The New York Times' Stuart A. Thompson and David Yaffe-Bellany catalogue likely indications of insider trading in Polymarket ...
Faculty Associate Magda Romanska reflects on the return to in-person arts programming after COVID-spurred digitization.
"Plunkett believes parents can educate themselves about harmful online content and how easy it is for their children to access it ‒ whether intentionally or not." ...
The vulnerability-finding capabilities of technologies like Mythos have important ramifications for cybersecurity, argues Bruce Schneier in The Guardian. Though Mythos doesn't evidently outperform ...
Regulation and oversight are of little use if they are always playing a chasing game. AI companies have turned regulation into the last line of redress when it should have been the first line of ...
Fellow Stephen Casper and coauthors propose proportional evaluation approaches to open-weight AI models. They argue that such mechanisms are necessary because existing evaluation practices are able ...
Worried about how online firms use data they get from you?Berkman Klein researchers based out of the Applied Social Media Lab ...
Foreign social media platforms are unique associational and speech infrastructures that should be treated differently from other foreign infrastructure, challenging the Supreme Court's view of these ...
Daji Landis, Faculty Associate Elettra Bietti, and alum Sunoo Park address security vs. interoperability arguments in antitrust and regulatory proceedings against Big Tech.
Privacy violations are a serious threat to the health of the Internet and the effective use of technology. We study how people understand their privacy as users of ...
ASML's Keyring empowers users to track how their data is collected, stored, and used online.