首页 > 最新文献

2018 IEEE International Symposium on Technology and Society (ISTAS)最新文献

英文 中文
The Unforeseen in Unmanned Vehicles 无人驾驶车辆的不可预见
Pub Date : 2018-11-01 DOI: 10.1109/ISTAS.2018.8638276
P. Maxwell, Michael Nowatkowski
The development of unmanned vehicle technology is rapidly proceeding and will result in numerous advances in autonomous vehicles. Most of the research effort to date focuses on the safe and effective operation of these vehicles that will allow them to integrate into society. A research gap exists though in the technical, policy, and legal fields regarding illicit use of these vehicles beyond their programmed functions. In this paper we explore possible misuse of unmanned vehicles and illustrate the need for research in the technical, policy, and legal realms.
无人驾驶汽车技术正在迅速发展,并将导致自动驾驶汽车的众多进步。迄今为止,大多数研究工作都集中在这些车辆的安全和有效操作上,使它们能够融入社会。但是,在技术、政策和法律领域,关于非法使用这些车辆超出其规定功能的研究存在差距。在本文中,我们探讨了无人驾驶车辆可能被滥用的问题,并说明了在技术、政策和法律领域进行研究的必要性。
{"title":"The Unforeseen in Unmanned Vehicles","authors":"P. Maxwell, Michael Nowatkowski","doi":"10.1109/ISTAS.2018.8638276","DOIUrl":"https://doi.org/10.1109/ISTAS.2018.8638276","url":null,"abstract":"The development of unmanned vehicle technology is rapidly proceeding and will result in numerous advances in autonomous vehicles. Most of the research effort to date focuses on the safe and effective operation of these vehicles that will allow them to integrate into society. A research gap exists though in the technical, policy, and legal fields regarding illicit use of these vehicles beyond their programmed functions. In this paper we explore possible misuse of unmanned vehicles and illustrate the need for research in the technical, policy, and legal realms.","PeriodicalId":122477,"journal":{"name":"2018 IEEE International Symposium on Technology and Society (ISTAS)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124161612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ISTAS 2018 Committees
Pub Date : 2018-11-01 DOI: 10.1109/istas.2018.8638161
{"title":"ISTAS 2018 Committees","authors":"","doi":"10.1109/istas.2018.8638161","DOIUrl":"https://doi.org/10.1109/istas.2018.8638161","url":null,"abstract":"","PeriodicalId":122477,"journal":{"name":"2018 IEEE International Symposium on Technology and Society (ISTAS)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128207552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ethical Dilemmas for Engineers in the Development of Autonomous Systems 自主系统开发中工程师的伦理困境
Pub Date : 2018-11-01 DOI: 10.1109/ISTAS.2018.8638282
Beth-Anne Schuelke-Leech, Timothy C. Leech, Betsy Barry, Sara Jordan-Mattingly
The development of ethical autonomous systems requires that engineers determine the publicly acceptable actions and decisions of these systems. And yet, recent cases show that engineers working for large organizations do not always act for the public good or the benefit of society. Ethics are often presented as objective social and legal norms, rather than a complicated series of constraints and expectations, determined from multiple sources. Engineers are forced to navigate the expectations of the numerous groups of which they are members, including the organizations and industries that they work for, the engineering profession, regulators, and society in general. These expectations can come into conflict. Engineers are then expected to determine whose values and standards take precedence. Unfortunately, as the results of this study show, engineers rarely explicitly consider the ethical or social implications of the technologies that they are developing.
道德自治系统的发展要求工程师确定这些系统的公众可接受的行为和决策。然而,最近的案例表明,为大型组织工作的工程师并不总是为公共利益或社会利益而行动。伦理常常被呈现为客观的社会和法律规范,而不是由多种来源决定的一系列复杂的约束和期望。工程师被迫在他们所处的众多群体的期望中导航,包括他们工作的组织和行业、工程专业、监管机构和一般的社会。这些期望可能会产生冲突。然后,工程师需要决定谁的价值观和标准优先。不幸的是,正如这项研究的结果所显示的那样,工程师们很少明确地考虑他们正在开发的技术的伦理或社会影响。
{"title":"Ethical Dilemmas for Engineers in the Development of Autonomous Systems","authors":"Beth-Anne Schuelke-Leech, Timothy C. Leech, Betsy Barry, Sara Jordan-Mattingly","doi":"10.1109/ISTAS.2018.8638282","DOIUrl":"https://doi.org/10.1109/ISTAS.2018.8638282","url":null,"abstract":"The development of ethical autonomous systems requires that engineers determine the publicly acceptable actions and decisions of these systems. And yet, recent cases show that engineers working for large organizations do not always act for the public good or the benefit of society. Ethics are often presented as objective social and legal norms, rather than a complicated series of constraints and expectations, determined from multiple sources. Engineers are forced to navigate the expectations of the numerous groups of which they are members, including the organizations and industries that they work for, the engineering profession, regulators, and society in general. These expectations can come into conflict. Engineers are then expected to determine whose values and standards take precedence. Unfortunately, as the results of this study show, engineers rarely explicitly consider the ethical or social implications of the technologies that they are developing.","PeriodicalId":122477,"journal":{"name":"2018 IEEE International Symposium on Technology and Society (ISTAS)","volume":"84 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127977309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Location-based Social Media Use in Families : Qualitative Outcomes from Participant Observations 家庭中基于位置的社交媒体使用:来自参与者观察的定性结果
Pub Date : 2018-11-01 DOI: 10.1109/ISTAS.2018.8638283
Sarah Jean Fusco, K. Michael, M. Michael, Roba Abbas
This paper is about location-based social media use within families. An experiment was devised to study different family relationships and dynamics with respect to the use and application of location-based social media services. The methodology applied was two-fold: (1) an experiment using Google Latitude, a location social media app; and (2) semi-structured interviews. The data from the study is analyzed using qualitative analysis and compares the responses between siblings with that of parent-child relationship. The results of the study raise issues about (1) use and experience; (2) the disclosure of location; and (3) and the power to view location information. In the discussion uses and benefits of this technology are presented, as well as negative issues, trust and control factors. The main finding of the study is that location-based social media use while very beneficial in families has the propensity to propagate a power asymmetry, one individual over the other, although this power is not always displayed explicitly. While location-based social media is about "sharing" one’s location, the sharing is not always equitable, nor is it bidirectional.
这篇论文是关于家庭中基于位置的社交媒体使用。设计了一项实验,研究基于位置的社交媒体服务的使用和应用方面的不同家庭关系和动态。采用的方法有两个方面:(1)使用谷歌纬度(Google Latitude)这款定位社交媒体应用进行实验;(2)半结构化访谈。本研究数据采用定性分析方法进行分析,并将兄弟姐妹之间的反应与亲子关系的反应进行比较。研究结果提出了以下问题:(1)使用和体验;(二)地点的披露;(3)以及查看位置信息的权限。在讨论中,介绍了该技术的用途和好处,以及负面问题,信任和控制因素。该研究的主要发现是,基于位置的社交媒体使用虽然在家庭中非常有益,但却倾向于传播一种权力不对称,即一个人对另一个人的权力不对称,尽管这种权力并不总是明确显示出来。虽然基于位置的社交媒体是关于“分享”一个人的位置,但这种分享并不总是公平的,也不是双向的。
{"title":"Location-based Social Media Use in Families : Qualitative Outcomes from Participant Observations","authors":"Sarah Jean Fusco, K. Michael, M. Michael, Roba Abbas","doi":"10.1109/ISTAS.2018.8638283","DOIUrl":"https://doi.org/10.1109/ISTAS.2018.8638283","url":null,"abstract":"This paper is about location-based social media use within families. An experiment was devised to study different family relationships and dynamics with respect to the use and application of location-based social media services. The methodology applied was two-fold: (1) an experiment using Google Latitude, a location social media app; and (2) semi-structured interviews. The data from the study is analyzed using qualitative analysis and compares the responses between siblings with that of parent-child relationship. The results of the study raise issues about (1) use and experience; (2) the disclosure of location; and (3) and the power to view location information. In the discussion uses and benefits of this technology are presented, as well as negative issues, trust and control factors. The main finding of the study is that location-based social media use while very beneficial in families has the propensity to propagate a power asymmetry, one individual over the other, although this power is not always displayed explicitly. While location-based social media is about \"sharing\" one’s location, the sharing is not always equitable, nor is it bidirectional.","PeriodicalId":122477,"journal":{"name":"2018 IEEE International Symposium on Technology and Society (ISTAS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122235255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Values as the Basis for Sustainable Software Development 人的价值是可持续软件开发的基础
Pub Date : 2018-11-01 DOI: 10.1109/ISTAS.2018.8638287
Till Winkler
Software has an increasing impact on individual well-being, the environment, and our society. To mitigate this potentially harmful impact, scholars have proposed to go beyond traditional requirements. One approach that has been proposed is the consideration of human values, which can be used to constitute dimensions of sustainability, as requirements in the process of software development. To this day, there is no consensus on which values that should be or where to find information about them. This contribution combines value lists of sources from multiple backgrounds into one extensive list of values, which can facilitate sustainable software development. This paper will demonstrate how this list of values can help define the social sustainability dimension. Such an extensive list is also important for other disciplines working with values, such as value sensitive design.
软件对个人福祉、环境和社会的影响越来越大。为了减轻这种潜在的有害影响,学者们提出了超越传统要求的建议。已经提出的一种方法是考虑人的价值,它可以用来构成可持续性的维度,作为软件开发过程中的需求。直到今天,对于哪些价值观应该是或者在哪里可以找到关于它们的信息,还没有达成共识。这个贡献将来自多个背景的资源价值列表组合成一个广泛的价值列表,这可以促进可持续的软件开发。本文将展示这一价值清单如何帮助定义社会可持续性维度。这样一个广泛的列表对于其他与价值相关的学科也很重要,比如价值敏感设计。
{"title":"Human Values as the Basis for Sustainable Software Development","authors":"Till Winkler","doi":"10.1109/ISTAS.2018.8638287","DOIUrl":"https://doi.org/10.1109/ISTAS.2018.8638287","url":null,"abstract":"Software has an increasing impact on individual well-being, the environment, and our society. To mitigate this potentially harmful impact, scholars have proposed to go beyond traditional requirements. One approach that has been proposed is the consideration of human values, which can be used to constitute dimensions of sustainability, as requirements in the process of software development. To this day, there is no consensus on which values that should be or where to find information about them. This contribution combines value lists of sources from multiple backgrounds into one extensive list of values, which can facilitate sustainable software development. This paper will demonstrate how this list of values can help define the social sustainability dimension. Such an extensive list is also important for other disciplines working with values, such as value sensitive design.","PeriodicalId":122477,"journal":{"name":"2018 IEEE International Symposium on Technology and Society (ISTAS)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115416198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Achieving Security in the Internet of Things through Expansion of the Partnership Model 通过扩展伙伴关系模式实现物联网安全
Pub Date : 2018-11-01 DOI: 10.1109/ISTAS.2018.8638286
W. Diehl, Forrest Hare
There are countless connected devices and applications in the Internet of Things (IoT), in areas ranging from health to automotive and industrial, to energy, security, and logistics. Currently, a lack of security within the IoT presents significant cybersecurity risks, including the compromise of sensitive information and damage to infrastructure. As a way to overcome security challenges, this paper proposes expanding the current public-private partnership framework for cybersecurity to one that more effectively encompasses personal-level considerations. To be successful, this new public-private-personal partnership model will require simultaneous advancements in three co-equal domains: technology, policy, and society. Specifically, technology adjustments consist of upgrades to device access and authorization; policy adjustments consist of changes to cooperation regimes and regulations at the federal, state, and local level; and societal adjustments involve public education about vulnerabilities and changes in attitudes toward individual roles in security. In this research, we leverage two examples of emerging IoT applications: health monitoring and smart-grid. For each application and related sector, we outline the security challenges, discuss the shortcomings of existing public-private partnerships, and make recommendations for the expansion of existing partnerships to the personal level.
物联网(IoT)中有无数的连接设备和应用,涉及从健康到汽车和工业,再到能源、安全和物流等领域。目前,物联网内部缺乏安全性会带来重大的网络安全风险,包括敏感信息的泄露和基础设施的破坏。作为克服安全挑战的一种方法,本文建议将当前的网络安全公私伙伴关系框架扩展到更有效地包含个人层面考虑的框架。为了取得成功,这种新的公私伙伴关系模式需要在技术、政策和社会三个平等的领域同时取得进展。具体来说,技术调整包括对设备访问和授权的升级;政策调整包括改变联邦、州和地方各级的合作制度和法规;社会调整包括对公众进行有关脆弱性的教育,以及改变对个人在安全中所扮演角色的态度。在本研究中,我们利用了新兴物联网应用的两个例子:健康监测和智能电网。对于每个应用程序和相关部门,我们概述了安全挑战,讨论了现有公私伙伴关系的缺点,并提出了将现有伙伴关系扩展到个人层面的建议。
{"title":"Achieving Security in the Internet of Things through Expansion of the Partnership Model","authors":"W. Diehl, Forrest Hare","doi":"10.1109/ISTAS.2018.8638286","DOIUrl":"https://doi.org/10.1109/ISTAS.2018.8638286","url":null,"abstract":"There are countless connected devices and applications in the Internet of Things (IoT), in areas ranging from health to automotive and industrial, to energy, security, and logistics. Currently, a lack of security within the IoT presents significant cybersecurity risks, including the compromise of sensitive information and damage to infrastructure. As a way to overcome security challenges, this paper proposes expanding the current public-private partnership framework for cybersecurity to one that more effectively encompasses personal-level considerations. To be successful, this new public-private-personal partnership model will require simultaneous advancements in three co-equal domains: technology, policy, and society. Specifically, technology adjustments consist of upgrades to device access and authorization; policy adjustments consist of changes to cooperation regimes and regulations at the federal, state, and local level; and societal adjustments involve public education about vulnerabilities and changes in attitudes toward individual roles in security. In this research, we leverage two examples of emerging IoT applications: health monitoring and smart-grid. For each application and related sector, we outline the security challenges, discuss the shortcomings of existing public-private partnerships, and make recommendations for the expansion of existing partnerships to the personal level.","PeriodicalId":122477,"journal":{"name":"2018 IEEE International Symposium on Technology and Society (ISTAS)","volume":"50 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114041770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Achieving trust in Artificial General Intelligence : Secrets, precautions, and public scrutiny 实现对人工通用智能的信任:秘密、预防措施和公众监督
Pub Date : 2018-11-01 DOI: 10.1109/ISTAS.2018.8638284
G. Adamson
Research into the field generally referred to as Artificial Intelligence (AI) has been undertaken for at least 70 years. It now appears that the sheer weight of research effort will lead to a breakthrough in the achievement of Artificial General Intelligence (AGI) in the near or medium future. A challenge in addressing uncertainty surrounding such development is the assertion of commercial secrecy. While AGI has potentially significant implications for society, its development is generally a closely guarded secret. This paper proposes an approach based on concepts of ‘controls’ from the operational risk literature. It proposes an approach to monitoring AGI research that does not require the company to reveal its research secrets, by inviting public scrutiny of the precautions in place regarding the research. It argues that such scrutiny of precautions addresses the problem that companies undertaking research have limited knowledge of the technologies they are developing. This is argued by analogy with an early major technology development, the steam engine, where commercialization preceded scientific understanding by more than half a century. Reliance on precautions in the development of AGI has a further benefit. Where companies’ precautions fail, they would be expected to explain what went wrong and what new or additional precautions would be adopted in the future, making this a self-improving process.
对通常被称为人工智能(AI)的领域的研究已经进行了至少70年。现在看来,大量的研究工作将在近期或中期带来人工通用智能(AGI)的突破。在解决围绕这种发展的不确定性方面的一个挑战是商业保密的主张。虽然人工智能对社会有潜在的重大影响,但它的发展通常是一个严格保守的秘密。本文提出了一种基于操作风险文献中“控制”概念的方法。它提出了一种监测AGI研究的方法,该方法不要求公司披露其研究秘密,而是邀请公众监督有关研究的预防措施。它认为,这种对预防措施的审查解决了一个问题,即从事研究的公司对它们正在开发的技术了解有限。这与早期的一项重大技术发展——蒸汽机——进行了类比。蒸汽机的商业化比科学理解早了半个多世纪。在AGI的发展中依赖预防措施还有一个好处。如果公司的预防措施失败,他们将被要求解释哪里出了问题,以及未来将采取哪些新的或额外的预防措施,使这成为一个自我改进的过程。
{"title":"Achieving trust in Artificial General Intelligence : Secrets, precautions, and public scrutiny","authors":"G. Adamson","doi":"10.1109/ISTAS.2018.8638284","DOIUrl":"https://doi.org/10.1109/ISTAS.2018.8638284","url":null,"abstract":"Research into the field generally referred to as Artificial Intelligence (AI) has been undertaken for at least 70 years. It now appears that the sheer weight of research effort will lead to a breakthrough in the achievement of Artificial General Intelligence (AGI) in the near or medium future. A challenge in addressing uncertainty surrounding such development is the assertion of commercial secrecy. While AGI has potentially significant implications for society, its development is generally a closely guarded secret. This paper proposes an approach based on concepts of ‘controls’ from the operational risk literature. It proposes an approach to monitoring AGI research that does not require the company to reveal its research secrets, by inviting public scrutiny of the precautions in place regarding the research. It argues that such scrutiny of precautions addresses the problem that companies undertaking research have limited knowledge of the technologies they are developing. This is argued by analogy with an early major technology development, the steam engine, where commercialization preceded scientific understanding by more than half a century. Reliance on precautions in the development of AGI has a further benefit. Where companies’ precautions fail, they would be expected to explain what went wrong and what new or additional precautions would be adopted in the future, making this a self-improving process.","PeriodicalId":122477,"journal":{"name":"2018 IEEE International Symposium on Technology and Society (ISTAS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128421654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evolution of Human Society and of Things Assisted by IoT 物联网助力下的人类社会与事物进化
Pub Date : 2018-11-01 DOI: 10.1109/ISTAS.2018.8638278
G. Parise, L. Parise, Marialuisa Parise
This paper deals with the impact of IoT on the human society that produces opportunities for exciting innovations. IoT impacts ethical and social aspects towards human society, as individuals and as community, operational and global aspects towards the technical systems. It is a generator of individual and collective advantages that can be expropriated or inhibited for the benefit just a few individuals or groups. IoT must comply with the social right to a no-fake information and so must be protected globally by international laws and policies. Without invading the individual privacy IoT can provide to each person controlled automata, robosats (robot satellites), as extension of the personal sphere of action. It contributes to the globalization as a planetary complex of connected services where the reference system has to be the human society. This paper deals with the prospective impact of IoT on the utilization of electrical energy that can allow an epochal evolution in the structure/operation of power systems and facilitate an efficient constitution of the electrical microgrids. The interaction of the electrical equipment requires their "socialization" that is their improved integration by a revision of their load profiles and behaviors as much as possible.
本文讨论了物联网对人类社会的影响,为激动人心的创新创造了机会。物联网影响着人类社会的伦理和社会方面,个人和社区,技术系统的运营和全球方面。它是个人和集体利益的产生者,可以为了少数个人或群体的利益而被剥夺或抑制。物联网必须符合无虚假信息的社会权利,因此必须受到国际法律和政策的全球保护。在不侵犯个人隐私的情况下,物联网可以提供给每个人控制的自动机,机器人卫星(机器人卫星),作为个人行动领域的延伸。它有助于全球化作为一个全球性的复杂的连接服务,其中的参考系统必须是人类社会。本文讨论了物联网对电能利用的潜在影响,这可以使电力系统的结构/运行发生划时代的变化,并促进微电网的有效构成。电气设备的相互作用需要它们的“社会化”,即通过尽可能多地修改它们的负载概况和行为来改进它们的集成。
{"title":"Evolution of Human Society and of Things Assisted by IoT","authors":"G. Parise, L. Parise, Marialuisa Parise","doi":"10.1109/ISTAS.2018.8638278","DOIUrl":"https://doi.org/10.1109/ISTAS.2018.8638278","url":null,"abstract":"This paper deals with the impact of IoT on the human society that produces opportunities for exciting innovations. IoT impacts ethical and social aspects towards human society, as individuals and as community, operational and global aspects towards the technical systems. It is a generator of individual and collective advantages that can be expropriated or inhibited for the benefit just a few individuals or groups. IoT must comply with the social right to a no-fake information and so must be protected globally by international laws and policies. Without invading the individual privacy IoT can provide to each person controlled automata, robosats (robot satellites), as extension of the personal sphere of action. It contributes to the globalization as a planetary complex of connected services where the reference system has to be the human society. This paper deals with the prospective impact of IoT on the utilization of electrical energy that can allow an epochal evolution in the structure/operation of power systems and facilitate an efficient constitution of the electrical microgrids. The interaction of the electrical equipment requires their \"socialization\" that is their improved integration by a revision of their load profiles and behaviors as much as possible.","PeriodicalId":122477,"journal":{"name":"2018 IEEE International Symposium on Technology and Society (ISTAS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121598351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Project Hindsight Reconsidered: : Reflecting on how engineers can study the sources of innovation 项目后见之明:反思工程师如何研究创新的来源
Pub Date : 2018-11-01 DOI: 10.1109/ISTAS.2018.8638274
Z. Pirtle
Engineers seek to improve how their work benefits society, but often lack clear frameworks on how to study the sources of innovation for engineering breakthroughs. Case studies are one way to assess how basic and applied research becomes used in some engineering developments. To provide a reference point for how engineers could study the sources of innovation, the paper will discuss the largest scale study to date of how science becomes used in engineering: the controversial 1963-1969 Project Hindsight study from the US Department of Defense. Hindsight studied 20 weapons systems developments that occurred from 1947-1962 by having teams of researchers do case studies on the developments’ history. The paper analyzes claims from the Hindsight report that showed few basic science research events leading to practical engineering developments, as well as subsequent criticisms. Reflecting on the Hindsight methodology and doing new case studies on engineering today could help engineers direct their work to a greater societal benefit.
工程师们试图改善他们的工作如何造福社会,但在如何研究工程突破的创新来源方面往往缺乏明确的框架。案例研究是评估基础研究和应用研究如何应用于某些工程开发的一种方法。为了给工程师如何研究创新的来源提供一个参考点,本文将讨论迄今为止规模最大的关于科学如何在工程中应用的研究:1963年至1969年美国国防部有争议的后见之明项目研究。“后见之明”研究了1947年至1962年间发生的20种武器系统的发展,方法是让研究小组对这些发展的历史进行案例研究。这篇论文分析了“后见之明”报告中的说法,这些说法表明,很少有基础科学研究事件导致了实际的工程发展,以及随后的批评。反思后见之明的方法,并在今天对工程进行新的案例研究,可以帮助工程师将他们的工作导向更大的社会效益。
{"title":"Project Hindsight Reconsidered: : Reflecting on how engineers can study the sources of innovation","authors":"Z. Pirtle","doi":"10.1109/ISTAS.2018.8638274","DOIUrl":"https://doi.org/10.1109/ISTAS.2018.8638274","url":null,"abstract":"Engineers seek to improve how their work benefits society, but often lack clear frameworks on how to study the sources of innovation for engineering breakthroughs. Case studies are one way to assess how basic and applied research becomes used in some engineering developments. To provide a reference point for how engineers could study the sources of innovation, the paper will discuss the largest scale study to date of how science becomes used in engineering: the controversial 1963-1969 Project Hindsight study from the US Department of Defense. Hindsight studied 20 weapons systems developments that occurred from 1947-1962 by having teams of researchers do case studies on the developments’ history. The paper analyzes claims from the Hindsight report that showed few basic science research events leading to practical engineering developments, as well as subsequent criticisms. Reflecting on the Hindsight methodology and doing new case studies on engineering today could help engineers direct their work to a greater societal benefit.","PeriodicalId":122477,"journal":{"name":"2018 IEEE International Symposium on Technology and Society (ISTAS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115305655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberbullying in institutions of higher learning in developing countries: Evidence from Kenya 发展中国家高等院校的网络欺凌:来自肯尼亚的证据
Pub Date : 2018-11-01 DOI: 10.1109/ISTAS.2018.8638267
J. R. Ndiege, Patrick Kanyi
The primary objective of this study is to examine the problem of cyberbullying in institutions of higher learning with particular attention to developing countries by looking at its prevalence in one of the universities within Nairobi in Kenya. In this study, we conduct an exploratory study on 396 students to understand the prevalence of cyberbullying. The study findings revealed that the highest form of victimization was through the act of deception in which 75.8% indicated someone had lied to them electronically. On the other hand, the highest form of perpetration of cyberbullying was through malice in which 49.7% indicated that they had sent a rude message to someone electronically. The level of prevalence reported in this study appears slightly high in comparison to majority of the finding from developed countries. Consequently, we submit that it is imperative that educational systems in Africa and other developing countries put frameworks in place to deal with the emerging reality of cyberbullying within institutions of higher learning.
本研究的主要目的是通过观察其在肯尼亚内罗毕一所大学中的流行情况,研究高等教育机构中的网络欺凌问题,并特别关注发展中国家。在本研究中,我们对396名学生进行了探索性研究,以了解网络欺凌的普遍程度。研究结果显示,受害程度最高的是欺骗行为,其中75.8%的人表示有人在网上对他们撒谎。另一方面,网络欺凌的最高形式是恶意,其中49.7%的人表示他们通过电子方式向某人发送了粗鲁的信息。与发达国家的大多数调查结果相比,本研究报告的流行程度似乎略高。因此,我们认为,非洲和其他发展中国家的教育系统必须制定框架,以应对高等院校中出现的网络欺凌现实。
{"title":"Cyberbullying in institutions of higher learning in developing countries: Evidence from Kenya","authors":"J. R. Ndiege, Patrick Kanyi","doi":"10.1109/ISTAS.2018.8638267","DOIUrl":"https://doi.org/10.1109/ISTAS.2018.8638267","url":null,"abstract":"The primary objective of this study is to examine the problem of cyberbullying in institutions of higher learning with particular attention to developing countries by looking at its prevalence in one of the universities within Nairobi in Kenya. In this study, we conduct an exploratory study on 396 students to understand the prevalence of cyberbullying. The study findings revealed that the highest form of victimization was through the act of deception in which 75.8% indicated someone had lied to them electronically. On the other hand, the highest form of perpetration of cyberbullying was through malice in which 49.7% indicated that they had sent a rude message to someone electronically. The level of prevalence reported in this study appears slightly high in comparison to majority of the finding from developed countries. Consequently, we submit that it is imperative that educational systems in Africa and other developing countries put frameworks in place to deal with the emerging reality of cyberbullying within institutions of higher learning.","PeriodicalId":122477,"journal":{"name":"2018 IEEE International Symposium on Technology and Society (ISTAS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115001624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 IEEE International Symposium on Technology and Society (ISTAS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1