Knowledge systems outside of those sanctioned by Western universities have often been marginalised or simply not engaged with in many science disciplines, but there are multiple examples where Western scientists have claimed discoveries for knowledge that resident experts already knew and shared. According to a new paper there are five interventions to build a more anti-oppressive and decolonial ecology.
Do users, customers, employees, and others have a right to know how companies that use algorithms make their decisions? In a new analysis, researchers explore the moral and ethical foundations to such a right. They conclude that the right to such an explanation is a moral right, then address how companies might do so.
Researchers from MSU are developing a mobile app to act as a safeguard for popular but vulnerable "wallet" applications used to manage cryptocurrency.
University at Buffalo research shows 3D printers can be identified by thermodynamic properties, which could could aid intellectual property, security
This new tool uses an artificial intelligence system to generate fake documents that foil IP theft by fooling adversaries
Open access (OA) democratizes access to research literature, but OA authors are more likely to be males in STEM fields at wealthier institutions.
The Ben-Gurion U. researchers showed that by using digital "foot-in-the-door" techniques, such as requesting personal information from less important to more private (ascending privacy-intrusion order), websites can successfully entice users to reveal more of their private information. Similarly, by placing each request on consecutive, separate webpages, users are more likely to reveal more private data. Websites can further manipulate their users by spreading out information requests over the course of several pages, rather than consolidating all requests on one page.
Financial regulators have a wait and see approach to decentralized privacy-preserving cryptocurrencies, letting them mature before deciding how to regulate them. Yet they assume there will be some way for oversight in the future to track extraordinary transactions linked to organized crime, terrorism financing and money laundering.
New cybersecurity research reveals the shocking number of vendors selling passports and identification documents online.
The increasing threat of foreign interference in elections has driven six nations to take similar approaches to combat this pervasive threat. A review of the details to their responses brings out valuable differences and insights.