An Ethical Approach to Big Data Surveillance

Shouyang Wang discusses the trade-off that has occurred between personal privacy and national security in the context of government surveillance programs in a post-9/11 United States. This paper argues that there is an ethical framework that the U.S. government can follow when conducting mass surveillance. The framework is based on various philosophical theories, constitutional rights, and judicial rulings to ensure an ethical and optimized balance between individual privacy and government monitoring.

Read More

Social Media and Information Warfare: The New Front

Tiffany Pham discusses the evolution of social media platforms and content from information-sharing spaces to a communication medium that is being used both as a propaganda tool and a tactical weapon during conflicts. Social media has created a new warfront in geopolitical conflicts where opposing sides engage in a form of combat with consequences that are both physical and destructive. The weaponization of social media has presented itself in multiple ways, and can have far-reaching impacts during almost any type of conflict.

Read More

Social Media: Information Communicator or Destroyer

Harshita Chandgothia discusses the paradigm-changing impact of social media technologies have had on human communication and communication systems. It explores the both the position impact as well as the negative, including how information can be weaponized so easily on social media platforms. Humans may have to come to simply accept the risks, and do the best to prepare against them. One way or another, society must continue to adapt through this ongoing, massive technological evolution.

Read More

The Importance of AI Governance and Policy: The Ethics of a New Digital World

Linda Chen discusses how artificial intelligence, also known as AI, has transformed lives and societies across the globe. Through a national security lens, AI technology systems have allowed nation states to better prevent malicious cybersecurity threats as well as make data-driven decisions. However, AI also increases the risk of strategic stability for nation states and increases the risk of misinformation/disinformation. Given the moral and accountability risks of AI-enabled machines, this paper argues that governments should cooperate with other nations to create international regulations that can hold perpetrators accountable and better regulate AI development.

Read More

Privacy Concerns and Weaponization of TikTok

Alex Gherman discusses how TikTok has established itself as a powerhouse in entertainment and social media since its launch in 2016, touting 1.2 billion active monthly users and bringing in annual revenue of $4.6 billion as of the end of 2021. This popularity has not flourished without its share of criticism and scrutiny, especially considering the app’s origins and ownership within China. These concerns are largely aimed at issues of privacy and the use of the platform as an information weapon.

Read More

Deepfake Risk Management

Emily O’Neill discusses how deepfakes—pictures, videos or other recording that is altered with AI—have become a rapidly advancing technology with a range of criminal applications. Deepfake risk management remains critically under-examined in the current literature. As such, this paper aims to add to the conversation by exploring the risks deepfakes pose to the private sector as well as identifying corresponding mitigation techniques.

Read More

Facebook Weak Controls and Risk Mitigation Opportunities

Macay Fischer discusses the wake of the 2021 hack of Facebook user data, which highlighted yet again how critical it is that a massive public company like Facebook requires robust risk management practices integrated through all levels of the business. The author identifies potential risk mitigation opportunities—including increasing the effectiveness of existing internal controls—that Facebook could implement going forward to reduce its risks in these areas.

Read More

Safeguarding Children’s Privacy

Kate Peterson discusses the risks associated with the practice of “sharenting” where parents post photos and share detailed information on social media about their child’s life. As a result, many children now have a digital footprint long before they can use the internet or create social media accounts themselves. Being able to crowdsource challenges and share information with other parents can function as an important part of a caregiver’s support system. However, the practice also increases a child’s risk of identity theft, stalking, cyberbullying, and may violate a child’s privacy, resulting in serious—if unintended—consequences.

Read More

Epic Games Vs. Apple

Raphael Kyle Caoile Manansala discusses the actions of Epic Games on August 13, 2020 when the company introduced a gaming update that included a new payment system where revenue would go directly and entirely to Epic Games. This was accomplished by circumventing Apple’s 30% fee by not using Apple’s in-app payment system that all Apple Store applications (“app(s)”, also referred to as program(s)) are subjected to use. Because Epic Games knowingly violated the App Store’s terms and conditions, Apple removed the game from the App Store. Epic Games responded with an anti-trust lawsuit against Apple. If Epic proves that Apple’s practices are anti-competitive and an unfair monopoly, it could lead to the App Store fundamentally changing.

Read More

Tech Abuse Through a Feminist Ethics Lens

Aki Shibuya discusses the outcome of assessing technology-enabled abuse through a feminist ethical framework. If culturally dominant understandings of social constructs such as privacy minimize or exclude the experiences of women, these ideas can negatively impact policy decisions made around issues like tech abuse. Applying feminist ethics to issues such as tech abuse encourages a re-examination of how ethical frameworks can influence current norms and policies.

Read More