Skip to main content
Skip to content
Case File
d-16415House OversightOther

Course reading list on technology governance and algorithmic accountability

The document is a syllabus of readings on governance, free vs proprietary software, AI, IoT security, and algorithmic accountability. It contains no specific allegations, names, transactions, or actio Discusses philosophical questions about governance of emerging technologies. References articles on IoT security, hack attacks, and algorithmic influence on elections. Cites works by Jonathan Zittrai

Date
November 11, 2025
Source
House Oversight
Reference
House Oversight #024268
Pages
1
Persons
0
Integrity
No Hash Available

Summary

The document is a syllabus of readings on governance, free vs proprietary software, AI, IoT security, and algorithmic accountability. It contains no specific allegations, names, transactions, or actio Discusses philosophical questions about governance of emerging technologies. References articles on IoT security, hack attacks, and algorithmic influence on elections. Cites works by Jonathan Zittrai

Tags

technology-governancealgorithmic-accountabilityiot-securityacademic-reading-listaihouse-oversight

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
Day 8: Governance The tensions between free vs. proprietary software help focus us on foundational questions of governance that are threaded through the course. To what extent should new technologies be shaped and shared by anyone without gatekeeping? 2017 may find the Internet in middle age. Do its puzzles suggest anything about whether and how to resolve governance questions for more newly mainstreamed technologies like machine learning and other Al? In addition to the challenges that the Internet has provided in regulation and governance, the inability to really understand what many “learned” algorithms do, and their ability to have properties and abilities beyond the capabilities of their initial designers, presents additional challenges when thinking about whether and how to regulate the research, as well as the deployment, of Al. Phenomena like digital currencies and distributed Al systems reprises the ideas and challenges of Barlow’s declaration of independence of cyberspace. Readings: Governance: loT Security e J.M. Porup, “Internet of Things’ security is hilariously broken and getting worse” Ars Technica (January 23, 2016) http://arstechnica.com/security/20 16/0 1/how-to-search-the-internet-of-things-for-photos-o f-sleeping-babies/ archived at httos://perma.cc/R8LZ-MULJ. e Nicole Perlroth, “Hackers Used New Weapons to Disrupt Major Websites Across U.S.” The New York Times (October 21, 2016) http://www.nytimes.com/2016/10/22/business/internet-problems-attack.html. Governance: Algorithmic Accountability e Jonathan Zittrain, “Facebook Could Decide an Election Without Anyone Ever Finding Out,” New Republic (June 1, 2014) https://newrepublic.com/article/117878/information-fiduciary-solution-facebook-digital-ger rymandering archived at https://oerma.cc/ED8B-C7YL. e Carole Cadwalladr, “Google, democracy and the truth about internet search,” The Guardian (December 4, 2016) https://Awww.thequardian.com/technology/2016/dec/04/qoogle-democracy-truth-internet-s earch-facebook archived at https://perma.cc/JC7F-XDUM. e Cathy O’Neil, Weapons Of Math Destruction : How Big Data Increases Inequality And Threatens Democracy [e-book]. New York: Crown; 2016. Available from: eBook Collection (EBSCOhost), Ipswich, MA. Accessed December 10, 2016 o Read the Introduction and Chapter 1 (will print for the students) e Jack Balkin and Jonathan Zittrain, “A Grand Bargain to Make Tech Companies Trustworthy,” The Atlantic (October 3, 2016) http://www.theatlantic.com/technology/archive/2016/10/information-fiduciary/502346/ archived at https://perma.cc/QXX4-VASM.

Technical Artifacts (9)

View in Artifacts Browser

Email addresses, URLs, phone numbers, and other technical indicators extracted from this document.

Domainawww.thequardian.com
URLhttp://arstechnica.com/security/20
URLhttp://www.nytimes.com/2016/10/22/business/internet-problems-attack.html
URLhttp://www.theatlantic.com/technology/archive/2016/10/information-fiduciary/502346
URLhttps://Awww.thequardian.com/technology/2016/dec/04/qoogle-democracy-truth-internet-s
URLhttps://newrepublic.com/article/117878/information-fiduciary-solution-facebook-digital-ger
URLhttps://oerma.cc/ED8B-C7YL
URLhttps://perma.cc/JC7F-XDUM
URLhttps://perma.cc/QXX4-VASM

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.