125 research outputs found

    Multidisciplinary perspectives on Artificial Intelligence and the law

    Get PDF
    This open access book presents an interdisciplinary, multi-authored, edited collection of chapters on Artificial Intelligence (‘AI’) and the Law. AI technology has come to play a central role in the modern data economy. Through a combination of increased computing power, the growing availability of data and the advancement of algorithms, AI has now become an umbrella term for some of the most transformational technological breakthroughs of this age. The importance of AI stems from both the opportunities that it offers and the challenges that it entails. While AI applications hold the promise of economic growth and efficiency gains, they also create significant risks and uncertainty. The potential and perils of AI have thus come to dominate modern discussions of technology and ethics – and although AI was initially allowed to largely develop without guidelines or rules, few would deny that the law is set to play a fundamental role in shaping the future of AI. As the debate over AI is far from over, the need for rigorous analysis has never been greater. This book thus brings together contributors from different fields and backgrounds to explore how the law might provide answers to some of the most pressing questions raised by AI. An outcome of the Católica Research Centre for the Future of Law and its interdisciplinary working group on Law and Artificial Intelligence, it includes contributions by leading scholars in the fields of technology, ethics and the law.info:eu-repo/semantics/publishedVersio

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks

    Plug-in healthcare:Development, ruination, and repair in health information exchange

    Get PDF
    This dissertation explores the work done by people and things in emerging infrastructures for health information exchange. It shows how this work relates to processes of development, production, and growth, as well as to abandonment, ruination, and loss. It argues for a revaluation of repair work: a form of articulation work that attends to gaps and disruptions in the margins of technological development. Often ignored by engineers, policy makers, and researchers, repair sensitizes us to different ways of caring for people and things that do not fit, fall in between categories, and resist social norms and conventions. It reminds us that infrastructures emerge in messy and unevenly distributed sociotechnical configurations, and that technological solutions cannot be simply ‘plugged in’ at will, but require all kinds of work. With that, repair emphasizes the need for more democratic, critical, and reflexive engagements with (and interventions in) health information exchange. Empirically, this study aims to understand how ‘integration’ in health information exchange is done in practice, and to develop concepts and insights that may help us to rethink technological development accordingly. It starts from the premise that the introduction of IT in healthcare is all too often regarded as a neutral process, and as a rational implementation challenge. These widespread views among professionals, managers, and policy makers need to be addressed, as they have very real – and mostly undesirable – consequences. Spanning a period of more than ten years, this study traces the birth and demise of an online regional health portal in the Netherlands (2009-2019). Combining ethnographic research with an experimental form of archive work, it describes sociotechnical networks that expanded, collapsed, and reconfigured around a variety of problems – from access to information and data ownership to business cases, financial sustainability, and regional care. It puts a spotlight on the integration of standards, infrastructures, and users in the portal project, and on elements of collapsing networks that quietly resurfaced elsewhere. The reconstruction of these processes foregrounds different instances of repair work in the portal’s development and subsequent abandonment, repurposing, and erasure. Conceptually, this study contributes to academic debates in health information exchange, including the politics of technology, practices of participatory design, and the role of language in emerging information infrastructures. It latches on to ethnographic studies on information systems and infrastructural work, and brings together insights from actor-network theory, science and technology studies, and figurational sociology to rethink and extend current (reflexive and critical) understandings of technological development. It raises three questions: What work is done in the development and demise of an online health portal? How are relations between people and things shaped in that process? And how can insights from this study help us to understand changing sociotechnical figurations in health information exchange? The final analysis includes five key concepts: the act of building network extensions, the method of tracing phantom networks, the notion of sociotechnical figurations, the logic of plug-in healthcare, and repair as a heuristic device.<br/

    24th Nordic Conference on Computational Linguistics (NoDaLiDa)

    Get PDF

    Applications

    Get PDF
    Volume 3 describes how resource-aware machine learning methods and techniques are used to successfully solve real-world problems. The book provides numerous specific application examples: in health and medicine for risk modelling, diagnosis, and treatment selection for diseases in electronics, steel production and milling for quality control during manufacturing processes in traffic, logistics for smart cities and for mobile communications

    Jornadas Nacionales de Investigación en Ciberseguridad: actas de las VIII Jornadas Nacionales de Investigación en ciberseguridad: Vigo, 21 a 23 de junio de 2023

    Get PDF
    Jornadas Nacionales de Investigación en Ciberseguridad (8ª. 2023. Vigo)atlanTTicAMTEGA: Axencia para a modernización tecnolóxica de GaliciaINCIBE: Instituto Nacional de Cibersegurida

    How does virtual simulation impact on nursing students’ knowledge and self-efficacy for recognising and responding to deteriorating patients? A mixed methods study.

    Get PDF
    Background: Preparing undergraduate nursing students effectively for safe clinical practice continues to present significant challenges due to the impact of the Covid-19 pandemic, global nursing shortages, greater competition for quality clinical placements, and no guarantee that nursing students will have exposure to a deteriorating patient during their clinical placements. This is a concern because early warning signs of clinical deterioration are often not detected by nurses in a timely manner, and recognition and response to deteriorating patients is recognised globally as a major safety challenge (Haddeland et al., 2018). Aim: To explore the impact of using interactive virtual simulation case studies with facilitated debriefing (Eppich and Cheng, 2015) on nursing students’ knowledge and self-efficacy for recognising and responding to early signs of clinical deterioration in patients. Design & Methods: Mixed methods study with quasi-experimental pre/post design and focus groups. A convenience sample (n=88) final year undergraduate nursing students with half the sample at each sites randomly allocated to a treatment or control group. The treatment group received a virtual simulation intervention, debriefing, and participated in a focus group. Results: The treatment group had statistically significant higher levels of clinical self-efficacy from pre to post survey scores (65.34 and 80.12) compared to the control group (62.59 and 70.73) and significantly increased levels of knowledge in recognizing and responding to the deteriorating patient scores from pre to post survey (11.30 to 13.1) in comparison to the control group (10.33 and 9.92). Conclusions: study findings demonstrated the positive impact of a the virtual simulation intervention on knowledge and confidence of undergraduate nursing students from geographically diverse areas

    Fundamentals

    Get PDF
    Volume 1 establishes the foundations of this new field. It goes through all the steps from data collection, their summary and clustering, to different aspects of resource-aware learning, i.e., hardware, memory, energy, and communication awareness. Machine learning methods are inspected with respect to resource requirements and how to enhance scalability on diverse computing architectures ranging from embedded systems to large computing clusters

    Z-Numbers-Based Approach to Hotel Service Quality Assessment

    Get PDF
    In this study, we are analyzing the possibility of using Z-numbers for measuring the service quality and decision-making for quality improvement in the hotel industry. Techniques used for these purposes are based on consumer evalu- ations - expectations and perceptions. As a rule, these evaluations are expressed in crisp numbers (Likert scale) or fuzzy estimates. However, descriptions of the respondent opinions based on crisp or fuzzy numbers formalism not in all cases are relevant. The existing methods do not take into account the degree of con- fidence of respondents in their assessments. A fuzzy approach better describes the uncertainties associated with human perceptions and expectations. Linguis- tic values are more acceptable than crisp numbers. To consider the subjective natures of both service quality estimates and confidence degree in them, the two- component Z-numbers Z = (A, B) were used. Z-numbers express more adequately the opinion of consumers. The proposed and computationally efficient approach (Z-SERVQUAL, Z-IPA) allows to determine the quality of services and iden- tify the factors that required improvement and the areas for further development. The suggested method was applied to evaluate the service quality in small and medium-sized hotels in Turkey and Azerbaijan, illustrated by the example
    corecore