{"title":"How Interpretable Is “Interpretable” Machine Learning?","authors":"H. Siu, Kevin J. Leahy, Makai Mann","doi":"10.21428/2c646de5.9e0237cb","DOIUrl":"https://doi.org/10.21428/2c646de5.9e0237cb","url":null,"abstract":"","PeriodicalId":244016,"journal":{"name":"MIT Case Studies in Social and Ethical Responsibilities of Computing","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140426555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrals and Integrity: Generative AI Tries to Learn Cosmology","authors":"Bruce A. Bassett","doi":"10.21428/2c646de5.20c92601","DOIUrl":"https://doi.org/10.21428/2c646de5.20c92601","url":null,"abstract":"","PeriodicalId":244016,"journal":{"name":"MIT Case Studies in Social and Ethical Responsibilities of Computing","volume":"51 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140427624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Cloud Is Material: On the Environmental Impacts of Computation and Data Storage","authors":"Steven Gonzalez Monserrate","doi":"10.21428/2c646de5.031d4553","DOIUrl":"https://doi.org/10.21428/2c646de5.031d4553","url":null,"abstract":"In the age of machine learning, cryptocurrency mining, and seemingly infinite data storage capacity enabled by cloud computing, the environmental costs of ubiquitous computing in modern life are obscured by the sheer complexity of infrastructures and supply chains involved in even the simplest of digital transactions. How does computation contribute to the warming of the planet? As information technology (IT) capacity demands continue to trend upward, what are some of the ecological obstacles that must be overcome to accommodate an ever-expanding, carbon-hungry Cloud? How do these material impacts play out in everyday life, behind the scenes, where servers, fiber optic cables, and technicians facilitate cloud services? This case study draws on firsthand ethnographic research in data centers—sprawling libraries of computer servers that facilitate everything from email to commerce—to identify some of the far-reaching and tangled environmental impacts of computation and data-storage infrastructures. It surveys a range of empirical accounts of server technicians to illustrate on-the-ground examples of material and ecological factors that permeate everyday life in the Cloud. These examples include air conditioning and thermal management, water cycling, and the disposal of e-waste. By attending to the culture of workplace practice and the behaviors and training of technicians in data centers, this case study reveals that the Cloud is not fully automated, nor is it hyperrational; emotion, instinct, and human judgment are enlisted to keep servers running. This case study closes with a speculative vignette that scales up from various local impacts to a planetary framework, sketching some of the particular ways that computation contributes to climate change and the Anthropocene.","PeriodicalId":244016,"journal":{"name":"MIT Case Studies in Social and Ethical Responsibilities of Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126866288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Awtar, Hanz Richter, Mo Rastgaar, Richard Bearee, Arts, Metiers Chuangfeng, Georgia Wang, Tech, Rufus T. Oldenburger Medalist, Wayne Book, Dawn M. Tilbury Professor, Regina C. McNeil Department, Benjamin Y.H. Liu, Nader Jalili Professor, Reza Moheimani, Randall T. Fawcett, Abhishek Pandala, Jeeseop Kim, Akbari Hamed, Investigator Award. Zhao, ScD Vladimir V. Vantsevich PhD, Asme Fellow, PhD Dilmurat Azimov, PhD Marcello Canova, PhD Giuseppe Carbone, PhD Marco Ceccarelli, PhD Wen-Hua Chen, PhD Raghvendra V. Cowlagi, ScD Lyubomyr Demkiv, MS Benjamin Duprey, PhD David J. Gorsich, PhD Jeremy P. Gray, PhD Jeffrey W. Herrmann, PhD Paramsothy Jayakumar
{"title":"Winter 2022","authors":"S. Awtar, Hanz Richter, Mo Rastgaar, Richard Bearee, Arts, Metiers Chuangfeng, Georgia Wang, Tech, Rufus T. Oldenburger Medalist, Wayne Book, Dawn M. Tilbury Professor, Regina C. McNeil Department, Benjamin Y.H. Liu, Nader Jalili Professor, Reza Moheimani, Randall T. Fawcett, Abhishek Pandala, Jeeseop Kim, Akbari Hamed, Investigator Award. Zhao, ScD Vladimir V. Vantsevich PhD, Asme Fellow, PhD Dilmurat Azimov, PhD Marcello Canova, PhD Giuseppe Carbone, PhD Marco Ceccarelli, PhD Wen-Hua Chen, PhD Raghvendra V. Cowlagi, ScD Lyubomyr Demkiv, MS Benjamin Duprey, PhD David J. Gorsich, PhD Jeremy P. Gray, PhD Jeffrey W. Herrmann, PhD Paramsothy Jayakumar","doi":"10.21428/2c646de5.b2d8aadb","DOIUrl":"https://doi.org/10.21428/2c646de5.b2d8aadb","url":null,"abstract":"CCTA 2023, the 7 th IEEE Conference on Control Technology and Applications, will be held Wednesday through Friday, August 16-18, in Bridgetown, Barbados. CCTA 2023 will be an in person conference. CCTA 2023 is one of the main conferences sponsored by the IEEE Control Systems Society. The technical program will feature the presentation of contributed and invited papers, as well as tutorial sessions and workshops, focusing on technological advances and applications of control engineering. CCTA 2023 will spearhead a new initiative that emphasizes career networking and special sessions focused on industry relevant control problems. It will also provide an avenue for enhanced interactions between industry, government and academic researchers. With easy accessibility, including from Europe and the Americas, and industry sponsored sessions, significant participation from industry is anticipated. The conference includes all aspects of control engineering for practical control systems, from analysis and design, through simulation and hardware. CCTA 2023 will feature applications of control technology for robotic, mechatronic, biomechanical, aerospace, power and energy systems, mobility, smart cities, control of networks, AI/ML developments in control, and many others. Plenary lectures will be delivered on each of the three days as part of the conference program. A series of tutorial workshops will be presented on Tuesday preceding the conference. Authors of selected articles presented at CCTA 2023 will be invited to prepare an extended version of their work to be considered for publication in a Special Issue of IEEE Transactions on Control Systems Technology (TCST). Participants will have the opportunity to present their papers that were published in IEEE TCST in 2022-2023. Call for Contributed Papers: Papers are invited in the form of regular manuscripts. Papers must conform to the submission policy, which will be provided on the website, requiring that all manuscripts be in 2-column format and meet strict page limits. Call","PeriodicalId":244016,"journal":{"name":"MIT Case Studies in Social and Ethical Responsibilities of Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128220942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algorithmic Redistricting and Black Representation in US Elections","authors":"Zachary Schutzman","doi":"10.21428/2c646de5.9f6d1cb5","DOIUrl":"https://doi.org/10.21428/2c646de5.9f6d1cb5","url":null,"abstract":"","PeriodicalId":244016,"journal":{"name":"MIT Case Studies in Social and Ethical Responsibilities of Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131804782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Puzzle of the Missing Robots","authors":"S. Berger, Benjamin F. Armstrong","doi":"10.21428/2c646de5.9461c9fb","DOIUrl":"https://doi.org/10.21428/2c646de5.9461c9fb","url":null,"abstract":"","PeriodicalId":244016,"journal":{"name":"MIT Case Studies in Social and Ethical Responsibilities of Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121863115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protections for Human Subjects in Research: Old Models, New Needs?","authors":"Laura Stark","doi":"10.21428/2c646de5.3dc7ef4d","DOIUrl":"https://doi.org/10.21428/2c646de5.3dc7ef4d","url":null,"abstract":"Research within the United States that involves collecting and analyzing certain types of data from individual people has been subject to regulation since 1974. The rules governing research with so-called “human subjects” emerged out of specific research practices in the biomedical and social sciences within the government, as well as in response to revelations of egregious abuses of participants. Among other provisions, the federal regulations require prior review of certain proposed research projects by an institutional review board, or IRB. Many of the features of the federal regulations, including requirements for securing “informed consent” from research participants, focus on protections at the point of data collection. More recent research projects in computing and the data sciences, which rely upon large volumes of human-sourced data and information, have often collected their data via third-party platforms rather than via direct interaction with individual human subjects. As a result, such projects have rarely been subject to formal IRB review. Given the potential for harm to individuals and groups that have been identified for some computing projects, such as racial discrimination and loss of privacy, is it time to revisit or expand the existing human-subjects regulations?","PeriodicalId":244016,"journal":{"name":"MIT Case Studies in Social and Ethical Responsibilities of Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129368614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differential Privacy and the 2020 US Census","authors":"S. Garfinkel","doi":"10.21428/2c646de5.7ec6ab93","DOIUrl":"https://doi.org/10.21428/2c646de5.7ec6ab93","url":null,"abstract":"","PeriodicalId":244016,"journal":{"name":"MIT Case Studies in Social and Ethical Responsibilities of Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130379050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding Potential Sources of Harm throughout the Machine Learning Life Cycle","authors":"Harini Suresh, J. Guttag","doi":"10.21428/2c646de5.c16a07bb","DOIUrl":"https://doi.org/10.21428/2c646de5.c16a07bb","url":null,"abstract":"As machine learning (ML) increasingly affects people and society, awareness of its potential unwanted consequences has also grown. To anticipate, prevent, and mitigate undesirable downstream consequences, it is critical that we understand when and how harm might be introduced throughout the ML life cycle. In this case study, we provide a framework that identifies seven distinct potential sources of downstream harm in machine learning, spanning data collection, development, and deployment. We describe how these issues arise, how they are relevant to particular applications, and how they motivate different mitigations.","PeriodicalId":244016,"journal":{"name":"MIT Case Studies in Social and Ethical Responsibilities of Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124884815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hacking Technology, Hacking Communities: Codes of Conduct and Community Standards in Open Source","authors":"Christina Dunbar-Hester","doi":"10.21428/2c646de5.07bc6308","DOIUrl":"https://doi.org/10.21428/2c646de5.07bc6308","url":null,"abstract":"In recent years, the free/libre and open source software (FLOSS) and hacking communities have engaged in lively debates about diversity and inclusion in their ranks. These conversations gained momentum when research showed that women’s rate of participation in FLOSS was shockingly low, even compared to academic computer science and industry. Participants questioned whether the commitment to “openness” in coding and technical activities extended to the communities themselves, and proposed changes to how their communities were governed. One change many communities instituted was to introduce codes of conduct, intended to formalize community standards for how people should behave when they collaborate. This case presents a 2015 example of an introduction of a code of conduct and the discussion surrounding it as a way to surface some of the tacit patterns in FLOSS communities. Communities continue to refine their values and how they wish to guide participation in coding and hacking.","PeriodicalId":244016,"journal":{"name":"MIT Case Studies in Social and Ethical Responsibilities of Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132863902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}