Accountability in Computer Systems

Author(s):  
Joshua A. Kroll

This chapter addresses the relationship between AI systems and the concept of accountability. To understand accountability in the context of AI systems, one must begin by examining the various ways the term is used and the variety of concepts to which it is meant to refer. Accountability is often associated with transparency, the principle that systems and processes should be accessible to those affected through an understanding of their structure or function. For a computer system, this often means disclosure about the system’s existence, nature, and scope; scrutiny of its underlying data and reasoning approaches; and connection of the operative rules implemented by the system to the governing norms of its context. Transparency is a useful tool in the governance of computer systems, but only insofar as it serves accountability. There are other mechanisms available for building computer systems that support accountability of their creators and operators. Ultimately, accountability requires establishing answerability relationships that serve the interests of those affected by AI systems.

2020 ◽  
Vol 1 (01) ◽  
pp. 13-20
Author(s):  
Dian Saputra

This study aims to find out the relationship between learning style and students’ knowledge aspect on Computer System Subject at SMK IT Rahmatan Karimah of  Central Bengkulu, the type of research is quantitative and the subject of research is grade X in SMK IT Rahmatan Karimah of  Central Bengkulu. Data collection techniques using observation, Questionnaire and documentation. Data analysis techniques used were Descriptive Analysis, and inferential Statistical Analysis. The results of visual learning style post-test were 11 people with a mean of 76.36, an auditory learning style of 8 people at a mean of 62.14, a kinesthetic learning style of 3 people at a mean of 50.33, apart from that (r x y = 2.35) and the magnitude of r is reflected in the table (r table = 0.4132). Then rxy > r table ie = 2.35> 0.4132. In other words, Ho is rejected and Ha is accepted. It has a significant relationship between the learning styles of students and students’ knowledge aspect on Computer System Subject of grade X TKJ in SMK IT Rahmatan Karimah of  Central Bengkulu


2020 ◽  
Author(s):  
S Mukhtar Ayubi Simatupang

AbstrakBrainware adalah istilah yang digunakan untuk manusia yang digunakan untuk manusia yang berhubungan dengan sistem komputer. Manusia merupakan suatu elemen dari sistem komputer yang merancang bagaimana suatu mesin dapat bekerja sesuai dengan hasil yang diinginkan. Tingkatan brainware terdiri atas system analyst, programmer, administrator, dan operator. Bagian bagian brainware terdiri atas operator komputer, teknisi, trainer, konsultan, project manager, programmer, grapic designer, spesialis jaringan, database administrator, dan system analitis. Kata Kunci : Brainware (Perangkat Sumber Daya Manusia)AbstractBrainware is a term used for humans that is used for humans related to computer systems. Humans are an element of a computer system that designs how a machine can work in accordance with the desired results. The brainware level consists of system analysts, programmers, administrators, and operators. The brainware section consists of computer operators, technicians, trainers, consultants, project managers, programmers, grapic designers, network specialists, database administrators, and system analytics.Keywords: Brainware (Human Resources Tool)


1985 ◽  
Vol 10 (2) ◽  
pp. 79-86 ◽  
Author(s):  
Anne Costigan ◽  
Frances E. Wood ◽  
David Bawden

A comparative evaluation of three implementations of a large databank, the NIOSH Registry of Toxic Effects of Chem ical Substances, has been carried out. The three implementa tions are: a printed index, a text searching computer system, and a computerised chemical databank system, with substruc ture searching facilities. Seven test queries were used, with the aim of drawing conclusions of general relevance to chemical databank searching. The computer systems were shown to have advantages over printed indexes for several of the queries, including those involving an element of browsing. Substructure search facilities were especially advantageous. Aspects of indexing of data present, and the criteria for inclusion of types of data, were also highlighted.


1988 ◽  
Vol 13 (1) ◽  
pp. 25-32 ◽  
Author(s):  
T V Seshadri ◽  
N Kinra

Who, in the organization, buys the computer system? How are various departments involved in the organizational decision process? T V Seshadri and N Kinra analyse the decision processes of 30 organizations that had bought a computer system—mini, mainframe, or macro. Based on a questionnaire study and factor analysis, the authors conclude that the EDP department and Board of Directors are critical in the buying grids of the purchasing organizations. They draw implications of their findings for managers marketing computer systems.


Author(s):  
Алексей Леонидович Сердечный ◽  
Павел Сергеевич Краюшкин ◽  
Михаил Андреевич Тарелкин ◽  
Юрий Константинович Язов

Статья посвящена моделированию компьютерных атак на распределённые корпоративные компьютерные системы, на примере действий группировки Advanced Persistent Threat 29 (APT29). В статье предлагается подход моделирования способов, реализуемых указанной группировкой, а также мер защиты от них. Подход основан на использовании аппарата сетей Петри, а также сведений о технических приёмах, предоставляемых в рамках проекта MITRE ATT&CK. Разработанные модели учитывают связи по условиям и последствиям действий, совершаемых группировкой APT29 в ходе атак на распределённые корпоративные системы. Также в статье продемонстрирована возможность наращивания модели за счёт включения в неё моделей мер защиты от рассмотренных способов реализации компьютерных атак. Предлагаемые модели могут быть дополнены за счёт моделирования новых способов реализации компьютерных атак, используемых другими кибергруппировками. Кроме того, модели могут быть расширены до моделей сети Петри-Маркова путём реализации частным методик расчёта вероятностно-временных характеристик для фрагментов предлагаемых моделей. The article is devoted to modeling computer attacks on distributed corporate computer systems, using the example of the actions of the Advanced Persistent Threat 29 (APT29) group. The article proposes an approach to modeling the methods implemented by this grouping, as well as measures to protect against them. The approach is based on Petri nets and information about the techniques (MITRE ATT&CK project). The developed models take into account the relationship between the conditions and consequences of actions committed by the APT29 group during attacks on distributed enterprise systems. The article also demonstrates the possibility of increasing the model by including models of protection measures against the considered methods of implementing computer attacks. The proposed models can be supplemented by modeling new ways of implementing computer attacks used by other cyber groups. In addition, the models can be extended to Petri-Markov network models by implementing special methods for calculating probabilistic-time characteristics for fragments of the proposed models.


Author(s):  
John Baylis ◽  
James J. Wirtz

This edition explores the role of military power in the contemporary world and the changes that have occurred over the last decade. It examines the debates about whether there has been a revolution in military affairs and the future of warfare, given the phenomenal pace of innovation in electronics and computer systems, which is often referred to as cyberwar. It also considers the strategic implications of the changing structure of global politics and the role of U.S. military power in a world in transition, along with the continuing relevance of various theories of peace and security. This introduction discusses strategic studies, criticisms levelled against strategic studies, and the relationship between strategic studies and security studies.


1984 ◽  
Vol 28 (11) ◽  
pp. 963-967 ◽  
Author(s):  
Dana S. Kay ◽  
John B. Black

This study examined the changes in the knowledge representations of text-editing commands as experience increases. Novices appear to organize the commands by their definitions, whereas experts use both command definitions and command sequence configurations to organize the commands. Thus, it appears that declarative knowledge is the first type of knowledge to be acquired in learning text-editing commands. At a more general level, experts and novices both organized their commands along three general dimensions, but the third dimension was different for the two groups. The results of this study, in conjunction with previous computer system studies, suggests an incremental model of the acquisition of computer-related knowledge in which there are changes in both the content and the representation of the knowledge.


2015 ◽  
Vol 07 (02) ◽  
pp. 1550009 ◽  
Author(s):  
Gianluca De Marco ◽  
Evangelos Kranakis

Diagnosing the quality of components in fault-tolerant computer systems often requires numerous tests with limited resources. It is usually the case that repeated tests on a selected, limited number of components are performed and the results are taken into account so as to infer a diagnostic property of the computer system as a whole. In this paper we abstract fault-tolerant testing as the following problem concerning the color of the majority in a set of colored balls. Given a set of balls each colored with one of two colors, the majority problem is to determine whether or not there is a majority in one of the two colors. In case there is such a majority, the aim is to output a ball of the majority color, otherwise to declare that there is no majority. We propose algorithms for solving the majority problem by repeatedly testing only k-tuple queries. Namely, successive answers of an oracle (which accepts as input only k-tuples) to a sequence of k-tuple queries are assembled so as to determine whether or not the majority problem has a solution. An issue is to design an algorithm which minimizes the number of k-tuple queries needed in order to solve the majority problem on any possible input of n balls. In this paper we consider three querying models: Output, Counting, and General, reflecting the amount and type of information provided by the oracle on each test for a k-tuple.


Author(s):  
Franco Gabriel Caballero-Julián ◽  
Maricela Morales-Hernández ◽  
Eric Mario Silva-Cruz ◽  
Diego Gabriel Caballero-Cantarell

Today, there is an innumerable amount of electronic devices and computer systems that are oriented as platforms for the management of information through the network; manipulating data and at the same time, performing tasks using low voltage electronic signals. They can activate, deactivate or control a device or a system using sensors. In this context, the Raspberry Pi platform has an interface composed of a set of pins (GPIO) through which voltage signals can be accessed, and can interact with other electrical and electronic systems for data acquisition and control. This article aims to facilitate access to the Raspberry Pi platform from its installation, configuration, to its programming of the ports through examples and instructions, considering the platform as a computer system. The interest of the authors is to provide the reader with the tools, so that the programming of specific applications is the new challenge.


Sign in / Sign up

Export Citation Format

Share Document