skip to main content
research-article

The steep cost of capture

Published:10 November 2021Publication History
First page image

References

  1. Krizhevsky, A., Sutskever, I., and Hinton, G.E. ImageNet classification with deep convolutional neural networks. Advances in Neural Information Processing Systems 25 (NIPS 2012); https://proceedings.neurips.cc/paper/2012/file/c399862d3b9d6b76c8436e924a68c45b-Paper.pdfGoogle ScholarGoogle Scholar
  2. Murgia, M. AI academics under pressure to do commercial research. Financial Times. Mar. 13, 2019; https://www.ft.com/content/94e86cd0-44b6-11e9-a965-23d669740bfbGoogle ScholarGoogle Scholar
  3. Matias, J.N. Why we need industry-independent research on tech & society. Citizens and Tech Lab. Jan. 2020; https://citizensandtech.org/2020/01/industry-independent-research/Google ScholarGoogle Scholar
  4. Bommasani, R. et al. On the opportunities and risks of foundation models. 2021; arXiv preprint arXiv:2108.07258Google ScholarGoogle Scholar
  5. Bender, E.M., Gebru, T., McMillan-Major, A., and Shmitchell, S. On the dangers of stochastic parrots: Can language models be too big? Proc. of the 2021 ACM Conference on Fairness, Accountability, and Transparency. ACM, New York, 2021, 610--623 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. https://www.congress.gov/116/bills/hr6395/BILLS-116hr6395enr.pdfGoogle ScholarGoogle Scholar
  7. https://www.nsf.gov/funding/pgm_summ.jsp?pims_id=505651Google ScholarGoogle Scholar
  8. Melman, S. Pentagon Capitalism: The Political Economy of War. McGraw-Hill, New York, 1970.Google ScholarGoogle Scholar
  9. Krinsky, R. Swords and sheepskins: Militarization of higher education in the United States and prospects of its conversion. Bulletin of Peace Proposals 19, 1 (1988), 33--51; http://www.jstor.org/stable/44481371Google ScholarGoogle ScholarCross RefCross Ref
  10. Lardner, Jr., G. Army accuses SDI critic of falsifying credentials. Washington Post. Apr. 14, 1992; https://www.washingtonpost.com/archive/politics/1992/04/14/army-accuses-sdi-critic-of-falsifying-credentials/13ffe75f-50f8-4654-9027-536c30880c13/Google ScholarGoogle Scholar
  11. Martin, B. Science: contemporary censorship. In Censorship: A World Encyclopedia, Vol 4. D. Jones, ed. Fitzroy Dearborn, London, 2001, 2167--2170; https://documents.uow.edu.au/~bmartin/pubs/01cescience.htmlGoogle ScholarGoogle Scholar
  12. Hiatt, F. Official seeks like minds in 'Star Wars'. Washington Post. May 13, 1986; https://www.washingtonpost.com/archive/politics/1986/05/13/official-seeks-like-minds-in-star-wars/28ddbdc0-d55f-4cac-a742-b17176e6adcf/Google ScholarGoogle Scholar
  13. Dave, P. and Dastin, J. Google told its scientists to 'strike a positive tone' in AI research -- documents. Reuters. Dec. 23, 2020; https://www.reuters.com/article/us-alphabet-google-research-focus/google-told-its-scientists-to-strike-a-positive-tone-in-ai-research-documents-idUSKBN28X1CBGoogle ScholarGoogle Scholar
  14. Satariano, A., and Stevis-Gridneff, M. Big tech turns its lobbyists loose on Europe, alarming regulators. New York Times. Dec. 14, 2020; https://www.nytimes.com/2020/12/14/technology/big-tech-lobbying-europe.htmlGoogle ScholarGoogle Scholar
  15. Vanian, J. Why Microsoft and Twitter are turning to bug bounties to fix their A.I. Fortune. Aug. 10, 2021; https://fortune.com/2021/08/10/why-microsoft-and-twitter-are-turning-to-bug-bounties-to-fix-their-a-i/Google ScholarGoogle Scholar
  16. I want to thank particularly Lilly Irani and Nandina Vgontzas for their care and intellectual generosity, which helped me map out this set of points.Google ScholarGoogle Scholar

Index Terms

  1. The steep cost of capture

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Interactions
          Interactions  Volume 28, Issue 6
          November - December 2021
          70 pages
          ISSN:1072-5520
          EISSN:1558-3449
          DOI:10.1145/3498853
          • Editors:
          • Mikael Wiberg,
          • Alex Taylor,
          • Daniela Rosner
          Issue’s Table of Contents

          Copyright © 2021 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 10 November 2021

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Popular
          • Pre-selected

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format