Pub Date : 2024-11-18DOI: 10.1109/TTS.2024.3493465
John Twomey;Didier Ching;Matthew Peter Aylett;Michael Quayle;Conor Linehan;Gillian Murphy
Deepfakes are a form of synthetic media that uses deep-learning technology to create fake images, video, and audio. The emergence of this technology has inspired much commentary and speculation from academics across a range of disciplines, who have contributed expert opinions regarding the implications of deepfake proliferation on fields such as law, politics, and entertainment. A systematic scoping review was carried out to identify, assemble, and critically analyze those academic narratives. The aim is to build on and critique previous attempts at defining the technology and categorizing the harms and benefits of deepfake technology. A range of databases were searched for relevant articles from 2017 to 2023, resulting in a large multi-disciplinary dataset of 102 papers, 181,659 words long, which were analyzed qualitatively through thematic analysis. Implications for future research include questioning the lack of research evidence for the supposed positives of deepfakes, recognizing the role that identity plays in deepfake technology, challenging the perceived accessibility/ believability of deepfakes, and proposing a more nuanced approach to the dichotomous “positive and negatives” of deepfakes. Furthermore, we show how definitional issues around what a deepfake is versus other forms of fake media feeds confusion around the novelty and impacts of deepfakes.
{"title":"What Is So Deep About Deepfakes? A Multi-Disciplinary Thematic Analysis of Academic Narratives About Deepfake Technology","authors":"John Twomey;Didier Ching;Matthew Peter Aylett;Michael Quayle;Conor Linehan;Gillian Murphy","doi":"10.1109/TTS.2024.3493465","DOIUrl":"https://doi.org/10.1109/TTS.2024.3493465","url":null,"abstract":"Deepfakes are a form of synthetic media that uses deep-learning technology to create fake images, video, and audio. The emergence of this technology has inspired much commentary and speculation from academics across a range of disciplines, who have contributed expert opinions regarding the implications of deepfake proliferation on fields such as law, politics, and entertainment. A systematic scoping review was carried out to identify, assemble, and critically analyze those academic narratives. The aim is to build on and critique previous attempts at defining the technology and categorizing the harms and benefits of deepfake technology. A range of databases were searched for relevant articles from 2017 to 2023, resulting in a large multi-disciplinary dataset of 102 papers, 181,659 words long, which were analyzed qualitatively through thematic analysis. Implications for future research include questioning the lack of research evidence for the supposed positives of deepfakes, recognizing the role that identity plays in deepfake technology, challenging the perceived accessibility/ believability of deepfakes, and proposing a more nuanced approach to the dichotomous “positive and negatives” of deepfakes. Furthermore, we show how definitional issues around what a deepfake is versus other forms of fake media feeds confusion around the novelty and impacts of deepfakes.","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"6 1","pages":"64-79"},"PeriodicalIF":0.0,"publicationDate":"2024-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10756226","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143521369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-11-05DOI: 10.1109/TTS.2024.3486254
Wei Xu;Zaifeng Gao
While artificial intelligence (AI) offers significant benefits, it also has negatively impacted humans and society. A human-centered AI (HCAI) approach has been proposed to address these issues. However, current HCAI practices have shown limited contributions due to a lack of sociotechnical thinking. To overcome these challenges, we conducted a literature review and comparative analysis of sociotechnical characteristics with respect to AI. Then, we propose updated sociotechnical systems (STS) design principles. Based on these findings, this paper introduces an intelligent sociotechnical systems (iSTS) framework to extend traditional STS theory and meet the demands with respect to AI. The iSTS framework emphasizes human-centered joint optimization across individual, organizational, ecosystem, and societal levels. The paper further integrates iSTS with current HCAI practices, proposing a hierarchical HCAI (hHCAI) approach. This hHCAI approach offers a structured approach to address challenges in HCAI practices from a broader sociotechnical perspective. Finally, we provide recommendations for future iSTS and hHCAI work.
{"title":"An Intelligent Sociotechnical Systems (iSTS) Framework: Enabling a Hierarchical Human-Centered AI (hHCAI) Approach","authors":"Wei Xu;Zaifeng Gao","doi":"10.1109/TTS.2024.3486254","DOIUrl":"https://doi.org/10.1109/TTS.2024.3486254","url":null,"abstract":"While artificial intelligence (AI) offers significant benefits, it also has negatively impacted humans and society. A human-centered AI (HCAI) approach has been proposed to address these issues. However, current HCAI practices have shown limited contributions due to a lack of sociotechnical thinking. To overcome these challenges, we conducted a literature review and comparative analysis of sociotechnical characteristics with respect to AI. Then, we propose updated sociotechnical systems (STS) design principles. Based on these findings, this paper introduces an intelligent sociotechnical systems (iSTS) framework to extend traditional STS theory and meet the demands with respect to AI. The iSTS framework emphasizes human-centered joint optimization across individual, organizational, ecosystem, and societal levels. The paper further integrates iSTS with current HCAI practices, proposing a hierarchical HCAI (hHCAI) approach. This hHCAI approach offers a structured approach to address challenges in HCAI practices from a broader sociotechnical perspective. Finally, we provide recommendations for future iSTS and hHCAI work.","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"6 1","pages":"31-46"},"PeriodicalIF":0.0,"publicationDate":"2024-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143521566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-11-04DOI: 10.1109/TTS.2024.3484176
Stephen L. Dorton;Glenn J. Lematta;Kelly J. Neville
We provide an argument for why current Resilience Engineering (RE) tools are unlikely to see widespread adoption, and recommendations for making more adoptable RE tools. Resilience engineering continuously grows in popularity, and various RE tools have existed for years; however, we have found that convincing technology development teams to use RE tools is a “tough sell” for a variety of reasons. We synthesized insights and lessons learned from interacting with numerous technology development teams and the scholarly literature on RE. We then analyzed a set of RE tools through the lens of these insights, and we developed a cohesive and analysis-driven argument for why RE tools are a tough sell, and, more importantly, we developed recommendations to improve future tools. We found that challenges for adoption of current RE tools by technology development teams include RE tools that 1) require too great a level of effort, 2) have unobvious value, 3) require the technology to already exist, 4) have a scope that exceeds agency of technology developers, and 5) do not readily generate relevant systems engineering artifacts. Different underlying factors shape or constrain the solution space; however, there are several recommendations for developing RE tools that are more likely to achieve widespread adoption by technology developers. This research is directly applicable to RE practitioners seeking to have greater engagement with technology development teams. Further, this work is likely generalizable to develop any kind of participatory tools for human-centered design.
{"title":"The Tough Sell of Resilience Engineering","authors":"Stephen L. Dorton;Glenn J. Lematta;Kelly J. Neville","doi":"10.1109/TTS.2024.3484176","DOIUrl":"https://doi.org/10.1109/TTS.2024.3484176","url":null,"abstract":"We provide an argument for why current Resilience Engineering (RE) tools are unlikely to see widespread adoption, and recommendations for making more adoptable RE tools. Resilience engineering continuously grows in popularity, and various RE tools have existed for years; however, we have found that convincing technology development teams to use RE tools is a “tough sell” for a variety of reasons. We synthesized insights and lessons learned from interacting with numerous technology development teams and the scholarly literature on RE. We then analyzed a set of RE tools through the lens of these insights, and we developed a cohesive and analysis-driven argument for why RE tools are a tough sell, and, more importantly, we developed recommendations to improve future tools. We found that challenges for adoption of current RE tools by technology development teams include RE tools that 1) require too great a level of effort, 2) have unobvious value, 3) require the technology to already exist, 4) have a scope that exceeds agency of technology developers, and 5) do not readily generate relevant systems engineering artifacts. Different underlying factors shape or constrain the solution space; however, there are several recommendations for developing RE tools that are more likely to achieve widespread adoption by technology developers. This research is directly applicable to RE practitioners seeking to have greater engagement with technology development teams. Further, this work is likely generalizable to develop any kind of participatory tools for human-centered design.","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"6 1","pages":"47-53"},"PeriodicalIF":0.0,"publicationDate":"2024-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143521364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-21DOI: 10.1109/TTS.2024.3477512
Elma Hajric;Farah Najar Arevalo;Leonard Bruce;Fritz Antony Smith;Katina Michael
Facial biometric systems potentially allow for the overt and covert detection of a person for a range of use case scenarios. This article considers a human resource management (HRM) workplace scenario where employees are monitored through cameras on personal electronic devices for the purposes of facial emotion recognition. The applications described pertain broadly to the “future of work” context. The article considers how employers, would use employee facial emotion data for data-driven decision-making in, for example, the construction and optimization of virtual teams, appropriateness for promotion to leadership positions, and fitness-to-task in mission critical work. Building on the outcomes of a socio-technical study, the initial component of which was an FER prototype, this paper considers the social implications and policy recommendations of the deployment of the technical system. Findings indicate that coded biases in determinations of FER include possible discrimination against women, racial minorities, undocumented immigrants and refugees, and people with visible and invisible disabilities.
{"title":"Facial Emotion Recognition in the Future of Work: Social Implications and Policy Recommendations","authors":"Elma Hajric;Farah Najar Arevalo;Leonard Bruce;Fritz Antony Smith;Katina Michael","doi":"10.1109/TTS.2024.3477512","DOIUrl":"https://doi.org/10.1109/TTS.2024.3477512","url":null,"abstract":"Facial biometric systems potentially allow for the overt and covert detection of a person for a range of use case scenarios. This article considers a human resource management (HRM) workplace scenario where employees are monitored through cameras on personal electronic devices for the purposes of facial emotion recognition. The applications described pertain broadly to the “future of work” context. The article considers how employers, would use employee facial emotion data for data-driven decision-making in, for example, the construction and optimization of virtual teams, appropriateness for promotion to leadership positions, and fitness-to-task in mission critical work. Building on the outcomes of a socio-technical study, the initial component of which was an FER prototype, this paper considers the social implications and policy recommendations of the deployment of the technical system. Findings indicate that coded biases in determinations of FER include possible discrimination against women, racial minorities, undocumented immigrants and refugees, and people with visible and invisible disabilities.","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"6 3","pages":"295-304"},"PeriodicalIF":0.0,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144657423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-17DOI: 10.1109/TTS.2024.3482628
{"title":"2024 Index IEEE Transactions on Technology and Society Vol. 5","authors":"","doi":"10.1109/TTS.2024.3482628","DOIUrl":"https://doi.org/10.1109/TTS.2024.3482628","url":null,"abstract":"","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"5 4","pages":"378-388"},"PeriodicalIF":0.0,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10721216","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142447218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-14DOI: 10.1109/TTS.2024.3465376
P. Chmielewski
This project explores an ethics for securitization. The ethical program benefits from the multi-dimensional significance of the United Nations’ Sustainable Development Goals (SDGs). Engineering practices are critical in this ethical project to assess and shape securitization. The ethics also develops the thought of Hannah Arendt and Elke Schwarz in order to focus on persons: both in terms of their vulnerability and their effective activities to shape a common world. Mark Coeckelbergh underlines the imagination’s socio-temporal role in narrating demands, past and future. Through their narration, vulnerable persons sustain their collective movement forward. Professional risk analysis enables persons to dwell even amid a world of uncertainties. Through skilled habits of design, engineering equips persons to build their enframing world. The plans and achievements of engineers create a syntax of systems that enables, amid plurality, discourse. For vulnerable agents and practicing professionals, their collaborative shaping of a world, not the securing of a nation, finds its ethical guide in the SDGs. The economic, social, and governance dimensions of these goals correspond to the dwelling, designing, and discursive practices of persons and societies. For these activities, the SDGs establish a trans-temporal and global context. Securitization requires ethical direction. The SDGs orient engineering practices so that persons in society through their collective activities are enabled to strive to maintain their common good.
{"title":"Vulnerable Agents and Sustainable Security","authors":"P. Chmielewski","doi":"10.1109/TTS.2024.3465376","DOIUrl":"https://doi.org/10.1109/TTS.2024.3465376","url":null,"abstract":"This project explores an ethics for securitization. The ethical program benefits from the multi-dimensional significance of the United Nations’ Sustainable Development Goals (SDGs). Engineering practices are critical in this ethical project to assess and shape securitization. The ethics also develops the thought of Hannah Arendt and Elke Schwarz in order to focus on persons: both in terms of their vulnerability and their effective activities to shape a common world. Mark Coeckelbergh underlines the imagination’s socio-temporal role in narrating demands, past and future. Through their narration, vulnerable persons sustain their collective movement forward. Professional risk analysis enables persons to dwell even amid a world of uncertainties. Through skilled habits of design, engineering equips persons to build their enframing world. The plans and achievements of engineers create a syntax of systems that enables, amid plurality, discourse. For vulnerable agents and practicing professionals, their collaborative shaping of a world, not the securing of a nation, finds its ethical guide in the SDGs. The economic, social, and governance dimensions of these goals correspond to the dwelling, designing, and discursive practices of persons and societies. For these activities, the SDGs establish a trans-temporal and global context. Securitization requires ethical direction. The SDGs orient engineering practices so that persons in society through their collective activities are enabled to strive to maintain their common good.","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"6 1","pages":"102-111"},"PeriodicalIF":0.0,"publicationDate":"2024-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143521565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-09DOI: 10.1109/TTS.2024.3454936
Rys Farthing;Katina Michael;Jeremy Pitt
{"title":"In This Special: Co-Designing Consumer Technology With Society","authors":"Rys Farthing;Katina Michael;Jeremy Pitt","doi":"10.1109/TTS.2024.3454936","DOIUrl":"https://doi.org/10.1109/TTS.2024.3454936","url":null,"abstract":"","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"5 4","pages":"335-341"},"PeriodicalIF":0.0,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10710629","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142397273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-09DOI: 10.1109/TTS.2024.3467791
{"title":"IEEE Transactions on Technology and Society Publication Information","authors":"","doi":"10.1109/TTS.2024.3467791","DOIUrl":"https://doi.org/10.1109/TTS.2024.3467791","url":null,"abstract":"","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"5 4","pages":"C2-C3"},"PeriodicalIF":0.0,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10711303","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142397121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-09DOI: 10.1109/TTS.2024.3467728
{"title":"Call for EIC/Co-EICs of IEEE Transactions on Technology and Society","authors":"","doi":"10.1109/TTS.2024.3467728","DOIUrl":"https://doi.org/10.1109/TTS.2024.3467728","url":null,"abstract":"","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"5 4","pages":"377-377"},"PeriodicalIF":0.0,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10711282","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142397501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-07DOI: 10.1109/TTS.2024.3460740
Katina Michael;Kathleen M. Vogel;Jeremy Pitt;Mariana Zafeirakopoulos
Rapid progress in Artificial Intelligence (AI) is presenting both opportunities and threats that promise to be transformative and disruptive to the field of cybersecurity. The current approaches to providing security and safety to users are limited. Online attacks (e.g., identity theft) and data breaches are causing real-world harms to individuals and communities, resulting in financial instability, loss of healthcare benefits, or even access to housing, among other undesirable outcomes. The resulting challenges are expected to be amplified, given the increased capabilities of AI and its deployment in professional, public, and private spheres. As such, there is a need for a new formulation of these challenges that considers the complex social, technical, and environmental dimensions and factors that shape both the opportunities and threats for AI in cybersecurity. Through an exploration and application of the socio-technical approach, which highlights the significance and value of participatory practices, we can generate new ways of conceptualising the challenges of AI in cybersecurity contexts. This paper will identify and elaborate on key issues, in the form of both gaps and opportunities, that need to be addressed by various stakeholders, while exploring substantive approaches to addressing the gaps and capitalizing on the opportunities at the micro/meso/macro levels, which in turn will inform decision-making processes. This paper offers approaches for responding to public interest security, safety, and privacy challenges arising from complex AI in cybersecurity issues in open socio-technical systems.
{"title":"Artificial Intelligence in Cybersecurity: A Socio-Technical Framing","authors":"Katina Michael;Kathleen M. Vogel;Jeremy Pitt;Mariana Zafeirakopoulos","doi":"10.1109/TTS.2024.3460740","DOIUrl":"https://doi.org/10.1109/TTS.2024.3460740","url":null,"abstract":"Rapid progress in Artificial Intelligence (AI) is presenting both opportunities and threats that promise to be transformative and disruptive to the field of cybersecurity. The current approaches to providing security and safety to users are limited. Online attacks (e.g., identity theft) and data breaches are causing real-world harms to individuals and communities, resulting in financial instability, loss of healthcare benefits, or even access to housing, among other undesirable outcomes. The resulting challenges are expected to be amplified, given the increased capabilities of AI and its deployment in professional, public, and private spheres. As such, there is a need for a new formulation of these challenges that considers the complex social, technical, and environmental dimensions and factors that shape both the opportunities and threats for AI in cybersecurity. Through an exploration and application of the socio-technical approach, which highlights the significance and value of participatory practices, we can generate new ways of conceptualising the challenges of AI in cybersecurity contexts. This paper will identify and elaborate on key issues, in the form of both gaps and opportunities, that need to be addressed by various stakeholders, while exploring substantive approaches to addressing the gaps and capitalizing on the opportunities at the micro/meso/macro levels, which in turn will inform decision-making processes. This paper offers approaches for responding to public interest security, safety, and privacy challenges arising from complex AI in cybersecurity issues in open socio-technical systems.","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"6 1","pages":"15-30"},"PeriodicalIF":0.0,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143521534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}