Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy
Rate it:
Open Preview
3%
Flag icon
sloshing
3%
Flag icon
mathematics, once my refuge, was not only deeply entangled in the world’s problems but also fueling many of them.
3%
Flag icon
abetted
3%
Flag icon
wielding
3%
Flag icon
many of these models encoded human prejudice, misunderstanding, and bias into the software systems that increasingly managed our lives.
4%
Flag icon
Without feedback, however, a statistical engine can continue spinning out faulty and damaging analysis while never learning from its mistakes.
5%
Flag icon
The privileged, we’ll see time and again, are processed more by people, the masses by machines.
7%
Flag icon
as we’ll see throughout this book, the folks building WMDs routinely lack data for the behaviors they’re most interested in. So they substitute stand-in data, or proxies. They draw statistical correlations between a person’s zip code or language patterns and her potential to pay back a loan or handle a job. These correlations are discriminatory, and some of them are illegal.
8%
Flag icon
Our own values and desires influence our choices, from the data we choose to collect to the questions we ask. Models are opinions embedded in mathematics.
10%
Flag icon
And while Walter Quijano’s words were transcribed for the record, which could later be read and challenged in court, the workings of a recidivism model are tucked away in algorithms, intelligible only to a tiny elite.
10%
Flag icon
But in fact the model itself contributes to a toxic cycle and helps to sustain it. That’s a signature quality of a WMD.
11%
Flag icon
A key component of this suffering is the pernicious feedback loop. As we’ve seen, sentencing models that profile a person by his or her circumstances help to create the environment that justifies their assumptions. This destructive loop goes round and round, and in the process the model becomes more and more unfair.
12%
Flag icon
So to sum up, these are the three elements of a WMD: Opacity, Scale, and Damage. All of them will be present, to one degree or another, in the examples we’ll be covering.
15%
Flag icon
The risk ratings on the securities were designed to be opaque and mathematically intimidating, in part so that buyers wouldn’t perceive the true level of risk associated with the contracts they owned.
16%
Flag icon
chatter
16%
Flag icon
afloat.
16%
Flag icon
liaison
16%
Flag icon
tattered
16%
Flag icon
prowess,
17%
Flag icon
The statistical work, as it turned out, was highly transferable from the hedge fund to e-commerce—the biggest difference was that, rather than the movement of markets, I was now predicting people’s clicks.
17%
Flag icon
Their productivity indicates that they’re on the right track, and it translates into dollars. This leads to the fallacious conclusion that whatever they’re doing to bring in more money is good. It “adds value.” Otherwise, why would the market reward it?
17%
Flag icon
In both of these industries, the real world, with all of its messiness, sits apart. The inclination is to replace people with data trails, turning them into more effective shoppers, voters, or workers to optimize some objective.
17%
Flag icon
More and more, I worried about the separation between technical models and real people, and about the moral repercussions of that separation. In fact, I saw the same pattern emerging that I’d witnessed in finance: a false sense of security was leading to widespread use of imperfect models, self-serving definitions of success, and growing feedback loops.
17%
Flag icon
earnest.
17%
Flag icon
wringer.
17%
Flag icon
shrivel.
18%
Flag icon
hunches.
18%
Flag icon
scant
18%
Flag icon
ideal for higher education—“a way to deeper personal fulfillment, greater personal productivity and increased personal reward”—didn’t
18%
Flag icon
surmising
19%
Flag icon
egregious
19%
Flag icon
However, when you create a model from proxies, it is far simpler for people to game it. This is because proxies are easier to manipulate than the complicated reality they represent.
19%
Flag icon
maven.
19%
Flag icon
As people game the system, the proxy loses its effectiveness. Cheaters wind up as false positives.
19%
Flag icon
tumbling
20%
Flag icon
shortcoming
20%
Flag icon
sow
21%
Flag icon
As colleges position themselves to move up the U.S. News charts, they manage their student populations almost like an investment portfolio. We’ll see this often in the world of data, from advertising to politics.
21%
Flag icon
acing
22%
Flag icon
dismayed
22%
Flag icon
surrendered
22%
Flag icon
In a system in which cheating is the norm, following the rules amounts to a handicap.
22%
Flag icon
sap
23%
Flag icon
cinch
23%
Flag icon
rejiggered
23%
Flag icon
stint
23%
Flag icon
deemed
23%
Flag icon
scant
24%
Flag icon
If it was true during the early dot-com days that “nobody knows you’re a dog,” it’s the exact opposite today. We are ranked, categorized, and scored in hundreds of models, on the basis of our revealed preferences and patterns.
24%
Flag icon
Anywhere you find the combination of great need and ignorance, you’ll likely see predatory ads.
« Prev 1 3 4 5