Extracting Unintentional Secrets from Predictive Text Learning Systems

Total Page:16

File Type:pdf, Size:1020Kb

Extracting Unintentional Secrets from Predictive Text Learning Systems “What did you say?”: Extracting unintentional secrets from predictive text learning systems Gwyn Wilkinson and Phil Legg Computer Science Research Centre University of the West of England, Bristol, UK [email protected] Abstract—As a primary form of communication, text is used via the device keyboard. Therefore, if the device is designed widely in applications including e-mail conversations, mobile text to continually learn about the user’s typing interactions, such messaging, chatrooms, and forum discussions. Modern systems that patterns can be identified and predictions can be made include facilities such as predictive text, recently implemented using deep learning algorithms, to estimate the next word to for future interactions, does this present an opportunity for an be written based on previous historical entries. However, we attacker to extract unintentional secrets? often enter sensitive information such as passwords using the In this paper, we explore the issue of unintentional mem- same input devices - namely, smartphone soft keyboards. In orisation in predictive text modelling systems. We devise a this paper, we explore the problem of deep learning models small-scale study to test how well a system can learn about our which memorise sensitive training data, and how secrets can be extracted from predictive text models. We propose a general text-based interactions such that predictions can be made on a black-box attack algorithm to accomplish this for all kinds of character or word level for what should follow a given passage. memorised sequences, discuss mitigations and countermeasures, We then examine how this could potentially be exploited and explore how this attack vector could be deployed on an by an attacker to identify personal information about a user. Android or iOS mobile device platforms as part of target Examples could include presenting the first part of a post reconnaissance. code and having the system reveal the remainder to identify location information of a user (e.g., if an attacker entered I. INTRODUCTION ‘BS16’, what would a system predict to come next?). We REDICTIVE text has become widely adopted across discuss this challenge further to consider the nature of privacy P many modern devices to improve usability, and time attacks that could be exploited in this manner, including how required for composing a message. Predictive text functions feasible a password could be extracted from a learnt model of first gained wide popularity on early mobile devices which user interactions. provided a numerical keypad instead of a traditional keyboard, The paper is structured as follows: Section II presents re- which necessitating the grouping of multiple letters each lated work on the topic of vulnerabilities, possible attacks and number key (‘ABC’ on key 1, ‘DEF’ on key 2, and so forth). mitigations which can be performed on deep learning models. The so-called ‘T9’ predictive text model would check all three Section III provides a background to the domain, including letters from each keypress and suggest word completions based deep learning, recurrent networks, generative sequences, legal on a stored dictionary [7]. Whilst these methods were fairly privacy concerns, and our intended threat model. Section IV straightforward in their approach, based on frequency analysis, presents our system design, incorporating our deep learn- nowadays we can utilise more sophisticated deep learning ing model architecture, training data corpus, language model models such as recurrent neural networks, and long short- design, and the attack algorithm. Section V presents our term memory (LSTM) networks, to develop a much richer results and a discussion of these findings. Finally, Section VI understanding of a user’s writing style and their message concludes our work and provides discussion of further works. composition [17]. Such learning methods will continually learn about the sequence of words and characters that are inputted II. RELATED WORKS by the user. There has been a considerable amount of research in the Whilst this can have great benefits for developing a bespoke intersection between machine learning and privacy preserva- model that fits to the user’s preferences well, by the very nature tion. It has previously been shown that a machine learning of learning from all interactions, there are potential security classifier, trained on private data, can leak information about vulnerabilities that could be associated with this. For example, its training set [10], [11]. Through repeated training rounds, if a user was to write a confidential message to a family a machine learning classifier fθ() can achieve high accuracy member, how would this sensitive information be captured in predicting its training data. Due to this property it is by a learning model? How about other sensitive materials possible to use the presence of a high confidence output to that may be commonly entered by a user? In particular, the infer sensitive information about a data subject - for instance, reliance that users have nowadays on online accounts and login whether a patient record in a study possesses a specific credentials means that passwords may be commonly entered genotype. This kind of attack, named model inversion was first demonstrated in the black-box setting (i.e. an adversary being defined explicitly. This approximation is found using a can access a model but not inspect it’s parameters), using a set of m example data points x and labels y, pharmacogenetic regression model [11], and later extended m to facial recognition [10] in both black-box and white-box X = f( xi ; yi ) gi=1 settings (i.e. an adversary can inspect model parameters). One which are used to compute yi = fθ(xi). We then evaluate limitation of this attack in the black-box setting can be that how accurate the network is with respect to each data point by some prior knowledge of the target data subject’s non-sensitive computing the loss function L(x; y; y; θ), and then performing attributes is needed, and this can be addressed using model gradient descent to update θ. In other words, we compare the poisoning to inject malicious data into the training set [13]. estimated values of yi to the known values of yi, and use the An extension of this technique allows an adversary to average of the differences to update θ in the direction which perform membership inference [33], by which the input is minimises the loss, initialised and then optimised to produce a high confidence m output from the model. By identifying a local maximum in 1 X θ − θ − η rL(x ; y ; θ ) this way, we can infer a correlation between the data point new old m i i old i=1 and a training set member, and in theory rebuild the dataset in its entirety. This has been extended from the centralised to where η is a learning rate, which limits the update magnitude the distributed training environment, where it has been shown in order to reduce over-correction. This process is known as a malicious training participant can infer data membership training, and it is often required to train a neural network many through crafted updates [25]. times over the entire set of X, with each full iteration known Some causes of this vulnerability have been identified, such as a training epoch, in order for the network to reach a desired as influence of individual data points [38], and poor general- level of accuracy with respect to the training data. However, isation (or overfitting) [40], and mitigations suggested such accuracy on training data can only translate to accuracy in the as -differential privacy [1], regularisation techniques [21] real world to the extent that X is representative of the global [15] [34] [28], adversarial regularisation [24], API hardening distribution. In practice, we will almost always see under- and [36] and improved data sanitisation techniques [18]. However, over-representation of one or more features in a training set due to the well-known tension between privacy and utility in relative to the global distribution, and chasing higher accuracy data publishing [30], such attacks can never be completely through continued training can run the risk of overfitting the prevented in an accurate model. Previous work by Legg et network to the training data in a way which reduces its real al. [22] explored how visual analytics techniques can be used world accuracy. to identify potential vulnerabilities that may exist within a B. Recurrent Neural Networks trained model, and how robustness could be improved when using collaborative user-machine guided sample selection. A Recurrent Neural Network (RNN) is a subclass of neural Inference attacks seek to leverage the unintended mem- networks which differ from traditional feed-forward neural orisation of training data, to which modern deep learning architectures in that each unit’s input at each time step t 2 Z n models have been shown to be particularly susceptible [41] consists not just of the input vector xt 2 R but also a hidden m [23]. Recent work by Carlini et al. [4] provides a conceptual state vector ht−1 2 R , returning ht and the output vector demonstration of unintentional memorisation for generative yt. This essentially gives each neural unit a memory enabling text models. They demonstrate the concept for a credit card it to classify the present input in the context of the inputs it number injected within body text that is used for training has seen recently. a deep learning model. Our work extends on this notion, One problem with the standard RNN is that, while in theory however we address passwords rather than credit card numbers ht can contain information from x0:t−1, in practice the storage since we believe passwords are more commonly written or of long term dependencies can lead to problems with train- stored by users (e.g., sharing with a family member via text ing due to exploding/vanishing gradients caused by needing message, or storing in a Notes application).
Recommended publications
  • Powering Inclusion: Artificial Intelligence and Assistive Technology
    POLICY BRIEF MARCH 2021 Powering Inclusion: Artificial Intelligence and Assistive Technology Assistive technology (AT) is broadly defined as any equipment, product or service that can make society more inclusive. Eye- glasses, hearing aids, wheelchairs or even some mobile applica- tions are all examples of AT. This briefing explores the power of Key facts using Artificial Intelligence (AI) to enhance the design of current and future AT, as well as to increase its reach. The UN Convention on the Context Rights of Persons with Dis- Globally, over 1 billion people are currently in need of AT. Lack of access to basic AT excludes individuals, reduces their ability to live independent abilities (UNCRPD) estab- lives [3], and is a barrier to the realisation of the Sustainable Development lished AT provision as a Goals (SDGs) [2]. human right [1]. Advances in AI offer the potential to develop and enhance AT and gain new insights into the scale and nature of AT needs (although the risks of potential bias and discrimination in certain AI-based tools must also be Over 1 billion people are acknowledged). In June 2019, the Conference of State Parties to the UN currently in need of AT. Convention on the Rights of Persons with Disabilities (CRPD) recognized that AI has the potential to enhance inclu- By 2050, this number is sion, participation, and independence for people with disabilities [5]. AI- predicted to double [2]. enabled tools – such as predictive text, visual recognition, automatic speech- to-text transcription, speech recognition, and virtual assistants - have experi- enced great advances in the last few years and are already being Only 10% of those who used by people with vision, hearing, mobility and learning impairments.
    [Show full text]
  • An Improved Text Sentiment Classification Model Using TF-IDF and Next Word Negation
    An Improved Text Sentiment Classification Model Using TF-IDF and Next Word Negation Bijoyan Das Sarit Chakraborty Student Member, IEEE Member, IEEE, Kolkata, India Abstract – With the rapid growth of Text sentiment tickets. Although this is a very trivial problem, text analysis, the demand for automatic classification of classification can be used in many different areas as electronic documents has increased by leaps and bound. follows: The paradigm of text classification or text mining has been the subject of many research works in recent time. Most of the consumer based companies use In this paper we propose a technique for text sentiment sentiment classification to automatically classification using term frequency- inverse document generate reports on customer feedback. It is an frequency (TF-IDF) along with Next Word Negation integral part of CRM. [2] (NWN). We have also compared the performances of In medical science, text classification is used to binary bag of words model, TF-IDF model and TF-IDF analyze and categorize reports, clinical trials, with ‘next word negation’ (TF-IDF-NWN) model for hospital records etc. [2] text classification. Our proposed model is then applied Text classification models are also used in law on three different text mining algorithms and we found on the various trial data, verdicts, court the Linear Support vector machine (LSVM) is the most transcripts etc. [2] appropriate to work with our proposed model. The Text classification models can also be used for achieved results show significant increase in accuracy Spam email classification. [7] compared to earlier methods. In this paper we have demonstrated a study on the three different techniques to build models for text I.
    [Show full text]
  • Extraction of Predictive Document Spans with Neural Attention
    SpanPredict: Extraction of Predictive Document Spans with Neural Attention Vivek Subramanian, Matthew Engelhard, Samuel Berchuck, Liqun Chen, Ricardo Henao, and Lawrence Carin Duke University {vivek.subramanian, matthew.engelhard, samuel.berchuck, liqun.chen, ricardo.henao, lcarin}@duke.edu Abstract clinical notes, for example, attributing predictions to specific note content assures clinicians that the In many natural language processing applica- tions, identifying predictive text can be as im- model is not relying on data artifacts that are not portant as the predictions themselves. When clinically meaningful or generalizable. Moreover, predicting medical diagnoses, for example, this process may illuminate previously unknown identifying predictive content in clinical notes risk factors that are described in clinical notes but not only enhances interpretability, but also al- not captured in a structured manner. Our work is lows unknown, descriptive (i.e., text-based) motivated by the problem of autism spectrum dis- risk factors to be identified. We here formal- order (ASD) diagnosis, in which many early symp- ize this problem as predictive extraction and toms are behavioral rather than physiologic, and address it using a simple mechanism based on linear attention. Our method preserves dif- are documented in clinical notes using multiple- ferentiability, allowing scalable inference via word descriptions, not individual terms. Morever, stochastic gradient descent. Further, the model extended and nuanced descriptions are important decomposes predictions into a sum of contri- in many common document classification tasks, for butions of distinct text spans. Importantly, we instance, the scoring of movie or food reviews. require only document labels, not ground-truth Identifying important spans of text is a recurring spans.
    [Show full text]
  • Alternate Keypad Designs and Novel Predictive Disambiguation Methods
    Improved Text Entry for Mobile Devices: Alternate Keypad Designs and Novel Predictive Disambiguation Methods A DISSERTATION SUBMITTED TO THE COLLEGE OF COMPUTER SCIENCE OF NORTHEASTERN UNIVERSITY IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY By Jun Gong October 2007 ©Jun Gong, 2007 ALL RIGHTS RESERVED Acknowledgements I would like to take this chance to truly thank all the people who have supported me throughout my years as a graduate student. Without their help, I do not think I could have achieved one of my life-long goals and dreams of earning a doctorate, and would not be where I am today. First of all, I have to express my sincerest appreciation to my advisors Peter Tarasewich and Harriet Fell. I shall never forget these four years when I worked with such distinguished researchers and mentors. Thank you for always putting your trust and belief in me, and for your guidance and insights into my research. I also have to thank my other thesis committee members: Professors Scott MacKenzie, Carole Hafner, and Javed Aslam. I would not be where I am now without the time and effort you spent helping me complete my dissertation work. I am most indebted to my beloved parents, Pengchao Gong and Baolan Xia. I have been away from you for such a long time, and could not always be there when I should have. But in return, you have still given me the warmest care and greatest encouragement. I am forever grateful that you have given me this opportunity, and will continue to do my best to make you proud.
    [Show full text]
  • Graph Neural Networks for Natural Language Processing: a Survey
    GRAPH NEURAL NETWORKS FOR NLP: A SURVEY Graph Neural Networks for Natural Language Processing: A Survey ∗ Lingfei Wu [email protected] JD.COM Silicon Valley Research Center, USA ∗ Yu Chen [email protected] Rensselaer Polytechnic Institute, USA y Kai Shen [email protected] Zhejiang University, China Xiaojie Guo [email protected] JD.COM Silicon Valley Research Center, USA Hanning Gao [email protected] Central China Normal University, China z Shucheng Li [email protected] Nanjing University, China Jian Pei [email protected] Simon Fraser University, Canada Bo Long [email protected] JD.COM, China Abstract Deep learning has become the dominant approach in coping with various tasks in Natural Language Processing (NLP). Although text inputs are typically represented as a sequence of tokens, there is a rich variety of NLP problems that can be best expressed with a graph structure. As a result, there is a surge of interests in developing new deep learning techniques on graphs for a large number of NLP tasks. In this survey, we present a comprehensive overview on Graph Neural Networks (GNNs) for Natural Language Processing. We propose a new taxonomy of GNNs for NLP, which systematically organizes existing research of GNNs for NLP along three axes: graph construction, graph representation learning, and graph based encoder-decoder models. We further introduce a large number of NLP applications that are exploiting the power of GNNs and summarize the corresponding benchmark datasets, evaluation metrics, and open-source codes. Finally, we discuss various outstanding challenges for making the full use of GNNs for NLP as well as future research arXiv:2106.06090v1 [cs.CL] 10 Jun 2021 directions.
    [Show full text]
  • AI in HR: the New Frontier INTRODUCTION the Robots Have Arrived
    INHR PEOPLE + FOCUSSTRATEGY’S WHITE PAPER SERIES AI in HR: The New Frontier INTRODUCTION The robots have arrived. Only they don’t look like robots. AI- and machine learning-based technology is embedded in the tools you likely interact with every day—navigation apps; predictive text in e-mail and messaging; digital assistants like Alexa and Siri; and recommendation engines on Netflix, YouTube and Spotify. Today, AI-powered technology seamlessly integrates into the things we already do—and it’s poised to do the same for HR. Since AI-based solutions predict, recommend and communicate based on data, AI has the opportunity to transform HR practices in areas where there is adequate data and where that data can be utilized to create greater efficiency, communicate at scale, provide recommendations and predict outcomes. Many companies already have a vast amount of data on candidates and employees that can help them source, assess, hire, train, develop and pay people more efficiently with the application of AI-driven tools. he International Data Corporation smarter hiring choices that ensure quali- T(IDC) estimates that worldwide spend- ty hires while eliminating hidden biases. ing on AI systems will reach $35.8 billion The recruiting process is filled with in 2019 and $79 billion by 2022. And Gart- numerous repeatable tasks such as re- ner estimates that, by 2022, AI-derived sume screening and interview scheduling business value will reach $3.9 trillion. that, when given to AI, free up recruiters’ With its vast amount of underutilized time to focus on what matters: the human data, HR has the potential to lead digital interaction between candidates and com- transformation and drive business value pany personnel.
    [Show full text]
  • Linguistics 1
    Linguistics 1 Purpose of the PhD Program LINGUISTICS The goal of the linguistics doctoral program is to prepare graduates to design and conduct original, empirically based research within a Linguistics is the study of all aspects of human language: how languages theoretical framework. Doctoral students prepare for careers in academic make it possible for us to construe another person's ideas and feelings; research and teaching or applied work in industry or other organizations. how and why languages are similar and different; how we develop We encourage doctoral students to begin engaging in research projects different styles and dialects; what will be required for computers to early, as these will contribute to developing the research program that understand and produce spoken language; and how languages are used will lead to the thesis project. Early projects not only lead to preliminary in everyday communication as well as in formal settings. Linguists exam topics and/or publishable papers, but also enable students to pilot try to figure out what it is that speakers know and do by observing the methods that will be usable for the dissertation project. Early projects structure of languages, the way children learn language, slips of the may be extensions of coursework and may involve a faculty advisor other tongue, conversations, storytelling, the acoustics of sound waves and the than the thesis advisor. way people's brains react when they hear speech or read. Linguists also reconstruct prehistoric languages, and try to deduce the principles behind Doctoral students complete a core of required courses that provide their evolution into the thousands of languages of the world today.
    [Show full text]
  • Corpus-Based Language Technology for Indigenous and Minority Languages
    Corpus-based language technology for indigenous and minority languages Kevin Scannell Saint Louis University 5 October 2015 Background ● I was born in the US, but I speak Irish ● Trained as a mathematician ● Began developing tools for Irish in the 90s ● No corpora for doing statistical NLP ● So I built my own with a crawler ● Crúbadán = crawling thing, from crúb=paw Web as Linguistic Archive ● Billions of unique resources, +1 ● Raw data only, no annotations, -1 ● > 2100 languages represented, +1 ● Very little material in endangered languages, -1 ● Full text searchable, +1 ● Can't search archive by language, -1 ● Snapshots archived periodically, +1 ● Resources removed or changed at random, -1 ● Free to download, +1 ● Usage rights unclear for vast majority of resources, -1 An Crúbadán: History ● First attempt at crawling Irish web, Jan 1999 ● 50M words of Welsh for historical dict., 2004 ● ~150 minority languages, 2004-2007 ● ~450 languages for WAC3, 2007 ● Unfunded through 2011 ● Search for “all” languages, started c. 2011 How many languages? ● Finishing a 3-year NSF project ● Phase one: aggressively seek out new langs ● Phrase two: produce free+usable resources ● Current total: 2140 ● At least 200 more queued for training ● 2500? 3000? Design principles ● Orthographies, not languages ● Labelled by BCP-47 codes ● en, chr, sr-Latn, de-AT, fr-x-nor, el-Latn-x-chat ● Real, running texts (vs. word lists, GILT) ● Get “everything” for small languages ● Large samples for English, French, etc. How we find languages ● Lots of manual web searching!
    [Show full text]
  • Predictive Text System for Bahasa with Frequency, N-Gram, Probability Table and Syntactic Using Grammar
    Predictive Text System for Bahasa with Frequency, n-gram, Probability Table and Syntactic using Grammar Derwin Suhartono, Garry Wong, Polim Kusuma and Silviana Saputra Computer Science Department, Bina Nusantara University, K H. Syahdan 9, Jakarta, Indonesia Keywords: Predictive Text, Word Prediction, n-gram, Prediction, KSPC, Keystrokes Saving. Abstract: Predictive text system is an alternative way to improve human communication, especially in matter of typing. Originally, predictive text system was intended for people who have flaws in verbal and motor. This system is aimed to all people who demands speed and accuracy in typing a document. There were many similar researches which develop this system that had their own strengths and weaknesses. This research attempts to develop the algorithm for predictive text system by combining four methods from previous researches and focus only in Bahasa (Indonesian language). The four methods consist of frequency, n-gram, probability table, and syntactic using grammar. Frequency method is used to rank words based on how many times the words were typed. Probability table is a table designed for storing data such as predefined phrases and trained data. N-gram is used to train data so that it is able to predict the next word based on previous word. And syntactic using grammar will predict the next word based on syntactic relationship between previous word and next word. By using this combination, user can reduce the keystroke up to 59% in which the average keystrokes saving is about 50%. 1 INTRODUCTION verbal and motor (Vitoria and Abascal, 2006). Over time, the usage of this system began to change and Conventional process of typing documents using a now is aimed to all people who demands speed and typewriter has become obsolete due to technological accuracy in typing a document.
    [Show full text]
  • Voice Typing: a New Speech Interaction Model for Dictation on Touchscreen Devices
    Voice Typing: A New Speech Interaction Model for Dictation on Touchscreen Devices †‡ † † Anuj Kumar , Tim Paek , Bongshin Lee † ‡ Microsoft Research Human-Computer Interaction Institute, One Microsoft Way Carnegie Mellon University Redmond, WA 98052, USA Pittsburgh, PA 15213, USA {timpaek, bongshin}@microsoft.com [email protected] [12] and other ergonomic issues such as the “fat finger ABSTRACT problem” [10]. Automatic dictation using speech Dictation using speech recognition could potentially serve recognition could serve as a natural and efficient mode of as an efficient input method for touchscreen devices. input, offering several potential advantages. First, speech However, dictation systems today follow a mentally throughput is reported to be at least three times faster than disruptive speech interaction model: users must first typing on a hardware QWERTY keyboard [3]. Second, formulate utterances and then produce them, as they would compared to other text input methods, such as handwriting with a voice recorder. Because utterances do not get or typing, speech has the greatest flexibility in terms of transcribed until users have finished speaking, the entire screen size. Finally, as touchscreen devices proliferate output appears and users must break their train of thought to throughout the world, speech input is (thus far) widely verify and correct it. In this paper, we introduce Voice considered the only plausible modality for the 800 million Typing, a new speech interaction model where users’ or so non-literate population [26]. utterances are transcribed as they produce them to enable real-time error identification. For fast correction, users However, realizing the potential of dictation critically leverage a marking menu using touch gestures.
    [Show full text]
  • Proceedings of the 55Th Annual Meeting of the Association For
    ComputEL-3 Proceedings of the 3rd Workshop on the Use of Computational Methods in the Study of Endangered Languages Volume 1 (Papers) February 26–27, 2019 Honolulu, Hawai‘i, USA Support: c 2019 The Association for Computational Linguistics Order copies of this and other ACL proceedings from: Association for Computational Linguistics (ACL) 209 N. Eighth Street Stroudsburg, PA 18360 USA Tel: +1-570-476-8006 Fax: +1-570-476-0860 [email protected] ISBN 978-1-950737-18-5 ii Preface These proceedings contain the papers presented at the 3rd Workshop on the Use of Computational Methods in the Study of Endangered languages held in Hawai’i at Manoa,¯ February 26–27, 2019. As the name implies, this is the third workshop held on the topic—the first meeting was co-located with the ACL main conference in Baltimore, Maryland in 2014 and the second one in 2017 was co-located with the 5th International Conference on Language Documentation and Conservation (ICLDC) at the University of Hawai‘i at Manoa.¯ The workshop covers a wide range of topics relevant to the study and documentation of endangered languages, ranging from technical papers on working systems and applications, to reports on community activities with supporting computational components. The purpose of the workshop is to bring together computational researchers, documentary linguists, and people involved with community efforts of language documentation and revitalization to take part in both formal and informal exchanges on how to integrate rapidly evolving language processing methods and tools into efforts of language description, documentation, and revitalization. The organizers are pleased with the range of papers, many of which highlight the importance of interdisciplinary work and interaction between the various communities that the workshop is aimed towards.
    [Show full text]
  • Experts Doubt Ethical AI Design Will Be Broadly Adopted As the Norm Within the Next Decade
    FOR RELEASE June 16, 2021 Experts Doubt Ethical AI Design Will Be Broadly Adopted as the Norm Within the Next Decade A majority worries that the evolution of artificial intelligence by 2030 will continue to be primarily focused on optimizing profits and social control. They also cite the difficulty of achieving consensus about ethics. Many who expect progress say it is not likely within the next decade. Still, a portion celebrate coming AI breakthroughs that will improve life BY Lee Rainie, Janna Anderson and Emily A. Vogels FOR MEDIA OR OTHER INQUIRIES: Lee Rainie, Director, Internet and Technology Research Janna Anderson, Director, Elon University’s Imagining the Internet Center Haley Nolan, Communications Associate 202.419.4372 www.pewresearch.org RECOMMENDED CITATION Pew Research Center, June 16, 2021. “Experts Doubt Ethical AI Design Will Be Broadly Adopted as the Norm in the Next Decade” 1 PEW RESEARCH CENTER About Pew Research Center Pew Research Center is a nonpartisan fact tank that informs the public about the issues, attitudes and trends shaping America and the world. It does not take policy positions. It conducts public opinion polling, demographic research, content analysis and other data-driven social science research. The Center studies U.S. politics and policy; journalism and media; internet, science and technology; religion and public life; Hispanic trends; global attitudes and trends; and U.S. social and demographic trends. All of the center’s reports are available at www.pewresearch.org. Pew Research Center is a subsidiary of The Pew Charitable Trusts, its primary funder. For this project, Pew Research Center worked with Elon University’s Imagining the Internet Center, which helped conceive the research and collect and analyze the data.
    [Show full text]