Order:
  1. How the machine ‘thinks’: Understanding opacity in machine learning algorithms.Jenna Burrell - 2016 - Big Data and Society 3 (1):205395171562251.
    This article considers the issue of opacity as a problem for socially consequential mechanisms of classification and ranking, such as spam filters, credit card fraud detection, search engines, news trends, market segmentation and advertising, insurance or loan qualification, and credit scoring. These mechanisms of classification all frequently rely on computational algorithms, and in many cases on machine learning algorithms to do this work. In this article, I draw a distinction between three forms of opacity: opacity as intentional corporate or state (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   181 citations  
  2.  6
    Friction, snake oil, and weird countries: Cybersecurity systems could deepen global inequality through regional blocking.Jenna Burrell & Anne Jonas - 2019 - Big Data and Society 6 (1).
    In this moment of rising nationalism worldwide, governments, civil society groups, transnational companies, and web users all complain of increasing regional fragmentation online. While prior work in this area has primarily focused on issues of government censorship and regulatory compliance, we use an inductive and qualitative approach to examine targeted blocking by corporate entities of entire regions motivated by concerns about fraud, abuse, and theft. Through participant-observation at relevant events and intensive interviews with experts, we document the quest by professionals (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  6
    User Agency in the Middle Range: Rumors and the Reinvention of the Internet in Accra, Ghana.Jenna Burrell - 2011 - Science, Technology, and Human Values 36 (2):139-159.
    This article is an analysis of rumors about Internet scamming told by Internet café users in the West African capital city of Accra, Ghana. Rumors provided accounts of how the Internet can be effectively operated by young Ghanaians to realize ‘‘big gains’’ through foreign connections. Yet these accounts were contradicted by the less promising direct experiences users had at the computer interface. Rumors amplified evidence of wildly successful as well as especially harmful encounters with the Internet. Rather than simply transferring (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation