Propaganda & Bias In Social Media News

The Fourth Industrial Revolution is beginning to pose some tough ethical questions. Can it be ensured that technology works for society?

In the weeks since the US presidential election, Facebook CEO Mark Zuckerberg has been firefighting. Widespread accusations assert that his social media company contributed to the election’s unexpected outcome by propagating fake news and “filter bubbles.”

Zuckerberg has harshly refuted these allegations, but the case poses a thorny question: How do we ensure that technology works for society?

A Fourth Industrial Revolution is arising that will pose tough ethical questions with few simple, black-and-white answers. 

Smaller, more powerful and cheaper sensors; cognitive computing advancements in artificial intelligence, robotics, predictive analytics and machine learning; nano, neuro and biotechnology; the Internet of Things; 3D printing; and much more, are already demanding real answers really fast. 

And this will only get harder and more complex when we embed these new technologies into our bodies and brains to enhance our physical and cognitive functioning.

Take the choice society will soon have to make about autonomous cars as an example. If a crash cannot be avoided, should a car be programmed to minimize bystander casualties even if it harms the car’s occupants, or should the car protect its occupants under any circumstances?

Research demonstrates the public is conflicted. Consumers would prefer to minimise the number of overall casualties in a car accident, yet are unwilling to purchase a self-driving car if it is not self-protective. 

Of course, the ideal option is for companies to develop algorithms that bypass this possibility entirely, but this may not always be an option. What is clear, however, is that such ethical quandaries must be reconciled before any consumer hands over their keys to dark-holed algorithms.

The widespread adoption of new technologies is unlikely to prevail if consumers are not certain about their underlying ethics. The challenge is that identifying realistic solutions requires the input and expertise of a whole variety of stakeholders with differing interests: leaders of technology companies who are trying to innovate while turning a profit; regulators in varying jurisdictions who must form policies to protect the public; ethicists who theorise with evaluations of the unintended risks and benefits; public health researchers who are looking out for the public’s health; and many others.

With so many different stakeholders involved, how do we ensure a governance model that will make technology work for society?

What is needed is strong, anticipatory guidance by those who intersect the technology, health and ethics worlds to determine how we develop and deploy technologies that deliver the greatest societal benefits. It requires an approach not built on doing it alone at the country-level (as espoused by President-elect Donald Trump), but an inter-sectoral and inter-governmental approach. The World Economic Forum’s recently announced Center for the Fourth Industrial Revolution may be one venue to start these conversations.

Ultimately, evaluation of the net effect of new technologies on individuals and society is needed to identify appropriate rules and boundaries. Mark Zuckerberg might consider a public discussion and debate among leaders from different sectors and nations to establish Facebook’s real role in delivering information. 

No matter how we view artificial intelligence technologies, we know they carry certain consequences, some good, some bad, but none neutral.

TechCrunch:             Claims That Google's Search Algorithm Spread False Information:
 

« Shades of Watergate – The Fake Russian Hacking
Ransom Worm: The Next Level Of Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

Global Secure Solutions (GSS)

Global Secure Solutions (GSS)

Global Secure Solutions is an IT security and risk consulting firm and authorised ISO training partner for the PECB.

Stratogent

Stratogent

Stratogent does IT and Cybersecurity operations. We specialize in high-touch and high-change IT environments, especially in the biotech and pharma industry verticals.

Alarum Technologies

Alarum Technologies

Alarum Technologies (formerly Safe-T) is a global provider of cyber security and privacy solutions to consumers and enterprises.

PakCERT

PakCERT

PakCERT is the national Computer Emergency Response Team for Pakistan.

Advisen

Advisen

Advisen is the leading provider of data, media, and technology solutions for the commercial property and casualty insurance market including cyber risk.

EU Joint Research Centre

EU Joint Research Centre

JRC is the European Commission's science and knowledge service which employs scientists to carry out research in order to provide independent scientific advice and support to EU policy.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

Cira Info Tech

Cira Info Tech

Cira InfoTech’s cyber security and network consulting and managed services deliver unmatched talented resources and capabilities required to design and build an agile and adaptive IT environment.

Zephyr Project

Zephyr Project

The Zephyr Project strives to deliver the best-in-class RTOS for connected resource-constrained devices, built to be secure and safe.

Pacific Cyber Security Operational Network (PaCSON)

Pacific Cyber Security Operational Network (PaCSON)

PaCSON is an operational cyber security network of regional working-level cyber security experts in the Pacific.

DeepFactor

DeepFactor

DeepFactor is the industry’s first Continuous Observability platform enabling Engineering and AppSec teams to find and triage RUNTIME security, privacy, and compliance risks in your applications.

CyberCatch

CyberCatch

CyberCatch provides an innovative cybersecurity Software-as-a-Service (SaaS) platform designed for SMBs.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.

PROVINTELL Cyber Security

PROVINTELL Cyber Security

PROVINTELL is a Managed Security Service Provider (MSSP) specialising in Next-Gen Cyber Defense and Response to detect and respond to threats.

Knownsec

Knownsec

Knownsec provides customers with cloud defense, cloud monitoring, and cloud mapping products and services with "AI + security big data" as the underlying capability.