首页 > 最新文献

2015 IEEE International Symposium on Technology and Society (ISTAS)最新文献

英文 中文
Development of the Fynbos Leaf Optical Recognition Application (FLORA): An innovation journey of a tool to assist in identifying plants Fynbos叶片光学识别应用程序(FLORA)的开发:一个帮助识别植物的工具的创新之旅
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439398
S. Winberg
The Fynbos Leaf Optical Recognition Application (FLORA) is a software program to automatically identify fynbos plants using leaf photographs. While it is easier to classify fynbos when they are flowering, most fynbos flower for only short periods therefore FLORA was designed to identify plants by leaves instead of flowers. This paper presents the innovation journey of FLORA, highlighting transitions in development spaces, impact of requirements changes, and other significant challenges and lessons learned in the journey. The development was done out in a university research context and vacillated between being in a closed space and being a more open initiative. The project settled on being a collaborative and open innovation whereby the system supports a more diverse community of users and contributors. While the original requirements concerned a small scientific community of students and scientists botanists, the revised system, which the innovation journey lead towards, aims instead towards a wider community including tourists and schools pupils. It is hoped the innovation will have a broader societal influence in particular at schools level, where it is hoped that FLORA will both inspire young learns, and in particular tech savvy kids who spend too much time indoors, to spend time outdoors and to improve their awareness and appreciation of nature. This paper concludes with ways the project could have been streamlined from early on to better support the users and to facilitate the transition from a close to an open innovation.
Fynbos叶片光学识别应用程序(FLORA)是一个软件程序,可以使用叶片照片自动识别Fynbos植物。虽然在开花时比较容易对飞燕草进行分类,但大多数飞燕草只花很短的时间,因此FLORA的设计是通过叶子而不是花来识别植物。本文介绍了FLORA的创新之旅,重点介绍了发展空间的转变、需求变化的影响以及在这一过程中获得的其他重大挑战和经验教训。该项目是在一个大学研究背景下进行的,在一个封闭的空间和一个更开放的空间之间摇摆不定。该项目决定成为一个协作和开放的创新,系统支持更多样化的用户和贡献者社区。虽然最初的要求涉及一个由学生和科学家植物学家组成的小型科学社区,但创新之旅所引导的修订后的系统旨在面向包括游客和学校学生在内的更广泛的社区。希望这项创新能够产生更广泛的社会影响,特别是在学校层面,希望FLORA能够激励年轻的学习者,特别是那些在室内花费太多时间的技术娴熟的孩子,花时间在户外,提高他们对自然的认识和欣赏。本文总结了从早期开始简化项目的方法,以便更好地支持用户,并促进从封闭创新到开放创新的过渡。
{"title":"Development of the Fynbos Leaf Optical Recognition Application (FLORA): An innovation journey of a tool to assist in identifying plants","authors":"S. Winberg","doi":"10.1109/ISTAS.2015.7439398","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439398","url":null,"abstract":"The Fynbos Leaf Optical Recognition Application (FLORA) is a software program to automatically identify fynbos plants using leaf photographs. While it is easier to classify fynbos when they are flowering, most fynbos flower for only short periods therefore FLORA was designed to identify plants by leaves instead of flowers. This paper presents the innovation journey of FLORA, highlighting transitions in development spaces, impact of requirements changes, and other significant challenges and lessons learned in the journey. The development was done out in a university research context and vacillated between being in a closed space and being a more open initiative. The project settled on being a collaborative and open innovation whereby the system supports a more diverse community of users and contributors. While the original requirements concerned a small scientific community of students and scientists botanists, the revised system, which the innovation journey lead towards, aims instead towards a wider community including tourists and schools pupils. It is hoped the innovation will have a broader societal influence in particular at schools level, where it is hoped that FLORA will both inspire young learns, and in particular tech savvy kids who spend too much time indoors, to spend time outdoors and to improve their awareness and appreciation of nature. This paper concludes with ways the project could have been streamlined from early on to better support the users and to facilitate the transition from a close to an open innovation.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122878602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supporting a culture of innovation at a new university of technology 支持一所新科技大学的创新文化
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439397
C. Winberg, S. Pather, M. D. Plessis
This paper assesses the impact of a new academic workload model on research and technology innovation in a new university of technology. The project was framed by understandings of "the innovation journey", as well as emerging understandings of "temporality" against the background of the intensification of academic work and shifts towards project-based and externally funded research. The paper draws on data collected over a one-year period during which the policy instrument was piloted. It concludes that policy-making and policy-uptake (or rejection) occurs in interactions with innovative and conservative agents, existing and planned university configurations, broader social contexts and their ongoing dynamics. An analysis of the dynamics of innovation reveals patterns that can be used to enhance institutional learning.
本文评估了一种新的学术工作量模式对一所新型技术大学的研究和技术创新的影响。该项目的框架是对“创新之旅”的理解,以及在学术工作加剧和转向基于项目和外部资助的研究的背景下对“暂时性”的新兴理解。该文件利用了在该政策工具试点期间收集的一年数据。它的结论是,政策制定和政策采纳(或拒绝)发生在与创新和保守代理人、现有和计划中的大学配置、更广泛的社会背景及其持续动态的相互作用中。对创新动态的分析揭示了可用于加强制度学习的模式。
{"title":"Supporting a culture of innovation at a new university of technology","authors":"C. Winberg, S. Pather, M. D. Plessis","doi":"10.1109/ISTAS.2015.7439397","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439397","url":null,"abstract":"This paper assesses the impact of a new academic workload model on research and technology innovation in a new university of technology. The project was framed by understandings of \"the innovation journey\", as well as emerging understandings of \"temporality\" against the background of the intensification of academic work and shifts towards project-based and externally funded research. The paper draws on data collected over a one-year period during which the policy instrument was piloted. It concludes that policy-making and policy-uptake (or rejection) occurs in interactions with innovative and conservative agents, existing and planned university configurations, broader social contexts and their ongoing dynamics. An analysis of the dynamics of innovation reveals patterns that can be used to enhance institutional learning.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124131007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ethical challenges for future technologists: The growing role of technology and the growing ethical responsibility of the technologist 未来技术人员面临的道德挑战:技术日益增长的作用和技术人员日益增长的道德责任
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439442
G. Adamson
The 21st century is witnessing unprecedented automation in many areas of life. As a result, tasks previously undertaken by a person are now done by a machine. Humans who previously undertook these tasks brought particular views and approaches to each task. These or alternative views or approaches are now embodied in the machine. Rather than entirely removing humans from the process, however, replacement of human by machine has meant that the direct engagement of a person in a task has been replaced by the indirect engagement of the technologist who creates the machine. Among other things this has meant that the ethical responsibilities of the original human operator have devolved to the technologist. This raises questions of substantive ethics, and the responsibility of the technologist, including as "whistle-blower". This paper examines three areas of technology development which highlight the growing ethical responsibility of technologists: the automation of work; the mechanization of humans; and autonomous warfare. The three areas selected have implications today, even in an early stage of development. Soon the responsibilities these technologies engender will confront technologists in their professional life.
21世纪在生活的许多领域见证了前所未有的自动化。因此,以前由人承担的任务现在由机器完成。以前承担这些任务的人对每项任务都有特定的看法和方法。这些或替代的观点或方法现在体现在机器中。然而,机器取代人类并不是将人类完全从这一过程中移除,而是意味着人类直接参与一项任务已被创造机器的技术人员的间接参与所取代。除此之外,这意味着最初的人类操作员的道德责任已经转移到技术专家身上。这引发了实质性道德问题,以及技术专家的责任问题,包括作为“举报人”的责任问题。本文考察了技术发展的三个领域,这些领域突出了技术人员日益增长的道德责任:工作自动化;人类的机械化;自主战争。所选的三个领域在今天,甚至在发展的早期阶段都有影响。很快,这些技术带来的责任将在技术人员的职业生涯中面临。
{"title":"Ethical challenges for future technologists: The growing role of technology and the growing ethical responsibility of the technologist","authors":"G. Adamson","doi":"10.1109/ISTAS.2015.7439442","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439442","url":null,"abstract":"The 21st century is witnessing unprecedented automation in many areas of life. As a result, tasks previously undertaken by a person are now done by a machine. Humans who previously undertook these tasks brought particular views and approaches to each task. These or alternative views or approaches are now embodied in the machine. Rather than entirely removing humans from the process, however, replacement of human by machine has meant that the direct engagement of a person in a task has been replaced by the indirect engagement of the technologist who creates the machine. Among other things this has meant that the ethical responsibilities of the original human operator have devolved to the technologist. This raises questions of substantive ethics, and the responsibility of the technologist, including as \"whistle-blower\". This paper examines three areas of technology development which highlight the growing ethical responsibility of technologists: the automation of work; the mechanization of humans; and autonomous warfare. The three areas selected have implications today, even in an early stage of development. Soon the responsibilities these technologies engender will confront technologists in their professional life.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122322773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Factors impacting on adoption of Technology-enhanced Learning techniques by universities in Nairobi, Kenya 影响肯尼亚内罗毕大学采用技术增强学习技术的因素
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439446
M. Cunningham
While infrastructure has improved and students state a preference for blended learning, there were few eLearning courses provided by Kenyan Higher Education Institutions in the 2012/2013 academic year. It is unclear what factors impact on the adoption of Technology-enhanced Learning (TEL) techniques in Nairobi Universities. Using semi-structured interviews and purposive and snowball sampling with ten institutions in Nairobi (4 public and 5 private Universities and the NREN) from 18 December 2014 to 12 January 2015, we explored the level of TEL usage, perceived benefits and challenges of using TEL from both an institutional and instructor perspective and the primary reasons why TEL is not being leveraged. Informants agreed that wider adoption of TEL is the way forward but this requires addressing current challenges and factors currently limiting uptake. These include: infrastructure challenges, need for training to up-skill faculty members; institutional policies; insufficient leadership and need to develop a strategic plan for eContent development. The findings highlight a number of practical issues that can be undertaken to mitigate the factors identified.
虽然基础设施得到了改善,学生们表示更喜欢混合学习,但在2012/2013学年,肯尼亚高等教育机构提供的电子学习课程很少。目前尚不清楚是什么因素影响了内罗毕大学采用技术促进学习(TEL)技术。从2014年12月18日至2015年1月12日,我们对内罗毕的10所机构(4所公立大学和5所私立大学以及NREN)进行了半结构化访谈和有目的的滚雪球抽样,从机构和教师的角度探讨了电话的使用水平、使用电话的感知好处和挑战,以及电话未被利用的主要原因。举报人一致认为,更广泛地采用电子电话是前进的方向,但这需要解决当前的挑战和目前限制采用的因素。这些挑战包括:基础设施的挑战,需要培训以提高教师的技能;制度政策;领导能力不足,需要为内容开发制定战略计划。调查结果强调了可以采取的一些实际问题,以减轻所确定的因素。
{"title":"Factors impacting on adoption of Technology-enhanced Learning techniques by universities in Nairobi, Kenya","authors":"M. Cunningham","doi":"10.1109/ISTAS.2015.7439446","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439446","url":null,"abstract":"While infrastructure has improved and students state a preference for blended learning, there were few eLearning courses provided by Kenyan Higher Education Institutions in the 2012/2013 academic year. It is unclear what factors impact on the adoption of Technology-enhanced Learning (TEL) techniques in Nairobi Universities. Using semi-structured interviews and purposive and snowball sampling with ten institutions in Nairobi (4 public and 5 private Universities and the NREN) from 18 December 2014 to 12 January 2015, we explored the level of TEL usage, perceived benefits and challenges of using TEL from both an institutional and instructor perspective and the primary reasons why TEL is not being leveraged. Informants agreed that wider adoption of TEL is the way forward but this requires addressing current challenges and factors currently limiting uptake. These include: infrastructure challenges, need for training to up-skill faculty members; institutional policies; insufficient leadership and need to develop a strategic plan for eContent development. The findings highlight a number of practical issues that can be undertaken to mitigate the factors identified.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129928177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Palm-print recognition for authentication on smartphones 掌纹识别用于智能手机的身份验证
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439441
Hossein Javidnia, Adrian-Stefan Ungureanu, P. Corcoran
In a world where smart phones are becoming ubiquitous and are more powerful than ever, security is becoming an issue. Equipped with good cameras, smart phones are prime candidates for software designed to recognize objects and people around them. By recognizing biometric patterns such as the face, palm-prints or hand knuckles, smart phones can heighten security standards. Depending on the intended action, specific security requirements should be met. For instance, bank services need a reliable authentication system, whereas unlocking a device can use a lower security feature. For this perspective we are working on a database of palm-prints that have only been acquired using smart phones to verify their users' identity and also designing an authentication system based on these results to be used on smartphones.
在一个智能手机变得无处不在、功能比以往任何时候都强大的世界里,安全正成为一个问题。智能手机配备了良好的摄像头,是设计用于识别物体和周围人的软件的首选。通过识别面部、掌纹或指关节等生物特征,智能手机可以提高安全标准。根据预期的操作,应该满足特定的安全需求。例如,银行服务需要可靠的身份验证系统,而解锁设备可以使用较低的安全功能。从这个角度来看,我们正在研究一个只使用智能手机获取的掌纹数据库,以验证用户的身份,并基于这些结果设计一个身份验证系统,用于智能手机。
{"title":"Palm-print recognition for authentication on smartphones","authors":"Hossein Javidnia, Adrian-Stefan Ungureanu, P. Corcoran","doi":"10.1109/ISTAS.2015.7439441","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439441","url":null,"abstract":"In a world where smart phones are becoming ubiquitous and are more powerful than ever, security is becoming an issue. Equipped with good cameras, smart phones are prime candidates for software designed to recognize objects and people around them. By recognizing biometric patterns such as the face, palm-prints or hand knuckles, smart phones can heighten security standards. Depending on the intended action, specific security requirements should be met. For instance, bank services need a reliable authentication system, whereas unlocking a device can use a lower security feature. For this perspective we are working on a database of palm-prints that have only been acquired using smart phones to verify their users' identity and also designing an authentication system based on these results to be used on smartphones.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130530797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
New technologies and mixed-use convergence: How humans and algorithms are adapting to each other 新技术和混合用途融合:人类和算法如何相互适应
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439436
Sally A. Applin, Michael D. Fischer
Human experience with technology has shifted from technological contexts requiring occasional intervention by a fraction of people mostly in command of technologies, to technological contexts that require constant ongoing participation from most people to complete tasks. We examine the current state of `mixed-use' new technologies integration with legacy systems, and whether the human assistance required to complete tasks and processes could function as a training ground for future smart systems, or whether increasing `co-dependence with' or `training of' algorithmic systems, enhancing task completion and inadvertently educating systems in human behaviour and intelligence, will simply subsume people into the algorithmic landscape. As the Internet of Things (IoT) arises in conjunction with advancing robotics and drone technology, semi and fully automated algorithmic systems are being developed that intersect with human experience in new and heterogeneous ways. Many new technologies are not yet flexible enough to support the choices people require in their daily lives, due to limitations in the algorithmic `logics' used that restrict options to predetermined pathways conceived of by programmers. This greatly limits human agency, and presently the potential to overcome problems that arise in processes. In this mixed-use period, we have the opportunity to develop new ways to address ethical guidance as knowledge that machines can learn. We explore promoting embedding of ethically-based principles into automated contexts through: (1) developing mutually agreed automated external ethical review systems (human or otherwise) that evaluate conformance across multiple ethical codes and provide feedback to designers, agents, and users on the distribution of conformance; (2) focusing on review systems to drive distributed development of embedded ethical principles in individual services by responding to this feedback to develop ongoing correction through dynamic adaption or incremental releases; and (3) using multi-agent simulation tools to forecast scenarios in real time.
人类对技术的经验已经从需要少数掌握技术的人偶尔干预的技术环境转变为需要大多数人持续参与完成任务的技术环境。我们研究了“混合使用”新技术与遗留系统集成的现状,以及完成任务和流程所需的人类协助是否可以作为未来智能系统的培训基地,或者是否增加“与算法系统的共同依赖”或“训练”,提高任务完成度并无意中教育系统人类行为和智能,将简单地将人纳入算法景观。随着物联网(IoT)与先进的机器人和无人机技术一起出现,人们正在开发半自动和全自动算法系统,这些系统以新的和异构的方式与人类经验交叉。由于算法“逻辑”的限制,许多新技术还不够灵活,无法支持人们在日常生活中所需要的选择,这些“逻辑”将选择限制在程序员设想的预定路径上。这极大地限制了人类的能动性,以及目前克服过程中出现的问题的潜力。在这个混合使用时期,我们有机会开发新的方法,将道德指导作为机器可以学习的知识。我们探索通过以下方式促进将基于道德的原则嵌入到自动化环境中:(1)开发相互同意的自动化外部道德审查系统(人工或其他),评估多个道德准则的一致性,并就一致性的分布向设计师、代理和用户提供反馈;(2)专注于审查系统,通过响应这些反馈,通过动态适应或增量发布来开发持续的纠正,从而推动个人服务中嵌入式道德原则的分布式开发;(3)利用多智能体仿真工具对场景进行实时预测。
{"title":"New technologies and mixed-use convergence: How humans and algorithms are adapting to each other","authors":"Sally A. Applin, Michael D. Fischer","doi":"10.1109/ISTAS.2015.7439436","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439436","url":null,"abstract":"Human experience with technology has shifted from technological contexts requiring occasional intervention by a fraction of people mostly in command of technologies, to technological contexts that require constant ongoing participation from most people to complete tasks. We examine the current state of `mixed-use' new technologies integration with legacy systems, and whether the human assistance required to complete tasks and processes could function as a training ground for future smart systems, or whether increasing `co-dependence with' or `training of' algorithmic systems, enhancing task completion and inadvertently educating systems in human behaviour and intelligence, will simply subsume people into the algorithmic landscape. As the Internet of Things (IoT) arises in conjunction with advancing robotics and drone technology, semi and fully automated algorithmic systems are being developed that intersect with human experience in new and heterogeneous ways. Many new technologies are not yet flexible enough to support the choices people require in their daily lives, due to limitations in the algorithmic `logics' used that restrict options to predetermined pathways conceived of by programmers. This greatly limits human agency, and presently the potential to overcome problems that arise in processes. In this mixed-use period, we have the opportunity to develop new ways to address ethical guidance as knowledge that machines can learn. We explore promoting embedding of ethically-based principles into automated contexts through: (1) developing mutually agreed automated external ethical review systems (human or otherwise) that evaluate conformance across multiple ethical codes and provide feedback to designers, agents, and users on the distribution of conformance; (2) focusing on review systems to drive distributed development of embedded ethical principles in individual services by responding to this feedback to develop ongoing correction through dynamic adaption or incremental releases; and (3) using multi-agent simulation tools to forecast scenarios in real time.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"586 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131846574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Biometrics in social grants: Separating myth from reality 社会补助中的生物识别技术:从现实中分离神话
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439438
H. V. D. Haar, D. Greunen, D. Pottas
The South African government provides a social assistance programme that pays out monetary grants to qualifying persons. In 2012, the South African Social Security Agency (SASSA) who manages these social grants, instituted a new form of identification that required the capturing of biometric features such as fingerprints and voice samples, to better identify the grant recipients in order to reduce fraud. This paper describes the development of a framework for an appropriate implementation of biometrics for the social grant programme taking into account the security requirements as well as the vulnerability of the grant recipients.
南非政府提供一项社会援助方案,向符合条件的人发放现金补助。2012年,管理这些社会补助金的南非社会保障局(SASSA)制定了一种新的身份识别方式,需要采集指纹和声音样本等生物特征,以更好地识别赠款接受者,以减少欺诈。本文描述了考虑到安全要求以及赠款接受者的脆弱性,为社会赠款计划适当实施生物识别技术的框架的发展。
{"title":"Biometrics in social grants: Separating myth from reality","authors":"H. V. D. Haar, D. Greunen, D. Pottas","doi":"10.1109/ISTAS.2015.7439438","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439438","url":null,"abstract":"The South African government provides a social assistance programme that pays out monetary grants to qualifying persons. In 2012, the South African Social Security Agency (SASSA) who manages these social grants, instituted a new form of identification that required the capturing of biometric features such as fingerprints and voice samples, to better identify the grant recipients in order to reduce fraud. This paper describes the development of a framework for an appropriate implementation of biometrics for the social grant programme taking into account the security requirements as well as the vulnerability of the grant recipients.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130022218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vision for secure home robots: Implementation of two-factor authentication 安全家用机器人的愿景:双因素身份验证的实现
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439425
Dhvanik Miglani, Arnold Hensman
The robotics industry is developing at a fast pace and it seems inevitable that home robots will become affordable, easily accessible and popular. They will be able to perform a will be able to perform a wide range of tasks ranging from household chores, entertainment, home security and surveillance and will become an important part of our lives. The robots like any other a computer system connected to a computer network is vulnerable to hackers. In the paper the authors aim to expose the vulnerabilities and ethical implications of using a popular home robot in order to encourage the research community to put their minds to this pertinent issue. The authors also provide a solution that needs to be developed upon to overcome the security risks.
机器人行业正在快速发展,家用机器人似乎不可避免地会变得负担得起、容易获得和流行。他们将能够执行将能够执行范围广泛的任务,从家务,娱乐,家庭安全和监视,并将成为我们生活的重要组成部分。像任何其他连接到计算机网络的计算机系统一样,机器人很容易受到黑客的攻击。在论文中,作者旨在揭露使用流行的家用机器人的脆弱性和伦理影响,以鼓励研究界把他们的思想放在这个相关的问题上。作者还提供了一个需要开发的解决方案,以克服安全风险。
{"title":"Vision for secure home robots: Implementation of two-factor authentication","authors":"Dhvanik Miglani, Arnold Hensman","doi":"10.1109/ISTAS.2015.7439425","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439425","url":null,"abstract":"The robotics industry is developing at a fast pace and it seems inevitable that home robots will become affordable, easily accessible and popular. They will be able to perform a will be able to perform a wide range of tasks ranging from household chores, entertainment, home security and surveillance and will become an important part of our lives. The robots like any other a computer system connected to a computer network is vulnerable to hackers. In the paper the authors aim to expose the vulnerabilities and ethical implications of using a popular home robot in order to encourage the research community to put their minds to this pertinent issue. The authors also provide a solution that needs to be developed upon to overcome the security risks.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114404408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Driving the self-driving vehicle: Expanding the technological design horizon 驾驶自动驾驶汽车:拓展技术设计视野
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439419
Pascale-L. Blyth, M. Mladenović, B. Nardi, N. Su, H. Ekbia
Drawing perspectives from science and technology studies, philosophy of science, and literature from ethics and social justice, this paper examines the promises and challenges in the development of self-driving vehicle (SDV) technology. We start with the premise that the combination of different computing technologies embedded in SDVs is a powerful tool for efficiency in communications, information gathering, processing, and storage. However, by focusing on efficiency, SDVs provide a new mode of industrialized transportation whose users can only choose between transportation services, but have little or no say about the broader social implications of the technology. We argue that perspectives from social justice and ethics show that SDVs have implications beyond transportation, with profound consequences for users and societies. In particular, values such as privacy, security, and responsibility may be changed for good or bad, in both the short and long-term. The examination of these changes, while the technology is still under foundational development, is as urgent as it is needed.
本文从科学技术研究、科学哲学、伦理和社会正义的角度出发,探讨了自动驾驶汽车(SDV)技术发展的前景和挑战。我们的前提是,在sdv中嵌入不同计算技术的组合是提高通信、信息收集、处理和存储效率的强大工具。然而,通过关注效率,sdv提供了一种新的工业化运输模式,其用户只能在运输服务之间进行选择,但对该技术的更广泛的社会影响几乎没有发言权。我们认为,从社会正义和道德的角度来看,sdv的影响超出了交通运输,对用户和社会产生了深远的影响。特别是,诸如隐私、安全和责任之类的价值观可能会在短期和长期内发生好或坏的变化。虽然这项技术仍处于基础开发阶段,但对这些变化的审查是迫切需要的。
{"title":"Driving the self-driving vehicle: Expanding the technological design horizon","authors":"Pascale-L. Blyth, M. Mladenović, B. Nardi, N. Su, H. Ekbia","doi":"10.1109/ISTAS.2015.7439419","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439419","url":null,"abstract":"Drawing perspectives from science and technology studies, philosophy of science, and literature from ethics and social justice, this paper examines the promises and challenges in the development of self-driving vehicle (SDV) technology. We start with the premise that the combination of different computing technologies embedded in SDVs is a powerful tool for efficiency in communications, information gathering, processing, and storage. However, by focusing on efficiency, SDVs provide a new mode of industrialized transportation whose users can only choose between transportation services, but have little or no say about the broader social implications of the technology. We argue that perspectives from social justice and ethics show that SDVs have implications beyond transportation, with profound consequences for users and societies. In particular, values such as privacy, security, and responsibility may be changed for good or bad, in both the short and long-term. The examination of these changes, while the technology is still under foundational development, is as urgent as it is needed.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117117564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Toward meaningful human control of autonomous weapons systems through function allocation 通过功能分配实现对自主武器系统有意义的人类控制
Pub Date : 2015-10-26 DOI: 10.1109/ISTAS.2015.7439432
Marc C. Canellas, Rachel A. Haga
One of the few convergent themes during the first two United Nations Meeting of Experts on autonomous weapons systems (AWS) was the requirement that there be meaningful human control (MHC) of AWS. What exactly constitutes MHC, however, is still ill-defined. While multiple sets of definitions and analyses have been published and discussed, this work seeks to address two key issues with the current definitions: (1) they are inconsistent in what authorities and responsibilities of human and automated agents need to be regulated, and (2) they lack the specificity that would be required for designers to systemically integrate these restrictions into AWS designs. Given that MHC centers on the interaction of human and autonomous agents, we leverage the models and metrics of function allocation - the allocation of work between human and autonomous agents - to analyze and compare definitions of MHC and the definitions of AWS proposed by the U.S. Department of Defense. Specifically, we transform the definitions into function allocation form to model and compare the definitions, and then show how a mismatch between authority and responsibility in an exemplar military scenario can still plague the human-AWS interactions. In summary, this paper provides a starting point for future research to investigate the application of function allocation to the questions of MHC and more generally, the development of rules and standards for incorporating AWS into the law of armed conflict.
在前两次联合国自主武器系统专家会议期间,为数不多的一致主题之一是要求对自主武器系统进行有意义的人类控制。然而,究竟是什么构成了MHC,仍然没有明确的定义。虽然已经发表和讨论了多套定义和分析,但本工作旨在解决当前定义的两个关键问题:(1)它们在需要监管的人类和自动代理的权限和责任方面不一致;(2)它们缺乏设计人员将这些限制系统地集成到AWS设计中所需的特异性。鉴于MHC以人类和自主代理的交互为中心,我们利用功能分配的模型和指标——人类和自主代理之间的工作分配——来分析和比较MHC的定义和美国国防部提出的AWS的定义。具体来说,我们将定义转换为功能分配形式,对定义进行建模和比较,然后展示在范例军事场景中,权力和责任之间的不匹配如何仍然会困扰人类与aws的交互。综上所述,本文为未来研究职能分配在MHC问题中的应用以及更广泛地将AWS纳入武装冲突法的规则和标准的制定提供了一个起点。
{"title":"Toward meaningful human control of autonomous weapons systems through function allocation","authors":"Marc C. Canellas, Rachel A. Haga","doi":"10.1109/ISTAS.2015.7439432","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439432","url":null,"abstract":"One of the few convergent themes during the first two United Nations Meeting of Experts on autonomous weapons systems (AWS) was the requirement that there be meaningful human control (MHC) of AWS. What exactly constitutes MHC, however, is still ill-defined. While multiple sets of definitions and analyses have been published and discussed, this work seeks to address two key issues with the current definitions: (1) they are inconsistent in what authorities and responsibilities of human and automated agents need to be regulated, and (2) they lack the specificity that would be required for designers to systemically integrate these restrictions into AWS designs. Given that MHC centers on the interaction of human and autonomous agents, we leverage the models and metrics of function allocation - the allocation of work between human and autonomous agents - to analyze and compare definitions of MHC and the definitions of AWS proposed by the U.S. Department of Defense. Specifically, we transform the definitions into function allocation form to model and compare the definitions, and then show how a mismatch between authority and responsibility in an exemplar military scenario can still plague the human-AWS interactions. In summary, this paper provides a starting point for future research to investigate the application of function allocation to the questions of MHC and more generally, the development of rules and standards for incorporating AWS into the law of armed conflict.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115132413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2015 IEEE International Symposium on Technology and Society (ISTAS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1