480 research outputs found

    Does A Loss of Social Credibility Impact Robot Safety?

    Get PDF
    This position paper discusses the safety-related functions performed by assistive robots and explores the relationship between trust and effective safety risk mitigation. We identify a measure of the robot’s social effectiveness, termed social credibility, and present a discussion of how social credibility may be gained and lost. This paper’s contribution is the identification of a link between social credibility and safety-related performance. Accordingly, we draw on analyses of existing systems to demonstrate how an assistive robot’s safety-critical functionality can be impaired by a loss of social credibility. In addition, we present a discussion of some of the consequences of prioritising either safety-related functionality or social engagement. We propose the identification of a mixed-criticality scheduling algorithm in order to maximise both safety-related performance and social engagement

    ATMP: An Adaptive Tolerance-based Mixed-criticality Protocol for Multi-core Systems

    Get PDF
    © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted ncomponent of this work in other works.The challenge of mixed-criticality scheduling is to keep tasks of higher criticality running in case of resource shortages caused by faults. Traditionally, mixedcriticality scheduling has focused on methods to handle faults where tasks overrun their optimistic worst-case execution time (WCET) estimate. In this paper we present the Adaptive Tolerance based Mixed-criticality Protocol (ATMP), which generalises the concept of mixed-criticality scheduling to handle also faults of other nature, like failure of cores in a multi-core system. ATMP is an adaptation method triggered by resource shortage at runtime. The first step of ATMP is to re-partition the task to the available cores and the second step is to optimise the utility at each core using the tolerance-based real-time computing model (TRTCM). The evaluation shows that the utility optimisation of ATMP can achieve a smoother degradation of service compared to just abandoning tasks

    A Safety-Case Approach to the Ethics of Autonomous Vehicles

    Get PDF
    © 2019 Taylor & Francis. This is an Accepted Manuscript of an article published by Taylor & Francis at https://doi.org/10.1080/09617353.2019.1697918Autonomous Vehicles (AVs) have significant ethical and safety implications. Questions of informed consent and risk acceptance are of primary importance, as is an explicit identification of the ethical principles underlying these decisions. In this paper we present a process framework for producing an ethics assurance case, which can be used to translate ethical imperatives into design decisions and safety management practices. The process and resultant assurance case integrate ethical considerations into the wider engineering lifecycle, providing a tool to demonstrate that design and safety management decisions reflect an identified ethical position.Peer reviewe

    Stories and Narratives in Safety Engineering

    Get PDF
    © 2022 SCSC.The use of stories and narrative is widespread throughout safety engineering,from "war stories" to use cases In this paper we consider the effectivenessof stories in modelling safety-critical systems and challenges. We present adiscussion of how aspects of a story such as characterisation, narrative arc andsetting can affect the extent to which it adequately illuminates a software engineering problem

    Towards the Resolution of Safety and Security Conflicts

    Get PDF
    © 2021, IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. This is the accepted manuscript version of a conference paper which has been published in final form at https://doi.org/10.1109/ICCST49569.2021.9717390Safety engineering and cyber security have complementary aims, but typically realise these using different techniques, risk assessment methods and cultural approaches. As a result, the integration of safety and cyber security concerns is a complex process, with potential for conflict. We present a generalized taxonomy of common conflict areas between safety and cyber security, oriented around the development and deployment lifecycle, and supplement this with a discussion of concepts and methodologies for resolution based on the shared principle of defence-in-depth

    A Safety-Case Approach for Ethical Considerations for Autonomous Vehicles

    Get PDF
    Ethical considerations for autonomous vehicles (AVs) go beyond the “trolley problem” to include such aspects as risk / benefit trade-offs, informed consent, risk responsibility and risk mitigation within a system of systems. In this paper we present a methodology for arguing that the behaviour of a given AV meets desired ethical characteristics. We identify some of the ethical imperatives surrounding the introduction of AVs and consider how decisions made during development can impact the ethics of the AV’s behaviour

    Ethics and the safety of autonomous systems

    Get PDF
    The ethical landscape surrounding the introduction of autonomous vehicles is complex, and there are real concerns over whether the operational safety of these systems can be adequately demonstrated. In this paper we focus on the ethical factors relevant to the design and safety justification of autonomous systems, considering issues such as risk transfer, ALARP considerations, capability vs risk trade-offs and emergent behaviours. We look beyond the "trolley problem” to consider how design decisions can reflect a wider ethical framework. We also look at the wider landscape around the emergence of autonomous systems, with a particular focus on the driving social factors which encourage early adoption of new technologies in this domain. We present some arguments for encouraging an explicit discussion of social and ethical factors within the safety framework for autonomous systems

    The impact of religious salience on purchase intentions: evidence from the UAE

    Get PDF
    © 2019, Emerald Publishing Limited. Purpose: The purpose of this paper is to explore the role of religious salience on consumer purchase intentions in the multicultural environment of the UAE, more specifically on the willingness of a Muslim consumer to purchase a product labelled or packaged to include an Islamic appeal, i.e. an appeal with a heightened religious salience. While some attempts have been made in the literature to examine the impact of religious salience on purchase intentions, research amongst Muslim consumers remains under-explored. Design/methodology/approach: The authors used a randomized survey experiment administered to 148 Emirati educated female nationals. The survey consisted of pairs of advertisements, where each advertisement promoted the same product and the same brand, varying on whether they included an Islamic appeal or not in the labelling, packaging or slogan. The respondents were asked about their attitude to the different versions of the advertisements, as well as their willingness to purchase the product. The authors used causal mediation analysis to explore the mechanisms through which causal effects on purchase intentions are determined. Findings: This study shows that including an Islamic appeal, and therefore increasing the religious salience in product promotion, leads to higher purchase intentions amongst Muslim consumers. The authors also identified a number of additional moderating factors that influenced the consumer’s purchase intentions, such as product and/or brand awareness and the type of product being promoted, as well as the nature of the artefact that was included in the ad as the Islamic appeal. Finally, the causal mediation analysis suggests that Islamic appeals increases product attractiveness, which in turn leads to higher purchase intentions. Originality/value: This paper investigates the effect of religious salience on consumer behaviour and their purchase intentions. This paper makes an empirical contribution to understanding consumer behaviour with particular relevance to retail hubs with a majority Muslim population

    Defining a formal coalgebraic semantics for the rosetta specification language

    Get PDF
    Rosetta is a systems level design language that allows algebraic specification of systems through facets. The usual approach to formally describe a specification is to define an algebra that satisfies the specification. Although it is possible to formally describe Rosetta facets with the use of algebras, we choose to use the dual of algebra, i.e. coalgebra, to do so. Coalgebras are particularly suited for describing state-based systems. This makes formally defining state-based Rosetta quite straightforward. For non-state-based Rosetta, the formalization is not as direct, but can still be done with coalgebras by focusing on the behaviors of systems specified. We use denotational semantics to map Rosetta syntactic constructs into a language understood by the coalgebras.Cindy Kong and Perry Alexander, Catherine Meno

    Inconsistency Management and View Updates

    Get PDF
    AbstractInconsistency management in component-based languages is the identification and resolution of conflicting constraints or expectations between the different components which make up a system. Here we present a category theoretical framework for detecting and classifying those inconsistencies which can arise throughout a simulation. In addition, the framework permits us to apply techniques developed for defining database view updates. With these, we can analyse the set of traces of a system with respect to a particular behaviour in a subsystem
    • …
    corecore