A Book Review of The Ethical Algorithm: The Science of Socially Aware Algorithm Design by Kearns and Roth; and Thoughts for Legal Information Professionals

2021 ◽  
Vol 21 (2) ◽  
pp. 118-121
Author(s):  
Channarong Intahchomphoo ◽  
Christian Tschirhart

AbstractThis article consists of two parts. The first part is a review of the book entitled, ‘The Ethical Algorithm: The Science of Socially Aware Algorithm Design’, written by Professors Michael Kearns and Aaron Roth of the Computer and Information Science Department, University of Pennsylvania. The book was published in 2019 by Oxford University Press. The second part consists of thoughts learned from the book and how they could be applied to the work of legal information management professionals when facing tasks related to the ethical algorithms in artificial intelligence (AI) and robotics. How online privacy continues to be the main concern in the AI and robot era will be discussed, as well as the rise of concerns over AI and robots and how they might make unfair decisions toward vulnerable populations which could then become acts of discrimination. Examples of real-world problems of AI and robotics are also noted in this article.

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Devendra Dilip Potnis ◽  
Joseph Winberry

PurposeThis literature review aims to identify conscious, intentional, repetitive and transferrable information-related decisions and activities (i.e. information practices) for individuals to alleviate their information vulnerability. Information vulnerability refers to the lack of access to accurate, affordable, complete, relevant and timely information or the inability to use such information, which can place individuals, communities or society at disadvantage or hurt them.Design/methodology/approachConceptual literature review.FindingsThis review presents seven conscious, intentional, repetitive and transferrable information practices to alleviate information vulnerability.Practical implicationsDue to the transferability potential of the seven information practices, diverse populations in varied contexts could refer to, adapt and benefit from appropriate combinations of information practices and their manifestations. The framework can be used by individuals for alleviating information vulnerability. Thus, this paper responds to the call for conducting action-driven research in information science for addressing real-world problems. Information professionals can help individuals select and implement appropriate combinations of seven information practices for alleviating information vulnerability.Originality/valueWe propose (1) a parsimonious, episodic framework for alleviating information vulnerability, which depicts the inter-relationship among the seven information practices and (2) a three-dimensional plot with information access, use and value as three axes to map the manifestation and outcome of alleviating information vulnerability.


Sign in / Sign up

Export Citation Format

Share Document