Faculty Associate Magda Romanska reflects on the return to in-person arts programming after COVID-spurred digitization.
"Plunkett believes parents can educate themselves about harmful online content and how easy it is for their children to access it ‒ whether intentionally or not." ...
The vulnerability-finding capabilities of technologies like Mythos have important ramifications for cybersecurity, argues Bruce Schneier in The Guardian. Though Mythos doesn't evidently outperform ...
Abdou points out that "analyses of language models might draw on a longer history of the evolving connections between language, information, and epistemic order," a history that begins far earlier ...
Faculty Associate Samer Hassan and coauthor Silvia Semenzin do a mixed-methods analysis of a digital sex work platform using crypto.
ASML's Keyring empowers users to track how their data is collected, stored, and used online.
Affiliate Maria Xynou's latest blog post discusses the challenges of measuring Internet censorship, emerging censorship trends, and how Internet measurement powers advocacy for human rights.
Daji Landis, Faculty Associate Elettra Bietti, and alum Sunoo Park address security vs. interoperability arguments in antitrust and regulatory proceedings against Big Tech.
Co-Founder, Director, and Faculty Chair Jonathan Zittrain considers the ethical implications of how we communicate and connect with LLMs.
Foreign social media platforms are unique associational and speech infrastructures that should be treated differently from other foreign infrastructure, challenging the Supreme Court's view of these ...
Are we sharing our kids online in ways that could come back to harm them later? Faculty ASsociate Leah Plunkett, author of Sharenthood, breaks down the real risks of posting your children online—from ...
Regulation and oversight are of little use if they are always playing a chasing game. AI companies have turned regulation into the last line of redress when it should have been the first line of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results