January 15, 2025

Accountable Algorithms: An Example

I wrote yesterday about accountable algorithms. When I say that a public algorithm is “accountable” I mean that the output produced by a particular execution of the algorithm can be verified as correct after the fact by a skeptical member of the public. Today I want to work through an example.

Accountable Algorithms

Ethan Zuckerman had an interesting reaction to his first experience with the TSA Pre-Check program, which lets frequent flyers go through a much shorter and less elaborate procedure at airport security checkpoints. Ethan’s concerns about unfairness are worth pondering, but I want to focus here on his call for more openness about the algorithm that […]

Privacy Threat Model for Mobile

Evaluating privacy vulnerabilities in the mobile space can be a difficult and ad hoc process for developers, publishers, regulators, and researchers. This is due, in significant part, to the absence of a well-developed and widely accepted privacy threat model. With 1 million UDIDs posted on the Internet this past week, there is an urgent need […]

On the Harvard "Cheating" Scandal

The news that Harvard is investigating more than 100 students on charges of unauthorized collaboration on a take-home exam has, predictably, led many commentators to chime in. No matter who you are, a story like this is likely to trigger one of your hot buttons, whether it’s the declining moral standards of kids these days, […]

The Decline of DVD-by-Mail, or Further Thoughts on the Digital Death of Copyright's First Sale Doctrine

Netflix reported a second-quarter profit last week as customer demand continues to drive a transition in the company’s primary delivery model from DVD-by-mail to Internet streaming. According to The New York Times, “[t]he company’s net losses among DVD-by-mail subscriptions outpaced its gains in net streaming subscriptions in the United States, reflecting the continued challenge of […]