Propaganda & Bias In Social Media News

The Fourth Industrial Revolution is beginning to pose some tough ethical questions. Can it be ensured that technology works for society?

In the weeks since the US presidential election, Facebook CEO Mark Zuckerberg has been firefighting. Widespread accusations assert that his social media company contributed to the election’s unexpected outcome by propagating fake news and “filter bubbles.”

Zuckerberg has harshly refuted these allegations, but the case poses a thorny question: How do we ensure that technology works for society?

A Fourth Industrial Revolution is arising that will pose tough ethical questions with few simple, black-and-white answers. 

Smaller, more powerful and cheaper sensors; cognitive computing advancements in artificial intelligence, robotics, predictive analytics and machine learning; nano, neuro and biotechnology; the Internet of Things; 3D printing; and much more, are already demanding real answers really fast. 

And this will only get harder and more complex when we embed these new technologies into our bodies and brains to enhance our physical and cognitive functioning.

Take the choice society will soon have to make about autonomous cars as an example. If a crash cannot be avoided, should a car be programmed to minimize bystander casualties even if it harms the car’s occupants, or should the car protect its occupants under any circumstances?

Research demonstrates the public is conflicted. Consumers would prefer to minimise the number of overall casualties in a car accident, yet are unwilling to purchase a self-driving car if it is not self-protective. 

Of course, the ideal option is for companies to develop algorithms that bypass this possibility entirely, but this may not always be an option. What is clear, however, is that such ethical quandaries must be reconciled before any consumer hands over their keys to dark-holed algorithms.

The widespread adoption of new technologies is unlikely to prevail if consumers are not certain about their underlying ethics. The challenge is that identifying realistic solutions requires the input and expertise of a whole variety of stakeholders with differing interests: leaders of technology companies who are trying to innovate while turning a profit; regulators in varying jurisdictions who must form policies to protect the public; ethicists who theorise with evaluations of the unintended risks and benefits; public health researchers who are looking out for the public’s health; and many others.

With so many different stakeholders involved, how do we ensure a governance model that will make technology work for society?

What is needed is strong, anticipatory guidance by those who intersect the technology, health and ethics worlds to determine how we develop and deploy technologies that deliver the greatest societal benefits. It requires an approach not built on doing it alone at the country-level (as espoused by President-elect Donald Trump), but an inter-sectoral and inter-governmental approach. The World Economic Forum’s recently announced Center for the Fourth Industrial Revolution may be one venue to start these conversations.

Ultimately, evaluation of the net effect of new technologies on individuals and society is needed to identify appropriate rules and boundaries. Mark Zuckerberg might consider a public discussion and debate among leaders from different sectors and nations to establish Facebook’s real role in delivering information. 

No matter how we view artificial intelligence technologies, we know they carry certain consequences, some good, some bad, but none neutral.

TechCrunch:             Claims That Google's Search Algorithm Spread False Information:
 

« Shades of Watergate – The Fake Russian Hacking
Ransom Worm: The Next Level Of Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Mellanox Technologies

Mellanox Technologies

Mellanox Technologies is a leading supplier of end-to-end Ethernet and InfiniBand intelligent interconnect solutions and services for servers, storage, and hyper-converged infrastructure.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

Cipher Security

Cipher Security

Cipher Security provides unique robustness tests and penetration tests, as well as customizable development services for vendors and providers.

Skkynet Cloud Systems

Skkynet Cloud Systems

Skkynet is a leader in real-time data systems for the secure management and control of industrial processes (SCADA) and embedded devices (M2M).

Simula Research Laboratory

Simula Research Laboratory

Simula Research Laboratory carries out research in the fields of communication systems, scientific computing and software engineering.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

Comarch

Comarch

Comarch is a provider of IT business solutions to optimize operational and business processes. Cyber security solutions are focused on Identity Management and Security Assessment services.

Accertify

Accertify

Accertify is a leading provider of fraud prevention, chargeback management, and payment gateway solutions.

Cyber Intelligence House (CIH)

Cyber Intelligence House (CIH)

Cyber Intelligence House provides risk exposure solutions for a wide range of audiences including companies, government agencies, regulators, investors, law enforcement and consumers.

CleanCloud by SEK

CleanCloud by SEK

CleanCloud by SEK is a CSPM product focused on public cloud data protection and security regulations, with over 400 compliance checks for the market's leading frameworks and regulations.

VIRTIS

VIRTIS

VIRTIS' mission is to provide today's leading organizations peace of mind that their entire digital network perimeter is safe from hackers and data breach.

AgileBlue (Agile1)

AgileBlue (Agile1)

AgileBlue (formerly Agile1) is a managed breach detection company with an Autonomous SOC-as-a-Service for 24×7 monitoring, detection and guided response.

Gridware

Gridware

Gridware is a specialised cybersecurity consultancy firm and an emerging global player in the cybersecurity intelligence and advisory field.

Airgap Networks

Airgap Networks

Airgap is fixing the fundamental flaw of excessive trust. We help enterprises modernize their network for a simple and secure infrastructure.

SIEM Xpert

SIEM Xpert

SIEM Xpert is a leader in Cyber Security Trainings and services since 2015.

PlanNet 21 Communications

PlanNet 21 Communications

PlanNet 21 Communications is Ireland most specialised technology solution provider.