2020 IEEE International Symposium on Technology and Society (ISTAS)最新文献

筛选
英文 中文
Only Location: A Systematic Literature Review on Context Marketing 只有地点:关于情境营销的系统文献综述
2020 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2020-11-12 DOI: 10.1109/ISTAS50296.2020.9462242
Anna-Lena Christina Krusch, Perole Uphaus, H. Rau
{"title":"Only Location: A Systematic Literature Review on Context Marketing","authors":"Anna-Lena Christina Krusch, Perole Uphaus, H. Rau","doi":"10.1109/ISTAS50296.2020.9462242","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462242","url":null,"abstract":"In today’s information era, the ability to address the needs of potential customers at a moment when they are particularly receptive to the information provided becomes increasingly important. Modern mobile devices allow to collect precise data about the users’ context, thus enhancing possibilities to better estimate, proof and react to current situations in real time. Given that, ‘context marketing’ nowadays is an approach frequently discussed in literature. This contribution aims to systematize existing publications on the subject of context marketing, in order to build a basis for future research and to uncover potential gaps and contradictions in previous research. Methodologically, the two scientific databases “Scopus” and “Web of Science” were searched for context marketing related contributions. The evaluation made use of a mixed methods approach including a qualitative content analysis, and subsequently further quantitative evaluations. The findings reveal the majority of publications to focus on the user’s location as the only context factor, resulting in a predominant focus on location-based advertising related research.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"29 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125794651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Arbiter: Improved Smart City Operations through Decentralized Autonomous Organization 仲裁者:通过分散的自治组织改善智慧城市运营
2020 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2020-11-12 DOI: 10.1109/ISTAS50296.2020.9462219
Francis Mendoza, H. Behrens
{"title":"Arbiter: Improved Smart City Operations through Decentralized Autonomous Organization","authors":"Francis Mendoza, H. Behrens","doi":"10.1109/ISTAS50296.2020.9462219","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462219","url":null,"abstract":"Smart cities have emerged as one of the most promising applications of cyber-physical systems (CPS), carrying the potential to serve the various interests of the public and private sectors at large. However, contemporary smart city infrastructure commonly uses heavily-centralized network architectures, reducing failure resilience and application flexibility. This centralization also imposes high barriers to entry for public access, limiting usage and oversight opportunities. To address these limitations, we describe Arbiter, a novel fog- and edge-based communication architecture based on the concept of a Decentralized Autonomous Organization (DAO). Arbiter aims to improve the socioeconomic equity of the local citizenry by (1) acting as a management layer for citywide CPS assets, (2) providing a compliance layer for managing human capital, and (3) offering a data protection layer to ensure that citizens retain full control of their personal data. We then analyze in detail the technical, socioeconomic, and ethical implications of Arbiter, and contextualize its role in the modern smart city.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130779711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Defending Deep Learning Based Anomaly Detection Systems Against White-Box Adversarial Examples and Backdoor Attacks 保护基于深度学习的异常检测系统免受白盒攻击和后门攻击
2020 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2020-11-12 DOI: 10.1109/ISTAS50296.2020.9462227
Khaled Alrawashdeh, Stephen Goldsmith
{"title":"Defending Deep Learning Based Anomaly Detection Systems Against White-Box Adversarial Examples and Backdoor Attacks","authors":"Khaled Alrawashdeh, Stephen Goldsmith","doi":"10.1109/ISTAS50296.2020.9462227","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462227","url":null,"abstract":"Deep Neural Network (DNN) has witnessed rapid progress and significant successes in the recent years. Wide range of applications depends on the high performance of deep learning to solve real-life challenges. Deep learning is being applied in many safety-critical environments. However, deep neural networks have been recently found vulnerable to adversarial examples and backdoor attacks. Stealthy adversarial examples and backdoor attacks can easily fool deep neural networks to generate the wrong results. The risk of adversarial examples attacks that target deep learning models impedes the wide deployment of deep neural networks in safety-critical environments. In this work we propose a defensive technique for deep learning by combining activation function and neurons pruning to reduce the effects of adversarial examples and backdoor attacks. We evaluate the efficacy of the method on an anomaly detection application using Deep Belief Network (DBN) and Coupled Generative Adversarial Network (CoGAN). The method reduces the loss of accuracy from the attacks from an average 10% to 2% using DBN and from an average 14% to 2% using CoGAN. We evaluate the method using two benchmark datasets: NSL-KDD and ransomware.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121986916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Making Publics Visible: Utilizing STS Knowledge for Public Identification and Engagement 让公众可见:利用STS知识进行公众认同和参与
2020 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2020-11-12 DOI: 10.1109/ISTAS50296.2020.9462182
A. Y. Patrick
{"title":"Making Publics Visible: Utilizing STS Knowledge for Public Identification and Engagement","authors":"A. Y. Patrick","doi":"10.1109/ISTAS50296.2020.9462182","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462182","url":null,"abstract":"Public Interest Technology (PIT) is an emerging field focused upon ensuring that innovative technologies are designed, distributed, and mediated for the well-being of the public. PIT seeks to educate technologists, engineers, and researchers to be cognizant of the public impact of their work and to train policymakers to equitably mediate the scope and reach of technology. However, the reach and impact of PIT work can be further enhanced through theoretical and pragmatic Science, Technology, and Society (STS) knowledge. For the past four years, I have worked on a large-scale change initiative in an electrical and computer engineering (ECE) department. An in-depth qualitative study of the department revealed several challenges within the department regarding identity, sense of belonging, invisible work, and career trajectory. As a scholar-practitioner, I employed STS theory and pragmatic knowledge to create three critically crafted interventions to address these challenges. First, STS knowledge was utilized to investigate the challenges within the department and understand how these challenges affected the multiple stakeholders and the culture of the ECE department. Second, pragmatic STS knowledge was utilized to create projects to shift the boundaries within the engineering department that limited the professional, academic, and personal opportunities of the engineering student. The purpose of this paper is to illustrate how my application of STS theoretical and pragmatic scholarship to address the culture of an electrical and computer engineering department can contribute to the field of PIT.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116500451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Can we use non-transparent artificial intelligence technologies for legal purposes? 我们可以将不透明的人工智能技术用于法律目的吗?
2020 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2020-11-12 DOI: 10.1109/ISTAS50296.2020.9462204
G. Adamson
{"title":"Can we use non-transparent artificial intelligence technologies for legal purposes?","authors":"G. Adamson","doi":"10.1109/ISTAS50296.2020.9462204","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462204","url":null,"abstract":"Artificial intelligence (AI) is a technology receiving significant attention from lawmakers, courts, and regulators. An aspect of this attention is an interest in understanding how AI works when applied to a process of law, or to a regulated application of technology such as driverless vehicles. One approach is to seek to understand what the AI technology does, with goals including “transparency” and “explainability”. This paper considers these concepts from a law and technology perspective. Research in this area commonly examines the challenge of “black box” technologies, particularly the approach of “post hoc explainability”. This paper points out that the post hoc approach provides an inference, rather than an actual description of AI behavior. It considers circumstances in which the post hoc approach may be satisfactory, and those involving arbitrary power in which it should not be used, as inconsistent with the principle of regularity in the rule of law. It recommends that the output of non-transparent AI technologies should necessarily be viewed critically. It concludes that human attention is required in determining whether or not to accept AI technology explanations.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128533879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stakeholders in the cloud computing value-chain : A socio-technical review of data breach literature 云计算价值链中的利益相关者:数据泄露文献的社会技术评论
2020 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2020-11-12 DOI: 10.1109/ISTAS50296.2020.9462169
David Kolevski, K. Michael, Roba Abbas, M. Freeman
{"title":"Stakeholders in the cloud computing value-chain : A socio-technical review of data breach literature","authors":"David Kolevski, K. Michael, Roba Abbas, M. Freeman","doi":"10.1109/ISTAS50296.2020.9462169","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462169","url":null,"abstract":"This paper is about stakeholders in the cloud computing value-chain. Early cloud computing literature focused on the technical aspect of the technology and viewed the provider and customer as essential value-chain stakeholders. The more users that use cloud services, the potential for data breaches increases. The review of the literature was carried out using a social-technical approach. Socio-technical theory encapsulates the social, technical and environmental dimensions of a system. The outcomes of the search indicated that there are two pertinent stakeholder types: operational and non-operational. Operational stakeholders include cloud providers, customers, enablers, resellers and third-party providers. Non-operational stakeholders include regulators, legislators, courts, non-government organisations, law enforcement, industry-standard bodies and end-users. The end-users are critically important in the cloud value-chain in that they rely on online services for everyday activities and have their data compromised. The cloud value-chain presents that cloud services encapsulate more than just technology services. The paper considers the complex stakeholder relationships and data breach issues, indicating the need for a better socio-technical response from the stakeholders within the value-chain.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132006843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
COVIDFREE App: The User-Enabling Contact Prevention Application covid - free应用程序:用户启用接触预防应用程序
2020 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2020-11-12 DOI: 10.1109/ISTAS50296.2020.9462186
Edgard Musafiri Mimo, T. McDaniel
{"title":"COVIDFREE App: The User-Enabling Contact Prevention Application","authors":"Edgard Musafiri Mimo, T. McDaniel","doi":"10.1109/ISTAS50296.2020.9462186","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462186","url":null,"abstract":"Governments all over the world are considering employing mobile contact tracing applications to automatically manage, trace, and investigate recent interactions of newly tested COVID-19 infected individuals. The prospective use of such applications has produced several debates surrounding confidentiality, security, data supervision, closeness approximation algorithms, and cyber-attack susceptibility. This paper discusses these concerns in the context of a novel smartphone application architecture, proposed here, that gives users more control and privacy during contact tracing. The proposed application is termed COVIDFREE App, which is aimed at enhancing users’ situational awareness through communication of safe and unsafe locations. An overview of the app’s architectural design and functionality are presented, including a newly developed Overall Risk Density Safety Factor calculation inspired by COVID-19 density risks and factors of users based on health requirements and several customizable user-specific scenarios. Finally, the paper outlines the benefit to funding and developing contact tracing apps, such as the COVIDFRE App, and discusses advantages of such applications including citizen awareness, relief, and preparedness.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117085332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Taiwan’s Ability to Reduce the Transmission of COVID-19: A Success Story 台湾减少新冠病毒传播的能力:一个成功的故事
2020 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2020-11-12 DOI: 10.1109/ISTAS50296.2020.9462226
H. Fan
{"title":"Taiwan’s Ability to Reduce the Transmission of COVID-19: A Success Story","authors":"H. Fan","doi":"10.1109/ISTAS50296.2020.9462226","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462226","url":null,"abstract":"Taiwan is known for its effective responses to COVID-19, with only 799 confirmed cases by the end of 2020. Based on the previous research, this article identifies three major technical approaches used in Taiwan to prevent the community spread of COVID-19: (1) Digital fence and entry quarantine system to track close contacts and force 14 days of in-home quarantine; (2) Evolving face mask distribution policy and system to ensure fair allocation of the limited face mask resources; and (3) Open-source software co-developed by the government and tech community to share real-time COVID-19 related information and conduct location history based contact tracing. The combat against COVID-19 in Taiwan is a success in digital governance, with great synergy between the government and every citizen.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114396233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing cyber-physical threats to Pennsylvania dams through a lens of vulnerability 从脆弱性的角度分析宾夕法尼亚大坝面临的网络物理威胁
2020 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2020-11-12 DOI: 10.1109/ISTAS50296.2020.9756013
Lauren Dennis, S. Rajtmajer, C. Grady
{"title":"Analyzing cyber-physical threats to Pennsylvania dams through a lens of vulnerability","authors":"Lauren Dennis, S. Rajtmajer, C. Grady","doi":"10.1109/ISTAS50296.2020.9756013","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9756013","url":null,"abstract":"Protecting critical infrastructure, such as water supply systems and dams, remains a top priority across multiple administrations in the United States. We study the ethical and environmental justice implications of potential disruptions to 29 dams across the State of Pennsylvania that serve as a water supply. Using census data, we investigate the communities surrounding these dams to look for relationships between community demographics and dam characteristics that may contribute to risk. We highlight the role of dam age, dam ownership, dam capacity, and dam downstream hazard potential in this analysis. Our results reveal associations between dam ownership, age, and capacity with the race of the population served, as well as an association between dam ownership and household income band. We conclude with a discussion on the increasing complexity of cyber-physical critical infrastructure and the need for future research which explicitly takes the populations served by this infrastructure into account.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124341332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effects of Availability and Accessibility of Blue-Green Infrastructure on Environmental Justice and Health Equality 蓝绿色基础设施可用性和可及性对环境正义和健康平等的影响
2020 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2020-11-12 DOI: 10.1109/ISTAS50296.2020.9462208
Maryam Rezaei Ghaleh, Marzieh Rezaei Ghaleh
{"title":"Effects of Availability and Accessibility of Blue-Green Infrastructure on Environmental Justice and Health Equality","authors":"Maryam Rezaei Ghaleh, Marzieh Rezaei Ghaleh","doi":"10.1109/ISTAS50296.2020.9462208","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462208","url":null,"abstract":"Rapid urbanization, especially in developing countries, and population growth lead to a wide range of health risks in many cities. Recent researches have also shown a linear relationship between two factors of green spaces and health. Besides, the sustainable development goals (SDGs) emphasize access to safe, green, and public spaces for all people. This paper aims to indicate that accessibility and availability of blue-green infrastructure are more important than other factors in health issues. Our research method is case-study, and therefore, we chose Qazvin City in Iran as a developing city in the Middle East. In recent years, Qazvin has faced with an upward trend in urban development and population growth. Then, to find the relation between the availability and accessibility of BGI and health justice, we analyze the total number of monthly ambulance calls for all six Qazvin districts. We visualize the distribution of the ambulance calls for each district and show the BGI distribution on the city map and calculate the amount of BGI availability and accessibility of each city district by GIS. Then we set the ranking for BGI availability and accessibility and conduct a linear correlation analysis with the total number of ambulance calls and health variables and employ Spearman’s Rho as the correlation measure.Consequently, the results demonstrate a significant relationship between the availability and accessibility of BGI and the number of ambulance calls. In other words, the inhabitants of the districts with a low level of availability and accessibility to BGI suffer from environmental injustice and health inequality. Finally, we conclude that urban planning can help to reduce health inequalities by improving blue-green infrastructure.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130378792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信