2021 IEEE International Symposium on Technology and Society (ISTAS)最新文献

筛选
英文 中文
Risk assessment tools on trial: Lessons learned for “Ethical AI” in the criminal justice system 审判中的风险评估工具:刑事司法系统中“道德人工智能”的经验教训
2021 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2021-10-28 DOI: 10.1109/istas52410.2021.9629143
Neha Chugh
{"title":"Risk assessment tools on trial: Lessons learned for “Ethical AI” in the criminal justice system","authors":"Neha Chugh","doi":"10.1109/istas52410.2021.9629143","DOIUrl":"https://doi.org/10.1109/istas52410.2021.9629143","url":null,"abstract":"In 2018, the Supreme Court decision of Ewert v Canada confirmed that risk assessment tools such as the psychopathy checklists used by Correctional Services of Canada (CSC), failed to account for cultural heritage of the offender, specifically Indigeneity and the impact of colonialism on Canada’s Aboriginal communities. A further review of Canadian case-law post-Ewert reveals that Canadian courts continue their reliance on risk assessment tools despite the critiques from the legal community and from the Supreme Court of Canada. This paper reviews lessons learned from the Canadian experience of Ewert’s challenge of risk assessment tools and to highlight ethical concerns that are being considered in the implementation of artificial intelligence in the criminal justice system.","PeriodicalId":314239,"journal":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125257592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Disinformation and online harms: Understanding the links to private messaging apps in Canada 虚假信息和网络危害:了解加拿大私人信息应用程序的链接
2021 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2021-10-28 DOI: 10.1109/istas52410.2021.9629182
M.J. Masoodi, Sam Andrey
{"title":"Disinformation and online harms: Understanding the links to private messaging apps in Canada","authors":"M.J. Masoodi, Sam Andrey","doi":"10.1109/istas52410.2021.9629182","DOIUrl":"https://doi.org/10.1109/istas52410.2021.9629182","url":null,"abstract":"Amid the COVID-19 pandemic, governments have been facing an increased spread of disinformation on social media by foreign and domestic actors. Indeed, the COVID-19 pandemic has highlighted the online challenges of disinformation facing Western governments and societies, including Canada. However, much of the scholarly work on disinformation has focussed on analyzing the flows of false content during political or electoral processes including how political disinformation can undermine voter autonomy by changing opinions and eventually voting preferences.12 Furthermore, the focus of such works is mostly centred around the role of open social media platforms (e.g., Facebook, Instagram, Twitter, etc.). This presentation on the other hand seeks to counter this dominant trend. Based on findings from original research, supported by the Democratic Institutions Secretariat in Canada’s Privy Council Office, this presentation will delve deeper into our survey of 2,500 Canadians in March 2021, revealing their experiences with disinformation and other online harms on private messaging apps (e.g., WhatsApp, Facebook Messenger, WeChat, etc.) in a post-pandemic context. Indeed, private messaging apps have been described as the next refuge for actors such as members of the far-right and white nationalists, as social media platforms like Facebook face increased political pressure to remove harmful content.3 This presentation will shed light on the types and impacts of mis/disinformation encountered through the private platforms. Nearly half of respondents reported receiving false information at least monthly and those who believe in COVID-19 conspiracy theories were much more likely to regularly receive news through private messages. This presentation will provide a deeper and broader understanding on the spread and evolution of disinformation in Canada, and importantly, it will discuss potential regulatory measures and the need to balance policy with democratic rights and freedoms including privacy and free expression.","PeriodicalId":314239,"journal":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121150328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compounding barriers to fairness in the digital technology ecosystem 增加了数字技术生态系统中公平的障碍
2021 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2021-10-28 DOI: 10.1109/istas52410.2021.9629166
Sandra I. Woolley, Tim Collins, Peter Andras, Allison Gardner, M. Ortolani, J. Pitt
{"title":"Compounding barriers to fairness in the digital technology ecosystem","authors":"Sandra I. Woolley, Tim Collins, Peter Andras, Allison Gardner, M. Ortolani, J. Pitt","doi":"10.1109/istas52410.2021.9629166","DOIUrl":"https://doi.org/10.1109/istas52410.2021.9629166","url":null,"abstract":"A growing sense of unfairness permeates our quasi-digital society. Despite drivers supporting and motivating ethical practice in the digital technology ecosystem, there are compounding barriers to fairness that, at every level, impact technology innovation, delivery and access. Amongst these are barriers and omissions at the earliest stages of technology intentionality and design; systemic inadequacies in sensing systems that deteriorate performance for individuals based on ethnicity, age and physicality; system design, co-requisite and interface decisions that limit access; biases and inequities in datasets and algorithms; and limiting factors in system function and security. Additionally, there are concerns about unethical and illegal practices amongst digital technology providers: for example, in planned obsolescence and anti-competitive behaviors, failings in data practices and security, and in responses to problematic use and behaviors. It is critical that these failings are identified and addressed to better evolve a fairer future digital technology ecosystem. This paper contributes a perspective on technological stewardship and innovation; it identifies the compounding nature of barriers to fairness in the current digital technology ecosystem, and contrasts these with the non-compounding fairness drivers that, in general, establish minimum requirements.","PeriodicalId":314239,"journal":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115616511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Emerging ransomeware threats: An anticipatory ethical anaylsis 新兴的勒索软件威胁:一种预期的伦理分析
2021 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2021-10-28 DOI: 10.1109/istas52410.2021.9629211
Richard Wilson, Ion A. Iftimie
{"title":"Emerging ransomeware threats: An anticipatory ethical anaylsis","authors":"Richard Wilson, Ion A. Iftimie","doi":"10.1109/istas52410.2021.9629211","DOIUrl":"https://doi.org/10.1109/istas52410.2021.9629211","url":null,"abstract":"Ransomware has become a primary security risk to businesses, and it is now the fastest-growing category of cybercrime. Furthermore, ransomware attacks on healthcare, energy and water distribution, and defense contractor organizations have begun to impact both business and national security. Traditional ransomware encrypts files on an infected computer which blocks users’ access until a sum of money or ransom is paid, often via cryptocurrencies like Bitcoin or Ethereum. Businesses and individuals who become victims of ransomware attacks are faced with the expense of paying the ransom, or restoring files from backup if this available, losing files altogether or completely restoring the files. Beginning in late 2019, cybercriminals stepped up their game by deploying new attacks known as “double-extortion” ransomware, within which files are stolen before being encrypted. Even if an organization might be able to recover its data from backups, by stealing the files first before the files are encrypted, the attacker can still profit either by selling any confidential data on the dark web or by further extorting the business and threatening to leak sensitive information unless an even larger ransom is paid. As of 2021, double-extortion ransomware is still in its infancy, but it can be anticipated that possible long-term trends toward even more persistent multiple-extortion tactics, in which stolen data could continue to be used by cybercriminals, terrorists, and rogue nation-states potentially decades in the future will continue. Traditional, passive measures in cybersecurity and business continuity, like firewalls, antivirus software, and frequent backups, are not sufficient to protect organizations from this new type of data theft and extortion enterprise. Government agencies and private corporations alike are beginning to employ active cyber threat hunters and intelligence analysts to detect and neutralize this newest class of persistent threat. This anticipatory ethical analysis will attempt to identify future threats from the development of Multiple-Extortion Ransomware and use this ethical analysis as the basis for developing policy about future ransomware developments.","PeriodicalId":314239,"journal":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114528512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring gaps in California Proposition 54 (2016) 探索加州第54号提案(2016)中的漏洞
2021 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2021-10-28 DOI: 10.1109/istas52410.2021.9629129
S. Nathani, Ryan Jenkins, Foaad Khosmood, Christine Robertson
{"title":"Exploring gaps in California Proposition 54 (2016)","authors":"S. Nathani, Ryan Jenkins, Foaad Khosmood, Christine Robertson","doi":"10.1109/istas52410.2021.9629129","DOIUrl":"https://doi.org/10.1109/istas52410.2021.9629129","url":null,"abstract":"California Proposition 54, 2016 (Prop 54) attempted to address gaps in government transparency at the state level by requiring legislative proceedings to be published on the internet, but failed to consider the traditional barriers that limit citizen participation in policy. This study aims to understand where Prop 54 falls short in regards to improving government transparency, evaluating the traditional barriers that prevent citizens from participating in government, identifying the improvements that should be made to increase the impact of Prop 54, and proposing ways artificial intelligence can help with these improvements. Prop 54 makes an overwhelming amount of information to be made available online, an amount that is not searchable by people. The data includes thousands of recordings of legislative sessions which are over an hour on average, but lack transcripts, summaries, or even a descriptive title. In addition, a barrier which prevents everyday people from participating in policy that remains is that most citizens lack the ability to comprehend sophisticated legal terminology presented in the released data. The research method used in this paper is a literature review, and this paper proposes addressing these challenges by implementing artificial intelligence-based solutions with natural language processing and computer vision. These tools can be used to create high-quality, searchable transcripts and generate simplified summaries of legislative proceedings, addressing both of the previously mentioned problems.","PeriodicalId":314239,"journal":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129615310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The importance of grant funding for growing engagement in ethical engineering education 资助工程伦理教育的重要性
2021 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2021-10-28 DOI: 10.1109/istas52410.2021.9629199
Jason Lajoie, Jin Sol Kim, Heather A. Love
{"title":"The importance of grant funding for growing engagement in ethical engineering education","authors":"Jason Lajoie, Jin Sol Kim, Heather A. Love","doi":"10.1109/istas52410.2021.9629199","DOIUrl":"https://doi.org/10.1109/istas52410.2021.9629199","url":null,"abstract":"Since grant funding agencies influence the scope of academic research, they are ideally suited to help propel research that advances ethical inquiry and ethical instruction in engineering. In this short paper we draw from our ongoing Knowledge Synthesis research funded by the Social Sciences and Humanities Research Council (SSHRC) to highlight ways that grant agencies and academic institutions can more effectively provide resources that empower faculty to engage with engineering ethics, particularly macro-ethical concerns related to the social, cultural, and environmental impacts of technological innovation.","PeriodicalId":314239,"journal":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129767251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building trust for data sourcing with the disabled community to build robust AI systems 与残疾人社区建立数据来源的信任,以建立强大的人工智能系统
2021 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2021-10-28 DOI: 10.1109/istas52410.2021.9629180
Monica Tsang
{"title":"Building trust for data sourcing with the disabled community to build robust AI systems","authors":"Monica Tsang","doi":"10.1109/istas52410.2021.9629180","DOIUrl":"https://doi.org/10.1109/istas52410.2021.9629180","url":null,"abstract":"This research explores how to build trust between the disabled community and machine learning and AI developers. This is to encourage people with disabilities to contribute their data to build robust models that cater to a greater population. A conflicting reality exists where people with disabilities want to be accommodated in machine learning and AI systems, but they are afraid of sharing their disability status and data with AI developers. The disabled community is subjected to unfair treatment in their daily lives. Many individuals conceal their disability status to avoid being given inferior service or costly biased outcomes in healthcare, insurance premiums, and employment opportunities. When people with disabilities are not included in the data collection process, the results of the machine learning and AI systems will not cater to the needs and preferences of these minority groups. This research will examine the circumstances and privacy protection strategies will people with disabilities garner trust in contributing their data to develop inclusive AI technology solutions. The research will share the opinions of individuals from the communities with sensory disabilities and mobility issues.","PeriodicalId":314239,"journal":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128972820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud computing data breaches: A review of U.S. regulation and data breach notification literature 云计算数据泄露:美国法规和数据泄露通知文献综述
2021 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2021-10-28 DOI: 10.1109/istas52410.2021.9629173
David Kolevski, Katina Michael, Roba Abbas, M. Freeman
{"title":"Cloud computing data breaches: A review of U.S. regulation and data breach notification literature","authors":"David Kolevski, Katina Michael, Roba Abbas, M. Freeman","doi":"10.1109/istas52410.2021.9629173","DOIUrl":"https://doi.org/10.1109/istas52410.2021.9629173","url":null,"abstract":"Cloud computing services have enjoyed explosive growth over the last decade. Users are typically businesses and government agencies who are able to scale their storage and processing requirements, and choose from pre-defined services (e.g. specific software-as-a-service applications). But with this outsourcing has also come the potential for data breaches targeted at the end-user, typically consumers (e.g. who purchase goods at an online retail store), and citizens (e.g. who transact information for their social security needs). This paper briefly introduces U.S.-based cloud computing regulation, including the U.S. Health Insurance Portability and Accountability Act (HIPPA), the Gramm Leach Bliley Act (GLBA), and the U.S. Stored Communications Act (SCA). We present how data breach notification (DBN) works in the U.S. by examining three mini-case examples: the 2011 Sony PlayStation Network data breach, the 2015 Anthem Healthcare data breach, and the 2017 Equifax data breach. The findings of the paper show that there is a systemic failure to learn from past data breaches, and that data breaches not only affect business and government clients of cloud computing services but their respective end-user customer base. Finally, the level of sensitivity of data breaches is increasing, from cloud computing hacks on video game platforms, to the targeting of more lucrative network and computer crime abuses aiming at invasive private health and financial data.","PeriodicalId":314239,"journal":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125591725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Technology at the border: Anxiety of progress and the ethics of connection in Sleep Dealer 技术在边界:焦虑的进步和连接的道德在睡眠经销商
2021 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2021-10-28 DOI: 10.1109/istas52410.2021.9629119
P. Brescia
{"title":"Technology at the border: Anxiety of progress and the ethics of connection in Sleep Dealer","authors":"P. Brescia","doi":"10.1109/istas52410.2021.9629119","DOIUrl":"https://doi.org/10.1109/istas52410.2021.9629119","url":null,"abstract":"The dystopian movie Sleep Dealer (2008, Dir. Alex Rivera) ponders upon the effects of technology in the social fabric of Mexican and US societies. This topic, frequent in science fiction movies, is addressed in Sleep Dealer in particular ways, both in the choice of space (the border between Mexico and the United States) and main theme (labor relations). I will analyze the movie’s speculation of a possible future by focusing on four basic “conflict/contact zones”. The multiple connections in the movie (with technology, with alternative worlds, with the global economy, with other beings) may be viewed as “border crossings” and point to what in other works I have termed an “anxiety of progress” that questions pre-conceived notions of national and personal identity and the very idea of the human.","PeriodicalId":314239,"journal":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125289835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Welcome Message from the President of IEEE SSIT IEEE SSIT主席致欢迎辞
2021 IEEE International Symposium on Technology and Society (ISTAS) Pub Date : 2021-10-28 DOI: 10.1109/istas52410.2021.9629157
{"title":"A Welcome Message from the President of IEEE SSIT","authors":"","doi":"10.1109/istas52410.2021.9629157","DOIUrl":"https://doi.org/10.1109/istas52410.2021.9629157","url":null,"abstract":"","PeriodicalId":314239,"journal":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116530567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信