What We’re Thinking

Integrity Institute members and staff are leading voices in the integrity field and bring years of technical expertise to tackling these problems. These posts represent their individual thoughts, analysis, and ideas about contemporary issues in the integrity space.

1 Year at the Integrity Institute: What I’ve Learned
Guest User Guest User

1 Year at the Integrity Institute: What I’ve Learned

By Abby Lawson

The Integrity Institute hit its 3rd birthday this month. Around the same time, I also reached 1 year of working at the Institute in a role trying to support the development of a think tank for integrity workers. On hitting my one year mark, I reflected on what I’ve learned from the past year working to bring the expertise of trust and safety professionals to the public conversation.

Read More
Why Is Instagram Search More Harmful Than Google Search?
Jeff Allen Jeff Allen

Why Is Instagram Search More Harmful Than Google Search?

An analysis of why Instagram search is more harmful than Google Search. We dive into how Instagram search is designed, compare to how Google Search is designed, and highlight how Instagram’s design choices lead to a less safe experience.

Read More
Questions for Platforms on Child Safety for Congressional Record
Multiple Authors Multiple Authors

Questions for Platforms on Child Safety for Congressional Record

By Jeff Allen, Abby Lawson, Spencer Gurley, Alexis Crews, Jenn Louie, Matt Motyl, Gabe Freeman, Vaishnavi J, Sarah Oh, Davinia Santimano, and Sarah Vieweg

Following the Senate hearing on child safety online, Senators will be sending written questions to the CEOs of tech companies. Integrity Institute prepared additional questions that could serve as a guide for Senators’ written questions to the CEOs of tech companies.

Read More
Global Elections Playbook: AI Edition
Alexis Crews Alexis Crews

Global Elections Playbook: AI Edition

The influence of AI on the global election cycle is undeniable. While generative AI isn’t the sole determinant of election outcomes, its potential for misuse by nefarious entities cannot be ignored.

Read More