Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439398
S. Winberg
The Fynbos Leaf Optical Recognition Application (FLORA) is a software program to automatically identify fynbos plants using leaf photographs. While it is easier to classify fynbos when they are flowering, most fynbos flower for only short periods therefore FLORA was designed to identify plants by leaves instead of flowers. This paper presents the innovation journey of FLORA, highlighting transitions in development spaces, impact of requirements changes, and other significant challenges and lessons learned in the journey. The development was done out in a university research context and vacillated between being in a closed space and being a more open initiative. The project settled on being a collaborative and open innovation whereby the system supports a more diverse community of users and contributors. While the original requirements concerned a small scientific community of students and scientists botanists, the revised system, which the innovation journey lead towards, aims instead towards a wider community including tourists and schools pupils. It is hoped the innovation will have a broader societal influence in particular at schools level, where it is hoped that FLORA will both inspire young learns, and in particular tech savvy kids who spend too much time indoors, to spend time outdoors and to improve their awareness and appreciation of nature. This paper concludes with ways the project could have been streamlined from early on to better support the users and to facilitate the transition from a close to an open innovation.
{"title":"Development of the Fynbos Leaf Optical Recognition Application (FLORA): An innovation journey of a tool to assist in identifying plants","authors":"S. Winberg","doi":"10.1109/ISTAS.2015.7439398","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439398","url":null,"abstract":"The Fynbos Leaf Optical Recognition Application (FLORA) is a software program to automatically identify fynbos plants using leaf photographs. While it is easier to classify fynbos when they are flowering, most fynbos flower for only short periods therefore FLORA was designed to identify plants by leaves instead of flowers. This paper presents the innovation journey of FLORA, highlighting transitions in development spaces, impact of requirements changes, and other significant challenges and lessons learned in the journey. The development was done out in a university research context and vacillated between being in a closed space and being a more open initiative. The project settled on being a collaborative and open innovation whereby the system supports a more diverse community of users and contributors. While the original requirements concerned a small scientific community of students and scientists botanists, the revised system, which the innovation journey lead towards, aims instead towards a wider community including tourists and schools pupils. It is hoped the innovation will have a broader societal influence in particular at schools level, where it is hoped that FLORA will both inspire young learns, and in particular tech savvy kids who spend too much time indoors, to spend time outdoors and to improve their awareness and appreciation of nature. This paper concludes with ways the project could have been streamlined from early on to better support the users and to facilitate the transition from a close to an open innovation.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122878602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439397
C. Winberg, S. Pather, M. D. Plessis
This paper assesses the impact of a new academic workload model on research and technology innovation in a new university of technology. The project was framed by understandings of "the innovation journey", as well as emerging understandings of "temporality" against the background of the intensification of academic work and shifts towards project-based and externally funded research. The paper draws on data collected over a one-year period during which the policy instrument was piloted. It concludes that policy-making and policy-uptake (or rejection) occurs in interactions with innovative and conservative agents, existing and planned university configurations, broader social contexts and their ongoing dynamics. An analysis of the dynamics of innovation reveals patterns that can be used to enhance institutional learning.
{"title":"Supporting a culture of innovation at a new university of technology","authors":"C. Winberg, S. Pather, M. D. Plessis","doi":"10.1109/ISTAS.2015.7439397","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439397","url":null,"abstract":"This paper assesses the impact of a new academic workload model on research and technology innovation in a new university of technology. The project was framed by understandings of \"the innovation journey\", as well as emerging understandings of \"temporality\" against the background of the intensification of academic work and shifts towards project-based and externally funded research. The paper draws on data collected over a one-year period during which the policy instrument was piloted. It concludes that policy-making and policy-uptake (or rejection) occurs in interactions with innovative and conservative agents, existing and planned university configurations, broader social contexts and their ongoing dynamics. An analysis of the dynamics of innovation reveals patterns that can be used to enhance institutional learning.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124131007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439442
G. Adamson
The 21st century is witnessing unprecedented automation in many areas of life. As a result, tasks previously undertaken by a person are now done by a machine. Humans who previously undertook these tasks brought particular views and approaches to each task. These or alternative views or approaches are now embodied in the machine. Rather than entirely removing humans from the process, however, replacement of human by machine has meant that the direct engagement of a person in a task has been replaced by the indirect engagement of the technologist who creates the machine. Among other things this has meant that the ethical responsibilities of the original human operator have devolved to the technologist. This raises questions of substantive ethics, and the responsibility of the technologist, including as "whistle-blower". This paper examines three areas of technology development which highlight the growing ethical responsibility of technologists: the automation of work; the mechanization of humans; and autonomous warfare. The three areas selected have implications today, even in an early stage of development. Soon the responsibilities these technologies engender will confront technologists in their professional life.
{"title":"Ethical challenges for future technologists: The growing role of technology and the growing ethical responsibility of the technologist","authors":"G. Adamson","doi":"10.1109/ISTAS.2015.7439442","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439442","url":null,"abstract":"The 21st century is witnessing unprecedented automation in many areas of life. As a result, tasks previously undertaken by a person are now done by a machine. Humans who previously undertook these tasks brought particular views and approaches to each task. These or alternative views or approaches are now embodied in the machine. Rather than entirely removing humans from the process, however, replacement of human by machine has meant that the direct engagement of a person in a task has been replaced by the indirect engagement of the technologist who creates the machine. Among other things this has meant that the ethical responsibilities of the original human operator have devolved to the technologist. This raises questions of substantive ethics, and the responsibility of the technologist, including as \"whistle-blower\". This paper examines three areas of technology development which highlight the growing ethical responsibility of technologists: the automation of work; the mechanization of humans; and autonomous warfare. The three areas selected have implications today, even in an early stage of development. Soon the responsibilities these technologies engender will confront technologists in their professional life.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122322773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439446
M. Cunningham
While infrastructure has improved and students state a preference for blended learning, there were few eLearning courses provided by Kenyan Higher Education Institutions in the 2012/2013 academic year. It is unclear what factors impact on the adoption of Technology-enhanced Learning (TEL) techniques in Nairobi Universities. Using semi-structured interviews and purposive and snowball sampling with ten institutions in Nairobi (4 public and 5 private Universities and the NREN) from 18 December 2014 to 12 January 2015, we explored the level of TEL usage, perceived benefits and challenges of using TEL from both an institutional and instructor perspective and the primary reasons why TEL is not being leveraged. Informants agreed that wider adoption of TEL is the way forward but this requires addressing current challenges and factors currently limiting uptake. These include: infrastructure challenges, need for training to up-skill faculty members; institutional policies; insufficient leadership and need to develop a strategic plan for eContent development. The findings highlight a number of practical issues that can be undertaken to mitigate the factors identified.
{"title":"Factors impacting on adoption of Technology-enhanced Learning techniques by universities in Nairobi, Kenya","authors":"M. Cunningham","doi":"10.1109/ISTAS.2015.7439446","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439446","url":null,"abstract":"While infrastructure has improved and students state a preference for blended learning, there were few eLearning courses provided by Kenyan Higher Education Institutions in the 2012/2013 academic year. It is unclear what factors impact on the adoption of Technology-enhanced Learning (TEL) techniques in Nairobi Universities. Using semi-structured interviews and purposive and snowball sampling with ten institutions in Nairobi (4 public and 5 private Universities and the NREN) from 18 December 2014 to 12 January 2015, we explored the level of TEL usage, perceived benefits and challenges of using TEL from both an institutional and instructor perspective and the primary reasons why TEL is not being leveraged. Informants agreed that wider adoption of TEL is the way forward but this requires addressing current challenges and factors currently limiting uptake. These include: infrastructure challenges, need for training to up-skill faculty members; institutional policies; insufficient leadership and need to develop a strategic plan for eContent development. The findings highlight a number of practical issues that can be undertaken to mitigate the factors identified.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129928177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439441
Hossein Javidnia, Adrian-Stefan Ungureanu, P. Corcoran
In a world where smart phones are becoming ubiquitous and are more powerful than ever, security is becoming an issue. Equipped with good cameras, smart phones are prime candidates for software designed to recognize objects and people around them. By recognizing biometric patterns such as the face, palm-prints or hand knuckles, smart phones can heighten security standards. Depending on the intended action, specific security requirements should be met. For instance, bank services need a reliable authentication system, whereas unlocking a device can use a lower security feature. For this perspective we are working on a database of palm-prints that have only been acquired using smart phones to verify their users' identity and also designing an authentication system based on these results to be used on smartphones.
{"title":"Palm-print recognition for authentication on smartphones","authors":"Hossein Javidnia, Adrian-Stefan Ungureanu, P. Corcoran","doi":"10.1109/ISTAS.2015.7439441","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439441","url":null,"abstract":"In a world where smart phones are becoming ubiquitous and are more powerful than ever, security is becoming an issue. Equipped with good cameras, smart phones are prime candidates for software designed to recognize objects and people around them. By recognizing biometric patterns such as the face, palm-prints or hand knuckles, smart phones can heighten security standards. Depending on the intended action, specific security requirements should be met. For instance, bank services need a reliable authentication system, whereas unlocking a device can use a lower security feature. For this perspective we are working on a database of palm-prints that have only been acquired using smart phones to verify their users' identity and also designing an authentication system based on these results to be used on smartphones.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130530797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439436
Sally A. Applin, Michael D. Fischer
Human experience with technology has shifted from technological contexts requiring occasional intervention by a fraction of people mostly in command of technologies, to technological contexts that require constant ongoing participation from most people to complete tasks. We examine the current state of `mixed-use' new technologies integration with legacy systems, and whether the human assistance required to complete tasks and processes could function as a training ground for future smart systems, or whether increasing `co-dependence with' or `training of' algorithmic systems, enhancing task completion and inadvertently educating systems in human behaviour and intelligence, will simply subsume people into the algorithmic landscape. As the Internet of Things (IoT) arises in conjunction with advancing robotics and drone technology, semi and fully automated algorithmic systems are being developed that intersect with human experience in new and heterogeneous ways. Many new technologies are not yet flexible enough to support the choices people require in their daily lives, due to limitations in the algorithmic `logics' used that restrict options to predetermined pathways conceived of by programmers. This greatly limits human agency, and presently the potential to overcome problems that arise in processes. In this mixed-use period, we have the opportunity to develop new ways to address ethical guidance as knowledge that machines can learn. We explore promoting embedding of ethically-based principles into automated contexts through: (1) developing mutually agreed automated external ethical review systems (human or otherwise) that evaluate conformance across multiple ethical codes and provide feedback to designers, agents, and users on the distribution of conformance; (2) focusing on review systems to drive distributed development of embedded ethical principles in individual services by responding to this feedback to develop ongoing correction through dynamic adaption or incremental releases; and (3) using multi-agent simulation tools to forecast scenarios in real time.
{"title":"New technologies and mixed-use convergence: How humans and algorithms are adapting to each other","authors":"Sally A. Applin, Michael D. Fischer","doi":"10.1109/ISTAS.2015.7439436","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439436","url":null,"abstract":"Human experience with technology has shifted from technological contexts requiring occasional intervention by a fraction of people mostly in command of technologies, to technological contexts that require constant ongoing participation from most people to complete tasks. We examine the current state of `mixed-use' new technologies integration with legacy systems, and whether the human assistance required to complete tasks and processes could function as a training ground for future smart systems, or whether increasing `co-dependence with' or `training of' algorithmic systems, enhancing task completion and inadvertently educating systems in human behaviour and intelligence, will simply subsume people into the algorithmic landscape. As the Internet of Things (IoT) arises in conjunction with advancing robotics and drone technology, semi and fully automated algorithmic systems are being developed that intersect with human experience in new and heterogeneous ways. Many new technologies are not yet flexible enough to support the choices people require in their daily lives, due to limitations in the algorithmic `logics' used that restrict options to predetermined pathways conceived of by programmers. This greatly limits human agency, and presently the potential to overcome problems that arise in processes. In this mixed-use period, we have the opportunity to develop new ways to address ethical guidance as knowledge that machines can learn. We explore promoting embedding of ethically-based principles into automated contexts through: (1) developing mutually agreed automated external ethical review systems (human or otherwise) that evaluate conformance across multiple ethical codes and provide feedback to designers, agents, and users on the distribution of conformance; (2) focusing on review systems to drive distributed development of embedded ethical principles in individual services by responding to this feedback to develop ongoing correction through dynamic adaption or incremental releases; and (3) using multi-agent simulation tools to forecast scenarios in real time.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"586 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131846574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439438
H. V. D. Haar, D. Greunen, D. Pottas
The South African government provides a social assistance programme that pays out monetary grants to qualifying persons. In 2012, the South African Social Security Agency (SASSA) who manages these social grants, instituted a new form of identification that required the capturing of biometric features such as fingerprints and voice samples, to better identify the grant recipients in order to reduce fraud. This paper describes the development of a framework for an appropriate implementation of biometrics for the social grant programme taking into account the security requirements as well as the vulnerability of the grant recipients.
{"title":"Biometrics in social grants: Separating myth from reality","authors":"H. V. D. Haar, D. Greunen, D. Pottas","doi":"10.1109/ISTAS.2015.7439438","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439438","url":null,"abstract":"The South African government provides a social assistance programme that pays out monetary grants to qualifying persons. In 2012, the South African Social Security Agency (SASSA) who manages these social grants, instituted a new form of identification that required the capturing of biometric features such as fingerprints and voice samples, to better identify the grant recipients in order to reduce fraud. This paper describes the development of a framework for an appropriate implementation of biometrics for the social grant programme taking into account the security requirements as well as the vulnerability of the grant recipients.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130022218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439425
Dhvanik Miglani, Arnold Hensman
The robotics industry is developing at a fast pace and it seems inevitable that home robots will become affordable, easily accessible and popular. They will be able to perform a will be able to perform a wide range of tasks ranging from household chores, entertainment, home security and surveillance and will become an important part of our lives. The robots like any other a computer system connected to a computer network is vulnerable to hackers. In the paper the authors aim to expose the vulnerabilities and ethical implications of using a popular home robot in order to encourage the research community to put their minds to this pertinent issue. The authors also provide a solution that needs to be developed upon to overcome the security risks.
{"title":"Vision for secure home robots: Implementation of two-factor authentication","authors":"Dhvanik Miglani, Arnold Hensman","doi":"10.1109/ISTAS.2015.7439425","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439425","url":null,"abstract":"The robotics industry is developing at a fast pace and it seems inevitable that home robots will become affordable, easily accessible and popular. They will be able to perform a will be able to perform a wide range of tasks ranging from household chores, entertainment, home security and surveillance and will become an important part of our lives. The robots like any other a computer system connected to a computer network is vulnerable to hackers. In the paper the authors aim to expose the vulnerabilities and ethical implications of using a popular home robot in order to encourage the research community to put their minds to this pertinent issue. The authors also provide a solution that needs to be developed upon to overcome the security risks.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114404408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439419
Pascale-L. Blyth, M. Mladenović, B. Nardi, N. Su, H. Ekbia
Drawing perspectives from science and technology studies, philosophy of science, and literature from ethics and social justice, this paper examines the promises and challenges in the development of self-driving vehicle (SDV) technology. We start with the premise that the combination of different computing technologies embedded in SDVs is a powerful tool for efficiency in communications, information gathering, processing, and storage. However, by focusing on efficiency, SDVs provide a new mode of industrialized transportation whose users can only choose between transportation services, but have little or no say about the broader social implications of the technology. We argue that perspectives from social justice and ethics show that SDVs have implications beyond transportation, with profound consequences for users and societies. In particular, values such as privacy, security, and responsibility may be changed for good or bad, in both the short and long-term. The examination of these changes, while the technology is still under foundational development, is as urgent as it is needed.
{"title":"Driving the self-driving vehicle: Expanding the technological design horizon","authors":"Pascale-L. Blyth, M. Mladenović, B. Nardi, N. Su, H. Ekbia","doi":"10.1109/ISTAS.2015.7439419","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439419","url":null,"abstract":"Drawing perspectives from science and technology studies, philosophy of science, and literature from ethics and social justice, this paper examines the promises and challenges in the development of self-driving vehicle (SDV) technology. We start with the premise that the combination of different computing technologies embedded in SDVs is a powerful tool for efficiency in communications, information gathering, processing, and storage. However, by focusing on efficiency, SDVs provide a new mode of industrialized transportation whose users can only choose between transportation services, but have little or no say about the broader social implications of the technology. We argue that perspectives from social justice and ethics show that SDVs have implications beyond transportation, with profound consequences for users and societies. In particular, values such as privacy, security, and responsibility may be changed for good or bad, in both the short and long-term. The examination of these changes, while the technology is still under foundational development, is as urgent as it is needed.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117117564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-26DOI: 10.1109/ISTAS.2015.7439432
Marc C. Canellas, Rachel A. Haga
One of the few convergent themes during the first two United Nations Meeting of Experts on autonomous weapons systems (AWS) was the requirement that there be meaningful human control (MHC) of AWS. What exactly constitutes MHC, however, is still ill-defined. While multiple sets of definitions and analyses have been published and discussed, this work seeks to address two key issues with the current definitions: (1) they are inconsistent in what authorities and responsibilities of human and automated agents need to be regulated, and (2) they lack the specificity that would be required for designers to systemically integrate these restrictions into AWS designs. Given that MHC centers on the interaction of human and autonomous agents, we leverage the models and metrics of function allocation - the allocation of work between human and autonomous agents - to analyze and compare definitions of MHC and the definitions of AWS proposed by the U.S. Department of Defense. Specifically, we transform the definitions into function allocation form to model and compare the definitions, and then show how a mismatch between authority and responsibility in an exemplar military scenario can still plague the human-AWS interactions. In summary, this paper provides a starting point for future research to investigate the application of function allocation to the questions of MHC and more generally, the development of rules and standards for incorporating AWS into the law of armed conflict.
{"title":"Toward meaningful human control of autonomous weapons systems through function allocation","authors":"Marc C. Canellas, Rachel A. Haga","doi":"10.1109/ISTAS.2015.7439432","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439432","url":null,"abstract":"One of the few convergent themes during the first two United Nations Meeting of Experts on autonomous weapons systems (AWS) was the requirement that there be meaningful human control (MHC) of AWS. What exactly constitutes MHC, however, is still ill-defined. While multiple sets of definitions and analyses have been published and discussed, this work seeks to address two key issues with the current definitions: (1) they are inconsistent in what authorities and responsibilities of human and automated agents need to be regulated, and (2) they lack the specificity that would be required for designers to systemically integrate these restrictions into AWS designs. Given that MHC centers on the interaction of human and autonomous agents, we leverage the models and metrics of function allocation - the allocation of work between human and autonomous agents - to analyze and compare definitions of MHC and the definitions of AWS proposed by the U.S. Department of Defense. Specifically, we transform the definitions into function allocation form to model and compare the definitions, and then show how a mismatch between authority and responsibility in an exemplar military scenario can still plague the human-AWS interactions. In summary, this paper provides a starting point for future research to investigate the application of function allocation to the questions of MHC and more generally, the development of rules and standards for incorporating AWS into the law of armed conflict.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115132413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}