Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- extended-abstractNovember 2024
"What is Safety?": Building Bridges Across Approaches to Digital Risks and Harms
- Ashley Marie Walker,
- Michael Ann DeVito,
- Karla Badillo-Urquiola,
- Rosanna Bellini,
- Stevie Chancellor,
- Jessica L. Feuston,
- Kathryn Henne,
- Patrick Gage Kelley,
- Shalaleh Rismani,
- Renee Shelby,
- Renwen Zhang
CSCW Companion '24: Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social ComputingPages 736–739https://doi.org/10.1145/3678884.3681824Safety is a frequently discussed and increasingly important topic in Human-Computer Interaction (HCI) and one historically wellrepresented at CSCW [30]. However, CSCW is a diverse community that engages multiple fields and perspectives; therefore, the ...
- research-articleSeptember 2024
Riding the waves of uncertainty: Towards strategic agility in medicine supply systems
Journal of Operations Management (WILEY-JOM), Volume 70, Issue 8Pages 1234–1260https://doi.org/10.1002/joom.1330AbstractWe investigate how organizations embedded in a supply system collectively respond to risks and seize opportunities arising from crisis events under shifting forms of uncertainty. Using the United Kingdom (UK) medicine supply system as the ...
Highlights- In supply systems, learning evolves as crisis events unfold, changing from surface (know‐what) to deep (know‐why and ‐how) to transcendent (understanding system effects into the future and in relation to other supply systems).
- As learning ...
- research-articleJune 2024
Mapping the individual, social and biospheric impacts of Foundation Models
- Andrés Domínguez Hernández,
- Shyam Krishna,
- Antonella Maia Perini,
- Michael Katell,
- SJ Bennett,
- Ann Borda,
- Youmna Hashem,
- Semeli Hadjiloizou,
- Sabeehah Mahomed,
- Smera Jayadeva,
- Mhairi Aitken,
- David Leslie
FAccT '24: Proceedings of the 2024 ACM Conference on Fairness, Accountability, and TransparencyPages 776–796https://doi.org/10.1145/3630106.3658939Responding to the rapid roll-out and large-scale commercialization of foundation models, large language models, and generative AI, an emerging body of work is shedding light on the myriad impacts these technologies are having across society. Such ...
- research-articleJune 2024
A Framework for Exploring the Consequences of AI-Mediated Enterprise Knowledge Access and Identifying Risks to Workers
FAccT '24: Proceedings of the 2024 ACM Conference on Fairness, Accountability, and TransparencyPages 207–220https://doi.org/10.1145/3630106.3658900Organisations generate vast amounts of information, which has resulted in a long-term research effort into knowledge access systems for enterprise settings. Recent developments in artificial intelligence, in relation to large language models, are poised ...
- research-articleJune 2024
Information Analysis in Risk Management of BP (Using the Example of Metallurgical Enterprises)
Automatic Documentation and Mathematical Linguistics (SPADML), Volume 58, Issue 2Pages 149–157https://doi.org/10.3103/S0005105524700018AbstractTo unify the understanding of and improvements to management efficiency, the conceptual apparatus of information support for risk management of BP is clarified, and methods of analysis and assessment of risk in the information environment are ...
-
- introductionMarch 2024
Introduction to the Issue on Artificial Intelligence in the Public Sector: Risks and Benefits of AI for Governments
Digital Government: Research and Practice (DGOV), Volume 5, Issue 1Article No.: 1, Pages 1–6https://doi.org/10.1145/3636550Artificial Intelligence (AI) is increasingly adopted by public sector organizations to provide better public services and to transform their internal processes. AI is now considered a key enabler for digital innovation and transformation in the public ...
- research-articleOctober 2024
Rating Risks in Robotic Process Automation (RPA) Projects: An Expert Assessment Using an Impact-Uncontrollability Matrix
Procedia Computer Science (PROCS), Volume 239, Issue CPages 185–192https://doi.org/10.1016/j.procs.2024.06.161AbstractThis research paper explores the risks associated with Robotic Process Automation (RPA) projects, with a focus on the impact of disregarding key factors that affect project success. While previous studies have identified challenges and success ...
- research-articleApril 2023
Speculating on Risks of AI Clones to Selfhood and Relationships: Doppelganger-phobia, Identity Fragmentation, and Living Memories
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 7, Issue CSCW1Article No.: 91, Pages 1–28https://doi.org/10.1145/3579524Digitally replicating the appearance and behaviour of individuals is becoming feasible with recent advancements in deep-learning technologies such as interactive deepfake applications, voice conversion, and virtual actors. Interactive applications of ...
- research-articleMarch 2022
Predicting Potential Threats and Megarisks in Information Technology Development
Scientific and Technical Information Processing (SPSTIP), Volume 49, Issue 1Pages 48–59https://doi.org/10.3103/S0147688222010130AbstractThis paper considers the methodological aspects of forecasting the emergence of threats and risks relating to the development of information technologies on the basis of a multicriterion analysis of human interaction with the information ...
- research-articleJanuary 2022
A state-of-the-art security and attacks analysis in blockchain applications network
International Journal of Communication Networks and Distributed Systems (IJCNDS), Volume 28, Issue 2Pages 199–218https://doi.org/10.1504/ijcnds.2022.121199In recent years, blockchain has emerged as one of the promising technologies in applications like internet of things, smart city, digital management, healthcare system, supply chain management, real estate business, smart agriculture, smart retail and ...
- research-articleJanuary 2022
Some reflections on the current PID landscape – with an emphasis on risks and trust issues
Procedia Computer Science (PROCS), Volume 211, Issue CPages 28–35https://doi.org/10.1016/j.procs.2022.10.173AbstractThe current landscape around persistent identifiers (PIDs) keeps quickly evolving. Some PIDs like Digital Object Identifiers (DOIs) for publications and datasets or ORCIDs (Open Researcher and Contributor ID) for persistent author identification ...
- research-articleOctober 2021
Risk Reflexity and the Information Interpretation Conflict under the Conditions of the Coronacrisis
Scientific and Technical Information Processing (SPSTIP), Volume 48, Issue 4Pages 258–264https://doi.org/10.3103/S0147688221040067Abstract—The new design of the relationship between risk reflection and information management, the formation of trust in information in the context of the COVID-19 pandemic, and information parameters of the coronavirus crisis were investigated here. An ...
- research-articleSeptember 2021
HCI - H is also for Hazard: Using HAZOP to Identify Undesirable Consequences in Socio-Technical Systems
COMPASS '21: Proceedings of the 4th ACM SIGCAS Conference on Computing and Sustainable SocietiesPages 230–242https://doi.org/10.1145/3460112.3471959Technical interventions in socio-technical systems are often portrayed overly positively but can also have undesirable consequences which can directly impact adoption and sustainability. Systematically identifying what might go wrong is not ...
- posterApril 2021Best Poster
Assessing the Alignment of Social Robots with Trustworthy AI Design Guidelines: A Preliminary Research Study
CODASPY '21: Proceedings of the Eleventh ACM Conference on Data and Application Security and PrivacyPages 325–327https://doi.org/10.1145/3422337.3450325The last few years have seen a strong movement supporting the need of having intelligent consumer products align with specific design guidelines for trustworthy artificial intelligence (AI). This global movement has led to multiple institutional ...
- research-articleApril 2021
Trends and Risks of Network Technologies
Scientific and Technical Information Processing (SPSTIP), Volume 48, Issue 2Pages 97–106https://doi.org/10.3103/S0147688221020088AbstractSeveral new directions and trends in the development of network technologies are analyzed by a system approach using scientometric methods and comparative analysis. The spectrum of potential negative consequences of applying new information and ...
- research-articleJanuary 2021
Bayesian assessment of utility tunnel risk based on information sharing mechanism
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 41, Issue 4Pages 4749–4757https://doi.org/10.3233/JIFS-189961The main body of the utility tunnel is all kinds of pipelines, so the normal operation of the pipelines is very important for the operation benefit of the comprehensive utility tunnel; meanwhile, identifying the potential risks of the pipelines in time ...
- research-articleJanuary 2021
Vulnerability and security risk assessment in a IIoT environment in compliance with standard IEC 62443
- Hicham Lalaoui Hassani,
- Ayoub Bahnasse,
- Eric Martin,
- Christian Roland,
- Omar Bouattane,
- Mohammed El Mehdi Diouri
Procedia Computer Science (PROCS), Volume 191, Issue CPages 33–40https://doi.org/10.1016/j.procs.2021.07.008AbstractIndustrial networks based on the Internet of Things (IoT) have become the backbone of Industry 4.0. Indeed, these connected objects increase the efficiency, flexibility and autonomy of machines, thus improving the productivity and profitability of ...
- research-articleMay 2021
The specific of business reputation value measurement in transformational economy (on example of economy of the Republic of Belarus)
DTMIS '20: Proceedings of the International Scientific Conference - Digital Transformation on Manufacturing, Infrastructure and ServiceArticle No.: 89, Pages 1–8https://doi.org/10.1145/3446434.3446523Globalization of economy and overcoming of the world economic crisis consequences increases the value of evidence-based suggestions to improve management in domestic industrial organizations. The increase of the competition from foreign business defines ...
- research-articleMay 2021
Innovation in the Iranian economy: Risks and threats to Iran's national economic security
DTMIS '20: Proceedings of the International Scientific Conference - Digital Transformation on Manufacturing, Infrastructure and ServiceArticle No.: 57, Pages 1–7https://doi.org/10.1145/3446434.3446511The problem of ensuring national economic security is characteristic of all countries. It is particularly relevant for countries with developing economies - owners of natural resources. The consumer attitude of such states to their resource potential ...
- research-articleMarch 2021
Scientific and Practical Recommendations for Outsourcing of Logistics Activities
SPBPU IDE '20: Proceedings of the 2nd International Scientific Conference on Innovations in Digital EconomyArticle No.: 27, Pages 1–5https://doi.org/10.1145/3444465.3444505It is indisputable and proven in today's market relations that outsourcing is a modern form of doing business based on a development strategy and the transfer of a part of management functions or individual business processes by the customer for a long ...