Jump to content

User:Relaxbear4649/sandbox: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Added outline for the new article.
added outline of new artcle
Line 28: Line 28:


=== Subsections ===
=== Subsections ===

===== History =====


===== Technology =====
===== Technology =====
Line 34: Line 36:
# Voice cloning
# Voice cloning


===== Benefits =====
===== Benefits =====


# Education
# Education
Line 43: Line 45:
# Fake news
# Fake news
# Personal use (revenge, sabotage)
# Personal use (revenge, sabotage)
#Ethical Problems (problems that the law cannot protect)


===== Existing Laws =====
===== Existing Laws in the United States =====


# First Amendment
# First Amendment
# State Laws
# State Laws

===== Ethical Problems (problems that the law cannot protect) =====


===== Preventative Measures =====
===== Preventative Measures =====

Revision as of 18:00, 18 March 2019

Article Evaluation

Information Privacy

This article introduced the idea of information privacy and gave a brief overview of how information privacy is seen in various fields. Some parts of the article seems a bit outdated. For example, there is a section dedicated to "Cable television", which is used less frequently in recent years. To update the page, I would suggest adding a section on smart phones or other smart devices. The section on "Safe Harbor program and passenger name record issues" seemed a bit irrelevant to the page because although it touches on the regulation of privacy in various countries, the connection between the section and the topic of information privacy is a bit unclear. Overall, the article is pretty neutral because it gives a clear overview for each section and there is no one section that has more information than the other sections.

After going through some of the sources, I found most of them to be academic and scholarly articles. However, there are a few links that brought me to either a website dedicated to editorials that is not or blogs. These sources may not be as reliable as the other scholarly journals because they are not backed up by other sources and are much more biased. Looking at the Talk Page, the article is part of three WikiProjects: WikiProject Computing, WikiProject Internet, WikiProject Mass Surveillance. The article is rated as C-class, which means that the article contains some information along with some sources but much more editing is needed in order to be considered complete. Most of the discussion talks about how some citations need to be updated as external links are no longer working or lead to websites in different languages.

Digital Privacy

This article introduces the different aspects of digital privacy and has a clear organization. However, I think some parts of the article lacks clarification and definition of terms. The article only gives a very generic definition and doesn't go too in-depth. Most of the information seemed relevant to the topic, but the article lacks citations to back up the information given. Another part that could be improved is the section, "Privacy and Information Breaches", which introduces the idea of information breaches. In this section, the article gives a hypothetical situation where a hacker retrieves individual information by targeting a certain platform, such as social media. However, to make this article more reliable, I think it would be beneficial to replace the hypothetical situation with a incident that has occurred in real life. The article overall maintains a neutral tone, allowing the reader to gain a brief knowledge on the topic of digital privacy.

After going through some of the sources, most of them are scholarly articles but some could be improved. There were a couple of TED Talks cited, which may not be as reliable as other sources because it is heavily biased because it is influenced by the speaker's personal experiences. Looking at the Talk Page of this article, it is part of WikiProject Internet and it is considered to be in the Stub category. This means that the information provided is very basic and it may not be useful for readers.

Citation Practice on Digital Footprint

Added citation to the statement: " Internet footprints are also used by law enforcement agencies, to provide information that would be unavailable otherwise due to a lack of probable cause." [1]

  1. ^ Diab, Robert (2018). "Protecting the Right to Privacy in Digital Devices: Reasonable Search on Arrest and at the Border". University of New Brunswick Law Journal. Volume 69: p.96-125. {{cite journal}}: |pages= has extra text (help); |volume= has extra text (help)


Plans for new article

I will be gathering information on digital clones in order to write a new page on Digital cloning, which includes voice control, deepfakes, and other artificial intelligence that allows to create a clone of objects and humans. Some important aspects include the ethical concerns with the rise of such technology as well as legal concerns.

  • Already gathered 20 scholarly sources so continue to gather new sources
  • wrote 5 annotations so continue writing annotations

Outline for Digital cloning

Digital cloning

Digital cloning is an emerging technology that involves deep-learning algorithms that allows one to manipulate currently existing audio, photos, and videos that are hyper-realistic, making it difficult to distinguish what is real and what is fake. Furthermore, companies such as LyreBird and FakeApp are making such technology available to the public, bringing up potential legal and ethical concerns.

Subsections

History
Technology
  1. Deepfakes
  2. Voice cloning
Benefits
  1. Education
  2. Arts
Concerns
  1. Fake news
  2. Personal use (revenge, sabotage)
  3. Ethical Problems (problems that the law cannot protect)
Existing Laws in the United States
  1. First Amendment
  2. State Laws
Preventative Measures
  1. Technology
  2. Digital literacy
  1. Deepfake
  2. Deep learning
  3. DeepDream
  4. Artificial intelligence
  5. Digital media
  6. Post-mortem privacy