-
Human-Centered Trustworthy Framework: A Human–Computer Interaction Perspective Computer (IF 2.2) Pub Date : 2024-03-08 Sonia Sousa, David Lamas, José Cravino, Paulo Martins
The proposed framework (Human-Centered Trustworthy Framework) provides a novel human–computer interaction approach to incorporate positive and meaningful trustful user experiences in the system design process. It helps to illustrate potential users' trust concerns in artificial intelligence and guides nonexperts to avoid designing vulnerable interactions that lead to breaches of trust.
-
Making Large Language Models More Reliable and Beneficial: Taking ChatGPT as a Case Study Computer (IF 2.2) Pub Date : 2024-03-08 Abdul Majeed, Seong Oun Hwang
This article suggests practical ways to make large language models more reliable and beneficial by taking ChatGPT as a case study. Specifically, we describe ChatGPT’s workflow and promised services and highlight the perils requiring the immediate attention of ChatGPT stakeholders.
-
Computer Highlights Society Magazines Computer (IF 2.2) Pub Date : 2024-03-06
Summary form only: Summaries of articles presented in this issue of the publication.
-
-
Safety and Artificial Intelligence in Cyberphysical Systems Computer (IF 2.2) Pub Date : 2024-03-06 Dimitrios Serpanos, Marilyn Wolf
Safe artificial intelligence/machine learning (AI/ML)-enabled systems require design methodologies that accommodate for failures in AI/ML decisions. Certification of AI/ML systems and components will increase trust and accelerate adoption, deployment, and use in critical domains.
-
Security Advantages and Challenges of 3D Heterogeneous Integration Computer (IF 2.2) Pub Date : 2024-03-06 Yuntao Liu, Daniel Xing, Isaac McDaniel, Olsan Ozbay, Abir Akib, Mumtahina Islam Sukanya, Sanjay Rekhi, Ankur Srivastava
Three-dimensional heterogeneous integration offers compelling opportunities to enhance the security and trust in the current semiconductor chain while new attack surfaces may emerge.
-
Also in this Issue Computer (IF 2.2) Pub Date : 2024-03-06 Jeffrey Voas
Summary form only: Summaries of articles presented in this issue of the publication.
-
Eight Sustainable Practices for Digital Activity Development: Drivers and Barriers in International Higher Education Collaboration Computer (IF 2.2) Pub Date : 2024-03-06 Alice Barana, Marina Marchisio Conte
Short-term technology-enhanced activities of international collaboration conducted in virtual, hybrid, or blended modalities can attract a greater number of students. We selected eight sustainable practices that higher education institutions could adopt to develop digital mobility activities.
-
-
-
Trustworthy AI-Based Personalized Insulin Recommender for Elderly People Who Have Type-2 Diabetes Computer (IF 2.2) Pub Date : 2024-03-06 Padmapritha T, Korkut Bekiroglu, Subathra Seshadhri, Seshadhri Srinivasan
We propose TRAINER, a TRustworthy Artificial Intelligence-based iNsulin recommendER for elderly individuals with type 2 diabetes, ensuring reliability and trust in insulin dosage recommendations. TRAINER exemplifies this trustworthiness and addresses such concerns by offering reliable insulin recommendations supported by clinical evidence.
-
An AI Harms and Governance Framework for Trustworthy AI Computer (IF 2.2) Pub Date : 2024-03-06 Jeremy B. Peckham
Many guidelines have been written and some frameworks proposed for the development of trustworthy artificial intelligence (AI), but a common concern is the lack of precision in definitions, which can make application difficult. This article proposes a novel governance and harms framework to provide more precision in the assessment and deployment of AI to meet trustworthiness objectives.
-
-
Trustworthy AI—Part III Computer (IF 2.2) Pub Date : 2024-03-06 Riccardo Mariani, Francesca Rossi, Rita Cucchiara, Marco Pavone, Barnaby Simkin, Ansgar Koene, Jochen Papenbrock
The final part of our Trustworthy AI special issue features four articles on AI security, reliability, trust, and AI trustworthiness as a whole.
-
Assured Autonomy, Artificial Intelligence, and Machine Learning: A Roundtable Discussion Computer (IF 2.2) Pub Date : 2024-03-06 Phil Laplante, Joanna F. DeFranco, Rick Kuhn
This report summarizes a roundtable panel discussion held at the Second Annual IEEE Workshop on Assured Autonomy, AI, and Machine Learning. Eight expert panelists discussed ways to ensure that artificial intelligence and machine learning systems are safe.
-
-
-
-
-
-
Large Language Models and Generative AI, Oh My! Computer (IF 2.2) Pub Date : 2024-03-06 Michael Zyda
Artificial intelligence (AI) has a miserable reputation regarding promises made and results delivered. Last century, there were many AI winters. The hype surrounding large language models and generative AI could join this trend, we do not hope.
-
50 & 25 Years Ago Computer (IF 2.2) Pub Date : 2024-03-06 Erich Neuhold
Summary form only: Summaries of articles presented in this issue of the publication.
-
-
Learn to Unlearn: Insights Into Machine Unlearning Computer (IF 2.2) Pub Date : 2024-03-06 Youyang Qu, Xin Yuan, Ming Ding, Wei Ni, Thierry Rakotoarivelo, David Smith
This article presents a comprehensive review of recent machine unlearning techniques, verification mechanisms, and potential attacks. We highlight emerging challenges and prospective research directions, aiming to provide valuable resources for integrating privacy, equity, and resilience into machine learning systems and help them “learn to unlearn.”
-
How Emerging Memories Extend Battery Life Computer (IF 2.2) Pub Date : 2024-03-06 Jim Handy, Tom Coughlin
Energy consumption is an issue with many connected digital products. Resolving energy efficiency issues and putting more memory in less die space create opportunities to use new nonvolatile memories for code storage and cache memory.
-
-
Machine Learning Security Against Data Poisoning: Are We There Yet? Computer (IF 2.2) Pub Date : 2024-03-06 Antonio Emanuele Cinà, Kathrin Grosse, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo
Poisoning attacks compromise the training data utilized to train machine learning (ML) models, diminishing their overall performance, manipulating predictions on specific test samples, and implanting backdoors. This article thoughtfully explores these attacks while discussing strategies to mitigate them through fundamental security principles or by implementing defensive mechanisms tailored for ML
-
Video Surveillance and Privacy: A Solvable Paradox? Computer (IF 2.2) Pub Date : 2024-03-06 Rita Cucchiara, Lorenzo Baraldi, Marcella Cornia, Sara Sarto
Through experiments on action recognition and natural language description, we show that the paradox of surveillance and privacy can be solved by artificial intelligence and that respect for human rights is not a chimera.
-
Distributed AI in Zero-Touch Provisioning for Edge Networks: Challenges and Research Directions Computer (IF 2.2) Pub Date : 2024-03-06 Abhishek Hazra, Andrea Morichetta, Ilir Murturi, Lauri Lovén, Chinmaya Kumar Dehury, Víctor Casamayor Pujol, Praveen Kumar Donta, Schahram Dustdar
This article combines Distributed Artificial Intelligence (DAI) with zero-touch provisioning (ZTP) for edge networks. Several advantages are also highlighted that come with incorporating DAI into ZTP in the context of edge networks. Further, we draw potential research directions to foster novel studies in this field.
-
The Influencer Computer (IF 2.2) Pub Date : 2024-03-06 Jeffrey Voas
In this message, we ponder whether social media is the dominant influencer of our times.
-
-
-
-
Ethics and Computing Computer (IF 2.2) Pub Date : 2024-01-31 Mike Hinchey
Disruptive technologies, especially artificial intelligence, are affecting all of us. But are we using this technology in an ethical way?
-
Avoiding Past Mistakes in Unethical Human Subjects Research: Moving From Artificial Intelligence Principles to Practice Computer (IF 2.2) Pub Date : 2024-01-31 Kristen K. Greene, Mary F. Theofanos, Craig Watson, Anne Andrews, Eyeisha Barron
Artificial intelligence (AI) is increasingly affecting many aspects of our day-to-day lives. Although the benefits of AI to society are potentially transformative, many fear the cost to human rights may be too great without focused attention.
-
Cui Bono? Software Professionals Should Always Ask “Who Benefits?” Computer (IF 2.2) Pub Date : 2024-01-31 Donald Gotterbarn, Keith W. Miller
We suggest a straightforward approach to recognizing and managing ethical challenges that arise as software is designed, developed, and deployed. The approach features two “Cui bono?” questions: “Who benefits?” and “Who is at risk?” These questions can help computing professionals deal effectively and honorably with their responsibilities.
-
How to Find the Right Scope for Open Source Developments? Computer (IF 2.2) Pub Date : 2024-01-31 Andreas Nettsträter, Marius Brehler
Working on joint open source solutions with heterogenous stakeholders requires a common understanding about the problem and the scope. The Kano model can be adapted and utilized to generate such an understanding for so-called commodities.
-
Computer Highlights Society Magazines Computer (IF 2.2) Pub Date : 2024-01-31
Summary form only: Summaries of articles presented in this issue of the publication.
-
50 & 25 Years Ago Computer (IF 2.2) Pub Date : 2024-01-31 Erich Neuhold
Summary form only: Summaries of articles presented in this issue of the publication.
-
“Thirsty” Computing Computer (IF 2.2) Pub Date : 2024-01-31 Joanna F. DeFranco, Jeffrey Voas
Much is written about the energy consumption requirements for data centers. However less is written about the water required to cool data centers. We open a discussion about this topic here.
-
In This Issue Computer (IF 2.2) Pub Date : 2024-01-31 Jeffrey Voas
Summary form only: Summaries of articles presented in this issue of the publication.
-
Experts Speak Out About Artificial Intelligence in Education: Second of Two Panel Roundtables Computer (IF 2.2) Pub Date : 2024-01-31 George Hurlburt, Sorel Reisman
Artificial intelligence cannot be used without a qualified human in the loop for education until there is a way to provide ground truth to its interactions, inputs, and outputs.
-
The International Federation for Information Processing Code of Ethics in Context Computer (IF 2.2) Pub Date : 2024-01-31 David Kreps, Moira de Roche
Herein we place the International Federation for Information Processing Code of Ethics in the context of the history of ethics, then discuss the code in terms of contemporary concerns with the professionalization of computing, what it aims to achieve, and its importance in professional practice.
-
Making AI Ethical by Design: The UNESCO Perspective Computer (IF 2.2) Pub Date : 2024-01-31 Gabriela Ramos, Mariagrazia Squicciarini, Eleonora Lamm
The rapid development of artificial intelligence (AI) technologies has generated ethical concerns around the globe due to the consequences of the misuse of these technologies. This article discusses the UNESCO Recommendation on the ethics of AI and outlines some key elements and their potential impacts.
-
Ethical Issues From Emerging AI Applications: Harms Are Happening Computer (IF 2.2) Pub Date : 2024-01-31 Frances S. Grodzinsky, Marty J. Wolf, Keith W. Miller
We discuss some of the harms of artificial intelligence (AI) and explore ethical approaches to better analyze AI applications, current harms, potential future harms, and potential benefits. One conclusion is that AI applications are continuing a worrying trend of computing increasing the power differential between the more powerful and the less powerful.
-
Resilient Virtualization Computer (IF 2.2) Pub Date : 2024-01-31 Frederico Cerveira, António Howcroft Ferreira, Raul Barbosa
Virtualization, which allows the sharing and partitioning of underlying hardware, enables application scalability and consolidation. Its broad use brings relevant opportunities along with challenges that are crucial for the success of modern computer systems. This article reviews the dependability requirements, threats, and the corresponding technical solutions for application-independent resilient
-
Self-Encrypting Drive Evolving Toward Multitenant Cloud Computing Computer (IF 2.2) Pub Date : 2024-01-31 Jisoo Kim, Mungyu Bae, Yeonsung Chu, Moon Chan Park, Dongwon Park, Dawoon Jung, Sangyeun Cho
In a multitenant cloud computing environment, user data resides in remote servers where multiple users share hardware and software components. Therefore, it is crucial to protect data against unauthorized parties within the cloud system. The self-encrypting drive is a prevalent solution to accomplish this by encrypting stored data. Currently, it does not comprehensively solve all the security problems
-
The Convergence of the Internet of Things and Artificial Intelligence in Medicine: Assessing the Benefits, Challenges, and Risks Computer (IF 2.2) Pub Date : 2024-01-31 Nina DeFranco Tommarello, Rebecca A. Deek
The adoption of the Internet of Things and artificial intelligence in health care has the power to advance diagnosis and treatment delivery in medicine. This article delivers an overview on the progress, benefits, and challenges of this convergence.
-
Toward Sustainable Computer Systems Computer (IF 2.2) Pub Date : 2024-01-31 Lieven Eeckhout
Sustainability is a pressing concern that encompasses much more than cutting carbon emissions to reach net zero. However, with the right techniques and tools, computer scientists and engineers can understand and navigate a variety of new design tradeoffs that will steer future solutions.
-
Wholesale Central Bank Digital Currencies in Asia: Current Status and Motivation Computer (IF 2.2) Pub Date : 2024-01-31 Nir Kshetri
This article provides an overview of the current status and key features of wholesale central bank digital currencies (wCBDCs) in various Asian economies and also underscores the potential benefits and challenges associated with wCBDCs.
-
How to Measure Cybersecurity and Why Heuristics Matter Computer (IF 2.2) Pub Date : 2024-01-31 Rolf Oppliger, Andreas Grünert
In this article, we continue our lessons learned from medical science and explore possibilities to measure cybersecurity and apply heuristics.
-
Directing AI: Charting a Roadmap of AI Opportunities and Risks Computer (IF 2.2) Pub Date : 2024-01-31 Mark Campbell, Mlađan Jovanović
While generative artificial intelligence’s swift adoption has presented significant security, technical, and cultural concerns, the unprecedented opportunities it introduces cannot be ignored. New techniques are emerging to help companies benefit from these opportunities while mitigating risks.
-
Exploring Heterogeneous Integration: Its Essence and Future Path Computer (IF 2.2) Pub Date : 2024-01-31 Christopher D. Nordquist, Stanley S. Chou
Heterogeneous integration, a process that involves the amalgamation of chiplets, enhances system performance and spurs innovation in various applications, including, but not limited to, artificial intelligence, sensors, and cloud computing.
-
Generative Artificial Intelligence and E-Commerce Computer (IF 2.2) Pub Date : 2024-01-31 Nir Kshetri
This article explores how generative artificial intelligence (GAI) is transforming e-commerce, with major players and startups integrating such applications. It discusses GAI’s impact on organizational structure, search costs, and consumer buying decisions.
-
-
-
-