Spring 2017 Schedule of Topics
browse the Social Media Research Toolkit
find a tool that interests you
identify an academic paper associated with that tool (they’re linked next to the tool)
read the paper.
write a summary of the paper (.5 page at most), then use zotero to … a. include an inline citation b. include a bibliography section containing the full reference to the paper.
store your summary in your google drive or other online accessible location.
see homework 1 for papers and day on which you will lead class discussion.
the economy or “marketplace” for computer security criminals
NEW Approach: change the economics for the bad guys?
** published 700 terabytes of actionable threat intelligence data, including information on real-time attacks that can be used to stop cybercrime in its tracks. And to date, over 4,000 organizations are leveraging this data, including half of the Fortune 100.**
So in some sense, it’s really not the algorithm’s fault at all. It’s, in a large way, the way we apply algorithms and the way we trust them that is the problem.
people just trust numbers, they trust scores
worrisome algorithms:
1. high impact
2. opaque
3. destructive
In the face of important or expensive errors, discrimination, unfair denials of public services, or censorship, when and how should algorithms be reined in?
prioritize, classify, associate, and filter
One issue with the church of big data is its overriding faith in correlation as king. “Correlation does not equal causation”
algorithms are largely unregulated now, and they are indeed exercising power over individuals or policies in a way that in some cases (for example, hidden government watch lists) lacks any accountability whatsoever. recidivism???
Freedom of Information Processing Act
human involvement, data, the model, inferencing, and algorithmic presence.
machine to human explainers?