Technology

Placeholder Content Image

Why do I get so much spam and unwanted email in my inbox? And how can I get rid of it?

<p><em><a href="https://theconversation.com/profiles/kayleen-manwaring-8735">Kayleen Manwaring</a>, <a href="https://theconversation.com/institutions/unsw-sydney-1414">UNSW Sydney</a></em></p> <p>Spam might not have brought an end to the internet or email, as some dire predictions <a href="https://www.zdnet.com/article/why-spam-could-destroy-the-internet/">in the early 2000s</a> claimed it could – but it’s still a massive pain.</p> <p>Despite all the spam being removed by spam-filtering technologies, most people still receive spam every day. How do these messages end up flooding our inboxes? And are there any legal consequences for the senders?</p> <h2>What is spam?</h2> <p>The Organisation for Economic Co-operation and Development (OECD) noted in 2004 “there does not appear to be a widely agreed and workable definition for spam” across jurisdictions – and this remains true today.</p> <p>That said, “spam” generally <a href="https://www.oecd-ilibrary.org/docserver/232784860063.pdf?expires=1693541947&amp;id=id&amp;accname=ocid177499&amp;checksum=D0C5BDAC49951DF353618B8E38483253">refers to</a> unsolicited electronic messages. These are often sent in bulk and frequently advertise goods or services. It also includes scamming and phishing messages, according to the OECD.</p> <p>Most people think of spam in the form of emails or SMS messages. However, what we now call spam actually predates the internet. In 1854, a spam telegram was sent to British politicians advertising the opening hours of dentists who <a href="https://www.theguardian.com/technology/2013/aug/09/why-spammers-are-winning-junk-mail">sold tooth-whitening powder</a>.</p> <p>The first spam email came more than 100 years later. It was reportedly sent to 600 people on May 3 1978 <a href="https://web.archive.org/web/20080628205216/http://www.latimes.com/technology/la-fi-spam11may11001420,1,5168218,full.story">through ARPAnet</a> – a precursor to the modern internet.</p> <p>As for how much spam is out there, the figures vary, possibly due to the various <a href="https://www.spamhaus.org/consumer/definition/">definitions of “spam”</a>. One source reports the average number of spam emails sent daily in 2022 was about <a href="https://dataprot.net/statistics/spam-statistics/">122.33 billion</a> (which would mean more than half of all emails were spam). As for text messages, another source reports a daily average of 1.6 billion <a href="https://thesmallbusinessblog.net/spam-text-statistics/">spam texts</a>.</p> <h2>Where do spammers get my details?</h2> <p>Each time you enter your email address or phone number into an e-commerce website, you may be handing it to spammers.</p> <p>But sometimes you may even receive spam from entities you don’t recognise. That’s because businesses will often transfer customers’ contact information to related companies, or sell their data to third parties such as data brokers.</p> <p>Australia’s Privacy Act 1988 somewhat limits the transfer of personal information to third parties. However, these laws <a href="https://theconversation.com/accc-says-consumers-need-more-choices-about-what-online-marketplaces-are-doing-with-their-data-182134">are weak</a> – and <a href="http://handle.unsw.edu.au/1959.4/unsworks_75600">weakly enforced</a>.</p> <p>Some entities also use “address-harvesting” software to search the internet for electronic addresses that are captured in a database. The collector then uses these addresses directly, or sells them to others looking to send spam.</p> <p>Many jurisdictions (including <a href="http://www8.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/s19.html">Australia</a>) prohibit these harvesting activities, but they are still <a href="https://www.projecthoneypot.org/statistics.php">common</a>.</p> <h2>Is spamming against the law?</h2> <p>Australia has had legislation regulating spam messaging since 2003. But the <a href="https://www.legislation.gov.au/Details/C2016C00614">Spam Act</a> surprisingly does not define the word “spam”. It tackles spam by prohibiting the sending of <a href="http://www8.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/s15.html">unsolicited commercial electronic messages</a> containing offers, ads or other promotions of goods, services or land.</p> <p>However, if the receiver <a href="http://www8.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/sch2.html">consented</a> to these types of messages, the prohibition does not apply. When you buy goods or services from a company, you will often see a request to click on a “yes” button to receive marketing promotions. Doing so means you have consented.</p> <p>On the other hand, if your phone or inbox are hit by commercial messages you haven’t agreed to receive, that is a breach of the <a href="https://austlii.edu.au/cgi-bin/viewdb/au/legis/cth/consol_act/sa200366/">Spam Act</a> by the sender. If you originally signed up to receive the messages, but then unsubscribed and the messages kept coming after <a href="https://austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/sch2.html">five business days</a>, that is also illegal. Senders must also include a <a href="https://austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/s18.html">functioning unsubscribe facility</a> in every commercial message they send.</p> <p>Spammers can be penalised for breaches of the Spam Act. In the past few months alone, <a href="https://www.acma.gov.au/articles/2023-06/commonwealth-bank-penalised-355-million-spam-breaches">Commonwealth Bank</a>, <a href="https://www.acma.gov.au/articles/2023-08/doordash-penalised-2-million-spam-breaches">DoorDash</a> and <a href="https://www.acma.gov.au/articles/2023-06/mycar-tyre-auto-penalised-1m-spam-breaches">mycar Tyre &amp; Auto</a> were fined more than A$6 million in total for breaches.</p> <p>However, most spam comes from outside Australia where the laws aren’t the same. In the United States spam is legal under the <a href="https://www.ftc.gov/business-guidance/resources/can-spam-act-compliance-guide-business">CAN-SPAM Act</a> until you opt out. Unsurprisingly, the US <a href="https://talosintelligence.com/reputation_center/email_rep#spam-country-senders">tops the list</a> of countries where the most spam originates.</p> <p>Although spam sent to Australia from overseas <a href="https://austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/s16.html">can still breach</a> the Spam Act – and the Australian Communications and Media Authority (ACMA) co-operates with overseas regulators – overseas enforcement actions are difficult and expensive, especially if the spammer has disguised their true identity and location.</p> <p>It’s worth noting that messages from political parties, registered charities and government bodies aren’t prohibited – nor are messages from educational institutions to students and former students. So while you might consider these messages as “spam”, they can legally be <a href="http://www8.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/sch1.html">sent freely without consent</a>. Factual messages (without marketing content) from businesses are also legal as long as they include accurate sender details and contact information.</p> <p>Moreover, the Spam Act generally only covers spam sent via email, SMS/MMS or instant messaging services, such as WhatsApp. Voice calls and faxes aren’t covered (although you can use the <a href="https://www.donotcall.gov.au/">Do Not Call Register</a> to block some commercial calls).</p> <h2>Staying safe from spam (and cyberattacks)</h2> <p>Spam isn’t only annoying, it can also be dangerous. Spam messages can contain indecent images, scams and <a href="https://www.cyber.gov.au/learn-basics/explore-basics/watch-out-threats/phishing-emails-and-texts">phishing attempts</a>. Some have <a href="https://www.cyber.gov.au/threats/types-threats/malware">malware</a> (malicious software) designed to break into computer networks and cause harm, such as by stealing data or money, or shutting down systems.</p> <p>The <a href="https://www.cyber.gov.au/protect-yourself/securing-your-email/email-security/protect-yourself-malicious-email">Australian Cyber Security Centre</a> and <a href="https://www.acma.gov.au/dealing-with-spam">ACMA</a> provide useful tips for reducing the spam you get and your risk of being hit by cyberattacks. They suggest to:</p> <ol> <li> <p>use a spam filter and block spammers – email and telecommunications providers often supply useful tools as part of their services</p> </li> <li> <p>unsubscribe from any emails you no longer want to receive – even if you originally agreed to receive them</p> </li> <li> <p>remove as much of your contact details from websites as you can and always restrict the sharing of your personal information (such as name, birth date, email address and mobile number) when you can – beware of pre-ticked boxes asking for your consent to receive marketing emails</p> </li> <li> <p>install cybersecurity updates for your devices and software as you get them</p> </li> <li> <p>always think twice about opening emails or clicking on links, especially for messages promising rewards or asking for personal information – if it looks too good to be true, it probably is</p> </li> <li> <p>use <a href="https://theconversation.com/what-is-multi-factor-authentication-and-how-should-i-be-using-it-191591">multi-factor authentication</a> to access online services so even if a scam compromises your login details, it will still be difficult for hackers to break into your accounts</p> </li> <li> <p>report spam to your email and telecommunications providers, and to <a href="https://www.acma.gov.au/dealing-with-spam#complain-or-forward-spam-to-the-acma">ACMA</a>. <img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/208665/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> </li> </ol> <p><a href="https://theconversation.com/profiles/kayleen-manwaring-8735"><em>Kayleen Manwaring</em></a><em>, Senior Research Fellow, UNSW Allens Hub for Technology, Law &amp; Innovation and Senior Lecturer, School of Private &amp; Commercial Law, UNSW Law &amp; Justice, <a href="https://theconversation.com/institutions/unsw-sydney-1414">UNSW Sydney</a></em></p> <p><em>Image credits: Getty Images</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/why-do-i-get-so-much-spam-and-unwanted-email-in-my-inbox-and-how-can-i-get-rid-of-it-208665">original article</a>.</em></p>

Technology

Placeholder Content Image

Why you need to stop charging your phone overnight

<p><strong>You charge your phone all night </strong></p> <p>Waking up to a fully charged phone may seem like a great way to start the day, but leaving your device plugged in overnight is a bad idea. When a phone has reached 100 per cent charge, it will continue to get trickle charges to keep it topped up at 100 percent. </p> <p>These extra charges keep the battery working non-stop. In fact, it’s better not to fully charge lithium-ion batteries because high voltage stresses the battery and wears it out over time, according to technology company Cadex.</p> <p><strong>You use vibrations for notifications</strong></p> <p>Your phone, like any other tool or device, ages and loses effectiveness the more you use it, says David Steele, the Director of Business Development for EverydayPhone. So little extras, like vibrating notifications, are habits that make your phone’s job harder. </p> <p>“The issue with these habits essentially boils down to having your phone constantly running at full capacity when it’s unnecessary,” Steele says. “Just like us, a phone needs a break to avoid burning out.”</p> <p><strong>You keep apps open that you're not using</strong></p> <p>Unused apps can eat up the battery life of smartphones, according to Andrew Moore-Crispin, the Director of Content at Ting Mobile. “If you open an app once and never use it again, the app might still run in the background,” he says.</p> <p>Swiping out of apps you aren’t using or no longer need is an easy solution. Moore-Crispin says doing so extends the battery life of your phone while also freeing up valuable storage space, too.</p> <p><strong>You allow unnecessary permissions</strong></p> <p>Ride-sharing apps need your location to pick you up, but other apps might not need this permission. Moore-Crispin suggests you be picky about which apps you grant such permissions to and take away permissions you deem unnecessary.</p> <p><strong>You have one of these apps</strong></p> <p>The apps that drain your battery the most are Snapchat, Google Maps, Netflix, Amazon, and Facebook, according to AdWeek. The Guardian found that uninstalling the Facebook mobile app from Android phones saves people up to 20 percent of their battery life. </p> <p>If you also get rid of the FB Messenger app, other app load times could speed up by 15 per cent, per the Guardian. The reason Facebook particularly kills battery life is because it keeps running in the background – even when you’re not using it, Business Insider reports.</p> <p><strong>Your screen is always extremely bright </strong></p> <p>Gone are the days of tiny phone screens, but before you give the thumbs up emoji, understand how the bigger screens of today can be a phone battery’s worst enemy, according to Moore-Crispin. Make sure you turn on adaptive brightness in the display menu. </p> <p>This change means your phone will automatically adjust the screen brightness to match your environment. As a bonus, set the brightness level to the lowest possible and lower your screen’s timeout, which is what determines how long it stays lit before fading when it goes idle.</p> <p><strong>You keep your phone out at the beach</strong></p> <p>Extreme heat or extreme cold temperatures and other weather conditions can shorten the life of your phone. According to Time, excess heat can cause everything from data loss or corruption to battery leakage. Cold weather presents just as many issues. In cold temperatures, some smartphones shut off, have display problems, or run out of battery; in rare cases screens may shatter.</p> <p><strong>You keep your phone in your bed or under your pillow </strong></p> <p>Tucking your phone under your pillow when you sleep is another way to shorten its life, thanks to heat build-up.</p> <p><strong>You don't keep your software up to date</strong></p> <p>utting off device updates does more harm than good for your phone. iPhone and Android makers push updates to make your user experience better and so that your phone functions properly. These updates come with extra benefits, too. In fact, if your device has a weak battery or other issues, these software updates could remedy them, Popular Science reports. Make sure to keep up with app-specific updates as well.</p> <p><em>Image credits: Getty Images</em></p> <p><em>This article originally appeared on <a href="https://www.readersdigest.co.nz/home-tipsscience-technology/why-you-need-to-stop-charging-your-phone-overnight" target="_blank" rel="noopener">Reader's Digest</a>. </em></p>

Technology

Placeholder Content Image

Why am I online? Research shows it’s often about managing emotions

<p><em><a href="https://theconversation.com/profiles/wally-smith-1450210">Wally Smith</a>, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a> and <a href="https://theconversation.com/profiles/greg-wadley-203663">Greg Wadley</a>, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a></em></p> <p>Most of us <a href="https://wearesocial.com/au/blog/2022/02/digital-2022-australia-online-like-never-before/">go online</a> multiple times a day. About half of 18–29 year olds surveyed in a 2021 <a href="https://www.pewresearch.org/short-reads/2021/03/26/about-three-in-ten-u-s-adults-say-they-are-almost-constantly-online/">Pew Research Study</a> said they are “almost constantly” connected.</p> <p>How are we to make sense of this significant digital dimension of modern life?</p> <p>Many questions have rightly been asked about its broader consequences for society and the economy. But there remains a simpler question about what motivates people across a range of ages, occupations and cultures to be so absorbed in digital connection.</p> <p>And we can turn this question on ourselves: <em>why am I online?</em></p> <h2>What are we doing when we go online?</h2> <p>As the American sociologist Erving Goffman <a href="https://www.nytimes.com/1975/02/16/archives/frame-analysis.html">pointed out</a>, asking “What is it that’s going on here?” about human behaviour can yield answers framed at different levels. These range from our superficial motives to a deeper understanding of what we are “really” doing.</p> <p>Sometimes we might be content to explain our online behaviour in purely practical terms, like checking traffic routes or paying a bill. Other times we might struggle to articulate our reasons for going or remaining online.</p> <p>Why are we continually looking at our phones or computers, when we could be getting on with physical tasks, or exercising, or meditating, or engaging more fully with the people who are physically around us?</p> <h2>The ever-present need to manage our emotions</h2> <p>As researchers of human-computer interaction, we are exploring answers in terms of the ever-present need to manage our emotions. Psychologists refer to this activity as <a href="https://www.guilford.com/books/Handbook-of-Emotion-Regulation/James-Gross/9781462520732">emotion regulation</a>.</p> <p>Theories of the nature and function of emotions are complex and contested. However, it is safe to say they are expressions of felt needs and motivations that arise in us through some fusion of physiology and culture.</p> <p>During a typical day, we often feel a need to <a href="https://journals.sagepub.com/doi/abs/10.1037/1089-2680.2.3.271">alter our emotional state</a>. We may wish to feel more serious about a competitive task or more sad at a funeral. Perhaps we would like to be less sad about events of the past, less angry when meeting an errant family member, or more angry about something we know in our heart is wrong.</p> <figure><iframe src="https://www.youtube.com/embed/PQkNb4CLjJ8?wmode=transparent&amp;start=0" width="440" height="260" frameborder="0" allowfullscreen="allowfullscreen"></iframe><figcaption><span class="caption">Digital emotion regulation is becoming increasingly common in our everyday lives.</span></figcaption></figure> <p>One way to understand our frequent immersions into online experience is to see them as acts within a broader scheme of managing such daily emotional demands. Indeed, in <a href="https://www.sciencedirect.com/science/article/abs/pii/S1071581922001732">earlier research</a> we found up to half of all smartphone use may be for the purpose of emotional regulation.</p> <h2>Digital technologies are becoming key tools of emotion regulation</h2> <p>Over the pandemic lockdowns of 2020–21 in Melbourne, Australia, we investigated how digital technologies are becoming <a href="https://dl.acm.org/doi/10.1145/3491102.3517573">key tools of emotion regulation</a>. We were surprised to find that people readily talked of their technology use in these emotion-managing terms.</p> <p>Occasionally, this involved specially designed apps, for mindfulness and so on. But more often people relied on mundane tools, such as using social media alongside Zoom to combat feelings of boredom or isolation, browsing for “retail therapy”, playing phone games to de-stress, and searching online to alleviate anxiety about world events.</p> <p>To some extent, these uses of digital technology can be seen as re-packaging <a href="https://www.tandfonline.com/doi/abs/10.1080/026999399379285">traditional methods</a> of emotion management, such as listening to music, strengthening social connections, or enjoying the company of adorable animals. Indeed, people in our study used digital technologies to enact familiar strategies, such as immersion in selected situations, seeking distractions, and reappraising what a situation means.</p> <p>However, we also found indications that digital tools are changing the intensity and nature of how we regulate emotions. They provide emotional resources that are <a href="https://en.wikipedia.org/wiki/Ubiquitous_computing">nearly always available</a>, and virtual situations can be accessed, juxtaposed and navigated more deftly than their physical counterparts.</p> <p>Some participants in our study described how they built what we called “emotional toolkits”. These are collections of digital resources ready to be deployed when needed, each for a particular emotional effect.</p> <h2>A new kind of digital emotional intelligence</h2> <p>None of this is to say emotion regulation is automatically and always a good thing. It can be a means of avoiding important and meaningful endeavours and it can itself become dysfunctional.</p> <p>In our study of a small sample of Melburnians, we found that although digital applications appeared to be generally effective in this role, they are volatile and can lead to <a href="https://www.theguardian.com/commentisfree/2020/sep/27/social-dilemma-media-facebook-twitter-society">unpredictable emotional outcomes</a>. A search for energising music or reassuring social contact, for example, can produce random or unwanted results.</p> <p>A new kind of <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10187756/">digital emotional intelligence</a> might be needed to effectively navigate digital emotional landscapes.</p> <h2>An historic shift in everyday life</h2> <p>Returning to the question: <em>what am I doing online?</em> Emotion regulation may well be the part of the answer.</p> <p>You may be online for valid instrumental reasons. But equally, you are likely to be enacting your own strategies of <a href="https://cis.unimelb.edu.au/hci/projects/digitalemotionregulation">emotion regulation through digital means</a>.</p> <p>It is part of an historic shift playing out in how people negotiate the demands of everyday life. <img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/208483/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/wally-smith-1450210">Wally Smith</a>, Professor, School of Computing and Information Systems, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a> and <a href="https://theconversation.com/profiles/greg-wadley-203663">Greg Wadley</a>, Senior Lecturer, Computing and Information Systems, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a></em></p> <p><em>Image credits: Getty Images</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/why-am-i-online-research-shows-its-often-about-managing-emotions-208483">original article</a>.</em></p>

Technology

Placeholder Content Image

Facebook Messenger scams are on the rise – here’s how to protect yourself

<p><strong>Facebook Messenger scams prey on our vulnerabilities</strong></p> <p>Scams through Facebook’s Messenger platform are being reported at higher rates than ever before, according to AARP, citing its own data as well as that of the government. Since Facebook’s early days, cybercriminals have been mining Facebook’s direct-messaging capabilities to scam unsuspecting victims out of money. One of the earliest Facebook Messenger scams involved a message, purportedly from a friend, claiming they were stuck in a foreign country and in desperate need of immediate financial assistance to get out. It wasn’t really the friend, however, but rather a scammer who had hacked into the friend’s account. </p> <p>Imposter scams such as “the friend in a foreign country” have evolved and proliferated over the years. The common thread is the scammer either creates an account impersonating an actual Facebook account or hacks into an existing Facebook account. In either case, the scammer then uses the fake/hacked account to send private messages to the account holder’s friends that elicit either money or personal information. The messages vary, but all are designed to prey on our human vulnerabilities, including:</p> <ul> <li>the desire to be a “hero”</li> <li>the desire to appear “generous”</li> <li>the desire to win “free money”</li> <li>the desire to be loved and admired</li> <li>the desire to avoid shame or punishment</li> </ul> <p>If a scammer tries to message you, report them, Facebook advises, but that begs the larger question of how does one recognise a Facebook Messenger scam?</p> <p><strong>Current Messenger Facebook scams</strong></p> <p>According to Facebook and our cybersecurity experts, here are the most common Facebook Messenger scams today:</p> <p><span style="text-decoration: underline;"><em>Romance scams</em></span>. Preying on our desire to be loved and admired, romance scammers appear as attractive strangers with sad stories and a desire to love and be loved. The most effective romance scammers will friend a number of mutual friends before reaching out to any of them, in an attempt to make themselves seem less like strangers and more like people in the same social network. Many use photos they’ve stolen off the Internet and many pose as members of the military or as doctors, in an attempt to inspire trust, admiration, and even authority. What they all have in common is they can’t meet you just yet because they’re somewhere far away, and although it may take a bit of time, even as much as several weeks, they will eventually ask you to send money so that they can come to see you.</p> <p><span style="text-decoration: underline;"><em>Lottery scams</em></span>. Preying on our desire for “free money,” lottery scammers appear as friends or organisations who are thrilled to tell you you’ve won money in some lottery or contest. The common thread? It’s a contest you have no recollection of having entered and to get the prize, you’ll have to either pay a fee or “refundable” advance or provide personal information.</p> <p><span style="text-decoration: underline;"><em>Inheritance scams</em></span>. Also preying on our desire for free money, inheritance scammers claim to be lawyers or others who represent someone who has died and supposedly left you their estate or some portion of it – but first, you’ll have to fork over some money or personal information.</p> <p><span style="text-decoration: underline;"><em>Loan scams</em></span>. Another variation on the “free money” theme is the loan scam, whereby the scammer promises low-interest loans with no money down – except for a “refundable” application fee. Facebook points out that loan scammers may send messages via Messenger and also leave posts and comments on Pages and in Groups to legitimise themselves. However, legitimate lenders wouldn’t offer loans via Facebook Messenger, nor would they ask you for money to proceed with a loan application.</p> <p><span style="text-decoration: underline;"><em>Donation scams</em></span>. Facebook specifically warns users to watch out for “famous people” or people claiming to represent a charity hitting them up for a donation. Donation scams, which are easy money for a scammer because they are a direct request for payment, prey on our desire to be perceived, or to perceive ourselves, as generous.</p> <p><span style="text-decoration: underline;"><em>“Hey, is this you?” scams</em></span>. Consumer Affairs warns of this “phishing scam” that uses the threat of shame to goad you into giving up personal information. The scammer hacks into one of your Facebook friend’s Messenger accounts and sends you a video, asking if it’s really you in the video, and implying there’s something in the video that could embarrass you. If you ever get a message like this, Consumer Affairs urges you to ignore and delete it to avoid giving away personal information or introducing a virus onto your computer.</p> <p><strong>Red flags to watch out for</strong></p> <p>Unfortunately, Facebook Messenger scams evolve rapidly (as soon as we suss them out, there are several more to replace them). So, it’s a good idea to be aware of these warning signs that we culled from our experts:</p> <p><span style="text-decoration: underline;"><em>Someone is asking you for money</em></span>. While Facebook warns specifically against strangers asking for money, Rachel Wilson, investigative coordinator for The Smith Investigation Agency, points out to Reader’s Digest that any time anyone asks you for money over Messenger, it’s immediately suspect. “If friends or family ask you to help them in an emergency, always call to speak with them personally to confirm that the message originated with them.”</p> <p><span style="text-decoration: underline;"><em>Someone is getting a little too personal</em></span>. When someone sends you a message requesting personal information, especially financial information, it should be considered suspicious, advises Sean Messier, credit industry analyst for Credit Card Insider. Messier suggests not revealing any such information until you’re certain the message-sender is who they claim to be, but it’s probably also a good idea to never reveal any such information over Messenger at all.</p> <p><span style="text-decoration: underline;"><em>Someone is offering something for free</em></span>. You know how they say there’s no such thing as a free lunch? Well, there’s no such thing as free money on Facebook, points out Robert Siciliano, security expert. This is true for any kind of “free money” Messenger message, including those involving lotteries, loans, contest winnings, inheritances, lost bank accounts, and reimbursements of money owed.</p> <p><span style="text-decoration: underline;"><em>Someone who wants to take the conversation off Facebook (to text or email, etc)</em></span>. Facebook warns against taking conversations off Facebook unless you’re absolutely certain, beyond a shadow of a doubt, the message sender is who they say they are.</p> <p><span style="text-decoration: underline;"><em>Messages that seem out of character for the sender</em></span>. If a message seems “out of the norm” for the sender, trust your instincts and ignore it. This is doubly true if the message includes an attachment. Be very wary of opening attachments in general, and particularly if something seems “off” about the message or the sender.</p> <p><span style="text-decoration: underline;"><em>Messages rife with spelling and grammatical errors</em></span>. Facebook points out that when a message is filled with typos and grammatical errors, you should have your guard up. A single typo is one thing, but things like the misspelling of names and places are a big red flag.</p> <p><span style="text-decoration: underline;"><em>Messages from new accounts with few friends</em></span>. Roger Thompson, CEO of Thompson Cybersecurity Labs, points out that new accounts with few friends should always be considered suspicious until confirmed otherwise. Friend requests from such accounts and from duplicate friend accounts should be considered suspect as well.</p> <p>To avoid getting hacked (and used by a cybercriminal in an imposter scam), Wilson recommends updating your social media passwords regularly and always use two-factor authentication. She also notes that with Facebook use increasing among seniors, it would be a good deed to speak to older family members about Messenger scams and how to avoid them.</p> <p><em>Image credits: Getty Images </em></p> <p><em>This article originally appeared on <a href="https://www.readersdigest.co.nz/true-stories-lifestyle/science-technology/facebook-messenger-scams-are-on-the-rise-heres-how-to-protect-yourself" target="_blank" rel="noopener">Reader's Digest</a>.</em></p>

Technology

Placeholder Content Image

How scammers use psychology to create some of the most convincing internet cons – and what to watch out for

<p><a href="https://theconversation.com/profiles/stacey-wood-473147"><em>Stacey Wood</em></a><em>, <a href="https://theconversation.com/institutions/scripps-college-2153">Scripps College</a> and <a href="https://theconversation.com/profiles/yaniv-hanoch-1341108">Yaniv Hanoch</a>, <a href="https://theconversation.com/institutions/university-of-southampton-1093">University of Southampton</a></em></p> <p><a href="https://www.experian.co.uk/blogs/latest-thinking/fraud-prevention/cybercrime-fraud-most-common-crime-uk/">Online fraud is today’s most common crime</a>. Victims are often told they are foolish for falling for it, but fraudsters use psychological mechanisms to infiltrate the defences of their targets, regardless of how intelligent they are.</p> <p>So it’s important to keep up with the latest scams and understand how they work.</p> <p>Recently, consumer protection magazine Which? <a href="https://www.which.co.uk/news/article/the-4-most-convincing-scams-weve-seen-in-2023-so-far-a7bRP9s0KJvG">identified some of the most convincing scams of 2023</a>. These scams all have one thing in common – they insidiously take advantage of people’s cognitive biases and psychological blind spots.</p> <p>They included “pig butchering” a way of fattening up victims with affection, the missing person scam which involves posting fake content on social media pages, the traditional PayPal scam, and a new scam called the “fake app alert” in which malware is hidden on apps that look legitimate.</p> <h2>Pig butchering</h2> <p>In our work as fraud psychology researchers we have noticed a trend towards hybrid scams, which combine different types of fraud. Hybrid scams often involve crypto investments and <a href="https://www.psychologytoday.com/us/blog/the-fraud-crisis/202210/new-scams-committed-forced-trafficked-labor">sometimes use trafficked labour</a> In the US alone, <a href="https://www.fbi.gov/contact-us/field-offices/springfield/news/internet-crime-complaint-center-releases-2022-statistics">the FBI recently reported</a> that people lost US $3.3 billion (£2.6 billion) in 2023 to investment fraud.</p> <p>Pig butchering is a long-term deception. <a href="https://www.cnbc.com/2023/05/02/pig-butchering-scammers-make-billions-convincing-victims-of-love.html">This type of scam</a> combines elements of <a href="https://www.actionfraud.police.uk/a-z-of-fraud/romance-scams">romance scams</a> with an investment con. The name comes from the strategy of <a href="https://www.theguardian.com/money/2023/may/22/dating-cons-and-dodgy-apps-among-most-common-scams-says-uk-watchdog">“fattening up” a victim with affection before slaughter</a>.</p> <p>It will usually begin with <a href="https://www.which.co.uk/policy-and-insight/article/pig-butchering-among-most-convincing-scams-of-2023-so-far-which-warns-aDRtr4I1UT1R">standard scam approach like a text</a>, social media message, or an introduction at a job board site.</p> <p>Victims may have their guard up at first. However, these scams can unfold over months, with the scammer slowly gaining the victims’ trust and initiating a romantic relationship all the while learning about their vulnerabilities.</p> <p>For example, details of their financial situation, job stresses, and dreams about the life they want. Romance scammers often saturate their targets with affection and almost constant contact. Pig butchering sometimes involves several trafficked people working as a team to create a single persona.</p> <p>Once the victim depends on the scammer for their emotional connection, the scammer introduces the idea of making an investment and uses fake crypto platforms to demonstrate returns. The scammers may use legitimate sounding cryptocoins and platforms. Victims can invest and “see” strong returns online. In reality, their money is going directly to the scammer.</p> <p>Once a victim transfers a substantial amount of money to the con artist, they are less likely to pull out. This phenomenon is known as the <a href="https://www.sciencedirect.com/science/article/abs/pii/0749597885900494">“sunk cost fallacy”</a>. Research has shown people are likely to carry on investing money, time and effort in activities they have already invested in and ignore signs the endeavour isn’t in their best interests.</p> <p>When the victim runs out of money or tries to withdraw funds, they are blocked.</p> <p>The victim is left with not only financial devastation, but also the loss of what they may imagine to be their most intimate partnership. They are often <a href="https://cloud-platform-e218f50a4812967ba1215eaecede923f.s3.amazonaws.com/uploads/sites/6/2021/12/VC-Who-Suffers-Fraud-Report-1.pdf">too embarrassed to discuss the experience</a> with friends and family or to report to the police.</p> <h2>PayPal scams</h2> <p>Fake payment requests are a common attack that works by volume rather than playing the long game. Payment requests appear to come from a genuine PayPal address. Fraudulent messages typically begin with a generic greeting, an urgent request and a fake link.</p> <p>For example, Dear User: You’ve received a payment, or you have paid too much. Please click link below for details. Users are directed to a spoofed website with a legitimate sounding name such as www.paypal.com/SpecialOffers and asked to enter their account information and password.</p> <p>Both of us have received these scam requests – and even we found them difficult to discern from legitimate PayPal request emails. These scams work through mimicry and play on the human tendency to trust authority. Legitimate PayPal correspondence is usually automatic bot language, so it is not difficult to imitate.</p> <p>But remember, genuine messages from PayPal <a href="https://www.paypal.com/ca/for-you/account/security/fraud-dangers#:%7E:text=Any%20email%20from%20PayPal%20will,bank%20account%2C%20or%20credit%20card.">will use your first and last name</a>.</p> <h2>The missing person scam</h2> <p>This seems to be a new scam that exploits a person’s kindness. In the past, charity scams involved posing as charitable organisation responding to a <a href="https://www.aarp.org/money/scams-fraud/info-2019/charity.html">recent, real calamity</a>.</p> <p>The new missing person scam is more sophisticated. The initial plea is a <a href="https://www.thesun.co.uk/tech/20875699/facebook-fake-missing-child-scam-warning/">fake missing person post</a> that generates likes and shares, increasing its credibility and exposure. Then the fraudster edits the content to create an investment scheme which now has the veneer of legitimacy.</p> <p>This scam may work because the initial consumers are unaware that the content is fraudulent, and there is no obvious request. In psychology, this type of persuasion is known as “<a href="https://thedecisionlab.com/reference-guide/psychology/social-proof">social proof</a>” – the tendency of individuals to follow and copy behaviour of others.</p> <h2>Fake app alerts</h2> <p>People post mobile apps, designed to steal users’ personal information, on the Google Play or Apple app store.</p> <p>The app often has a <a href="https://www.edinburghnews.scotsman.com/news/crime/another-person-comes-forward-after-banking-app-scam-3584340">legitimate function</a>, which gives it a cover. Consumers unknowingly jeopardise their private information by downloading these apps which use malware to access additional information.</p> <p>Although there has been <a href="https://tech.co/news/fake-android-apps-delete">media coverage of Android security issues</a>, many users assume malware <a href="https://www.ben-evans.com/benedictevans/2020/8/18/app-stores">cannot bypass app store screening</a>. Again, this scam plays on people’s <a href="https://psycnet.apa.org/doiLanding?doi=10.1037%2F0021-9010.92.3.639">trust in authority figures</a> to keep tjem safe.</p> <p>Discuss any investment opportunities with friends, family members or professionals. It’s much easier said than done, but exercising caution one of the best strategies to reduce the chance of becoming a fraud victim.</p> <p>Scammers count on people paying little to no attention to their emails or messages before clicking on them or providing valuable information. When it comes to scams, the devil is in the missing details.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/207759/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/stacey-wood-473147">Stacey Wood</a>, Professor of Psychology, <a href="https://theconversation.com/institutions/scripps-college-2153">Scripps College</a> and <a href="https://theconversation.com/profiles/yaniv-hanoch-1341108">Yaniv Hanoch</a>, Professor in Decision Science, <a href="https://theconversation.com/institutions/university-of-southampton-1093">University of Southampton</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/how-scammers-use-psychology-to-create-some-of-the-most-convincing-internet-cons-and-what-to-watch-out-for-207759">original article</a>.</em></p>

Technology

Placeholder Content Image

Missing Titanic sub: what are submersibles, how do they communicate, and what may have gone wrong?

<p><a href="https://theconversation.com/profiles/stefan-b-williams-1448728">Stefan B. Williams</a>, <em><a href="https://theconversation.com/institutions/university-of-sydney-841">University of Sydney</a></em></p> <p>An extensive <a href="https://www.bbc.com/news/world-us-canada-65953872">search and rescue operation</a> is underway to locate a commercial submersible that went missing during a dive to the Titanic shipwreck.</p> <p>According to the US Coast Guard, contact with the submersible was lost about one hour and 45 minutes into the dive, with five people onboard. The vessel was <a href="https://www.9news.com.au/world/titanic-submersible-search-oceangate-expeditions-vessel-missing-as-us-coast-guard-launches-search/9d7352d8-6a6d-4dc1-afac-ce07dc63cea3">reported overdue</a> at 9.13pm local time on Sunday (12.13pm AEST, Monday).</p> <p>The expedition was being run by US company OceanGate as part of an eight-day trip with guests paying US$250,000 per head to visit the wreck site. As of <a href="https://edition.cnn.com/americas/live-news/titanic-submersible-missing-search-06-19-23/h_c2b5400daf8538d8717f50c619d762ac">Monday afternoon</a> (Tuesday morning in Australia), US Coast Guard Rear Admiral John Mauger said the watercraft likely had somewhere between 70 and the full 96 hours of oxygen available to the passengers.</p> <p>The Titanic’s wreck sits some 3,800 metres deep in the Atlantic, about 700km south of St John’s, Newfoundland. Finding an underwater vehicle the size of a small bus in this vast and remote expanse of ocean will be no small feat. Here’s what the search and rescue teams are up against.</p> <h2>OceanGate’s Titan submersible goes missing</h2> <p>Submersibles are manned watercraft that move in a similar fashion to submarines, but within a much more limited range. They’re often used for research and exploration purposes, including to search for shipwrecks and to document underwater environments. Unlike submarines, they usually have a viewport to allow passengers look outside, and outside cameras that provide a broader view around the submersible.</p> <p>The missing submersible in question is an OceanGate <a href="https://oceangate.com/our-subs/titan-submersible.html">Titan</a> watercraft, which can take five people to depths of up to 4,000m. The Titan is about 22 feet (6.7m) in length, with speeds of about 3 knots (or 5.5km per hour). Although submersibles are often connected to a surface vessel by a tether, video and photos suggest the Titan was likely operating independently of the surface ship.</p> <p>According to OceanGate’s website, the Titan is used “for site survey and inspection, research and data collection, film and media production, and deep-sea testing of hardware and software”.</p> <p>It also has a “real-time hull health monitoring (RTM) system”. This would likely include strain gauges to monitor the health of the Titan’s carbon fibre hull. A strain gauge is a kind of sensor that can measure applied force and small deformations in material resulting from changes in pressure, tension and weight.</p> <p>The Titan’s carbon fibre hull connects two domes made of composite titanium – a material that can withstand deep-sea pressures. At 3,800m below sea level (the depth of the Titanic) you can expect pressures about 380 times greater than the atmospheric pressure we’re used to on the surface of the earth.</p> <figure class="align-center zoomable"><a href="https://images.theconversation.com/files/532840/original/file-20230620-23-c6k9lo.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/532840/original/file-20230620-23-c6k9lo.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/532840/original/file-20230620-23-c6k9lo.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=413&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/532840/original/file-20230620-23-c6k9lo.jpeg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=413&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/532840/original/file-20230620-23-c6k9lo.jpeg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=413&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/532840/original/file-20230620-23-c6k9lo.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=518&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/532840/original/file-20230620-23-c6k9lo.jpeg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=518&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/532840/original/file-20230620-23-c6k9lo.jpeg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=518&amp;fit=crop&amp;dpr=3 2262w" alt="Several tube like shapes on a rectangular concrete platform underwater" /></a><figcaption><span class="caption">Titan on the launch platform underwater, awaiting a signal to commence the dive.</span> <span class="attribution"><a class="source" href="https://oceangate.com/gallery/gallery-titan.html#nanogallery/titangallery/0/4">OceanGate</a></span></figcaption></figure> <h2>Communication and rescue efforts</h2> <p>The Titan would have had an acoustic link with its surface vessel, set up through a transponder (a device for receiving a sonar signal) on its end, and a transceiver (a device that can both transmit and receive communications) on the surface vessel.</p> <p>This link allows for underwater acoustic positioning, as well as for short text messages to be sent back and forth to the surface vessel – but the amount of data that can be shared is limited and usually includes basic telemetry and status information.</p> <p>The Titan is a battery-operated watercraft. Given it has lost all contact with its surface vessel, it may have suffered a power failure. Ideally, there would be an emergency backup power source (such as an independent battery) to maintain emergency and life support equipment – but it’s unclear if the missing vessel had any power backup on hand.</p> <p>According to reports, at least two aircraft, a submarine and sonar buoys were being used to search for the vessel. The sonar buoys will be listening for underwater noise, including any emergency distress beacons that may have gone off.</p> <p>One of the major challenges in the rescue effort will be contending with weather conditions, which will further shrink an already narrow search window.</p> <figure class="align-center zoomable"><a href="https://images.theconversation.com/files/532842/original/file-20230620-49349-cnzdk6.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/532842/original/file-20230620-49349-cnzdk6.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/532842/original/file-20230620-49349-cnzdk6.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=413&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/532842/original/file-20230620-49349-cnzdk6.jpeg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=413&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/532842/original/file-20230620-49349-cnzdk6.jpeg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=413&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/532842/original/file-20230620-49349-cnzdk6.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=518&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/532842/original/file-20230620-49349-cnzdk6.jpeg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=518&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/532842/original/file-20230620-49349-cnzdk6.jpeg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=518&amp;fit=crop&amp;dpr=3 2262w" alt="A dark blue image with a tube like shape floating in the lower third" /></a><figcaption><span class="caption">Titan commencing a dive to 4,000m underwater.</span> <span class="attribution"><a class="source" href="https://oceangate.com/gallery/gallery-titan.html#nanogallery/titangallery/0/1">OceanGate</a></span></figcaption></figure> <h2>What might have happened?</h2> <p>In a best case scenario, the Titan may have lost power and will have an inbuilt safety system that will help it return to the surface. For instance, it may be equipped with additional weights that can be dropped to instantly increase its buoyancy and bring it back to the surface.</p> <p>Alternatively, the vessel may have lost power and ended up at the bottom of the ocean. This would be a more problematic outcome.</p> <p>The worst case scenario is that it has suffered a catastrophic failure to its pressure housing. Although the Titan’s composite hull is built to withstand intense deep-sea pressures, any defect in its shape or build could compromise its integrity – in which case there’s a risk of implosion.</p> <p>Another possibility is that there may have been a fire onboard, such as from an electrical short circuit. This could compromise the vehicle’s electronic systems which are used for navigation and control of the vessel. Fires are a disastrous event in enclosed underwater environments, and can potentially incapacitate the crew and passengers.</p> <p>Time is of the essence. The search and rescue teams will need to find the vessel before its <a href="https://web.archive.org/web/20230331121053/https://oceangateexpeditions.com/tour/titanic-expedition/">limited supplies</a> of oxygen and water run out.</p> <p>There’s an ongoing debate in scientific circles regarding the relative merit of manned submersibles, wherein each deployment incurs a safety risk – and the safety of the crew and passengers is paramount.</p> <p>Currently, most underwater research and offshore industrial work is conducted using unmanned and robotic vehicles. A loss to one of these vehicles might compromise the work being done, but at least lives aren’t at stake. In light of these events, there will likely be intense discussion about the risks associated with using these systems to support deep-sea tourism.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/208100/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/stefan-b-williams-1448728">Stefan B. Williams</a>, Professor, Australian Centre for Field Robotics, <em><a href="https://theconversation.com/institutions/university-of-sydney-841">University of Sydney</a></em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/missing-titanic-sub-what-are-submersibles-how-do-they-communicate-and-what-may-have-gone-wrong-208100">original article</a>.</em></p> <p><em>Images: Getty</em></p>

Technology

Placeholder Content Image

Social media snaps map the sweep of Japan’s cherry blossom season in unprecedented detail

<p><a href="https://theconversation.com/profiles/adrian-dyer-387798">Adrian Dyer</a>, <em><a href="https://theconversation.com/institutions/monash-university-1065">Monash University</a></em>; <a href="https://theconversation.com/profiles/alan-dorin-12573">Alan Dorin</a>, <em><a href="https://theconversation.com/institutions/monash-university-1065">Monash University</a></em>; <a href="https://theconversation.com/profiles/carolyn-vlasveld-1442834">Carolyn Vlasveld</a>, <em><a href="https://theconversation.com/institutions/monash-university-1065">Monash University</a></em>, and <a href="https://theconversation.com/profiles/moataz-elqadi-1442833">Moataz ElQadi</a>, <em><a href="https://theconversation.com/institutions/monash-university-1065">Monash University</a></em></p> <p>Social media contains enormous amounts of data about people, our everyday lives, and our interactions with our surroundings. As a byproduct, it also contains a vast trove of information about the natural world.</p> <p>In a <a href="https://www.sciencedirect.com/science/article/abs/pii/S0367253023001019#sec0024a">new study published in Flora</a>, we show how social media can be used for “incidental citizen science”. From photos posted to a social site, we mapped countrywide patterns in nature over a decade in relatively fine detail.</p> <p>Our case study was the annual spread of cherry blossom flowering across Japan, where millions of people view the blooming each year in a cultural event called “hanami”. The flowering spreads across Japan in a wave (“<a href="https://en.wikipedia.org/wiki/Cherry_blossom_front">sakura zensen</a>” or 桜前線) following the warmth of the arriving spring season.</p> <figure class="align-center "><img src="https://images.theconversation.com/files/529000/original/file-20230530-15-mix84k.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/529000/original/file-20230530-15-mix84k.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=399&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/529000/original/file-20230530-15-mix84k.jpeg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=399&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/529000/original/file-20230530-15-mix84k.jpeg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=399&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/529000/original/file-20230530-15-mix84k.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=501&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/529000/original/file-20230530-15-mix84k.jpeg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=501&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/529000/original/file-20230530-15-mix84k.jpeg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=501&amp;fit=crop&amp;dpr=3 2262w" alt="ALT TEXT" /><figcaption><span class="caption">Celebrating the cherry blossom is a centuries-old tradition in Japan.</span> <span class="attribution"><span class="source">Shutterstock</span></span></figcaption></figure> <p>The <a href="https://en.wikipedia.org/wiki/Hanami">hanami festival</a> has been documented for centuries, and research shows climate change is making <a href="https://iopscience.iop.org/article/10.1088/1748-9326/ac6bb4">early blossoming more likely</a>. The advent of mobile phones – and social network sites that allow people to <a href="https://www.sciencedirect.com/science/article/abs/pii/S1574954116302321">upload photos tagged with time and location data</a> – presents a new opportunity to study how Japan’s flowering events are affected by seasonal climate.</p> <h2>Why are flowers useful to understand how nature is being altered by climate change?</h2> <p>Many flowering plants, including the cherry blossoms of Japan (<em>Prunus</em> subgenus <em>Cerasus</em>), require insect pollination. To reproduce, plant flowers bloom at optimal times to receive visits from insects like bees.</p> <p>Temperature is <a href="https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0200549">an important mechanism</a> for plants to trigger this flowering. <a href="https://onlinelibrary.wiley.com/doi/epdf/10.1111/j.1461-0248.2008.01269.x">Previous research</a> has highlighted how climate change may create mismatches in space or time between the blooming of plants and the emergence of pollinating insects.</p> <p><iframe id="rtiQ0" class="tc-infographic-datawrapper" style="border: none;" src="https://datawrapper.dwcdn.net/rtiQ0/2/" width="100%" height="400px" frameborder="0"></iframe></p> <p>It has been difficult for researchers to map the extent of this problem in detail, as its study requires simultaneous data collection over large areas. The use of citizen science images deliberately, or incidentally, uploaded to social network sites enables <a href="https://en.wikipedia.org/wiki/Big_data">big data</a> solutions.</p> <h2>How did we conduct our study?</h2> <p>We collected images from Japan uploaded to <a href="https://www.flickr.com/">Flickr</a> between 2008 and 2018 that were tagged by users as “cherry blossoms”. We used computer vision techniques to analyse these images, and to provide sets of keywords describing their image content.</p> <p>Next, we automatically filtered out images appearing to contain content that the computer vision algorithms determined didn’t match our targeted cherry blossoms. For instance, many contained images of autumn leaves, another popular ecological event to view in Japan.</p> <p>The locations and timestamps of the remaining cherry blossom images were then used to generate marks on a map of Japan showing the seasonal wave of sakura blossoms, and to estimate peak bloom times each year in different cities.</p> <h2>Checking the data</h2> <p>An important component of any scientific investigation is validation – how well does a proposed solution or data set represent the real-world phenomenon under study?</p> <figure class="align-right zoomable"><a href="https://images.theconversation.com/files/528702/original/file-20230528-21-4fxpkv.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/528702/original/file-20230528-21-4fxpkv.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=237&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/528702/original/file-20230528-21-4fxpkv.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=591&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/528702/original/file-20230528-21-4fxpkv.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=591&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/528702/original/file-20230528-21-4fxpkv.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=591&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/528702/original/file-20230528-21-4fxpkv.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=743&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/528702/original/file-20230528-21-4fxpkv.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=743&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/528702/original/file-20230528-21-4fxpkv.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=743&amp;fit=crop&amp;dpr=3 2262w" alt="" /></a><figcaption><span class="caption">Blossom dates calculated from social media images compare well with official data.</span> <span class="attribution"><span class="source">ElQadi et al.</span>, <span class="license">Author provided</span></span></figcaption></figure> <p>Our study using social network site images was validated against the detailed information published by the <a href="https://www.japan.travel/en/see-and-do/cherry-blossom-forecast-2023/">Japan National Tourism Organization</a>.</p> <p>We also manually examined a subset of images to confirm the presence of cherry flowers.</p> <p>Plum flowers (<em>Prunus mume</em>) look very similar to cherry blossoms, especially to tourists, and they are frequently mistaken and mislabelled as cherry blossoms. We used visible “notches” at the end of cherry petals, and other characteristics, to distinguish cherries from plums.</p> <p>Taken together, the data let us map the flowering event as it unfolds across Japan.</p> <figure class="align-center zoomable"><a href="https://images.theconversation.com/files/528769/original/file-20230529-17-wmgf5g.gif?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/528769/original/file-20230529-17-wmgf5g.gif?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/528769/original/file-20230529-17-wmgf5g.gif?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=619&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/528769/original/file-20230529-17-wmgf5g.gif?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=619&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/528769/original/file-20230529-17-wmgf5g.gif?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=619&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/528769/original/file-20230529-17-wmgf5g.gif?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=777&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/528769/original/file-20230529-17-wmgf5g.gif?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=777&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/528769/original/file-20230529-17-wmgf5g.gif?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=777&amp;fit=crop&amp;dpr=3 2262w" alt="An animated map showing cherry blossom flowering across Japan" /></a><figcaption><span class="caption">Images uploaded to social media over a ten year period 2008-2018, let us map the cherry blossom front as it sweeps across Japan.</span> <span class="attribution"><span class="source">ElQadi et al.</span>, <span class="license">Author provided</span></span></figcaption></figure> <h2>Out-of-season blooms</h2> <p>Our social network site analysis was sufficiently detailed to accurately pinpoint the annual peak spring bloom in the major cities of <a href="https://en.wikipedia.org/wiki/Tokyo">Tokyo</a> and <a href="https://en.wikipedia.org/wiki/Kyoto">Kyoto</a>, to within a few days of official records.</p> <p>Our data also revealed the presence of a consistent, and persistent, out-of-season cherry bloom in autumn. Upon further searching, we discovered that this “unexpected” seasonal bloom had also been noted in <a href="https://www.bbc.com/news/world-asia-45898333">mainstream media</a> in recent years. We thus confirmed that this is a real event, not an artefact of our study.</p> <figure class="align-center zoomable"><a href="https://images.theconversation.com/files/528832/original/file-20230529-25-wonef0.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/528832/original/file-20230529-25-wonef0.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/528832/original/file-20230529-25-wonef0.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=450&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/528832/original/file-20230529-25-wonef0.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=450&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/528832/original/file-20230529-25-wonef0.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=450&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/528832/original/file-20230529-25-wonef0.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=566&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/528832/original/file-20230529-25-wonef0.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=566&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/528832/original/file-20230529-25-wonef0.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=566&amp;fit=crop&amp;dpr=3 2262w" alt="" /></a><figcaption><span class="caption">Cherry blossom photographs from Flickr taken within Japan from 2008 to 2018 show an April peak as well as an unexpected smaller peak in November.</span> <span class="attribution"><span class="source">ElQadi et al.</span>, <span class="license">Author provided</span></span></figcaption></figure> <p>So, even without knowing it, many of us are already helping to understand how climate change influences our environment, simply by posting online photographs we capture. Dedicated sites like <a href="https://wildpollinatorcount.com/">Wild Pollinator Count</a> are excellent resources to contribute to the growing knowledge base.</p> <p>The complex issues of climate change are still being mapped. Citizen science allows our daily observations to improve our understanding, and so better manage our relationship with the natural world.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/206574/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/adrian-dyer-387798">Adrian Dyer</a>, Associate Professor, <em><a href="https://theconversation.com/institutions/monash-university-1065">Monash University</a></em>; <a href="https://theconversation.com/profiles/alan-dorin-12573">Alan Dorin</a>, Associate Professor, Faculty of Information Technology, <em><a href="https://theconversation.com/institutions/monash-university-1065">Monash University</a></em>; <a href="https://theconversation.com/profiles/carolyn-vlasveld-1442834">Carolyn Vlasveld</a>, PhD candidate, <em><a href="https://theconversation.com/institutions/monash-university-1065">Monash University</a></em>, and <a href="https://theconversation.com/profiles/moataz-elqadi-1442833">Moataz ElQadi</a>, Adjunct Researcher, Faculty of Information Technology, <em><a href="https://theconversation.com/institutions/monash-university-1065">Monash University</a></em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/social-media-snaps-map-the-sweep-of-japans-cherry-blossom-season-in-unprecedented-detail-206574">original article</a>.</em></p> <p><em>Images: Getty</em></p>

Technology

Placeholder Content Image

What are the long-term effects of quitting social media? Almost nobody can log off long enough to find out

<p><a href="https://theconversation.com/profiles/john-malouff-313652">John Malouff</a>, <em><a href="https://theconversation.com/institutions/university-of-new-england-919">University of New England</a></em></p> <p>Being on social media has become synonymous with living in the 21st century. Year after year, we see new platforms and smarter algorithms roping us into highly addictive online worlds.</p> <p>Now, a growing number of people have noticed this trend and are actively making an effort to resist it.</p> <p>Anecdotally, a case can be made for quitting social media, and there are myriad reasons why someone might want to. But is there evidence that doing so is good for you in the long term?</p> <h2>Drivers for quitting</h2> <p>Although there are too many social media platforms to name, most people tend to think of the “big five”: Facebook, Twitter, Instagram, YouTube and TikTok.</p> <p>Research has found people have various reasons for quitting one or more of these apps. Many quit over concerns about negative impacts on their mental and physical health. For example, studies have shown adolescent girls in particular can experience negative body image as a result of viewing manipulated <a href="https://theconversation.com/we-have-all-heard-social-media-can-impact-womens-body-image-but-it-isnt-all-bad-205214">selfies on Instagram</a>.</p> <p>People also <a href="https://www.qscience.com/content/journals/10.5339/connect.2023.spt.3?crawler=true">choose to quit</a> due to disliking ads, feeling like they’re wasting time, or if they’re worried about their privacy. The question then is: does quitting social media resolve these concerns?</p> <h2>Mixed research outcomes</h2> <p>It’s difficult to determine whether there are clear and lasting benefits to quitting social media – and a look at the research explains why.</p> <p><a href="https://www.tandfonline.com/doi/full/10.1080/17459435.2020.1817140">One 2020 study</a> found people who had quit social media saw improvements in their close relationships, and were pleased to be free of comparison with others. But some also said they <a href="https://www.tandfonline.com/doi/full/10.1080/17459435.2020.1817140">missed</a> the informational and entertainment aspects of it.</p> <p>In a <a href="https://www.researchgate.net/publication/328838624_No_More_FOMO_Limiting_Social_Media_Decreases_Loneliness_and_Depression">2018 study</a>, researchers assessed the psychological state of 143 American undergraduates before randomly assigning one group a daily ten-minute limit for Facebook, Instagram and Snapchat, per platform. Three weeks later, those who limited their social media use showed significantly lower levels of loneliness and depression. However, there was no significant effect on anxiety, self-esteem or wellbeing.</p> <p>And in <a href="https://journals.plos.org/plosone/article?id=10.1371%2Fjournal.pone.0217743&amp;fbclid=IwAR1oLvPyeJDwMhD4WlODKU1A360ttIcaV_tManJs1_qEr-VAVZPsD0xQjq0">one 2019 study</a> with 78 participants, half were asked to take a one-week break from Facebook and Instagram. To the researchers’ surprise, the users in this group who were generally active on social media experienced <em>less</em> positive psychological effects than those in the control group.</p> <p>With research findings painting several different pictures, it’s safe to say our relationship with social media – and how it affects us – is very complex.</p> <h2>Research constraints</h2> <p>There appear to be no published studies that have assessed the long-term impacts of permanently quitting social media. This is probably because it’s difficult to find participants who will agree to be randomly assigned the task of dropping social media forever.</p> <p>One important consideration is that a percentage of individuals who quit social media will eventually <a href="https://cyberleninka.org/article/n/992039/viewer">go back</a>. Reasons for returning include feeling left out, fearing loss of connections, wanting to regain access to interesting or useful information, feeling social pressure to rejoin, or simply feeling that quitting wasn’t the right choice.</p> <p>Even if researchers do find a large enough group of people willing to quit social media for good, conducting long-term follow-ups would be highly resource-intensive. Beyond that, it would be difficult to figure out how much of a participant’s increase (or decrease) in life satisfaction is due to quitting social media, and not other factors.</p> <p>As such, there’s currently no evidence that quitting social media comes with concrete long-term benefits. And in the short term, results are mixed.</p> <h2>To quit, or not to quit?</h2> <p>However, that doesn’t mean quitting (for a short or long period) wouldn’t be beneficial for some people. It’s likely that any potential benefits will depend on the individual doing the quitting, and why they’re doing it.</p> <p>For instance, consensus that does emerge from the research is that <a href="https://theconversation.com/does-social-media-make-us-more-or-less-lonely-depends-on-how-you-use-it-128468">the <em>way</em> you use</a> social media plays a significant role in how negative or positive your experience is. By <a href="https://journals.sagepub.com/doi/pdf/10.1177/2056305120919105">using social media mindfully</a>, users can minimise potential harms while retaining the benefits.</p> <p>For some, it may only be one platform causing unease. If you strongly dislike Instagram’s tendency to be hyper-focused on people’s private lives, then you could simply stop using Instagram.</p> <p>Another technique is to curate your social media feeds by engaging only with content you find useful and positive. For instance, many young women take steps to avoid seeing <a href="https://theconversation.com/we-have-all-heard-social-media-can-impact-womens-body-image-but-it-isnt-all-bad-205214?fbclid=IwAR3cX7l116GAj0nnKDAk16x6GP6iRCxH_VutjIbxOiCij1yCqWmeOK0s0f0">perfect bodies all day</a> on their social media.</p> <p>If you’re still wondering whether quitting might be good for you, the simplest way to find out is to <a href="https://hbr.org/2018/10/i-ran-4-experiments-to-break-my-social-media-addiction-heres-what-worked">experiment</a> and do it.</p> <p>Take a break from one or more types of social media. After some time ask yourself whether the benefits seem worth it to you. If the answer is “yes”, make the break permanent.</p> <p><em><a href="https://theconversation.com/profiles/john-malouff-313652">John Malouff</a>, Associate Professor, School of Behavioural, Cognitive and Social Sciences, <a href="https://theconversation.com/institutions/university-of-new-england-919">University of New England</a></em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/what-are-the-long-term-effects-of-quitting-social-media-almost-nobody-can-log-off-long-enough-to-find-out-205478">original article</a>.</em></p> <p><em>Images: Getty</em></p>

Technology

Placeholder Content Image

6 amazing things you didn’t know your phone could do

<p>Nobody ever bought a shiny brand new smartphone and then studiously read the manual! Maybe it’s just us but unfortunately it means we’ve missed out on the secret but amazing things your smartphone can do. You don't even need to download any apps to do these nifty tricks. Here are some of our favourite ones that we’re sure will impress next time you need them.</p> <p><strong>Taking a screenshot</strong></p> <p>A great trick if you want to share a hilarious text, picture or Facebook post with friends or family.</p> <p><span style="text-decoration: underline;">iPhones</span> – SImultaneously press (but not hold) the Home button and the Sleep/Wake button (top right of phone). You should hear a shutter click as well as see a white flash. The screenshot will be located on your Camera Roll in photos.</p> <p><span style="text-decoration: underline;">Androids</span> - Hold down the Power button and Volume -down button at the same time for a couple of seconds. Or hold down power button and home icon at the same time. If this doesn’t work, you can hold down the power button until the option to take a screen shot appears.</p> <p><strong>Taking multiple photos at once</strong></p> <p>A life-saver if you are taking pictures of wriggling kids or people who blink exactly when you take the picture (there’s always someone in the group isn’t there?). This little trick lets you take multiple pictures with a single click.</p> <p><span style="text-decoration: underline;">iPhones</span> – In the camera app, rather than tapping capture button to take photos, hold it down. Your camera will automatically take multiple picture (around 10 pictures a second) until you release the button.</p> <p><span style="text-decoration: underline;">Androids</span> - In the camera app, tap the gear icon and turn on “Burst Shot” settings. Return to your camera app and hold onto the capture button. Or go to camera, select mode, auto and click on burst shots.</p> <p><strong>Change text size</strong></p> <p>If the tiny text on the smartphone is giving you a headache, there’s an easily solution. You can change the settings so all text on your phone is large.</p> <p><span style="text-decoration: underline;">iPhones</span> - Go to Settings > General > Accessibility and turn on “Larger Text.”</p> <p><span style="text-decoration: underline;">Androids</span> - Go to Settings > Accessibility > Vision and tap font size and set it to Large.</p> <p><strong>Read to you</strong></p> <p>It really seems like technology can do anything, including programming your smartphone to read to you.</p> <p><span style="text-decoration: underline;">iPhones</span> - Go to Settings > General > Accessibility and turn on “Speak Selection.” You can even customise the voice that speaks to you choosing from a wide range of accent including Australian. To get your phone to speak to you, highlight text (double-tapping or tapping and holding on to it) and then tap Speak button in the pop-up menu.</p> <p><strong>Turn off music automatically</strong></p> <p>If you are one to listen to music or audiobooks as you drift off to sleep, you can use a timer to turn it off so it doesn’t drain your battery life.  </p> <p><span style="text-decoration: underline;">iPhones</span> - Go to the Clock app and tap on "Timer," then "When Timer Ends." From here, scroll all the way down to the bottom of the screen and select "Stop Playing."</p> <p><span style="text-decoration: underline;">Androids</span> - Open the music player and go to Settings. Look for "Music auto off" and set it to however long you want the music to play.</p> <p><strong>Search text messages</strong></p> <p>Searching for messages is handy if you are looking for a specific text containing details like addresses, emails or dates.</p> <p><span style="text-decoration: underline;">iPhones</span> – When you open your Message app, scroll up and a search bar should pop up at the top of all your messages. Type in the phrase you are looking for.</p> <p><span style="text-decoration: underline;">Androids</span> – Open the Message app and then tap on the Menu. A few options will appear and click search. </p> <p><em>Image: Shutterstock</em></p>

Technology

Placeholder Content Image

ChatGPT and other generative AI could foster science denial and misunderstanding – here’s how you can be on alert

<p><em><a href="https://theconversation.com/profiles/gale-sinatra-1234776">Gale Sinatra</a>, <a href="https://theconversation.com/institutions/university-of-southern-california-1265">University of Southern California</a> and <a href="https://theconversation.com/profiles/barbara-k-hofer-1231530">Barbara K. Hofer</a>, <a href="https://theconversation.com/institutions/middlebury-1247">Middlebury</a></em></p> <p>Until very recently, if you wanted to know more about a controversial scientific topic – stem cell research, the safety of nuclear energy, climate change – you probably did a Google search. Presented with multiple sources, you chose what to read, selecting which sites or authorities to trust.</p> <p>Now you have another option: You can pose your question to ChatGPT or another generative artificial intelligence platform and quickly receive a succinct response in paragraph form.</p> <p>ChatGPT does not search the internet the way Google does. Instead, it generates responses to queries by <a href="https://www.washingtonpost.com/technology/2023/05/07/ai-beginners-guide/">predicting likely word combinations</a> from a massive amalgam of available online information.</p> <p>Although it has the potential for <a href="https://hbr.org/podcast/2023/05/how-generative-ai-changes-productivity">enhancing productivity</a>, generative AI has been shown to have some major faults. It can <a href="https://www.scientificamerican.com/article/ai-platforms-like-chatgpt-are-easy-to-use-but-also-potentially-dangerous/">produce misinformation</a>. It can create “<a href="https://www.nytimes.com/2023/05/01/business/ai-chatbots-hallucination.html">hallucinations</a>” – a benign term for making things up. And it doesn’t always accurately solve reasoning problems. For example, when asked if both a car and a tank can fit through a doorway, it <a href="https://www.nytimes.com/2023/03/14/technology/openai-new-gpt4.html">failed to consider both width and height</a>. Nevertheless, it is already being used to <a href="https://www.washingtonpost.com/media/2023/01/17/cnet-ai-articles-journalism-corrections/">produce articles</a> and <a href="https://www.nytimes.com/2023/05/19/technology/ai-generated-content-discovered-on-news-sites-content-farms-and-product-reviews.html">website content</a> you may have encountered, or <a href="https://www.nytimes.com/2023/04/21/opinion/chatgpt-journalism.html">as a tool</a> in the writing process. Yet you are unlikely to know if what you’re reading was created by AI.</p> <p>As the authors of “<a href="https://global.oup.com/academic/product/science-denial-9780197683330">Science Denial: Why It Happens and What to Do About It</a>,” we are concerned about how generative AI may blur the boundaries between truth and fiction for those seeking authoritative scientific information.</p> <p>Every media consumer needs to be more vigilant than ever in verifying scientific accuracy in what they read. Here’s how you can stay on your toes in this new information landscape.</p> <h2>How generative AI could promote science denial</h2> <p><strong>Erosion of epistemic trust</strong>. All consumers of science information depend on judgments of scientific and medical experts. <a href="https://doi.org/10.1080/02691728.2014.971907">Epistemic trust</a> is the process of trusting knowledge you get from others. It is fundamental to the understanding and use of scientific information. Whether someone is seeking information about a health concern or trying to understand solutions to climate change, they often have limited scientific understanding and little access to firsthand evidence. With a rapidly growing body of information online, people must make frequent decisions about what and whom to trust. With the increased use of generative AI and the potential for manipulation, we believe trust is likely to erode further than <a href="https://www.pewresearch.org/science/2022/02/15/americans-trust-in-scientists-other-groups-declines/">it already has</a>.</p> <p><strong>Misleading or just plain wrong</strong>. If there are errors or biases in the data on which AI platforms are trained, that <a href="https://theconversation.com/ai-information-retrieval-a-search-engine-researcher-explains-the-promise-and-peril-of-letting-chatgpt-and-its-cousins-search-the-web-for-you-200875">can be reflected in the results</a>. In our own searches, when we have asked ChatGPT to regenerate multiple answers to the same question, we have gotten conflicting answers. Asked why, it responded, “Sometimes I make mistakes.” Perhaps the trickiest issue with AI-generated content is knowing when it is wrong.</p> <p><strong>Disinformation spread intentionally</strong>. AI can be used to generate compelling disinformation as text as well as deepfake images and videos. When we asked ChatGPT to “<a href="https://www.scientificamerican.com/article/ai-platforms-like-chatgpt-are-easy-to-use-but-also-potentially-dangerous/">write about vaccines in the style of disinformation</a>,” it produced a nonexistent citation with fake data. Geoffrey Hinton, former head of AI development at Google, quit to be free to sound the alarm, saying, “It is hard to see how you can prevent the bad actors from <a href="https://www.nytimes.com/2023/05/01/technology/ai-google-chatbot-engineer-quits-hinton.html">using it for bad things</a>.” The potential to create and spread deliberately incorrect information about science already existed, but it is now dangerously easy.</p> <p><strong>Fabricated sources</strong>. ChatGPT provides responses with no sources at all, or if asked for sources, may present <a href="https://economistwritingeveryday.com/2023/01/21/chatgpt-cites-economics-papers-that-do-not-exist/">ones it made up</a>. We both asked ChatGPT to generate a list of our own publications. We each identified a few correct sources. More were hallucinations, yet seemingly reputable and mostly plausible, with actual previous co-authors, in similar sounding journals. This inventiveness is a big problem if a list of a scholar’s publications conveys authority to a reader who doesn’t take time to verify them.</p> <p><strong>Dated knowledge</strong>. ChatGPT doesn’t know what happened in the world after its training concluded. A query on what percentage of the world has had COVID-19 returned an answer prefaced by “as of my knowledge cutoff date of September 2021.” Given how rapidly knowledge advances in some areas, this limitation could mean readers get erroneous outdated information. If you’re seeking recent research on a personal health issue, for instance, beware.</p> <p><strong>Rapid advancement and poor transparency</strong>. AI systems continue to become <a href="https://www.nytimes.com/2023/05/01/technology/ai-google-chatbot-engineer-quits-hinton.html">more powerful and learn faster</a>, and they may learn more science misinformation along the way. Google recently announced <a href="https://www.nytimes.com/2023/05/10/technology/google-ai-products.html">25 new embedded uses of AI in its services</a>. At this point, <a href="https://theconversation.com/regulating-ai-3-experts-explain-why-its-difficult-to-do-and-important-to-get-right-198868">insufficient guardrails are in place</a> to assure that generative AI will become a more accurate purveyor of scientific information over time.</p> <h2>What can you do?</h2> <p>If you use ChatGPT or other AI platforms, recognize that they might not be completely accurate. The burden falls to the user to discern accuracy.</p> <p><strong>Increase your vigilance</strong>. <a href="https://www.niemanlab.org/2022/12/ai-will-start-fact-checking-we-may-not-like-the-results/">AI fact-checking apps may be available soon</a>, but for now, users must serve as their own fact-checkers. <a href="https://www.nsta.org/science-teacher/science-teacher-januaryfebruary-2023/plausible">There are steps we recommend</a>. The first is: Be vigilant. People often reflexively share information found from searches on social media with little or no vetting. Know when to become more deliberately thoughtful and when it’s worth identifying and evaluating sources of information. If you’re trying to decide how to manage a serious illness or to understand the best steps for addressing climate change, take time to vet the sources.</p> <p><strong>Improve your fact-checking</strong>. A second step is <a href="https://doi.org/10.1037/edu0000740">lateral reading</a>, a process professional fact-checkers use. Open a new window and search for <a href="https://www.nsta.org/science-teacher/science-teacher-mayjune-2023/marginalizing-misinformation">information about the sources</a>, if provided. Is the source credible? Does the author have relevant expertise? And what is the consensus of experts? If no sources are provided or you don’t know if they are valid, use a traditional search engine to find and evaluate experts on the topic.</p> <p><strong>Evaluate the evidence</strong>. Next, take a look at the evidence and its connection to the claim. Is there evidence that genetically modified foods are safe? Is there evidence that they are not? What is the scientific consensus? Evaluating the claims will take effort beyond a quick query to ChatGPT.</p> <p><strong>If you begin with AI, don’t stop there</strong>. Exercise caution in using it as the sole authority on any scientific issue. You might see what ChatGPT has to say about genetically modified organisms or vaccine safety, but also follow up with a more diligent search using traditional search engines before you draw conclusions.</p> <p><strong>Assess plausibility</strong>. Judge whether the claim is plausible. <a href="https://doi.org/10.1016/j.learninstruc.2013.03.001">Is it likely to be true</a>? If AI makes an implausible (and inaccurate) statement like “<a href="https://www.usatoday.com/story/news/factcheck/2022/12/23/fact-check-false-claim-covid-19-vaccines-caused-1-1-million-deaths/10929679002/">1 million deaths were caused by vaccines, not COVID-19</a>,” consider if it even makes sense. Make a tentative judgment and then be open to revising your thinking once you have checked the evidence.</p> <p><strong>Promote digital literacy in yourself and others</strong>. Everyone needs to up their game. <a href="https://theconversation.com/how-to-be-a-good-digital-citizen-during-the-election-and-its-aftermath-148974">Improve your own digital literacy</a>, and if you are a parent, teacher, mentor or community leader, promote digital literacy in others. The American Psychological Association provides guidance on <a href="https://www.apa.org/topics/social-media-internet/social-media-literacy-teens">fact-checking online information</a> and recommends teens be <a href="https://www.apa.org/topics/social-media-internet/health-advisory-adolescent-social-media-use">trained in social media skills</a> to minimize risks to health and well-being. <a href="https://newslit.org/">The News Literacy Project</a> provides helpful tools for improving and supporting digital literacy.</p> <p>Arm yourself with the skills you need to navigate the new AI information landscape. Even if you don’t use generative AI, it is likely you have already read articles created by it or developed from it. It can take time and effort to find and evaluate reliable information about science online – but it is worth it.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/204897/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/gale-sinatra-1234776">Gale Sinatra</a>, Professor of Education and Psychology, <a href="https://theconversation.com/institutions/university-of-southern-california-1265">University of Southern California</a> and <a href="https://theconversation.com/profiles/barbara-k-hofer-1231530">Barbara K. Hofer</a>, Professor of Psychology Emerita, <a href="https://theconversation.com/institutions/middlebury-1247">Middlebury</a></em></p> <p><em>Image credits: Getty Images</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/chatgpt-and-other-generative-ai-could-foster-science-denial-and-misunderstanding-heres-how-you-can-be-on-alert-204897">original article</a>.</em></p>

Technology

Placeholder Content Image

Five ways to manage your doomscrolling habit

<p><em><a href="https://theconversation.com/profiles/christian-van-nieuwerburgh-1157439">Christian van Nieuwerburgh</a>, <a href="https://theconversation.com/institutions/rcsi-university-of-medicine-and-health-sciences-788">RCSI University of Medicine and Health Sciences</a></em></p> <p>Doomscrolling, according to <a href="https://www.merriam-webster.com/words-at-play/doomsurfing-doomscrolling-words-were-watching">Merriam-Webster</a>, is “the tendency to continue to surf or scroll through bad news, even though that news is saddening, disheartening, or depressing”. For many it’s a habit born of the pandemic – and one that is likely to stay.</p> <p>Some health experts recommend limiting access to social media to <a href="https://www.health.com/mind-body/what-is-doomscrolling">reduce the negative effects of doomscrolling</a>, and popular magazines <a href="https://www.wired.com/story/how-to-stop-doomscrolling-psychology-social-media-fomo/">highlight the risks</a> of social media addiction. According to the BBC, the barrage of negative coverage of doomscrolling has led to some people <a href="https://www.bbc.com/news/business-60067032">ditching their smartphones</a> altogether.</p> <p>Although research showing the negative effects of doomscrolling is convincing and the <a href="https://www.tandfonline.com/doi/full/10.1080/1461670X.2021.2021105">recommendations are clear</a>, few of us seem to be following this well-intentioned advice. There are a few reasons for this.</p> <p>First, blocking out news during times of crisis may not be such a good idea. Second, many of us <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4675534/">don’t respond well</a> to being told what we can and cannot do.</p> <p>Finally, being asked not to do something can make matters worse. It can push us into a negative frame of mind and make us <a href="https://www.psychologytoday.com/us/blog/words-can-change-your-brain/201208/why-word-is-so-dangerous-say-or-hear">less likely to change our behaviour</a>.</p> <p>Rather than quitting doomscrolling, what if we simply got better at managing it?</p> <p>It is helpful to start by acknowledging that seeking news and information during times of crisis is perfectly normal. In fact, this response is hard-wired in us humans.</p> <p>Staying alert to danger is part of our survival mechanism. Gathering information and being prepared to face threats have been key to our survival for millennia.</p> <p>Right now, there are many threats facing us: a war in Europe that could escalate to nuclear conflict, a pandemic that has already killed millions of people and predictions of a climate catastrophe, alongside many other natural disasters and human conflicts across the world.</p> <p>In this context, it is not surprising that we want to be alert to danger. Wanting to learn more about what is happening and equipping ourselves with the latest information is perfectly reasonable.</p> <p>Rather than avoiding the news altogether, let’s make sure that we are getting what we need from our interactions with the news. Here are five suggestions to achieve this.</p> <h2>1. Choose how much time you’re going to invest in consuming the news</h2> <p>Why not include all the ways you access the news? What amount of time each day seems reasonable to you? Once you have a time window, try sticking to it.</p> <h2>2. Be aware of confirmation bias when choosing what to consume</h2> <p>Remember, you are the consumer and you can choose what to learn about. However, we need to be aware of a tendency that psychologists call “<a href="https://www.simplypsychology.org/confirmation-bias.html">confirmation bias</a>”. This is when we favour information that supports our existing beliefs or viewpoints.</p> <p>In other words, we sometimes seek news that confirms what we already believe. This may have been one reason you clicked on this article. So just be aware of this tendency and be aware of what you’re not choosing to read.</p> <h2>3. Check the source</h2> <p>Any time you consume anything, it is helpful to know its source. Who has posted this information? Why are they sharing it with you? Are they trying to convince you of something? Are they trying to manipulate you to think or behave in a particular way?</p> <p>Knowing the answers to these questions will support you to stay in control of how you use the information that you have gathered.</p> <h2>4. Remember that things are not always black or white</h2> <p>We live in an increasingly polarised world. According to psychologists, “polarised thinking” is a <a href="https://exploringyourmind.com/polarized-thinking-cognitive-distortion/">cognitive distortion</a> (thinking error) that can occur when we’re under pressure. It is the tendency to see things as black or white, rather than recognising that we live in a world with many colours and shades of grey.</p> <p>Find ways to hold strong views while remaining curious about other opinions. Selecting and consuming articles that represent differing opinions may support this.</p> <h2>5. Be biased towards the positive</h2> <p>One reason that doomscrolling can be so detrimental is that many of us are drawn to negative information. Psychologists call this the “<a href="https://positivepsychology.com/3-steps-negativity-bias/">negativity bias</a>”. From an evolutionary perspective, it has been important for us to prioritise negative stimuli (threats such as predators) over positive stimuli (enjoying the warmth of a summer’s day).</p> <p>To counterbalance this tendency, we can adopt a bias towards the positive as we consume news. In practical terms, this means seeking positive news stories to balance out our experience of staying updated.</p> <p>Managed properly, keeping on top of the latest news can support you to feel better informed and able to respond in case it becomes necessary. If we’re going to doomscroll, let’s do it right.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/183265/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/christian-van-nieuwerburgh-1157439">Christian van Nieuwerburgh</a>, Professor of Coaching and Positive Psychology, <a href="https://theconversation.com/institutions/rcsi-university-of-medicine-and-health-sciences-788">RCSI University of Medicine and Health Sciences</a></em></p> <p><em>Image credits: Getty Images</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/five-ways-to-manage-your-doomscrolling-habit-183265">original article</a>.</em></p>

Technology

Placeholder Content Image

10 things we sort of miss because of technological advances

<p>The world has certainly changed in the last few decades – great technological advancements has meant many things we did in the past are all but a memory (or they are on their way out.) Let’s look back on ten things we sort of miss even though they’ve been replaced by new technology.</p> <p>1. Buying disposable cameras, only taking picture that were worth the cost of film and having to go all the way to the chemist to develop and print photographs. Then you had to decide how to arrange them in an album.</p> <p>2. Recording your favourite television programs using a video tape. Nowadays people are downloading movies and TV shows straight to their computer.</p> <p>3. Saving all your loose change just in case you needed to use the pay phone when you were out. And having to remember numbers.</p> <p>4. Spending hours over a road map and writing down your own directions so you wouldn’t get lost before a holiday road trip or just going somewhere new. Nobody needs to remember how to get anywhere now because most have GPS.</p> <p>5. Physically visiting institutions like banks, post office and the newsagents. We don’t miss the long lines but at least it was personal.</p> <p>6. Hand-writing essays, letters and notes, which meant knowing how to hand-write. Now it’s about how fast you type not how legible your handwriting is!</p> <p>7. Looking up information in big encyclopaedias and definitions in the dictionary. Not just consulting the internet.</p> <p>8. Receiving mail in your letterbox not your inbox. Unluckily, there is more “junk mail” and spam now than ever.</p> <p>9. Advertising or looking for finds in classified section of the newspaper.</p> <p>10. Packing your friends in the backseats of the car to go to the drive-in movies because it was the only one around. While we do love the comfy seats in air-conditioned cinemas, you can’t beat the fun and romantic possibilities of drive-in cinemas. </p> <p><em>Images: Getty</em></p>

Technology

Placeholder Content Image

Feed me: 4 ways to take control of social media algorithms and get the content you actually want

<p><em><a href="https://theconversation.com/profiles/marc-cheong-998488">Marc Cheong</a>, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a></em></p> <p>Whether it’s Facebook’s News Feed or TikTok’s For You page, social media algorithms are constantly making behind-the-scenes decisions to boost certain content – giving rise to the “curated” feeds we’ve all become accustomed to.</p> <p>But does anyone actually know how these algorithms work? And, more importantly, is there a way to “game” them to see more of the content you want?</p> <h2>Optimising for engagement</h2> <p>In broader computing terms, an algorithm is simply a set of rules that specifies a particular computational procedure.</p> <p>In a social media context, algorithms (specifically “recommender algorithms”) determine everything from what you’re likely to read, to whom you’re likely to follow, to whether a specific post appears in front of you.</p> <p>Their main goal is to <a href="https://arxiv.org/abs/2304.14679">sustain your attention</a> for as long as possible, in a process called “optimising for engagement”. The more you engage with content on a platform, the more effectively that platform can commodify your attention and target you with ads: its main revenue source.</p> <p>One of the earliest social media <a href="https://mashable.com/archive/facebook-news-feed-evolution">feed algorithms</a> came from Facebook in the mid-2000s. It can be summarised in one sentence "Sort all of the user’s friend updates – including photos, statuses and more – in reverse chronological order (newer posts first)."</p> <p>Since then, algorithms have become much more powerful and nuanced. They now take myriad factors into consideration to determine how content is promoted. For instance, Twitter’s “For You” recommendation algorithm is based on a neural network that uses <a href="https://blog.twitter.com/engineering/en_us/topics/open-source/2023/twitter-recommendation-algorithm">about 48 million parameters</a>!</p> <h2>A black box</h2> <p>Imagine a hypothetical user named Basil who follows users and pages that primarily discuss <em>space</em>, <em>dog memes</em> and <em>cooking</em>. Social media algorithms might give Basil recommendations for T-shirts featuring puppies dressed as astronauts.</p> <p>Although this might seem simple, algorithms are typically “black boxes” that have their inner workings hidden. It’s in the interests of tech companies to keep the recipe for their “secret sauce”, well, a secret.</p> <p>Trying to “game” an algorithm is like trying to solve a 3D box puzzle without any instructions and without being able to peer inside. You can only use trial-and-error – manipulating the pieces you see on the outside, and gauging the effects on the overall state of the box.</p> <figure class="align-center zoomable"><em><a href="https://images.theconversation.com/files/525271/original/file-20230510-27-qte7k8.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/525271/original/file-20230510-27-qte7k8.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/525271/original/file-20230510-27-qte7k8.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=400&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/525271/original/file-20230510-27-qte7k8.jpeg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=400&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/525271/original/file-20230510-27-qte7k8.jpeg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=400&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/525271/original/file-20230510-27-qte7k8.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=503&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/525271/original/file-20230510-27-qte7k8.jpeg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=503&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/525271/original/file-20230510-27-qte7k8.jpeg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=503&amp;fit=crop&amp;dpr=3 2262w" alt="" /></a></em><figcaption><em><span class="caption">Manipulating social media algorithms isn’t impossible, but it’s still tricky due to how opaque they are.</span> <span class="attribution"><span class="source">Shutterstock</span></span></em></figcaption></figure> <p>Even when an algorithm’s code is revealed to the public – such as <a href="https://blog.twitter.com/en_us/topics/company/2023/a-new-era-of-transparency-for-twitter">when Twitter released</a> the source code for its recommender algorithm in March – it’s not enough to bend them to one’s will.</p> <p>Between the sheer complexity of the code, constant tweaks by developers, and the presence of arbitrary design choices (such as <a href="https://mashable.com/article/twitter-releases-algorithm-showing-it-tracks-elon-musk-tweets">explicitly tracking</a> Elon Musk’s tweets), any claims of being able to perfectly “game” an algorithm should be taken with a pinch of salt.</p> <p>TikTok’s algorithm, in particular, is notoriously powerful yet opaque. A Wall Street Journal investigation found it uses “subtle cues, such as how long you linger on a video” to predict what you’re <a href="https://www.wsj.com/articles/tiktok-algorithm-video-investigation-11626877477">likely to engage with</a>.</p> <h2>So what <em>can</em> you do?</h2> <p>That said, there are some ways you can try to curate your social media to serve you better.</p> <p>Since algorithms are powered by your data and social media habits, a good first step is to change these habits and data – or at least understand how they may be shaping your online experience.</p> <h1>1. Engage with content you trust and want more of</h1> <p>Regardless of the kind of feed you want to create, it’s important to follow reliable sources. Basil, who is fascinated by space, knows they would do well to follow NASA and steer clear of users who believe the Moon is made of cheese.</p> <p>Think critically about the accounts and pages you follow, asking <a href="https://guides.lib.uw.edu/research/faq/reliable">questions such as</a> <em>Who is the author of this content? Do they have authority in this topic? Might they have a bias, or an agenda?</em></p> <p>The higher the quality of the content you engage with, the more likely it is that you’ll be recommended similarly valuable content (rather than fake news or nonsense).</p> <p>Also, you can play to the ethos of “optimising for engagement” by engaging more (and for longer) with the kind of content you want to be recommended. That means liking and sharing it, and actively seeking out similar posts.</p> <h1>2. Be stingy with your information</h1> <p>Secondly, you can be parsimonious in providing your data to platforms. Social media companies know more about you than you think – from your location, to your perceived interests, to your activities outside the app, and even the activities and interests of your social circle!</p> <p>If you limit the information you provide about yourself, you limit the extent to which the algorithm can target you. It helps to keep your different social media accounts unlinked, and to avoid using the “Login with Facebook” or “Login with Google” options when signing up for a new account.</p> <h1>3. Use your settings</h1> <p>Adjusting your <a href="https://www.consumerreports.org/privacy/facebook-privacy-settings-a1775535782/">privacy and personalisation settings</a> will further help you avoid being microtargeted through your feed.</p> <p>The “Off-Facebook Activity” <a href="https://www.kaspersky.com.au/blog/what-is-off-facebook-activity/28925/">setting</a> allows you to break the link between your Facebook account and your activities outside of Facebook. Similar options exist for <a href="https://support.tiktok.com/en/account-and-privacy/account-privacy-settings">TikTok</a> and <a href="https://help.twitter.com/en/resources/how-you-can-control-your-privacy">Twitter</a>.</p> <p>Ad blockers and privacy-enhancing browser add-ons can also help. These tools, such as the open-source <a href="https://ublockorigin.com/">uBlock Origin</a> and <a href="https://privacybadger.org/">Privacy Badger</a>, help prevent cookies and marketing pixels from “following” your browsing habits as you move between social media and other websites.</p> <h1>4. Get (dis)engaged</h1> <p>A final piece of advice is to simply disengage with content you don’t want in your feed. This means:</p> <ul> <li>ignoring any posts you aren’t a fan of, or “hiding” them if possible</li> <li>taking mindful breaks to avoid “<a href="https://theconversation.com/doomscrolling-is-literally-bad-for-your-health-here-are-4-tips-to-help-you-stop-190059">doomscrolling</a>”</li> <li>regularly revising who you follow, and making sure this list coincides with what you want from your feed.</li> </ul> <p>So, hypothetically, could Basil unfollow all users and pages unrelated to <em>space</em>, <em>dog memes</em> and <em>cooking</em> to ultimately starve the recommender algorithm of potential ways to distract them?</p> <p>Well, not exactly. Even if they do this, the algorithm won’t necessarily “forget” all their data: it might still exist in caches or backups. Because of how complex and pervasive algorithms are, you can’t guarantee control over them.</p> <p>Nonetheless, you shouldn’t let tech giants’ bottom line dictate how you engage with social media. By being aware of how algorithms work, what they’re capable of and what their purpose is, you can make the shift from being a sitting duck for advertisers to an active curator of your own feeds.</p> <figure class="align-center "><em><img src="https://images.theconversation.com/files/498128/original/file-20221129-22-imtnz0.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/498128/original/file-20221129-22-imtnz0.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=115&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/498128/original/file-20221129-22-imtnz0.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=115&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/498128/original/file-20221129-22-imtnz0.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=115&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/498128/original/file-20221129-22-imtnz0.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=144&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/498128/original/file-20221129-22-imtnz0.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=144&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/498128/original/file-20221129-22-imtnz0.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=144&amp;fit=crop&amp;dpr=3 2262w" alt="" /></em><figcaption></figcaption></figure> <p><em>The Conversation is commissioning articles by academics across the world who are researching how society is being shaped by our digital interactions with each other. <a href="https://theconversation.com/uk/topics/social-media-and-society-125586">Read more here</a><!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/204374/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></em></p> <p><em><a href="https://theconversation.com/profiles/marc-cheong-998488">Marc Cheong</a>, Senior Lecturer of Information Systems, School of Computing and Information Systems; and (Honorary) Senior Fellow, Melbourne Law School, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a></em></p> <p><em>Image credits: Getty Images</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/feed-me-4-ways-to-take-control-of-social-media-algorithms-and-get-the-content-you-actually-want-204374">original article</a>.</em></p>

Technology

Placeholder Content Image

Social media good for older people’s health

<p>Older people should use Facebook and other social media to help prevent their health declining, a study has found.</p> <p>Researchers at the University of Exeter in England carried out the research among 65 to 95-year-olds and found that people who spent time online did not feel as lonely as others their age, which helps stop declining physical and mental health.</p> <p>The study followed seniors from 31 residential care homes across the United Kingdom. Researchers noted those trained to use technology felt more self-competent, were more sociable and demonstrated improved cognitive abilities.</p> <p>The project's leader, Dr Thomas Morton, said the findings highlighted how loneliness among older people can contribute to their poor health.</p> <p>“Human beings are social animals, and it’s no surprise that we tend to do better when we have the capacity to connect with others.</p> <p>“But what can be surprising is just how important social connections are to cognitive and physical health.</p> <p>“People who are socially isolated or who experience loneliness are more vulnerable to disease and decline.”</p> <p>Margaret Keohone, a participant of the study, said learning to navigate the internet “changed her life”.</p> <p>“Having this training changes people's lives and opens up their worlds, invigorates their minds and for lots of us gives us a completely different way of recognising our worth as we age,” said Margaret Keohone. </p> <p>“I was just slipping away into a slower way of life.”</p> <p><em>Images: Getty</em></p>

Technology

Placeholder Content Image

Use these 10 passwords at your own peril

<p dir="ltr">With cyberattacks increasing by the month, it’s crucial to have a strong grasp or what is - or isn’t - a strong enough password to hopefully deter hackers.</p> <p dir="ltr">And with the cybercriminals capable of unveiling 921 passwords each second, people all over have become easy targets with their choices - whether that’s from including easy-to-guess terms like the word “password” itself or common sequences like “123456” and “qwerty” - as reported by <em>9News</em>.</p> <p dir="ltr">And as analysis by <em>CyberNews</em> has revealed, just 13 per cent of leaked passwords - from a review of almost 15 billion - were actually unique. </p> <p dir="ltr">According to them, two of the most popular names to appear in the selection were “Eva” and “Alex”, with a total of seven million respective uses. “Food” and “pie” were regulars, as well as the season “summer”.</p> <p dir="ltr">While these might be easy for users to remember, and appealing for that, My Business general manager Phil Parisis had a clear warning in store when he explained that “if it’s easy for you to remember, chances are it’s also easy for cybercriminals to guess.</p> <p dir="ltr">“That's not only putting you at risk but also exposing the businesses and corporations that you work for.</p> <p dir="ltr">"Another common inclusion is a year - often their birth year or another significant year in their life."</p> <p dir="ltr">Having the right information and advice at your disposal is crucial when it comes to protecting yourself, so with all of this in mind, the 10 passwords that you should avoid at all costs the next time you’re asked to come to up with one are the following: </p> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">123456</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">123456789</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">qwerty</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">password</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">12345</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">qwerty123</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">1q2w3e</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">12345678</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">111111</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">1234567890</p> </li> </ul> <p dir="ltr">To further protect yourself, it can be of great benefit to mix your upper and lowercase letters in your passwords, as well as throwing in a range of symbols and numbers to further disguise your intended terms. </p> <p dir="ltr">For example, and as <em>9News</em> noted, the likes of “password123” is considered a weak password, while something like “MySecurePa$$word785!” is considered much stronger, and much more protected.</p> <p dir="ltr">And the Australian Cyber Security Centre have further suggested that internet users consider using passphrases - a number of random words put together in a string -, as they’re “harder to guess but easier to remember” than common passwords. But most of all, they recommend avoiding obvious, significant, and easy-to-guess words, like the names of children and beloved family pets. </p> <p dir="ltr"><em>Images: 9News </em></p>

Technology

Placeholder Content Image

AI to Z: all the terms you need to know to keep up in the AI hype age

<p>Artificial intelligence (AI) is becoming ever more prevalent in our lives. It’s no longer confined to certain industries or research institutions; AI is now for everyone.</p> <p>It’s hard to dodge the deluge of AI content being produced, and harder yet to make sense of the many terms being thrown around. But we can’t have conversations about AI without understanding the concepts behind it.</p> <p>We’ve compiled a glossary of terms we think everyone should know, if they want to keep up.</p> <h2>Algorithm</h2> <p><a href="https://theconversation.com/what-is-an-algorithm-how-computers-know-what-to-do-with-data-146665">An algorithm</a> is a set of instructions given to a computer to solve a problem or to perform calculations that transform data into useful information. </p> <h2>Alignment problem</h2> <p>The alignment problem refers to the discrepancy between our intended objectives for an AI system and the output it produces. A misaligned system can be advanced in performance, yet behave in a way that’s against human values. We saw an example of this <a href="https://www.theguardian.com/technology/2018/jan/12/google-racism-ban-gorilla-black-people">in 2015</a> when an image-recognition algorithm used by Google Photos was found auto-tagging pictures of black people as “gorillas”. </p> <h2>Artificial General Intelligence (AGI)</h2> <p><a href="https://theconversation.com/not-everything-we-call-ai-is-actually-artificial-intelligence-heres-what-you-need-to-know-196732">Artificial general intelligence</a> refers to a hypothetical point in the future where AI is expected to match (or surpass) the cognitive capabilities of humans. Most AI experts agree this will happen, but disagree on specific details such as when it will happen, and whether or not it will result in AI systems that are fully autonomous.</p> <h2>Artificial Neural Network (ANN)</h2> <p>Artificial neural networks are computer algorithms used within a branch of AI called <a href="https://aws.amazon.com/what-is/deep-learning/">deep learning</a>. They’re made up of layers of interconnected nodes in a way that mimics the <a href="https://www.ibm.com/topics/neural-networks">neural circuitry</a> of the human brain. </p> <h2>Big data</h2> <p>Big data refers to datasets that are much more massive and complex than traditional data. These datasets, which greatly exceed the storage capacity of household computers, have helped current AI models perform with high levels of accuracy.</p> <p>Big data can be characterised by four Vs: “volume” refers to the overall amount of data, “velocity” refers to how quickly the data grow, “veracity” refers to how complex the data are, and “variety” refers to the different formats the data come in.</p> <h2>Chinese Room</h2> <p>The <a href="https://ethics.org.au/thought-experiment-chinese-room-argument/">Chinese Room</a> thought experiment was first proposed by American philosopher John Searle in 1980. It argues a computer program, no matter how seemingly intelligent in its design, will never be conscious and will remain unable to truly understand its behaviour as a human does. </p> <p>This concept often comes up in conversations about AI tools such as ChatGPT, which seem to exhibit the traits of a self-aware entity – but are actually just presenting outputs based on predictions made by the underlying model.</p> <h2>Deep learning</h2> <p>Deep learning is a category within the machine-learning branch of AI. Deep-learning systems use advanced neural networks and can process large amounts of complex data to achieve higher accuracy.</p> <p>These systems perform well on relatively complex tasks and can even exhibit human-like intelligent behaviour.</p> <h2>Diffusion model</h2> <p>A diffusion model is an AI model that learns by adding random “noise” to a set of training data before removing it, and then assessing the differences. The objective is to learn about the underlying patterns or relationships in data that are not immediately obvious. </p> <p>These models are designed to self-correct as they encounter new data and are therefore particularly useful in situations where there is uncertainty, or if the problem is very complex.</p> <h2>Explainable AI</h2> <p>Explainable AI is an emerging, interdisciplinary field concerned with creating methods that will <a href="https://theconversation.com/how-explainable-artificial-intelligence-can-help-humans-innovate-151737">increase</a> users’ trust in the processes of AI systems. </p> <p>Due to the inherent complexity of certain AI models, their internal workings are often opaque, and we can’t say with certainty why they produce the outputs they do. Explainable AI aims to make these “black box” systems more transparent.</p> <h2>Generative AI</h2> <p>These are AI systems that generate new content – including text, image, audio and video content – in response to prompts. Popular examples include ChatGPT, DALL-E 2 and Midjourney. </p> <h2>Labelling</h2> <p>Data labelling is the process through which data points are categorised to help an AI model make sense of the data. This involves identifying data structures (such as image, text, audio or video) and adding labels (such as tags and classes) to the data.</p> <p>Humans do the labelling before machine learning begins. The labelled data are split into distinct datasets for training, validation and testing.</p> <p>The training set is fed to the system for learning. The validation set is used to verify whether the model is performing as expected and when parameter tuning and training can stop. The testing set is used to evaluate the finished model’s performance. </p> <h2>Large Language Model (LLM)</h2> <p>Large language models (LLM) are trained on massive quantities of unlabelled text. They analyse data, learn the patterns between words and can produce human-like responses. Some examples of AI systems that use large language models are OpenAI’s GPT series and Google’s BERT and LaMDA series.</p> <h2>Machine learning</h2> <p>Machine learning is a branch of AI that involves training AI systems to be able to analyse data, learn patterns and make predictions without specific human instruction.</p> <h2>Natural language processing (NLP)</h2> <p>While large language models are a specific type of AI model used for language-related tasks, natural language processing is the broader AI field that focuses on machines’ ability to learn, understand and produce human language.</p> <h2>Parameters</h2> <p>Parameters are the settings used to tune machine-learning models. You can think of them as the programmed weights and biases a model uses when making a prediction or performing a task.</p> <p>Since parameters determine how the model will process and analyse data, they also determine how it will perform. An example of a parameter is the number of neurons in a given layer of the neural network. Increasing the number of neurons will allow the neural network to tackle more complex tasks – but the trade-off will be higher computation time and costs. </p> <h2>Responsible AI</h2> <p>The responsible AI movement advocates for developing and deploying AI systems in a human-centred way.</p> <p>One aspect of this is to embed AI systems with rules that will have them adhere to ethical principles. This would (ideally) prevent them from producing outputs that are biased, discriminatory or could otherwise lead to harmful outcomes. </p> <h2>Sentiment analysis</h2> <p>Sentiment analysis is a technique in natural language processing used to identify and interpret the <a href="https://aws.amazon.com/what-is/sentiment-analysis/">emotions behind a text</a>. It captures implicit information such as, for example, the author’s tone and the extent of positive or negative expression.</p> <h2>Supervised learning</h2> <p>Supervised learning is a machine-learning approach in which labelled data are used to train an algorithm to make predictions. The algorithm learns to match the labelled input data to the correct output. After learning from a large number of examples, it can continue to make predictions when presented with new data.</p> <h2>Training data</h2> <p>Training data are the (usually labelled) data used to teach AI systems how to make predictions. The accuracy and representativeness of training data have a major impact on a model’s effectiveness.</p> <h2>Transformer</h2> <p>A transformer is a type of deep-learning model used primarily in natural language processing tasks.</p> <p>The transformer is designed to process sequential data, such as natural language text, and figure out how the different parts relate to one another. This can be compared to how a person reading a sentence pays attention to the order of the words to understand the meaning of the sentence as a whole. </p> <p>One example is the generative pre-trained transformer (GPT), which the ChatGPT chatbot runs on. The GPT model uses a transformer to learn from a large corpus of unlabelled text. </p> <h2>Turing Test</h2> <p>The Turing test is a machine intelligence concept first introduced by computer scientist Alan Turing in 1950.</p> <p>It’s framed as a way to determine whether a computer can exhibit human intelligence. In the test, computer and human outputs are compared by a human evaluator. If the outputs are deemed indistinguishable, the computer has passed the test.</p> <p>Google’s <a href="https://www.washingtonpost.com/technology/2022/06/17/google-ai-lamda-turing-test/">LaMDA</a> and OpenAI’s <a href="https://mpost.io/chatgpt-passes-the-turing-test/">ChatGPT</a> have been reported to have passed the Turing test – although <a href="https://www.thenewatlantis.com/publications/the-trouble-with-the-turing-test">critics say</a> the results reveal the limitations of using the test to compare computer and human intelligence.</p> <h2>Unsupervised learning</h2> <p>Unsupervised learning is a machine-learning approach in which algorithms are trained on unlabelled data. Without human intervention, the system explores patterns in the data, with the goal of discovering unidentified patterns that could be used for further analysis.</p> <p><em>Image credits: Getty Images</em></p> <p><em>This article originally appeared on <a href="https://theconversation.com/ai-to-z-all-the-terms-you-need-to-know-to-keep-up-in-the-ai-hype-age-203917" target="_blank" rel="noopener">The Conversation</a>. </em></p>

Technology

Placeholder Content Image

Microwaving solar panels makes them easier to recycle

<div> <p><a href="https://cosmosmagazine.com/news/solar-cells-essential-for-brighter-future/" target="_blank" rel="noreferrer noopener">Solar cell</a> manufacturing and recycling should be easier with a surprising new discovery by Macquarie University scientists – that uses a commercial microwave.</p> <p>While they’re being made, the silicon in solar panels goes through a process called “annealing”, which involves heating the materials to temperatures well above 500°C.</p> <p>Annealing is usually done with ovens. But a study <a href="https://doi.org/10.1063/5.0127896" target="_blank" rel="noreferrer noopener">published</a> in Applied Physics Letters shows that microwaves are not only faster and more energy efficient for the job, but make the panels much easier to disassemble, and thus recycle, at the end of life.</p> <p>This is because microwave radiation heats individual substances – like the water in food, or silicon.</p> <p>“It just heats the very thin layer of silicon rather than heating the bulk of the materials around, and it’s really fast,” says lead author Dr Binesh Puthen Veettil, a researcher at Macquarie University’s School of Engineering.</p> <p>This also makes the process easier, because the microwave doesn’t have to be as carefully cleaned.</p> <p>“In most of the high temperature processes, lots of contaminants come out of the walls of the oven. But in this case, the heat is flowing from the silicon outwards, while everything else is at room temperature, it’s kind of a pseudo room temperature process where the contaminants don’t get diffused from outside,” says Veettil.</p> <p>“But the thing we are most excited about is the benefit to recycling.”</p> <p>Currently, solar cell recycling is a very <a href="https://cosmosmagazine.com/earth/sustainability/solar-panel-recycling/" target="_blank" rel="noreferrer noopener">energy intense process</a> which involves crushing up the panels and heating them to temperatures of at least 1000°C, so that all of the expensive elements can be extracted.</p> <p>This method destroys some of the reusable solar cell components: particularly, the toughened glass on the top of the panel.</p> <p>“This glass contains most of the weight of the solar panel,” explains Veettil.</p> <p>That glass is stuck to a layer of plastic, usually ethylene vinyl acetate, which keeps the silicon plate underneath dry. This plastic is too hard to remove, so the whole thing is smashed up, with the glass sold as scrap.</p> <p>But microwaving the silicon specifically softens the plastic, making it easy to peel.</p> <p>“You can just peel off the silicon cell, without destroying the glass, and you can reuse that expensive glass,” says Veettil.</p> <p>“If you can reuse the glass, the recycling will pay for itself.”</p> <p>Plus, it doesn’t need the same high temperatures, or extra chemicals needed to wash and dissolve the plastic.</p> <p>For now, the process is lab-based – and only for solar panels that fit in a commercial microwave.</p> <p>“Initially, when we started the research, we used a laboratory microwave that we purchased from a US company,” says Veettil.</p> <p>“And we after that, we purchased some kitchen microwaves locally, and modified it to suit our purposes.”</p> <p>This modification involved heat-proofing the microwave so that it could handle the annealing temperatures.</p> <p>“It goes from room temperature to 500° Celsius in just two seconds,” says Veettil. (Depending on the size of the sample: bigger things take longer.)</p> <p>But the researchers have a patent pending for the recycling process, and are now investigating how to improve and commercialise it.</p> <p>“We are hoping that with some industry collaboration and funding, we can scale it up,” says Veettil.</p> <p>“Recycling needs to be meet two conditions: it should be environmentally friendly, and second, it should pay for itself.</p> <p>“I’m pretty sure, with the numbers I have in mind, it will it will be profitable and then the market will take care of itself and it organically grow recycling centres. That’s my hope.”</p> </div> <div id="contributors"> <p><em>This article was originally published on <a href="https://cosmosmagazine.com/technology/microwaving-solar-panels-recycling/" target="_blank" rel="noopener">cosmosmagazine.com</a> and was written by Ellen Phiddian.</em></p> <p><em>Images: Getty</em></p> </div>

Technology

Placeholder Content Image

Will AI ever reach human-level intelligence? We asked 5 experts

<p>Artificial intelligence has changed form in recent years.</p> <p>What started in the public eye as a burgeoning field with promising (yet largely benign) applications, has snowballed into a <a href="https://www.grandviewresearch.com/industry-analysis/artificial-intelligence-ai-market">more than US$100 billion</a> industry where the heavy hitters – Microsoft, Google and OpenAI, to name a few – seem <a href="https://theconversation.com/bard-bing-and-baidu-how-big-techs-ai-race-will-transform-search-and-all-of-computing-199501">intent on out-competing</a> one another.</p> <p>The result has been increasingly sophisticated large language models, often <a href="https://theconversation.com/everyones-having-a-field-day-with-chatgpt-but-nobody-knows-how-it-actually-works-196378">released in haste</a> and without adequate testing and oversight. </p> <p>These models can do much of what a human can, and in many cases do it better. They can beat us at <a href="https://theconversation.com/an-ai-named-cicero-can-beat-humans-in-diplomacy-a-complex-alliance-building-game-heres-why-thats-a-big-deal-195208">advanced strategy games</a>, generate <a href="https://theconversation.com/ai-art-is-everywhere-right-now-even-experts-dont-know-what-it-will-mean-189800">incredible art</a>, <a href="https://theconversation.com/breast-cancer-diagnosis-by-ai-now-as-good-as-human-experts-115487">diagnose cancers</a> and compose music.</p> <p>There’s no doubt AI systems appear to be “intelligent” to some extent. But could they ever be as intelligent as humans? </p> <p>There’s a term for this: artificial general intelligence (AGI). Although it’s a broad concept, for simplicity you can think of AGI as the point at which AI acquires human-like generalised cognitive capabilities. In other words, it’s the point where AI can tackle any intellectual task a human can.</p> <p>AGI isn’t here yet; current AI models are held back by a lack of certain human traits such as true creativity and emotional awareness. </p> <p>We asked five experts if they think AI will ever reach AGI, and five out of five said yes.</p> <p>But there are subtle differences in how they approach the question. From their responses, more questions emerge. When might we achieve AGI? Will it go on to surpass humans? And what constitutes “intelligence”, anyway? </p> <p>Here are their detailed responses. </p> <p><strong>Paul Formosa: AI and Philosophy of Technology</strong></p> <p>AI has already achieved and surpassed human intelligence in many tasks. It can beat us at strategy games such as Go, chess, StarCraft and Diplomacy, outperform us on many <a href="https://www.nature.com/articles/s41467-022-34591-0" target="_blank" rel="noopener">language performance</a>benchmarks, and write <a href="https://www.theatlantic.com/technology/archive/2022/12/chatgpt-ai-writing-college-student-essays/672371/" target="_blank" rel="noopener">passable undergraduate</a> university essays. </p> <p>Of course, it can also make things up, or “hallucinate”, and get things wrong – but so can humans (although not in the same ways). </p> <p>Given a long enough timescale, it seems likely AI will achieve AGI, or “human-level intelligence”. That is, it will have achieved proficiency across enough of the interconnected domains of intelligence humans possess. Still, some may worry that – despite AI achievements so far – AI will not really be “intelligent” because it doesn’t (or can’t) understand what it’s doing, since it isn’t conscious. </p> <p>However, the rise of AI suggests we can have intelligence without consciousness, because intelligence can be understood in functional terms. An intelligent entity can do intelligent things such as learn, reason, write essays, or use tools. </p> <p>The AIs we create may never have consciousness, but they are increasingly able to do intelligent things. In some cases, they already do them at a level beyond us, which is a trend that will likely continue.</p> <p><strong>Christina Maher: Computational Neuroscience and Biomedical Engineering</strong></p> <p>AI will achieve human-level intelligence, but perhaps not anytime soon. Human-level intelligence allows us to reason, solve problems and make decisions. It requires many cognitive abilities including adaptability, social intelligence and learning from experience. </p> <p>AI already ticks many of these boxes. What’s left is for AI models to learn inherent human traits such as critical reasoning, and understanding what emotion is and which events might prompt it. </p> <p>As humans, we learn and experience these traits from the moment we’re born. Our first experience of “happiness” is too early for us to even remember. We also learn critical reasoning and emotional regulation throughout childhood, and develop a sense of our “emotions” as we interact with and experience the world around us. Importantly, it can take many years for the human brain to develop such intelligence. </p> <p>AI hasn’t acquired these capabilities yet. But if humans can learn these traits, AI probably can too – and maybe at an even faster rate. We are still discovering how AI models should be built, trained, and interacted with in order to develop such traits in them. Really, the big question is not if AI will achieve human-level intelligence, but when – and how.</p> <p><strong>Seyedali Mirjalili: AI and Swarm Intelligence</strong></p> <p>I believe AI will surpass human intelligence. Why? The past offers insights we can't ignore. A lot of people believed tasks such as playing computer games, image recognition and content creation (among others) could only be done by humans – but technological advancement proved otherwise. </p> <p>Today the rapid advancement and adoption of AI algorithms, in conjunction with an abundance of data and computational resources, has led to a level of intelligence and automation previously unimaginable. If we follow the same trajectory, having more generalised AI is no longer a possibility, but a certainty of the future. </p> <p>It is just a matter of time. AI has advanced significantly, but not yet in tasks requiring intuition, empathy and creativity, for example. But breakthroughs in algorithms will allow this. </p> <p>Moreover, once AI systems achieve such human-like cognitive abilities, there will be a snowball effect and AI systems will be able to improve themselves with minimal to no human involvement. This kind of “automation of intelligence” will profoundly change the world. </p> <p>Artificial general intelligence remains a significant challenge, and there are ethical and societal implications that must be addressed very carefully as we continue to advance towards it.</p> <p><strong>Dana Rezazadegan: AI and Data Science</strong></p> <p>Yes, AI is going to get as smart as humans in many ways – but exactly how smart it gets will be decided largely by advancements in <a href="https://thequantuminsider.com/2020/01/23/four-ways-quantum-computing-will-change-artificial-intelligence-forever/" target="_blank" rel="noopener">quantum computing</a>. </p> <p>Human intelligence isn’t as simple as knowing facts. It has several aspects such as creativity, emotional intelligence and intuition, which current AI models can mimic, but can’t match. That said, AI has advanced massively and this trend will continue. </p> <p>Current models are limited by relatively small and biased training datasets, as well as limited computational power. The emergence of quantum computing will transform AI’s capabilities. With quantum-enhanced AI, we’ll be able to feed AI models multiple massive datasets that are comparable to humans’ natural multi-modal data collection achieved through interacting with the world. These models will be able to maintain fast and accurate analyses. </p> <p>Having an advanced version of continual learning should lead to the development of highly sophisticated AI systems which, after a certain point, will be able to improve themselves without human input. </p> <p>As such, AI algorithms running on stable quantum computers have a high chance of reaching something similar to generalised human intelligence – even if they don’t necessarily match every aspect of human intelligence as we know it.</p> <p><strong>Marcel Scharth: Machine Learning and AI Alignment</strong></p> <p>I think it’s likely AGI will one day become a reality, although the timeline remains highly uncertain. If AGI is developed, then surpassing human-level intelligence seems inevitable. </p> <p>Humans themselves are proof that highly flexible and adaptable intelligence is allowed by the laws of physics. There’s no <a href="https://en.wikipedia.org/wiki/Church%E2%80%93Turing_thesis" target="_blank" rel="noopener">fundamental reason</a> we should believe that machines are, in principle, incapable of performing the computations necessary to achieve human-like problem solving abilities. </p> <p>Furthermore, AI has <a href="https://philarchive.org/rec/SOTAOA" target="_blank" rel="noopener">distinct advantages</a> over humans, such as better speed and memory capacity, fewer physical constraints, and the potential for more rationality and recursive self-improvement. As computational power grows, AI systems will eventually surpass the human brain’s computational capacity. </p> <p>Our primary challenge then is to gain a better understanding of intelligence itself, and knowledge on how to build AGI. Present-day AI systems have many limitations and are nowhere near being able to master the different domains that would characterise AGI. The path to AGI will likely require unpredictable breakthroughs and innovations. </p> <p>The median predicted date for AGI on <a href="https://www.metaculus.com/questions/5121/date-of-artificial-general-intelligence/" target="_blank" rel="noopener">Metaculus</a>, a well-regarded forecasting platform, is 2032. To me, this seems too optimistic. A 2022 <a href="https://aiimpacts.org/2022-expert-survey-on-progress-in-ai/" target="_blank" rel="noopener">expert survey</a> estimated a 50% chance of us achieving human-level AI by 2059. I find this plausible.</p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article originally appeared on <a href="https://theconversation.com/will-ai-ever-reach-human-level-intelligence-we-asked-5-experts-202515" target="_blank" rel="noopener">The Conversation</a>. </em></p>

Technology

Placeholder Content Image

"This doesn’t feel right, does it?": Photographer admits Sony prize-winning photo was AI generated

<p>A German photographer is refusing an award for his prize-winning shot after admitting to being a “cheeky monkey”, revealing the image was generated using artificial intelligence.</p> <p>The artist, Boris Eldagsen, shared on his website that he would not be accepting the prestigious award for the creative open category, which he won at <a href="https://www.oversixty.co.nz/entertainment/art/winners-of-sony-world-photography-awards-revealed" target="_blank" rel="noopener">2023’s Sony world photography awards</a>.</p> <p>The winning photograph showcased a black and white image of two women from different generations.</p> <p>Eldagsen, who studied photography and visual arts at the Art Academy of Mainz, conceptual art and intermedia at the Academy of Fine Arts in Prague, and fine art at the Sarojini Naidu School of Arts and Communication in Hyderabad released a statement on his website, admitting he “applied as a cheeky monkey” to find out if competitions would be prepared for AI images to enter. “They are not,” he revealed.</p> <p>“We, the photo world, need an open discussion,” Eldagsen said.</p> <p>“A discussion about what we want to consider photography and what not. Is the umbrella of photography large enough to invite AI images to enter – or would this be a mistake?</p> <p>“With my refusal of the award I hope to speed up this debate.”</p> <p>Eldagsen said this was an “historic moment” as it was the fist AI image to have won a prestigious international photography competition, adding “How many of you knew or suspected that it was AI generated? Something about this doesn’t feel right, does it?</p> <p>“AI images and photography should not compete with each other in an award like this. They are different entities. AI is not photography. Therefore I will not accept the award.”</p> <p>The photographer suggested donating the prize to a photo festival in Odesa, Ukraine.</p> <p>It comes as a heated debate over the use and safety concerns of AI continue, with some going as far as to issue apocalyptic warnings that the technology may be close to causing irreparable damage to the human experience.</p> <p>Google’s chief executive, Sundar Pirchai said, “It can be very harmful if deployed wrongly and we don’t have all the answers there yet – and the technology is moving fast. So, does that keep me up at night? Absolutely.”</p> <p>A spokesperson for the World Photography Organisation admitted that the prize-winning photographer had confirmed the “co-creation” of the image using AI to them prior to winning the award.</p> <p>“The creative category of the open competition welcomes various experimental approaches to image making from cyanotypes and rayographs to cutting-edge digital practices. As such, following our correspondence with Boris and the warranties he provided, we felt that his entry fulfilled the criteria for this category, and we were supportive of his participation.</p> <p>“Additionally, we were looking forward to engaging in a more in-depth discussion on this topic and welcomed Boris’ wish for dialogue by preparing questions for a dedicated Q&amp;A with him for our website.</p> <p>“As he has now decided to decline his award we have suspended our activities with him and in keeping with his wishes have removed him from the competition. Given his actions and subsequent statement noting his deliberate attempts at misleading us, and therefore invalidating the warranties he provided, we no longer feel we are able to engage in a meaningful and constructive dialogue with him.</p> <p>“We recognise the importance of this subject and its impact on image-making today. We look forward to further exploring this topic via our various channels and programmes and welcome the conversation around it. While elements of AI practices are relevant in artistic contexts of image-making, the awards always have been and will continue to be a platform for championing the excellence and skill of photographers and artists working in the medium.”</p> <p><em>Image credit: Sony World Photography Awards</em></p>

Technology

Placeholder Content Image

Screwed over: how Apple and others are making it impossible to get a cheap and easy phone repair

<p>If Apple and other tech companies have their way, it will only become harder to have our phones and other devices repaired by third-party businesses.</p> <p>Smartphones and many other tech devices are increasingly being designed in ways that make it challenging to repair or replace individual components.</p> <p>This might involve soldering the processor and flash memory to the motherboard, gluing components together unnecessarily, or using non-standard <a href="https://www.ifixit.com/News/14279/apples-diabolical-plan-to-screw-your-iphone">pentalobe screws</a> which make replacements problematic.</p> <p>Many submissions to an Australian “right to repair” <a href="https://www.pc.gov.au/inquiries/current/repair/submissions#initial">inquiry</a> have called on tech manufacturers to provide a fair and competitive market for repairs, and produce products that are easily repairable. </p> <p>The <a href="https://www.pc.gov.au/inquiries/current/repair/issues/repair-issues.pdf">right to repair</a> refers to consumers’ ability to have their products repaired at a competitive price. This includes being able to choose a repairer, rather than being forced by default to use the device manufacturer’s services. </p> <p>But it seems Apple doesn’t want its customers to fix their <a href="https://www.vice.com/en/article/evmeya/apple-iphone-right-to-repair-california">iPhones</a>or <a href="https://www.inputmag.com/culture/apples-repair-policies-are-utterly-shameful-and-shouldnt-be-allowed-e-waste-recycling-macbooks-t2">Macbooks</a> themselves. The company has <a href="https://www.vice.com/en/article/nz85y7/apple-is-lobbying-against-your-right-to-repair-iphones-new-york-state-records-confirm">lobbied against</a> the right to repair in the United States and has <a href="https://www.npr.org/2020/11/18/936268845/apple-agrees-to-pay-113-million-to-settle-batterygate-case-over-iphone-slowdowns">been accused of deliberately slowing down</a> iPhones with older batteries.</p> <p><a href="https://www.pewtrusts.org/en/research-and-analysis/blogs/stateline/2019/10/16/tech-giants-fight-digital-right-to-repair-bills">Opposition</a> against the right to repair from tech companies is to be expected. Cornering consumers into using their service centres increases their revenue and extends their market domination.</p> <p>In its defence, Apple has said <a href="https://time.com/4828099/farmers-and-apple-fight-over-the-toolbox/">third-party repairers</a> could use lower quality parts and also make devices vulnerable to hackers. </p> <p>It also defended its <a href="https://venturebeat.com/2019/08/14/apple-defends-iphone-unauthorized-battery-warning-as-a-safety-feature/">battery warning indication</a> as a “safety” feature, wherein it started to alert users if their phone’s replacement battery hadn’t come from a certified Apple repairer. </p> <p>In the US, Apple’s <a href="https://support.apple.com/irp-program">independent repair provider program</a> grants certain providers access to the parts and resources needed to fix its devices. Independent repair shops in <a href="https://www.apple.com/newsroom/2020/07/apple-expands-iphone-repair-services-to-hundreds-of-new-locations-across-the-us/">32 countries</a> can now apply, but the scheme has yet to extend outside the US.</p> <h2>Impact on users</h2> <p>With the iPhone 12 — the latest iPhone offering — Apple has <a href="https://www.ifixit.com/News/45921/is-this-the-end-of-the-repairable-iphone">made it even harder</a> for third-party repairers to fix the device, thereby increasing users’ reliance on its own services. </p> <p>Apple has hiked its <a href="https://support.apple.com/en-au/iphone/repair/service/screen-replacement">repair charges</a> for iPhone 12 by more than 40%, compared with the iPhone 11. It is <a href="https://support.apple.com/en-au/iphone/repair/service/screen-replacement">charging</a> more than A$359 to fix an iPhone 12 screen outside of warranty and A$109 to replace the battery. </p> <p>Historically, third-party repairers have been a cheaper option. But using a third-party repairer for an iPhone 12 could render some phone features, such as the camera, <a href="https://www.theverge.com/2020/10/30/21542242/apple-iphone-12-third-party-repairs-ifixit-camera-module-replacement">almost inoperable</a>.</p> <p>According to reports, fixing the iPhone 12’s camera requires <a href="https://9to5mac.com/2020/10/30/iphone-12-camera-repair/">Apple’s proprietary</a> system configuration app, available only to the company’s own authorised technicians. </p> <p>It’s not just Apple, either. <a href="https://www.techradar.com/au/news/samsungs-galaxy-s20-ultra-is-unsurprisingly-difficult-to-repair">Samsung’s</a> flagship phones are also quite tricky for third-party repairers to fix.</p> <h2>Impact on environment</h2> <p>When certain parts for repairs aren’t available, manufacturers will produce new phones instead, consuming <a href="https://www.envirotech-online.com/news/environmental-laboratory/7/breaking-news/how-do-smartphones-affect-the-environment/48339">more energy and resources</a>. In fact, manufacturing one smartphone <a href="https://www-sciencedirect-com.ezproxy.cqu.edu.au/science/article/pii/S095965261733233X">consumes</a> as much energy as using it for ten years.</p> <p>As smartphones become harder to repair, electronic waste will grow. Apple and Samsung both cited environmental benefits when they announced they would no longer ship <a href="https://theconversation.com/apples-iphone-12-comes-without-a-charger-a-smart-waste-reduction-move-or-clever-cash-grab-148189">chargers</a> with their phones. </p> <p>Yet, they’ve turned a blind eye to the environmental damage that would arise from completely cornering the repair market.</p> <p>The average Australian home has <a href="https://thinktv.com.au/facts-and-stats/australian-homes-are-experiencing-a-screen-explosion/">6.7 devices</a>, including televisions, personal computers, laptops, tablets and smartphones. With diminishing opportunities for repair, the environmental burden from disposing of these devices will increase.</p> <h2>What is being done?</h2> <p>Phone giants make it tough for third-party repairers to do their job in a variety of ways. This includes constantly changing designs, adding hurdles to the repair process, and restricting access to parts, diagnostic software and repair documentation. </p> <p>Meanwhile, consumers are left with broken phones and huge repair bills — and repairers are left with less business.</p> <p>The fight to remove barriers to repair is gaining momentum outside Australia, too, in countries including <a href="https://www.policyalternatives.ca/publications/monitor/when-will-canadians-have-right-repair">Canada</a>, the <a href="https://www.thetimes.co.uk/article/right-to-repair-means-spare-parts-for-household-appliances-mr5gmkjxr">United Kingdom</a> and the <a href="https://www.repair.org/legislation">United States</a>. Legislative reforms have been introduced in the <a href="https://repair.eu/news/european-parliament-calls-for-ambitious-right-to-repair/">European Union</a> and <a href="https://www.vice.com/en/article/93wy8v/newly-passed-right-to-repair-law-will-fundamentally-change-tesla-repair">Massachusetts</a>.</p> <p>France has introduced a <a href="https://www.ecologie.gouv.fr/indice-reparabilite">Repairability Index</a> requiring electrical and electronic equipment companies to inform consumers about their products’ repairability on a scale of one to ten. </p> <p>This takes into account the ease of repairability, availability and price of spare parts and availability of technical repair documents.</p> <h2>The path moving forward</h2> <p>Until the push for right to repair legislative reform gathers pace globally, consumers will have little choice but to pay up to big companies to access their authorised repair services. </p> <p>If they don’t, they may risk losing their warranty, ending up with a non-functional device and even <a href="https://static1.squarespace.com/static/5e449c8c3ef68d752f3e70dc/t/5ea8a6d93b485d0feb9b5d6b/1588111098207/Report_RightToRepair_HanleyKellowayVaheesan-1.pdf">infringing</a> upon the manufacturers’ software copyrights.</p> <p>Ideally, phone companies (and others) would assist users with the repair process by providing replacement parts, repair documentation and diagnostic tools to third-party repairers. </p> <p>This would also help <a href="https://www.apple.com/au/newsroom/2020/07/apple-commits-to-be-100-percent-carbon-neutral-for-its-supply-chain-and-products-by-2030/">Apple</a> and <a href="https://www.samsung.com/us/aboutsamsung/sustainability/environment/">Samsung</a> reduce their carbon footprint and achieve their environmental goals.</p> <p>Although the way things are going, it’s unlikely tech companies will be able to escape their self-inflicted repair obligations. In the past, Apple CEO Jeff Williams has <a href="https://www.apple.com/newsroom/2019/08/apple-offers-customers-even-more-options-for-safe-reliable-repairs/">said, "</a>we believe the safest and most reliable repair is one handled by a trained technician using genuine parts that have been properly engineered and rigorously tested."</p> <p>But with only so much workforce available even to Apple, sharing the load with smaller repairers will help. </p> <p>And for consumers’ benefit, the right to repair legislation must be taken seriously, with consistent repairability scores developed across the globe.</p> <p><em>Image credits: Getty Images</em></p> <p><em>This article originally appeared on <a href="https://theconversation.com/screwed-over-how-apple-and-others-are-making-it-impossible-to-get-a-cheap-and-easy-phone-repair-156871" target="_blank" rel="noopener">The Conversation</a>. </em></p>

Technology