Wednesday, November 27, 2024

Impossible law?

https://www.bespacific.com/the-law-of-digital-resurrection/

The Law of Digital Resurrection

Haneman, Victoria J., The Law of Digital Resurrection  (July 17, 2024). __ B.C. L. Rev. __ (forthcoming 2025)., Available at SSRN: https://ssrn.com/abstract=4899324 or http://dx.doi.org/10.2139/ssrn.4899324

The digital right to be dead has yet to be recognized as an important legal right. Artificial intelligence, augmented reality, and nanotechnology have progressed to the point that personal data can be used to resurrect the deceased in digital form with appearance, voice, emotion, and memory recreated to allow interaction with a digital app, chat bot, or avatar that may be indistinguishable from that with a living person. Users may now have a completely immersive experience simply by loading the personal data of the deceased into a neural network to create a chatbot that inherits features and idiosyncrasies of the deceased and dynamically learns with increased communication. There is no legal or regulatory landscape against which to estate plan to protect those who would avoid digital resurrection, and few privacy rights for the deceased. This is an intersection of death, technology, and privacy law that has remained relatively ignored until recently. This Article is the first to respect death as an important and distinguishing part of the conversation about regulating digital resurrection. Death has long had a strained relationship with the law, giving rise to dramatically different needs and idiosyncratic legal rules. The law of the dead reflects the careful balance between the power of the state and an individual’s wishes, and it may be the only doctrinal space in which we legally protect remembrance. This Article frames the importance of almost half of a millennium of policy undergirding the law of the deceased, and proposes a paradigm focused upon a right of deletion for the deceased over source material (data), rather than testamentary control over the outcome (digital resurrection), with the suggestion that existing protections are likely sufficient to protect against unauthorized commercial resurrections.





Resistance is futile?

https://www.bespacific.com/surveillance-self-defense-tips-tools/

Surveillance Self-Defense Tips, Tools and How-tos for Safer Online Communications

We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for over thirty years. This is Surveillance Self-Defense: our expert guide to protecting you and your friends from online spying.  Surveillance Self-Defense (SSD) is a guide to protecting yourself from electronic surveillance for people all over the world. Some aspects of this guide will be useful to people with very little technical knowledge, while others are aimed at an audience with considerable technical expertise and privacy/security trainers. We believe that everyone’s threat model is unique.

  • Read the BASICS to find out how online surveillance works.
  • Dive into our TOOL GUIDES for instructions to installing our pick of the best, most secure applications.
  • We have more detailed information in our FURTHER LEARNING sections.
  • If you’d like a guided tour, look for our list of common SECURITY SCENARIOS.



(Related)

https://insight.kellogg.northwestern.edu/article/podcast-the-ai-risks-your-business-should-avoid

Podcast: The AI Risks Your Business Should Avoid

Depending on the generative AI model you use, a simple prompt could be enough to jeopardize sensitive company data.

But that’s not the only harm AI stands to impose on businesses that aren’t careful, says Kristian Hammond, a computer science professor at Northwestern’s McCormick School of Engineering and director of the school’s Center for Advancing Safety of Machine Intelligence (CASMI). Hammond also helped start Kellogg’s MBAi program.

On this episode of The Insightful Leader: What leaders need to know.





Perspective.

https://www.technologyreview.com/2024/11/26/1107309/we-need-to-start-wrestling-with-the-ethics-of-ai-agents/

We need to start wrestling with the ethics of AI agents

If such tools become cheap and easy to build, it will raise lots of new ethical concerns, but two in particular stand out. The first is that these agents could create even more personal, and even more harmful, deepfakes. Image generation tools have already made it simple to create nonconsensual pornography using a single image of a person, but this crisis will only deepen if it’s easy to replicate someone’s voice, preferences, and personality as well. (Park told me he and his team spent more than a year wrestling with ethical issues like this in their latest research project, engaging in many conversations with Stanford’s ethics board and drafting policies on how the participants could withdraw their data and contributions.)

The second is the fundamental question of whether we deserve to know whether we’re talking to an agent or a human. If you complete an interview with an AI and submit samples of your voice to create an agent that sounds and responds like you, are your friends or coworkers entitled to know when they’re talking to it and not to you? On the other side, if you ring your cell service provider or doctor’s office and a cheery customer service agent answers the line, are you entitled to know whether you’re talking to an AI?



(Related)

https://www.wired.com/story/linkedin-ai-generated-influencers/

Yes, That Viral LinkedIn Post You Read Was Probably AI-Generated

A new analysis estimates that over half of longer English-language posts on LinkedIn are AI-generated, indicating the platform’s embrace of AI tools has been a success.





An interest of mine.

https://www.bespacific.com/research-methodology-students-guide/

Research Methodology: Students’ Guide

Policy Research, Institute of Legal and, Research Methodology: Students’ Guide (August 24, 2024). Available at SSRN: https://ssrn.com/abstract=4935909 or http://dx.doi.org/10.2139/ssrn.4935909

Research is a complex process that involves systematic collection, analysis, and interpretation of data to advance knowledge. It requires meticulous planning, methodological rigor, and critical thinking. Effective reporting of findings is essential for knowledge dissemination. Research is a continuous inquiry, involving ongoing questioning and refinement of methods. The paper aims to equip researchers with the knowledge, skills, and tools for meaningful research. It emphasizes the importance of aligning research interests with inquiry approaches. The paper highlights that research is not just about collecting data but also about how that data is collected, interpreted, and communicated. Researchers must actively engage in various steps, including identifying research areas, formulating questions, conducting literature reviews, designing studies, and reflecting critically. Reflective thinking in research involves adopting a critical perspective, challenging assumptions, and exploring alternative viewpoints. The paper also discusses research as writing, emphasizing the importance of clear and persuasive communication of findings. The review of literature and collection of data are crucial steps in research, requiring careful selection and evaluation of sources. An annotated bibliography is a valuable tool for summarizing and evaluating sources, helping researchers understand their relevance and contribution to the field.



No comments: