Resources

Current AI Platforms

Current AI platforms we are using (Not an endorsement) Please note some of these platforms track and extract private information with their usage. 

Creative Generation

Read more

Below are all free to try with a small sample of trial credits. 

  • Night timeCafe – Generate images based on prompts. 
  • Pollo.ai – Make a text image into a short video clip
  • Brevi.ai – Make a song with your own lyrics

Activity: 
We are going to write a fun song about our course/ workplace/ subject of note, but let AI write the entire song and make the music which goes along with it. 

Quick Summary of Instructions 

  1. Open ChatGPT – Ask it to write song lyrics on topic 
  2. Copy output of lyrics
  3. Open BREVI AI (Free AI Song generator) select advanced, and paste in ChatGPT lyrics
  4. Assign a style, (Western, Jazz, 80s Rock) and generate a song
  5. Keep Lyrics and assign a different style to generate a different song

Large Language Models (LLMS)

Read more
  • ChatGPT
  • Gemini
  • Perplexity
  • Anthropic 
  • DeepSeek

Presentations

Read more
  • Gamma

Academic

Read more
  • Literature Review
    • Elicit
  • Research Synthesis
    • Perplexity
  • Coding Research
    • Confidence
  • Scanning Field of Study
    • The Lens 
    • Scinapse
  • Curiosity Extra for Research
    • Check out Future House AI – Four birds (Raven or Owl)


Kids 

Under Development

  • AI generated colouring books showing kids in non-traditional job roles/ indigenous kids in job roles. 
  • AI Generated books for kids (Indigenous and minority) 
    • This will link in with a project on kids uploading a photo, AI aged 20 years and then seeing themself in 25 non traditional job roles for their gender

Children who were raised on screens need more freedom out in the real world.

By Lenore SkenazyZach Rausch, and Jonathan Haidt

August 4, 2025


Cyber resilience

Mitigating Individual Cybersecurity and Privacy Risks
Read more

Anyone can face risks regardless of how many preventative steps they take. It is very important not to criticize or blame anyone for experiencing harm, even if they could have done more to protect themselves. This section outlines steps and best practices researchers can adopt before and during the research process to help minimize harmful consequences.

Data Privacy and Cybersecurity Practices There are a variety of preventative technical solutions that can be used to protect privacy if a researcher is at risk of being harassed, doxed, stalked, or blackmailed. Practicing baseline cybersecurity and privacy practices can shore up several immediate vulnerabilities. We recommend a researcher spends a few weeks before disseminating any research engaging in these basic operational security (OpSec) measures. Guides like Equality Labs’ Anti-Doxing Guide for Activists provide detailed, step-by-step instructions on protecting one’s online information and making digital devices more secure. First, researchers should assess what personal information is publicly available, a practice sometimes referred to as “self-doxxing.”

To minimize risk, consider the following steps: 

  • Search for personal information online: Google your name and check university websites for publicly listed details
  • Look up your address on sites like Whitepages.com, Spokeo, or other data aggregators
  • Check to see if your office location and office hours are posted on university websites
  • See if your phone number appears on your CV or other publicly available documents

Assess social media and pseudonyms: Search for any pseudonyms you have used, past or present, to see if they are linked to your full name or other identifying details. Review profiles on LinkedIn, Facebook, Twitter/X, and other platforms to check what appears in search results. Adjust the privacy settings on all accounts you are currently using to ensure only information you are comfortable sharing is visible.

Check older and archived accounts: Look for inactive accounts on older websites (e.g., MySpace, Flickr) Search the Internet Archive and archive.today to see if personal information is still accessible. Delete unused accounts when possible. If you are a long-time Twitter/X user, consider archiving your old tweets.

Secure shared documents: If using cloud-based platforms like Google Docs, ensure that files are only accessible to trusted collaborators.

Enlist a second opinion: Ask tech-savvy friends or colleagues to conduct similar searches—they may find information you overlooked.

*Copied from the AOIR Risky Research Report 2025 coauthored by Dr. Ryan Payne 


How to Research

Internet Research guide

AoIR Risky Research Working Group


Research Publications

Defining Biometrics With Privacy and Benefits: A Research Agenda

Ryan PayneBrett A. S. MartinSven Tuzovic, and Shasha Wang

This conceptual paper defines and gives examples of biometrics, explains how biometric tracking is currently used (e.g. to predict IQ), and presents innovative future uses of biometric tracking (e.g. to customize the price of products in real time). Specifically, this paper outlines a novel biometric pricing technology (BPT) which uses facial tracking to set the price of products using a new participatory dynamic pricing (vs. static pricing) system. 

Policy guidelines and recommendations on AI use in teaching and learning: A meta-synthesis study

Aaron A. Funa, Renz Alvin E. Gabay

As artificial intelligence becomes increasingly integral to educational systems, understanding policy guidelines and recommendations from various sources is crucial. This meta-synthesis examines AI policies and guidelines from peer-reviewed articles, reports, books, and websites from 2020 to 2024, with a focus on their implications for teaching and learning. Using a thematic analysis approach, the study categorizes findings into key themes and subthemes. Under the theme of policies and guidelines, notable subthemes include ethical AI use, AI literacy, and inclusivity and equity. In terms of implementation strategies, the synthesis identifies crucial areas such as student orientation and professional development, enhanced teaching tools and data-driven insights, improved student learning outcomes and engagement, and streamlined administrative processes.