Cyborg Anthropology

The term cyborg anthropology was first described in a paper from 1995. They viewed cyborg anthropology as bringing cultural anthropology of science and technology into conversion with established activities in science and technology studies plus feminist studies of science, technology and medicine. By calling attention more generally to the cultural production of human distinctiveness by examining ethnographically thee boundaries between humans and machines along with and what constitutes the boundaries between them. This post will aim to give an overview of the area and its usefulness in studying human-computer interactions. Though this means all devices not just traditional  computers so smartphones, tablets, IoT devices etc. In short cyborg anthropology aims to combine grounded research on human-technology interactions with an openness to speculation and imagination.
Use & Purpose
Like all anthropologists, a cyborg anthropologist will watch or study people (living or …

AI and Human Factors'

In this post, I will give a brief overview of how the areas of Artificial Intelligence (AI) and Human Factors (HF) overlap along with the ways HF can be used to improve and guide the development and applications of AI. The key area where they interact with each other in the field of Human-Computer Interaction (HCI).AI is increasingly supporting high-consequence human decisions from healthcare to criminal justice which depending on how particular AI systems were trained or designed through Machine Learning (ML) can have serious consequences. These are often in the form of bias. HF has the potential to identify and reduce instances of these bias and related problems. 
Applying Human Factors to AI
Increasing machine, intelligence leads to a shift from a mere, interactive to a much more complex cooperative human-machine, relation requiring, a multidisciplinary development, approach were AI frame opportunities and challenges for user interface design. Reducing bias' through en…

Securing Artificial Intelligence ISG early Public Drafts of Work Items

The 4 latest drafts of WI-001, 003, 004 and 005 are now publicly available on the open area GR 001 AI Threat Ontology v0.0.6   Draft GS 003 Security Testing of AI v0.0.3Draft GR 004 SAI Problem Statement v0.0.4          Draft GR 005 SAI Mitigation Strategy report
I would encourage anyone interested in the problems and solutions to ensuring secure AI to check these out. These are early drafts and the documents will change over time. Also, if you have feedback, comments or questions please send them to ETSI and they will be forwarded to SAI group. Finally, if these have piqued your interest and you would like to get involved with the work of SAI details about joining the ISG can be found on the ETSI site.

ETSI Security Week 2020 - Webinars Notice - Update

ETSI Security Week 2020 had gone virtual due to the COVID-19 crisis. Many presentations that were to be given during the ETSI Security Week were given virtually from the 8th  until the 19th June.  Thanks to the willingness and additional efforts of nearly 50 Programme Committee Members and Speakers, ETSI were able to offer 14 different webinars corresponding more or less to what the ETSI Security Week would have been this year. The ETSI Security Week 2020 was organised around four technical threads:  Deploying 5G Securely:The Deploying 5G Securely thread will cover the status on the deployment and roll-out of 5G networks and the practical challenges at hand.5G Deployment5G Security for Verticals5G Security EvolutionSecurity Challenges and Regulatory AspectsCybersecurity Act - one year on: One year after coming into force, the series of 4 webinars will review the state of play of the EU Cybersecurity Act with feedback on the first schemes being adopted and discussion on 5G networks and con…

Elements in Securing AI - Part 4 AI for Defence


The fourth and final part in this series about securing the elements of AI gives an overview of AI  for defence. This is about the ability of AI when benignly used to develop better and automatic security technologies to defend against cyberattacks.

Examples of AI for Defence

Discovering new vulnerabilities­ -- and, more importantly, new types of vulnerabilities­ in systems, both by the offence to exploit and by the defence to patch, and then automatically exploiting or patching them. Reacting and adapting to an adversary's actions, again both on the offence and defence sides. This includes reasoning about those actions and what they mean in the context of the attack and the environment. Abstracting lessons from individual incidents, generalising them across systems and networks, and applying those lessons to increase attack and defence effectiveness elsewhere. Identifying strategic and tactical trends from large datasets and using those trends to adapt attack and defence …

Elements in Securing AI - Part 3 AI for Cyberattacks


The third part in this series with give an overview of AI for cyberattacks which involves attackers leveraging the ability of AI to auto-launch or speed up attacks typically with serious impacts on services and infrastructure.

Examples of AI for Cyberattacks

Impersonation of trusted users: Analysing large data sets helps attackers prioritise their victims based on online behaviour and estimated wealth. Predictive models can go further and determine willingness to pay the ransom based on historical data, and even adjust the size of pay-out to maximise the chances and, therefore, revenue for cyber-criminals.

With all the data available in the public domain, as well as previously leaked secrets, through various data breaches are now combined for the ultimate victim profiling in a matter of seconds with no human effort. When the victim is selected, AI can be used to create and tailor emails and sites that would be most likely clicked on based on crunched data. Trust is built by e…

COVID-19 and eHealth standards

As nobody can have missed, the world is under sustained pressure resulting from the COVID-19 pandemic. At ETSI the eHealth group has been trying to work out what the response of the standards world should be. Whilst we have active work items at ETSI looking at the development of the underlying use cases for diagnostic and therapeutic eHealth, and at the requirements for data in support of eHealth, neither of these explicitly addresses the COVID-19 associated crisis. So as part of our response Suno Wood and myself have been working away at a white paper, to be published by ETSI, but presenting a personal opinion. I'm using this blog post to review a few of the points from the white paper, sometimes in a much more forceful way too. 
COVID-19, and pandemics of the same scale, are rare, but even rarer is a health crisis that affects every citizen of our modern, interconnected world leading to a global, economic crisis. Far-reaching political decisions are being made and changed daily. …