|
Citation |
- Permanent Link:
- http://digital.auraria.edu/IR00000117/00001
Material Information
- Title:
- The Devil Wears Data
- Creator:
- Swauger, Shea
- Place of Publication:
- Denver, CO
- Publisher:
- ThinqStudio
- Publication Date:
- 02-21-2020
- Physical Description:
- Presentation
Notes
- Abstract:
- Predictive analytics, artificial intelligence, and facial recognition technology are just a few of the
things your data can be plugged into without consent. In this workshop, we’ll discuss data profiling technologies and techniques levied specifically at students; who, what, why, when, where and how data is mined; and to what end? We’ll explore notions of student data rights, data ethics, privacy, and trends in data legislation.
- Acquisition:
- Collected for Auraria Institutional Repository by the Self-Submittal tool. Submitted by Shea Swauger.
- Publication Status:
- Unpublished
Record Information
- Source Institution:
- Auraria Institutional Repository
- Holding Location:
- Auraria Library
- Rights Management:
- Copyright [name of copyright holder or Creator or Publisher as appropriate]. Permission granted to University of Colorado Denver to digitize and display this item for non-profit research and educational purposes. Any reuse of this item in excess of fair use or other copyright exemptions requires permission of the copyright holder.
|
Downloads |
This item is only available as the following downloads:
|
Full Text |
ERROR CAUGHT WHILE SAVING NEW DIGITAL RESOURCE TO SOLR INDEXES
2/28/2020 5:53:16 PM
Unable to connect to the remote server
at SolrNet.Impl.SolrConnection.PostStream(String relativeUrl, String contentType, Stream content, IEnumerable`1 parameters) in d:\BuildAgent-01\work\e4797f8bddc217f4\SolrNet\Impl\SolrConnection.cs:line 119
at SolrNet.Impl.SolrConnection.Post(String relativeUrl, String s) in d:\BuildAgent-01\work\e4797f8bddc217f4\SolrNet\Impl\SolrConnection.cs:line 84
at SolrNet.Impl.SolrBasicServer`1.SendAndParseHeader(ISolrCommand cmd) in d:\BuildAgent-01\work\e4797f8bddc217f4\SolrNet\Impl\SolrBasicServer.cs:line 112
at SobekCM.Engine_Library.Solr.v5.v5_Solr_Controller.Update_Index(String SolrDocumentUrl, String SolrPageUrl, SobekCM_Item Resource, Boolean Include_Text) in C:\GitRepository\SobekCM-Web-Application\SobekCM_Engine_Library\Solr\v5\v5_Solr_Controller.cs:line 59
at SobekCM.Engine_Library.Solr.Solr_Controller.Update_Index(String SolrDocumentUrl, String SolrPageUrl, SobekCM_Item Resource, Boolean Include_Text) in C:\GitRepository\SobekCM-Web-Application\SobekCM_Engine_Library\Solr\Solr_Controller.cs:line 33
at SobekCM.Library.MySobekViewer.New_Group_And_Item_MySobekViewer.complete_item_submission(SobekCM_Item Item_To_Complete, Custom_Tracer Tracer) in C:\GitRepository\SobekCM-Web-Application\SobekCM_Library\MySobekViewer\New_Group_And_Item_MySobekViewer.cs:line 857
PAGE 1
THE DEVIL WEARS DATA
PAGE 2
Hi. I'm Shea.
PAGE 3
OUTLINE 1. Identifying bias 2. Three technologies to examine 3. Scenario exercise 4. Sticky exercise 5. Discussion and wrap up
PAGE 4
You already know more than you think.
PAGE 8
Technology and data are neutral and objective. MYTH:
PAGE 9
Technology and data are representations of power. REALITY:
PAGE 10
Intent is different from impact.
PAGE 11
TECHNOLOGIES TO EXAMINE 1. Artificial Intelligence/Machine Learning 2. Predictive Analytics 3. Facial Recognition
PAGE 12
A computer system that is feed large amounts of data which it uses to learn how to do a specific task. ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
PAGE 13
HOW AI AND MACHINE LEARNING ARE BEING MARKETED TO HIGHER EDUCATION
PAGE 14
AI, MACHINE LEARNING, AND EQUITY
PAGE 15
RECENT DEVELOPMENTS WITH AI AND MACHINE LEARNING
PAGE 16
PREDICTIVE/LEARNING ANALYTICS The use of historical data and statistics to make predictions about something.
PAGE 17
HOW PREDICTIVE/LEARNING ANALYTICS ARE MARKETED TO HIGHER EDUCATION
PAGE 18
PREDICTIVE/ LEARNING ANALYTICS AND EQUITY
PAGE 19
RECENT DEVELOPMENTS WITH PREDICTIVE AND LEARNING ANALYTICS
PAGE 20
FACIAL RECOGNITION A technology used to identify a person based on their facial features and comparing them to a database of known people.
PAGE 21
HOW FACIAL RECOGNITION IS MARKETED TO HIGHER EDUCATION
PAGE 22
FACIAL RECOGNITION AND EQUITY
PAGE 23
RECENT DEVELOPMENTS WITH FACIAL RECOGNITION
PAGE 24
FALSE POSITIVES AND FALSE NEGATIVES When you design a technology, you make choices about how sensitive to make it. ! More sensitive = detecting all of what you want, some of what you don't ! Less sensitive = detecting some of what you want, none of what you don't
PAGE 25
Three scenarios 1. A.I. to detect cheating online 2. Predictive analytics for admissions 3. Facial recognition for campus building access APPLYING ETHICS IN TECHNOLOGY
PAGE 26
1. Form up in groups 2. Read over the scenario 3. Talk through the questions 4. Choose someone to share out SCENARIO EXERCISE 10 MINUTES
PAGE 27
1. What values do you want in your technology? 2. What values do you NOT want in your technology? 3. What rights do you want regarding your data? 4. What do you want to tell the leaders of the university about technology? STICKY EXERCISE 10 MINUTES
PAGE 28
OUTLINE 1. Identifying bias 2. Three technologies to examine 3. Scenario exercise 4. Sticky exercise 5. Discussion and wrap up
PAGE 29
CONTACT shea.swauger@ucdenver.edu Twitter @ SheaSwauger
|
|