Browse Results

Showing 54,451 through 54,475 of 54,498 results

As If Human: Ethics and Artificial Intelligence

by Nigel Shadbolt Roger Hampson

A new approach to the challenges surrounding artificial intelligence that argues for assessing AI actions as if they came from a human being Intelligent machines present us every day with urgent ethical challenges. Is the facial recognition software used by an agency fair? When algorithms determine questions of justice, finance, health, and defense, are the decisions proportionate, equitable, transparent, and accountable? How do we harness this extraordinary technology to empower rather than oppress? Despite increasingly sophisticated programming, artificial intelligences share none of our essential human characteristics—sentience, physical sensation, emotional responsiveness, versatile general intelligence. However, Nigel Shadbolt and Roger Hampson argue, if we assess AI decisions, products, and calls for action as if they came from a human being, we can avert a disastrous and amoral future. The authors go beyond the headlines about rampant robots to apply established moral principles in shaping our AI future. Their new framework constitutes a how-to for building a more ethical machine intelligence.

Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence

by Kate Crawford

The hidden costs of artificial intelligence, from natural resources and labor to privacy, equality, and freedom&“Eloquent, clear and profound—this volume is a classic for our times. It draws our attention away from the bright shiny objects of the new colonialism through elucidating the social, material and political dimensions of Artificial Intelligence.&”—Geoffrey C. Bowker, University of California, Irvine What happens when artificial intelligence saturates political life and depletes the planet? How is AI shaping our understanding of ourselves and our societies? In this book Kate Crawford reveals how this planetary network is fueling a shift toward undemocratic governance and increased racial, gender, and economic inequality. Drawing on more than a decade of research, award‑winning science, and technology, Crawford reveals how AI is a technology of extraction: from the energy and minerals needed to build and sustain its infrastructure, to the exploited workers behind &“automated&” services, to the data AI collects from us. Rather than taking a narrow focus on code and algorithms, Crawford offers us a political and a material perspective on what it takes to make artificial intelligence and where it goes wrong. While technical systems present a veneer of objectivity, they are always systems of power. This is an urgent account of what is at stake as technology companies use artificial intelligence to reshape the world.

Behind the Screen: Content Moderation in the Shadows of Social Media

by Sarah T. Roberts

An eye-opening look at the invisible workers who protect us from seeing humanity’s worst on today’s commercial internet Social media on the internet can be a nightmarish place. A primary shield against hateful language, violent videos, and online cruelty uploaded by users is not an algorithm. It is people. Mostly invisible by design, more than 100,000 commercial content moderators evaluate posts on mainstream social media platforms: enforcing internal policies, training artificial intelligence systems, and actively screening and removing offensive material—sometimes thousands of items per day. Sarah T. Roberts, an award-winning social media scholar, offers the first extensive ethnographic study of the commercial content moderation industry. Based on interviews with workers from Silicon Valley to the Philippines, at boutique firms and at major social media companies, she contextualizes this hidden industry and examines the emotional toll it takes on its workers. This revealing investigation of the people “behind the screen” offers insights into not only the reality of our commercial internet but the future of globalized labor in the digital age.

The Best Technology Writing 2010

by Julian Dibbell

The iPad. The Kindle. Twitter. When the Best Technology Writing series was inaugurated in 2005, these technologies did not exist. Now they define our 21st-century lives. As Julian Dibbell writes in his introduction to The Best Technology Writing 2010,"The digital is us. Yet for that reason, it is also something more, a lightning rod for our feelings about technology in general. " Whether it is Sam Anderson's giddy but troubled defense of online distractions, David Carr's full-throated elegy to the dying world of pre-digital publishing, Steven Johnson's warm appreciation of Twitter's bite-size contributions to collective human intelligence, or Evan Ratliff's fascinating month-long quest to disappear without a digital trace, many of the essays gathered here register our intense and complicated fascination with digital media. But as Dibbell notes, these essays also remind us that some of the most disruptive and fascinating technologies continue to come from beyond the digital world. Jill Lepore's writing on the politics of breast-feeding gadgetry, Stephen Silberman's investigation of the placebo effect in pharmaceutical testing, Burkhard Bilger reporting on efforts to build a better cook stove for the developing world, and Tad Friend's profile of electric-car developer Elon Musk's efforts to head off environmental catastrophe all invite us to reflect on how many aspects of human experience remain fundamentally unchanged by digital technology. Packed with marvelous essays on technologies old and new,The Best Technology Writing 2010 is an outstanding addition to this "fantastic" (Cory Doctorow), "fascinating" (Chris Anderson) series. The Best Technology Writing 2010includes essays written by: Sam Anderson Burkhard Bilger Joshua Bearman Mark Bowden David Carr Douglas Fox Tad Friend Ben Greenman Vanessa Grigoriadis James Harkin Adam Higginbotham Alex Hutchinson Steven Johnson Kevin Kelly Jill Lepore Alexis Madrigal Javier Marias Mike Massimino Evan Ratliff Daniel Roth Clay Shirky Steve Silberman Annie Trubek Lawrence Weschler

Configuring the Networked Self

by Julie E. Cohen

The legal and technical rules governing flows of information are out of balance, argues Julie E. Cohen in this original analysis of information law and policy. Flows of cultural and technical information are overly restricted, while flows of personal information often are not restricted at all. The author investigates the institutional forces shaping the emerging information society and the contradictions between those forces and the ways that people use information and information technologies in their everyday lives. She then proposes legal principles to ensure that people have ample room for cultural and material participation as well as greater control over the boundary conditions that govern flows of information to, from, and about them.

Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media

by Tarleton Gillespie

A revealing and gripping investigation into how social media platforms police what we post online—and the large societal impact of these decisions Most users want their Twitter feed, Facebook page, and YouTube comments to be free of harassment and porn. Whether faced with “fake news” or livestreamed violence, “content moderators”—who censor or promote user†‘posted content—have never been more important. This is especially true when the tools that social media platforms use to curb trolling, ban hate speech, and censor pornography can also silence the speech you need to hear. In this revealing and nuanced exploration, award†‘winning sociologist and cultural observer Tarleton Gillespie provides an overview of current social media practices and explains the underlying rationales for how, when, and why these policies are enforced. In doing so, Gillespie highlights that content moderation receives too little public scrutiny even as it is shapes social norms and creates consequences for public discourse, cultural production, and the fabric of society. Based on interviews with content moderators, creators, and consumers, this accessible, timely book is a must†‘read for anyone who’s ever clicked “like” or “retweet.”

Database of Dreams

by Rebecca Lemov

Just a few years before the dawn of the digital age, Harvard psychologist Bert Kaplan set out to build the largest database of sociological information ever assembled. It was the mid-1950s, and social scientists were entranced by the human insights promised by Rorschach tests and other innovative scientific protocols. Kaplan, along with anthropologist A. I. Hallowell and a team of researchers, sought out a varied range of non-European subjects among remote and largely non-literate peoples around the globe. Recording their dreams, stories, and innermost thoughts in a vast database, Kaplan envisioned future researchers accessing the data through the cutting-edge Readex machine. Almost immediately, however, technological developments and the obsolescence of the theoretical framework rendered the project irrelevant, and eventually it was forgotten.

The Future of Reputation: Gossip, Rumor, and Privacy on the Internet

by Daniel J. Solove

Teeming with chatrooms, online discussion groups, and blogs, the Internet offers previously unimagined opportunities for personal expression and communication. But there's a dark side to the story. A trail of information fragments about us is forever preserved on the Internet, instantly available in a Google search. A permanent chronicle of our private lives--often of dubious reliability and sometimes totally false--will follow us wherever we go, accessible to friends, strangers, dates, employers, neighbors, relatives, and anyone else who cares to look. This engrossing book, brimming with amazing examples of gossip, slander, and rumor on the Internet, explores the profound implications of the online collision between free speech and privacy. Daniel Solove, an authority on information privacy law, offers a fascinating account of how the Internet is transforming gossip, the way we shame others, and our ability to protect our own reputations. Focusing on blogs, Internet communities, cybermobs, and other current trends, he shows that, ironically, the unconstrained flow of information on the Internet may impede opportunities for self-development and freedom. Long-standing notions of privacy need review, the author contends: unless we establish a balance between privacy and free speech, we may discover that the freedom of the Internet makes us less free.

The Global War for Internet Governance

by Laura Denardis

The Internet has transformed the manner in which information is exchanged and business is conducted, arguably more than any other communication development in the past century. Despite its wide reach and powerful global influence, it is a medium uncontrolled by any one centralized system, organization, or governing body, a reality that has given rise to all manner of free-speech issues and cybersecurity concerns. The conflicts surrounding Internet governance are the new spaces where political and economic power is unfolding in the twenty-first century. This all-important study by Laura DeNardis reveals the inner power structure already in place within the architectures and institutions of Internet governance. It provides a theoretical framework for Internet governance that takes into account the privatization of global power as well as the role of sovereign nations and international treaties. In addition, DeNardis explores what is at stake in open global controversies and stresses the responsibility of the public to actively engage in these debates, because Internet governance will ultimately determine Internet freedom.

Listening In: Cybersecurity in an Insecure Age

by Susan Landau

A cybersecurity expert and former Google privacy analyst’s urgent call to protect devices and networks against malicious hackers and misinformed policymakers New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country’s electricity—and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age.

Manufacturing Consensus: Understanding Propaganda in the Era of Automation and Anonymity

by Samuel Woolley

An in-depth exploration of social media and emergent technology that details the inner workings of modern propaganda Until recently, propaganda was a top-down, elite-only system of communication control used largely by state actors. Samuel Woolley argues that social media has democratized today’s propaganda, allowing nearly anyone to launch a fairly sophisticated, computationally enhanced influence campaign. Woolley shows how social media, with its anonymity and capacity for automation, allows a wide variety of groups to build the illusion of popularity through computational tools (such as bots) and human-driven efforts (such as sockpuppets—real people assuming false identities online—and partisan influencers). They use these technologies and strategies to create a bandwagon effect by bringing the content into parallel discussions with other legitimate users, or to mold discontent for political purposes. Drawing on eight years of original international ethnographic research among the people who build, combat, and experience these propaganda campaigns, Woolley presents an extensive view of the evolution of computational propaganda, offers a glimpse into the future, and suggests pragmatic responses for policy makers, academics, technologists, and others.

The Modem World: A Prehistory of Social Media

by Kevin Driscoll

The untold story about how the internet became social, and why this matters for its future &“A great book for anyone who wants to understand the early days of online communications.&”—Preston Gralla, Arts Fuse Fifteen years before the commercialization of the internet, millions of amateurs across North America created more than 100,000 small-scale computer networks. The people who built and maintained these dial-up bulletin board systems (BBSs) in the 1980s laid the groundwork for millions of others who would bring their lives online in the 1990s and beyond. From ham radio operators to HIV/AIDS activists, these modem enthusiasts developed novel forms of community moderation, governance, and commercialization. The Modem World tells an alternative origin story for social media, centered not in the office parks of Silicon Valley or the meeting rooms of military contractors, but rather on the online communities of hobbyists, activists, and entrepreneurs. Over time, countless social media platforms have appropriated the social and technical innovations of the BBS community. How can these untold stories from the internet&’s past inspire more inclusive visions of its future?

The Network is Your Customer: Five Strategies to Thrive in a Digital Age

by David L. Rogers

"An incredibly useful and valuable guidebook to the new consumer economy. Buy it. Learn from it. Succeed with it. "--Jeff Jarvis, author ofWhat Would Google Do "This is the stuff that every business and nonprofit needs to embrace if they're going to succeed in a changing world. "--Vivian Schiller, CEO of NPR With clear analysis and practical frameworks, this book provides a strategic guide that any business or nonprofit can use to succeed in the digital age. Marketing expert David Rogers examines how digital technologies--from smartphones to social networks--connect us in frameworks that transform our relationships to business and each other. To thrive today, organizations need new strategies--strategies designed for customer networks. Rogers offers five strategies that any business can use to create new value: ACCESS--be faster, be easier, be everywhere, be always on ENGAGE--become a source of valued content CUSTOMIZE--make your offering adaptable to your customer's needs CONNECT--become a part of your customers' conversations COLLABORATE--involve your customers at every stage of your enterprise Rogers explains these five strategies with over 100 cases from every type and size of business--from shoes to news, and software to healthcare. InThe Network Is Your Customer, he shows: How Apple harnessed a host of collaborators to write apps for its iPhone How IBM designed a videogame to help sell its enterprise software How Ford Motors inspired an online community to build brand awareness for its new Fiesta . . . and countless other cases from consumer, b2b, and nonprofit categories. The book outlines a process for planning and implementing a customer network strategy to matchyourcustomers,yourbusiness, andyourobjectives--whether you need to drive sales, to enhance innovation, to reduce costs, to gain customer insight, or to build breakthrough products and services. Because today, whatever your goals and whatever your business, the network is your customer.

The New Goliaths: How Corporations Use Software to Dominate Industries, Kill Innovation, and Undermine Regulation

by James Bessen

An approach to reinvigorating economic competition that doesn’t break up corporate giants, but compels them to share their technology, data, and knowledge “Bessen is a master of unpacking the nuances of a complex array of interrelated trends to build a coherent story of how the promise of the democratized Internet ended up under the control of just a few. Read The New Goliaths to see how the forest came to have only room for a few tall trees with the rest of us in the undergrowth.”—Joshua Gans, coauthor of Prediction Machines: The Simple Economics of Artificial Intelligence Historically, competition has powered progress under capitalism. Companies with productive new products rise to the top, but sooner or later, competitors come along with better innovations and disrupt the threat of monopoly. Dominant firms like Walmart, Amazon, and Google argue that this process of “creative destruction” prevents them from becoming too powerful or entrenched. But the threat of competition has sharply decreased over the past twenty years, and today’s corporate giants have come to power by using proprietary information technologies to create a tilted playing field. This development has increased economic inequality and social division, slowed innovation, and allowed dominant firms to evade government regulation. In the face of increasing calls to break up the largest companies, James Bessen argues that a better way to restore competitive balance and dynamism is to encourage or compel these companies to share technology, data, and knowledge.

(Not) Getting Paid to Do What You Love: Gender, Social Media, and Aspirational Work

by Brooke Erin Duffy

An illuminating investigation into a class of enterprising women aspiring to “make it” in the social media economy but often finding only unpaid work Profound transformations in our digital society have brought many enterprising women to social media platforms—from blogs to YouTube to Instagram—in hopes of channeling their talents into fulfilling careers. In this eye-opening book, Brooke Erin Duffy draws much-needed attention to the gap between the handful who find lucrative careers and the rest, whose “passion projects” amount to free work for corporate brands. Drawing on interviews and fieldwork, Duffy offers fascinating insights into the work and lives of fashion bloggers, beauty vloggers, and designers. She connects the activities of these women to larger shifts in unpaid and gendered labor, offering a lens through which to understand, anticipate, and critique broader transformations in the creative economy. At a moment when social media offer the rousing assurance that anyone can “make it”—and stand out among freelancers, temps, and gig workers—Duffy asks us all to consider the stakes of not getting paid to do what you love.

Nothing to Hide: The False Tradeoff Between Privacy and Security

by Daniel J. Solove

"If you've got nothing to hide," many people say, "you shouldn't worry about government surveillance. " Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this important book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so. The debate between privacy and security has been framed incorrectly as a zero-sum game in which we are forced to choose between one value and the other. Why can't we have both? In this concise and accessible book, Solove exposes the fallacies of many pro-security arguments that have skewed law and policy to favor security at the expense of privacy. Protecting privacy isn't fatal to security measures; it merely involves adequate oversight and regulation. Solove traces the history of the privacy-security debate from the Revolution to the present day. He explains how the law protects privacy and examines concerns with new technologies. He then points out the failings of our current system and offers specific remedies. Nothing to Hidemakes a powerful and compelling case for reaching a better balance between privacy and security and reveals why doing so is essential to protect our freedom and democracy.

The Private Is Political: Networked Privacy and Social Media

by Alice E. Marwick

A compelling firsthand investigation of how social media and big data have amplified the close relationship between privacy and inequality Online privacy is under constant attack by social media and big data technologies. But we cannot rely on individual actions to remedy this—it is a matter of social justice. Alice E. Marwick offers a new way of understanding how privacy is jeopardized, particularly for marginalized and disadvantaged communities—including immigrants, the poor, people of color, LGBTQ+ populations, and victims of online harassment. Marwick shows that few resources or regulations for preventing personal information from spreading on the internet. Through a new theory of “networked privacy,” she reveals how current legal and technological frameworks are woefully inadequate in addressing issues of privacy—often by design. Drawing from interviews and focus groups encompassing a diverse group of Americans, Marwick shows that even heavy social media users care deeply about privacy and engage in extensive “privacy work” to protect it. But people are up against the violation machine of the modern internet. Safeguarding privacy must happen at the collective level.

The Propagandists' Playbook: How Conservative Elites Manipulate Search and Threaten Democracy

by Francesca Bolla Tripodi

An examination of what algorithmic polarization means for society and how conservative elites use media literacy tactics to spread propagandaThe Propagandists&’ Playbook peels back the layers of the right-wing media manipulation machine to reveal why its strategies are so effective and pervasive, while also humanizing the people whose worldviews and media practices conservatism embodies. Based on interviews and ethnographic observations of two Republican groups over the course of the 2017 Virginia gubernatorial race—including the author&’s firsthand experience of the 2017 Unite the Right rally—the book considers how Google algorithms, YouTube playlists, pundits, and politicians can manipulate audiences, reaffirm beliefs, and expose audiences to more extremist ideas, blurring the lines between reality and fiction. Francesca Tripodi argues that conservatives who embody the Christian worldview give authoritative weight to original texts and interrogate the media using the same tools taught to them in Bible study—for example, using Google to &“fact check&” the news. The result of this practice, tied to conservative marketing tactics, is more than a reaffirmation of existing beliefs: it is a radicalization of content and a changing of narratives adopted by the media. Tripodi also demonstrates the pervasiveness of white supremacy in the conservative media ecosystem, as well as its mainstream appeal, scope, and spread.

Science Blogging

by Bethany Brookshire Christie Wilcox Jason G. Goldman

Here is the essential how-to guide for communicating scientific research and discoveries online, ideal for journalists, researchers, and public information officers looking to reach a wide lay audience. Drawing on the cumulative experience of twenty-seven of the greatest minds in scientific communication, this invaluable handbook targets the specific questions and concerns of the scientific community, offering help in a wide range of digital areas, including blogging, creating podcasts, tweeting, and more. With step-by-step guidance and one-stop expertise, this is the book every scientist, science writer, and practitioner needs to approach the Wild West of the Web with knowledge and confidence.

Status Update

by Alice E. Marwick

Social media technologies such as YouTube, Twitter, and Facebook promised a new participatory online culture. Yet, technology insider Alice Marwick contends in this insightful book, "Web 2.0" only encouraged a preoccupation with status and attention. Her original research--which includes conversations with entrepreneurs, Internet celebrities, and Silicon Valley journalists--explores the culture and ideology of San Francisco's tech community in the period between the dot com boom and the App store, when the city was the world's center of social media development. Marwick argues that early revolutionary goals have failed to materialize: while many continue to view social media as democratic, these technologies instead turn users into marketers and self-promoters, and leave technology companies poised to violate privacy and to prioritize profits over participation. Marwick analyzes status-building techniques--such as self-branding, micro-celebrity, and life-streaming--to show that Web 2.0 did not provide a cultural revolution, but only furthered inequality and reinforced traditional social stratification, demarcated by race, class, and gender.

This Program Is Brought to You By...

by Joshua A. Braun

Journalism, television, cable, and online media are all evolving rapidly. At the nexus of these volatile industries is a growing group of individuals and firms whose job it is to develop and maintain online distribution channels for television news programming. Their work, and the tensions surrounding it, provide a fulcrum from which to pry analytically at some of the largest shifts within our media landscape. Based on fieldwork and interviews with different teams and organizations within MSNBC, this multi-disciplinary work is unique in its focus on distribution, which is rapidly becoming as central as production, to media work.

Twitter and Tear Gas: The Power and Fragility of Networked Protest

by Zeynep Tufekci

A firsthand account and incisive analysis of modern protest, revealing internet-fueled social movements’ greatest strengths and frequent challenges To understand a thwarted Turkish coup, an anti–Wall Street encampment, and a packed Tahrir Square, we must first comprehend the power and the weaknesses of using new technologies to mobilize large numbers of people. An incisive observer, writer, and participant in today’s social movements, Zeynep Tufekci explains in this accessible and compelling book the nuanced trajectories of modern protests—how they form, how they operate differently from past protests, and why they have difficulty persisting in their long-term quests for change. Tufekci speaks from direct experience, combining on-the-ground interviews with insightful analysis. She describes how the internet helped the Zapatista uprisings in Mexico, the necessity of remote Twitter users to organize medical supplies during Arab Spring, the refusal to use bullhorns in the Occupy Movement that started in New York, and the empowering effect of tear gas in Istanbul’s Gezi Park. These details from life inside social movements complete a moving investigation of authority, technology, and culture—and offer essential insights into the future of governance.

Virtual Justice

by Greg Lastowka

Tens of millions of people today are living part of their life in a virtual world. In places like World of Warcraft, Second Life, and Free Realms, people are making friends, building communities, creating art, and making real money. Business is booming on the virtual frontier, as billions of dollars are paid in exchange for pixels on screens. But sometimes things go wrong. Virtual criminals defraud online communities in pursuit of real-world profits. People feel cheated when their avatars lose virtual property to wrongdoers. Increasingly, they turn to legal systems for solutions. But when your avatar has been robbed, what law is there to assist you? InVirtual Justice,Greg Lastowka illustrates the real legal dilemmas posed by virtual worlds. Presenting the most recent lawsuits and controversies, he explains how governments are responding to the chaos on the cyberspace frontier. After an engaging overview of the history and business models of today's virtual worlds, he explores how laws of property, jurisdiction, crime, and copyright are being adapted to pave the path of virtual law. Virtual worlds are becoming more important to society with each passing year. This pioneering study will be an invaluable guide to scholars of online communities for years to come.

The Virtual Weapon and International Order

by Lucas Kello

An urgently needed examination of the current cyber revolution that draws on case studies to develop conceptual frameworks for understanding its effects on international order The cyber revolution is the revolution of our time. The rapid expansion of cyberspace brings both promise and peril. It promotes new modes of political interaction, but it also disrupts interstate dealings and empowers non-state actors who may instigate diplomatic and military crises. Despite significant experience with cyber phenomena, the conceptual apparatus to analyze, understand, and address their effects on international order remains primitive. Here, Lucas Kello adapts and applies international relations theory to create new ways of thinking about cyber strategy. Kello draws on a broad range of case studies, including the Estonian crisis, the Olympic Games operation against Iran, and the cyber attack against Sony Pictures. Synthesizing qualitative data from government documents, forensic reports of major incidents and interviews with senior officials from around the globe, this important work establishes new conceptual benchmarks to help security experts adapt strategy and policy to the unprecedented challenges of our times.

The Voice Catchers: How Marketers Listen In to Exploit Your Feelings, Your Privacy, and Your Wallet

by Joseph Turow

Your voice as biometric data, and how marketers are using it to manipulate you Only three decades ago, it was inconceivable that virtually entire populations would be carrying around wireless phones wherever they went, or that peoples&’ exact locations could be tracked by those devices. We now take both for granted. Even just a decade ago the idea that individuals&’ voices could be used to identify and draw inferences about them as they shopped or interacted with retailers seemed like something out of a science fiction novel. Yet a new business sector is emerging to do exactly that. The first in-depth examination of the voice intelligence industry, The Voice Catchers exposes how artificial intelligence is enabling personalized marketing and discrimination through voice analysis. Amazon and Google have numerous patents pertaining to voice profiling, and even now their smart speakers are extracting and using voice prints for identification and more. Customer service centers are already approaching every caller based on what they conclude a caller&’s voice reveals about that person&’s emotions, sentiments, and personality, often in real time. In fact, many scientists believe that a person&’s weight, height, age, and race, not to mention any illnesses they may have, can also be identified from the sound of that individual&’s voice. Ultimately not only marketers, but also politicians and governments, may use voice profiling to infer personal characteristics for selfish interests and not for the benefit of a citizen or of society as a whole. Leading communications scholar Joseph Turow places the voice intelligence industry in historical perspective, explores its contemporary developments, and offers a clarion call for regulating this rising surveillance regime.

Refine Search

Showing 54,451 through 54,475 of 54,498 results