9 research outputs found

    Academic Year 2019-2020 Faculty Excellence Showcase, AFIT Graduate School of Engineering & Management

    Get PDF
    An excerpt from the Dean\u27s Message: There is no place like the Air Force Institute of Technology (AFIT). There is no academic group like AFIT’s Graduate School of Engineering and Management. Although we run an educational institution similar to many other institutions of higher learning, we are different and unique because of our defense-focused graduate-research-based academic programs. Our programs are designed to be relevant and responsive to national defense needs. Our programs are aligned with the prevailing priorities of the US Air Force and the US Department of Defense. Our faculty team has the requisite critical mass of service-tested faculty members. The unique composition of pure civilian faculty, military faculty, and service-retired civilian faculty makes AFIT truly unique, unlike any other academic institution anywhere

    The Philosophy of Online Manipulation

    Get PDF
    Are we being manipulated online? If so, is being manipulated by online technologies and algorithmic systems notably different from human forms of manipulation? And what is under threat exactly when people are manipulated online? This volume provides philosophical and conceptual depth to debates in digital ethics about online manipulation. The contributions explore the ramifications of our increasingly consequential interactions with online technologies such as online recommender systems, social media, user friendly design, microtargeting, default settings, gamification, and real time profiling. The authors in this volume address four broad and interconnected themes: What is the conceptual nature of online manipulation? And how, methodologically, should the concept be defined? Does online manipulation threaten autonomy, freedom, and meaning in life and if so, how? What are the epistemic, affective, and political harms and risks associated with online manipulation? What are legal and regulatory perspectives on online manipulation? This volume brings these various considerations together to offer philosophically robust answers to critical questions concerning our online interactions with one another and with autonomous systems. The Philosophy of Online Manipulation will be of interest to researchers and advanced students working in moral philosophy, digital ethics, philosophy of technology, and the ethics of manipulation

    Unmanned Aircraft Systems in the Cyber Domain

    Get PDF
    Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions. This second edition discusses state-of-the-art technology issues facing US UAS designers. It focuses on counter unmanned aircraft systems (C-UAS) – especially research designed to mitigate and terminate threats by SWARMS. Topics include high-altitude platforms (HAPS) for wireless communications; C-UAS and large scale threats; acoustic countermeasures against SWARMS and building an Identify Friend or Foe (IFF) acoustic library; updates to the legal / regulatory landscape; UAS proliferation along the Chinese New Silk Road Sea / Land routes; and ethics in this new age of autonomous systems and artificial intelligence (AI).https://newprairiepress.org/ebooks/1027/thumbnail.jp

    Ethical Issues in Covert, Security and Surveillance Research

    Get PDF
    The ebook edition of this title is Open Access and freely available to read online. The EU-funded PRO-RES Project aimed to produce a guidance framework that helps to deliver Responsible Research and Innovation (RRI). PRO-RES is a Horizon 2020 project coordinated by the European Science Foundation (ESF), involving 14 different partners across Europe. As one of a series of open access products of the Project, Ethical Issues in Covert, Security and Surveillance Research will be placed in the hands of policymakers and their advisors to offer practical and efficient ways to respond to the issues addressed. Understanding that the problem of covert research and surveillance research for security purposes have proven highly challenging for all research ethics appraisal services, the chapters here are valuable resources for expert reviewers, helping further the discussion of these complex ethical issues, and raising the standards applied to the process. Delivering an applied approach, and influencing where it counts, this volume showcases that it is only when the integrity of research is carefully pursued can users of the evidence produced be assured of its value and its ethical credentials

    Derogatory, Racist, and Discriminatory Speech (DRDS) in Video Gaming

    Get PDF
    Video games have been examined for their effects on cognition, learning, health, and physiological arousal, yet research on social dynamics within video gaming is limited. Studies have documented the presence of derogation, racism, and discrimination in this anonymous medium. However, gamers‟ firsthand experiences are typically examined qualitatively. Thus, this study aimed to establish a quantitative baseline for the frequency of derogatory, racist, and discriminatory speech (DRDS) in gaming. DRDS frequency, sexual harassment, and hate speech measures were administered to 150 individuals from online forums and social media groups. Descriptive and inferential analyses were used to gauge which factors affected DRDS rates. Sex, intergroup and fast-paced game types, time played with others, and identity portrayal showed positive correlations with DRDS. Results indicate an array of complex social and developmental factors contribute to experiencing, perceiving, and personally using DRDS. Implications include psychosocial health impacts similar to everyday harassment, with women being at a higher risk and age as a contributing factor

    Ethical Issues in Covert, Security and Surveillance Research

    Get PDF
    The ebook edition of this title is Open Access and freely available to read online. The EU-funded PRO-RES Project aimed to produce a guidance framework that helps to deliver Responsible Research and Innovation (RRI). PRO-RES is a Horizon 2020 project coordinated by the European Science Foundation (ESF), involving 14 different partners across Europe. As one of a series of open access products of the Project, Ethical Issues in Covert, Security and Surveillance Research will be placed in the hands of policymakers and their advisors to offer practical and efficient ways to respond to the issues addressed. Understanding that the problem of covert research and surveillance research for security purposes have proven highly challenging for all research ethics appraisal services, the chapters here are valuable resources for expert reviewers, helping further the discussion of these complex ethical issues, and raising the standards applied to the process. Delivering an applied approach, and influencing where it counts, this volume showcases that it is only when the integrity of research is carefully pursued can users of the evidence produced be assured of its value and its ethical credentials

    Cyber Security of Critical Infrastructures

    Get PDF
    Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods

    Creating Chaos Online

    Get PDF
    Unmasks the disinformation propagated by Russian trolling in public discours
    corecore