16 research outputs found

    Architectural decisions in AI-based systems: an ontological view

    Get PDF
    Architecting AI-based systems entails making some decisions that are particular to this type of systems. Therefore, it becomes necessary to gather all necessary knowledge to inform such decisions, and to articulate this knowledge in a form that facilitates knowledge transfer among different AI projects. In this exploratory paper, we first present the main results of a literature survey in the area, and then we propose a preliminary ontology for architectural decision making, which we exemplify using a subset of the papers selected in the literature review. In the discussion, we remark on the variety of decision types and system contexts, highlighting the need to further investigate the current state of research and practice in this area. Besides, we summarize our plans to move along this research area by widening the literature review and incorporating more AI-related concepts to this first version of the ontology.This paper has been funded by the Spanish Ministerio de Ciencia e InnovaciΓ³n under project / funding scheme PID2020-117191RB-I00 / AEI/10.13039/501100011033.Peer ReviewedPostprint (author's final draft

    ΠŸΠ΅Ρ€Π²Π°Π·ΠΈΠ²Π½ΠΎΡΡ‚ΡŒ ΠΊΠ°ΠΊ Π½Π΅ΠΎΡ‚ΡŠΠ΅ΠΌΠ»Π΅ΠΌΠΎΠ΅ свойство ΡΠΎΡ†ΠΈΠΎΠΊΡƒΠ»ΡŒΡ‚ΡƒΡ€Π½ΠΎΠ³ΠΎ пространства

    Get PDF
    The socio-cultural space in the information society is subject to the so-called "digital transformations", the basis of which is the large-scale use of information and communication technologies. This space is fully informational, it is permeated with information streams between elements and actors. At the same time, streams exist both in the traditional "analog" form and in digital. The digital existence of socio-cultural information is based on the widespread use of information systems, which are based on the principles of decentralization and distribution. The socio-cultural environment is saturated with cultural objects that exist both in real and digital form. They can be either an addition to real culture or "digital doubles" of real cultural objects, or they can be independent cultural phenomena that have no analogues in the real cultural space. Digital data is not stored in one information system, but is distributed among all digital components of the socio-cultural space. These data are both generated by systems and come from various sensors that saturate the physical environment of the socio-cultural space. In the world scientific discourse, the term "pervasiveness" is used to refer to such systems, which refers both to the computing systems themselves and to processes. The concepts of "pervasive computing", "pervasive systems" and "pervasive environments" are used as stable. Based on their analysis of these concepts, it is proposed to use the term "pervasiveness" to designate as one of the main characteristics of the socio-cultural space itself, the development of which in the information age is based on the widespread use of information and communication technologies.Π‘ΠΎΡ†ΠΈΠΎΠΊΡƒΠ»ΡŒΡ‚ΡƒΡ€Π½ΠΎΠ΅ пространство Π² ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΌ общСствС ΠΏΠΎΠ΄Π²Π΅Ρ€ΠΆΠ΅Π½ΠΎ Ρ‚Π°ΠΊ Π½Π°Π·Ρ‹Π²Π°Π΅ΠΌΡ‹ΠΌ Β«Ρ†ΠΈΡ„Ρ€ΠΎΠ²Ρ‹ΠΌ трансформациям», основой ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Ρ… являСтся ΡˆΠΈΡ€ΠΎΠΊΠΎΠΌΠ°ΡΡˆΡ‚Π°Π±Π½ΠΎΠ΅ использованиС ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎ-ΠΊΠΎΠΌΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΠΉ. Π’ ΠΏΠΎΠ»Π½ΠΎΠΉ ΠΌΠ΅Ρ€Π΅ это пространство являСтся ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹ΠΌ, ΠΎΠ½ΠΎ ΠΏΡ€ΠΎΠ½ΠΈΠ·Π°Π½ΠΎ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹ΠΌΠΈ ΠΏΠΎΡ‚ΠΎΠΊΠ°ΠΌΠΈ ΠΌΠ΅ΠΆΠ΄Ρƒ элСмСнтами ΠΈ Π°ΠΊΡ‚ΠΎΡ€Π°ΠΌΠΈ. ΠŸΡ€ΠΈ этом ΠΏΠΎΡ‚ΠΎΠΊΠΈ ΡΡƒΡ‰Π΅ΡΡ‚Π²ΡƒΡŽΡ‚ ΠΊΠ°ΠΊ Π² Ρ‚Ρ€Π°Π΄ΠΈΡ†ΠΈΠΎΠ½Π½ΠΎΠΉ Β«Π°Π½Π°Π»ΠΎΠ³ΠΎΠ²ΠΎΠΉΒ» Ρ„ΠΎΡ€ΠΌΠ΅, Ρ‚Π°ΠΊ ΠΈ Π² Ρ†ΠΈΡ„Ρ€ΠΎΠ²ΠΎΠΉ. Цифровая Π±Ρ‹Ρ‚ΠΈΠΉΠ½ΠΎΡΡ‚ΡŒ ΡΠΎΡ†ΠΈΠΎΠΊΡƒΠ»ΡŒΡ‚ΡƒΡ€Π½ΠΎΠΉ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ основана Π½Π° повсСмСстном использовании ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… систСм, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ строятся Π½Π° основах Π΄Π΅Ρ†Π΅Π½Ρ‚Ρ€Π°Π»ΠΈΠ·Π°Ρ†ΠΈΠΈ ΠΈ распрСдСлённости. Π‘ΠΎΡ†ΠΈΠΎΠΊΡƒΠ»ΡŒΡ‚ΡƒΡ€Π½Π°Ρ срСда насыщСна ΠΎΠ±ΡŠΠ΅ΠΊΡ‚Π°ΠΌΠΈ ΠΊΡƒΠ»ΡŒΡ‚ΡƒΡ€Ρ‹, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΡΡƒΡ‰Π΅ΡΡ‚Π²ΡƒΡŽΡ‚ ΠΊΠ°ΠΊ Π² Ρ€Π΅Π°Π»ΡŒΠ½ΠΎΠΉ, Ρ‚Π°ΠΊ ΠΈ Π² Ρ†ΠΈΡ„Ρ€ΠΎΠ²ΠΎΠΉ Ρ„ΠΎΡ€ΠΌΠ΅. Они ΠΌΠΎΠ³ΡƒΡ‚ Π±Ρ‹Ρ‚ΡŒ ΠΊΠ°ΠΊ Π΄ΠΎΠΏΠΎΠ»Π½Π΅Π½ΠΈΠ΅ΠΌ Ρ€Π΅Π°Π»ΡŒΠ½ΠΎΠΉ ΠΊΡƒΠ»ΡŒΡ‚ΡƒΡ€Ρ‹ ΠΈΠ»ΠΈ Β«Ρ†ΠΈΡ„Ρ€ΠΎΠ²Ρ‹ΠΌΠΈ Π΄Π²ΠΎΠΉΠ½ΠΈΠΊΠ°ΠΌΠΈΒ» Ρ€Π΅Π°Π»ΡŒΠ½Ρ‹Ρ… ΠΎΠ±ΡŠΠ΅ΠΊΡ‚ΠΎΠ² ΠΊΡƒΠ»ΡŒΡ‚ΡƒΡ€Ρ‹, Ρ‚Π°ΠΊ ΠΈ Π±Ρ‹Ρ‚ΡŒ ΡΠ°ΠΌΠΎΡΡ‚ΠΎΡΡ‚Π΅Π»ΡŒΠ½Ρ‹ΠΌΠΈ ΠΊΡƒΠ»ΡŒΡ‚ΡƒΡ€Π½Ρ‹ΠΌΠΈ Ρ„Π΅Π½ΠΎΠΌΠ΅Π½Π°ΠΌΠΈ, Π½Π΅ ΠΈΠΌΠ΅ΡŽΡ‰ΠΈΠΌΠΈ Π°Π½Π°Π»ΠΎΠ³ΠΎΠ² Π² Ρ€Π΅Π°Π»ΡŒΠ½ΠΎΠΌ пространствС ΠΊΡƒΠ»ΡŒΡ‚ΡƒΡ€Ρ‹. Π¦ΠΈΡ„Ρ€ΠΎΠ²Ρ‹Π΅ Π΄Π°Π½Π½Ρ‹Π΅ Π½Π΅ хранятся Π² ΠΎΠ΄Π½ΠΎΠΉ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмС, Π° распрСдСлСны ΠΌΠ΅ΠΆΠ΄Ρƒ всСми Ρ†ΠΈΡ„Ρ€ΠΎΠ²Ρ‹ΠΌΠΈ ΠΊΠΎΠΌΠΏΠΎΠ½Π΅Π½Ρ‚Π°ΠΌΠΈ ΡΠΎΡ†ΠΈΠΎΠΊΡƒΠ»ΡŒΡ‚ΡƒΡ€Π½ΠΎΠ³ΠΎ пространства. Π­Ρ‚ΠΈ Π΄Π°Π½Π½Ρ‹Π΅ ΠΊΠ°ΠΊ Π³Π΅Π½Π΅Ρ€ΠΈΡ€ΡƒΡŽΡ‚ΡΡ систСмами, Ρ‚Π°ΠΊ ΠΈ ΠΏΠΎΡΡ‚ΡƒΠΏΠ°ΡŽΡ‚ с Ρ€Π°Π·Π»ΠΈΡ‡Π½Ρ‹Ρ… Π΄Π°Ρ‚Ρ‡ΠΈΠΊΠΎΠ², ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΌΠΈ насыщСна физичСская срСда ΡΠΎΡ†ΠΈΠΎΠΊΡƒΠ»ΡŒΡ‚ΡƒΡ€Π½ΠΎΠ³ΠΎ пространства. Π’ ΠΌΠΈΡ€ΠΎΠ²ΠΎΠΌ Π½Π°ΡƒΡ‡Π½ΠΎΠΌ дискурсС для обозначСния Ρ‚Π°ΠΊΠΈΡ… систСм ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅Ρ‚ΡΡ Ρ‚Π΅Ρ€ΠΌΠΈΠ½ Β«ΠΏΠ΅Ρ€Π²Π°Π·ΠΈΠ²Π½ΠΎΡΡ‚ΡŒΒ», ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ относится ΠΊΠ°ΠΊ ΠΊ самим Π²Ρ‹Ρ‡ΠΈΡΠ»ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹ΠΌ систСмам, Ρ‚Π°ΠΊ ΠΈ ΠΊ процСссам. Как устойчивыС ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΡŽΡ‚ΡΡ понятия Β«ΠΏΠ΅Ρ€Π²Π°Π·ΠΈΠ²Π½Ρ‹Π΅ вычислСния», Β«ΠΏΠ΅Ρ€Π²Π°Π·ΠΈΠ²Π½Ρ‹Π΅ систСмы» ΠΈ Β«ΠΏΠ΅Ρ€Π²Π°Π·ΠΈΠ²Π½Ρ‹Π΅ срСды». Π˜ΡΡ…ΠΎΠ΄Ρ ΠΈΡ… Π°Π½Π°Π»ΠΈΠ·Π° этих понятий прСдлагаСтся ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒ Ρ‚Π΅Ρ€ΠΌΠΈΠ½ Β«ΠΏΠ΅Ρ€Π²Π°Π·ΠΈΠ²Π½ΠΎΡΡ‚ΡŒΒ» для обозначСния ΠΊΠ°ΠΊ ΠΎΠ΄Π½ΠΎΠΉ ΠΈΠ· основных характСристик самого ΡΠΎΡ†ΠΈΠΎΠΊΡƒΠ»ΡŒΡ‚ΡƒΡ€Π½ΠΎΠ³ΠΎ пространства, Ρ€Π°Π·Π²ΠΈΡ‚ΠΈΠ΅ ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠ³ΠΎ Π² ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΡƒΡŽ эпоху основываСтся Π½Π° повсСмСстном ΠΏΡ€ΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠΈ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎ-ΠΊΠΎΠΌΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΠΎΠ½Π½Ρ… Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΠΉ

    Towards Specifying And Evaluating The Trustworthiness Of An AI-Enabled System

    Get PDF
    Applied AI has shown promise in the data processing of key industries and government agencies to extract actionable information used to make important strategical decisions. One of the core features of AI-enabled systems is the trustworthiness of these systems which has an important implication for the robustness and full acceptance of these systems. In this paper, we explain what trustworthiness in AI-enabled systems means, and the key technical challenges of specifying, and verifying trustworthiness. Toward solving these technical challenges, we propose a method to specify and evaluate the trustworthiness of AI-based systems using quality-attribute scenarios and design tactics. Using our trustworthiness scenarios and design tactics, we can analyze the architectural design of AI-enabled systems to ensure that trustworthiness has been properly expressed and achieved.The contributions of the thesis include (i) the identification of the trustworthiness sub-attributes that affect the trustworthiness of AI systems (ii) the proposal of trustworthiness scenarios to specify trustworthiness in an AI system (iii) a design checklist to support the analysis of the trustworthiness of AI systems and (iv) the identification of design tactics that can be used to achieve trustworthiness in an AI system

    Explainable Information Security: Development of a Construct and Instrument

    Get PDF
    Despite the increasing efforts to encourage information security (InfoSec) compliance, employees’ refusal to follow and adopt InfoSec remains a challenge for organisations. Advancements in the behavioural InfoSec field have recently highlighted the importance of developing usable and employeecentric InfoSec that can motivate InfoSec compliance more effectively. In this research, we conceptualise the theoretical structure for a new concept called explainable InfoSec and develop a research instrument for collecting data about this concept. Data was then collected from 724 office workers via an online survey. Exploratory and confirmatory factor analyses were performed to validate the theoretical structure of the explainable InfoSec construct, and we performed structural equation modelling to examine the construct’s impact on intention to comply with organisational InfoSec. The validated theoretical structure of explainable InfoSec consists of two dimensions, fairness and transparency, and the construct was found to positively influence compliance intention

    Perspectives on Computing Ethics: a Multi-Stakeholder Analysis

    Get PDF
    Purpose: Computing ethics represents a long established, yet rapidly evolving, discipline that grows in complexity and scope on a near-daily basis. Therefore, to help understand some of that scope it is essential to incorporate a range of perspectives, from a range of stakeholders, on current and emerging ethical challenges associated with computer technology. This study aims to achieve this by using, a three-pronged, stakeholder analysis of Computer Science academics, ICT industry professionals, and citizen groups was undertaken to explore what they consider to be crucial computing ethics concerns. The overlap between these stakeholder groups are explored, as well as whether their concerns are reflected in the existing literature. Design/methodology/approach: Data collection was performed using focus groups, and the data was analysed using a thematic analysis. The data was also analysed to determine if there were overlaps between the literature and the stakeholders’ concerns and attitudes towards computing ethics. Findings: The results of the focus group analysis show a mixture of overlapping concerns between the different groups, as well as some concerns that are unique to each of the specific groups. All groups stressed the importance of data as a key topic in computing ethics. This includes concerns around the accuracy, completeness and representativeness of datasets used to develop computing applications. Academics were concerned with the best ways to teach computing ethics to university students. Industry professionals believed that a lack of diversity in software teams resulted in important questions not being asked during design and development. Citizens discussed at length the negative and unexpected impacts of social media applications. These are all topics that have gained broad coverage in the literature. Originality: The multi-stakeholder analysis provides individual and differing perspectives on the issues related to the rapidly evolving discipline of computing ethics. Social implications: In recent years, the impact of Information and Communication Technologies (ICT) on society and the environment at large has grown tremendously. From this fast-paced growth, a myriad of ethical concerns have arisen. Our analysis aims to shed light on what a diverse group of stakeholders consider the most important social impacts of technology and whether these concerns are reflected in the literature on computing ethics. The outcomes of this analysis will form the basis for new teaching content that will be developed in future to help illuminate and address these concerns

    From P4 medicine to P5 medicine: transitional times for a more human-centric approach to AI-based tools for hospitals of tomorrow

    Get PDF
    Within the debate on shaping future clinical services, where different robotics and artificial intelligence (AI) based technologies are integrated to perform tasks, the authors take the chance to provide an interdisciplinary analysis required to validate a tool aiming at supporting the melanoma cancer diagnosis. In particular, they focus on the ethical-legal and technical requirements needed to address the Assessment List on Trustworthy AI (ALTAI), highlighting some pros and cons of the adopted self-assessment checklist. The dialogue stimulates additionally remarks on the EU regulatory initiatives on AI in the healthcare systems

    Reframing data ethics in research methods education: a pathway to critical data literacy

    Get PDF
    This paper presents an ethical framework designed to support the development of critical data literacy for research methods courses and data training programmes in higher education. The framework we present draws upon our reviews of literature, course syllabi and existing frameworks on data ethics. For this research we reviewed 250 research methods syllabi from across the disciplines, as well as 80 syllabi from data science programmes to understand how or if data ethics was taught. We also reviewed 12 data ethics frameworks drawn from different sectors. Finally, we reviewed an extensive and diverse body of literature about data practices, research ethics, data ethics and critical data literacy, in order to develop a transversal model that can be adopted across higher education. To promote and support ethical approaches to the collection and use of data, ethics training must go beyond securing informed consent to enable a critical understanding of the techno-centric environment and the intersecting hierarchies of power embedded in technology and data. By fostering ethics as a method, educators can enable research that protects vulnerable groups and empower communities

    Reframing data ethics in research methods education: a pathway to critical data literacy

    Get PDF
    This paper presents an ethical framework designed to support the development of critical data literacy for research methods courses and data training programmes in higher education. The framework we present draws upon our reviews of literature, course syllabi and existing frameworks on data ethics. For this research we reviewed 250 research methods syllabi from across the disciplines, as well as 80 syllabi from data science programmes to understand how or if data ethics was taught. We also reviewed 12 data ethics frameworks drawn from different sectors. Finally, we reviewed an extensive and diverse body of literature about data practices, research ethics, data ethics and critical data literacy, in order to develop a transversal model that can be adopted across higher education. To promote and support ethical approaches to the collection and use of data, ethics training must go beyond securing informed consent to enable a critical understanding of the techno-centric environment and the intersecting hierarchies of power embedded in technology and data. By fostering ethics as a method, educators can enable research that protects vulnerable groups and empower communities
    corecore