You are here

Data Exploitation

Increasingly everything we do generates data, whether we are in possession of a device or not. Our devices, networks, and homes generate data. Our transport systems, cars, payment systems, and cities also generate data through us and about us. With all this data, we may be able to make the world a fairer, better, cleaner, more sustainable and safe place. The opposite may also apply.

Our devices and infrastructure often designed for data exploitation. This must change. The individual must have control over his or her data, how it is generated, collected and used. The fundamental architecture of modern technology, its functions and operations, and deployment must be structured to prevent data exploitation.

On this platform we collect cases and stories that demonstrate the scope and prevalence of data exploitation.

facial recognition

Vocabulary View: 
Appear on vocabulary view

Internet of Things

Vocabulary View: 

health data

Vocabulary View: 
Appear on vocabulary view

law enforcement

Vocabulary View: 
Appear on vocabulary view

discrimination

Vocabulary View: 
Appear on vocabulary view

poverty

Vocabulary View: 
Appear on vocabulary view

Recent Stories In The News