首页 > 最新文献

2020 IEEE International Symposium on Technology and Society (ISTAS)最新文献

英文 中文
Only Location: A Systematic Literature Review on Context Marketing 只有地点:关于情境营销的系统文献综述
Pub Date : 2020-11-12 DOI: 10.1109/ISTAS50296.2020.9462242
Anna-Lena Christina Krusch, Perole Uphaus, H. Rau
In today’s information era, the ability to address the needs of potential customers at a moment when they are particularly receptive to the information provided becomes increasingly important. Modern mobile devices allow to collect precise data about the users’ context, thus enhancing possibilities to better estimate, proof and react to current situations in real time. Given that, ‘context marketing’ nowadays is an approach frequently discussed in literature. This contribution aims to systematize existing publications on the subject of context marketing, in order to build a basis for future research and to uncover potential gaps and contradictions in previous research. Methodologically, the two scientific databases “Scopus” and “Web of Science” were searched for context marketing related contributions. The evaluation made use of a mixed methods approach including a qualitative content analysis, and subsequently further quantitative evaluations. The findings reveal the majority of publications to focus on the user’s location as the only context factor, resulting in a predominant focus on location-based advertising related research.
在当今的信息时代,当潜在客户特别容易接受所提供的信息时,满足他们需求的能力变得越来越重要。现代移动设备可以收集有关用户情境的精确数据,从而提高了更好地实时估计、证明和应对当前情况的可能性。鉴于此,“语境营销”是当今文学中经常讨论的一种方法。这一贡献的目的是系统化现有的出版物对上下文营销的主题,以便建立一个基础,为未来的研究和发现潜在的差距和矛盾在以前的研究。在方法上,我们搜索了两个科学数据库“Scopus”和“Web of Science”,寻找与上下文营销相关的贡献。评价采用了混合方法,包括定性内容分析和随后的进一步定量评价。调查结果显示,大多数出版物将用户的位置作为唯一的上下文因素,导致主要关注基于位置的广告相关研究。
{"title":"Only Location: A Systematic Literature Review on Context Marketing","authors":"Anna-Lena Christina Krusch, Perole Uphaus, H. Rau","doi":"10.1109/ISTAS50296.2020.9462242","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462242","url":null,"abstract":"In today’s information era, the ability to address the needs of potential customers at a moment when they are particularly receptive to the information provided becomes increasingly important. Modern mobile devices allow to collect precise data about the users’ context, thus enhancing possibilities to better estimate, proof and react to current situations in real time. Given that, ‘context marketing’ nowadays is an approach frequently discussed in literature. This contribution aims to systematize existing publications on the subject of context marketing, in order to build a basis for future research and to uncover potential gaps and contradictions in previous research. Methodologically, the two scientific databases “Scopus” and “Web of Science” were searched for context marketing related contributions. The evaluation made use of a mixed methods approach including a qualitative content analysis, and subsequently further quantitative evaluations. The findings reveal the majority of publications to focus on the user’s location as the only context factor, resulting in a predominant focus on location-based advertising related research.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"29 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125794651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Arbiter: Improved Smart City Operations through Decentralized Autonomous Organization 仲裁者:通过分散的自治组织改善智慧城市运营
Pub Date : 2020-11-12 DOI: 10.1109/ISTAS50296.2020.9462219
Francis Mendoza, H. Behrens
Smart cities have emerged as one of the most promising applications of cyber-physical systems (CPS), carrying the potential to serve the various interests of the public and private sectors at large. However, contemporary smart city infrastructure commonly uses heavily-centralized network architectures, reducing failure resilience and application flexibility. This centralization also imposes high barriers to entry for public access, limiting usage and oversight opportunities. To address these limitations, we describe Arbiter, a novel fog- and edge-based communication architecture based on the concept of a Decentralized Autonomous Organization (DAO). Arbiter aims to improve the socioeconomic equity of the local citizenry by (1) acting as a management layer for citywide CPS assets, (2) providing a compliance layer for managing human capital, and (3) offering a data protection layer to ensure that citizens retain full control of their personal data. We then analyze in detail the technical, socioeconomic, and ethical implications of Arbiter, and contextualize its role in the modern smart city.
智慧城市已成为网络物理系统(CPS)最有前途的应用之一,具有服务于公共和私营部门各种利益的潜力。然而,当代智慧城市基础设施通常使用高度集中的网络架构,降低了故障恢复能力和应用灵活性。这种集中化也给公众访问设置了很高的门槛,限制了使用和监督的机会。为了解决这些限制,我们描述了Arbiter,这是一种基于去中心化自治组织(DAO)概念的新型基于雾和边缘的通信架构。仲裁者旨在通过以下方式改善当地公民的社会经济公平:(1)作为全市CPS资产的管理层,(2)提供管理人力资本的合规层,以及(3)提供数据保护层,以确保公民保留对其个人数据的完全控制。然后,我们详细分析了仲裁者的技术、社会经济和伦理影响,并将其在现代智慧城市中的作用置于背景中。
{"title":"Arbiter: Improved Smart City Operations through Decentralized Autonomous Organization","authors":"Francis Mendoza, H. Behrens","doi":"10.1109/ISTAS50296.2020.9462219","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462219","url":null,"abstract":"Smart cities have emerged as one of the most promising applications of cyber-physical systems (CPS), carrying the potential to serve the various interests of the public and private sectors at large. However, contemporary smart city infrastructure commonly uses heavily-centralized network architectures, reducing failure resilience and application flexibility. This centralization also imposes high barriers to entry for public access, limiting usage and oversight opportunities. To address these limitations, we describe Arbiter, a novel fog- and edge-based communication architecture based on the concept of a Decentralized Autonomous Organization (DAO). Arbiter aims to improve the socioeconomic equity of the local citizenry by (1) acting as a management layer for citywide CPS assets, (2) providing a compliance layer for managing human capital, and (3) offering a data protection layer to ensure that citizens retain full control of their personal data. We then analyze in detail the technical, socioeconomic, and ethical implications of Arbiter, and contextualize its role in the modern smart city.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130779711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Defending Deep Learning Based Anomaly Detection Systems Against White-Box Adversarial Examples and Backdoor Attacks 保护基于深度学习的异常检测系统免受白盒攻击和后门攻击
Pub Date : 2020-11-12 DOI: 10.1109/ISTAS50296.2020.9462227
Khaled Alrawashdeh, Stephen Goldsmith
Deep Neural Network (DNN) has witnessed rapid progress and significant successes in the recent years. Wide range of applications depends on the high performance of deep learning to solve real-life challenges. Deep learning is being applied in many safety-critical environments. However, deep neural networks have been recently found vulnerable to adversarial examples and backdoor attacks. Stealthy adversarial examples and backdoor attacks can easily fool deep neural networks to generate the wrong results. The risk of adversarial examples attacks that target deep learning models impedes the wide deployment of deep neural networks in safety-critical environments. In this work we propose a defensive technique for deep learning by combining activation function and neurons pruning to reduce the effects of adversarial examples and backdoor attacks. We evaluate the efficacy of the method on an anomaly detection application using Deep Belief Network (DBN) and Coupled Generative Adversarial Network (CoGAN). The method reduces the loss of accuracy from the attacks from an average 10% to 2% using DBN and from an average 14% to 2% using CoGAN. We evaluate the method using two benchmark datasets: NSL-KDD and ransomware.
近年来,深度神经网络(Deep Neural Network, DNN)取得了长足的发展和显著的成功。广泛的应用依赖于深度学习的高性能来解决现实生活中的挑战。深度学习正在许多安全关键环境中得到应用。然而,深度神经网络最近被发现容易受到对抗性示例和后门攻击。隐形的对抗性示例和后门攻击可以很容易地欺骗深度神经网络产生错误的结果。针对深度学习模型的对抗性示例攻击的风险阻碍了深度神经网络在安全关键环境中的广泛部署。在这项工作中,我们提出了一种深度学习的防御技术,通过结合激活函数和神经元修剪来减少对抗性示例和后门攻击的影响。我们使用深度信念网络(DBN)和耦合生成对抗网络(CoGAN)来评估该方法在异常检测应用中的有效性。该方法使用DBN将攻击的准确度损失从平均10%降低到2%,使用CoGAN将攻击的准确度损失从平均14%降低到2%。我们使用两个基准数据集:NSL-KDD和勒索软件来评估该方法。
{"title":"Defending Deep Learning Based Anomaly Detection Systems Against White-Box Adversarial Examples and Backdoor Attacks","authors":"Khaled Alrawashdeh, Stephen Goldsmith","doi":"10.1109/ISTAS50296.2020.9462227","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462227","url":null,"abstract":"Deep Neural Network (DNN) has witnessed rapid progress and significant successes in the recent years. Wide range of applications depends on the high performance of deep learning to solve real-life challenges. Deep learning is being applied in many safety-critical environments. However, deep neural networks have been recently found vulnerable to adversarial examples and backdoor attacks. Stealthy adversarial examples and backdoor attacks can easily fool deep neural networks to generate the wrong results. The risk of adversarial examples attacks that target deep learning models impedes the wide deployment of deep neural networks in safety-critical environments. In this work we propose a defensive technique for deep learning by combining activation function and neurons pruning to reduce the effects of adversarial examples and backdoor attacks. We evaluate the efficacy of the method on an anomaly detection application using Deep Belief Network (DBN) and Coupled Generative Adversarial Network (CoGAN). The method reduces the loss of accuracy from the attacks from an average 10% to 2% using DBN and from an average 14% to 2% using CoGAN. We evaluate the method using two benchmark datasets: NSL-KDD and ransomware.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121986916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Making Publics Visible: Utilizing STS Knowledge for Public Identification and Engagement 让公众可见:利用STS知识进行公众认同和参与
Pub Date : 2020-11-12 DOI: 10.1109/ISTAS50296.2020.9462182
A. Y. Patrick
Public Interest Technology (PIT) is an emerging field focused upon ensuring that innovative technologies are designed, distributed, and mediated for the well-being of the public. PIT seeks to educate technologists, engineers, and researchers to be cognizant of the public impact of their work and to train policymakers to equitably mediate the scope and reach of technology. However, the reach and impact of PIT work can be further enhanced through theoretical and pragmatic Science, Technology, and Society (STS) knowledge. For the past four years, I have worked on a large-scale change initiative in an electrical and computer engineering (ECE) department. An in-depth qualitative study of the department revealed several challenges within the department regarding identity, sense of belonging, invisible work, and career trajectory. As a scholar-practitioner, I employed STS theory and pragmatic knowledge to create three critically crafted interventions to address these challenges. First, STS knowledge was utilized to investigate the challenges within the department and understand how these challenges affected the multiple stakeholders and the culture of the ECE department. Second, pragmatic STS knowledge was utilized to create projects to shift the boundaries within the engineering department that limited the professional, academic, and personal opportunities of the engineering student. The purpose of this paper is to illustrate how my application of STS theoretical and pragmatic scholarship to address the culture of an electrical and computer engineering department can contribute to the field of PIT.
公共利益技术(PIT)是一个新兴领域,专注于确保创新技术的设计、分发和调解是为了公众的福祉。PIT旨在教育技术人员、工程师和研究人员认识到他们的工作对公众的影响,并培训政策制定者公平地调节技术的范围和范围。然而,PIT工作的范围和影响可以通过理论和实用的科学、技术和社会(STS)知识进一步增强。在过去的四年里,我一直在电气和计算机工程(ECE)部门从事大规模的变革计划。对该部门进行了深入的定性研究,揭示了该部门在身份、归属感、隐形工作和职业轨迹方面面临的一些挑战。作为一名学者兼实践者,我运用STS理论和实用主义知识创建了三个精心设计的干预措施来应对这些挑战。首先,STS知识被用于调查部门内部的挑战,并了解这些挑战如何影响多个利益相关者和欧洲经委会部门的文化。其次,实用STS知识被用于创建项目,以改变工程部门内部限制工程学生专业,学术和个人机会的界限。本文的目的是说明我如何应用STS理论和实用学术来解决电气和计算机工程系的文化问题,从而为PIT领域做出贡献。
{"title":"Making Publics Visible: Utilizing STS Knowledge for Public Identification and Engagement","authors":"A. Y. Patrick","doi":"10.1109/ISTAS50296.2020.9462182","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462182","url":null,"abstract":"Public Interest Technology (PIT) is an emerging field focused upon ensuring that innovative technologies are designed, distributed, and mediated for the well-being of the public. PIT seeks to educate technologists, engineers, and researchers to be cognizant of the public impact of their work and to train policymakers to equitably mediate the scope and reach of technology. However, the reach and impact of PIT work can be further enhanced through theoretical and pragmatic Science, Technology, and Society (STS) knowledge. For the past four years, I have worked on a large-scale change initiative in an electrical and computer engineering (ECE) department. An in-depth qualitative study of the department revealed several challenges within the department regarding identity, sense of belonging, invisible work, and career trajectory. As a scholar-practitioner, I employed STS theory and pragmatic knowledge to create three critically crafted interventions to address these challenges. First, STS knowledge was utilized to investigate the challenges within the department and understand how these challenges affected the multiple stakeholders and the culture of the ECE department. Second, pragmatic STS knowledge was utilized to create projects to shift the boundaries within the engineering department that limited the professional, academic, and personal opportunities of the engineering student. The purpose of this paper is to illustrate how my application of STS theoretical and pragmatic scholarship to address the culture of an electrical and computer engineering department can contribute to the field of PIT.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116500451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Can we use non-transparent artificial intelligence technologies for legal purposes? 我们可以将不透明的人工智能技术用于法律目的吗?
Pub Date : 2020-11-12 DOI: 10.1109/ISTAS50296.2020.9462204
G. Adamson
Artificial intelligence (AI) is a technology receiving significant attention from lawmakers, courts, and regulators. An aspect of this attention is an interest in understanding how AI works when applied to a process of law, or to a regulated application of technology such as driverless vehicles. One approach is to seek to understand what the AI technology does, with goals including “transparency” and “explainability”. This paper considers these concepts from a law and technology perspective. Research in this area commonly examines the challenge of “black box” technologies, particularly the approach of “post hoc explainability”. This paper points out that the post hoc approach provides an inference, rather than an actual description of AI behavior. It considers circumstances in which the post hoc approach may be satisfactory, and those involving arbitrary power in which it should not be used, as inconsistent with the principle of regularity in the rule of law. It recommends that the output of non-transparent AI technologies should necessarily be viewed critically. It concludes that human attention is required in determining whether or not to accept AI technology explanations.
人工智能(AI)是一项受到国会、法院、监管机构高度关注的技术。这种关注的一个方面是,有兴趣了解人工智能在应用于法律程序或无人驾驶汽车等受监管的技术应用时是如何工作的。一种方法是试图理解人工智能技术的作用,目标包括“透明度”和“可解释性”。本文从法律和技术的角度来考虑这些概念。该领域的研究通常考察“黑箱”技术的挑战,特别是“事后可解释性”的方法。本文指出,事后方法提供了一个推理,而不是对人工智能行为的实际描述。委员会认为,事后处理办法可能令人满意的情况,以及涉及不应使用事后处理办法的专断权力的情况,都不符合法治的规律性原则。它建议,必须批判性地看待不透明的人工智能技术的产出。它的结论是,在决定是否接受人工智能技术的解释时,需要人类的关注。
{"title":"Can we use non-transparent artificial intelligence technologies for legal purposes?","authors":"G. Adamson","doi":"10.1109/ISTAS50296.2020.9462204","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462204","url":null,"abstract":"Artificial intelligence (AI) is a technology receiving significant attention from lawmakers, courts, and regulators. An aspect of this attention is an interest in understanding how AI works when applied to a process of law, or to a regulated application of technology such as driverless vehicles. One approach is to seek to understand what the AI technology does, with goals including “transparency” and “explainability”. This paper considers these concepts from a law and technology perspective. Research in this area commonly examines the challenge of “black box” technologies, particularly the approach of “post hoc explainability”. This paper points out that the post hoc approach provides an inference, rather than an actual description of AI behavior. It considers circumstances in which the post hoc approach may be satisfactory, and those involving arbitrary power in which it should not be used, as inconsistent with the principle of regularity in the rule of law. It recommends that the output of non-transparent AI technologies should necessarily be viewed critically. It concludes that human attention is required in determining whether or not to accept AI technology explanations.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128533879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stakeholders in the cloud computing value-chain : A socio-technical review of data breach literature 云计算价值链中的利益相关者:数据泄露文献的社会技术评论
Pub Date : 2020-11-12 DOI: 10.1109/ISTAS50296.2020.9462169
David Kolevski, K. Michael, Roba Abbas, M. Freeman
This paper is about stakeholders in the cloud computing value-chain. Early cloud computing literature focused on the technical aspect of the technology and viewed the provider and customer as essential value-chain stakeholders. The more users that use cloud services, the potential for data breaches increases. The review of the literature was carried out using a social-technical approach. Socio-technical theory encapsulates the social, technical and environmental dimensions of a system. The outcomes of the search indicated that there are two pertinent stakeholder types: operational and non-operational. Operational stakeholders include cloud providers, customers, enablers, resellers and third-party providers. Non-operational stakeholders include regulators, legislators, courts, non-government organisations, law enforcement, industry-standard bodies and end-users. The end-users are critically important in the cloud value-chain in that they rely on online services for everyday activities and have their data compromised. The cloud value-chain presents that cloud services encapsulate more than just technology services. The paper considers the complex stakeholder relationships and data breach issues, indicating the need for a better socio-technical response from the stakeholders within the value-chain.
本文是关于云计算价值链中的利益相关者。早期的云计算文献侧重于技术的技术方面,并将提供商和客户视为重要的价值链利益相关者。使用云服务的用户越多,数据泄露的可能性就越大。文献的审查是使用社会技术方法进行的。社会技术理论概括了一个系统的社会、技术和环境维度。搜索结果表明,有两种相关的利益相关者类型:操作性和非操作性。运营利益相关者包括云提供商、客户、支持方、经销商和第三方提供商。非经营性利益相关者包括监管机构、立法者、法院、非政府组织、执法部门、行业标准机构和最终用户。最终用户在云价值链中至关重要,因为他们的日常活动依赖于在线服务,并且他们的数据会受到损害。云价值链表明,云服务封装的不仅仅是技术服务。本文考虑了复杂的利益相关者关系和数据泄露问题,表明价值链内利益相关者需要更好的社会技术响应。
{"title":"Stakeholders in the cloud computing value-chain : A socio-technical review of data breach literature","authors":"David Kolevski, K. Michael, Roba Abbas, M. Freeman","doi":"10.1109/ISTAS50296.2020.9462169","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462169","url":null,"abstract":"This paper is about stakeholders in the cloud computing value-chain. Early cloud computing literature focused on the technical aspect of the technology and viewed the provider and customer as essential value-chain stakeholders. The more users that use cloud services, the potential for data breaches increases. The review of the literature was carried out using a social-technical approach. Socio-technical theory encapsulates the social, technical and environmental dimensions of a system. The outcomes of the search indicated that there are two pertinent stakeholder types: operational and non-operational. Operational stakeholders include cloud providers, customers, enablers, resellers and third-party providers. Non-operational stakeholders include regulators, legislators, courts, non-government organisations, law enforcement, industry-standard bodies and end-users. The end-users are critically important in the cloud value-chain in that they rely on online services for everyday activities and have their data compromised. The cloud value-chain presents that cloud services encapsulate more than just technology services. The paper considers the complex stakeholder relationships and data breach issues, indicating the need for a better socio-technical response from the stakeholders within the value-chain.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132006843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
COVIDFREE App: The User-Enabling Contact Prevention Application covid - free应用程序:用户启用接触预防应用程序
Pub Date : 2020-11-12 DOI: 10.1109/ISTAS50296.2020.9462186
Edgard Musafiri Mimo, T. McDaniel
Governments all over the world are considering employing mobile contact tracing applications to automatically manage, trace, and investigate recent interactions of newly tested COVID-19 infected individuals. The prospective use of such applications has produced several debates surrounding confidentiality, security, data supervision, closeness approximation algorithms, and cyber-attack susceptibility. This paper discusses these concerns in the context of a novel smartphone application architecture, proposed here, that gives users more control and privacy during contact tracing. The proposed application is termed COVIDFREE App, which is aimed at enhancing users’ situational awareness through communication of safe and unsafe locations. An overview of the app’s architectural design and functionality are presented, including a newly developed Overall Risk Density Safety Factor calculation inspired by COVID-19 density risks and factors of users based on health requirements and several customizable user-specific scenarios. Finally, the paper outlines the benefit to funding and developing contact tracing apps, such as the COVIDFRE App, and discusses advantages of such applications including citizen awareness, relief, and preparedness.
世界各国政府都在考虑采用移动接触者追踪应用程序来自动管理、追踪和调查新检测的COVID-19感染者最近的互动。这些应用程序的预期使用已经产生了围绕机密性、安全性、数据监督、接近近似算法和网络攻击易感性的几个争论。本文在本文提出的一种新型智能手机应用程序架构的背景下讨论了这些问题,该架构为用户在接触追踪过程中提供了更多的控制和隐私。该应用程序名为“covid - free App”,旨在通过安全与不安全地点的沟通,提高用户的态势感知能力。介绍了该应用程序的架构设计和功能概述,包括新开发的总体风险密度安全系数计算,该计算灵感来自COVID-19密度风险和基于健康要求的用户因素以及几个可定制的用户特定场景。最后,本文概述了资助和开发covid - fre App等接触者追踪应用程序的好处,并讨论了这些应用程序的优势,包括公民意识、救济和准备。
{"title":"COVIDFREE App: The User-Enabling Contact Prevention Application","authors":"Edgard Musafiri Mimo, T. McDaniel","doi":"10.1109/ISTAS50296.2020.9462186","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462186","url":null,"abstract":"Governments all over the world are considering employing mobile contact tracing applications to automatically manage, trace, and investigate recent interactions of newly tested COVID-19 infected individuals. The prospective use of such applications has produced several debates surrounding confidentiality, security, data supervision, closeness approximation algorithms, and cyber-attack susceptibility. This paper discusses these concerns in the context of a novel smartphone application architecture, proposed here, that gives users more control and privacy during contact tracing. The proposed application is termed COVIDFREE App, which is aimed at enhancing users’ situational awareness through communication of safe and unsafe locations. An overview of the app’s architectural design and functionality are presented, including a newly developed Overall Risk Density Safety Factor calculation inspired by COVID-19 density risks and factors of users based on health requirements and several customizable user-specific scenarios. Finally, the paper outlines the benefit to funding and developing contact tracing apps, such as the COVIDFRE App, and discusses advantages of such applications including citizen awareness, relief, and preparedness.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117085332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Taiwan’s Ability to Reduce the Transmission of COVID-19: A Success Story 台湾减少新冠病毒传播的能力:一个成功的故事
Pub Date : 2020-11-12 DOI: 10.1109/ISTAS50296.2020.9462226
H. Fan
Taiwan is known for its effective responses to COVID-19, with only 799 confirmed cases by the end of 2020. Based on the previous research, this article identifies three major technical approaches used in Taiwan to prevent the community spread of COVID-19: (1) Digital fence and entry quarantine system to track close contacts and force 14 days of in-home quarantine; (2) Evolving face mask distribution policy and system to ensure fair allocation of the limited face mask resources; and (3) Open-source software co-developed by the government and tech community to share real-time COVID-19 related information and conduct location history based contact tracing. The combat against COVID-19 in Taiwan is a success in digital governance, with great synergy between the government and every citizen.
台湾以有效应对新冠肺炎而闻名,截至2020年底,确诊病例仅为799例。基于以往的研究,本文确定了台湾预防COVID-19社区传播的三种主要技术方法:(1)数字围栏和入境隔离系统,跟踪密切接触者并强制进行14天的居家隔离;(2)完善口罩分配政策和制度,确保有限的口罩资源得到公平分配;(3)政府与科技界合作开发的开源软件,实时共享新冠肺炎相关信息,开展基于位置历史的接触者追踪。台湾抗击新冠肺炎疫情,是数字治理的成功之举,是政府与全民协同的成功之举。
{"title":"Taiwan’s Ability to Reduce the Transmission of COVID-19: A Success Story","authors":"H. Fan","doi":"10.1109/ISTAS50296.2020.9462226","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462226","url":null,"abstract":"Taiwan is known for its effective responses to COVID-19, with only 799 confirmed cases by the end of 2020. Based on the previous research, this article identifies three major technical approaches used in Taiwan to prevent the community spread of COVID-19: (1) Digital fence and entry quarantine system to track close contacts and force 14 days of in-home quarantine; (2) Evolving face mask distribution policy and system to ensure fair allocation of the limited face mask resources; and (3) Open-source software co-developed by the government and tech community to share real-time COVID-19 related information and conduct location history based contact tracing. The combat against COVID-19 in Taiwan is a success in digital governance, with great synergy between the government and every citizen.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114396233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing cyber-physical threats to Pennsylvania dams through a lens of vulnerability 从脆弱性的角度分析宾夕法尼亚大坝面临的网络物理威胁
Pub Date : 2020-11-12 DOI: 10.1109/ISTAS50296.2020.9756013
Lauren Dennis, S. Rajtmajer, C. Grady
Protecting critical infrastructure, such as water supply systems and dams, remains a top priority across multiple administrations in the United States. We study the ethical and environmental justice implications of potential disruptions to 29 dams across the State of Pennsylvania that serve as a water supply. Using census data, we investigate the communities surrounding these dams to look for relationships between community demographics and dam characteristics that may contribute to risk. We highlight the role of dam age, dam ownership, dam capacity, and dam downstream hazard potential in this analysis. Our results reveal associations between dam ownership, age, and capacity with the race of the population served, as well as an association between dam ownership and household income band. We conclude with a discussion on the increasing complexity of cyber-physical critical infrastructure and the need for future research which explicitly takes the populations served by this infrastructure into account.
保护关键的基础设施,如供水系统和水坝,仍然是美国多个政府的首要任务。我们研究了横跨宾夕法尼亚州作为供水系统的29座水坝的潜在破坏对伦理和环境正义的影响。利用人口普查数据,我们调查了这些水坝周围的社区,以寻找可能导致风险的社区人口统计与水坝特征之间的关系。在此分析中,我们强调了水坝年龄、水坝所有权、水坝容量和水坝下游潜在危害的作用。我们的研究结果揭示了大坝拥有权、年龄和容量与服务人口种族之间的关联,以及大坝拥有权与家庭收入水平之间的关联。最后,我们讨论了日益复杂的网络物理关键基础设施和未来研究的需要,明确考虑到这些基础设施所服务的人群。
{"title":"Analyzing cyber-physical threats to Pennsylvania dams through a lens of vulnerability","authors":"Lauren Dennis, S. Rajtmajer, C. Grady","doi":"10.1109/ISTAS50296.2020.9756013","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9756013","url":null,"abstract":"Protecting critical infrastructure, such as water supply systems and dams, remains a top priority across multiple administrations in the United States. We study the ethical and environmental justice implications of potential disruptions to 29 dams across the State of Pennsylvania that serve as a water supply. Using census data, we investigate the communities surrounding these dams to look for relationships between community demographics and dam characteristics that may contribute to risk. We highlight the role of dam age, dam ownership, dam capacity, and dam downstream hazard potential in this analysis. Our results reveal associations between dam ownership, age, and capacity with the race of the population served, as well as an association between dam ownership and household income band. We conclude with a discussion on the increasing complexity of cyber-physical critical infrastructure and the need for future research which explicitly takes the populations served by this infrastructure into account.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124341332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effects of Availability and Accessibility of Blue-Green Infrastructure on Environmental Justice and Health Equality 蓝绿色基础设施可用性和可及性对环境正义和健康平等的影响
Pub Date : 2020-11-12 DOI: 10.1109/ISTAS50296.2020.9462208
Maryam Rezaei Ghaleh, Marzieh Rezaei Ghaleh
Rapid urbanization, especially in developing countries, and population growth lead to a wide range of health risks in many cities. Recent researches have also shown a linear relationship between two factors of green spaces and health. Besides, the sustainable development goals (SDGs) emphasize access to safe, green, and public spaces for all people. This paper aims to indicate that accessibility and availability of blue-green infrastructure are more important than other factors in health issues. Our research method is case-study, and therefore, we chose Qazvin City in Iran as a developing city in the Middle East. In recent years, Qazvin has faced with an upward trend in urban development and population growth. Then, to find the relation between the availability and accessibility of BGI and health justice, we analyze the total number of monthly ambulance calls for all six Qazvin districts. We visualize the distribution of the ambulance calls for each district and show the BGI distribution on the city map and calculate the amount of BGI availability and accessibility of each city district by GIS. Then we set the ranking for BGI availability and accessibility and conduct a linear correlation analysis with the total number of ambulance calls and health variables and employ Spearman’s Rho as the correlation measure.Consequently, the results demonstrate a significant relationship between the availability and accessibility of BGI and the number of ambulance calls. In other words, the inhabitants of the districts with a low level of availability and accessibility to BGI suffer from environmental injustice and health inequality. Finally, we conclude that urban planning can help to reduce health inequalities by improving blue-green infrastructure.
快速城市化,特别是在发展中国家,以及人口增长导致许多城市出现广泛的健康风险。最近的研究也表明,绿色空间和健康这两个因素之间存在线性关系。此外,可持续发展目标强调为所有人提供安全、绿色和公共的空间。本文旨在表明蓝绿色基础设施的可及性和可用性在健康问题中比其他因素更重要。我们的研究方法是案例研究,因此,我们选择伊朗的加兹温市作为中东地区的一个发展中城市。近年来,加兹温面临着城市发展和人口增长的上升趋势。然后,为了找出华大基因的可用性和可及性与卫生公正之间的关系,我们分析了所有六个加兹温地区的每月救护车呼叫总数。我们将每个地区的救护车呼叫分布可视化,并在城市地图上显示华大基因分布,并通过GIS计算每个城市地区的华大基因可用性和可及性。然后,我们设置了华大基因可获得性和可及性的排名,并与救护车呼叫总数和健康变量进行了线性相关分析,并采用Spearman’s Rho作为相关度量。因此,研究结果表明,BGI的可用性和可及性与救护车呼叫次数之间存在显著关系。换句话说,大基因的可得性和可及性较低的地区的居民遭受环境不公正和健康不平等。最后,我们得出结论,城市规划可以通过改善蓝绿基础设施来帮助减少健康不平等。
{"title":"Effects of Availability and Accessibility of Blue-Green Infrastructure on Environmental Justice and Health Equality","authors":"Maryam Rezaei Ghaleh, Marzieh Rezaei Ghaleh","doi":"10.1109/ISTAS50296.2020.9462208","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462208","url":null,"abstract":"Rapid urbanization, especially in developing countries, and population growth lead to a wide range of health risks in many cities. Recent researches have also shown a linear relationship between two factors of green spaces and health. Besides, the sustainable development goals (SDGs) emphasize access to safe, green, and public spaces for all people. This paper aims to indicate that accessibility and availability of blue-green infrastructure are more important than other factors in health issues. Our research method is case-study, and therefore, we chose Qazvin City in Iran as a developing city in the Middle East. In recent years, Qazvin has faced with an upward trend in urban development and population growth. Then, to find the relation between the availability and accessibility of BGI and health justice, we analyze the total number of monthly ambulance calls for all six Qazvin districts. We visualize the distribution of the ambulance calls for each district and show the BGI distribution on the city map and calculate the amount of BGI availability and accessibility of each city district by GIS. Then we set the ranking for BGI availability and accessibility and conduct a linear correlation analysis with the total number of ambulance calls and health variables and employ Spearman’s Rho as the correlation measure.Consequently, the results demonstrate a significant relationship between the availability and accessibility of BGI and the number of ambulance calls. In other words, the inhabitants of the districts with a low level of availability and accessibility to BGI suffer from environmental injustice and health inequality. Finally, we conclude that urban planning can help to reduce health inequalities by improving blue-green infrastructure.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130378792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 IEEE International Symposium on Technology and Society (ISTAS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1