{"title":"Only Location: A Systematic Literature Review on Context Marketing","authors":"Anna-Lena Christina Krusch, Perole Uphaus, H. Rau","doi":"10.1109/ISTAS50296.2020.9462242","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462242","url":null,"abstract":"In today’s information era, the ability to address the needs of potential customers at a moment when they are particularly receptive to the information provided becomes increasingly important. Modern mobile devices allow to collect precise data about the users’ context, thus enhancing possibilities to better estimate, proof and react to current situations in real time. Given that, ‘context marketing’ nowadays is an approach frequently discussed in literature. This contribution aims to systematize existing publications on the subject of context marketing, in order to build a basis for future research and to uncover potential gaps and contradictions in previous research. Methodologically, the two scientific databases “Scopus” and “Web of Science” were searched for context marketing related contributions. The evaluation made use of a mixed methods approach including a qualitative content analysis, and subsequently further quantitative evaluations. The findings reveal the majority of publications to focus on the user’s location as the only context factor, resulting in a predominant focus on location-based advertising related research.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"29 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125794651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Arbiter: Improved Smart City Operations through Decentralized Autonomous Organization","authors":"Francis Mendoza, H. Behrens","doi":"10.1109/ISTAS50296.2020.9462219","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462219","url":null,"abstract":"Smart cities have emerged as one of the most promising applications of cyber-physical systems (CPS), carrying the potential to serve the various interests of the public and private sectors at large. However, contemporary smart city infrastructure commonly uses heavily-centralized network architectures, reducing failure resilience and application flexibility. This centralization also imposes high barriers to entry for public access, limiting usage and oversight opportunities. To address these limitations, we describe Arbiter, a novel fog- and edge-based communication architecture based on the concept of a Decentralized Autonomous Organization (DAO). Arbiter aims to improve the socioeconomic equity of the local citizenry by (1) acting as a management layer for citywide CPS assets, (2) providing a compliance layer for managing human capital, and (3) offering a data protection layer to ensure that citizens retain full control of their personal data. We then analyze in detail the technical, socioeconomic, and ethical implications of Arbiter, and contextualize its role in the modern smart city.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130779711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defending Deep Learning Based Anomaly Detection Systems Against White-Box Adversarial Examples and Backdoor Attacks","authors":"Khaled Alrawashdeh, Stephen Goldsmith","doi":"10.1109/ISTAS50296.2020.9462227","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462227","url":null,"abstract":"Deep Neural Network (DNN) has witnessed rapid progress and significant successes in the recent years. Wide range of applications depends on the high performance of deep learning to solve real-life challenges. Deep learning is being applied in many safety-critical environments. However, deep neural networks have been recently found vulnerable to adversarial examples and backdoor attacks. Stealthy adversarial examples and backdoor attacks can easily fool deep neural networks to generate the wrong results. The risk of adversarial examples attacks that target deep learning models impedes the wide deployment of deep neural networks in safety-critical environments. In this work we propose a defensive technique for deep learning by combining activation function and neurons pruning to reduce the effects of adversarial examples and backdoor attacks. We evaluate the efficacy of the method on an anomaly detection application using Deep Belief Network (DBN) and Coupled Generative Adversarial Network (CoGAN). The method reduces the loss of accuracy from the attacks from an average 10% to 2% using DBN and from an average 14% to 2% using CoGAN. We evaluate the method using two benchmark datasets: NSL-KDD and ransomware.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121986916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Making Publics Visible: Utilizing STS Knowledge for Public Identification and Engagement","authors":"A. Y. Patrick","doi":"10.1109/ISTAS50296.2020.9462182","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462182","url":null,"abstract":"Public Interest Technology (PIT) is an emerging field focused upon ensuring that innovative technologies are designed, distributed, and mediated for the well-being of the public. PIT seeks to educate technologists, engineers, and researchers to be cognizant of the public impact of their work and to train policymakers to equitably mediate the scope and reach of technology. However, the reach and impact of PIT work can be further enhanced through theoretical and pragmatic Science, Technology, and Society (STS) knowledge. For the past four years, I have worked on a large-scale change initiative in an electrical and computer engineering (ECE) department. An in-depth qualitative study of the department revealed several challenges within the department regarding identity, sense of belonging, invisible work, and career trajectory. As a scholar-practitioner, I employed STS theory and pragmatic knowledge to create three critically crafted interventions to address these challenges. First, STS knowledge was utilized to investigate the challenges within the department and understand how these challenges affected the multiple stakeholders and the culture of the ECE department. Second, pragmatic STS knowledge was utilized to create projects to shift the boundaries within the engineering department that limited the professional, academic, and personal opportunities of the engineering student. The purpose of this paper is to illustrate how my application of STS theoretical and pragmatic scholarship to address the culture of an electrical and computer engineering department can contribute to the field of PIT.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116500451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Can we use non-transparent artificial intelligence technologies for legal purposes?","authors":"G. Adamson","doi":"10.1109/ISTAS50296.2020.9462204","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462204","url":null,"abstract":"Artificial intelligence (AI) is a technology receiving significant attention from lawmakers, courts, and regulators. An aspect of this attention is an interest in understanding how AI works when applied to a process of law, or to a regulated application of technology such as driverless vehicles. One approach is to seek to understand what the AI technology does, with goals including “transparency” and “explainability”. This paper considers these concepts from a law and technology perspective. Research in this area commonly examines the challenge of “black box” technologies, particularly the approach of “post hoc explainability”. This paper points out that the post hoc approach provides an inference, rather than an actual description of AI behavior. It considers circumstances in which the post hoc approach may be satisfactory, and those involving arbitrary power in which it should not be used, as inconsistent with the principle of regularity in the rule of law. It recommends that the output of non-transparent AI technologies should necessarily be viewed critically. It concludes that human attention is required in determining whether or not to accept AI technology explanations.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128533879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
David Kolevski, K. Michael, Roba Abbas, M. Freeman
{"title":"Stakeholders in the cloud computing value-chain : A socio-technical review of data breach literature","authors":"David Kolevski, K. Michael, Roba Abbas, M. Freeman","doi":"10.1109/ISTAS50296.2020.9462169","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462169","url":null,"abstract":"This paper is about stakeholders in the cloud computing value-chain. Early cloud computing literature focused on the technical aspect of the technology and viewed the provider and customer as essential value-chain stakeholders. The more users that use cloud services, the potential for data breaches increases. The review of the literature was carried out using a social-technical approach. Socio-technical theory encapsulates the social, technical and environmental dimensions of a system. The outcomes of the search indicated that there are two pertinent stakeholder types: operational and non-operational. Operational stakeholders include cloud providers, customers, enablers, resellers and third-party providers. Non-operational stakeholders include regulators, legislators, courts, non-government organisations, law enforcement, industry-standard bodies and end-users. The end-users are critically important in the cloud value-chain in that they rely on online services for everyday activities and have their data compromised. The cloud value-chain presents that cloud services encapsulate more than just technology services. The paper considers the complex stakeholder relationships and data breach issues, indicating the need for a better socio-technical response from the stakeholders within the value-chain.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132006843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COVIDFREE App: The User-Enabling Contact Prevention Application","authors":"Edgard Musafiri Mimo, T. McDaniel","doi":"10.1109/ISTAS50296.2020.9462186","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462186","url":null,"abstract":"Governments all over the world are considering employing mobile contact tracing applications to automatically manage, trace, and investigate recent interactions of newly tested COVID-19 infected individuals. The prospective use of such applications has produced several debates surrounding confidentiality, security, data supervision, closeness approximation algorithms, and cyber-attack susceptibility. This paper discusses these concerns in the context of a novel smartphone application architecture, proposed here, that gives users more control and privacy during contact tracing. The proposed application is termed COVIDFREE App, which is aimed at enhancing users’ situational awareness through communication of safe and unsafe locations. An overview of the app’s architectural design and functionality are presented, including a newly developed Overall Risk Density Safety Factor calculation inspired by COVID-19 density risks and factors of users based on health requirements and several customizable user-specific scenarios. Finally, the paper outlines the benefit to funding and developing contact tracing apps, such as the COVIDFRE App, and discusses advantages of such applications including citizen awareness, relief, and preparedness.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117085332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Taiwan’s Ability to Reduce the Transmission of COVID-19: A Success Story","authors":"H. Fan","doi":"10.1109/ISTAS50296.2020.9462226","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462226","url":null,"abstract":"Taiwan is known for its effective responses to COVID-19, with only 799 confirmed cases by the end of 2020. Based on the previous research, this article identifies three major technical approaches used in Taiwan to prevent the community spread of COVID-19: (1) Digital fence and entry quarantine system to track close contacts and force 14 days of in-home quarantine; (2) Evolving face mask distribution policy and system to ensure fair allocation of the limited face mask resources; and (3) Open-source software co-developed by the government and tech community to share real-time COVID-19 related information and conduct location history based contact tracing. The combat against COVID-19 in Taiwan is a success in digital governance, with great synergy between the government and every citizen.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114396233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing cyber-physical threats to Pennsylvania dams through a lens of vulnerability","authors":"Lauren Dennis, S. Rajtmajer, C. Grady","doi":"10.1109/ISTAS50296.2020.9756013","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9756013","url":null,"abstract":"Protecting critical infrastructure, such as water supply systems and dams, remains a top priority across multiple administrations in the United States. We study the ethical and environmental justice implications of potential disruptions to 29 dams across the State of Pennsylvania that serve as a water supply. Using census data, we investigate the communities surrounding these dams to look for relationships between community demographics and dam characteristics that may contribute to risk. We highlight the role of dam age, dam ownership, dam capacity, and dam downstream hazard potential in this analysis. Our results reveal associations between dam ownership, age, and capacity with the race of the population served, as well as an association between dam ownership and household income band. We conclude with a discussion on the increasing complexity of cyber-physical critical infrastructure and the need for future research which explicitly takes the populations served by this infrastructure into account.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124341332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effects of Availability and Accessibility of Blue-Green Infrastructure on Environmental Justice and Health Equality","authors":"Maryam Rezaei Ghaleh, Marzieh Rezaei Ghaleh","doi":"10.1109/ISTAS50296.2020.9462208","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462208","url":null,"abstract":"Rapid urbanization, especially in developing countries, and population growth lead to a wide range of health risks in many cities. Recent researches have also shown a linear relationship between two factors of green spaces and health. Besides, the sustainable development goals (SDGs) emphasize access to safe, green, and public spaces for all people. This paper aims to indicate that accessibility and availability of blue-green infrastructure are more important than other factors in health issues. Our research method is case-study, and therefore, we chose Qazvin City in Iran as a developing city in the Middle East. In recent years, Qazvin has faced with an upward trend in urban development and population growth. Then, to find the relation between the availability and accessibility of BGI and health justice, we analyze the total number of monthly ambulance calls for all six Qazvin districts. We visualize the distribution of the ambulance calls for each district and show the BGI distribution on the city map and calculate the amount of BGI availability and accessibility of each city district by GIS. Then we set the ranking for BGI availability and accessibility and conduct a linear correlation analysis with the total number of ambulance calls and health variables and employ Spearman’s Rho as the correlation measure.Consequently, the results demonstrate a significant relationship between the availability and accessibility of BGI and the number of ambulance calls. In other words, the inhabitants of the districts with a low level of availability and accessibility to BGI suffer from environmental injustice and health inequality. Finally, we conclude that urban planning can help to reduce health inequalities by improving blue-green infrastructure.","PeriodicalId":196560,"journal":{"name":"2020 IEEE International Symposium on Technology and Society (ISTAS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130378792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}