convergence of technologies
Recently Published Documents


TOTAL DOCUMENTS

40
(FIVE YEARS 9)

H-INDEX

4
(FIVE YEARS 0)

2021 ◽  
pp. 9-19
Author(s):  
O. DZOBAN

It is proposed to consider a digital person as the latest stage of human development as a major object and subject of information relations in the information society at the latest stages of its development; as a postmodern type of a homo sapiens capable of processing information, creating new information phenomena, interconnections and structures. It is substantiated that the transition to a digital person occurred due to convergence of technologies of artificial intelligence, machine training and powerful databases capable of using an unlimited amount of information for its processing, classification and multiple use. The attention is drawn to the fact that a digital person is, first of all, a person of new moral values, which immerses in the virtual reality of simulations and increasingly perceives the world as a digital game environment, realizing its conventionality, controllability of its parameters and the possibility of exiting it.


Electronics ◽  
2021 ◽  
Vol 10 (10) ◽  
pp. 1220
Author(s):  
Chee Wei Lee ◽  
Stuart Madnick

Urban mobility is in the midst of a revolution, driven by the convergence of technologies such as artificial intelligence, on-demand ride services, and Internet-connected and self-driving vehicles. Technological advancements often lead to new hazards. Coupled with the increased levels of automation and connectivity in the new generation of autonomous vehicles, cybersecurity is emerging as a key threat affecting these vehicles. Traditional hazard analysis methods treat safety and security in isolation and are limited in their ability to account for interactions among organizational, sociotechnical, human, and technical components. In response to these challenges, the cybersafety method, based on System Theoretic Process Analysis (STPA and STPA-Sec), was developed to meet the growing need to holistically analyze complex sociotechnical systems. We applied cybersafety to coanalyze safety and security hazards, as well as identify mitigation requirements. The results were compared with another promising method known as Combined Harm Analysis of Safety and Security for Information Systems (CHASSIS). Both methods were applied to the Mobility-as-a-Service (MaaS) and Internet of Vehicles (IoV) use cases, focusing on over-the-air software updates feature. Overall, cybersafety identified additional hazards and more effective requirements compared to CHASSIS. In particular, cybersafety demonstrated the ability to identify hazards due to unsafe/unsecure interactions among sociotechnical components. This research also suggested using CHASSIS methods for information lifecycle analysis to complement and generate additional considerations for cybersafety. Finally, results from both methods were backtested against a past cyber hack on a vehicular system, and we found that recommendations from cybersafety were likely to mitigate the risks of the incident.


Author(s):  
Kate Carruthers

In many ways the Internet of Things will change everything, as devices and software mesh and become part of the connected fabric of the Internet. This article explores the context and potential offered by the growth of the Internet of Things (IoT). It provides an overview of this next phase of the digital revolution that is underpinned by the growth of the social web, web 2.0, and the convergence of technologies such as mobile and ubiquitous broadband. This article also attempts to provide some insight into the potential value of the Internet of Things market in the future. The opportunities offered by the Internet of Things also raise serious questions about privacy and security in a connected world. As Umair Haque noted recently: “At some point, we should all question the value of an internet that objectifies you, tracks you, and polices you...without your consent.” (Haque 2014)


Ethnicities ◽  
2020 ◽  
Vol 20 (5) ◽  
pp. 803-822
Author(s):  
Yasmin Ibrahim

The livestreaming of terror, its co-production through live consumption and the massacre of lives as ‘entertainment’ propelled us into another long abyss of ethical challenges in the case of the xenophobic terrorist attack in Christchurch, New Zealand, in 2019. Livestreaming, as part of the convergence of technologies, enables narration in ‘real’ time, dragging us into a new ‘banalisation of evil’ where terror and torture can be co-produced by inviting audiences to consume through the vantage point of the perpetrator. This article examines the Muslim ‘body’ through JanMohamed’s notion of the ‘death-bound subject’ where the continual threat of death foreshadows the Muslim body, imbricating it within a political and ideological archaeology wherein both its possibility of death and the performance of death enter into a realm of theatrics of production incumbent upon invoking new moralities around consumption and its residues as a screen image. The ‘wretched of the Earth’ and their residues as immaterial matter online as the ‘wretched of the screen’ connote a new architecture of violence conjoining the temporalities of liveness with the sharing features of ‘semiotic capitalism’.


2020 ◽  
Vol 36 (6) ◽  
pp. 456-462
Author(s):  
François Chadebecq ◽  
Francisco Vasconcelos ◽  
Evangelos Mazomenos ◽  
Danail Stoyanov

<b><i>Background:</i></b> Multiple types of surgical cameras are used in modern surgical practice and provide a rich visual signal that is used by surgeons to visualize the clinical site and make clinical decisions. This signal can also be used by artificial intelligence (AI) methods to provide support in identifying instruments, structures, or activities both in real-time during procedures and postoperatively for analytics and understanding of surgical processes. <b><i>Summary:</i></b> In this paper, we provide a succinct perspective on the use of AI and especially computer vision to power solutions for the surgical operating room (OR). The synergy between data availability and technical advances in computational power and AI methodology has led to rapid developments in the field and promising advances. <b><i>Key Messages:</i></b> With the increasing availability of surgical video sources and the convergence of technologies<b><i></i></b>around video storage, processing, and understanding, we believe clinical solutions and products leveraging vision are going to become an important component of modern surgical capabilities. However, both technical and clinical challenges remain to be overcome to efficiently make use of vision-based approaches into the clinic.


Author(s):  
Alexander Viktorovich Melnikov ◽  
◽  
Yulia Adolfovna, Kosikova ◽  

The Most well - known social software applications are blogs, wikis, social networks, and instant messaging. The social network is described as a convergence of technologies, which means that individuals can easily communicate, select information, and form new communities on the Internet. The rapid growth of social networks is forcing companies to step up their activities in traditional CRM systems. One of the important advantages of the Internet is the creation of an active contact between stakeholders, making it easier for businesses to get feedback from their customers, which allows them to more effectively identify customer needs and develop corrective actions.


Sign in / Sign up

Export Citation Format

Share Document