wrangle 2016 - digital vulnerability: characterizing risks and contemplating responses
TRANSCRIPT
![Page 1: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses](https://reader034.vdocument.in/reader034/viewer/2022042707/586f79fe1a28ab10258b716b/html5/thumbnails/1.jpg)
Digital Vulnerability:Characterizing Risks and Contemplating
Responses
@ChrisDiehl
July 28, 2016
![Page 2: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses](https://reader034.vdocument.in/reader034/viewer/2022042707/586f79fe1a28ab10258b716b/html5/thumbnails/2.jpg)
![Page 3: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses](https://reader034.vdocument.in/reader034/viewer/2022042707/586f79fe1a28ab10258b716b/html5/thumbnails/3.jpg)
Global Impact&
Local Perspective
![Page 4: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses](https://reader034.vdocument.in/reader034/viewer/2022042707/586f79fe1a28ab10258b716b/html5/thumbnails/4.jpg)
AgendaCurrent RisksPotential ResponsesExisting GapsFuture Options
![Page 5: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses](https://reader034.vdocument.in/reader034/viewer/2022042707/586f79fe1a28ab10258b716b/html5/thumbnails/5.jpg)
Digital Vulnerability
Unwitting Disclosure
Discrimination
Witting Disclosure
Privilege
Marginalization Opportunity
![Page 6: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses](https://reader034.vdocument.in/reader034/viewer/2022042707/586f79fe1a28ab10258b716b/html5/thumbnails/6.jpg)
Disclosure Risk
![Page 7: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses](https://reader034.vdocument.in/reader034/viewer/2022042707/586f79fe1a28ab10258b716b/html5/thumbnails/7.jpg)
Prediction Risk
![Page 8: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses](https://reader034.vdocument.in/reader034/viewer/2022042707/586f79fe1a28ab10258b716b/html5/thumbnails/8.jpg)
Actuation Risk
![Page 9: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses](https://reader034.vdocument.in/reader034/viewer/2022042707/586f79fe1a28ab10258b716b/html5/thumbnails/9.jpg)
Where to Start?The Design Conversation
![Page 10: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses](https://reader034.vdocument.in/reader034/viewer/2022042707/586f79fe1a28ab10258b716b/html5/thumbnails/10.jpg)
Defining the Middle Ground
No Raw Data Collection
andRetention
UnconstrainedRaw Data
Collection andRetention
No Personalization “Measure and PredictAll the Things”
Private, Fair, Interpretable
Inference
“Equitable Inference”
![Page 11: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses](https://reader034.vdocument.in/reader034/viewer/2022042707/586f79fe1a28ab10258b716b/html5/thumbnails/11.jpg)
Existing GapsWidely Understood OptionsTrusted ImplementationsDesign Patterns and Principles
![Page 12: Wrangle 2016 - Digital Vulnerability: Characterizing Risks and Contemplating Responses](https://reader034.vdocument.in/reader034/viewer/2022042707/586f79fe1a28ab10258b716b/html5/thumbnails/12.jpg)
Community Knowledge Creation and Dissemination1. Define Algorithmic Options2. Develop Best Practices and
Open-Source Implementations3. Teach the Approaches4. Gather Feedback from
Practitioners