Deepfakes, phrenology, surveillance, and more! a taxonomy of ai privacy risks

HP Lee, YJ Yang, TS Von Davier, J Forlizzi… - Proceedings of the 2024 …, 2024 - dl.acm.org
Privacy is a key principle for develo** ethical AI technologies, but how does including AI
technologies in products and services change privacy risks? We constructed a taxonomy of …

Walking the walk of AI ethics: Organizational challenges and the individualization of risk among ethics entrepreneurs

SJ Ali, A Christin, A Smart, R Katila - … of the 2023 ACM Conference on …, 2023 - dl.acm.org
Amidst decline in public trust in technology, computing ethics have taken center stage, and
critics have raised questions about corporate “ethics washing.” Yet few studies examine the …

Investigating practices and opportunities for cross-functional collaboration around AI fairness in industry practice

WH Deng, N Yildirim, M Chang, M Eslami… - Proceedings of the …, 2023 - dl.acm.org
An emerging body of research indicates that ineffective cross-functional collaboration–the
interdisciplinary work done by industry practitioners across roles–represents a major barrier …

A narrative review of factors affecting the implementation of privacy and security practices in software development

L Nurgalieva, A Frik, G Doherty - ACM Computing Surveys, 2023 - dl.acm.org
Privacy and security are complex topics, raising a variety of considerations and
requirements that can be challenging to implement in software development. Determining …

Translating privacy design principles into human-centered Software Lifecycle: A literature review

M Saltarella, G Desolda, R Lanzilotti… - International Journal of …, 2024 - Taylor & Francis
Companies and organizations involved in software development are stimulated and often
obliged to consider procedures and technical solutions to guarantee data privacy and …

Privacy legislation as business risks: How GDPR and CCPA are represented in technology companies' investment risk disclosures

RY Wong, A Chong, RC Aspegren - Proceedings of the ACM on Human …, 2023 - dl.acm.org
Power exercised by large technology companies has led to concerns over privacy and data
protection, evidenced by the passage of legislation including the EU's General Data …

Developers say the darnedest things: Privacy compliance processes followed by developers of child-directed apps

N Alomar, S Egelman - Proceedings on Privacy Enhancing …, 2022 - petsymposium.org
We investigate the privacy compliance processes followed by developers of child-directed
mobile apps. While children's online privacy laws have existed for decades in the US, prior …

{“Security} is not my field,{I'm} a stats {guy”}: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry

J Mink, H Kaur, J Schmüser, S Fahl, Y Acar - 32nd USENIX Security …, 2023 - usenix.org
Adversarial machine learning (AML) has the potential to leak training data, force arbitrary
classifications, and greatly degrade overall performance of machine learning models, all of …

Evaluating privacy perceptions, experience, and behavior of software development teams

M Prybylo, S Haghighi, ST Peddinti… - Twentieth Symposium on …, 2024 - usenix.org
With the increase in the number of privacy regulations, small development teams are forced
to make privacy decisions on their own. In this paper, we conduct a mixed-method survey …

Privacy engineering in the wild: Understanding the practitioners' mindset, organizational aspects, and current practices

LH Iwaya, MA Babar, A Rashid - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Privacy engineering, as an emerging field of research and practice, comprises the technical
capabilities and management processes needed to implement, deploy, and operate privacy …