Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439421
Maija Poikela, Robert Schmidt, I. Wechsung, S. Möller
Location-based mobile tools provide effective means for mobile participation, allowing better targeting of users and faster opinion gathering for municipalities and organizations. For participation purposes it is essential to reach the users as widely as possible, and for this, smartphones with ever-increasing adoption rates offer an optimal tool. However, privacy concerns might prevent the use of location-based applications, which results in a bias in opinion-gathering. In this paper, we present results of a field study tackling the issue of how privacy concern affects the adoption and use of a location-based mobile participation application, and what motivates the use of such applications. We find that users have varying motivations for participating in location-based polls, and that these motivations depend on the type of the poll in question. We show that privacy concerned users are less likely to be motivated by a monetary benefit, but rather by the importance of the topic, and that the intrinsic motivators that drive the privacy concerned users differ from those that drive the unconcerned. Finally, we show that, based on our study, it seems that privacy concern might be an inhibiting factor in adoption of a location-based mobile participation application.
{"title":"\"About your smartphone usage\" — Privacy in location-based mobile participation","authors":"Maija Poikela, Robert Schmidt, I. Wechsung, S. Möller","doi":"10.1109/ISTAS.2015.7439421","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439421","url":null,"abstract":"Location-based mobile tools provide effective means for mobile participation, allowing better targeting of users and faster opinion gathering for municipalities and organizations. For participation purposes it is essential to reach the users as widely as possible, and for this, smartphones with ever-increasing adoption rates offer an optimal tool. However, privacy concerns might prevent the use of location-based applications, which results in a bias in opinion-gathering. In this paper, we present results of a field study tackling the issue of how privacy concern affects the adoption and use of a location-based mobile participation application, and what motivates the use of such applications. We find that users have varying motivations for participating in location-based polls, and that these motivations depend on the type of the poll in question. We show that privacy concerned users are less likely to be motivated by a monetary benefit, but rather by the importance of the topic, and that the intrinsic motivators that drive the privacy concerned users differ from those that drive the unconcerned. Finally, we show that, based on our study, it seems that privacy concern might be an inhibiting factor in adoption of a location-based mobile participation application.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129744498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439447
P. Cunningham
Innovation and ICT entrepreneurship are slowly being recognised as important enablers of socio-economic growth and realising national strategic goals in African Member States. However, the level of practical skills capacity, indigenous entrepreneurial expertise and policy support to take full advantage of this at national level varies considerably. This research study focused on identifying factors impacting on the current level of open innovation and ICT entrepreneurship in Africa. It was informed by a semi-structured, moderated focus group which captured the perspectives of senior public and education and research stakeholders from eight African Member States. The results highlighted six main factors: (a) level of political will reflected by resource prioritisation; (b) alignment with national development plans and associated funding priorities; (c) level of understanding of strategic benefits by ministers and senior civil servants; (d) level of awareness and sensitization of the general public, (e) availability of national innovation and entrepreneurial expertise; and (f) willingness and capacity to cooperate with other stakeholders to achieve common goals. Future research will capture perspectives from the private, societal and international donor sectors, and create and validate potential models/methodologies to address the challenges and opportunities identified in this study.
{"title":"Insights into open innovation and ICT entrepreneurship in Africa","authors":"P. Cunningham","doi":"10.1109/ISTAS.2015.7439447","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439447","url":null,"abstract":"Innovation and ICT entrepreneurship are slowly being recognised as important enablers of socio-economic growth and realising national strategic goals in African Member States. However, the level of practical skills capacity, indigenous entrepreneurial expertise and policy support to take full advantage of this at national level varies considerably. This research study focused on identifying factors impacting on the current level of open innovation and ICT entrepreneurship in Africa. It was informed by a semi-structured, moderated focus group which captured the perspectives of senior public and education and research stakeholders from eight African Member States. The results highlighted six main factors: (a) level of political will reflected by resource prioritisation; (b) alignment with national development plans and associated funding priorities; (c) level of understanding of strategic benefits by ministers and senior civil servants; (d) level of awareness and sensitization of the general public, (e) availability of national innovation and entrepreneurial expertise; and (f) willingness and capacity to cooperate with other stakeholders to achieve common goals. Future research will capture perspectives from the private, societal and international donor sectors, and create and validate potential models/methodologies to address the challenges and opportunities identified in this study.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"46 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126005596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439441
Hossein Javidnia, Adrian-Stefan Ungureanu, P. Corcoran
In a world where smart phones are becoming ubiquitous and are more powerful than ever, security is becoming an issue. Equipped with good cameras, smart phones are prime candidates for software designed to recognize objects and people around them. By recognizing biometric patterns such as the face, palm-prints or hand knuckles, smart phones can heighten security standards. Depending on the intended action, specific security requirements should be met. For instance, bank services need a reliable authentication system, whereas unlocking a device can use a lower security feature. For this perspective we are working on a database of palm-prints that have only been acquired using smart phones to verify their users' identity and also designing an authentication system based on these results to be used on smartphones.
{"title":"Palm-print recognition for authentication on smartphones","authors":"Hossein Javidnia, Adrian-Stefan Ungureanu, P. Corcoran","doi":"10.1109/ISTAS.2015.7439441","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439441","url":null,"abstract":"In a world where smart phones are becoming ubiquitous and are more powerful than ever, security is becoming an issue. Equipped with good cameras, smart phones are prime candidates for software designed to recognize objects and people around them. By recognizing biometric patterns such as the face, palm-prints or hand knuckles, smart phones can heighten security standards. Depending on the intended action, specific security requirements should be met. For instance, bank services need a reliable authentication system, whereas unlocking a device can use a lower security feature. For this perspective we are working on a database of palm-prints that have only been acquired using smart phones to verify their users' identity and also designing an authentication system based on these results to be used on smartphones.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130530797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439442
G. Adamson
The 21st century is witnessing unprecedented automation in many areas of life. As a result, tasks previously undertaken by a person are now done by a machine. Humans who previously undertook these tasks brought particular views and approaches to each task. These or alternative views or approaches are now embodied in the machine. Rather than entirely removing humans from the process, however, replacement of human by machine has meant that the direct engagement of a person in a task has been replaced by the indirect engagement of the technologist who creates the machine. Among other things this has meant that the ethical responsibilities of the original human operator have devolved to the technologist. This raises questions of substantive ethics, and the responsibility of the technologist, including as "whistle-blower". This paper examines three areas of technology development which highlight the growing ethical responsibility of technologists: the automation of work; the mechanization of humans; and autonomous warfare. The three areas selected have implications today, even in an early stage of development. Soon the responsibilities these technologies engender will confront technologists in their professional life.
{"title":"Ethical challenges for future technologists: The growing role of technology and the growing ethical responsibility of the technologist","authors":"G. Adamson","doi":"10.1109/ISTAS.2015.7439442","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439442","url":null,"abstract":"The 21st century is witnessing unprecedented automation in many areas of life. As a result, tasks previously undertaken by a person are now done by a machine. Humans who previously undertook these tasks brought particular views and approaches to each task. These or alternative views or approaches are now embodied in the machine. Rather than entirely removing humans from the process, however, replacement of human by machine has meant that the direct engagement of a person in a task has been replaced by the indirect engagement of the technologist who creates the machine. Among other things this has meant that the ethical responsibilities of the original human operator have devolved to the technologist. This raises questions of substantive ethics, and the responsibility of the technologist, including as \"whistle-blower\". This paper examines three areas of technology development which highlight the growing ethical responsibility of technologists: the automation of work; the mechanization of humans; and autonomous warfare. The three areas selected have implications today, even in an early stage of development. Soon the responsibilities these technologies engender will confront technologists in their professional life.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122322773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439446
M. Cunningham
While infrastructure has improved and students state a preference for blended learning, there were few eLearning courses provided by Kenyan Higher Education Institutions in the 2012/2013 academic year. It is unclear what factors impact on the adoption of Technology-enhanced Learning (TEL) techniques in Nairobi Universities. Using semi-structured interviews and purposive and snowball sampling with ten institutions in Nairobi (4 public and 5 private Universities and the NREN) from 18 December 2014 to 12 January 2015, we explored the level of TEL usage, perceived benefits and challenges of using TEL from both an institutional and instructor perspective and the primary reasons why TEL is not being leveraged. Informants agreed that wider adoption of TEL is the way forward but this requires addressing current challenges and factors currently limiting uptake. These include: infrastructure challenges, need for training to up-skill faculty members; institutional policies; insufficient leadership and need to develop a strategic plan for eContent development. The findings highlight a number of practical issues that can be undertaken to mitigate the factors identified.
{"title":"Factors impacting on adoption of Technology-enhanced Learning techniques by universities in Nairobi, Kenya","authors":"M. Cunningham","doi":"10.1109/ISTAS.2015.7439446","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439446","url":null,"abstract":"While infrastructure has improved and students state a preference for blended learning, there were few eLearning courses provided by Kenyan Higher Education Institutions in the 2012/2013 academic year. It is unclear what factors impact on the adoption of Technology-enhanced Learning (TEL) techniques in Nairobi Universities. Using semi-structured interviews and purposive and snowball sampling with ten institutions in Nairobi (4 public and 5 private Universities and the NREN) from 18 December 2014 to 12 January 2015, we explored the level of TEL usage, perceived benefits and challenges of using TEL from both an institutional and instructor perspective and the primary reasons why TEL is not being leveraged. Informants agreed that wider adoption of TEL is the way forward but this requires addressing current challenges and factors currently limiting uptake. These include: infrastructure challenges, need for training to up-skill faculty members; institutional policies; insufficient leadership and need to develop a strategic plan for eContent development. The findings highlight a number of practical issues that can be undertaken to mitigate the factors identified.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129928177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439436
Sally A. Applin, Michael D. Fischer
Human experience with technology has shifted from technological contexts requiring occasional intervention by a fraction of people mostly in command of technologies, to technological contexts that require constant ongoing participation from most people to complete tasks. We examine the current state of `mixed-use' new technologies integration with legacy systems, and whether the human assistance required to complete tasks and processes could function as a training ground for future smart systems, or whether increasing `co-dependence with' or `training of' algorithmic systems, enhancing task completion and inadvertently educating systems in human behaviour and intelligence, will simply subsume people into the algorithmic landscape. As the Internet of Things (IoT) arises in conjunction with advancing robotics and drone technology, semi and fully automated algorithmic systems are being developed that intersect with human experience in new and heterogeneous ways. Many new technologies are not yet flexible enough to support the choices people require in their daily lives, due to limitations in the algorithmic `logics' used that restrict options to predetermined pathways conceived of by programmers. This greatly limits human agency, and presently the potential to overcome problems that arise in processes. In this mixed-use period, we have the opportunity to develop new ways to address ethical guidance as knowledge that machines can learn. We explore promoting embedding of ethically-based principles into automated contexts through: (1) developing mutually agreed automated external ethical review systems (human or otherwise) that evaluate conformance across multiple ethical codes and provide feedback to designers, agents, and users on the distribution of conformance; (2) focusing on review systems to drive distributed development of embedded ethical principles in individual services by responding to this feedback to develop ongoing correction through dynamic adaption or incremental releases; and (3) using multi-agent simulation tools to forecast scenarios in real time.
{"title":"New technologies and mixed-use convergence: How humans and algorithms are adapting to each other","authors":"Sally A. Applin, Michael D. Fischer","doi":"10.1109/ISTAS.2015.7439436","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439436","url":null,"abstract":"Human experience with technology has shifted from technological contexts requiring occasional intervention by a fraction of people mostly in command of technologies, to technological contexts that require constant ongoing participation from most people to complete tasks. We examine the current state of `mixed-use' new technologies integration with legacy systems, and whether the human assistance required to complete tasks and processes could function as a training ground for future smart systems, or whether increasing `co-dependence with' or `training of' algorithmic systems, enhancing task completion and inadvertently educating systems in human behaviour and intelligence, will simply subsume people into the algorithmic landscape. As the Internet of Things (IoT) arises in conjunction with advancing robotics and drone technology, semi and fully automated algorithmic systems are being developed that intersect with human experience in new and heterogeneous ways. Many new technologies are not yet flexible enough to support the choices people require in their daily lives, due to limitations in the algorithmic `logics' used that restrict options to predetermined pathways conceived of by programmers. This greatly limits human agency, and presently the potential to overcome problems that arise in processes. In this mixed-use period, we have the opportunity to develop new ways to address ethical guidance as knowledge that machines can learn. We explore promoting embedding of ethically-based principles into automated contexts through: (1) developing mutually agreed automated external ethical review systems (human or otherwise) that evaluate conformance across multiple ethical codes and provide feedback to designers, agents, and users on the distribution of conformance; (2) focusing on review systems to drive distributed development of embedded ethical principles in individual services by responding to this feedback to develop ongoing correction through dynamic adaption or incremental releases; and (3) using multi-agent simulation tools to forecast scenarios in real time.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"586 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131846574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439438
H. V. D. Haar, D. Greunen, D. Pottas
The South African government provides a social assistance programme that pays out monetary grants to qualifying persons. In 2012, the South African Social Security Agency (SASSA) who manages these social grants, instituted a new form of identification that required the capturing of biometric features such as fingerprints and voice samples, to better identify the grant recipients in order to reduce fraud. This paper describes the development of a framework for an appropriate implementation of biometrics for the social grant programme taking into account the security requirements as well as the vulnerability of the grant recipients.
{"title":"Biometrics in social grants: Separating myth from reality","authors":"H. V. D. Haar, D. Greunen, D. Pottas","doi":"10.1109/ISTAS.2015.7439438","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439438","url":null,"abstract":"The South African government provides a social assistance programme that pays out monetary grants to qualifying persons. In 2012, the South African Social Security Agency (SASSA) who manages these social grants, instituted a new form of identification that required the capturing of biometric features such as fingerprints and voice samples, to better identify the grant recipients in order to reduce fraud. This paper describes the development of a framework for an appropriate implementation of biometrics for the social grant programme taking into account the security requirements as well as the vulnerability of the grant recipients.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130022218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439425
Dhvanik Miglani, Arnold Hensman
The robotics industry is developing at a fast pace and it seems inevitable that home robots will become affordable, easily accessible and popular. They will be able to perform a will be able to perform a wide range of tasks ranging from household chores, entertainment, home security and surveillance and will become an important part of our lives. The robots like any other a computer system connected to a computer network is vulnerable to hackers. In the paper the authors aim to expose the vulnerabilities and ethical implications of using a popular home robot in order to encourage the research community to put their minds to this pertinent issue. The authors also provide a solution that needs to be developed upon to overcome the security risks.
{"title":"Vision for secure home robots: Implementation of two-factor authentication","authors":"Dhvanik Miglani, Arnold Hensman","doi":"10.1109/ISTAS.2015.7439425","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439425","url":null,"abstract":"The robotics industry is developing at a fast pace and it seems inevitable that home robots will become affordable, easily accessible and popular. They will be able to perform a will be able to perform a wide range of tasks ranging from household chores, entertainment, home security and surveillance and will become an important part of our lives. The robots like any other a computer system connected to a computer network is vulnerable to hackers. In the paper the authors aim to expose the vulnerabilities and ethical implications of using a popular home robot in order to encourage the research community to put their minds to this pertinent issue. The authors also provide a solution that needs to be developed upon to overcome the security risks.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114404408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439419
Pascale-L. Blyth, M. Mladenović, B. Nardi, N. Su, H. Ekbia
Drawing perspectives from science and technology studies, philosophy of science, and literature from ethics and social justice, this paper examines the promises and challenges in the development of self-driving vehicle (SDV) technology. We start with the premise that the combination of different computing technologies embedded in SDVs is a powerful tool for efficiency in communications, information gathering, processing, and storage. However, by focusing on efficiency, SDVs provide a new mode of industrialized transportation whose users can only choose between transportation services, but have little or no say about the broader social implications of the technology. We argue that perspectives from social justice and ethics show that SDVs have implications beyond transportation, with profound consequences for users and societies. In particular, values such as privacy, security, and responsibility may be changed for good or bad, in both the short and long-term. The examination of these changes, while the technology is still under foundational development, is as urgent as it is needed.
{"title":"Driving the self-driving vehicle: Expanding the technological design horizon","authors":"Pascale-L. Blyth, M. Mladenović, B. Nardi, N. Su, H. Ekbia","doi":"10.1109/ISTAS.2015.7439419","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439419","url":null,"abstract":"Drawing perspectives from science and technology studies, philosophy of science, and literature from ethics and social justice, this paper examines the promises and challenges in the development of self-driving vehicle (SDV) technology. We start with the premise that the combination of different computing technologies embedded in SDVs is a powerful tool for efficiency in communications, information gathering, processing, and storage. However, by focusing on efficiency, SDVs provide a new mode of industrialized transportation whose users can only choose between transportation services, but have little or no say about the broader social implications of the technology. We argue that perspectives from social justice and ethics show that SDVs have implications beyond transportation, with profound consequences for users and societies. In particular, values such as privacy, security, and responsibility may be changed for good or bad, in both the short and long-term. The examination of these changes, while the technology is still under foundational development, is as urgent as it is needed.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117117564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-26DOI: 10.1109/ISTAS.2015.7439432
Marc C. Canellas, Rachel A. Haga
One of the few convergent themes during the first two United Nations Meeting of Experts on autonomous weapons systems (AWS) was the requirement that there be meaningful human control (MHC) of AWS. What exactly constitutes MHC, however, is still ill-defined. While multiple sets of definitions and analyses have been published and discussed, this work seeks to address two key issues with the current definitions: (1) they are inconsistent in what authorities and responsibilities of human and automated agents need to be regulated, and (2) they lack the specificity that would be required for designers to systemically integrate these restrictions into AWS designs. Given that MHC centers on the interaction of human and autonomous agents, we leverage the models and metrics of function allocation - the allocation of work between human and autonomous agents - to analyze and compare definitions of MHC and the definitions of AWS proposed by the U.S. Department of Defense. Specifically, we transform the definitions into function allocation form to model and compare the definitions, and then show how a mismatch between authority and responsibility in an exemplar military scenario can still plague the human-AWS interactions. In summary, this paper provides a starting point for future research to investigate the application of function allocation to the questions of MHC and more generally, the development of rules and standards for incorporating AWS into the law of armed conflict.
{"title":"Toward meaningful human control of autonomous weapons systems through function allocation","authors":"Marc C. Canellas, Rachel A. Haga","doi":"10.1109/ISTAS.2015.7439432","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439432","url":null,"abstract":"One of the few convergent themes during the first two United Nations Meeting of Experts on autonomous weapons systems (AWS) was the requirement that there be meaningful human control (MHC) of AWS. What exactly constitutes MHC, however, is still ill-defined. While multiple sets of definitions and analyses have been published and discussed, this work seeks to address two key issues with the current definitions: (1) they are inconsistent in what authorities and responsibilities of human and automated agents need to be regulated, and (2) they lack the specificity that would be required for designers to systemically integrate these restrictions into AWS designs. Given that MHC centers on the interaction of human and autonomous agents, we leverage the models and metrics of function allocation - the allocation of work between human and autonomous agents - to analyze and compare definitions of MHC and the definitions of AWS proposed by the U.S. Department of Defense. Specifically, we transform the definitions into function allocation form to model and compare the definitions, and then show how a mismatch between authority and responsibility in an exemplar military scenario can still plague the human-AWS interactions. In summary, this paper provides a starting point for future research to investigate the application of function allocation to the questions of MHC and more generally, the development of rules and standards for incorporating AWS into the law of armed conflict.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115132413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}