Impossible law?
https://www.bespacific.com/the-law-of-digital-resurrection/
The
Law of Digital Resurrection
Haneman,
Victoria J., The Law of Digital Resurrection (July 17, 2024).
__ B.C. L. Rev. __ (forthcoming 2025)., Available at
SSRN: https://ssrn.com/abstract=4899324
or http://dx.doi.org/10.2139/ssrn.4899324
The digital
right to be dead has yet to be recognized as an important legal
right. Artificial intelligence, augmented reality, and
nanotechnology have progressed to the point that personal data can be
used to resurrect the deceased in digital form with appearance,
voice, emotion, and memory recreated to allow interaction with a
digital app, chat bot, or avatar that may be indistinguishable from
that with a living person. Users may now have a completely immersive
experience simply by loading the personal data of the deceased into a
neural network to create a chatbot that inherits features and
idiosyncrasies of the deceased and dynamically learns with increased
communication. There is no legal or regulatory landscape against
which to estate plan to protect those who would avoid digital
resurrection, and few
privacy rights for the deceased. This is an intersection
of death, technology, and privacy law that has remained relatively
ignored until recently. This Article is the first to respect death
as an important and distinguishing part of the conversation about
regulating digital resurrection. Death has long had a strained
relationship with the law, giving rise to dramatically different
needs and idiosyncratic legal rules. The law of the dead reflects
the careful balance between the power of the state and an
individual’s wishes, and it may be the only doctrinal space in
which we legally protect remembrance. This Article frames the
importance of almost half of a millennium of policy undergirding the
law of the deceased, and proposes a paradigm focused upon a right of
deletion for the deceased over source material (data), rather than
testamentary control over the outcome (digital resurrection), with
the suggestion that existing protections are likely sufficient to
protect against unauthorized commercial resurrections.
Resistance
is futile?
https://www.bespacific.com/surveillance-self-defense-tips-tools/
Surveillance
Self-Defense Tips, Tools and How-tos for Safer Online Communications
We’re
the Electronic Frontier Foundation, an independent non-profit working
to protect online privacy for over thirty years. This
is Surveillance
Self-Defense:
our expert guide to protecting you and your friends from online
spying. Surveillance
Self-Defense (SSD)
is a guide to protecting yourself from electronic surveillance for
people all over the world. Some aspects of this guide will be useful
to people with very little technical knowledge, while others are
aimed at an audience with considerable technical expertise and
privacy/security trainers. We believe that everyone’s threat
model is
unique.
Read
the BASICS
to
find out how online surveillance works.
Dive
into our TOOL
GUIDES for
instructions to installing our pick of the best, most secure
applications.
We
have more detailed information in our FURTHER
LEARNING sections.
If
you’d like a guided tour, look for our list of common SECURITY
SCENARIOS.
(Related)
https://insight.kellogg.northwestern.edu/article/podcast-the-ai-risks-your-business-should-avoid
Podcast:
The AI Risks Your Business Should Avoid
Depending
on the generative AI model you use, a simple prompt could be enough
to jeopardize sensitive company data.
But
that’s not the only harm AI stands to impose on businesses that
aren’t careful, says Kristian Hammond, a computer science professor
at Northwestern’s McCormick School of Engineering and director of
the school’s Center for Advancing Safety of Machine Intelligence
(CASMI). Hammond also helped start Kellogg’s MBAi program.
On
this episode of The Insightful Leader: What leaders need to
know.
Perspective.
https://www.technologyreview.com/2024/11/26/1107309/we-need-to-start-wrestling-with-the-ethics-of-ai-agents/
We
need to start wrestling with the ethics of AI agents
… If
such tools become cheap and easy to build, it will raise lots of new
ethical concerns, but two in particular stand out. The first is that
these agents could create even more personal, and even more harmful,
deepfakes. Image generation tools have already made it simple to
create nonconsensual pornography using a single image of a person,
but this crisis will only deepen if it’s easy to replicate
someone’s voice, preferences, and personality as well. (Park told
me he and his team spent more than a year wrestling with ethical
issues like this in their latest research project, engaging in many
conversations with Stanford’s ethics board and drafting policies on
how the participants could withdraw their data and contributions.)
The
second is the fundamental
question of whether we deserve to know whether we’re talking to an
agent or a human. If you complete an interview with an AI
and submit samples of your voice to create an agent that sounds and
responds like you, are your friends or coworkers entitled to know
when they’re talking to it and not to you? On the other side, if
you ring your cell service provider or doctor’s office and a cheery
customer service agent answers the line, are you entitled to know
whether you’re talking to an AI?
(Related)
https://www.wired.com/story/linkedin-ai-generated-influencers/
Yes,
That Viral LinkedIn Post You Read Was Probably AI-Generated
A
new analysis estimates that over half of longer English-language
posts on LinkedIn are AI-generated, indicating the platform’s
embrace of AI tools has been a success.
An
interest of mine.
https://www.bespacific.com/research-methodology-students-guide/
Research
Methodology: Students’ Guide
Policy
Research, Institute of Legal and, Research Methodology: Students’
Guide (August 24, 2024). Available at
SSRN: https://ssrn.com/abstract=4935909
or http://dx.doi.org/10.2139/ssrn.4935909
Research
is a complex process that involves systematic collection, analysis,
and interpretation of data to advance knowledge. It requires
meticulous planning, methodological rigor, and critical thinking.
Effective reporting of findings is essential for knowledge
dissemination. Research is a continuous inquiry, involving ongoing
questioning and refinement of methods. The paper aims to equip
researchers with the knowledge, skills, and tools for meaningful
research. It emphasizes the importance of aligning research
interests with inquiry approaches. The paper highlights that
research is not just about collecting data but also about how that
data is collected, interpreted, and communicated. Researchers must
actively engage in various steps, including identifying research
areas, formulating questions, conducting literature reviews,
designing studies, and reflecting critically. Reflective thinking in
research involves adopting a critical perspective, challenging
assumptions, and exploring alternative viewpoints. The paper also
discusses research as writing, emphasizing the importance of clear
and persuasive communication of findings. The review of literature
and collection of data are crucial steps in research, requiring
careful selection and evaluation of sources. An annotated
bibliography is a valuable tool for summarizing and evaluating
sources, helping researchers understand their relevance and
contribution to the field.