21.11.2022 Views

Theory of Knowledge - Course Companion for Students Marija Uzunova Dang Arvin Singh Uzunov Dang

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

spread of knowledge. The losses from such

the

can be incalculable and irrecoverable.

incidents

this reason, the Internet Archive has partial

For

of itself in several physical locations across

copies

geopolitical contexts. What can we learn

different

this project both for preserving human

from

as well as decentralizing the control

knowledge

knowledge? Is decentralizing the control of

of

ethos of the Internet Archive is that in matters

The

knowledge, access drives preservation. In other

of

the best way to preserve knowledge is to

words,

that it is accessible and in use. Inversely,

ensure

says, “If you take things away from a

Kahle

it’s as if it doesn’t exist”. His work is

generation,

not on a secure vault for safekeeping,

modelled

on a public library that is designed for use.

but

are potential barriers to use, and therefore

What

to access, in a repository of human

barriers

project’s goal is bold: universal access to

The

knowledge. The Internet Archive is not just

all

the internet, but digitizing books,

backing-up

and movies as well as recording over 100

music

channels 24 hours a day. The technology

television

digitize recorded material already exists, but is

to

on the internet worth preserving, just

everything

we are able to? How can we anticipate,

because

what knowledge will be useful in the

correctly,

And can technologies to search and

future?

digital culture is an intensely visual

Today's

People appear in photos produced on

culture.

own devices, tagged by friends, captured

their

security cameras, in the background

by

or otherwise) in the photos of

(intentionally

in public spaces—all of which get

strangers

into streams of data. When these get

siphoned

with powerful face-detection technology,

coupled

digital technologies see much

However,

than physical appearance. They include

more

insights into our likes, uses of

behavioural

and reactions, interactions and

language

algorithms in criminal justice that calculate

of

likelihood an accused will reoffend (called

the

risk): this risk score feeds into other

recidivism

that suggest the length of the prison

algorithms

The tragic irony is that longer prison

sentence.

have been shown to increase the rates

sentences

recidivism. And so, technology in the US

of

system has been shown to discriminate

prison

ethnic and economic class lines. People of

along

tend to receive a higher recidivism risk

colour

which means they tend to be given longer

score,

sentences, which, due to the internalized

prison

of prison, means they have fewer

experience

once released and contribute to

opportunities

recidivism risk scores for others in their

higher

This vicious feedback loop is

neighbourhood.

of many that has resulted in the grossly

one

incarceration of black men in the

disproportionate

States. To dive deeper into this example,

United

the link to Cathy O’Neil's talk at Google

follow

“Weapons of Math Destruction”. She

about

recidivism risk specifically from 28:40.

discusses

terms: Cathy O’Neil

Search

of Math Destruction”

“Weapons

terms: ProPublica

Search

bias risk

Machine

the link to the article Machine Bias:

Follow

Assessments in Criminal Sentencing”

Risk

Predictive knowledge produced by

1.

models has limitations and

computer

as does predictive knowledge

caveats,

by humans. How can we know

produced

machine predictions are more or

whether

reliable than human ones?

less

What kind of knowledge is necessary

2.

be able to evaluate the validity and

to

Who should decide what assumptions a

3.

like this should be based on?

model

III. Methods and tools

III. Methods and tools

knowledge a desirable thing?

knowledge such as the Internet Archive?

YouTube

For discussion

Machine bias

catalogue such a vast collection keepup?

assessments

III.3 Using data to know humans

and consider the following questions.

individuals have good reason forconcern.

neutrality of risk assessment algorithms?

relationships. Consider, for instance, the use

71

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!