0
Carly Miller
Carly Miller is a research analyst at the Stanford Internet Observatory. She was most recently a Team Lead at the Human Rights Investigations Lab at Berkeley Law School where she worked to unearth patterns of various bad actors’ media campaigns. Carly is interested in combining investigative and digital forensic research with the power of effective policy recommendations.   Carly received her BA with honors in political science from the University of California, Berkeley in May 2019.
Former Research Analyst, Stanford Internet Observatory
-

Image
jeffhancock profile

 

Abstract:

A new trust framework is emerging – fueled by social, economic and technological forces that will profoundly alter how we trust, not only what we see and read online, but also one another. At the same time, technology is influencing how we behave and relate to one another, with AI starting to mediate human-to-human communication. In this talk we will discuss how principles from psychology and communication can help understand and predict trust dynamics in a world in which fake news is salient and uncertainty about AI is rampant. We will discuss several studies that reveal key principles to guide how we think about truth and trust on the internet.

Jeff Hancock Bio

Downloadable Flyer

-

Image
Kate Starbird
Abstract:

This talk describes the disinformation campaign targeting the Syria Civil Defense (or “White Helmets”), a humanitarian response group that works in rebel held areas of Syria. The White Helmets provide medical aid, search, and rescue to people affected by the civil war in Syria. They also document the impacts of atrocities — including airstrikes and chemical weapons attacks — perpetrated by the Syrian regime and their Russian allies. For several years, the White Helmets have been the target of a campaign to undermine and delegitimize their work. In this talk, I describe a multi-study research effort that reveals how this multi-dimensional, cross-platform campaign “works” — including a look at the media ecosystems that support the campaign, the networks of actors who collaborate to produce and spread its narratives (including government agents and “unwitting crowds” of online activists), and the “work” that these actors participate in, using the affordances of social media platforms to connect, recruit, organize, promote their messages, attack opposing messages, and otherwise advance the goals of their campaign. 

Kate Starbird Bio

 

 

Paragraphs

In these early days of the regulatory renaissance for digital technologies, China, Europe, and the United States are competing over whose image will be most reflected in market-defining rules and norms. Despite new lows in the trans-Atlantic relationship in the era of Trump, Europe and the United States still have far more in common with each other about how technology should be developed, deployed, and regulated than they do with China.

 

All Publications button
1
Publication Type
Commentary
Publication Date
Authors
Paragraphs

The fruits of a long anticipated technology finally hit the market, with promise to extend human life, revolutionize production, improve consumer welfare, reduce poverty, and inspire countless yet-imagined innovations. A marvel of science and engineering, it reflects the cumulative efforts of a generation of researchers backed by research funding from the U.S. government and private sector investments in (predominantly American) technology companies. 

All Publications button
1
Publication Type
Journal Articles
Publication Date
Authors
Paragraphs

Popular culture has contemplated societies of thinking machines for generations, envisioning futures from utopian to dystopian. These futures are, arguably, here now-we find ourselves at the doorstep of technology that can at least simulate the appearance of thinking, acting, and feeling. The real question is: now what?

 

All Publications button
1
Publication Type
Journal Articles
Publication Date
Authors
Paragraphs

Our national discussions about cybersecurity and privacy follow a frustrating pattern: a headline-grabbing incident like the recent Capital One breach occurs, Congress wrings its hands and policymakers more or less move on. So it is no surprise cybersecurity hasn't been much of a focus as the race to the 2020 presidential election heats up.

The issue is here to stay, and it should be debated by the candidates. Here are some concrete ideas that would significantly improve the safety and security of the nation — but require presidential leadership if they are to come to fruition.

 

All Publications button
1
Publication Type
Commentary
Publication Date
Authors
Paragraphs

The current regulatory and legislative infrastructure is poorly suited to address the new challenges to U.S. leadership and innovation in key technology sectors. This paper uses the semiconductor industry as a case study to advance a proposal for a strategic approach to technology policy capable of enabling long-term leadership. This proposal, rooted in structural changes to the federal technology policymaking process, would allow the United States to respond more effectively to strategic technology policymaking of China and other rising economic competitors. Initial steps to advance strategic technology policy should aim to revitalize targeted scientific research, grow the science, technology, engineering, and math (STEM) talent development pipeline, and expand highly skilled immigration.

All Publications button
1
Publication Type
Working Papers
Publication Date
Authors
Paragraphs

Bios: Anja ManuelPavneet Singh, Thompson Paine

China systematically extracts advanced technology from the West. It does so legally, by mining open source databases, investing in our most advanced companies, and compelling technology transfer as a condition for doing business in China, as well as illicitly, through cybertheft and industrial espionage.

How we choose to react will define whether the United States continues to lead in—and reap the benefits of—technical innovation and whether we will be able to set the global norms and standards for technology development and use. Previous U.S. presidents of both parties engaged China in dialogue on IP theft and market access for U.S. firms, among other issues. They were unable to correct China’s behavior. So far, the Trump Administration has focused on trade negotiations and on “defensive” measures: from Congress reforming CFIUS in 2018 and a proposed tightening of export controls, to scrutinizing and slowing cross-border collaboration, and discussing restricting Chinese student visas to the United States. i Yet instead of closing the U.S. system, as we are beginning to do, we can and must compete with China, and in some cases, find ways to collaborate. 

All Publications button
1
Publication Type
Working Papers
Publication Date
Authors
Paragraphs

Bio: Anthony Vinci

The next presidential term will confront an increasingly urgent question of how to compete with China, economically and militarily. Simply increasing national security funding or R&D spending will not ensure victory against a competitor able to outspend the United States. Instead, we will need once again to revolutionize public-private partnerships to meet the challenge, harnessing more efficient ways of developing and implementing new technology. This paper proposes a novel approach for such partnerships, leveraging a joint venture model to share proprietary federal data with industry—on a limited basis, with appropriate safeguards—to catalyze faster development of new national security technology applications. 

All Publications button
1
Publication Type
Working Papers
Publication Date
Authors
Subscribe to The Americas