564 research outputs found

    Data ethics : building trust : how digital technologies can serve humanity

    Get PDF
    Data is the magic word of the 21st century. As oil in the 20th century and electricity in the 19th century: For citizens, data means support in daily life in almost all activities, from watch to laptop, from kitchen to car, from mobile phone to politics. For business and politics, data means power, dominance, winning the race. Data can be used for good and bad, for services and hacking, for medicine and arms race. How can we build trust in this complex and ambiguous data world? How can digital technologies serve humanity? The 45 articles in this book represent a broad range of ethical reflections and recommendations in eight sections: a) Values, Trust and Law, b) AI, Robots and Humans, c) Health and Neuroscience, d) Religions for Digital Justice, e) Farming, Business, Finance, f) Security, War, Peace, g) Data Governance, Geopolitics, h) Media, Education, Communication. The authors and institutions come from all continents. The book serves as reading material for teachers, students, policy makers, politicians, business, hospitals, NGOs and religious organisations alike. It is an invitation for dialogue, debate and building trust! The book is a continuation of the volume “Cyber Ethics 4.0” published in 2018 by the same editors

    Towards a Peaceful Development of Cyberspace - Challenges and Technical Measures for the De-escalation of State-led Cyberconflicts and Arms Control of Cyberweapons

    Get PDF
    Cyberspace, already a few decades old, has become a matter of course for most of us, part of our everyday life. At the same time, this space and the global infrastructure behind it are essential for our civilizations, the economy and administration, and thus an essential expression and lifeline of a globalized world. However, these developments also create vulnerabilities and thus, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning, visible in the creation of military cyber-departments and the integration of cyberspace into states' security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces, over the last decades, a complex tool set of transparency, de-escalation and arms control measures has been developed and proof-tested. Unfortunately, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain. Against this background, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyberweapons can be developed. In order to answer this question, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behavior and international humanitarian law in cyberspace to identify starting points for technical measures of transparency, arms control and verification. Based on this approach of adopting already existing technical measures from other fields of computer science, the thesis will provide proof of concepts approaches for some mentioned challenges like a classification system for cyberweapons that is based on technical measurable features, an approach for the mutual reduction of vulnerability stockpiles and an approach to plausibly assure the non-involvement in a cyberconflict as a measure for de-escalation. All these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal, like the reduction of its destructive usage, is yet not very common for the engineering thinking of computer science. Therefore, this dissertation also aims to provide some impulses regarding the responsibility and creative options of computer science with a view to the peaceful development and use of cyberspace

    Life-writing in the History of Archaeology

    Get PDF
    Life-writing is a vital part of the history of archaeology, and a growing field of scholarship within the discipline. The lives of archaeologists are entangled with histories of museums and collections, developments in science and scholarship, and narratives of nationalism and colonialism into the present. In recent years life-writing has played an important role in the surge of new research in the history of archaeology, including ground-breaking studies of discipline formation, institutionalisation, and social and intellectual networks. Sources such as diaries, wills, film, and the growing body of digital records are powerful tools for highlighting the contributions of hitherto marginalised archaeological lives including many pioneering women, hired labourers and other ‘hidden hands’. This book brings together critical perspectives on life-writing in the history of archaeology from leading figures in the field. These include studies of archive formation and use, the concept of ‘dig-writing’ as a distinctive genre of archaeological creativity, and reviews of new sources for already well-known lives. Several chapters reflect on the experience of life-writing, review the historiography of the field, and assess the intellectual value and significance of life-writing as a genre. Together, they work to problematise underlying assumptions about this genre, foregrounding methodology, social theory, ethics and other practice-focused frameworks in conscious tension with previous practices

    Security Elites in Egypt and Jordan after the Arab Spring : A Case Study on Securocracies’ Role on National Security, Domestic Power Politics, Regional Order and Middle Eastern Alliance Making between 2011 and 2021

    Get PDF
    The doctoral dissertation studied changes in the balance of power, alliance making and the hegemonic struggles of security elites within a Middle Eastern regional context over a ten year reference period between 2011 and 2021. The study focused on two case study countries: Egypt and Jordan. The results were compared within a historical context to the pre-Arab Spring era. The theoretical approach combined the English School of Thought and Middle Eastern Studies with a conceptual model of securocracy developed by the author. The primary contribution of the research is the realization of the core importance of securocracy within autocratic state systems. Inside securocracies there exists rivalling groups and organisations that counterbalance each other. The study points to the fact that the power struggle between executive powers – either purely domestic one or supported by foreign involvement, is the main driver behind why case study countries were in varying degrees dragged into instability and turmoil in the aftermath of the Arab Spring. Securocracies can be divided into two main types: centralised and decentralised. The centralised model occurs when different elites groups have the same ”distance” to the ruler while having equal privileges and equal access to political power. The model predicts durability and stability of the regime (status quo). In the de-centralised model, there is an ongoing struggle amongst elite groups and “distances” to ruler are not equal, neither are the privileges. In Egypt the hegemonic struggle amongst elites took precedence over the interests and stability of the state after the Arab Spring and has continued since then. The situation at the end of 2021 is a de-centralised model where all executive powers are concentrated within President al-Sisi’s family dynasty (palace) and the leadership of military intelligence. This de-centralised type of securocracy makes Egypt’s situation fragile. Any impact from the outside, such as the Biden administration’s decision to impose additional conditions on U.S. financial military aid, could lead to a new hegemonic struggle challenging al-Sisi’s power. The securocracy’s survival strategy found in the study was the use of vertical power at all levels of the state hierarchy (” the winner takes it all”). In the situation of a power struggle, the ruler uses omni-balancing i.e., alliance making with powerful foreign states in order to gain an advantage against domestic rivals and revisionist regional states. The Egyptian example is al-Sisi’s rapprochement with Russia’s President Putin and his distancing of Egypt from its previous role of being the United States’ loyal Middle Eastern ally. The Jordanian example however, is the opposite, resulting in even closer relations with the United States since January 2021 when the two countries signed an updated Status of Forces Agreement (SOFA). The study also highlights that decisions concerning ruler succession in authoritarian states take place behind-the-scenes amongst the securocracy as it, per rule, prefers to choose a member inside its own interest group or alternatively a political figurehead that commits to protect securocracy’s privileged interests in exchange of their own power position. Within the Middle East, the recent U.S. pivot to Asia-Pacific created an opportunity for Russia to make a come-back. Russia, however, does not have the resources to compensate for the loss of U.S. financial military aid to the security elites. This in turn, and with Russia’s consent, has given space for regional state actors, particularly, the United Arab Emirates and Saudi-Arabia, to increase their influence. Gulf support to the regional clients is not free of charge: they request their clients adopt their own threat perceptions, take sides in armed conflicts and contribute to military capabilities which support the sponsors’ regional foreign and security policy goals.Väitöstutkimuksessa tarkasteltiin kymmenen vuoden ajanjaksolla voimatasapainon muutosta Lähi-idän alueellisessa valtarakenteessa, liittolaissuhteiden muutoksia sekä turvallisuuseliittien roolia maan sisäisessä valtataistelussa. Tuloksia verrattiin historiallisessa kontekstissa arabikevättä edeltävään aikaan kahdessa tapaustutkimusmaassa: Egyptissä ja Jordaniassa. Teoriaviitekehyksenä sovellettiin Englantilaisen koulukunnan ja Lähi-idän tutkimuksen teoriamalleja, sekä tutkijan kehittelemää sekurokratian konseptuaalista mallia. Tutkimuksen keskeinen tulos on havainto sekurokratian merkittävästä roolista osana autoritaarista valtiomallia. Sekurokratian sisälle on luotu useita toinen toistaan tasapainottavia ryhmittymiä. Tapaustutkimusmaiden arabikevään jälkeisen turvallisuustilanteen muutoksia selittävien tekijöiden joukossa turvallisuuseliittien valtakamppailu nousi merkittävään rooliin. Valtakamppailua käytiin eliittien kesken joko pelkästään maan sisällä tai vaihtoehtoisesti osin myös valtion ulkopuolisten voimien tukemana. Tutkimuksen perusteella sekurokratiat voidaan jakaa kahteen päätyyppiin: keskitettyyn ja hajautettuun malliin. Jos eri turvallisuuseliitti-ryhmien edut, vallankäyttö ja etäisyys vallan keskipisteeseen ovat tasapainossa puhutaan keskitetyn sekurokratian mallista, mikä ennustaa vallassa olevan regiimin pysyvyyttä ja vakautta. Jos taas sekurokratian rakenne on hajautetun mallin mukainen, sen valtakamppailu voi johtaa yhden osan pyrkimyksiin hegemonia-asemasta. Egyptin tapauksessa arabikevään jälkeinen turvallisuuseliittien valtakamppailu asetettiin maan vakauden edelle ja eliittien valtakamppailu on jatkunut tähän päivään. Tilanteessa vuoden 2021 lopussa valta on al-Sisin perhedynastialla ja sotilastiedustelun eliitillä (hajautettu malli). Hajautettu malli ei ennusta pitkäaikaista vallassa pysymistä; vahva ulkopuolinen heräte, esimerkiksi Bidenin hallinnon sotilaallisen talousavun lopettaminen voisi johtaa uuteen valtakamppailuun ja al-Sisin valta-aseman haastamiseen. Tutkimustulokset osoittavat, että sekurokratoiden selviytymisstrategiana on vallanvertikaalin käyttö valtiohallinnon eri tasoilla. Valtakamppailun tilanteessa käytetään tasapainotusstrategiaa (omni-balancing), missä alueellisia vahvoja valtioita ja suurvaltoja pyritään yhdistämään hallitsijan puolelle kilpailevia eliittiryhmittymiä tai revisionistisia ulkovaltoja vastaan. Egyptissä presidentti al-Sisin valtaannousu johti maan lähentymiseen presidentti Putinin Venäjän kanssa sekä etääntymiseen aiemmasta Yhdysvalloille uskollisen Lähi-idän liittolaisen roolista. Jordaniassa puolestaan maa on nyt entistä tiiviimmin liittoutunut Yhdysvaltojen kanssa. Esimerkkinä tästä on tammikuussa 2021 maiden kesken solmittu sotilasyhteistyötä ja jordanialaisten tukikohtien käyttöä säätelevä isäntämaatuki-sopimus. Tutkimustulosten valossa autoritaariselle vallanperimykselle tyypillistä on se, että julkisuuteen näkymättömän sisäisen valtakamppailun jälkeen uudeksi valtionpäämieheksi pyritään nostamaan sekurokratian sisältä sen oman intressiryhmän edustaja, tai vaihtoehtoisesti sekurokratian valitsema ulkopuolinen poliitikko, jonka vastuulle korporaation intressien vaaliminen lankeaa vastapalveluksena sekurokratian tuesta keulakuva-poliitikon vallassa pitämiseksi. Alueellisen turvallisuusjärjestyksen osalta tutkimuksen tulokset osoittavat sen, että Yhdysvaltojen painopisteen siirto Tyynellemerelle vii ja Aasiaan on antanut Venäjälle mahdollisuuden palauttaa vaikutusvaltaansa Lähiitään. Venäjällä ei kuitenkaan ole resursseja kompensoida Yhdysvaltojen arabivaltioiden turvallisuuseliiteille allokoimaa taloudellista tukea. Tämä on antanut tilaa alueellisten toimijoiden kuten Yhdistyneiden arabiemiirikuntien ja Saudi-Arabian vaikutusvallan kasvattamiselle - tosin Venäjän hyväksynnällä. Tuki ei myöskään tule ilmaiseksi, sillä sponsorit edellyttävät, että niille alisteisessa asemassa olevat maat omaksuvat tukijavaltioidensa uhkakuvat, sekä konfliktitilanteissa kontribuoivat sotilaallisia kyvykkyyksiä näiden valtioiden ulko- ja turvallisuuspoliittisten päämäärien saavuttamiseksi

    Machine Learning Algorithm for the Scansion of Old Saxon Poetry

    Get PDF
    Several scholars designed tools to perform the automatic scansion of poetry in many languages, but none of these tools deal with Old Saxon or Old English. This project aims to be a first attempt to create a tool for these languages. We implemented a Bidirectional Long Short-Term Memory (BiLSTM) model to perform the automatic scansion of Old Saxon and Old English poems. Since this model uses supervised learning, we manually annotated the Heliand manuscript, and we used the resulting corpus as labeled dataset to train the model. The evaluation of the performance of the algorithm reached a 97% for the accuracy and a 99% of weighted average for precision, recall and F1 Score. In addition, we tested the model with some verses from the Old Saxon Genesis and some from The Battle of Brunanburh, and we observed that the model predicted almost all Old Saxon metrical patterns correctly misclassified the majority of the Old English input verses

    Augmented Behavioral Annotation Tools, with Application to Multimodal Datasets and Models: A Systematic Review

    Get PDF
    Annotation tools are an essential component in the creation of datasets for machine learning purposes. Annotation tools have evolved greatly since the turn of the century, and now commonly include collaborative features to divide labor efficiently, as well as automation employed to amplify human efforts. Recent developments in machine learning models, such as Transformers, allow for training upon very large and sophisticated multimodal datasets and enable generalization across domains of knowledge. These models also herald an increasing emphasis on prompt engineering to provide qualitative fine-tuning upon the model itself, adding a novel emerging layer of direct machine learning annotation. These capabilities enable machine intelligence to recognize, predict, and emulate human behavior with much greater accuracy and nuance, a noted shortfall of which have contributed to algorithmic injustice in previous techniques. However, the scale and complexity of training data required for multimodal models presents engineering challenges. Best practices for conducting annotation for large multimodal models in the most safe and ethical, yet efficient, manner have not been established. This paper presents a systematic literature review of crowd and machine learning augmented behavioral annotation methods to distill practices that may have value in multimodal implementations, cross-correlated across disciplines. Research questions were defined to provide an overview of the evolution of augmented behavioral annotation tools in the past, in relation to the present state of the art. (Contains five figures and four tables)

    Making Presentation Math Computable

    Get PDF
    This Open-Access-book addresses the issue of translating mathematical expressions from LaTeX to the syntax of Computer Algebra Systems (CAS). Over the past decades, especially in the domain of Sciences, Technology, Engineering, and Mathematics (STEM), LaTeX has become the de-facto standard to typeset mathematical formulae in publications. Since scientists are generally required to publish their work, LaTeX has become an integral part of today's publishing workflow. On the other hand, modern research increasingly relies on CAS to simplify, manipulate, compute, and visualize mathematics. However, existing LaTeX import functions in CAS are limited to simple arithmetic expressions and are, therefore, insufficient for most use cases. Consequently, the workflow of experimenting and publishing in the Sciences often includes time-consuming and error-prone manual conversions between presentational LaTeX and computational CAS formats. To address the lack of a reliable and comprehensive translation tool between LaTeX and CAS, this thesis makes the following three contributions. First, it provides an approach to semantically enhance LaTeX expressions with sufficient semantic information for translations into CAS syntaxes. Second, it demonstrates the first context-aware LaTeX to CAS translation framework LaCASt. Third, the thesis provides a novel approach to evaluate the performance for LaTeX to CAS translations on large-scaled datasets with an automatic verification of equations in digital mathematical libraries. This is an open access book
    corecore