首页 > 最新文献

2015 IEEE International Symposium on Technology and Society (ISTAS)最新文献

英文 中文
"About your smartphone usage" — Privacy in location-based mobile participation “关于你的智能手机使用情况”-基于位置的移动参与的隐私
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439421
Maija Poikela, Robert Schmidt, I. Wechsung, S. Möller
Location-based mobile tools provide effective means for mobile participation, allowing better targeting of users and faster opinion gathering for municipalities and organizations. For participation purposes it is essential to reach the users as widely as possible, and for this, smartphones with ever-increasing adoption rates offer an optimal tool. However, privacy concerns might prevent the use of location-based applications, which results in a bias in opinion-gathering. In this paper, we present results of a field study tackling the issue of how privacy concern affects the adoption and use of a location-based mobile participation application, and what motivates the use of such applications. We find that users have varying motivations for participating in location-based polls, and that these motivations depend on the type of the poll in question. We show that privacy concerned users are less likely to be motivated by a monetary benefit, but rather by the importance of the topic, and that the intrinsic motivators that drive the privacy concerned users differ from those that drive the unconcerned. Finally, we show that, based on our study, it seems that privacy concern might be an inhibiting factor in adoption of a location-based mobile participation application.
基于位置的移动工具为移动参与提供了有效的手段,使市政当局和组织能够更好地定位用户并更快地收集意见。出于参与目的,尽可能广泛地接触用户是至关重要的,为此,采用率不断提高的智能手机提供了一个最佳工具。然而,隐私问题可能会阻止基于位置的应用程序的使用,从而导致意见收集的偏见。在本文中,我们展示了一项实地研究的结果,该研究解决了隐私问题如何影响基于位置的移动参与应用程序的采用和使用,以及使用此类应用程序的动机。我们发现用户参与基于位置的投票有不同的动机,这些动机取决于所讨论的投票的类型。我们表明,关心隐私的用户不太可能受到金钱利益的激励,而是受到主题的重要性的激励,并且驱动关心隐私的用户的内在动机与驱动不关心隐私的用户的内在动机不同。最后,我们表明,基于我们的研究,隐私问题可能是采用基于位置的移动参与应用程序的一个抑制因素。
{"title":"\"About your smartphone usage\" — Privacy in location-based mobile participation","authors":"Maija Poikela, Robert Schmidt, I. Wechsung, S. Möller","doi":"10.1109/ISTAS.2015.7439421","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439421","url":null,"abstract":"Location-based mobile tools provide effective means for mobile participation, allowing better targeting of users and faster opinion gathering for municipalities and organizations. For participation purposes it is essential to reach the users as widely as possible, and for this, smartphones with ever-increasing adoption rates offer an optimal tool. However, privacy concerns might prevent the use of location-based applications, which results in a bias in opinion-gathering. In this paper, we present results of a field study tackling the issue of how privacy concern affects the adoption and use of a location-based mobile participation application, and what motivates the use of such applications. We find that users have varying motivations for participating in location-based polls, and that these motivations depend on the type of the poll in question. We show that privacy concerned users are less likely to be motivated by a monetary benefit, but rather by the importance of the topic, and that the intrinsic motivators that drive the privacy concerned users differ from those that drive the unconcerned. Finally, we show that, based on our study, it seems that privacy concern might be an inhibiting factor in adoption of a location-based mobile participation application.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129744498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Insights into open innovation and ICT entrepreneurship in Africa 非洲的开放式创新和信息通信技术创业
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439447
P. Cunningham
Innovation and ICT entrepreneurship are slowly being recognised as important enablers of socio-economic growth and realising national strategic goals in African Member States. However, the level of practical skills capacity, indigenous entrepreneurial expertise and policy support to take full advantage of this at national level varies considerably. This research study focused on identifying factors impacting on the current level of open innovation and ICT entrepreneurship in Africa. It was informed by a semi-structured, moderated focus group which captured the perspectives of senior public and education and research stakeholders from eight African Member States. The results highlighted six main factors: (a) level of political will reflected by resource prioritisation; (b) alignment with national development plans and associated funding priorities; (c) level of understanding of strategic benefits by ministers and senior civil servants; (d) level of awareness and sensitization of the general public, (e) availability of national innovation and entrepreneurial expertise; and (f) willingness and capacity to cooperate with other stakeholders to achieve common goals. Future research will capture perspectives from the private, societal and international donor sectors, and create and validate potential models/methodologies to address the challenges and opportunities identified in this study.
非洲成员国正逐渐认识到创新和信息通信技术企业家精神是社会经济增长和实现国家战略目标的重要推动因素。但是,实际技能、能力、当地企业专门知识和在国家一级充分利用这一点的政策支助的水平差别很大。本研究的重点是确定影响非洲开放创新和信息通信技术创业当前水平的因素。它是由一个半结构化、适度的焦点小组提供信息的,该小组听取了来自八个非洲会员国的高级公共、教育和研究利益攸关方的观点。结果突出了六个主要因素:(a)资源优先次序反映的政治意愿水平;(b)与国家发展计划和相关资金优先事项保持一致;(c)部长和高级公务员对战略利益的理解程度;(d)一般公众的认识和敏感程度;(e)有无国家创新和企业专门知识;(f)与其他利益相关者合作以实现共同目标的意愿和能力。未来的研究将从私人、社会和国际捐助部门获取观点,并创建和验证潜在的模型/方法,以应对本研究中确定的挑战和机遇。
{"title":"Insights into open innovation and ICT entrepreneurship in Africa","authors":"P. Cunningham","doi":"10.1109/ISTAS.2015.7439447","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439447","url":null,"abstract":"Innovation and ICT entrepreneurship are slowly being recognised as important enablers of socio-economic growth and realising national strategic goals in African Member States. However, the level of practical skills capacity, indigenous entrepreneurial expertise and policy support to take full advantage of this at national level varies considerably. This research study focused on identifying factors impacting on the current level of open innovation and ICT entrepreneurship in Africa. It was informed by a semi-structured, moderated focus group which captured the perspectives of senior public and education and research stakeholders from eight African Member States. The results highlighted six main factors: (a) level of political will reflected by resource prioritisation; (b) alignment with national development plans and associated funding priorities; (c) level of understanding of strategic benefits by ministers and senior civil servants; (d) level of awareness and sensitization of the general public, (e) availability of national innovation and entrepreneurial expertise; and (f) willingness and capacity to cooperate with other stakeholders to achieve common goals. Future research will capture perspectives from the private, societal and international donor sectors, and create and validate potential models/methodologies to address the challenges and opportunities identified in this study.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"46 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126005596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Palm-print recognition for authentication on smartphones 掌纹识别用于智能手机的身份验证
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439441
Hossein Javidnia, Adrian-Stefan Ungureanu, P. Corcoran
In a world where smart phones are becoming ubiquitous and are more powerful than ever, security is becoming an issue. Equipped with good cameras, smart phones are prime candidates for software designed to recognize objects and people around them. By recognizing biometric patterns such as the face, palm-prints or hand knuckles, smart phones can heighten security standards. Depending on the intended action, specific security requirements should be met. For instance, bank services need a reliable authentication system, whereas unlocking a device can use a lower security feature. For this perspective we are working on a database of palm-prints that have only been acquired using smart phones to verify their users' identity and also designing an authentication system based on these results to be used on smartphones.
在一个智能手机变得无处不在、功能比以往任何时候都强大的世界里,安全正成为一个问题。智能手机配备了良好的摄像头,是设计用于识别物体和周围人的软件的首选。通过识别面部、掌纹或指关节等生物特征,智能手机可以提高安全标准。根据预期的操作,应该满足特定的安全需求。例如,银行服务需要可靠的身份验证系统,而解锁设备可以使用较低的安全功能。从这个角度来看,我们正在研究一个只使用智能手机获取的掌纹数据库,以验证用户的身份,并基于这些结果设计一个身份验证系统,用于智能手机。
{"title":"Palm-print recognition for authentication on smartphones","authors":"Hossein Javidnia, Adrian-Stefan Ungureanu, P. Corcoran","doi":"10.1109/ISTAS.2015.7439441","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439441","url":null,"abstract":"In a world where smart phones are becoming ubiquitous and are more powerful than ever, security is becoming an issue. Equipped with good cameras, smart phones are prime candidates for software designed to recognize objects and people around them. By recognizing biometric patterns such as the face, palm-prints or hand knuckles, smart phones can heighten security standards. Depending on the intended action, specific security requirements should be met. For instance, bank services need a reliable authentication system, whereas unlocking a device can use a lower security feature. For this perspective we are working on a database of palm-prints that have only been acquired using smart phones to verify their users' identity and also designing an authentication system based on these results to be used on smartphones.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130530797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Ethical challenges for future technologists: The growing role of technology and the growing ethical responsibility of the technologist 未来技术人员面临的道德挑战:技术日益增长的作用和技术人员日益增长的道德责任
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439442
G. Adamson
The 21st century is witnessing unprecedented automation in many areas of life. As a result, tasks previously undertaken by a person are now done by a machine. Humans who previously undertook these tasks brought particular views and approaches to each task. These or alternative views or approaches are now embodied in the machine. Rather than entirely removing humans from the process, however, replacement of human by machine has meant that the direct engagement of a person in a task has been replaced by the indirect engagement of the technologist who creates the machine. Among other things this has meant that the ethical responsibilities of the original human operator have devolved to the technologist. This raises questions of substantive ethics, and the responsibility of the technologist, including as "whistle-blower". This paper examines three areas of technology development which highlight the growing ethical responsibility of technologists: the automation of work; the mechanization of humans; and autonomous warfare. The three areas selected have implications today, even in an early stage of development. Soon the responsibilities these technologies engender will confront technologists in their professional life.
21世纪在生活的许多领域见证了前所未有的自动化。因此,以前由人承担的任务现在由机器完成。以前承担这些任务的人对每项任务都有特定的看法和方法。这些或替代的观点或方法现在体现在机器中。然而,机器取代人类并不是将人类完全从这一过程中移除,而是意味着人类直接参与一项任务已被创造机器的技术人员的间接参与所取代。除此之外,这意味着最初的人类操作员的道德责任已经转移到技术专家身上。这引发了实质性道德问题,以及技术专家的责任问题,包括作为“举报人”的责任问题。本文考察了技术发展的三个领域,这些领域突出了技术人员日益增长的道德责任:工作自动化;人类的机械化;自主战争。所选的三个领域在今天,甚至在发展的早期阶段都有影响。很快,这些技术带来的责任将在技术人员的职业生涯中面临。
{"title":"Ethical challenges for future technologists: The growing role of technology and the growing ethical responsibility of the technologist","authors":"G. Adamson","doi":"10.1109/ISTAS.2015.7439442","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439442","url":null,"abstract":"The 21st century is witnessing unprecedented automation in many areas of life. As a result, tasks previously undertaken by a person are now done by a machine. Humans who previously undertook these tasks brought particular views and approaches to each task. These or alternative views or approaches are now embodied in the machine. Rather than entirely removing humans from the process, however, replacement of human by machine has meant that the direct engagement of a person in a task has been replaced by the indirect engagement of the technologist who creates the machine. Among other things this has meant that the ethical responsibilities of the original human operator have devolved to the technologist. This raises questions of substantive ethics, and the responsibility of the technologist, including as \"whistle-blower\". This paper examines three areas of technology development which highlight the growing ethical responsibility of technologists: the automation of work; the mechanization of humans; and autonomous warfare. The three areas selected have implications today, even in an early stage of development. Soon the responsibilities these technologies engender will confront technologists in their professional life.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122322773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Factors impacting on adoption of Technology-enhanced Learning techniques by universities in Nairobi, Kenya 影响肯尼亚内罗毕大学采用技术增强学习技术的因素
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439446
M. Cunningham
While infrastructure has improved and students state a preference for blended learning, there were few eLearning courses provided by Kenyan Higher Education Institutions in the 2012/2013 academic year. It is unclear what factors impact on the adoption of Technology-enhanced Learning (TEL) techniques in Nairobi Universities. Using semi-structured interviews and purposive and snowball sampling with ten institutions in Nairobi (4 public and 5 private Universities and the NREN) from 18 December 2014 to 12 January 2015, we explored the level of TEL usage, perceived benefits and challenges of using TEL from both an institutional and instructor perspective and the primary reasons why TEL is not being leveraged. Informants agreed that wider adoption of TEL is the way forward but this requires addressing current challenges and factors currently limiting uptake. These include: infrastructure challenges, need for training to up-skill faculty members; institutional policies; insufficient leadership and need to develop a strategic plan for eContent development. The findings highlight a number of practical issues that can be undertaken to mitigate the factors identified.
虽然基础设施得到了改善,学生们表示更喜欢混合学习,但在2012/2013学年,肯尼亚高等教育机构提供的电子学习课程很少。目前尚不清楚是什么因素影响了内罗毕大学采用技术促进学习(TEL)技术。从2014年12月18日至2015年1月12日,我们对内罗毕的10所机构(4所公立大学和5所私立大学以及NREN)进行了半结构化访谈和有目的的滚雪球抽样,从机构和教师的角度探讨了电话的使用水平、使用电话的感知好处和挑战,以及电话未被利用的主要原因。举报人一致认为,更广泛地采用电子电话是前进的方向,但这需要解决当前的挑战和目前限制采用的因素。这些挑战包括:基础设施的挑战,需要培训以提高教师的技能;制度政策;领导能力不足,需要为内容开发制定战略计划。调查结果强调了可以采取的一些实际问题,以减轻所确定的因素。
{"title":"Factors impacting on adoption of Technology-enhanced Learning techniques by universities in Nairobi, Kenya","authors":"M. Cunningham","doi":"10.1109/ISTAS.2015.7439446","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439446","url":null,"abstract":"While infrastructure has improved and students state a preference for blended learning, there were few eLearning courses provided by Kenyan Higher Education Institutions in the 2012/2013 academic year. It is unclear what factors impact on the adoption of Technology-enhanced Learning (TEL) techniques in Nairobi Universities. Using semi-structured interviews and purposive and snowball sampling with ten institutions in Nairobi (4 public and 5 private Universities and the NREN) from 18 December 2014 to 12 January 2015, we explored the level of TEL usage, perceived benefits and challenges of using TEL from both an institutional and instructor perspective and the primary reasons why TEL is not being leveraged. Informants agreed that wider adoption of TEL is the way forward but this requires addressing current challenges and factors currently limiting uptake. These include: infrastructure challenges, need for training to up-skill faculty members; institutional policies; insufficient leadership and need to develop a strategic plan for eContent development. The findings highlight a number of practical issues that can be undertaken to mitigate the factors identified.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129928177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
New technologies and mixed-use convergence: How humans and algorithms are adapting to each other 新技术和混合用途融合:人类和算法如何相互适应
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439436
Sally A. Applin, Michael D. Fischer
Human experience with technology has shifted from technological contexts requiring occasional intervention by a fraction of people mostly in command of technologies, to technological contexts that require constant ongoing participation from most people to complete tasks. We examine the current state of `mixed-use' new technologies integration with legacy systems, and whether the human assistance required to complete tasks and processes could function as a training ground for future smart systems, or whether increasing `co-dependence with' or `training of' algorithmic systems, enhancing task completion and inadvertently educating systems in human behaviour and intelligence, will simply subsume people into the algorithmic landscape. As the Internet of Things (IoT) arises in conjunction with advancing robotics and drone technology, semi and fully automated algorithmic systems are being developed that intersect with human experience in new and heterogeneous ways. Many new technologies are not yet flexible enough to support the choices people require in their daily lives, due to limitations in the algorithmic `logics' used that restrict options to predetermined pathways conceived of by programmers. This greatly limits human agency, and presently the potential to overcome problems that arise in processes. In this mixed-use period, we have the opportunity to develop new ways to address ethical guidance as knowledge that machines can learn. We explore promoting embedding of ethically-based principles into automated contexts through: (1) developing mutually agreed automated external ethical review systems (human or otherwise) that evaluate conformance across multiple ethical codes and provide feedback to designers, agents, and users on the distribution of conformance; (2) focusing on review systems to drive distributed development of embedded ethical principles in individual services by responding to this feedback to develop ongoing correction through dynamic adaption or incremental releases; and (3) using multi-agent simulation tools to forecast scenarios in real time.
人类对技术的经验已经从需要少数掌握技术的人偶尔干预的技术环境转变为需要大多数人持续参与完成任务的技术环境。我们研究了“混合使用”新技术与遗留系统集成的现状,以及完成任务和流程所需的人类协助是否可以作为未来智能系统的培训基地,或者是否增加“与算法系统的共同依赖”或“训练”,提高任务完成度并无意中教育系统人类行为和智能,将简单地将人纳入算法景观。随着物联网(IoT)与先进的机器人和无人机技术一起出现,人们正在开发半自动和全自动算法系统,这些系统以新的和异构的方式与人类经验交叉。由于算法“逻辑”的限制,许多新技术还不够灵活,无法支持人们在日常生活中所需要的选择,这些“逻辑”将选择限制在程序员设想的预定路径上。这极大地限制了人类的能动性,以及目前克服过程中出现的问题的潜力。在这个混合使用时期,我们有机会开发新的方法,将道德指导作为机器可以学习的知识。我们探索通过以下方式促进将基于道德的原则嵌入到自动化环境中:(1)开发相互同意的自动化外部道德审查系统(人工或其他),评估多个道德准则的一致性,并就一致性的分布向设计师、代理和用户提供反馈;(2)专注于审查系统,通过响应这些反馈,通过动态适应或增量发布来开发持续的纠正,从而推动个人服务中嵌入式道德原则的分布式开发;(3)利用多智能体仿真工具对场景进行实时预测。
{"title":"New technologies and mixed-use convergence: How humans and algorithms are adapting to each other","authors":"Sally A. Applin, Michael D. Fischer","doi":"10.1109/ISTAS.2015.7439436","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439436","url":null,"abstract":"Human experience with technology has shifted from technological contexts requiring occasional intervention by a fraction of people mostly in command of technologies, to technological contexts that require constant ongoing participation from most people to complete tasks. We examine the current state of `mixed-use' new technologies integration with legacy systems, and whether the human assistance required to complete tasks and processes could function as a training ground for future smart systems, or whether increasing `co-dependence with' or `training of' algorithmic systems, enhancing task completion and inadvertently educating systems in human behaviour and intelligence, will simply subsume people into the algorithmic landscape. As the Internet of Things (IoT) arises in conjunction with advancing robotics and drone technology, semi and fully automated algorithmic systems are being developed that intersect with human experience in new and heterogeneous ways. Many new technologies are not yet flexible enough to support the choices people require in their daily lives, due to limitations in the algorithmic `logics' used that restrict options to predetermined pathways conceived of by programmers. This greatly limits human agency, and presently the potential to overcome problems that arise in processes. In this mixed-use period, we have the opportunity to develop new ways to address ethical guidance as knowledge that machines can learn. We explore promoting embedding of ethically-based principles into automated contexts through: (1) developing mutually agreed automated external ethical review systems (human or otherwise) that evaluate conformance across multiple ethical codes and provide feedback to designers, agents, and users on the distribution of conformance; (2) focusing on review systems to drive distributed development of embedded ethical principles in individual services by responding to this feedback to develop ongoing correction through dynamic adaption or incremental releases; and (3) using multi-agent simulation tools to forecast scenarios in real time.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"586 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131846574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Biometrics in social grants: Separating myth from reality 社会补助中的生物识别技术:从现实中分离神话
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439438
H. V. D. Haar, D. Greunen, D. Pottas
The South African government provides a social assistance programme that pays out monetary grants to qualifying persons. In 2012, the South African Social Security Agency (SASSA) who manages these social grants, instituted a new form of identification that required the capturing of biometric features such as fingerprints and voice samples, to better identify the grant recipients in order to reduce fraud. This paper describes the development of a framework for an appropriate implementation of biometrics for the social grant programme taking into account the security requirements as well as the vulnerability of the grant recipients.
南非政府提供一项社会援助方案,向符合条件的人发放现金补助。2012年,管理这些社会补助金的南非社会保障局(SASSA)制定了一种新的身份识别方式,需要采集指纹和声音样本等生物特征,以更好地识别赠款接受者,以减少欺诈。本文描述了考虑到安全要求以及赠款接受者的脆弱性,为社会赠款计划适当实施生物识别技术的框架的发展。
{"title":"Biometrics in social grants: Separating myth from reality","authors":"H. V. D. Haar, D. Greunen, D. Pottas","doi":"10.1109/ISTAS.2015.7439438","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439438","url":null,"abstract":"The South African government provides a social assistance programme that pays out monetary grants to qualifying persons. In 2012, the South African Social Security Agency (SASSA) who manages these social grants, instituted a new form of identification that required the capturing of biometric features such as fingerprints and voice samples, to better identify the grant recipients in order to reduce fraud. This paper describes the development of a framework for an appropriate implementation of biometrics for the social grant programme taking into account the security requirements as well as the vulnerability of the grant recipients.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130022218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vision for secure home robots: Implementation of two-factor authentication 安全家用机器人的愿景:双因素身份验证的实现
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439425
Dhvanik Miglani, Arnold Hensman
The robotics industry is developing at a fast pace and it seems inevitable that home robots will become affordable, easily accessible and popular. They will be able to perform a will be able to perform a wide range of tasks ranging from household chores, entertainment, home security and surveillance and will become an important part of our lives. The robots like any other a computer system connected to a computer network is vulnerable to hackers. In the paper the authors aim to expose the vulnerabilities and ethical implications of using a popular home robot in order to encourage the research community to put their minds to this pertinent issue. The authors also provide a solution that needs to be developed upon to overcome the security risks.
机器人行业正在快速发展,家用机器人似乎不可避免地会变得负担得起、容易获得和流行。他们将能够执行将能够执行范围广泛的任务,从家务,娱乐,家庭安全和监视,并将成为我们生活的重要组成部分。像任何其他连接到计算机网络的计算机系统一样,机器人很容易受到黑客的攻击。在论文中,作者旨在揭露使用流行的家用机器人的脆弱性和伦理影响,以鼓励研究界把他们的思想放在这个相关的问题上。作者还提供了一个需要开发的解决方案,以克服安全风险。
{"title":"Vision for secure home robots: Implementation of two-factor authentication","authors":"Dhvanik Miglani, Arnold Hensman","doi":"10.1109/ISTAS.2015.7439425","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439425","url":null,"abstract":"The robotics industry is developing at a fast pace and it seems inevitable that home robots will become affordable, easily accessible and popular. They will be able to perform a will be able to perform a wide range of tasks ranging from household chores, entertainment, home security and surveillance and will become an important part of our lives. The robots like any other a computer system connected to a computer network is vulnerable to hackers. In the paper the authors aim to expose the vulnerabilities and ethical implications of using a popular home robot in order to encourage the research community to put their minds to this pertinent issue. The authors also provide a solution that needs to be developed upon to overcome the security risks.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114404408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Driving the self-driving vehicle: Expanding the technological design horizon 驾驶自动驾驶汽车:拓展技术设计视野
Pub Date : 2015-11-01 DOI: 10.1109/ISTAS.2015.7439419
Pascale-L. Blyth, M. Mladenović, B. Nardi, N. Su, H. Ekbia
Drawing perspectives from science and technology studies, philosophy of science, and literature from ethics and social justice, this paper examines the promises and challenges in the development of self-driving vehicle (SDV) technology. We start with the premise that the combination of different computing technologies embedded in SDVs is a powerful tool for efficiency in communications, information gathering, processing, and storage. However, by focusing on efficiency, SDVs provide a new mode of industrialized transportation whose users can only choose between transportation services, but have little or no say about the broader social implications of the technology. We argue that perspectives from social justice and ethics show that SDVs have implications beyond transportation, with profound consequences for users and societies. In particular, values such as privacy, security, and responsibility may be changed for good or bad, in both the short and long-term. The examination of these changes, while the technology is still under foundational development, is as urgent as it is needed.
本文从科学技术研究、科学哲学、伦理和社会正义的角度出发,探讨了自动驾驶汽车(SDV)技术发展的前景和挑战。我们的前提是,在sdv中嵌入不同计算技术的组合是提高通信、信息收集、处理和存储效率的强大工具。然而,通过关注效率,sdv提供了一种新的工业化运输模式,其用户只能在运输服务之间进行选择,但对该技术的更广泛的社会影响几乎没有发言权。我们认为,从社会正义和道德的角度来看,sdv的影响超出了交通运输,对用户和社会产生了深远的影响。特别是,诸如隐私、安全和责任之类的价值观可能会在短期和长期内发生好或坏的变化。虽然这项技术仍处于基础开发阶段,但对这些变化的审查是迫切需要的。
{"title":"Driving the self-driving vehicle: Expanding the technological design horizon","authors":"Pascale-L. Blyth, M. Mladenović, B. Nardi, N. Su, H. Ekbia","doi":"10.1109/ISTAS.2015.7439419","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439419","url":null,"abstract":"Drawing perspectives from science and technology studies, philosophy of science, and literature from ethics and social justice, this paper examines the promises and challenges in the development of self-driving vehicle (SDV) technology. We start with the premise that the combination of different computing technologies embedded in SDVs is a powerful tool for efficiency in communications, information gathering, processing, and storage. However, by focusing on efficiency, SDVs provide a new mode of industrialized transportation whose users can only choose between transportation services, but have little or no say about the broader social implications of the technology. We argue that perspectives from social justice and ethics show that SDVs have implications beyond transportation, with profound consequences for users and societies. In particular, values such as privacy, security, and responsibility may be changed for good or bad, in both the short and long-term. The examination of these changes, while the technology is still under foundational development, is as urgent as it is needed.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117117564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Toward meaningful human control of autonomous weapons systems through function allocation 通过功能分配实现对自主武器系统有意义的人类控制
Pub Date : 2015-10-26 DOI: 10.1109/ISTAS.2015.7439432
Marc C. Canellas, Rachel A. Haga
One of the few convergent themes during the first two United Nations Meeting of Experts on autonomous weapons systems (AWS) was the requirement that there be meaningful human control (MHC) of AWS. What exactly constitutes MHC, however, is still ill-defined. While multiple sets of definitions and analyses have been published and discussed, this work seeks to address two key issues with the current definitions: (1) they are inconsistent in what authorities and responsibilities of human and automated agents need to be regulated, and (2) they lack the specificity that would be required for designers to systemically integrate these restrictions into AWS designs. Given that MHC centers on the interaction of human and autonomous agents, we leverage the models and metrics of function allocation - the allocation of work between human and autonomous agents - to analyze and compare definitions of MHC and the definitions of AWS proposed by the U.S. Department of Defense. Specifically, we transform the definitions into function allocation form to model and compare the definitions, and then show how a mismatch between authority and responsibility in an exemplar military scenario can still plague the human-AWS interactions. In summary, this paper provides a starting point for future research to investigate the application of function allocation to the questions of MHC and more generally, the development of rules and standards for incorporating AWS into the law of armed conflict.
在前两次联合国自主武器系统专家会议期间,为数不多的一致主题之一是要求对自主武器系统进行有意义的人类控制。然而,究竟是什么构成了MHC,仍然没有明确的定义。虽然已经发表和讨论了多套定义和分析,但本工作旨在解决当前定义的两个关键问题:(1)它们在需要监管的人类和自动代理的权限和责任方面不一致;(2)它们缺乏设计人员将这些限制系统地集成到AWS设计中所需的特异性。鉴于MHC以人类和自主代理的交互为中心,我们利用功能分配的模型和指标——人类和自主代理之间的工作分配——来分析和比较MHC的定义和美国国防部提出的AWS的定义。具体来说,我们将定义转换为功能分配形式,对定义进行建模和比较,然后展示在范例军事场景中,权力和责任之间的不匹配如何仍然会困扰人类与aws的交互。综上所述,本文为未来研究职能分配在MHC问题中的应用以及更广泛地将AWS纳入武装冲突法的规则和标准的制定提供了一个起点。
{"title":"Toward meaningful human control of autonomous weapons systems through function allocation","authors":"Marc C. Canellas, Rachel A. Haga","doi":"10.1109/ISTAS.2015.7439432","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439432","url":null,"abstract":"One of the few convergent themes during the first two United Nations Meeting of Experts on autonomous weapons systems (AWS) was the requirement that there be meaningful human control (MHC) of AWS. What exactly constitutes MHC, however, is still ill-defined. While multiple sets of definitions and analyses have been published and discussed, this work seeks to address two key issues with the current definitions: (1) they are inconsistent in what authorities and responsibilities of human and automated agents need to be regulated, and (2) they lack the specificity that would be required for designers to systemically integrate these restrictions into AWS designs. Given that MHC centers on the interaction of human and autonomous agents, we leverage the models and metrics of function allocation - the allocation of work between human and autonomous agents - to analyze and compare definitions of MHC and the definitions of AWS proposed by the U.S. Department of Defense. Specifically, we transform the definitions into function allocation form to model and compare the definitions, and then show how a mismatch between authority and responsibility in an exemplar military scenario can still plague the human-AWS interactions. In summary, this paper provides a starting point for future research to investigate the application of function allocation to the questions of MHC and more generally, the development of rules and standards for incorporating AWS into the law of armed conflict.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115132413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2015 IEEE International Symposium on Technology and Society (ISTAS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1