Pub Date : 2025-03-08DOI: 10.1109/MTS.2025.3558971
Amr I. Elkhawas;Thomas M. Chen;Ilir Gashi
Machine learning is one of the most prominent technologies used to combat phishing detection; however, the vast amount of data required for training models for detection raises a privacy concern for end users. Gathering email or document data may very well contain private information, and the machine learning models learn from the words and other attributes of these text-based documents. Gathering this information in a centralized location and using it to train models could pose a security risk on all levels of data acquisition, from the transfer of the data to the storage. Federated learning is emerging as a promising alternative to traditionally centralized machine learning for phishing detection. The advantages of federated learning, mainly in privacy and scalability, are weighed against the issue of detection accuracy. Federated learning provides the ability to train models without the transfer of sensitive data, more or less no raw data from the device, and allows the training to be done locally; this eliminates the privacy exposure accompanied by traditional machine learning models that operate in a centralized manner. However, this alone is not enough to comply with privacy regulations, such as General Data Protection Regulation (GDPR) and the European Union (EU) Artificial Intelligence Act (AI Act), and privacy-preserving technology must be used in conjunction to ensure federated learning’s compliance with privacy regulations. This article is a dedication to Professor Thomas Chen’s aspirations in the field of cybersecurity. This article is dedicated to his memory.
{"title":"Privacy-Preserving Federated Learning for Phishing Detection","authors":"Amr I. Elkhawas;Thomas M. Chen;Ilir Gashi","doi":"10.1109/MTS.2025.3558971","DOIUrl":"https://doi.org/10.1109/MTS.2025.3558971","url":null,"abstract":"Machine learning is one of the most prominent technologies used to combat phishing detection; however, the vast amount of data required for training models for detection raises a privacy concern for end users. Gathering email or document data may very well contain private information, and the machine learning models learn from the words and other attributes of these text-based documents. Gathering this information in a centralized location and using it to train models could pose a security risk on all levels of data acquisition, from the transfer of the data to the storage. Federated learning is emerging as a promising alternative to traditionally centralized machine learning for phishing detection. The advantages of federated learning, mainly in privacy and scalability, are weighed against the issue of detection accuracy. Federated learning provides the ability to train models without the transfer of sensitive data, more or less no raw data from the device, and allows the training to be done locally; this eliminates the privacy exposure accompanied by traditional machine learning models that operate in a centralized manner. However, this alone is not enough to comply with privacy regulations, such as General Data Protection Regulation (GDPR) and the European Union (EU) Artificial Intelligence Act (AI Act), and privacy-preserving technology must be used in conjunction to ensure federated learning’s compliance with privacy regulations. This article is a dedication to Professor Thomas Chen’s aspirations in the field of cybersecurity. This article is dedicated to his memory.","PeriodicalId":55016,"journal":{"name":"IEEE Technology and Society Magazine","volume":"44 2","pages":"77-84"},"PeriodicalIF":2.1,"publicationDate":"2025-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144178860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-07DOI: 10.1109/MTS.2025.3558666
Calvin Hillis;Ebrahim Bagheri;Zack Marshall
Research protocol papers, scoping reviews, and systematic reviews are important tools for ensuring transparency, methodological rigor, accountability, and reproducibility in scholarly research. While widely adopted in disciplines such as medicine and social sciences, these practices remain underutilized in computer science and engineering, particularly within responsible AI research. This article explores the critical role that scoping and systematic reviews play in synthesizing knowledge, identifying gaps, and guiding future research in responsible AI. It also examines how research protocol papers—especially those developed for structured reviews—can improve the credibility, clarity, and replicability of responsible AI studies. By outlining the benefits and challenges of these methods, we argue for their greater adoption in AI ethics and responsible AI research. We conclude with recommendations to support the institutional, editorial, and cultural shifts necessary to integrate these rigorous methodological tools into responsible AI scholarship.
{"title":"The Role of Protocol Papers, Scoping Reviews, and Systematic Reviews in Responsible AI Research","authors":"Calvin Hillis;Ebrahim Bagheri;Zack Marshall","doi":"10.1109/MTS.2025.3558666","DOIUrl":"https://doi.org/10.1109/MTS.2025.3558666","url":null,"abstract":"Research protocol papers, scoping reviews, and systematic reviews are important tools for ensuring transparency, methodological rigor, accountability, and reproducibility in scholarly research. While widely adopted in disciplines such as medicine and social sciences, these practices remain underutilized in computer science and engineering, particularly within responsible AI research. This article explores the critical role that scoping and systematic reviews play in synthesizing knowledge, identifying gaps, and guiding future research in responsible AI. It also examines how research protocol papers—especially those developed for structured reviews—can improve the credibility, clarity, and replicability of responsible AI studies. By outlining the benefits and challenges of these methods, we argue for their greater adoption in AI ethics and responsible AI research. We conclude with recommendations to support the institutional, editorial, and cultural shifts necessary to integrate these rigorous methodological tools into responsible AI scholarship.","PeriodicalId":55016,"journal":{"name":"IEEE Technology and Society Magazine","volume":"44 2","pages":"72-76"},"PeriodicalIF":2.1,"publicationDate":"2025-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144185977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-05DOI: 10.1109/MTS.2025.3544951
{"title":"We Want to Hear From You!","authors":"","doi":"10.1109/MTS.2025.3544951","DOIUrl":"https://doi.org/10.1109/MTS.2025.3544951","url":null,"abstract":"","PeriodicalId":55016,"journal":{"name":"IEEE Technology and Society Magazine","volume":"44 1","pages":"100-100"},"PeriodicalIF":2.1,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10910250","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-05DOI: 10.1109/MTS.2025.3540474
David N. Lucsko
Presents reviews for the following list of books, (Women Behind the Wheel: An Unexpected and Personal History of the Car–Nancy A. Nichols (New York, NY, USA: Pegasus Books, 2024, 230 pp.)).
{"title":"Women Behind the Wheel: An Unexpected and Personal History of the Car–Nancy A. Nichols (New York, NY, USA: Pegasus Books, 2024, 230 pp.)","authors":"David N. Lucsko","doi":"10.1109/MTS.2025.3540474","DOIUrl":"https://doi.org/10.1109/MTS.2025.3540474","url":null,"abstract":"Presents reviews for the following list of books, (Women Behind the Wheel: An Unexpected and Personal History of the Car–Nancy A. Nichols (New York, NY, USA: Pegasus Books, 2024, 230 pp.)).","PeriodicalId":55016,"journal":{"name":"IEEE Technology and Society Magazine","volume":"44 1","pages":"68-69"},"PeriodicalIF":2.1,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10910252","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-05DOI: 10.1109/MTS.2025.3544953
{"title":"IEEE Collabratec","authors":"","doi":"10.1109/MTS.2025.3544953","DOIUrl":"https://doi.org/10.1109/MTS.2025.3544953","url":null,"abstract":"","PeriodicalId":55016,"journal":{"name":"IEEE Technology and Society Magazine","volume":"44 1","pages":"73-73"},"PeriodicalIF":2.1,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10910041","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-05DOI: 10.1109/MTS.2025.3540614
{"title":"IEEE Technology and Society Magazine Publication Information","authors":"","doi":"10.1109/MTS.2025.3540614","DOIUrl":"https://doi.org/10.1109/MTS.2025.3540614","url":null,"abstract":"","PeriodicalId":55016,"journal":{"name":"IEEE Technology and Society Magazine","volume":"44 1","pages":"1-1"},"PeriodicalIF":2.1,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10910046","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial Women—Julie Wosk (Bloomington, IN, USA: Indiana Univ. Press, 2024, 220 pp.)","authors":"Michelle Charette","doi":"10.1109/MTS.2025.3540490","DOIUrl":"https://doi.org/10.1109/MTS.2025.3540490","url":null,"abstract":"Presents reviews for the following list of books, (Artificial Women—Julie Wosk (Bloomington, IN, USA: Indiana Univ. Press, 2024, 220 pp.))","PeriodicalId":55016,"journal":{"name":"IEEE Technology and Society Magazine","volume":"44 1","pages":"64-67"},"PeriodicalIF":2.1,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10910254","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-05DOI: 10.1109/MTS.2025.3540620
{"title":"Call for Papers: Special Issue on the Social Impact of the Internet of Medical Things: From Body Wearables to Brain Implants","authors":"","doi":"10.1109/MTS.2025.3540620","DOIUrl":"https://doi.org/10.1109/MTS.2025.3540620","url":null,"abstract":"","PeriodicalId":55016,"journal":{"name":"IEEE Technology and Society Magazine","volume":"44 1","pages":"C3-C3"},"PeriodicalIF":2.1,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10910044","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-05DOI: 10.1109/MTS.2025.3540497
Charles Robinson
Presents reviews for the following list of books, (American Gun: The True Story of the AR-15—Cameron McWhirter and Zusha Elision (New York, NY, USA: Farrar, Straus, and Giroux, 2023, 496 pp.)).
提供以下书籍的评论,(美国枪支:ar -15的真实故事卡梅隆·麦克沃特和祖莎·埃利森(纽约,纽约,美国:Farrar, Straus, and Giroux, 2023, 496页))。
{"title":"American Gun: The True Story of the AR-15—Cameron McWhirter and Zusha Elision (New York, NY, USA: Farrar, Straus, and Giroux, 2023, 496 pp.)","authors":"Charles Robinson","doi":"10.1109/MTS.2025.3540497","DOIUrl":"https://doi.org/10.1109/MTS.2025.3540497","url":null,"abstract":"Presents reviews for the following list of books, (American Gun: The True Story of the AR-15—Cameron McWhirter and Zusha Elision (New York, NY, USA: Farrar, Straus, and Giroux, 2023, 496 pp.)).","PeriodicalId":55016,"journal":{"name":"IEEE Technology and Society Magazine","volume":"44 1","pages":"61-63"},"PeriodicalIF":2.1,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10910034","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-05DOI: 10.1109/MTS.2025.3544955
{"title":"IEEE Women in Engineering","authors":"","doi":"10.1109/MTS.2025.3544955","DOIUrl":"https://doi.org/10.1109/MTS.2025.3544955","url":null,"abstract":"","PeriodicalId":55016,"journal":{"name":"IEEE Technology and Society Magazine","volume":"44 1","pages":"51-51"},"PeriodicalIF":2.1,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10910253","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}