Reflecting on Potentials for Post-Growth Social Media Platform Design
Joseph S. Schafer
Sudden attention on social media, and how users navigate these contextual shifts, has been a focus of much recent work in social media research. Even when this attention is not harassing, some users experience this sudden growth as overwhelming. In this workshop paper, I outline how growth infuses the design of much of the modern social media platform landscape, and then explore why applying a post-growth lens to platform design could be productive.
Discrimination, artificial intelligence, and algorithmic decision-making
Frederik Zuiderveen Borgesius
Artificial intelligence (AI) has a huge impact on our personal lives and also on our democratic society as a whole. While AI offers vast opportunities for the benefit of people, its potential to embed and perpetuate bias and discrimination remains one of the most pressing challenges deriving from its increasing use. This new study, which was prepared by Prof. Frederik Zuiderveen Borgesius for the Anti-discrimination Department of the Council of Europe, elaborates on the risks of discrimination caused by algorithmic decision-making and other types of artificial intelligence (AI).
Farewell to Westphalia: Crypto Sovereignty and Post-Nation-State Governaance
Jarrad Hope, Peter Ludlow
We argue that the principal application for blockchain technology will not be in the financial sector, but rather in maintaining decentralized human governance, from archives to transparent policies encoded in the blockchain in the form of smart contracts.. Such decentralized, blockchain-grounded governance comes not a moment too soon, as nation states are dissolving before our eyes. Will blockchain-based communities replace the nation state? What are the prospects and dangers of this development?
Behavioral Targeting, a European Legal Perspective
Frederik Zuiderveen Borgesius
Behavioral targeting, or online profiling, is a hotly debated topic. Much of the collection of personal information on the Internet is related to behavioral targeting, although research suggests that most people don't want to receive behaviorally targeted advertising. The World Wide Web Consortium is discussing a Do Not Track standard, and regulators worldwide are struggling to come up with answers. This article discusses European law and recent policy developments on behavioral targeting.
The value of human and machine in machine-generated creative contents
Weina Jin
The seemingly "imagination" and "creativity" from machine-generated contents should not be misattributed to the accomplishment of machine. They are accomplishments of both human and machine. Without human interpretation, the machine-generated contents remain in the imaginary space of the large language models, and cannot automatically establish grounding in the reality and human experience.
The Shadow: Coevolution Processes Between a Director, Actors and Avatars
Georges Gagneré
Andersen's tale The Shadow offers a theatrical situation confronting a Scholar to his Shadow. I program specific creatures that I called shadow avatar to stage the story with five of them and a physical narrator. Echoing Edmond Couchot's ideas about virtual people helping human beings to adapt to technological evolutions, I describe dynamics of coevolution characterizing the relationship between a director, actors, and shadow avatars during the process of staging The Shadow.
Golden Eye: The Theory of Havana Syndrome
Adam Dorian Wong
Beginning around 2016, US Diplomats reported unusual injuries while serving abroad. Personnel suffered from symptoms such as nausea, vertigo, and disorientation. The collective set of ailments was subbed "Havana Syndrome". This whitepaper delves into an analysis of competing hypotheses with respect to potential origins of these symptoms. Whitepaper cleared for release on 18 JUN 2024. The views expressed by this whitepaper are those of the author and do not reflect the official policy or position of Dakota State University, the N.H. Army National Guard, the U.S. Army, the Department of Defense, or the U.S. Government.
Criticizing Ethics According to Artificial Intelligence
Irina Spiegel
This article presents a critique of ethics in the context of artificial intelligence (AI). It argues for the need to question established patterns of thought and traditional authorities, including core concepts such as autonomy, morality, and ethics. These concepts are increasingly inadequate to deal with the complexities introduced by emerging AI and autonomous agents. This critique has several key components: clarifying conceptual ambiguities, honestly addressing epistemic issues, and thoroughly exploring fundamental normative problems. The ultimate goal is to reevaluate and possibly redefine some traditional ethical concepts to better address the challenges posed by AI.
AI Ethics in Smart Healthcare
Sudeep Pasricha
This article reviews the landscape of ethical challenges of integrating artificial intelligence (AI) into smart healthcare products, including medical electronic devices. Differences between traditional ethics in the medical domain and emerging ethical challenges with AI-driven healthcare are presented, particularly as they relate to transparency, bias, privacy, safety, responsibility, justice, and autonomy. Open challenges and recommendations are outlined to enable the integration of ethical principles into the design, validation, clinical trials, deployment, monitoring, repair, and retirement of AI-based smart healthcare products.
Title Redacted
Alvarez-Telena Sergio, Diez-Fernandez Marta
Abstract redacted by arXiv administrators.
An application of cyberpsychology in business email compromise
Shadrack Awah Buo
This paper introduces Business Email Compromise (BEC) and why it is becoming a major issue to businesses worldwide. It also presents a case study of a BEC incident against Unatrac Holding Ltd and analyses the techniques used by the cybercriminals to defraud the company. A critical analysis of the psychological and sociotechnical impacts of BEC to both the company and employees are conducted, and potential risk mitigations strategies and recommendations are provided to prevent future attacks.
Modern Techniques for Ancient Games
Cameron Browne
Games potentially provide a wealth of knowledge about our shared cultural past and the development of human civilisation, but our understanding of early games is incomplete and often based on unreliable reconstructions. This paper describes the Digital Ludeme Project, a five-year research project currently underway that aims to address such issues using modern computational techniques.
Using Elements Of Semantic Parsing In E-Learning Environments
Andrii Striuk
Possibilities for using semantic parsing to estimate the correspondence of text materials to teaching aims, correspondence of test task to theoretical materials and other problems arising during the distance course designing and educational process itself in e-learning environments.
Dispenser Concept for Unmanned Aerial Vehicles (UAV, Drone, UAS)
Manan Suri
System, design and methodology to load and dispense different articles from an autonomous aircraft are disclosed. In one embodiment, the design of a unique detachable dispenser for delivery of articles is described along with an intelligent methodology of loading and delivering the articles to and from the dispenser. Design of the dispenser, interaction of the dispenser with the flight control unit and ground control or base-station, and interaction of the base station with the sender or recipient of the article, are also described.
Big Data: Perspektiven fuer Smart Grids und Smart Buildings
Ralf Mikut
This paper gives a short survey of recent trends in the emerging field of big data. It explains the definitions and useful methods. In addition, application fields of smart buildings and smart grids are discussed.
The Internet of Flying-Things: Opportunities and Challenges with Airborne Fog Computing and Mobile Cloud in the Clouds
Seng W. Loke
This paper focuses on services and applications provided to mobile users using airborne computing infrastructure. We present concepts such as drones-as-a-service and fly-in,fly-out infrastructure, and note data management and system design issues that arise in these scenarios. Issues of Big Data arising from such applications, optimising the configuration of airborne and ground infrastructure to provide the best QoS and QoE, situation-awareness, scalability, reliability, scheduling for efficiency, interaction with users and drones using physical annotations are outlined.
Inverse Privacy
Yuri Gurevich, Efim Hudis, Jeannette M. Wing
An item of your personal information is inversely private if some party has access to it but you do not. We analyze the provenance of inversely private information and its rise to dominance over other kinds of personal information. In a nutshell, the inverse privacy problem is unjustified inaccessibility to you of your inversely private information. We argue that the inverse privacy problem has a market-based solution.
Managing Knowledge to Enhance Learning
Philippe A. Martin
The article first summarizes reasons why current approaches supporting Open Learning and Distance Education need to be complemented by tools permitting lecturers, researchers and students to cooperatively organize the semantic content of Learning related materials (courses, discussions, etc.) into a fine-grained shared semantic network. This first part of the article also quickly describes the approach adopted to permit such a collaborative work. Then, examples of such semantic networks are presented. Finally, an evaluation of the approach by students is provided and analyzed.
Design Based Teaching for Science and Engineering Students
Yousef R. Shayan, Mouhamed Abdulla
In this paper, we will explain a successfully proven lecturing method based entirely on system design. Wireless communications will be used as an example to explain this new teaching philosophy.
Modeling and Controlling Interstate Conflict
Tshilidzi Marwala, Monica Lagazio
Bayesian neural networks were used to model the relationship between input parameters, Democracy, Allies, Contingency, Distance, Capability, Dependency and Major Power, and the output parameter which is either peace or conflict. The automatic relevance determination was used to rank the importance of input variables. Control theory approach was used to identify input variables that would give a peaceful outcome. It was found that using all four controllable variables Democracy, Allies, Capability and Dependency; or using only Dependency or only Capabilities avoids all the predicted conflicts.