Showing posts with label Technophoria. Show all posts
Showing posts with label Technophoria. Show all posts
Tuesday, November 12, 2013
Technophoria: They Loved Your G.P.A. Then They Saw Your Tweets.
Perhaps she hadn’t realized that colleges keep track of their social media mentions. “It was incredibly unusual and foolish of her to do that,” Scott A. Meiklejohn, Bowdoin’s dean of admissions and financial aid, told me last week. The college ultimately denied the student admission, he said, because her academic record wasn’t competitive. But had her credentials been better, those indiscreet posts could have scuttled her chances. “We would have wondered about the judgment of someone who spends their time on their mobile phone and makes such awful remarks,” Mr. Meiklejohn said. As certain high school seniors work meticulously this month to finish their early applications to colleges, some may not realize that comments they casually make online could negatively affect their prospects. In fact, new research from Kaplan Test Prep, the service owned by the Washington Post Company, suggests that online scrutiny of college hopefuls is growing. Of 381 college admissions officers who answered a Kaplan telephone questionnaire this year, 31 percent said they had visited an applicant’s Facebook or other personal social media page to learn more about them — a five-percentage-point increase from last year. More crucially for those trying to get into college, 30 percent of the admissions officers said they had discovered information online that had negatively affected an applicant’s prospects. “Students’ social media and digital footprint can sometimes play a role in the admissions process,” says Christine Brown, the executive director of K-12 and college prep programs at Kaplan Test Prep. “It’s something that is becoming more ubiquitous and less looked down upon.” In the business realm, employers now vet the online reputations of job candidates as a matter of course. Given the impulsiveness of typical teenagers, however — not to mention the already fraught nature of college acceptances and rejections — the idea that admissions officers would covertly nose around the social media posts of prospective students seems more chilling. There is some reason for concern. Ms. Brown says that most colleges don’t have formal policies about admissions officers supplementing students’ files with their own online research. If colleges find seemingly troubling material online, they may not necessarily notify the applicants involved. “To me, it’s a huge problem,” said Bradley S. Shear, a lawyer specializing in social media law. For one thing, Mr. Shear told me, colleges might erroneously identify the account of a person with the same name as a prospective student — or even mistake an impostor’s account — as belonging to the applicant, potentially leading to unfair treatment. “Often,” he added, “false and misleading content online is taken as fact.” These kinds of concerns prompted me last week to email 20 colleges and universities — small and large, private and public, East Coast and West Coast — to ask about their practices. Then I called admissions officials at 10 schools who agreed to interviews. Each official told me that it was not routine practice at his or her institution for admissions officers to use Google searches on applicants or to peruse their social media posts. Most said their school received so many applications to review — with essays, recommendations and, often, supplemental portfolios — that staff members wouldn’t be able to do extra research online. A few also felt that online investigations might lead to unfair or inconsistent treatment. “As students’ use of social media is growing, there’s a whole variety of ways that college admissions officers can use it,” Beth A. Wiser, the director of admissions at the University of Vermont, told me. “We have chosen to not use it as part of the process in making admissions decisions.” Other admissions officials said they did not formally prohibit the practice. In fact, they said, admissions officers did look at online material about applicants on an ad hoc basis. Sometimes prospective students themselves ask an admissions office to look at blogs or videos they have posted; on other occasions, an admissions official might look up an obscure award or event mentioned by an applicant, for purposes of elucidation. “Last year, we watched some animation videos and we followed media stories about an applicant who was involved in a political cause,” says Will Hummel, an admissions officer at Pomona College in Claremont, Calif. But those were rare instances, he says, and the supplemental material didn’t significantly affect the students’ admissions prospects.
Sunday, July 21, 2013
Technophoria: Dissent Over a Device to Help Find Melanoma
Ms. Oppel is a medical assistant in Manhattan in the office of Dr. Doris Day, one of the first dermatologists to buy the machine. Developed by Mela Sciences of Irvington, N.Y., the system uses pattern-recognition algorithms to help a dermatologist who has picked out a suspicious pigmented spot to decide whether to perform a biopsy. The device may find an audience among sun-seekers worried about developing an aggressive skin cancer: the National Cancer Institute estimates that about 9,500 Americans this year will die of melanoma of the skin. Yet the device is polarizing the field of skin-cancer detection. For decades, dermatologists have used their eyes, along with a magnifier called a dermatoscope, to try to distinguish abnormal but benign lesions from potential melanoma in order to avoid unneeded biopsies. Some dermatologists argue that these low-tech tools are still the most useful and worry that their colleagues are falling for expensive, cool-looking gadgets that may simply offer extraneous, and perhaps incorrect, data. “This technology should still be considered to be in the developmental stage,” said Dr. Roberta Lucas, an instructor of clinical dermatology at the Northwestern University Feinberg School of Medicine in Chicago. “We are better off when the system supports doctors who are thorough and unhurried; who examine and listen carefully and who empower patients to practice good surveillance and sun protection.” In fact, some members of an expert medical panel asked to review MelaFind a few years ago for the Food and Drug Administration warned that the device had the potential to give doctors and patients a false sense of security. While MelaFind can analyze small pigmented spots identified by dermatologists as having signs of melanoma, it is not designed to evaluate other problems: large melanomas, colorless melanomas or two other types of skin cancer — basal and squamous cell carcinoma. Dr. Amy E. Newburger, a dermatologist in Scarsdale, N.Y., who was a member of that F.D.A. panel, told me that she was concerned that a doctor could inadvertently use MelaFind on a non-melanoma skin cancer, receive a score indicating that the spot was not irregular, and erroneously decide not to biopsy it. She voted against recommending the device for F.D.A. approval. Some biostatisticians are also critical of MelaFind, saying the device can recognize a high percentage of melanomas correctly because it also falsely scores as positive so many non-melanomas — potentially prompting doctors to perform unnecessary biopsies. To help me visualize that issue, Jason Connor, a biostatistician at Berry Consultants, a biostatistics consulting firm, compared the accuracy of MelaFind in distinguishing non-melanomas to a hypothetical pregnancy test which, used on 100 nonpregnant women, would mistakenly conclude that 90 of them were pregnant. “My concern with MelaFind is that it just says everything is positive,” Mr. Connor said. A member of the F.D.A. panel, he abstained on a vote about whether the device’s intended uses outweighed the risks. “I don’t think this helps an aggressive doctor,” Mr. Connor told me, “and unaggressive doctors could do just as well if they were more diligent without the device.” To develop MelaFind’s current algorithm, researchers trained the system on digital images of more than 10,000 pigmented lesions, programming it to recognize irregularities like asymmetry, color variability and cellular disorganization characteristic of melanomas. Company executives said Mela Sciences deliberately calibrated the machine to catch as many melanomas as possible, understanding that such a high setting could lead doctors to biopsy normal tissue. “It will err on the side of caution,” said Claudia Beqaj, director of commercialization at Mela Sciences. “We wanted to set the system to have such a high sensitivity that we didn’t miss any melanomas.” (In a company-financed study submitted to the F.D.A., the device missed two out of 127 evaluable melanomas. One F.D.A. reviewer concluded: “There is inadequate data to determine any true value added for MelaFind for use by a dermatologist or other provider.”) Ms. Beqaj emphasized that MelaFind was intended as a supplementary test that provided extra information about a mole, not as a substitute for a dermatologist’s own expertise. “If they blindly followed MelaFind, they would be biopsying more," Ms. Beqaj said. “The doctor has to make their own clinical judgment.” Dr. Day finds the system quite informative. Last week, she gave me a demonstration in her office on the Upper East Side of Manhattan. Dr. Day picked out what she called an “ugly duckling” mole on the left arm of Ms. Oppel, who had kindly agreed to play the role of patient. Another medical assistant removed a hand-held scanner from the MelaFind console and pressed it against the mole.
Monday, June 24, 2013
Technophoria: Data Security Is a Classroom Worry, Too
Edmodo’s free software allows teachers to set up virtual classrooms where they can post homework assignments, give quizzes and use third-party apps to complement lessons. Students can create individual profiles, including their photograph and other details, within their teacher’s class and post comments to a communal class feed. Mr. Porterfield, an engineer at Cisco Systems, examined Edmodo’s data security practices by registering himself on the site as a fictional home-school teacher. As he went about creating imaginary students — complete with cartoon avatars — for his fictitious class, however, he noticed that Edmodo did not encrypt user sessions using a standard encryption protocol called Secure Sockets Layer. That cryptography system, called SSL for short and used by many online banking and e-commerce sites, protects people who log in to sites over an open Wi-Fi network — like the kind offered by many coffee shops — from strangers who might be using snooping software on the same network. (An “https” at the beginning of a URL indicates SSL encryption.) Without that encryption, Mr. Porterfield says, he worried about the potential for a stranger to gain access to student information, and thus hypothetically be able to identify or even contact students. To test this hypothesis, he used a computer on his home Wi-Fi network to log in as an imaginary student; then, using another computer, he installed free security auditing software, called Cookie Cadger, to spy on the student’s online activities. Though the risk of this happening with actual students seemed small — Edmodo and other companies say they have no evidence that this kind of breach has occurred — he contacted his school district about his concerns. “There’s a lot of contextual information you could use to gain trust, to make yourself seem familiar to the child,” he says. “As a parent, that’s the scariest thing.” In response to an inquiry from me last week, Sara Mandel, a spokeswoman for Edmodo, said the service provided “a safe alternative to open, consumer social networking sites” because students could participate only in groups created by their teachers and because teachers decided whether students could send private messages to one another. She added that “any school that chooses” had been able to use a completely encrypted version of the site since 2011 and that the company “is working to ensure that all of our users are using an SSL-encrypted version.” SCHOOL administrators and teachers said they liked these online learning systems because they could control the information that students might share. “Kids can’t talk to each other. They can only speak to the group,” says Heather Peretz, a special-education teacher at Great Neck South Middle School in Great Neck, N.Y., who uses Edmodo in her English class. “It helps them learn to be good digital citizens so they are not making inappropriate posts.” But as school districts rush to adopt learning-management systems, some privacy advocates warn that educators may be embracing the bells and whistles before mastering fundamentals like data security and privacy. Although a federal law protecting children’s online privacy requires online services to take reasonable measures to secure personal information — like names and e-mail addresses — collected from children under 13, the law doesn’t specifically require SSL encryption. Yet school districts often issue only general notices about classroom technology, leaving many parents unaware of the practices of the online learning systems their children use. Moreover, schools often require online participation so students can gain access to course assignments or collaborate on projects. “What we are finding with this type of database is that parents are uninformed,” says Khaliah Barnes, a lawyer at the Electronic Privacy Information Center. “Most don’t understand how the technology works.” Online security experts have long warned consumers about unencrypted Web sites that collect personal details. That is because on open Wi-Fi networks, hackers using simple software programs can see and copy the unique code, called a session cookie, that servers issue to authenticate a person who has logged into a Web site. By replicating that cookie, a hacker can acquire the same privileges, like the ability to edit a profile or grade a quiz, of the authenticated user for that session.
Sunday, May 26, 2013
Technophoria: For Consumers, an ‘Open Data’ Society Is a Misnomer
Consolidated Edison monitors my household’s energy consumption and provides a chart of monthly utility use. But when I sought more granular information, so I could learn which of my recharging devices gobbles up the most electricity, I found that Con Ed doesn’t automatically provide customers with data about hourly or even daily use. Robert McGee, a spokesman for Con Ed, suggested that I might go down to the basement once an hour and check the meter myself. Then there is my health club, which keeps track of my visits through swipes of my membership card. Yet when I recently asked for an online log of those visits, I was offered a one-time printout for the year — if I were willing to wait a half-hour. Never mind all the hoopla about the presumed benefits of an “open data” society. In our day-to-day lives, many of us are being kept in the data dark. “The fact that I am producing data and companies are collecting it to monetize it, if I can’t get a copy myself, I do consider it unfair,” says Latanya Sweeney, the director of the Data Privacy Lab at Harvard, where she is a professor of government and technology. Of course, she notes, we can replicate the information that companies collect and collate about us with third-party apps or other workarounds, but we shouldn’t have to resort to redundancy. Professor Sweeney says: “We would like to see people have access to all of the data that they produce.” In fact, a few companies are challenging the norm of corporate data hoarding by actually sharing some information with the customers who generate it — and offering tools to put it to use. It’s a small but provocative trend in the United States, where only a handful of industries, like health care and credit, are required by federal law to provide people with access to their records. Last year, San Diego Gas and Electric, a utility, introduced an online energy management program in which customers can view their electricity use in monthly, daily or hourly increments. There is even a practical benefit: customers can earn credits by reducing energy consumption during peak hours. About one-quarter of the company’s 1.2 million residential customers have tried the program, says Caroline Winn, the company’s vice president for customer services. Newer features, she says, allow customers to download their own use files. Or they can choose to give permission for the utility to share their records directly with a handful of apps that can analyze the data and suggest ways to reduce energy consumption. “The customer owns their data,” Ms. Winn says. “Whether they want to use our app or somebody else’s, we want to make sure we are facilitating that.” (Con Ed in New York also offers customers reduced pricing if they use electricity during off-peak hours. But the program requires the installation of a special meter.) People might feel more comfortable about being subject to data-mining if companies did a better job of demonstrating a direct benefit to them, argues Jules Polonetsky, director of the Future of Privacy Forum, an industry financed research organization in Washington. One model for this, he says, is the product recommendation engine at Amazon, which lets customers view their purchase histories and excise one-off items they bought for friends that might not represent their own personal tastes. “They are providing transparency as a feature,” Mr. Polonetsky says. “I can tweak their algorithm in a way that is mutually useful.” (Amazon is one of the sponsors of his organization.) Even so, companies rarely offer customers more than a cropped snapshot of their activities. Right now, for example, fitness enthusiasts who use blood pressure monitors, calorie calculators and movement sensors typically can’t collate the data for a unified view of their wellness, Doc Searls, a technology writer who has experienced this kind of problem himself, told me. If people could easily integrate their data, he wrote in a recent blog post, they might be able to correlate weight loss to a particular workout routine or diet. Those companies that do allow customers to export their files and integrate their data elsewhere, he says, have a market advantage over companies that are data misers. “Stock data, bank data, and bond data are all more valuable when they are looked at together,” says Mr. Searls, the author of “The Intention Economy: When Customers Take Charge.” “If I have a choice between apps and one of them shares the data that I can use more easily, I am going to choose that one.” INTEL, for instance, recently introduced a “data economy” project, intended to encourage companies to think of consumers as participants in the information economy, and not just as data-harvesting opportunities. The venture includes a site called WeTheData.com, which looks at current obstacles to information sharing. Ken Anderson, a senior research scientist at Intel Labs who oversees the project, compares corporate data-hoarding today to a faulty mind-set of the fast-food industry in the early 1980s. Back then, he says, fast-food chains thought that they should open outlets only at a good distance from their competitors. But when food courts in malls became popular, he says, those restaurant chains realized that they benefited from shared retail space. “If you put it all in one place, you get more business,” says Mr. Anderson, a cultural anthropologist who studies how people interact with technology. The same goes for consumer data. He envisions an online answer to food courts — an information smorgasbord where consumers could browse their own records. “We are trying to show companies the value of opening data up” he says, “and having them be more communal in nature.”
Subscribe to:
Posts (Atom)