Archives
Envisioning Legal Mitigations for LLM-based Intentional and Unintentional Harms
Auditing Google’s Search Headlines as a Potential Gateway to Misleading Content: Evidence from the 2020 US Election
Modeling Through
Why Govern Broken Tools?
The Automated Administrative State: A Crisis of Legitimacy
Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference
This paper analyzes the security practices of GEDmatch, the largest third-party genetic genealogy service, for security and privacy issues. We find that an attacker can extract a large percentage of the genetic markers from other users and that an adversary can construct genetic data files that falsely appear like relatives to other samples in the database. We conclude with security recommendations for genetic genealogy services. This paper is accepted to the 2020 Network and Distributed System Security Symposium (NDSS).
Commuting to Mars: A Response to Professors Abraham and Rabin
Toward Inclusive Tech Policy Design: A Method for Underrepresented Voices to Strengthen Tech Policy Documents
This journal article, published in 2019 in Ethics and Information Technology, introduces the Diverse Voices method and reports on two case studies demonstrating its use: one with a white paper on augmented reality technology, and the other with a strategy document on automated driving vehicle technologies.