BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Women in AI Ethics™ - ECPv6.8.1//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://womeninaiethics.org
X-WR-CALDESC:Events for Women in AI Ethics™
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20251031T110000
DTEND;TZID=America/New_York:20251031T120000
DTSTAMP:20260409T154848
CREATED:20250427T073507Z
LAST-MODIFIED:20250806T074137Z
UID:3526-1761908400-1761912000@womeninaiethics.org
SUMMARY:Reading Circle: AI + Privacy - Obfuscation | Helen Nissembaum
DESCRIPTION:BOOK TITLE: Obfuscation: A User’s Guide for Privacy and Protest \nAUTHOR: Prof. Helen Nissenbaum \nDESCRIPTION: (Source: Bookshop.org) \n\n  \n \n\nWith Obfuscation\, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers\, offering us ways to fight today’s pervasive digital surveillance—the collection of our data by governments\, corporations\, advertisers\, and hackers. To the toolkit of privacy protecting techniques and projects\, they propose adding obfuscation: the deliberate use of ambiguous\, confusing\, or misleading information to interfere with surveillance and data collection projects.  \nBrunton and Nissenbaum provide tools and a rationale for evasion\, noncompliance\, refusal\, even sabotage—especially for average users\, those of us not in a position to opt out or exert control over data about ourselves. Obfuscation will teach users to push back\, software developers to keep their user data safe\, and policy makers to gather data without misusing it. \nBrunton and Nissenbaum present a guide to the forms and formats that obfuscation has taken and explain how to craft its implementation to suit the goal and the adversary. They describe a series of historical and contemporary examples\, including radar chaff deployed by World War II pilots\, Twitter bots that hobbled the social media strategy of popular protest movements\, and software that can camouflage users’ search queries and stymie online advertising. They go on to consider obfuscation in more general terms\, discussing why obfuscation is necessary\, whether it is justified\, how it works\, and how it can be integrated with other privacy practices and technologies. \n \nAUTHOR BIO \n\n \nHelen Nissenbaum is the Andrew H. and Ann R. Tisch Professor at Cornell Tech and in the  Information Science Department at Cornell University. She is also Director of the Digital Life Initiative\, which was launched in 2017 at Cornell Tech to explore societal perspectives surrounding the development and application of digital technology\, focusing on ethics\, policy\, politics\, and quality of life. Her own research takes an ethical perspective on policy\, law\, science\, and engineering relating to information technology\, computing\, digital media and data science. Topics have included privacy\, trust\, accountability\, security\, and values in technology design.  \nHer books include Obfuscation: A User’s Guide for Privacy and Protest\, with Finn Brunton (MIT Press\, 2015) and Privacy in Context: Technology\, Policy\, and the Integrity of Social Life (Stanford\, 2010). \nRELATED LINKS: \n\nAuthor website\nWhy Data Privacy Based on Consent Is Impossible\nPrivacy in Context | Stanford University Press\nPrivacy as Contextual Integrity\nObfuscation: A User’s Guide for Privacy and Protest | MIT Press eBooks | IEEE Xplore\nFinn Brunton and Helen Nissenbaum: Obfuscation: a user’s guide for privacy and protest
URL:https://womeninaiethics.org/event/reading-circle-ai-privacy-obfuscation-helen-nissembaum/
LOCATION:Virtual – Online
ATTACH;FMTTYPE=image/jpeg:https://womeninaiethics.org/wp-content/uploads/2025/04/Obfuscation_-A-Users-Guide-for-Privacy-and-Protest.jpg
END:VEVENT
END:VCALENDAR