Law and the Emerging Political Economy of Algorithmic Audits

P Terzis, M Veale, N Gaumann - The 2024 ACM Conference on …, 2024 - dl.acm.org
For almost a decade now, scholarship in and beyond the ACM FAccT community has been
focusing on novel and innovative ways and methodologies to audit the functioning of …

Key to kindness: reducing toxicity in online discourse through proactive content moderation in a mobile keyboard

M Warner, A Strohmayer, M Higgs, H Rafiq… - arXiv preprint arXiv …, 2024 - arxiv.org
Growing evidence shows that proactive content moderation supported by AI can help
improve online discourse. However, we know little about designing these systems, how …

Threat models over space and time: a case study of E2EE messaging applications

PD Chowdhury, M Sameen, J Blessing… - arXiv preprint arXiv …, 2023 - arxiv.org
Threat modelling is foundational to secure systems engineering and should be done in
consideration of the context within which systems operate. On the other hand, the …

Threat models over space and time: A case study of end‐to‐end‐encrypted messaging applications

P Das Chowdhury, M Sameen… - Software: Practice …, 2024 - Wiley Online Library
Threat modeling is one of the foundations of secure systems engineering and must take
heed of the context within which systems operate. In this work, we explore the extent to …

[PDF][PDF] REPHRAIN

JD Curtis, DA Ellis, C Fiani, S Ghai, M Khamis… - 2024 - rephrain.ac.uk
1. Understanding how children might adapt to circumvent such measures as age assurance
is crucial, yet there is a notable lack of reference to potential reactions, adaptive behaviours …