Open Access. Powered by Scholars. Published by Universities.®
Science and Technology Studies Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Autonomous vehicles (2)
- Ethics (2)
- Non-occupants (2)
- Occupants (2)
- Pragmatism (2)
-
- AI ethics (1)
- Algorithmic bias (1)
- Algorithms (1)
- Animal studies (1)
- Art. 22 (1)
- Automatization (1)
- Bitcoin (1)
- Blockchain (1)
- Child welfare (1)
- Cognitive radio networks (1)
- Continuous-time Markov chain (1)
- Data discovery (1)
- Dependability (1)
- GDPR (1)
- Graph data (1)
- Human intervention (1)
- Ideal theory (1)
- Information systems (1)
- Intelligent semantic agents (1)
- Knowledge base (1)
- Machine learning (1)
- Metadata (1)
- Mobile payment (1)
- Naturalism (1)
- Naturalistic technology (1)
- Publication
- Publication Type
Articles 1 - 13 of 13
Full-Text Articles in Science and Technology Studies
Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr
Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr
Cybersecurity Undergraduate Research Showcase
According to the Internet Crime Complaint Center (IC3), in 2021, the United States lost around $6.9 billion to cybercrime. In 2022, that number grew to over $10.2 billion (IC3, 2022). In one of many efforts to combat cybercrimes, at least 40 states “introduced or considered more than 250 bills or resolutions that deal significantly with cybersecurity” with 24 states officially enacting a total of 41 bills (National Conference on State Legislatures, 2022).
The world of cybercrime evolves each day. Nevertheless, challenges arise when we investigate and prosecute cybercrime, which will be examined in the following collection of essays that highlight …
Robots Still Outnumber Humans In Web Archives In 2019, But Less Than In 2012, Himarsha R. Jayanetti, Kritika Garg, Sawood Alam, Michael L. Nelson, Michele C. Weigle
Robots Still Outnumber Humans In Web Archives In 2019, But Less Than In 2012, Himarsha R. Jayanetti, Kritika Garg, Sawood Alam, Michael L. Nelson, Michele C. Weigle
College of Sciences Posters
To identify robots and human users in web archives, we conducted a study using the access logs from the Internet Archive’s (IA) Wayback Machine in 2012 (IA2012), 2015 (IA2015), and 2019 (IA2019), and the Portuguese Web Archive (PT) in 2019 (PT2019). We identified user sessions in the access logs and classified them as human or robot based on their browsing behavior. In 2013, AlNoamany et al. [1] studied the user access patterns using IA access logs from 2012. They established four web archive user access patterns: single-page access (Dip), access to the same page at multiple archive times (Dive), access …
Bitcoin Selfish Mining Modeling And Dependability Analysis, Chencheng Zhou, Liudong Xing, Jun Guo, Qisi Liu
Bitcoin Selfish Mining Modeling And Dependability Analysis, Chencheng Zhou, Liudong Xing, Jun Guo, Qisi Liu
Electrical & Computer Engineering Faculty Publications
Blockchain technology has gained prominence over the last decade. Numerous achievements have been made regarding how this technology can be utilized in different aspects of the industry, market, and governmental departments. Due to the safety-critical and security-critical nature of their uses, it is pivotal to model the dependability of blockchain-based systems. In this study, we focus on Bitcoin, a blockchain-based peer-to-peer cryptocurrency system. A continuous-time Markov chain-based analytical method is put forward to model and quantify the dependability of the Bitcoin system under selfish mining attacks. Numerical results are provided to examine the influences of several key parameters related to …
Autonomous Vehicles And The Ethical Tension Between Occupant And Non-Occupant Safety, Jason Borenstein, Joseph Herkert, Keith Miller
Autonomous Vehicles And The Ethical Tension Between Occupant And Non-Occupant Safety, Jason Borenstein, Joseph Herkert, Keith Miller
The Journal of Sociotechnical Critique
Given that the creation and deployment of autonomous vehicles is likely to continue, it is important to explore the ethical responsibilities of designers, manufacturers, operators, and regulators of the technology. We specifically focus on the ethical responsibilities surrounding autonomous vehicles that these stakeholders have to protect the safety of non-occupants, meaning individuals who are around the vehicles while they are operating. The term “non-occupants” includes, but is not limited to, pedestrians and cyclists. We are particularly interested in how to assign moral responsibility for the safety of non-occupants when autonomous vehicles are deployed in a complex, land-based transportation system.
Human Supremacy As Posthuman Risk, Daniel Estrada
Human Supremacy As Posthuman Risk, Daniel Estrada
The Journal of Sociotechnical Critique
Human supremacy is the widely held view that human interests ought to be privileged over other interests as a matter of ethics and public policy. Posthumanism is the historical situation characterized by a critical reevaluation of anthropocentrist theory and practice. This paper draws on animal studies, critical posthumanism, and the critique of ideal theory in Charles Mills and Serene Khader to address the appeal to human supremacist rhetoric in AI ethics and policy discussions, particularly in the work of Joanna Bryson. This analysis identifies a specific risk posed by human supremacist policy in a posthuman context, namely the classification of …
A Transformative Concept: From Data Being Passive Objects To Data Being Active Subjects, Hans-Peter Plag, Shelley-Ann Jules-Plag
A Transformative Concept: From Data Being Passive Objects To Data Being Active Subjects, Hans-Peter Plag, Shelley-Ann Jules-Plag
OES Faculty Publications
The exploitation of potential societal benefits of Earth observations is hampered by users having to engage in often tedious processes to discover data and extract information and knowledge. A concept is introduced for a transition from the current perception of data as passive objects (DPO) to a new perception of data as active subjects (DAS). This transition would greatly increase data usage and exploitation, and support the extraction of knowledge from data products. Enabling the data subjects to actively reach out to potential users would revolutionize data dissemination and sharing and facilitate collaboration in user communities. The three core elements …
Difference Between Algorithmic Processing And The Process Of Lifeworld (Lebenswelt), Domenico Schneider
Difference Between Algorithmic Processing And The Process Of Lifeworld (Lebenswelt), Domenico Schneider
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
The following article compares the temporality of the life-world with the digital processing. The temporality of the life-world is determined to be stretched and spontaneous. The temporality of the digital is given by discrete step-by-step points of time. Most ethical issues can be traced back to a mismatch of these two ways of processing. This creates a foundation for the ethics of the digital processing. Methodologically, phenomenological considerations are merged with media-philosophical considerations in the article.
Rethinking Algorithmic Bias Through Phenomenology And Pragmatism, Johnathan C. Flowers
Rethinking Algorithmic Bias Through Phenomenology And Pragmatism, Johnathan C. Flowers
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
In 2017, Amazon discontinued an attempt at developing a hiring algorithm which would enable the company to streamline its hiring processes due to apparent gender discrimination. Specifically, the algorithm, trained on over a decade’s worth of resumes submitted to Amazon, learned to penalize applications that contained references to women, that indicated graduation from all women’s colleges, or otherwise indicated that an applicant was not male. Amazon’s algorithm took up the history of Amazon’s applicant pool and integrated it into its present “problematic situation,” for the purposes of future action. Consequently, Amazon declared the project a failure: even after attempting to …
Autonomous Vehicles And The Ethical Tension Between Occupant And Non-Occupant Safety, Jason Borenstein, Joseph Herkert, Keith W. Miller
Autonomous Vehicles And The Ethical Tension Between Occupant And Non-Occupant Safety, Jason Borenstein, Joseph Herkert, Keith W. Miller
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
Autonomous vehicle manufacturers, people inside an autonomous vehicle (occupants), and people outside the vehicle (non-occupants) are among the distinct stakeholders when addressing ethical issues inherent in systems that include autonomous vehicles. As responses to recent tragic cases illustrate, advocates for autonomous vehicles tend to focus on occupant safety, sometimes to the exclusion of non-occupant safety. Thus, we aim to examine ethical issues associated with non-occupant safety, including pedestrians, bicyclists, motorcyclists, and riders of motorized scooters. We also explore the ethical implications of technical and policy ideas that some might propose to improve non-occupant safety. In addition, if safety (writ large) …
The Right To Human Intervention: Law, Ethics And Artificial Intelligence, Maria Kanellopoulou - Botti, Fereniki Panagopoulou, Maria Nikita, Anastasia Michailaki
The Right To Human Intervention: Law, Ethics And Artificial Intelligence, Maria Kanellopoulou - Botti, Fereniki Panagopoulou, Maria Nikita, Anastasia Michailaki
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
The paper analyses the new right of human intervention in use of information technology, automatization processes and advanced algorithms in individual decision-making activities. Art. 22 of the new General Data Protection Regulation (GDPR) provides that the data subject has the right not to be subject to a fully automated decision on matters of legal importance to her interests, hence the data subject has a right to human intervention in this kind of decisions.
Security Risk Tolerance In Mobile Payment: A Trade-Off Framework, Yong Chen
Security Risk Tolerance In Mobile Payment: A Trade-Off Framework, Yong Chen
Information Technology & Decision Sciences Theses & Dissertations
Security is identified as a major barrier for consumers in adopting mobile payment. Although existing literature has incorporated security into the Technology Acceptance Model (TAM), the Unified Theory of Acceptance, and the Use of Technology (UTAUT) and it has investigated the way in which security affects consumers’ acceptance of mobile payment, security is a factor only in diverse research models. Studies of mobile payment that focus on security are not available. Additionally, previous studies of mobile payment are based on Direct Carrier Billing- (DCB)-based mobile payment or Near Field Communication- (NFC)-based mobile payment. The results regarding security might not be …
Assessing The Fit Between Child Welfare Information Systems And Frontline Workers: Development Of A Task-Technology Fit Instrument, Kurt William Heisler
Assessing The Fit Between Child Welfare Information Systems And Frontline Workers: Development Of A Task-Technology Fit Instrument, Kurt William Heisler
Health Services Research Dissertations
States and the federal government continue to invest heavily in child welfare information systems (CWIS) to improve caseworkers' performance, but the extent to which these systems meet caseworkers' needs is unclear. In the field of child welfare there are no reliable user-evaluation measures states can use to assess the degree to which a CWIS meets caseworkers' needs, and identify which specific features of the CWIS most need improvement. The study developed such a measure based on the task-technology fit (TTF) framework, which posits that users will evaluate the usefulness of a technology based on how well it meets their tasks …
Transparent Spectrum Co-Access In Cognitive Radio Networks, Jonathan Daniel Backens
Transparent Spectrum Co-Access In Cognitive Radio Networks, Jonathan Daniel Backens
Electrical & Computer Engineering Theses & Dissertations
The licensed wireless spectrum is currently under-utilized by as much as 85%. Cognitive radio networks have been proposed to employ dynamic spectrum access to share this under-utilized spectrum between licensed primary user transmissions and unlicensed secondary user transmissions. Current secondary user opportunistic spectrum access methods, however, remain limited in their ability to provide enough incentive to convince primary users to share the licensed spectrum, and they rely on primary user absence to guarantee secondary user performance. These challenges are addressed by developing a Dynamic Spectrum Co-Access Architecture (DSCA) that allows secondary user transmissions to co-access transparently and concurrently with primary …