447 Matching Annotations
  1. Feb 2021
    1. With blockchain, trust comes from the network itself. Instead of simply trusting a middleman institution, we can trust the blockchain code. The way that the blockchain is built means all parties in the system, not just the ones involved in the transaction, come to an agreement on what the facts are. And once they agree, a new block is added

      Trust in blockchain

    1. Brian Nosek. (2020, December 5). We need a #2020goodnews trend. Here’s one: Science keeps getting more open. One indicator from @OSFramework: OSF users posted 9,349 files of data or other research content PER DAY OSF users made 5,633 files public PER DAY EVERY DAY in 2020 #openscience is accelerating [Tweet]. @BrianNosek. https://twitter.com/BrianNosek/status/1335210552252125184

    1. We’ve always used the term ‘social networking’ to refer to the process of finding and connecting with those people. And that process has always depended on a fabric of trust woven most easily in the context of local communities and face-to-face interaction.

      Too much of modern social networking suffers from this fabric of trust and rampant context collapse. How can we improve on these looking forward?

    1. that's a point, but I would say the opposite, when entering credit card data I would rathre prefer to be entirely in the Verified By Visa (Paypal) webpage (with the url easily visible in the address bar) rather that entring my credit card data in an iframe of someone's website.
    1. As soon as you're displaying content from another domain, you're basically trusting that domain not to serve-up malware. There's nothing wrong with iframes per se. If you control the content of the iframe, they're perfectly safe.
  2. Jan 2021
    1. unlike a traditional computer, a blockchain computer can offer strong trust guarantees, rooted in the mathematical and game-theoretic properties of the system. A user or developer can trust that a piece of code running on a blockchain computer will continue to behave as designed, even if individual participants in the network change their motivations or try to subvert the system. This means that the control of a blockchain computer can be placed in the hands of a community
    1. DOMPurify is written by security people who have vast background in web attacks and XSS. Fear not.
  3. Dec 2020
    1. “Being under constant surveillance in the workplace is psychological abuse,” Heinemeier Hansson added. “Having to worry about looking busy for the stats is the last thing we need to inflict on anyone right now.”

      I really like the Basecamp approach (I forget where I heard this...could have been in one of the Rework podcasts):

      Don't try to get the most out of everyone; try to get the best out of them.

      If you're looking for ways to build trust in a team, I can't recommend the following books published by Basecamp:

      • Rework
      • Remote
      • It doesn't have to be crazy at work
    2. For example, to help maintain privacy and trust, the user data provided in productivity score is aggregated over a 28-day period.

      So that the fact that the metrics are collected over 28 days is meant to maintain privacy and trust. How?

  4. Nov 2020
    1. obviously it's too late, but it's a good practice to keep the 3rd party dependencies mirrored in your own infrastructure :) There is NO GUARANTEE that even a huge site (like launchpad for downloading DEBs) won't go down over a period of time.
  5. Oct 2020
    1. To ascertain whether this decrease in confidence was as a result of the Cummings events (a Cummings effect), we carried out analyses using two types of comparisons. First, we compared the responses for people living in England to those of people living in the devolved nations of Scotland and Wales who were asked to rate their confidence in their own devolved governments. There was no evidence of a similar large decrease in confidence in the governments of the devolved nations either descriptively (appendix p 1–3) or statistically

      Trust in government

    1. When I received Chris’s comment, my first response was that I should delete my post or at least the incorrect part of it. It’s embarrassing to have your incorrect understandings available for public view. But I decided to leave the post as is but put in a disclaimer so that others would not be misled by my misunderstandings. This experience reminded me that learning makes us vulnerable. Admitting that you don’t know something is hard and being corrected is even harder. Chris was incredibly gentle in his correction. It makes me think about how I respond to my students’ work. Am I as gentle with their work as Chris was to mine? Could I be more gentle? How often have I graded my students’ work and only focused on what they did wrong? Or forgotten that feeling of vulnerability when you don’t know something, when you put your work out for others to judge? This experience has also reminded me that it’s important that we as teachers regularly put ourselves into situations in which we authentically grapple with not knowing something. We should regularly share our less than fully formed understandings with others for feedback. It helps us remember that even confident learners can struggle with being vulnerable. And we need to keep in mind that many of our students are not confident learners.

      I'm reminded here of the broad idea that many bloggers write about sooner or later of their website being a "thought space" or place to contemplate out in the open. More often than not, even if they don't have an audience to interact with, their writings become a way of thinking out loud, clarifying things for themselves, self-evolving, or putting themselves out there for potential public reactions (good, bad, or indifferent).

      While writing things out loud to no audience can be helpful and useful on an individual level, it's often even more helpful to have some sort of productive and constructive feedback. While a handful of likes or positive seeming responses can be useful, I always prefer the ones that make me think more broadly, deeply, or force me to consider other pieces I hadn't envisioned before. To me this is the real value of these open and often very public thought spaces.

      For those interested in the general idea, I've been bookmarking/tagging things around the idea of thought spaces I've read on my own website. Hopefully this collection helps others better understand the spectrum of these ideas for themselves.

      With respect to the vulnerability piece, I'm reminded of an episode of <cite>The Human Current</cite> I listened to a few weeks back. There was an excellent section that touched on building up trust with students or even a class when it comes to providing feedback and criticism. Having a bank of trust makes it easier to give feedback as well as to receive it. Here's a link to the audio portion and a copy of the relevant text.

  6. solidproject.org solidproject.org
    1. The last login you'll ever need Solid provides for the first time a single global logon system, so that when you log into any web site, instead of having to log in with the usual 'f' and 'g', etc, blue buttons, and then be tracked by Facebook, Google, or some other large social network, instead you can log in with any Solid provider you trust, and that won't track you.
  7. Sep 2020
  8. Aug 2020
    1. The straightforward solution to integrate WPML with third party translation services was to do it via dedicated plugins. A separate plugin for each company offering translation services could do the trick. However, this approach had a few drawbacks. For example, WPML developers would need to update and test all these plugins whenever the WPML core plugins received an update, and vice versa; when the API used by the external service changed, you needed to incorporate the change to WPML and test it as well.
  9. Jul 2020
    1. "that text has been removed from the official version on the Apache site." This itself is also not good. If you post "official" records but then quietly edit them over time, I have no choice but to assume bad faith in all the records I'm shown by you. Why should I believe anything Apache board members claim was "minuted" but which in fact it turns out they might have just edited into their records days, weeks or years later? One of the things I particularly watch for in modern news media (where no physical artefact captures whatever "mistakes" are published as once happened with newspapers) is whether when they inevitably correct a mistake they _acknowledge_ that or they instead just silently change things.
    1. If you have worked with emails before, the idea of placing a script into an email may set off alarm bells in your head! Rest assured, email providers who support AMP emails enforce fierce security checks that only allow vetted AMP scripts to run in their clients. This enables dynamic and interactive features to run directly in the recipients mailboxes with no security vulnerabilities! Read more about the required markup for AMP Emails here.
  10. Jun 2020
    1. Plenty of journalists, attorneys, and activists are equally if not more threatened by so-called evil maid attacks, in which a housekeeper or other stranger has the ability to tamper with firmware during brief physical access to a computer.
    1. but it launched with a plethora of issues that resulted in users rejecting it early on. Edge has since struggled to gain traction, thanks to its continued instability and lack of mindshare, from users and web developers.
  11. May 2020
    1. Free data-driven attribution model Use Google’s advanced machine learning to more accurately distribute credit to all ad clicks that led to a conversion

      In other words, "just trust us" to magically figure it all out.

      I'd trust you more if you explained more about how do it. Maybe if I clicked "Learn more"?

    1. Companies that show their customers that they take privacy seriously will earn their trust and loyalty.
    1. You know the type of testimonials that sound like they’re written by a marketer? The sugar-coated words that tell you how wonderful, amazing, and super-perfect a service or product is?Do you think anyone believes these fantastic testimonials? Well?
    1. The "'strict-dynamic'" source expression aims to make Content Security Policy simpler to deploy for existing applications who have a high degree of confidence in the scripts they load directly, but low confidence in their ability to provide a reasonable list of resources to load up front.
    1. Reputational damage Failure to comply with your legal obligations may lead to users negatively perceiving your business as either incompetent or malicious. This can lead to significant and lasting damage to public trust and the reputation of your organization.
    1. I know, you don't trust Mozilla but do you also not trust the developer? I absolutely do! That is the whole point of this discussion. Mozilla doesn't trust S3.Translator or jeremiahlee but I do. They blocked page-translator for pedantic reasons. Which is why I want the option to override their decision to specifically install few extensions that I'm okay with.
    1. More Trust Your customers, investors, partners, and employees are more likely to use and refer you if they feel they can trust you with their data.
  12. Apr 2020
    1. There is MiniKeePass on the iOS App Store, but I'm not sure if I trust it not to make off with my data. Also, syncing between my PC and the app would be a pain. (1Password has local WiFi sync) There is also KeeFox for Firefox integration, but I'm not sure if I trust that either. In short, I trust KeePass itself, but I'm not sure if I can trust the third-party developers of the mobile app and browser extension.
    1. wouldn't let me send a two-line memo to another department without showing it to him before I sent it. John's leadership style was oppressive. He micr0-managed everything. I learned from the hellish experience of working for him that unless somebody wants another set of eyes on their correspondence, it's insulting and a waste of time to micro-manage your team members' email messages.
    1. Whether users' concerns are logical or emotional, they need to feel that their data is safe: it's important that your users trust you.
    2. Making it easier for users to experiment today greatly increases their trust in you, and they are more likely to return to your product line tomorrow.
    3. We've found that an incredibly effective—although certainly counterintuitive—way to earn and maintain user trust is to make it easy for users to leave your product with their data in tow. This not only prevents lock-in and engenders trust, but also forces your team to innovate and compete on technical merit. We call this data liberation.
  13. Mar 2020
  14. www.graphitedocs.com www.graphitedocs.com
    1. Own Your Encryption KeysYou would never trust a company to keep a record of your password for use anytime they want. Why would you do that with your encryption keys? With Graphite, you don't have to. You own and manage your keys so only YOU can decrypt your content.
    1. Please consider that using this method means that you do not directly block the vendor scripts yourself, therefore, the success of this method depends heavily on the individual vendors’ adherence to regulation.
    1. Mobility is cryptographically signed. To be sure the gem you install hasn't been tampered with, add my public key as a trusted certificate and install: gem cert --add <(curl -Ls https://raw.github.com/shioyama/mobility/master/certs/shioyama.pem) gem install mobility -P MediumSecurity The MediumSecurity trust profile will verify signed gems, but allow the installation of unsigned dependencies.
  15. Jan 2020
    1. This is just the tip of the innovation iceberg in a new deep-truth reality that is here today

      In a moment of crisis for truth and trust, it is encouraging to encounter the term deep-truth and may offer a valuable term that is both accessible and powerful in advocating not just against what we despise but for what we hope to see in a better world.

    2. This is just the tip of the innovation iceberg in a new deep-truth reality that is here today

      In a moment of crisis for truth and trust, it is encouraging to encounter the term deep-truth and may offer a valuable term that is both accessible and powerful in advocating not just against what we despise but for what we hope to see in a better world.

  16. Dec 2019
  17. Nov 2019
    1. Everyone is afraid of getting in trouble.

      steering committees.

    2. rusting relationship with students and teachers
    3. rusting and caring relationship among

      many staff are reporting a lack of trust.

  18. Oct 2019
    1. establish

      Establishing relationships is key. One way to build trust is to share why you are asking students to do something, and how it applies to them not just in the course but in real life. This also could lead to motivation...

    1. Zachary Stein - "On the Ethics of Planetary Scale Measurement Meta-Structures"

      "We measure what we care about and we care about what we measure."

      "You could be handed a measure and start caring about something that you didn't care about before, just because you're measuring it now."

      "... it's the locus of trust. It's part of the common wealth of the community is a trustworthy measure. The only way that a community can work. And then of course they encode power..."

      "Measurements help certain groups understand things."

      "In fact maybe we should pause and think very deeply about the whole domain of things that we shouldn't ever measure.... A meta-modern approach to measurement, respects the immeasurable and partitions off regions that are not to be measured."

      "Once you start to factor all of these things (meaning, ethics, objectivity, efficiency) that's when you realize we should not measure some stuff."

      "People who think about measuring new things should also think about the ontology of absence. ... Every time you measure something, think about what you left out."

      "Measurement simplifies complexity by showing you "this" at the expense of "that". So the meta-modern approach is like I see this but I'm also aware of that"

      "Who is measuring who? for what purpose? who is deciding what well being is?"

      "Put the measurement tools into users hands. Don't come from behind the curtain and say ta-daa this is your score. Let them configure and play with the assessments themselves. This will lead to a better assessment system because a million minds are better than a hundred (or whatever your team-size is. Secondly, it empowers as opposed to just internalize."

      "As much as possible empower the person who is being measured, let them see how they're being measured, and actually be able to augment the measure so it's like if you have a mirror, you want to be able to clean the mirror, adjust angles, magnify etc. you want to have that capability for them (measured ones). And then they feel like they are not a test subject, but participants"

  19. Jul 2019
    1. “We are a nation with a tradition of reining in monopolies, no matter how well-intentioned the leaders of these companies may be.”Mr. Hughes went on to describe the power held by Facebook and its leader Mr. Zuckerberg, his former college roommate, as “unprecedented.” He added, “It is time to break up Facebook.”
  20. Jun 2019
    1. The association is the only party able to create (mint) and destroy (burn) Libra. Coins are only minted when authorized resellers have purchased those coins from the association with fiat assets to fully back the new coins. Coins are only burned when the authorized resellers sell Libra coin to the association in exchange for the underlying assets. Since authorized resellers will always be able to sell Libra coins to the reserve at a price equal to the value of the basket, the Libra Reserve acts as a “buyer of last resort.”

      Digital native coins like Ethereum are more advantageous due their less-trust-required nature. Libra Assoc.'s biggest challenge will be to earn trust and don't lose it.

  21. Apr 2019
    1. All of us, but especially children, need … confidence that others will know, affirm, and cherish us. Without that we can’t develop a sense of agency that will enable us to assert: “This is what I believe in; this is what I stand for; this is what I will devote myself to.” As long as we feel safely held in the hearts and minds of the people who love us, we will climb mountains and cross deserts and stay up all night to finish projects. Children and adults will do anything for people they trust and whose opinion they value. But if we feel abandoned, worthless, or invisible, nothing seems to matter. Fear destroys curiosity and playfulness. In order to have a healthy society we must raise children who can safely play and learn. There can be no growth without curiosity and no adaptability without being able to explore, through trial and error, who you are and what matters to you.
    2. If a mother cannot meet her baby’s impulses and needs, “the baby learns to become the mother’s idea of what the baby is.” Having to discount its inner sensations, and trying to adjust to its caregiver’s needs, means the child perceives that “something is wrong” with the way it is. Children who lack physical attunement are vulnerable to shutting down the direct feedback from their bodies, the seat of pleasure, purpose, and direction. […] The need for attachment never lessens. Most human beings simply cannot tolerate being disengaged from others for any length of time. People who cannot connect through work, friendships, or family usually find other ways of bonding, as through illnesses, lawsuits, or family feuds. Anything is preferable to that godforsaken sense of irrelevance and alienation.
    3. Securely attached kids learn the difference between situations they can control and situations where they need help. They learn that they can play an active role when faced with difficult situations. In contrast, children with histories of abuse and neglect learn that their terror, pleading, and crying do not register with their caregiver. Nothing they can do or say stops the beating or brings attention and help. In effect they’re being conditioned to give up when they face challenges later in life.
    4. Agency starts with what scientists call interoception, our awareness of our subtle sensory, body-based feelings: the greater that awareness, the greater our potential to control our lives. Knowing what we feel is the first step to knowing why we feel that way. If we are aware of the constant changes in our inner and outer environment, we can mobilize to manage them.
  22. Feb 2019
    1. a belief thal we have an accurate memory of a past fact or demonstration or a belief that others have been correct in their proofs.

      We must trust in our memories, our senses and observations, and in others. Which of these do we have faith in more/most? And what are the consequences when we make ourselves vulnerable to that trust (and are proven wrong)?

    2. we can know what we ourselves have made

      This brings to mind an issue from last week, where we place more trust in words because they are our own construct (see Barad 801: "How did language come to be more trustworthy than matter?").

  23. Jan 2019
  24. www.at-the-intersection.com www.at-the-intersection.com
    1. So I, you know, putting my coins on the exchange is risky enough. I don't want to increase that by expanding the scope of access
    2. Yeah, because Gemini trusted US dollar exchange. It's actually one of the only ones regulated and licensed by the state of New York, which has some of the strictest regulations in the world.
    3. Twitter is my go to and people post a news articles from like ccn from what does it coined, ask a bunch of these crypto news things and they're great. Uh, you know, I take them with a grain of salt because whatever, there's a lot of like fake news.
    4. Uh, yes. Okay. Yeah. Yeah. But as far as I understand it, it's read only so they can't do any trading on my behalf.
    5. Okay. Yeah. I would say the, I'm not a super technical engineering person, but they would have to give some arguments or get give in their marketing, whatever it is. They'd have to prove to me, give me a good idea that they've thought of every attack, route, attack, attack vector and this safe. And unless someone comes into your house and logs on your laptop and steals your whatever key, it's going to be safe.
    6. I'm scared. I don't really spend enough time thinking about it, but it's something like in the far future I might do if someone comes up with some solution and they give a good reason why it's good, you know, maybe I'll use it, but I haven't seen anything.
    7. Like I dunno, I would sometimes prefer to have some type of automatic initiation process and enter trades, but I don't know of anything that's safe and I haven't really thought about it that much
    8. , okay. They're mainly based in Russia though.
    9. Um, three commas had been tested by another people that I guess I was kind of following the social proof justification that enough people were in it so that made me more confident in using it.
    10. Part of it might be ignorance to be honest. Um, for three commas for three commas specifically because the functionality that I was allowing, at least within the API key within binance was that they couldn't withdraw funds.
    11. And as far as binance goes, they just have a track record, uh, where there was some type of hack to some degree.
    12. If something was to happen, I'm more comfortable having money on, uh, a US owned exchange.
    1. anguage come to be more trustworthy than matter?

      People seem to trust in themselves more than what's outside themselves. Even though language is constructed, it's our construct, something we made, and therefore (?) something we can place our faith in more so than in matter, something we had less of a hand in making. When we place our faith in things outside ourselves, we become more vulnerable--we open ourselves to other things as well as to the possibility of being wrong.

    2. How did language come to be more trustworthy than matter?

      I have never thought of the idea of trusting language. What would walter ong think?

    1. Yeahitreallyis,andIoftenthinkabouttherelationshipIhavewithmystudentswhoareinaoneyearprogramandtherelationshipIhavewithcorporatestudentsthatImightcomeinandtrainforaweekorsomethinglikethat,youknowinthefirstcoupledaysofalltrainingsessionsIhavenoabilitytocritiquebecauseIdon'thavetheirtrust.So,ifIcomeinthefirstdayofclassandsaytheirworksucksandhere'swhatyoushoulddotoimprove,andthiswillneverwork,it'smetwithresistanceandit'salmostlikeadefensemechanismagainstitandsothat'satotallyinappropriatewayformetobehave.Butifyoulookfurtherintothecurriculum,let'ssaysixteenweeksintomyoneyearprogramoraWednesdayoraThursdayinaoneweektrainingprogram,hopefullyifI'vedonemyjobwellI'vebuiltupenoughrapportwithpeopletheytrustthatIknowwhatI'mtalkingabout,thatmyfeedbackiscomingfromaplaceofloveandcareandsothey'rewillingtohearthingslike,thatisn'tverygoodandthosearewordsthatcomeoutofmymouthduringacritique.It'ssomethingthatyou'renotmaybeusedtohearingifyou'renotpartofthiscreativeculturebutthatisn'tverygoodandhere'swhy,isactuallyareally,reallyimportantthingtohelpadvancethequalityofwork.Andthenthenextsentencewouldbeandhere'showIwouldimproveitbutagainthathastocomefromaplaceofrespectandthat'searnedovertimeandsoyouknowyouhearalotaboutI'veheardalotaboutanywayandyouknowthenewbosscomesinandit'sahotshotcreativedirectoranditblowsthingsupandrunsaroundgoingintoameetingandshittingoneverythingtherewasanoldjokeatoneofmycompaniesisthatthechiefcreativeofficerwouldcomeinandswoopandpoopwherehe'dcomeintoaconference,roomtelleverybodywhathethinksuckedandleaveandnoneofthatworksbecausehedidn'thavethetrustofthepeoplethatwerehavingtheirworkshitonandsothathastocomefromaplaceoftrustagainandthatyouknowthere'snoshortcutfortimeIsupposeinthatrespect.Andspeakingofrespectoftheotherflavortherearetheotheringredientismutualrespect.It'ssayingthingslike,lookyouwerehiredbecauseItrustyoubecauseyou'regoodatyourcraft,youhavepotentialandexpertise,nowlet'stalkaboutwhatyou'redoingwrongandhowtoimproveit.
    1. Our extensions also have implications for theories ontrust.

      Bookmarked section for later consideration of proposal studies on how time interacts with trust in time- and safety-critical social coordination.

    2. Whenemergent response groups first come together, membersare likely not to ask one another about who knows what;instead, they are likely to ask about what is knownabout the situation and about the actions taken thus far(Dyer and Shafer 2003, Hale et al. 2005). The cogni-tive structure that they develop for the group centersnot around people, but on action-based scenarios thateither have been or might be carried out. These scenariosinclude decisions, actions, knowledge, events, and feed-back (Vera and Crossan 2005).

      Suggested extensions for TMS theory:

      "1. Tailor the Role of Expertise"

      "2. "Replacing Credibility in Expertise with Trust Through Action"

      "3. "Coordinating Knowledge Processes Without a Shared Metastructure"

  25. Sep 2018
    1. It would be if he knew he was wrong. I can’t put my finger on it, but I sense something strange about him.

      Distrust. Even without any quantifiable proof of there being any error with Hal, it is the distrust that manifests itself in the relationship between the humans and him. This will be one of the most important features of our relationship with sentient machines in the future as well - whether we will be able to trust independently-thinking machines with control of critical aspects of our society.

  26. Aug 2018
    1. visualizations are more than just ‘‘prettypictures’’: rather, precisely in virtue of their bringinginto play oursharedcognitive and aesthetic frame-works as human beings, they thereby catalyze theepistemological – but also aesthetic and therebysocial, if not also political – processes that create ashared intersubjective framework in the first place,one that then makes possible trust-building and asharedsensus communiswithin which the enterpriseof collaborative science may take place
    2. a view towards examining how visualizationscontribute to building frameworks of trust.
    3. ‘In a complexinformation society, with a highly developed divi-sion of intellectual labor, we have no option butrely on information from sources that are usuallytrustworthy.’
    4. ‘Thedilemma, then, is that a right to information couldmake people worse off in terms of information.’’Elgesem then provides a contextual analysis of therole search engines play in the broader ‘‘informationecology’’ constituted by contemporary ICTs. Elgesemis able to connect the search engine dilemma withKant’s second formulation of the CategoricalImperative, ‘‘Act in such a way that you treathumanity, whether in your own person or in theperson of another, always at the same time as an endand never simply as a means.’’8Here, Elgeseminterprets Kant to mean that by ‘‘humanity,’’ Kantrefers to our ability to reason as the central propertythat makes us human. The simple point, as empha-sized in Kant’s famous example regarding lying, isthat failure to provide truthful information is a primeexample of violating the CI because false informationmakes it impossible for the recipient to exercise herrationality. By the same token, Elgesem argues that abiased search engine likewise makes it impossible forusers to exercise their rationality, and thus likewiserepresent violations of the CI.
    5. interest in understanding how web pages are rankedis foiled: in particular, users cannot know whether ornot a high ranking is the result of payment – andagain, such secrecy reduces trust and thereby theusability and accessibility of important information
    6. The basic dilemma is simple. If the algorithms areopen – then webmasters (and anyone else) interestedin having their websites appear at the top of a searchresult will be able to manipulate their sites so as toachieve that result: but such results would then bemisleading in terms of genuine popularity, potentialrelevance to a searcher’s interests, etc., therebyreducing users’ trust in the search engine results andhence reducing the usability and accessibility ofimportant information. On the other hand, if thealgorithms are secret, then the legitimate public
    7. phenomenologically-basedapproach to trust, one that stresses precisely that‘‘...the bodily presence in the encounter appears to beessential for understanding the relation of trust.’’ Hemakes this point in part by way of reference to thework of K. E. Løgstrup,1E. Levinas,2and others –and thereby takes up trust as an ‘‘irreducible human
    8. At the same time, however, especially as the Internetincreasingly becomes a primary venue for partici-pating in ‘‘...the political, social and commercialactivities necessary for full participation in a liberaldemocracy,’’ establishing trust in online worldsbecomes a correlatively more pressing matter.
    9. In particular, Myskjapoints out that the largelydisembodiedcharacter ofmost online communication thereby cuts us off fromimportant, perhaps crucial channels of non-verbalcommunication that may be essential to trust-building.
    10. Kant’s basicthoughts on autonomy and the public domain arehighly relevant to challenges concerning modernsociety, particularly to communication in the publicsphere. Trust is but one important topic being dis-cussed here; openness another. Thus, our aim has notonly been to demonstrate how Kant can be produc-tively applied to new technology; in addition, it hasbeen to show how the basic philosophical queriesraised within this context can be fruitfully illuminatedwithin Kant’s conceptual frames.
  27. Jul 2018
    1. where applicable, any rating in the form of a data trust score that may be assignedto the data fiduciary under section 35;and

      A Data Trust score. Thankfully, it isn't mandatory to have a data trust score, which mean that apps and services can exist without there being a trust score

    1. Ian O’Byrne, an assistant professor of education at the College of Charleston, wrote, “As an educator and researcher who studies these digital places and tools, I’m in front of screens a lot. I experiment and play in these spaces. I’m also writing and researching the impact of these screens and their impact on the well-being of others as it relates to children and adolescents. The problem in this is that one of the other hats that I wear is as a parent and husband. I am not only critical of my engagement and use of these digital technologies, but I’m also cautious/cognizant of their role as a mediator in my relationships with my children and significant other. These screens and digital tools play a strong role in our lives and interactions in and out of our home. In our home we have screens and devices all over the place. We have a video server that is ready to serve content to any one of these screens on demand. We have voice-assistive devices listening and waiting for our commands. I believe it is important as an educator and researcher to play with and examine how these devices are playing a role in our lives, so I can bring this work to others. Even with these opportunities, I’m still struck by times when technology seems too intrusive. This is plainly evident when I’m sitting with my family and watching a television show together, and I’m gazing off into my device reading my RSS feed for the day. Previously I would enjoy watching the funniest home videos and laughing together. Now, I am distant. The first thing in the morning when I’m driving my kids in to school and stop at a red light, previously I would enjoy the time to stop, listen to the radio, look at the clouds or bumper stickers on cars around me. Now, I pull out the phone to see if I received a notification in the last 20 minutes. When I call out for the voice-activated device in my home to play some music or ask a question, my request is quickly echoed by my 2-year-old who is just learning to talk. She is echoing these conversations I’m having with an artificial intelligence. I’m trying to weigh this all out in my mind and figure what it means for us personally. The professional understanding may come later.”
    1. Even though teachers have told me not to trust Wikipedia, I have grown to learn that Wikipedia is probably one of the more accurate parts of the internet because it’s controlled by so many people that, if you’re wrong, someone is going to call you out on it.
  28. Jun 2018
  29. inst-fs-iad-prod.inscloudgate.net inst-fs-iad-prod.inscloudgate.net
    1. We have found that asking people directly, as one would in a physical interaction, is a strong practice. How might your experience of the Internet shift if people who had access to your digital body, whether in the form of photos or contact information, were to check in with you from time to time about it? What technologies would we need to build to help us manage ongoing and direct consent processes?
    2. Platforms like Google are incorporating periodic check-ins with users about what they’ve consented to, which is a good start.
    3. If we can’t make it safer then we can acknowledge the remaining risks and educate users about them.
    4. We can do better. By designing the system so certain things are impossible, we lower the trust barrier for that system.
  30. May 2018
    1. Sally Lehrman, senior director of the journalism ethics program at the Markkula Center for Applied Ethics, leads its signature Trust Project, a complex international collaboration that she began building in 2015 to strengthen public confidence in the news through accountability and transparency.

      Check out this shout out from the American Press Institute.

  31. Apr 2017
    1. What is needed is a trustworthy, secure, and enduring property system that is flexible enough to incorporate digital properties into any community’s broader property rights traditions
  32. Mar 2017
    1. As we are talking about TRUST this week here in Connected Courses, I feel the need to come clean.

      trust