{"title":"Risk assessment tools on trial: Lessons learned for “Ethical AI” in the criminal justice system","authors":"Neha Chugh","doi":"10.1109/istas52410.2021.9629143","DOIUrl":"https://doi.org/10.1109/istas52410.2021.9629143","url":null,"abstract":"In 2018, the Supreme Court decision of Ewert v Canada confirmed that risk assessment tools such as the psychopathy checklists used by Correctional Services of Canada (CSC), failed to account for cultural heritage of the offender, specifically Indigeneity and the impact of colonialism on Canada’s Aboriginal communities. A further review of Canadian case-law post-Ewert reveals that Canadian courts continue their reliance on risk assessment tools despite the critiques from the legal community and from the Supreme Court of Canada. This paper reviews lessons learned from the Canadian experience of Ewert’s challenge of risk assessment tools and to highlight ethical concerns that are being considered in the implementation of artificial intelligence in the criminal justice system.","PeriodicalId":314239,"journal":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125257592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Disinformation and online harms: Understanding the links to private messaging apps in Canada","authors":"M.J. Masoodi, Sam Andrey","doi":"10.1109/istas52410.2021.9629182","DOIUrl":"https://doi.org/10.1109/istas52410.2021.9629182","url":null,"abstract":"Amid the COVID-19 pandemic, governments have been facing an increased spread of disinformation on social media by foreign and domestic actors. Indeed, the COVID-19 pandemic has highlighted the online challenges of disinformation facing Western governments and societies, including Canada. However, much of the scholarly work on disinformation has focussed on analyzing the flows of false content during political or electoral processes including how political disinformation can undermine voter autonomy by changing opinions and eventually voting preferences.12 Furthermore, the focus of such works is mostly centred around the role of open social media platforms (e.g., Facebook, Instagram, Twitter, etc.). This presentation on the other hand seeks to counter this dominant trend. Based on findings from original research, supported by the Democratic Institutions Secretariat in Canada’s Privy Council Office, this presentation will delve deeper into our survey of 2,500 Canadians in March 2021, revealing their experiences with disinformation and other online harms on private messaging apps (e.g., WhatsApp, Facebook Messenger, WeChat, etc.) in a post-pandemic context. Indeed, private messaging apps have been described as the next refuge for actors such as members of the far-right and white nationalists, as social media platforms like Facebook face increased political pressure to remove harmful content.3 This presentation will shed light on the types and impacts of mis/disinformation encountered through the private platforms. Nearly half of respondents reported receiving false information at least monthly and those who believe in COVID-19 conspiracy theories were much more likely to regularly receive news through private messages. This presentation will provide a deeper and broader understanding on the spread and evolution of disinformation in Canada, and importantly, it will discuss potential regulatory measures and the need to balance policy with democratic rights and freedoms including privacy and free expression.","PeriodicalId":314239,"journal":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121150328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sandra I. Woolley, Tim Collins, Peter Andras, Allison Gardner, M. Ortolani, J. Pitt
{"title":"Compounding barriers to fairness in the digital technology ecosystem","authors":"Sandra I. Woolley, Tim Collins, Peter Andras, Allison Gardner, M. Ortolani, J. Pitt","doi":"10.1109/istas52410.2021.9629166","DOIUrl":"https://doi.org/10.1109/istas52410.2021.9629166","url":null,"abstract":"A growing sense of unfairness permeates our quasi-digital society. Despite drivers supporting and motivating ethical practice in the digital technology ecosystem, there are compounding barriers to fairness that, at every level, impact technology innovation, delivery and access. Amongst these are barriers and omissions at the earliest stages of technology intentionality and design; systemic inadequacies in sensing systems that deteriorate performance for individuals based on ethnicity, age and physicality; system design, co-requisite and interface decisions that limit access; biases and inequities in datasets and algorithms; and limiting factors in system function and security. Additionally, there are concerns about unethical and illegal practices amongst digital technology providers: for example, in planned obsolescence and anti-competitive behaviors, failings in data practices and security, and in responses to problematic use and behaviors. It is critical that these failings are identified and addressed to better evolve a fairer future digital technology ecosystem. This paper contributes a perspective on technological stewardship and innovation; it identifies the compounding nature of barriers to fairness in the current digital technology ecosystem, and contrasts these with the non-compounding fairness drivers that, in general, establish minimum requirements.","PeriodicalId":314239,"journal":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115616511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emerging ransomeware threats: An anticipatory ethical anaylsis","authors":"Richard Wilson, Ion A. Iftimie","doi":"10.1109/istas52410.2021.9629211","DOIUrl":"https://doi.org/10.1109/istas52410.2021.9629211","url":null,"abstract":"Ransomware has become a primary security risk to businesses, and it is now the fastest-growing category of cybercrime. Furthermore, ransomware attacks on healthcare, energy and water distribution, and defense contractor organizations have begun to impact both business and national security. Traditional ransomware encrypts files on an infected computer which blocks users’ access until a sum of money or ransom is paid, often via cryptocurrencies like Bitcoin or Ethereum. Businesses and individuals who become victims of ransomware attacks are faced with the expense of paying the ransom, or restoring files from backup if this available, losing files altogether or completely restoring the files. Beginning in late 2019, cybercriminals stepped up their game by deploying new attacks known as “double-extortion” ransomware, within which files are stolen before being encrypted. Even if an organization might be able to recover its data from backups, by stealing the files first before the files are encrypted, the attacker can still profit either by selling any confidential data on the dark web or by further extorting the business and threatening to leak sensitive information unless an even larger ransom is paid. As of 2021, double-extortion ransomware is still in its infancy, but it can be anticipated that possible long-term trends toward even more persistent multiple-extortion tactics, in which stolen data could continue to be used by cybercriminals, terrorists, and rogue nation-states potentially decades in the future will continue. Traditional, passive measures in cybersecurity and business continuity, like firewalls, antivirus software, and frequent backups, are not sufficient to protect organizations from this new type of data theft and extortion enterprise. Government agencies and private corporations alike are beginning to employ active cyber threat hunters and intelligence analysts to detect and neutralize this newest class of persistent threat. This anticipatory ethical analysis will attempt to identify future threats from the development of Multiple-Extortion Ransomware and use this ethical analysis as the basis for developing policy about future ransomware developments.","PeriodicalId":314239,"journal":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114528512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Nathani, Ryan Jenkins, Foaad Khosmood, Christine Robertson
{"title":"Exploring gaps in California Proposition 54 (2016)","authors":"S. Nathani, Ryan Jenkins, Foaad Khosmood, Christine Robertson","doi":"10.1109/istas52410.2021.9629129","DOIUrl":"https://doi.org/10.1109/istas52410.2021.9629129","url":null,"abstract":"California Proposition 54, 2016 (Prop 54) attempted to address gaps in government transparency at the state level by requiring legislative proceedings to be published on the internet, but failed to consider the traditional barriers that limit citizen participation in policy. This study aims to understand where Prop 54 falls short in regards to improving government transparency, evaluating the traditional barriers that prevent citizens from participating in government, identifying the improvements that should be made to increase the impact of Prop 54, and proposing ways artificial intelligence can help with these improvements. Prop 54 makes an overwhelming amount of information to be made available online, an amount that is not searchable by people. The data includes thousands of recordings of legislative sessions which are over an hour on average, but lack transcripts, summaries, or even a descriptive title. In addition, a barrier which prevents everyday people from participating in policy that remains is that most citizens lack the ability to comprehend sophisticated legal terminology presented in the released data. The research method used in this paper is a literature review, and this paper proposes addressing these challenges by implementing artificial intelligence-based solutions with natural language processing and computer vision. These tools can be used to create high-quality, searchable transcripts and generate simplified summaries of legislative proceedings, addressing both of the previously mentioned problems.","PeriodicalId":314239,"journal":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129615310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The importance of grant funding for growing engagement in ethical engineering education","authors":"Jason Lajoie, Jin Sol Kim, Heather A. Love","doi":"10.1109/istas52410.2021.9629199","DOIUrl":"https://doi.org/10.1109/istas52410.2021.9629199","url":null,"abstract":"Since grant funding agencies influence the scope of academic research, they are ideally suited to help propel research that advances ethical inquiry and ethical instruction in engineering. In this short paper we draw from our ongoing Knowledge Synthesis research funded by the Social Sciences and Humanities Research Council (SSHRC) to highlight ways that grant agencies and academic institutions can more effectively provide resources that empower faculty to engage with engineering ethics, particularly macro-ethical concerns related to the social, cultural, and environmental impacts of technological innovation.","PeriodicalId":314239,"journal":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129767251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building trust for data sourcing with the disabled community to build robust AI systems","authors":"Monica Tsang","doi":"10.1109/istas52410.2021.9629180","DOIUrl":"https://doi.org/10.1109/istas52410.2021.9629180","url":null,"abstract":"This research explores how to build trust between the disabled community and machine learning and AI developers. This is to encourage people with disabilities to contribute their data to build robust models that cater to a greater population. A conflicting reality exists where people with disabilities want to be accommodated in machine learning and AI systems, but they are afraid of sharing their disability status and data with AI developers. The disabled community is subjected to unfair treatment in their daily lives. Many individuals conceal their disability status to avoid being given inferior service or costly biased outcomes in healthcare, insurance premiums, and employment opportunities. When people with disabilities are not included in the data collection process, the results of the machine learning and AI systems will not cater to the needs and preferences of these minority groups. This research will examine the circumstances and privacy protection strategies will people with disabilities garner trust in contributing their data to develop inclusive AI technology solutions. The research will share the opinions of individuals from the communities with sensory disabilities and mobility issues.","PeriodicalId":314239,"journal":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128972820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
David Kolevski, Katina Michael, Roba Abbas, M. Freeman
{"title":"Cloud computing data breaches: A review of U.S. regulation and data breach notification literature","authors":"David Kolevski, Katina Michael, Roba Abbas, M. Freeman","doi":"10.1109/istas52410.2021.9629173","DOIUrl":"https://doi.org/10.1109/istas52410.2021.9629173","url":null,"abstract":"Cloud computing services have enjoyed explosive growth over the last decade. Users are typically businesses and government agencies who are able to scale their storage and processing requirements, and choose from pre-defined services (e.g. specific software-as-a-service applications). But with this outsourcing has also come the potential for data breaches targeted at the end-user, typically consumers (e.g. who purchase goods at an online retail store), and citizens (e.g. who transact information for their social security needs). This paper briefly introduces U.S.-based cloud computing regulation, including the U.S. Health Insurance Portability and Accountability Act (HIPPA), the Gramm Leach Bliley Act (GLBA), and the U.S. Stored Communications Act (SCA). We present how data breach notification (DBN) works in the U.S. by examining three mini-case examples: the 2011 Sony PlayStation Network data breach, the 2015 Anthem Healthcare data breach, and the 2017 Equifax data breach. The findings of the paper show that there is a systemic failure to learn from past data breaches, and that data breaches not only affect business and government clients of cloud computing services but their respective end-user customer base. Finally, the level of sensitivity of data breaches is increasing, from cloud computing hacks on video game platforms, to the targeting of more lucrative network and computer crime abuses aiming at invasive private health and financial data.","PeriodicalId":314239,"journal":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125591725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technology at the border: Anxiety of progress and the ethics of connection in Sleep Dealer","authors":"P. Brescia","doi":"10.1109/istas52410.2021.9629119","DOIUrl":"https://doi.org/10.1109/istas52410.2021.9629119","url":null,"abstract":"The dystopian movie Sleep Dealer (2008, Dir. Alex Rivera) ponders upon the effects of technology in the social fabric of Mexican and US societies. This topic, frequent in science fiction movies, is addressed in Sleep Dealer in particular ways, both in the choice of space (the border between Mexico and the United States) and main theme (labor relations). I will analyze the movie’s speculation of a possible future by focusing on four basic “conflict/contact zones”. The multiple connections in the movie (with technology, with alternative worlds, with the global economy, with other beings) may be viewed as “border crossings” and point to what in other works I have termed an “anxiety of progress” that questions pre-conceived notions of national and personal identity and the very idea of the human.","PeriodicalId":314239,"journal":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125289835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Welcome Message from the President of IEEE SSIT","authors":"","doi":"10.1109/istas52410.2021.9629157","DOIUrl":"https://doi.org/10.1109/istas52410.2021.9629157","url":null,"abstract":"","PeriodicalId":314239,"journal":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116530567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}