Technology Policy & Ethics: November 2020
The Authenticity of Information on Social Media
Rajakumar Arul, Vishnu K, Department of Computer Science and Engineering, Amrita School of Engineering, Bengaluru, Amrita Vishwa Vidyapeetham, India, Amna Eleyan and Ali Kashif Bashir, Department of Computing and Mathematics, Manchester Metropolitan University, UK
The dawn of the electronic age has led to the rapid growth of social networking platforms, which have become an inevitable part of our lives by satisfying our ever-growing expectations. They yield a variety of services, such as a platform for interpersonal networking opportunities, data sharing, a resource for local and global news, and many more. The most important service is the ability to provide a replacement of traditional mass media (newspapers, televisions, etc.) for accessing and distributing news. This transition is caused by ease of access, low costs, and the capabilities of receiving the news/information in an instantaneous manner. During a 2020 survey, more than 70 percent of respondents from Kenya, South Africa, Chile, Bulgaria, Greece, and Argentina stated that they used social media as a source of news. Conversely, less than 40 percent of adults in France, the UK, Germany, and Japan reported the same. However, a large portion of social media users admit that although they do not trust social networking sites as a media source, or as a source to get news, they continue to use it on a consistent basis .
Implementation of 5G and Health Concerns
Donna Jiamjirarat and Corentin Rafflin, Ball State University
5G promises improved performance and efficiency at a lower cost than 4G, thus enabling the Internet of Things (IoT) to thrive. Implementing 5G requires adding base stations closer to the people because they will use higher frequencies, up to 300GHz, and will, therefore, have a shorter range. 5G will use frequencies from 600 MHz to 300 GHz, which include the millimeter-wave frequency bands – 30 GHz and 300 GHz – that were not used before . Despite the advantages of 5G, concerns are still to be addressed regarding the possible health impacts of this technology. Opinions and research outcomes on this topic diverge across the scientist community, government agencies, and organizations.
Cyber Security in Operation Technologies
Dr. Junaid Chaudhry PhD, Harvard Business School, University of Amsterdam, Edith Cowan University, and Kaspersky Research Laboratory
Cybersecurity has been at the forefront of the digital revolution for almost a decade now, yet we have not seen, what some call, ground-breaking silver bullet solutions to the problems like phishing, digital fraud, distribute denial of service attacks etc. One of the biggest hurdles in creating the ‘sense of self’ among high-performance machines is the ability to classify what is normal operation and what is anomalous .
The establishment of security operation centres and countless man-hours of security analysts have assisted in classifying known threats and attack patterns e.g. petya, wannacry etc . Along with assistance from data science marvels, we have come to a stage where we can confidently say that we have discovered a method through which human intelligence can be passed on to machines in the form of pattern . We are readily reaping the benefits of Artificial Narrow Intelligence by pattern matching the known threats. In a closed system as soon as all the threats are discovered and accounted for, that system will be considered as a “secure-system”.