University of Hawai´I at Mānoa Blackbox.Academy: an Educational

Total Page:16

File Type:pdf, Size:1020Kb

University of Hawai´I at Mānoa Blackbox.Academy: an Educational University of Hawai´i at Mānoa BlackBox.Academy: An Educational Website, from Racial Bias and Digital Panopticism to the Technological Open Mari Martinez Performance Studies, MA Dr. Markus Wessendorf (Committee Chair) Dr. Jonathan Goldberg-Hiller Dr. Jason Leigh May 4, 2021 Martinez, Mari Page 2 of 65 Contents Abstract 3 What is the Black Box 3 Racial Bias 5 The Algorithm 11 The Panopticon 17 Mis/Disinfo 29 The Open 43 Martinez, Mari Page 3 of 65 ABSTRACT BlackBox.Academy is an educational website which helps people with minimal or greater technological backgrounds learn important topics in technology, ranging from racial bias to disparity caused by algorithms, from surveillance to digital panopticism, to mis- and disinformation, even ontological questions of technology. The goal is to educate a wide variety of people from multiple backgrounds by breaking down concepts without the use of technological jargon and academic speak. This is done with embedded video clips, hyperlinks, and concepts that gradually build on one another. The website format allows for real time changes and up-to-date information. This PDF version is the written part of a more elaborate, complex, and interactive website that can be found at https://blackbox.academy. What is the Black Box? Technology is this monolithic word that encompasses everything from pencils to medicine, and from toaster ovens to artificial intelligence. So, what do I mean when I say technology? And what's all this talk about a Black Box? The technology that I'm talking about is modern technology, the everyday stuff that we use – computers, smart phones, software, the things we have invited into our home to make our lives easier. I will speak about artificial intelligence and algorithms, but I'll let you know when I do. The black box metaphor started way back in the days of cybernetics and refers to “a system we can only observe the inputs and outputs, but not the internal workings” (Card). Martinez, Mari Page 4 of 65 So, what's this Black Box all about? Think about technology having a background and a foreground. The foreground is what you interact with. The app you click on, the screen that you see, that sort of thing. The background is all the stuff that's working behind the scenes to make that app work, or that screen appear, or your computer work. It's all the sorcery and wizardry that most people don't understand (or care to), that makes all the bleeps and bloops, and all the lights happen and the technology that you're using for work. The Black Box is the background. When I talk about it, if necessary, I will talk about it in those terms: the foreground (the stuff you interact with), and the background (the stuff you don't see that makes it work, everything inside the box) or the black box. This text looks at the black box through a performative lens. What does that mean? Richard Schechner sums it up best in his book Performance Studies: An Introduction: “(DL) Austin notes, "To say something is to do something." In uttering certain sentences people perform acts. Promises, bets, curses, contracts, and judgments do not describe or represent actions: they are actions. Performatives are an integral part of "real life." As many have found out too late, even if the heart says "no," once the tongue says "yes" the performative binds.”1 The same is true with technology; but how does what we say with our technology, what we program our technology to say and do, and what our technology tells others about us, influence and impact our world? It is one thing to think about these things in the foreground of technology, who we text, what we tweet, etc. – but what about the background? How does the information we input into the technological black box impact these actions? How does “to say 1 Richard Schechner. Performance Studies: An Introduction. 4th ed., Routledge, 2020. Martinez, Mari Page 5 of 65 something is to do something” impact us if we can’t see who or what is uttering the words that influence our actions? RACIAL BIAS Why is this important? Why does it matter if we look inside the black box? You may be asking yourself, why does it matter how these things work? Why does what's inside of them matter? Do I really need to know how my TV works in order to watch it? Does it really matter what's inside my smartphone or who programmed TikTok, Instagram, or Twitter as long as I can access them? Many of us have used public restrooms. Many of us have used public restrooms with automatic sensors on the sinks, the ones where you put your hands in front of the light sensors and it activates the water to wash your hands. My partner and I have two completely different experiences when we encounter these, and it is no accident. I also have different experiences depending on the time of year. As a Mexican woman, if it is the middle of summer, and my skin is much darker, it is almost impossible for me to activate one. I ALWAYS have to use the palm of my hands. My partner, who is white, has little difficulty activating the sensors. I know what you're thinking, there's no way that the sink I'm trying to use has any sort of racial bias. This sink can't possibly be racist, it's in inanimate object, a harmless piece of technology, dare I say, neutral. But is it? In 2015, this idea made headlines when a viral video made its rounds on social media after two friends at DragonCon were in a Marriott hotel bathroom (Plenke). One white, who had no problem making the light sensor work and triggering the faucet, and the other, a black man, who could not get the sensor to activate. The video was Martinez, Mari Page 6 of 65 titled "Whites Only," a throw-back to Jim Crow segregation and raised the question of whether or not we need a closer look at who is behind, and what is inside our technology. “Whites Only?” Post by TeejMaximus September 2, 2015 Retrieved from YouTube in December 2020 This may seem frivolous, it's just a soap dispenser, but it becomes even more important when these technologies are unable to recognize people. No longer a thing of the future, every major city in the United States and countries all over the world use biometrics; from tracking citizens on city streets to using it in law enforcement. However, these technologies have been shown, time and again, to not work, and they have high inaccuracies for people of color and women. This technology has been massively rolled out worldwide in countries like the United States, the United Kingdom, and China. Facial Recognition Biometrics: These are physical characteristics like fingerprints, facial recognition, voice, and eye or retinal recognition that can be used to identify who you are. They can be used to unlock your phone, to access bank accounts, open doors, even identify you for crimes (Gillis). Facial recognition is being widely rolled out in major cities across the world with little oversight. Many studies have shown that facial recognition technology is not only biased, but Martinez, Mari Page 7 of 65 that in many circumstances it inaccurately identifies people of color, especially women (Al Jazeera, Rae). (AlJazeeraEnglish, & Rae, A. (2019, July 03). Do Biometrics Protect or Compromise Our Security? | All Hail the Algorithm. Retrieved from YouTube on December 2, 2020) Biometric Technology & Vulnerable Populations In areas where people have minimal rights, like refugee camps, biometric technology is being used to collect data. How should this technology be used in these spaces? Stephanie Hare discusses whether or not it is ethical to use it with groups of people who have limited rights or are not in a position to refuse the use of this technology and collection of such intimate data. Stephanie Hare: “Ethics of Biometrics & Vulnerable Populations” AlJazeeraEnglish, & Rae, A. (2019, July 3). Do Biometrics Protect or Compromise Our Security? | All Hail the Algorithm. Retrieved from YouTube on December 2, 2020. How is this possible? How does technology show racial bias? These are just a few examples of the more obvious racial bias that are present in technology. We can begin to see how these technologies directly impact how we behave (or perform) in the real world, but who or what is dictating our behavior from inside the black box? How did this racial bias get there, or maybe you already know, or have some idea. When thinking about racial bias in technology we need to think about who is making the tech. Martinez, Mari Page 8 of 65 Who makes the technology? The tech industry is predominantly male and white. This isn't to say that the technology is intentionally made not to recognize darker skin, this is to say that the people writing the code, the people making the product, testing the product, and doing quality control are predominantly white men. There aren't people of color to step in, to find racial blind spots, so racial bias gets programmed into the system. When a technology like facial recognition is being tested, if it is only being trained on white, male faces, a bias gets programmed (intentionally or not) into the system. Representation matters, from coding to quality control. Representation matters every step of the way, especially when that technology is helping to put people behind bars. Bias in the Justice System More and more, algorithms are being used in the criminal justice system, from sentencing to parole boards.
Recommended publications
  • Cyberstalking to in Your Area and the People You Care About from Posts How to Stay Safe and Protect and Pictures
    How can I prevent someone from stalking me online? • Be careful what personal information you share online including in email, on social networking sites like Facebook and Twitter and chat rooms. It is very easy to glean information about where you live, the places you love to go Cyberstalking to in your area and the people you care about from posts How to stay safe and protect and pictures. • Create a different email account for registering in social yourself online networking sites and other online spaces. It will help avoid spam and your personal email won´t be revealed if the online service doesn't have a good privacy practice. What is cyberstalking? • Do not feel obligated to fill out all fields when registering Cyberstalking includes (repeatedly) sending threats or online or provide identifying information such as birthdates false accusations via email or mobile phone, making and place in required fields. threatening or false posts on websites, stealing a person's • In your online user profile, use a photo that doesn't identity or data or spying and monitoring a person's identify you or your location, so you can't be recognised. computer and internet use. Sometimes the threats can escalate into physical spaces. • Consider using a name that is not your real name or a nickname as your email name, screen name or user ID. And There are just as many predators on the internet as there try not to use common dates such as your birthday as the are in real life. Anyone can be stalked online but the digits in your email name or password.
    [Show full text]
  • VP MIKE PENCE at the GOP Convention Site in Charlotte, NC
    Aug 24, 2020 View in browser B Y JAKE SHERMAN , ANNA PALMER , GARRETT ROSS A N D E L I O K U N Presented by THE MESSAGE? … VP MIKE PENCE at the GOP convention site in Charlotte, N.C.: “We’re going to make America great again -- again.” Republicans officially nominated President DONALD TRUMP and PENCE for a second term today. THE PRESIDENT visited the site early this afternoon. “Think about your life just prior to the plague," he told the crowd. This week’s schedule and speakers THIS MORNING WAS YET ANOTHER PIECE OF EVIDENCE for the legion of political observers who believe some high-profile congressional hearings turn out to be a waste of time. MEMBERS OF THE HOUSE OVERSIGHT COMMITTEE spent the morning lecturing Postmaster General LOUIS DEJOY about the USPS -- oftentimes without asking a single question. When they asked questions, they sometimes sounded like this: Do you believe you need to follow the law? Is your backup plan to be pardoned like Roger Stone, Rep. JIM COOPER (D-Tenn.) asked? Why are the Democrats out to get you, Rep. JIM JORDAN (R-Ohio) queried? Why doesn’t this hearing about the USPS include debate about the PPP -- it’s a “waste of time,” Rep. CHIP ROY (R-Texas) said. In addition, the hearing was riddled with technical difficulties. REP. STEPHEN LYNCH (D-Mass.) asked if DEJOY would replace removed sorting machines -- DEJOY said no, but they couldn’t get around to figuring out why, because LYNCH had used up all of his time. MEANWHILE, millions of Americans are wondering if their prescription drugs are going to get delivered, if their mail-in votes will actually be counted and what elected officials are actually doing to make their lives better in the middle of a pandemic and economic recession.
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • Human Rights Implications of Crime Control in the Digital
    International Journal of Cyber Criminology Vol 2 Issue 1 January 2008 Copyright © 2008 International Journal of Cyber Criminology (IJCC) ISSN: 0974 – 2891 January-June 2008, Vol 2 (1): 271–285 This is an Open Access article distributed under the terms of the Creative Commons Attribution-Non-Commercial-Share Alike License, which permits unrestricted non- commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. This license does not permit commercial exploitation or the creation of derivative works without specific permission. Jurisdictional and definitional concerns with computer-mediated interpersonal crimes: An Analysis on Cyber Stalking Lynne Roberts1 Curtin University of Technology, Australia Abstract Cyber-stalking is a crime that transcends national and jurisdictional boundaries. Victims and perpetrators of cyber-stalking may be geographically separated by physical borders (for example, residing in different countries) when the offences occur. This is problematic for investigating the crime, in determining the jurisdiction in which alleged offences have taken place and in which charges may be filed. Legal definitions of stalking (and cyber-stalking) and applicable sentences vary across jurisdictions, if indeed they exist, further muddying the water. This paper provides an overview of the current state of knowledge on cyber-stalking and ends with an examination of the difficulties in investigating and prosecuting cyber-stalkers. Keywords: Stalking; Cyber Stalking; Victims; Perpetrators; Introduction Cyber-crime is emerging as a major international criminological issue. Networked computers provide the media for new types (or variations on old types) of criminal activity to emerge. Cyber-stalking is one such crime enabled by the Internet.
    [Show full text]
  • The Federal Cyberstalking Statute, Content Discrimination and the First Amendment
    The Federal Cyberstalking Statute, Content Discrimination and the First Amendment James Weinstein* TABLE OF CONTENTS INTRODUCTION ................................................................................. 2555 I. THE CONTESTED SCOPE OF THE RULE AGAINST CONTENT DISCRIMINATION .................................................................... 2559 A. The All-Inclusive Approach v. The Democratic Self- Governance Model ........................................................... 2560 B. Criticism of the All-Inclusive Approach............................ 2566 II. THE FEDERAL CYBERSTALKING STATUTE AND THE ALL- INCLUSIVE APPROACH ............................................................. 2569 III. THE FEDERAL CYBERSTALKING STATUTE AND THE DEMOCRATIC SELF-GOVERNANCE MODEL .............................. 2577 A. An Elaboration and Defense of the Democratic Self- Governance Model ........................................................... 2577 B. The Democratic Self-Governance Model and § 2261A(2)(B) ................................................................ 2580 C. Section 2261A(2)(B) Caselaw ......................................... 2584 * Copyright © 2021 James Weinstein. Dan Cracchiolo Chair in Constitutional Law, Sandra Day O’Connor College of Law, Arizona State University. I am grateful to Arthur Hellman, Robert Post, and the participants in the online symposium on “Cheap Speech Twenty-Five Years Later: Democracy & Public Discourse in the Digital Age” for their helpful comments and suggestions, and to law students Emiley Pagrabs
    [Show full text]
  • I Facebook and Panopticism: Healthy Curiosity Or Stalking?
    Facebook and Panopticism: Healthy Curiosity or Stalking? A thesis presented to the faculty of the Scripps College of Communication of Ohio University In partial fulfillment of the requirements for the degree Master of Arts Mary Catherine Kennedy November 2009 © 2009. Mary Catherine Kennedy. All Rights Reserved. i This thesis titled Facebook and Panopticism: Healthy Curiosity or Stalking? by MARY CATHERINE KENNEDY has been approved for the School of Media Arts and Studies and the Scripps College of Communication by Karen E. Riggs Professor of Media Arts and Studies Gregory J. Shepherd Dean, Scripps College of Communication ii ABSTRACT KENNEDY, MARY C., M.A., November 2009, Telecommunications Facebook and Panopticism: Healthy Curiosity or Stalking? (108 pp.) Director of Thesis: Karen E. Riggs This study deepens existing knowledge concerning social networking sites, with specific interest in the social networking site Facebook and the phenomenon, “Facebook stalking”. By providing insights into lesser-known studies concerning user curiosity and surveillance online, the present research reveals that the terms ‘monitoring’ and ‘keeping up with’ or ‘keeping in touch with’ are most commonly used when referring to social searches within social networks; only when asked to think about surveillance in terms of stalking did interview participants refer to it as such. The present study aims to discover Facebook users’ perception of their friends’ disclosure while delving into the idea of “Facebook stalking”, specifically with regard to how users define it. Facebook’s evolution and prominence in the public sphere is dependent upon user satisfaction with and general understanding of the functionality of social networking websites. A discussion of these issues is beneficial to understanding how Facebook is used as a modern-day panopticon.
    [Show full text]
  • The End of Forgetting: Strategic Agency Beyond the Panopticon
    1 Running Head: THE END OF FORGETTING Title The end of forgetting: Strategic agency beyond the Panopticon Authors Jonah Bossewitch Communications Doctoral Program, Columbia University, USA Aram Sinnreich School of Communication and Information, Rutgers University, USA Abstract The rapid explosion of information technologies in recent years has contributed to a substantive change in the social dimensions of information sharing, and is forcing us to revise substantially our old assumptions regarding the knowledge/power dynamic. In this article, we discuss a range of strategic information-management options available to individuals and institutions in the networked society, and contrast these ‘blueprints’ to Foucault’s well-known Panopticon model. We organize these observations and analyses within a new conceptual framework based on the geometry of ‘information flux,’ or the premise that the net flow of information between an individual and a network is as relevant to power dynamics as the nature or volume of that information. Based on this geometrical model, we aim to develop a lexicon for the design, description, and critique of socio-technical systems. Keywords surveillance, privacy, transparency, sousveillance, panopticon, memory, new media, software studies, identity, quantified self Author Bios Jonah Bossewitch is a doctoral candidate in communications at Columbia University and a Technical Architect at the Columbia Center for New Media Teaching and Learning. He writes about surveillance and madness, and is investigating the politics of memory at the intersection of corruption in psychiatry and the pharmaceutical industry. He blogs at http://alchemicalmusings.org. Aram Sinnreich is an Assistant Professor at the Rutgers University School of Communication and Information.
    [Show full text]
  • Facebook: Where Privacy Concerns and Social Needs Collide
    Edith Cowan University Research Online Theses: Doctorates and Masters Theses 2020 Facebook: Where privacy concerns and social needs collide Sonya Scherini Edith Cowan University Follow this and additional works at: https://ro.ecu.edu.au/theses Part of the Communication Technology and New Media Commons, Mass Communication Commons, and the Social Media Commons Recommended Citation Scherini, S. (2020). Facebook: Where privacy concerns and social needs collide. https://ro.ecu.edu.au/ theses/2331 This Thesis is posted at Research Online. https://ro.ecu.edu.au/theses/2331 Edith Cowan University Copyright Warning You may print or download ONE copy of this document for the purpose of your own research or study. The University does not authorize you to copy, communicate or otherwise make available electronically to any other person any copyright material contained on this site. You are reminded of the following: Copyright owners are entitled to take legal action against persons who infringe their copyright. A reproduction of material that is protected by copyright may be a copyright infringement. Where the reproduction of such material is done without attribution of authorship, with false attribution of authorship or the authorship is treated in a derogatory manner, this may be a breach of the author’s moral rights contained in Part IX of the Copyright Act 1968 (Cth). Courts have the power to impose a wide range of civil and criminal sanctions for infringement of copyright, infringement of moral rights and other offences under the Copyright Act 1968 (Cth). Higher penalties may apply, and higher damages may be awarded, for offences and infringements involving the conversion of material into digital or electronic form.
    [Show full text]
  • Researching Soviet/Russian Intelligence in America: Bibliography (Last Updated: October 2018)
    Know Your FSB From Your KGB: Researching Soviet/Russian Intelligence in America: Bibliography (Last updated: October 2018) 1. Federal Government Sources A. The 2016 US Presidential Election Assessing Russian Activities and Intentions in Recent US Elections. Office of the Director of National intelligence, January 6, 2017. Committee Findings on the 2017 Intelligence Community Assessment. Senate Select Committee on Intelligence, July 3, 2018. Disinformation: Panel I, Panel II. A Primer in Russian Active Measures and Influence Campaigns: Hearing Before the Select Committee on Intelligence of the United States Senate, One Hundred Fifteenth Congress, First Session, Thursday, March 30, 2017. (Y 4.IN 8/19: S.HRG.115-40/) Link: http://purl.fdlp.gov/GPO/gpo86393 FACT SHEET: Actions in Response to Russian Malicious Cyber Activity and Harassment. White House Office of the Press Secretary, December 29, 2016. Grand Jury Indicts 12 Russian Intelligence Officers for Hacking Offenses Related to the 2016 Election. Department of Justice Office of Public Affairs, July 13, 2018. Grizzly Steppe: Russian Malicious Cyber Activity. U.S. Department of Homeland Security, and Federal Bureau of Investigation, December 29, 2016. Information Warfare: Issues for Congress. Congressional Research Service, March 5, 2018. Minority Views: The Minority Members of the House Permanent Select Committee on Intelligence on March 26, 2018, Submit the Following Minority Views to the Majority-Produced "Report on Russian active Measures, March 22, 2018." House Permanent Select Committee on Intelligence, March 26, 2018. Open Hearing: Social Media Influence in the 2016 U.S. Election: Hearing Before the Select Committee on Intelligence of the United States Senate, One Hundred Fifteenth Congress, First Session, Wednesday, November 1, 2017.
    [Show full text]
  • In 2017, Broad Federal Search Warrants, As Well As
    A PUBLICATION OF THE SILHA CENTER FOR THE STUDY OF MEDIA ETHICS AND LAW | FALL 2017 Federal Search Warrants and Nondisclosure Orders Lead to Legal Action; DOJ Changes Gag Order Practices n 2017, broad federal search warrants, as well as from disclosing the fact that it had received such a request. nondisclosure orders preventing technology and social On Oct. 12, 2017, the Floyd Abrams Institute for Freedom of media companies from informing their customers that their Expression at Yale Law School and 20 First Amendment Scholars, information had been handed over to the government, led to including Silha Center Director and Silha Professor of Media legal action and raised concerns from observers. However, Ethics and Law Jane Kirtley, fi led an amici brief in response Ithe U.S. Department of Justice (DOJ) also changed its rules on the to the ruling, explaining that National Security Letters (NSL) gag orders, leading a large technology company to drop its lawsuit issued by the FBI are accompanied by a nondisclosure order, against the agency regarding the orders. which “empowers the government to preemptively gag a wire or In 2017, the DOJ fi led two search warrants seeking extensive electronic communication service provider from speaking about information from web hosting company DreamHost and from the government’s request for information about a subscriber.” Facebook in connection to violent protests in Washington, The brief contended that these orders constitute prior restraints D.C. during President Donald Trump’s January 20 inauguration in violation of the U.S. Constitution and U.S. Supreme Court festivities. On Aug.
    [Show full text]
  • A/74/130 General Assembly
    United Nations A/74/130 General Assembly Distr.: General 30 July 2019 Original: English Seventy-fourth session Item 109 of the provisional agenda* Countering the use of information and communications technologies for criminal purposes Countering the use of information and communications technologies for criminal purposes Report of the Secretary-General Summary The present report has been prepared pursuant to General Assembly resolution 73/187, entitled “Countering the use of information and communications technologies for criminal purposes”. In that resolution, the General Assembly requested the Secretary-General to seek the views of Member States on the challenges that they faced in countering the use of information and communications technologies for criminal purposes and to present a report based on those views for consideration by the General Assembly at its seventy-fourth session. The report contains information on the views of Member States submitted pursuant to the aforementioned resolution. __________________ * A/74/150. V.19-08182 (E) 190819 200819 *1908182* A/74/130 Contents Page I. Introduction ................................................................... 4 II. Replies received from Governments ............................................... 4 Argentina ..................................................................... 4 Armenia ...................................................................... 6 Australia ..................................................................... 8 Austria ......................................................................
    [Show full text]
  • Articles & Reports
    1 Reading & Resource List on Information Literacy Articles & Reports Adegoke, Yemisi. "Like. Share. Kill.: Nigerian police say false information on Facebook is killing people." BBC News. Accessed November 21, 2018. https://www.bbc.co.uk/news/resources/idt- sh/nigeria_fake_news. See how Facebook posts are fueling ethnic violence. ALA Public Programs Office. “News: Fake News: A Library Resource Round-Up.” American Library Association. February 23, 2017. http://www.programminglibrarian.org/articles/fake-news-library-round. ALA Public Programs Office. “Post-Truth: Fake News and a New Era of Information Literacy.” American Library Association. Accessed March 2, 2017. http://www.programminglibrarian.org/learn/post-truth- fake-news-and-new-era-information-literacy. This has a 45-minute webinar by Dr. Nicole A. Cook, University of Illinois School of Information Sciences, which is intended for librarians but is an excellent introduction to fake news. Albright, Jonathan. “The Micro-Propaganda Machine.” Medium. November 4, 2018. https://medium.com/s/the-micro-propaganda-machine/. In a three-part series, Albright critically examines the role of Facebook in spreading lies and propaganda. Allen, Mike. “Machine learning can’g flag false news, new studies show.” Axios. October 15, 2019. ios.com/machine-learning-cant-flag-false-news-55aeb82e-bcbb-4d5c-bfda-1af84c77003b.html. Allsop, Jon. "After 10,000 'false or misleading claims,' are we any better at calling out Trump's lies?" Columbia Journalism Review. April 30, 2019. https://www.cjr.org/the_media_today/trump_fact- check_washington_post.php. Allsop, Jon. “Our polluted information ecosystem.” Columbia Journalism Review. December 11, 2019. https://www.cjr.org/the_media_today/cjr_disinformation_conference.php. Amazeen, Michelle A.
    [Show full text]