Data can be used for good, harnessed for the betterment of society, but it can also be abused. Find out about some hidden not-so-sunny uses of Big Data.
# | Título | Descripción | |||
---|---|---|---|---|---|
1 |
Battling bad science
14:19
|
Every day there are news reports of new health advice, but how can you know if they're right? Doctor and epidemiologist Ben Goldacre shows us, at high speed, the ways evidence can be distorted, from the blindingly obvious nutrition claims to the very subtle tricks of the pharmaceutical industry.
|
Ver | ||
2 |
FBI, here I am!
14:30
|
After he ended up on a watch list by accident, Hasan Elahi was advised by his local FBI agents to let them know when he was traveling. He did that and more ... much more.
|
Ver | ||
3 |
How algorithms shape our world
15:22
|
Kevin Slavin argues that we're living in a world designed for -- and increasingly controlled by -- algorithms. In this riveting talk from TEDGlobal, he shows how these complex computer programs determine: espionage tactics, stock prices, movie scripts, and architecture. And he warns that we are writing code we can't understand, with implications we can't control.
|
Ver | ||
4 |
How the NSA betrayed the world's trust -- time to act
19:18
|
Recent events have highlighted, underlined and bolded the fact that the United States is performing blanket surveillance on any foreigner whose data passes through an American entity -- whether they are suspected of wrongdoing or not. This means that, essentially, every international user of the internet is being watched, says Mikko Hypponen. An important rant,
|
Ver | ||
5 |
The case for anonymity online
11:25
|
The founder of 4chan, a controversial, uncensored online imageboard, describes its subculture, some of the Internet "memes" it has launched, and the incident in which its users managed a very public, precision hack of a mainstream media website. The talk raises questions about the power -- and price -- of anonymity.
|
Ver | ||
6 |
The curly fry conundrum: Why social media “likes” say more than you might think
09:55
|
Do you like curly fries? Have you Liked them on Facebook? Watch this talk to find out the surprising things Facebook (and others) can guess about you from your random Likes and Shares. Computer scientist Jennifer Golbeck explains how this came about, how some applications of the technology are not so cute — and why she thinks we should return the control of
|
Ver | ||
7 |
The strangeness of scale at Twitter
09:19
|
When hundreds of thousands of Tweets are fired every second, a one-in-a-million chance — including unlikely sounding scenarios that could harm users — happens about 500 times a day. For Del Harvey, who heads Twitter’s Trust and Safety Team, these odds aren’t good. The security maven spends her days thinking about how to prevent worst-case scenarios while giving voice
|
Ver | ||
8 |
Three types of online attack
09:23
|
Cybercrime expert Mikko Hypponen talks us through three types of online attack on our privacy and data -- and only two are considered crimes. "Do we blindly trust any future government? Because any right we give away, we give away for good."
|
Ver | ||
9 |
Why privacy matters
15:00
|
The line between public and private has blurred in the past decade, both online and in real life, and Alessandro Acquisti is here to explain what this means and why it matters. In this thought-provoking, slightly chilling talk, he shares details of recent and ongoing research -- including a project that shows how easy it is to match a photograph of a stranger
|
Ver | ||
10 |
Your phone company is watching
09:56
|
What kind of data is your cell phone company collecting? Malte Spitz wasn’t too worried when he asked his operator in Germany to share information stored about him. Multiple unanswered requests and a lawsuit later, Spitz received 35,830 lines of code -- a detailed, nearly minute-by-minute account of half a year of his life.
|
Ver |