As seen in "a NULL" Wired and "a NULL" Time
A revealing look at how negative biases against women of color are embedded in search engine results and algorithms
Run a Google search for "black ...girls"-what will you find? "Big Booty" and other sexually explicit terms are likely to come up as top search terms. But, if you type in "white girls," the results are radically different. The suggested porn sites and un-moderated discussions about "why black women are so sassy" or "why black women are so angry" presents a disturbing portrait of black womanhood in modern society.
In Algorithms of Oppression, Safiya Umoja Noble challenges the idea that search engines like Google offer an equal playing field for all forms of ideas, identities, and activities. Data discrimination is a real social problem; Noble argues that the combination of private interests in promoting certain sites, along with the monopoly status of a relatively small number of Internet search engines, leads to a biased set of search algorithms that privilege whiteness and discriminate against people of color, specifically women of color.
Through an analysis of textual and media searches as well as extensive research on paid online advertising, Noble exposes a culture of racism and sexism in the way discoverability is created online. As search engines and their related companies grow in importance-operating as a source for email, a major vehicle for primary and secondary school learning, and beyond-understanding and reversing these disquieting trends and discriminatory practices is of utmost importance.
An original, surprising and, at times, disturbing account of bias on the internet, Algorithms of Oppression contributes to our understanding of how racism is created, maintained, and disseminated in the 21st century.
Safiya Noble discusses search engine bias in an interview with USC Annenberg School for Communication and Journalism
Today we are witnessing dramatic changes in the way scientific and scholarly knowledge is created, codified, and communicated. This transformation is connected to the use of digital technologies and ...the virtualization of knowledge. In this book, scholars from a range of disciplines consider just what, if anything, is new when knowledge is produced in new ways. Does knowledge itself change when the tools of knowledge acquisition, representation, and distribution become digital? Issues of knowledge creation and dissemination go beyond the development and use of new computational tools. The book, which draws on work from the Virtual Knowledge Studio, brings together research on scientific practice, infrastructure, and technology. Focusing on issues of digital scholarship in the humanities and social sciences, the contributors discuss who can be considered legitimate knowledge creators, the value of "invisible" labor, the role of data visualization in policy making, the visualization of uncertainty, the conceptualization of openness in scholarly communication, data floods in the social sciences, and how expectations about future research shape research practices. The contributors combine an appreciation of the transformative power of the virtual with a commitment to the empirical study of practice and use.
The scope of this volume will encompass a collection of research papers related to indexing and retrieval of online non-text information. In recent years, the Internet has seen an exponential ...increase in the number of documents placed online that are not in textual format. These documents appear in a variety of contexts, such as user-generated content sharing websites, social networking websites etc. and formats, includingphotographs, videos, recorded music, data visualizations etc. The prevalence of these contexts and data formats presents a particularly challenging task to information indexing and retrieval research due to many difficulties, such as assigning suitable semantic metadata, processing and extracting non-textual content automatically, and designing retrieval systems that 'speak in the native language' of non-text documents. Diane Rasmussen Neal, Faculty of Information and Media Studies, The University of Western Ontario, Canada
Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy ...and its impacts, and have motivated Information Systems researchers to explore information privacy issues, including technical solutions to address these concerns. In this paper, we inform researchers about the current state of information privacy research in IS through a critical analysis of the IS literature that considers information privacy as a key construct. The review of the literature reveals that information privacy is a multilevel concept, but rarely studied as such. We also find that information privacy research has been heavily reliant on studentbased and USA-centric samples, which results in findings of limited generalizability. Information privacy research focuses on explaining and predicting theoretical contributions, with few studies in journal articles focusing on design and action contributions. We recommend that future research should consider different levels of analysis as well as multilevel effects of information privacy. We illustrate this with a multilevel framework for information privacy concerns. We call for research on information privacy to use a broader diversity of sampling populations, and for more design and action information privacy research to be published in journal articles that can result in IT artifacts for protection or control of information privacy.
This book is a quick-paced guide that focuses on the core concepts and knowledge, in just enough words, to help aspiring as well as existing CISOs learn about vital tasks in an easy way. This book ...will take you from the basics of CISO and security leadership roles to complex key tasks necessary for becoming a global CISO.
While information privacy has been studied in multiple disciplines over the years, the advent of the information age has both elevated the importance of privacy in theory and practice, and increased ...the relevance of information privacy literature for Information Systems, which has taken a leading role in the theoretical and practical study of information privacy. There is an impressive body of literature on information privacy in IS, and the two Theory and Review articles in this issue of MIS Quarterly review this literature. By integrating these two articles, this paper evaluates the current state of the IS literature on information privacy (where are we now?) and identifies promising research directions for advancing IS research on information privacy (where should we go?). Additional thoughts on further expanding the information privacy research in IS by drawing on related disciplines to enable a multidisciplinary study of information privacy are discussed.
•PLS-PM has been subject to many improvements in last years.•Prior PLS guidelines have not covered the entire recent developments.•We explain how to perform and report an up-to-date empirical ...analysis with PLS.•We provide a fictive illustrative example on business value of social media.
Partial least squares path modeling (PLS-PM) is an estimator that has found widespread application for causal information systems (IS) research. Recently, the method has been subject to many improvements, such as consistent PLS (PLSc) for latent variable models, a bootstrap-based test for overall model fit, and the heterotrait-to-monotrait ratio of correlations for assessing discriminant validity. Scholars who would like to rigorously apply PLS-PM need updated guidelines for its use. This paper explains how to perform and report empirical analyses using PLS-PM including the latest enhancements, and illustrates its application with a fictive example on business value of social media.