecDev Group, offers six substantial chapters that analyze Internet control in both Western and Eastern Europe and a section of shorter regional reports and country profiles drawn from material gathered by the ONI around the world through a combination of technical interrogation and field research methods.
Adversarial attacks on medical machine learning Finlayson, Samuel G.; Bowers, John D.; Ito, Joichi ...
Science (American Association for the Advancement of Science),
03/2019, Volume:
363, Issue:
6433
Journal Article