Law and the Emerging Political Economy of Algorithmic Audits
For almost a decade now, scholarship in and beyond the ACM FAccT community has been
focusing on novel and innovative ways and methodologies to audit the functioning of …
focusing on novel and innovative ways and methodologies to audit the functioning of …
Key to kindness: reducing toxicity in online discourse through proactive content moderation in a mobile keyboard
Growing evidence shows that proactive content moderation supported by AI can help
improve online discourse. However, we know little about designing these systems, how …
improve online discourse. However, we know little about designing these systems, how …
Threat models over space and time: a case study of E2EE messaging applications
PD Chowdhury, M Sameen, J Blessing… - arXiv preprint arXiv …, 2023 - arxiv.org
Threat modelling is foundational to secure systems engineering and should be done in
consideration of the context within which systems operate. On the other hand, the …
consideration of the context within which systems operate. On the other hand, the …
Threat models over space and time: A case study of end‐to‐end‐encrypted messaging applications
P Das Chowdhury, M Sameen… - Software: Practice …, 2024 - Wiley Online Library
Threat modeling is one of the foundations of secure systems engineering and must take
heed of the context within which systems operate. In this work, we explore the extent to …
heed of the context within which systems operate. In this work, we explore the extent to …