13 research outputs found

    Crowd Intelligence in Requirements Engineering: Current Status and Future Directions

    Get PDF
    Software systems are the joint creative products of multiple stakeholders, including both designers and users, based on their perception, knowledge and personal preferences of the application context. The rapid rise in the use of Internet, mobile and social media applications make it even more possible to provide channels to link a large pool of highly diversified and physically distributed designers and end users, the crowd. Converging the knowledge of designers and end users in requirements engineering process is essential for the success of software systems. In this paper, we report the findings of a survey of the literature on crowd-based requirements engineering research. It helps us understand the current research achievements, the areas of concentration, and how requirements related activities can be enhanced by crowd intelligence. Based on the survey, we propose a general research map and suggest the possible future roles of crowd intelligence in requirements engineering

    The Human Flesh Search Engine in China: a case-oriented approach to understanding online collective action

    Get PDF
    There has been a growing interest in online politics in China. The research mostly focuses on the role of the Internet in two areas, one is its creation of a public sphere and the challenges it poses to the existing communication and political system, and the other one is online censorship undertaken by Chinese authorities to reduce the scope of political discussion online and keep the domestic cyberspace from being merged with foreign cyberspace. However, some political uses of the Internet in China have tended to be overlooked. This thesis seeks to redress this lacuna in research by examining the political focus of a recent Internet phenomenon the Human Flesh Search Engine (HFSE). This term might be more at home in pages of a horror novel but was originally applied by the Chinese media to refer to the practice of online searching for people or human hunting. While existing examinations have focused on breaches of individual privacy by these so called online vigilantes this study mainly focuses on the ability of HFSE to reveal norms transgressions by public officials and lead to their removal. As the politically-focused HFSE is part of the tendency of Chinese popular protest, it is necessary to explore how the HFSE differs from and is similar to those offline protests in China. A case-oriented approach is applied to the research on HFSE. More specifically, the first part of this research puts the understanding of HFSE in Chinese historical context, with the aim of exploring the common dynamics between HFSE and those historical examples of Chinese bottom-up collective action. Then in the second part, a comparison between HFSE and recent Chinese offline popular protests is conducted in order to establish the pattern of politically-focused HFSE. In the third part, based on the empirical cases, the research on HFSE continues with an exploration of HFSE s underlying causal mechanisms to answer a key question of this research: why did HFSE occur? The study implies that there are continuities with respect to the Chinese bottom-up collective action as HFSE and Chinese rural resistances as well as urban labour strikes in the twentieth century of China tend to show similar dynamics, which are determined by the power structure they are exposed to. Moreover, the internal process of politically-focused HFSE differs largely from that of recent Chinese offline popular protests, which indicates that HFSE does not have an offline equivalent, although some of its stages can be witnessed offline. Furthermore, HFSE s occurrence is brought about by a combination of online and offline factors, which are relevant to not only the Internet and Chinese cyberspace, but also the political system that has contributed to the growth of official corruption and low government credibility in China

    Cyber Peace

    Get PDF
    Cyberspace is increasingly vital to the future of humanity and managing it peacefully and sustainably is critical to both security and prosperity in the twenty-first century. These chapters and essays unpack the field of cyber peace by investigating historical and contemporary analogies, in a wide-ranging and accessible Open Access publication

    Crowd Vigilante - Detecting Sabotage in Crowdsourcing.

    Full text link

    Counter-Terrorism, Ethics and Technology

    Get PDF
    This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the “social credit system.” Counter-terrorism technologies can easily succumb to mission creep, where a technology’s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world

    Counter-Terrorism, Ethics and Technology

    Get PDF
    This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the “social credit system.” Counter-terrorism technologies can easily succumb to mission creep, where a technology’s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world

    Democracy and Fake News

    Get PDF
    This book explores the challenges that disinformation, fake news, and post-truth politics pose to democracy from a multidisciplinary perspective. The authors analyse and interpret how the use of technology and social media as well as the emergence of new political narratives has been progressively changing the information landscape, undermining some of the pillars of democracy. The volume sheds light on some topical questions connected to fake news, thereby contributing to a fuller understanding of its impact on democracy. In the Introduction, the editors offer some orientating definitions of post-truth politics, building a theoretical framework where various different aspects of fake news can be understood. The book is then divided into three parts: Part I helps to contextualise the phenomena investigated, offering definitions and discussing key concepts as well as aspects linked to the manipulation of information systems, especially considering its reverberation on democracy. Part II considers the phenomena of disinformation, fake news, and post-truth politics in the context of Russia, which emerges as a laboratory where the phases of creation and diffusion of fake news can be broken down and analysed; consequently, Part II also reflects on the ways to counteract disinformation and fake news. Part III moves from case studies in Western and Central Europe to reflect on the methodological difficulty of investigating disinformation, as well as tackling the very delicate question of detection, combat, and prevention of fake news. This book will be of great interest to students and scholars of political science, law, political philosophy, journalism, media studies, and computer science, since it provides a multidisciplinary approach to the analysis of post-truth politics
    corecore