Hasil untuk "cs.CY"

Menampilkan 20 dari ~80493 hasil · dari arXiv, DOAJ, CrossRef

JSON API
arXiv Open Access 2025
Reflecting on Potentials for Post-Growth Social Media Platform Design

Joseph S. Schafer

Sudden attention on social media, and how users navigate these contextual shifts, has been a focus of much recent work in social media research. Even when this attention is not harassing, some users experience this sudden growth as overwhelming. In this workshop paper, I outline how growth infuses the design of much of the modern social media platform landscape, and then explore why applying a post-growth lens to platform design could be productive.

en cs.CY
arXiv Open Access 2025
Discrimination, artificial intelligence, and algorithmic decision-making

Frederik Zuiderveen Borgesius

Artificial intelligence (AI) has a huge impact on our personal lives and also on our democratic society as a whole. While AI offers vast opportunities for the benefit of people, its potential to embed and perpetuate bias and discrimination remains one of the most pressing challenges deriving from its increasing use. This new study, which was prepared by Prof. Frederik Zuiderveen Borgesius for the Anti-discrimination Department of the Council of Europe, elaborates on the risks of discrimination caused by algorithmic decision-making and other types of artificial intelligence (AI).

en cs.CY
arXiv Open Access 2025
Farewell to Westphalia: Crypto Sovereignty and Post-Nation-State Governaance

Jarrad Hope, Peter Ludlow

We argue that the principal application for blockchain technology will not be in the financial sector, but rather in maintaining decentralized human governance, from archives to transparent policies encoded in the blockchain in the form of smart contracts.. Such decentralized, blockchain-grounded governance comes not a moment too soon, as nation states are dissolving before our eyes. Will blockchain-based communities replace the nation state? What are the prospects and dangers of this development?

en cs.CY, cs.CR
arXiv Open Access 2025
Behavioral Targeting, a European Legal Perspective

Frederik Zuiderveen Borgesius

Behavioral targeting, or online profiling, is a hotly debated topic. Much of the collection of personal information on the Internet is related to behavioral targeting, although research suggests that most people don't want to receive behaviorally targeted advertising. The World Wide Web Consortium is discussing a Do Not Track standard, and regulators worldwide are struggling to come up with answers. This article discusses European law and recent policy developments on behavioral targeting.

arXiv Open Access 2025
The value of human and machine in machine-generated creative contents

Weina Jin

The seemingly "imagination" and "creativity" from machine-generated contents should not be misattributed to the accomplishment of machine. They are accomplishments of both human and machine. Without human interpretation, the machine-generated contents remain in the imaginary space of the large language models, and cannot automatically establish grounding in the reality and human experience.

en cs.CY
arXiv Open Access 2024
The Shadow: Coevolution Processes Between a Director, Actors and Avatars

Georges Gagneré

Andersen's tale The Shadow offers a theatrical situation confronting a Scholar to his Shadow. I program specific creatures that I called shadow avatar to stage the story with five of them and a physical narrator. Echoing Edmond Couchot's ideas about virtual people helping human beings to adapt to technological evolutions, I describe dynamics of coevolution characterizing the relationship between a director, actors, and shadow avatars during the process of staging The Shadow.

en cs.CY, cs.GR
arXiv Open Access 2024
Golden Eye: The Theory of Havana Syndrome

Adam Dorian Wong

Beginning around 2016, US Diplomats reported unusual injuries while serving abroad. Personnel suffered from symptoms such as nausea, vertigo, and disorientation. The collective set of ailments was subbed "Havana Syndrome". This whitepaper delves into an analysis of competing hypotheses with respect to potential origins of these symptoms. Whitepaper cleared for release on 18 JUN 2024. The views expressed by this whitepaper are those of the author and do not reflect the official policy or position of Dakota State University, the N.H. Army National Guard, the U.S. Army, the Department of Defense, or the U.S. Government.

en cs.CY
arXiv Open Access 2024
Criticizing Ethics According to Artificial Intelligence

Irina Spiegel

This article presents a critique of ethics in the context of artificial intelligence (AI). It argues for the need to question established patterns of thought and traditional authorities, including core concepts such as autonomy, morality, and ethics. These concepts are increasingly inadequate to deal with the complexities introduced by emerging AI and autonomous agents. This critique has several key components: clarifying conceptual ambiguities, honestly addressing epistemic issues, and thoroughly exploring fundamental normative problems. The ultimate goal is to reevaluate and possibly redefine some traditional ethical concepts to better address the challenges posed by AI.

en cs.CY
arXiv Open Access 2022
AI Ethics in Smart Healthcare

Sudeep Pasricha

This article reviews the landscape of ethical challenges of integrating artificial intelligence (AI) into smart healthcare products, including medical electronic devices. Differences between traditional ethics in the medical domain and emerging ethical challenges with AI-driven healthcare are presented, particularly as they relate to transparency, bias, privacy, safety, responsibility, justice, and autonomy. Open challenges and recommendations are outlined to enable the integration of ethical principles into the design, validation, clinical trials, deployment, monitoring, repair, and retirement of AI-based smart healthcare products.

en cs.CY, cs.AI
arXiv Open Access 2022
Title Redacted

Alvarez-Telena Sergio, Diez-Fernandez Marta

Abstract redacted by arXiv administrators.

en cs.CY, q-fin.PM
arXiv Open Access 2020
An application of cyberpsychology in business email compromise

Shadrack Awah Buo

This paper introduces Business Email Compromise (BEC) and why it is becoming a major issue to businesses worldwide. It also presents a case study of a BEC incident against Unatrac Holding Ltd and analyses the techniques used by the cybercriminals to defraud the company. A critical analysis of the psychological and sociotechnical impacts of BEC to both the company and employees are conducted, and potential risk mitigations strategies and recommendations are provided to prevent future attacks.

en cs.CY
arXiv Open Access 2020
Modern Techniques for Ancient Games

Cameron Browne

Games potentially provide a wealth of knowledge about our shared cultural past and the development of human civilisation, but our understanding of early games is incomplete and often based on unreliable reconstructions. This paper describes the Digital Ludeme Project, a five-year research project currently underway that aims to address such issues using modern computational techniques.

en cs.CY, cs.AI
arXiv Open Access 2018
Using Elements Of Semantic Parsing In E-Learning Environments

Andrii Striuk

Possibilities for using semantic parsing to estimate the correspondence of text materials to teaching aims, correspondence of test task to theoretical materials and other problems arising during the distance course designing and educational process itself in e-learning environments.

en cs.CY
arXiv Open Access 2017
Dispenser Concept for Unmanned Aerial Vehicles (UAV, Drone, UAS)

Manan Suri

System, design and methodology to load and dispense different articles from an autonomous aircraft are disclosed. In one embodiment, the design of a unique detachable dispenser for delivery of articles is described along with an intelligent methodology of loading and delivering the articles to and from the dispenser. Design of the dispenser, interaction of the dispenser with the flight control unit and ground control or base-station, and interaction of the base station with the sender or recipient of the article, are also described.

en cs.CY, eess.SP
arXiv Open Access 2015
The Internet of Flying-Things: Opportunities and Challenges with Airborne Fog Computing and Mobile Cloud in the Clouds

Seng W. Loke

This paper focuses on services and applications provided to mobile users using airborne computing infrastructure. We present concepts such as drones-as-a-service and fly-in,fly-out infrastructure, and note data management and system design issues that arise in these scenarios. Issues of Big Data arising from such applications, optimising the configuration of airborne and ground infrastructure to provide the best QoS and QoE, situation-awareness, scalability, reliability, scheduling for efficiency, interaction with users and drones using physical annotations are outlined.

en cs.CY
arXiv Open Access 2015
Inverse Privacy

Yuri Gurevich, Efim Hudis, Jeannette M. Wing

An item of your personal information is inversely private if some party has access to it but you do not. We analyze the provenance of inversely private information and its rise to dominance over other kinds of personal information. In a nutshell, the inverse privacy problem is unjustified inaccessibility to you of your inversely private information. We argue that the inverse privacy problem has a market-based solution.

en cs.CY
arXiv Open Access 2013
Managing Knowledge to Enhance Learning

Philippe A. Martin

The article first summarizes reasons why current approaches supporting Open Learning and Distance Education need to be complemented by tools permitting lecturers, researchers and students to cooperatively organize the semantic content of Learning related materials (courses, discussions, etc.) into a fine-grained shared semantic network. This first part of the article also quickly describes the approach adopted to permit such a collaborative work. Then, examples of such semantic networks are presented. Finally, an evaluation of the approach by students is provided and analyzed.

en cs.CY
arXiv Open Access 2007
Modeling and Controlling Interstate Conflict

Tshilidzi Marwala, Monica Lagazio

Bayesian neural networks were used to model the relationship between input parameters, Democracy, Allies, Contingency, Distance, Capability, Dependency and Major Power, and the output parameter which is either peace or conflict. The automatic relevance determination was used to rank the importance of input variables. Control theory approach was used to identify input variables that would give a peaceful outcome. It was found that using all four controllable variables Democracy, Allies, Capability and Dependency; or using only Dependency or only Capabilities avoids all the predicted conflicts.

en cs.CY

Halaman 8 dari 4025