Educational

Examples, Explainer, Educational Case Study, Course, Guide

In the wake of Tesla’s first recorded autopilot crash, automakers are reassessing the risk involved with rushing semi-autonomous driving technology into the hands of distractible drivers. But another aspect of autopilot—its ability to hoover up huge amounts of mapping and “fleet learning” data—is
02 Aug 2016
At the 2016 Usenix Workshop on Offensive Technologies, researchers from the University of Michigan presented the results of tests that showed that industrial vehicles - a 2006 semi-trailer and a 2001 school bus - were subject to the same security flaws as had already been found in domestic cars. Via
In 2013, in collaboration with the Illinois Institute of Technology, the Chicago Police Department set up the Strategic Subjects List, an effort to identify the most likely victims and perpetrators of gun violence. In 2016, a report published by the RAND Corporation found that the project, which had
The light surrounding you this very second may be used to expose how much money you make, where you live, when you're home, and much more. That's the big takeaway from A 2016 analysis of ambient light sensors by London-based security and privacy consultant and University College London researcher
03 Sep 2016
In May 2014 the Polish Ministry of Labor and Social Policy (MLSP) introduced a scoring system to distribute unemployment assistance. Citizens are divided into three categories by their “readiness” to work, the place they live, disabilities and other data. Assignment to a given category determines
18 Oct 2016
A 2016 report, "The Perpetual Lineup", from the Center for Privacy and Technology at Georgetown University's law school based on records from dozens of US police departments found that African-Americans are more likely to have their images captured, analysed, and reviewed during computerised
12 Jan 2016
In 2016 reports surfaced that bricks-and-mortar retailers were beginning to adopt physical-world analogues to the tracking techniques long used by their online counterparts. In a report, Computer Sciences Corporation claimed that about 30% of retailers were tracking customers in-store via facial
08 Sep 2016
The "couples vibrator" We-Vibe 4 Plus is controlled via a smartphone app connected to the device via Bluetooth. In 2016, researchers revealed at Defcon that the devices uses its internet connectivity to send information back to its manufacturer including the device's temperature, measured every
12 Feb 2016
Caucuses, which are used in some US states as a method of voting in presidential primaries, rely on voters indicating their support for a particulate candidate by travelling to the caucus location. In a 2016 Marketplace radio interview, Tom Phillips, the CEO of Dstillery, a big data intelligence
11 Dec 2015
In what proved to be the first of several years of scandals over the use of personal data in illegal, anti-democratic campaigning, in 2015 the Guardian discovered that Ted Cruz's campaign for the US presidency paid at least $750,000 that year to use tens of millions of profiles of Facebook users
06 Jun 2016
In 2016, security expert Ken Munro discovered security bugs in the onboard wifi in Mitsubishi's Outlander hybrid car that could be exploited to turn off the car's alarm. Some aspects of the Outlander can be controlled by a smartphone app that talks to the car via the onboard wifi. Security flaws in
18 Aug 2016
In a presentation given at the Knowledge Discovery and Data Mining conference in 2016, researchers discussed a method of using the data generated by smart card public transport tickets to catch pickpockets. In a study of 6 million passenger movements in Beijing, the researchers used a classifier to
20 May 2015
In 2015, a newly launched image recognition function built into Yahoo's Flickr image hosting site automatically tagged images of black people with tags such as "ape" and "animal", and also tagged images of concentration camps with "sport" or "jungle gym". The company responded to user complaints by
20 May 2015
Over the course of a few seconds in April 2013, a false tweet from a hacked account owned by the Associated Press is thought to have caused the Dow-Jones Industrial Average to drop 143.5 points and the Standard & Poor's 500 Index to lose more than $136 in value. The tweet was retweeted 4,000 times
In the early 2000s, "Agbogbloshie", a section of Old Fadama, a large slum on the outskirts of Accra, Ghana, became a dumping ground for unwanted electronic waste, recast as "donations", from the developed world, which found it cheaper to ship in bulk than to recycle: old computers, cameras, TV sets
08 Nov 2016
In 2016, researchers at MIT developed a wristband device to automate tracking screen time based on an off-the-shelf colour sensor used to calibrate colour and brightness in TVs and other screens and a learning algorithm that could detect when a screen was nearby. The device was intended for use in a