13
Digital Vulnerability: Characterizing Risks and Contemplating Responses @ChrisDiehl July 28, 2016

Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses

Embed Size (px)

Citation preview

Page 1: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses

Digital Vulnerability:Characterizing Risks and Contemplating

Responses

@ChrisDiehl

July 28, 2016

Page 2: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses
Page 3: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses

Global Impact&

Local Perspective

Page 4: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses

AgendaCurrent RisksPotential ResponsesExisting GapsFuture Options

Page 5: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses

Digital Vulnerability

Unwitting Disclosure

Discrimination

Witting Disclosure

Privilege

Marginalization Opportunity

Page 6: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses

Disclosure Risk

Page 7: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses

Prediction Risk

Page 8: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses

Actuation Risk

Page 9: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses

Where to Start?The Design Conversation

Page 10: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses

Defining the Middle Ground

No Raw Data Collection

andRetention

UnconstrainedRaw Data

Collection andRetention

No Personalization “Measure and PredictAll the Things”

Private, Fair, Interpretable

Inference

“Equitable Inference”

Page 11: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses

Existing GapsWidely Understood OptionsTrusted ImplementationsDesign Patterns and Principles

Page 12: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses

Community Knowledge Creation and Dissemination1. Define Algorithmic Options2. Develop Best Practices and

Open-Source Implementations3. Teach the Approaches4. Gather Feedback from

Practitioners

Page 13: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses

Let’s Do This!bit.ly/

equitable_inference_experiment

[email protected]