Abstract Public concern regarding the use of herbicides in urban areas (e.g., golf courses, parks, lawns) is increasing. Thus, there is a need for alternative methods for weed control that are safe for the public, effective against weeds, and yet selective to turfgrass and other desirable species. New molecular tools such as ribonucleic acid interference (RNAi) have the potential to meet all those requirements, but before these technologies can be implemented, it is critical to understand the perceptions of key stakeholders to facilitate adoption as well as regulatory processes. With this in mind, turfgrass system managers, such as golf course superintendents and lawn care providers, were surveyed to gain insight into the perception and potential adoption of RNAi technology for weed management. Based on survey results, turfgrass managers believe that cost of weed management and time spent managing weeds are the main challenges faced in their fields. When considering new weed management tools, survey respondents were most concerned about cost, efficacy, and efficiency of a new product. Survey respondents were also optimistic toward RNAi for weed management and would either use this technology in their own fields or be willing to conduct research to develop RNAi herbicides. Although respondents believed that the general public would have some concerns about this technology, they did not believe this to be the most important factor for them when choosing new weed management tools. The need for new herbicides to balance weed control challenges and public demands is a central factor for turfgrass managers’ willingness to use RNAi-based weed control in turfgrass systems. They believe their clientele will be accepting of RNAi tools, although further research is needed to investigate how a wider range of stakeholders perceive RNAi tools for turfgrass management more broadly.
more »
« less
“Data Strikes”: Evaluating the Effectiveness of a New Form of Collective Action Against Technology Companies
The public is increasingly concerned about the practices of large technology companies with regards to privacy and many other issues. To force changes in these practices, there have been growing calls for “data strikes.” These new types of collective action would seek to create leverage for the public by starving business-critical models (e.g. recommender systems, ranking algorithms) of much-needed training data. However, little is known about how data strikes would work, let alone how effective they would be. Focusing on the important commercial domain of recommender systems, we simulate data strikes under a wide variety of conditions and explore how they can augment traditional boycotts. Our results suggest that data strikes can be effective and that users have more power in their relationship with technology companies than they do with other companies. However, our results also highlight important trade-offs and challenges that must be considered by potential organizers.
more »
« less
- PAR ID:
- 10109463
- Date Published:
- Journal Name:
- WWW '19: The World Wide Web Conference
- Page Range / eLocation ID:
- 1931 to 1943
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Malware analysis tasks are as fundamental for modern cybersecurity as they are challenging to perform. More than depending on any tool capability, malware analysis tasks depend on human analysts’ abilities, experiences, and practices when using the tools. Academic research has traditionally been focused on producing solutions to overcome malware analysis technical challenges, but are these solutions adopted in practice by malware analysts? Are these solutions useful? If not, how can the academic community improve its practices to foster adoption and cause a greater impact? To answer these questions, we surveyed 21 professional malware analysts working in different companies, from CSIRTs to AV companies, to hear their opinions about existing tools, practices, and the challenges they face in their daily tasks. In 31 questions, we cover a broad range of aspects, from the number of observed malware variants to the use of public sandboxes and the tools the analysts would like to exist to make their lives easier. We aim to bridge the gap between academic developments and malware practices. To do so, on the one hand, we suggest to the analysts the solutions proposed in the literature that could be integrated into their practices. On the other hand, we also point out to the academic community possible future directions to bridge existing development gaps that significantly affect malware analysis practices.more » « less
-
In the United States, public defenders (lawyers assigned to people accused of crimes who cannot afford a private attorney) serve as an essential bulwark against wrongful arrest and incarceration for low-income and marginalized people. Public defenders have long been overworked and under-resourced. However, these issues have been compounded by increases in the volume and complexity of data in modern criminal cases. We explore the technology needs of public defenders through a series of semi-structured interviews with public defenders and those who work with them. We find that public defenders' ability to reason about novel surveillance data is woefully inadequate not only due to a lack of resources and knowledge, but also due to the structure of the criminal justice system, which gives prosecutors and police (in partnership with private companies) more control over the type of information used in criminal cases than defense attorneys. We find that public defenders may be able to create fairer situations for their clients with better tools for data interpretation and access. Therefore, we call on technologists to attend to the needs of public defenders and the people they represent when designing systems that collect data about people. Our findings illuminate constraints that technologists and privacy advocates should consider as they pursue solutions. In particular, our work complicates notions of individual privacy as the only value in protecting users' rights, and demonstrates the importance of data interpretation alongside data visibility. As data sources become more complex, control over the data cannot be separated from access to the experts and technology to make sense of that data. The growing surveillance data ecosystem may systematically oppress not only those who are most closely observed, but groups of people whose communities and advocates have been deprived of the storytelling power over their information.more » « less
-
Scholars have well-established the socio-political and legal history of immigrant detention as a form of racialized social control in the United States. In recent years, private prison companies have benefited financially from this system, amassing sizeable profits in spite of vast criticisms and concerns. For this project, we focus on how private immigration detention—as a modern-day form of racialized social control—is normalized. Using the theoretical concept of controlling images, we examine how private prison companies frame the people they detain. Results from our analysis of 143 press releases indicate that private prisons rarely talk about the people they detain. Instead, the companies make vague and indirect references using inanimate objects which dehumanizes them. When the companies do reference migrants, they often characterize them as wards of the state, and in doing so, private prison companies are infantilizing people in lockup in subtle ways. Companies also engage in a significant amount of rhetoric that champions their organizations as they bolster their business amidst scandals and allegations. We conclude that these controlling images, while appearing race neutral, are quite effective in contributing to the invisibility of these groups and maintenance of the status quo. These actions further their exploitable quality by reproducing the oppression of racial others and simultaneously function to legitimize the business practices of private prison companies.more » « less
-
Strong end-user security practices benefit both the user and hosting platform, but it is not well understood how companies communicate with their users to encourage these practices. This paper explores whether web companies and their platforms use different levels of language formality in these communications and tests the hypothesis that higher language formality leads to users’ increased intention to comply. We contribute a dataset and systematic analysis of 1,817 English language strings in web security and privacy interfaces across 13 web platforms, showing strong variations in language. An online study with 512 participants further demonstrated that people perceive differences in the language formality across platforms and that a higher language formality is associated with higher self-reported intention to comply. Our findings suggest that formality can be an important factor in designing effective security and privacy prompts. We discuss implications of these results, including how to balance formality with platform language style. In addition to being the first piece of work to analyze language formality in user security, these findings provide valuable insights into how platforms can best communicate with users about account security.more » « less