-
Languaging Ethics in Technology Practice
Authors:
Colin M. Gray,
Shruthi Sai Chivukula,
Janna Johns,
Matthew Will,
Ikechukwu Obi,
Ziqing Li
Abstract:
Ethics as embodied by technology practitioners resists simple definition, particularly as it relates to the interplay of identity, organizational, and professional complexity. In this paper we use the linguistic notion of languaging as an analytic lens to describe how technology and design practitioners negotiate their conception of ethics as they reflect upon their everyday work. We engaged twelv…
▽ More
Ethics as embodied by technology practitioners resists simple definition, particularly as it relates to the interplay of identity, organizational, and professional complexity. In this paper we use the linguistic notion of languaging as an analytic lens to describe how technology and design practitioners negotiate their conception of ethics as they reflect upon their everyday work. We engaged twelve practitioners in individual co-creation workshops, encouraging them to reflect on their ethical role in their everyday work through a series of generative and evaluative activities. We analyzed these data to identify how each practitioner reasoned about ethics through language and artifacts, finding that practitioners used a range of rhetorical tropes to describe their ethical commitments and beliefs in ways that were complex and sometimes contradictory. Across three cases, we describe how ethics was negotiated through language across three key zones of ecological emergence: the practitioner's "core" beliefs about ethics, internal and external ecological elements that shaped or mediated these core beliefs, and the ultimate boundaries they reported refusing to cross. Building on these findings, we describe how the languaging of ethics reveals opportunities to definitionally and practically engage with ethics in technology ethics research, practice, and education.
△ Less
Submitted 12 April, 2023;
originally announced April 2023.
-
Practitioner Trajectories of Engagement with Ethics-Focused Method Creation
Authors:
Colin M. Gray,
Ikechukwu Obi,
Shruthi Sai Chivukula,
Ziqing Li,
Thomas Carlock,
Matthew Will,
Anne C. Pivonka,
Janna Johns,
Brookley Rigsbee,
Ambika R. Menon,
Aayushi Bharadwaj
Abstract:
Design and technology practitioners are increasingly aware of the ethical impact of their work practices, desiring tools to support their ethical awareness across a range of contexts. In this paper, we report on findings from a series of co-design workshops with technology and design practitioners that supported their creation of a bespoke ethics-focused action plan. Using a qualitative content an…
▽ More
Design and technology practitioners are increasingly aware of the ethical impact of their work practices, desiring tools to support their ethical awareness across a range of contexts. In this paper, we report on findings from a series of co-design workshops with technology and design practitioners that supported their creation of a bespoke ethics-focused action plan. Using a qualitative content analysis and thematic analysis approach, we identified a range of roles and process moves that practitioners employed and illustrate the interplay of these elements of practitioners' instrumental judgment through a series of three cases, which includes evolution of the action plan itself, the ethical dilemmas or areas of support the action plan was intended to support, and how the action plan represents resonance for the practitioner that created it. We conclude with implications for supporting ethics in socio-technical practice and opportunities for the further development of ethics-focused methods that are resonant with the realities of practice.
△ Less
Submitted 6 October, 2022;
originally announced October 2022.
-
Let's Talk About Socio-Technical Angst: Tracing the History and Evolution of Dark Patterns on Twitter from 2010-2021
Authors:
Ikechukwu Obi,
Colin M. Gray,
Shruthi Sai Chivukula,
Ja-Nae Duane,
Janna Johns,
Matthew Will,
Ziqing Li,
Thomas Carlock
Abstract:
Designers' use of deceptive and manipulative design practices have become increasingly ubiquitous, impacting users' ability to make choices that respect their agency and autonomy. These practices have been popularly defined through the term "dark patterns" which has gained attention from designers, privacy scholars, and more recently, even legal scholars and regulators. The increased interest in t…
▽ More
Designers' use of deceptive and manipulative design practices have become increasingly ubiquitous, impacting users' ability to make choices that respect their agency and autonomy. These practices have been popularly defined through the term "dark patterns" which has gained attention from designers, privacy scholars, and more recently, even legal scholars and regulators. The increased interest in the term and underpinnings of dark patterns across a range of sociotechnical practitioners intrigued us to study the evolution of the concept, to potentially speculate the future trajectory of conversations around dark patterns. In this paper, we examine the history and evolution of the Twitter discourse through #darkpatterns from its inception in June 2010 until April 2021, using a combination of quantitative and qualitative methods to describe how this discourse has changed over time. We frame the evolution of this discourse as an emergent transdisciplinary conversation that connects multiple disciplinary perspectives through the shared concept of dark patterns, whereby these participants engage in a conversation marked by socio-technical angst in order to identify and fight back against deceptive design practices. We discuss the potential future trajectories of this discourse and opportunities for further scholarship at the intersection of design, policy, and activism.
△ Less
Submitted 21 July, 2022;
originally announced July 2022.
-
Exploring Adversarial Examples in Malware Detection
Authors:
Octavian Suciu,
Scott E. Coull,
Jeffrey Johns
Abstract:
The convolutional neural network (CNN) architecture is increasingly being applied to new domains, such as malware detection, where it is able to learn malicious behavior from raw bytes extracted from executables. These architectures reach impressive performance with no feature engineering effort involved, but their robustness against active attackers is yet to be understood. Such malware detectors…
▽ More
The convolutional neural network (CNN) architecture is increasingly being applied to new domains, such as malware detection, where it is able to learn malicious behavior from raw bytes extracted from executables. These architectures reach impressive performance with no feature engineering effort involved, but their robustness against active attackers is yet to be understood. Such malware detectors could face a new attack vector in the form of adversarial interference with the classification model. Existing evasion attacks intended to cause misclassification on test-time instances, which have been extensively studied for image classifiers, are not applicable because of the input semantics that prevents arbitrary changes to the binaries. This paper explores the area of adversarial examples for malware detection. By training an existing model on a production-scale dataset, we show that some previous attacks are less effective than initially reported, while simultaneously highlighting architectural weaknesses that facilitate new attack strategies for malware classification. Finally, we explore how generalizable different attack strategies are, the trade-offs when aiming to increase their effectiveness, and the transferability of single-step attacks.
△ Less
Submitted 13 April, 2019; v1 submitted 18 October, 2018;
originally announced October 2018.
-
DeepWeeds: A Multiclass Weed Species Image Dataset for Deep Learning
Authors:
Alex Olsen,
Dmitry A. Konovalov,
Bronson Philippa,
Peter Ridd,
Jake C. Wood,
Jamie Johns,
Wesley Banks,
Benjamin Girgenti,
Owen Kenny,
James Whinney,
Brendan Calvert,
Mostafa Rahimi Azghadi,
Ronald D. White
Abstract:
Robotic weed control has seen increased research of late with its potential for boosting productivity in agriculture. Majority of works focus on develo** robotics for croplands, ignoring the weed management problems facing rangeland stock farmers. Perhaps the greatest obstacle to widespread uptake of robotic weed control is the robust classification of weed species in their natural environment.…
▽ More
Robotic weed control has seen increased research of late with its potential for boosting productivity in agriculture. Majority of works focus on develo** robotics for croplands, ignoring the weed management problems facing rangeland stock farmers. Perhaps the greatest obstacle to widespread uptake of robotic weed control is the robust classification of weed species in their natural environment. The unparalleled successes of deep learning make it an ideal candidate for recognising various weed species in the complex rangeland environment. This work contributes the first large, public, multiclass image dataset of weed species from the Australian rangelands; allowing for the development of robust classification methods to make robotic weed control viable. The DeepWeeds dataset consists of 17,509 labelled images of eight nationally significant weed species native to eight locations across northern Australia. This paper presents a baseline for classification performance on the dataset using the benchmark deep learning models, Inception-v3 and ResNet-50. These models achieved an average classification accuracy of 95.1% and 95.7%, respectively. We also demonstrate real time performance of the ResNet-50 architecture, with an average inference time of 53.4 ms per image. These strong results bode well for future field implementation of robotic weed control methods in the Australian rangelands.
△ Less
Submitted 14 February, 2019; v1 submitted 9 October, 2018;
originally announced October 2018.
-
Multi-modal Geolocation Estimation Using Deep Neural Networks
Authors:
Jesse M. Johns,
Jeremiah Rounds,
Michael J. Henry
Abstract:
Estimating the location where an image was taken based solely on the contents of the image is a challenging task, even for humans, as properly labeling an image in such a fashion relies heavily on contextual information, and is not as simple as identifying a single object in the image. Thus any methods which attempt to do so must somehow account for these complexities, and no single model to date…
▽ More
Estimating the location where an image was taken based solely on the contents of the image is a challenging task, even for humans, as properly labeling an image in such a fashion relies heavily on contextual information, and is not as simple as identifying a single object in the image. Thus any methods which attempt to do so must somehow account for these complexities, and no single model to date is completely capable of addressing all challenges. This work contributes to the state of research in image geolocation inferencing by introducing a novel global meshing strategy, outlining a variety of training procedures to overcome the considerable data limitations when training these models, and demonstrating how incorporating additional information can be used to improve the overall performance of a geolocation inference model. In this work, it is shown that Delaunay triangles are an effective type of mesh for geolocation in relatively low volume scenarios when compared to results from state of the art models which use quad trees and an order of magnitude more training data. In addition, the time of posting, learned user albuming, and other meta data are easily incorporated to improve geolocation by up to 11% for country-level (750 km) locality accuracy to 3% for city-level (25 km) localities.
△ Less
Submitted 26 December, 2017;
originally announced December 2017.