{"title":"The Invisible Arms Race: Digital Trends in Illicit Goods Trafficking and AI-Enabled Responses","authors":"Ioannis Mademlis;Marina Mancuso;Caterina Paternoster;Spyridon Evangelatos;Emma Finlay;Joshua Hughes;Panagiotis Radoglou-Grammatikis;Panagiotis Sarigiannidis;Georgios Stavropoulos;Konstantinos Votis;Georgios Th. Papadopoulos","doi":"10.1109/TTS.2024.3514683","DOIUrl":"https://doi.org/10.1109/TTS.2024.3514683","url":null,"abstract":"Recent trends in the modus operandi of technologically-aware criminal groups engaged in illicit goods trafficking (e.g., firearms, drugs, cultural artifacts, etc.) have given rise to significant security challenges. The use of cryptocurrency-based payments, 3D printing, social media and/or the Dark Web by organized crime leads to transactions beyond the reach of authorities, thus opening up new business opportunities to criminal actors at the expense of the greater societal good and the rule of law. As a result, a lot of scientific effort has been expended on handling these challenges, with Artificial Intelligence (AI) at the forefront of this quest, mostly machine learning and data mining methods that can automate large-scale information analysis. Deep Neural Networks (DNNs) and graph analytics have been employed to automatically monitor and analyze the digital activities of large criminal networks in a data-driven manner. However, such practices unavoidably give rise to ethical and legal issues, which need to be properly considered and addressed. This paper is the first to explore these aspects jointly, without focusing on a particular angle or type of illicit goods trafficking. It emphasizes how advances in AI both allow the authorities to unravel technologically-aware trafficking networks and provide countermeasures against any potential violations of citizens’ rights in the name of security.","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"6 2","pages":"181-199"},"PeriodicalIF":0.0,"publicationDate":"2024-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utilizing Emotional Intelligence and Artificial Intelligence to Improve Safety Behavior in Smart Port Operations","authors":"Szu-Yu Kuo;Liang-Bi Chen","doi":"10.1109/TTS.2024.3513775","DOIUrl":"https://doi.org/10.1109/TTS.2024.3513775","url":null,"abstract":"Due to the continuous development of globalization and the new era of the shipping industry, the smartening of port operations has become an urgent need. However, the question of whether smart ports impact the safety of port operations is worth exploring. This study examines the relationships among emotional intelligence, artificial intelligence, and safety behavior in the context of container terminal operations. This study drew upon the levels of control framework and conservation of resources theory to examine survey data collected from 281 operators working at Kaohsiung port. The survey responses were evaluated using confirmatory factor analysis and a hierarchical regression model. The findings indicate that emotional and artificial intelligence significantly impact safety behavior. Furthermore, interactive self-emotion appraisal and emotion regulation positively moderate safety compliance. This study offers novel insights pertaining to terminal operations and discusses ways of employing artificial intelligence to facilitate safety operations at container terminals.","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"6 3","pages":"283-294"},"PeriodicalIF":0.0,"publicationDate":"2024-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144657484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
John Twomey;Didier Ching;Matthew Peter Aylett;Michael Quayle;Conor Linehan;Gillian Murphy
{"title":"What Is So Deep About Deepfakes? A Multi-Disciplinary Thematic Analysis of Academic Narratives About Deepfake Technology","authors":"John Twomey;Didier Ching;Matthew Peter Aylett;Michael Quayle;Conor Linehan;Gillian Murphy","doi":"10.1109/TTS.2024.3493465","DOIUrl":"https://doi.org/10.1109/TTS.2024.3493465","url":null,"abstract":"Deepfakes are a form of synthetic media that uses deep-learning technology to create fake images, video, and audio. The emergence of this technology has inspired much commentary and speculation from academics across a range of disciplines, who have contributed expert opinions regarding the implications of deepfake proliferation on fields such as law, politics, and entertainment. A systematic scoping review was carried out to identify, assemble, and critically analyze those academic narratives. The aim is to build on and critique previous attempts at defining the technology and categorizing the harms and benefits of deepfake technology. A range of databases were searched for relevant articles from 2017 to 2023, resulting in a large multi-disciplinary dataset of 102 papers, 181,659 words long, which were analyzed qualitatively through thematic analysis. Implications for future research include questioning the lack of research evidence for the supposed positives of deepfakes, recognizing the role that identity plays in deepfake technology, challenging the perceived accessibility/ believability of deepfakes, and proposing a more nuanced approach to the dichotomous “positive and negatives” of deepfakes. Furthermore, we show how definitional issues around what a deepfake is versus other forms of fake media feeds confusion around the novelty and impacts of deepfakes.","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"6 1","pages":"64-79"},"PeriodicalIF":0.0,"publicationDate":"2024-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10756226","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143521369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Intelligent Sociotechnical Systems (iSTS) Framework: Enabling a Hierarchical Human-Centered AI (hHCAI) Approach","authors":"Wei Xu;Zaifeng Gao","doi":"10.1109/TTS.2024.3486254","DOIUrl":"https://doi.org/10.1109/TTS.2024.3486254","url":null,"abstract":"While artificial intelligence (AI) offers significant benefits, it also has negatively impacted humans and society. A human-centered AI (HCAI) approach has been proposed to address these issues. However, current HCAI practices have shown limited contributions due to a lack of sociotechnical thinking. To overcome these challenges, we conducted a literature review and comparative analysis of sociotechnical characteristics with respect to AI. Then, we propose updated sociotechnical systems (STS) design principles. Based on these findings, this paper introduces an intelligent sociotechnical systems (iSTS) framework to extend traditional STS theory and meet the demands with respect to AI. The iSTS framework emphasizes human-centered joint optimization across individual, organizational, ecosystem, and societal levels. The paper further integrates iSTS with current HCAI practices, proposing a hierarchical HCAI (hHCAI) approach. This hHCAI approach offers a structured approach to address challenges in HCAI practices from a broader sociotechnical perspective. Finally, we provide recommendations for future iSTS and hHCAI work.","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"6 1","pages":"31-46"},"PeriodicalIF":0.0,"publicationDate":"2024-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143521566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stephen L. Dorton;Glenn J. Lematta;Kelly J. Neville
{"title":"The Tough Sell of Resilience Engineering","authors":"Stephen L. Dorton;Glenn J. Lematta;Kelly J. Neville","doi":"10.1109/TTS.2024.3484176","DOIUrl":"https://doi.org/10.1109/TTS.2024.3484176","url":null,"abstract":"We provide an argument for why current Resilience Engineering (RE) tools are unlikely to see widespread adoption, and recommendations for making more adoptable RE tools. Resilience engineering continuously grows in popularity, and various RE tools have existed for years; however, we have found that convincing technology development teams to use RE tools is a “tough sell” for a variety of reasons. We synthesized insights and lessons learned from interacting with numerous technology development teams and the scholarly literature on RE. We then analyzed a set of RE tools through the lens of these insights, and we developed a cohesive and analysis-driven argument for why RE tools are a tough sell, and, more importantly, we developed recommendations to improve future tools. We found that challenges for adoption of current RE tools by technology development teams include RE tools that 1) require too great a level of effort, 2) have unobvious value, 3) require the technology to already exist, 4) have a scope that exceeds agency of technology developers, and 5) do not readily generate relevant systems engineering artifacts. Different underlying factors shape or constrain the solution space; however, there are several recommendations for developing RE tools that are more likely to achieve widespread adoption by technology developers. This research is directly applicable to RE practitioners seeking to have greater engagement with technology development teams. Further, this work is likely generalizable to develop any kind of participatory tools for human-centered design.","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"6 1","pages":"47-53"},"PeriodicalIF":0.0,"publicationDate":"2024-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143521364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elma Hajric;Farah Najar Arevalo;Leonard Bruce;Fritz Antony Smith;Katina Michael
{"title":"Facial Emotion Recognition in the Future of Work: Social Implications and Policy Recommendations","authors":"Elma Hajric;Farah Najar Arevalo;Leonard Bruce;Fritz Antony Smith;Katina Michael","doi":"10.1109/TTS.2024.3477512","DOIUrl":"https://doi.org/10.1109/TTS.2024.3477512","url":null,"abstract":"Facial biometric systems potentially allow for the overt and covert detection of a person for a range of use case scenarios. This article considers a human resource management (HRM) workplace scenario where employees are monitored through cameras on personal electronic devices for the purposes of facial emotion recognition. The applications described pertain broadly to the “future of work” context. The article considers how employers, would use employee facial emotion data for data-driven decision-making in, for example, the construction and optimization of virtual teams, appropriateness for promotion to leadership positions, and fitness-to-task in mission critical work. Building on the outcomes of a socio-technical study, the initial component of which was an FER prototype, this paper considers the social implications and policy recommendations of the deployment of the technical system. Findings indicate that coded biases in determinations of FER include possible discrimination against women, racial minorities, undocumented immigrants and refugees, and people with visible and invisible disabilities.","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"6 3","pages":"295-304"},"PeriodicalIF":0.0,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144657423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"2024 Index IEEE Transactions on Technology and Society Vol. 5","authors":"","doi":"10.1109/TTS.2024.3482628","DOIUrl":"https://doi.org/10.1109/TTS.2024.3482628","url":null,"abstract":"","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"5 4","pages":"378-388"},"PeriodicalIF":0.0,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10721216","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142447218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vulnerable Agents and Sustainable Security","authors":"P. Chmielewski","doi":"10.1109/TTS.2024.3465376","DOIUrl":"https://doi.org/10.1109/TTS.2024.3465376","url":null,"abstract":"This project explores an ethics for securitization. The ethical program benefits from the multi-dimensional significance of the United Nations’ Sustainable Development Goals (SDGs). Engineering practices are critical in this ethical project to assess and shape securitization. The ethics also develops the thought of Hannah Arendt and Elke Schwarz in order to focus on persons: both in terms of their vulnerability and their effective activities to shape a common world. Mark Coeckelbergh underlines the imagination’s socio-temporal role in narrating demands, past and future. Through their narration, vulnerable persons sustain their collective movement forward. Professional risk analysis enables persons to dwell even amid a world of uncertainties. Through skilled habits of design, engineering equips persons to build their enframing world. The plans and achievements of engineers create a syntax of systems that enables, amid plurality, discourse. For vulnerable agents and practicing professionals, their collaborative shaping of a world, not the securing of a nation, finds its ethical guide in the SDGs. The economic, social, and governance dimensions of these goals correspond to the dwelling, designing, and discursive practices of persons and societies. For these activities, the SDGs establish a trans-temporal and global context. Securitization requires ethical direction. The SDGs orient engineering practices so that persons in society through their collective activities are enabled to strive to maintain their common good.","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"6 1","pages":"102-111"},"PeriodicalIF":0.0,"publicationDate":"2024-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143521565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"In This Special: Co-Designing Consumer Technology With Society","authors":"Rys Farthing;Katina Michael;Jeremy Pitt","doi":"10.1109/TTS.2024.3454936","DOIUrl":"https://doi.org/10.1109/TTS.2024.3454936","url":null,"abstract":"","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"5 4","pages":"335-341"},"PeriodicalIF":0.0,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10710629","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142397273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Transactions on Technology and Society Publication Information","authors":"","doi":"10.1109/TTS.2024.3467791","DOIUrl":"https://doi.org/10.1109/TTS.2024.3467791","url":null,"abstract":"","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"5 4","pages":"C2-C3"},"PeriodicalIF":0.0,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10711303","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142397121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}