{"id":917,"date":"2024-02-22T00:35:17","date_gmt":"2024-02-22T00:35:17","guid":{"rendered":"https:\/\/pc-keeper.tech\/index.php\/2024\/02\/22\/digital-platforms-and-societal-harms-2024\/"},"modified":"2024-02-22T00:35:17","modified_gmt":"2024-02-22T00:35:17","slug":"digital-platforms-and-societal-harms-2024","status":"publish","type":"post","link":"https:\/\/pc-keeper.tech\/index.php\/2024\/02\/22\/digital-platforms-and-societal-harms-2024\/","title":{"rendered":"Digital Platforms and Societal Harms 2024"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<h3>Scope<\/h3>\n<p>Law and public policy, such as Approaches to harm minimization; Trade-offs between competing legal and policy incentives; Global trends in government responses &amp; intervention to social harms; Human behavior and emotional regulation; Public-private cooperation to address social harms.<\/p>\n<p>Tech\/private sector policy and governance, such as Development of corporate policies and safety by design; Responsible tech governance, management, and oversight; Corporate governance structure design; Protection, ranging from whistleblower protection to protection of designs as project progress; Balance competing policy incentives (free speech and harm minimization); Transparency.<\/p>\n<p>Information aspects, such as Definitions of information trustworthiness, authenticity, integrity, and credibility; Information quality and content moderation; Boundaries of journalistic behavior online; Suitability of news content from journalistic entities to surface ground truth.<\/p>\n<p>User aspects and psychological features, such as Definitions and analysis of online authentic behavior; Human behavior analysis; Cognitive tagging; Trust mechanisms; Moral foundations &amp; ethical frameworks; Evolutionary features of online hate speech and disinformation; Hatred basis against various religious and ethnic groups; Human performance against DeepFake media; User views on government or corporate approaches to mitigating harms; User reporting mechanisms design; User safety.<\/p>\n<p>AI and digital harms, such as Ethical, Explainable and Sustainable AI; Algorithmic bias and discrimination; New datasets and evaluation methodologies; New approaches for ground truth labeling; DeepFake media generation or detection; AI chatbots as information assistant or opinion influencer; Open-source toolkits, Serverless AI Applications.<\/p>\n<p>Media propagation aspects, such as Propagation mechanism; Propagation and authenticity; Conspiracies, disinformation and propaganda; Regional and local media; Media fragmentation and changing patterns of media consumption and usage; Risks and opportunities of new media usage; Media representation, inequalities, and minorities; Media and information warfare.<\/p>\n<\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.computer.org\/conferences\/dpsh-2024\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] Scope Law and public policy, such as Approaches to harm minimization; Trade-offs between competing legal and policy incentives; Global&hellip;<\/p>\n","protected":false},"author":1,"featured_media":918,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[486,703,172],"tags":[],"class_list":["post-917","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-call-for-papers","category-call-for-papers-filter-post","category-conferences"],"_links":{"self":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/comments?post=917"}],"version-history":[{"count":0,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/917\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media\/918"}],"wp:attachment":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media?parent=917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/categories?post=917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/tags?post=917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}