Citation
The Devil Wears Data

Material Information

Title:
The Devil Wears Data
Creator:
Swauger, Shea
Place of Publication:
Denver, CO
Publisher:
ThinqStudio
Publication Date:
Physical Description:
Presentation

Notes

Abstract:
Predictive analytics, artificial intelligence, and facial recognition technology are just a few of the things your data can be plugged into without consent. In this workshop, we’ll discuss data profiling technologies and techniques levied specifically at students; who, what, why, when, where and how data is mined; and to what end? We’ll explore notions of student data rights, data ethics, privacy, and trends in data legislation.
Acquisition:
Collected for Auraria Institutional Repository by the Self-Submittal tool. Submitted by Shea Swauger.
Publication Status:
Unpublished

Record Information

Source Institution:
Auraria Institutional Repository
Holding Location:
Auraria Library
Rights Management:
Copyright [name of copyright holder or Creator or Publisher as appropriate]. Permission granted to University of Colorado Denver to digitize and display this item for non-profit research and educational purposes. Any reuse of this item in excess of fair use or other copyright exemptions requires permission of the copyright holder.

Downloads

This item is only available as the following downloads:


Full Text
ERROR CAUGHT WHILE SAVING NEW DIGITAL RESOURCE TO SOLR INDEXES
2/28/2020 5:53:16 PM

Unable to connect to the remote server
at SolrNet.Impl.SolrConnection.PostStream(String relativeUrl, String contentType, Stream content, IEnumerable`1 parameters) in d:\BuildAgent-01\work\e4797f8bddc217f4\SolrNet\Impl\SolrConnection.cs:line 119
at SolrNet.Impl.SolrConnection.Post(String relativeUrl, String s) in d:\BuildAgent-01\work\e4797f8bddc217f4\SolrNet\Impl\SolrConnection.cs:line 84
at SolrNet.Impl.SolrBasicServer`1.SendAndParseHeader(ISolrCommand cmd) in d:\BuildAgent-01\work\e4797f8bddc217f4\SolrNet\Impl\SolrBasicServer.cs:line 112
at SobekCM.Engine_Library.Solr.v5.v5_Solr_Controller.Update_Index(String SolrDocumentUrl, String SolrPageUrl, SobekCM_Item Resource, Boolean Include_Text) in C:\GitRepository\SobekCM-Web-Application\SobekCM_Engine_Library\Solr\v5\v5_Solr_Controller.cs:line 59
at SobekCM.Engine_Library.Solr.Solr_Controller.Update_Index(String SolrDocumentUrl, String SolrPageUrl, SobekCM_Item Resource, Boolean Include_Text) in C:\GitRepository\SobekCM-Web-Application\SobekCM_Engine_Library\Solr\Solr_Controller.cs:line 33
at SobekCM.Library.MySobekViewer.New_Group_And_Item_MySobekViewer.complete_item_submission(SobekCM_Item Item_To_Complete, Custom_Tracer Tracer) in C:\GitRepository\SobekCM-Web-Application\SobekCM_Library\MySobekViewer\New_Group_And_Item_MySobekViewer.cs:line 857



PAGE 1

THE DEVIL WEARS DATA

PAGE 2

Hi. I'm Shea.

PAGE 3

OUTLINE 1. Identifying bias 2. Three technologies to examine 3. Scenario exercise 4. Sticky exercise 5. Discussion and wrap up

PAGE 4

You already know more than you think.

PAGE 8

Technology and data are neutral and objective. MYTH:

PAGE 9

Technology and data are representations of power. REALITY:

PAGE 10

Intent is different from impact.

PAGE 11

TECHNOLOGIES TO EXAMINE 1. Artificial Intelligence/Machine Learning 2. Predictive Analytics 3. Facial Recognition

PAGE 12

A computer system that is feed large amounts of data which it uses to learn how to do a specific task. ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING

PAGE 13

HOW AI AND MACHINE LEARNING ARE BEING MARKETED TO HIGHER EDUCATION

PAGE 14

AI, MACHINE LEARNING, AND EQUITY

PAGE 15

RECENT DEVELOPMENTS WITH AI AND MACHINE LEARNING

PAGE 16

PREDICTIVE/LEARNING ANALYTICS The use of historical data and statistics to make predictions about something.

PAGE 17

HOW PREDICTIVE/LEARNING ANALYTICS ARE MARKETED TO HIGHER EDUCATION

PAGE 18

PREDICTIVE/ LEARNING ANALYTICS AND EQUITY

PAGE 19

RECENT DEVELOPMENTS WITH PREDICTIVE AND LEARNING ANALYTICS

PAGE 20

FACIAL RECOGNITION A technology used to identify a person based on their facial features and comparing them to a database of known people.

PAGE 21

HOW FACIAL RECOGNITION IS MARKETED TO HIGHER EDUCATION

PAGE 22

FACIAL RECOGNITION AND EQUITY

PAGE 23

RECENT DEVELOPMENTS WITH FACIAL RECOGNITION

PAGE 24

FALSE POSITIVES AND FALSE NEGATIVES When you design a technology, you make choices about how sensitive to make it. ! More sensitive = detecting all of what you want, some of what you don't ! Less sensitive = detecting some of what you want, none of what you don't

PAGE 25

Three scenarios 1. A.I. to detect cheating online 2. Predictive analytics for admissions 3. Facial recognition for campus building access APPLYING ETHICS IN TECHNOLOGY

PAGE 26

1. Form up in groups 2. Read over the scenario 3. Talk through the questions 4. Choose someone to share out SCENARIO EXERCISE 10 MINUTES

PAGE 27

1. What values do you want in your technology? 2. What values do you NOT want in your technology? 3. What rights do you want regarding your data? 4. What do you want to tell the leaders of the university about technology? STICKY EXERCISE 10 MINUTES

PAGE 28

OUTLINE 1. Identifying bias 2. Three technologies to examine 3. Scenario exercise 4. Sticky exercise 5. Discussion and wrap up

PAGE 29

CONTACT shea.swauger@ucdenver.edu Twitter @ SheaSwauger