01.03.2024 Views

The Cyber Defense eMagazine March Edition for 2024

Cyber Defense eMagazine March Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 225 page March Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine March Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 225 page March Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Relying on the Unreliable<br />

<strong>The</strong> Hidden Costs of Facial Recognition Technology<br />

By Tinglong Dai, Bernard T. Ferrari Professor of Business, <strong>The</strong> Carey Business School at Johns<br />

Hopkins University<br />

With generative AI dominating the tech world's attention, facial recognition looms like a long, frightening<br />

shadow. <strong>The</strong> way it is trained and used, it is a <strong>for</strong>ce that is changing the boundaries of personal freedom<br />

and privacy. <strong>The</strong> training process uses a wide range of data sources, including images posted online by<br />

users, to build a detailed, often unreliable picture of who we are and what we do. <strong>The</strong> use of such<br />

unreliable technology is even more questionable.<br />

Not only does this technology try to recognize us, but the way it's trained, often using data collected by<br />

bots that scour the internet, find every photo you post online, and match your face to every other<br />

representation of your face they can find, it can easily infiltrate our lives and peer into the most private<br />

parts of them. Our simple walk past a security camera or an Instagram photo can be turned into a file of<br />

our personal, legal, and financial records by piecing together our digital footprints, often mixing ours with<br />

those of others. <strong>The</strong> consequences can be just as swift and frightening.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2024</strong> <strong>Edition</strong> 95<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!