Technology-Enabled Disinformation: Summary, Lessons, and Recommendations

12/21/2018
by   John Akers, et al.
0

Technology is increasingly used -- unintentionally (misinformation) or intentionally (disinformation) -- to spread false information at scale, with potentially broad-reaching societal effects. For example, technology enables increasingly realistic false images and videos, and hyper-personal targeting means different people may see different versions of reality. This report is the culmination of a PhD-level special topics course (https://courses.cs.washington.edu/courses/cse599b/18au/) in Computer Science & Engineering at the University of Washington's Paul G. Allen School in the fall of 2018. The goals of this course were to study (1) how technologies and today's technical platforms enable and support the creation and spread of such mis- and disinformation, as well as (2) how technical approaches could be used to mitigate these issues. In this report, we summarize the space of technology-enabled mis- and disinformation based on our investigations, and then surface our lessons and recommendations for technologists, researchers, platform designers, policymakers, and users.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/19/2019

"Computer Science for all": Concepts to engage teenagers and non-CS students in technology

Knowledge in Computer Science (CS) is essential, and companies have incr...
research
09/08/2023

The Case for Anticipating Undesirable Consequences of Computing Innovations Early, Often, and Across Computer Science

From smart sensors that infringe on our privacy to neural nets that port...
research
04/28/2020

A Berkeley View of Teaching CS at Scale

Over the past decade, undergraduate Computer Science (CS) programs acros...
research
08/24/2022

Graphical Models of False Information and Fact Checking Ecosystems

The wide spread of false information online including misinformation and...
research
04/24/2020

Benefits and Pitfalls of Using Capture the Flag Games in University Courses

The concept of Capture the Flag (CTF) games for practicing cybersecurity...
research
02/27/2019

Architecting Dependable Learning-enabled Autonomous Systems: A Survey

We provide a summary over architectural approaches that can be used to c...
research
05/01/2021

Deep Insights of Deepfake Technology : A Review

Under the aegis of computer vision and deep learning technology, a new e...

Please sign up or login with your details

Forgot password? Click here to reset