SlideShare a Scribd company logo
1 of 46
Download to read offline
Accounting Value Effects
for Responsible Networking
Giovanni Sileno g.sileno@uva.nl Complex Cyber Infrastructure (CCI)
Paola Grosso p.grosso@uva.nl Multiscale Networked Systems (MNS)
University of Amsterdam
ACM SIGCOMM 2021 Workshop on Technologies, Applications, and Uses of a
Responsible Internet (TAURIN 2021), 23 August 2021
Why responsible computing?
the more we delegate activities to machines,
Why responsible computing?
the more we delegate activities to machines,
the more we need machines to behave "responsibly"
Why responsible computing?
the more we delegate activities to machines,
the more we need machines to behave "responsibly"
Today, focus on this issue is mostly on ML-based AI, however, any technology --
because it has effects on the world -- should fulfill the same requirement.
Why responsible computing?
the more we delegate activities to machines,
the more we need machines to behave "responsibly"
Today, focus on this issue is mostly on ML-based AI, however, any technology --
because it has effects on the world -- should fulfill the same requirement.
Including the Internet and networking!
Looking at application level,
data-sharing has practical effects
because having access to relevant information has value for agents!
Looking at application level,
data-sharing has practical effects
because having access to relevant information has value for agents!
people, organizations,
systems which act to
achieve certain purposes
+
-
no exchange exchange enabled/allowed
+
-
exchange disabled/disallowed
Looking at application level,
data-sharing has practical effects
because having access to relevant information has value for agents!
+
-
no exchange exchange enabled/allowed
+
-
exchange disabled/disallowed
ability (power)
dimension
e.g. Internet with new forms of knowledge
sharing, aggregation, making business, etc.
● technologies provide new abilities
Looking at application level,
data-sharing has practical effects
because having access to relevant information has value for agents!
+
-
no exchange exchange enabled/allowed
+
-
exchange disabled/disallowed
ability (power)
dimension
permission
dimension
e.g. norms on privacy, data regulation
(e.g. GDPR), competition laws, etc.
● societies introduce checks & balances
Looking at application level,
data-sharing has practical effects
because having access to relevant information has value for agents!
+
-
no exchange exchange enabled/allowed
+
-
exchange disabled/disallowed
e.g. norms on privacy, data regulation
(e.g. GDPR), competition laws, etc.
● societies introduce checks & balances
How these checks and balances are
reflected at infrastructural level?
Looking at application level,
data-sharing has practical effects
because having access to relevant information has value for agents!
Data transmission as “logistic” task
X Y
How to transport data from node X to node Y?
no path specification (only end-point nodes)
X Y
● Enabling transmission from X to Y requires the network
to provide some form of routing services.
partial path specification (with intermediary steps)
full specification (all intermediary steps as “primitive” actions)
X Y
X Y
no path specification (only end-point nodes)
How to transport data from node X to node Y?
Data transmission as “logistic” task
X Y
● Enabling transmission from X to Y requires the network
to provide some form of routing services.
partial path specification (with intermediary steps)
full specification (all intermediary steps as “primitive” actions)
X Y
X Y
no path specification (only end-point nodes)
For inter-domain routing,
network operators typically
rely on BGP policies and
community tags.
How to transport data from node X to node Y?
Data transmission as “logistic” task
Data transmission as “logistic” task
X Y
X Y
Z
abusive
transmission
(e.g. data-leak)
X
inefficient or expensive transmission (in terms of
resources load/usage, environmental impact, etc.)
Main issues possibly occurring at network level:
faulty transmission
X Y
X Y
Z
X
Main issues possibly occurring at network level:
Intuitively, a
‘responsible’
networking
should reduce
these issues.
faulty transmission
abusive
transmission
(e.g. data-leak)
inefficient or expensive transmission (in terms of
resources load/usage, environmental impact, etc.)
Data transmission as “logistic” task
X Y
X Y
Z
X
Main issues possibly occurring at network level:
Intuitively, a
‘responsible’
networking
should reduce
these issues.
but...
who defines what is faulty, abusive, expensive?
who monitors? who prevents (predicts) or reacts to failures?
faulty transmission
abusive
transmission
(e.g. data-leak)
inefficient or expensive transmission (in terms of
resources load/usage, environmental impact, etc.)
Data transmission as “logistic” task
X Y
X Y
Z
X
Main issues possibly occurring at network level:
Intuitively, a
‘responsible’
networking
should reduce
these issues.
but...
who defines what is faulty, abusive, expensive?
who monitors? who prevents (predicts) or reacts to failures?
faulty transmission
abusive
transmission
(e.g. data-leak)
inefficient or expensive transmission (in terms of
resources load/usage, environmental impact, etc.)
“responsibility” is a matter
of social coordination policy
Data transmission as “logistic” task
Internet social structure
Three main roles can be recognized around Internet’s activities:
● users (applications, software agents, etc.)
● network operators
● governance bodies
users
governance
bodies
network
operators
data logistic tasks
requirements
Responsible Internet social structure
users
governance
bodies
network
operators
data logistic tasks
requirements
POL
NIP
NCP
Cristian Hesselman, Paola Grosso, Ralph Holz, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter, Anna Sperotto, Roland van Rijswijk-Deij, Giovane C.M.
Moura, Aiko Pras, and Cees de Laat. A Responsible Internet to Increase Trust in the Digital World. Journal of Network and Systems Management 28, 4 (2020), 882–922.
The Responsible Internet proposal
(Hesselman et al., 2020) essentially envisions
to redistribute control and monitoring abilities
to users, supported by regulations issued by
relevant societal stakeholders.
Responsible Internet social structure
users
governance
bodies
network
operators
data logistic tasks
requirements
POL
NIP
NCP
Cristian Hesselman, Paola Grosso, Ralph Holz, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter, Anna Sperotto, Roland van Rijswijk-Deij, Giovane C.M.
Moura, Aiko Pras, and Cees de Laat. A Responsible Internet to Increase Trust in the Digital World. Journal of Network and Systems Management 28, 4 (2020), 882–922.
open-source
programmable
networks
(e.g. for routing,
via BGP policies)
large-scale
measuring
techniques
The Responsible Internet proposal
(Hesselman et al., 2020) essentially envisions
to redistribute control and monitoring abilities
to users, supported by regulations issued by
relevant societal stakeholders.
Responsible Internet social structure
users
governance
bodies
network
operators
data logistic tasks
requirements
POL
NIP
NCP
Cristian Hesselman, Paola Grosso, Ralph Holz, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter, Anna Sperotto, Roland van Rijswijk-Deij, Giovane C.M.
Moura, Aiko Pras, and Cees de Laat. A Responsible Internet to Increase Trust in the Digital World. Journal of Network and Systems Management 28, 4 (2020), 882–922.
open-source
programmable
networks
(e.g. for routing,
via BGP policies)
informed
policy-making
The Responsible Internet proposal
(Hesselman et al., 2020) essentially envisions
to redistribute control and monitoring abilities
to users, supported by regulations issued by
relevant societal stakeholders.
large-scale
measuring
techniques
Responsible Internet social structure
users
governance
bodies
network
operators
data logistic tasks
requirements
POL
NIP
NCP
Cristian Hesselman, Paola Grosso, Ralph Holz, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter, Anna Sperotto, Roland van Rijswijk-Deij, Giovane C.M.
Moura, Aiko Pras, and Cees de Laat. A Responsible Internet to Increase Trust in the Digital World. Journal of Network and Systems Management 28, 4 (2020), 882–922.
open-source
programmable
networks
(e.g. for routing,
via BGP policies)
informed
policy-making
IS THIS COMPLETE?
The Responsible Internet proposal
(Hesselman et al., 2020) essentially envisions
to redistribute control and monitoring abilities
to users, supported by regulations issued by
relevant societal stakeholders.
large-scale
measuring
techniques
Our paper raises two critiques
● RESPONSIBILITY GAP: Low-level programmability (e.g. for routing, via
BGP policies) is not sufficient to capture and behaviourally
operationalize the value structure of users.
● REGULATIVE CONTINGENCY: Power-relationships between roles should not
be hard-coded (that is, should be partially programmable).
Requirements for responsibility
has the ability to
control its own
behaviour
has the ability to
foresee the
associated outcomes
has the ability to
assess actions
according to a certain
preference/value
structure
An agent has (agentive) responsibility if it:
Sileno, G., Boer, A., Gordon, G., Rieder, B., Like Circles in the Water: Responsibility as a System-Level Function.
Proceedings of 3rd XAILA workshop: Explainable and Responsible AI and Law, in conjunction with JURIX 2020 (2020)
Requirements for responsibility
has the ability to
control its own
behaviour
has the ability to
foresee the
associated outcomes
has the ability to
assess actions
according to a certain
preference/value
structure
An agent has (agentive) responsibility if it:
Sileno, G., Boer, A., Gordon, G., Rieder, B., Like Circles in the Water: Responsibility as a System-Level Function.
Proceedings of 3rd XAILA workshop: Explainable and Responsible AI and Law, in conjunction with JURIX 2020 (2020)
necessary e.g. to identify
wrong behaviour
has the ability to
control its own
behaviour
has the ability to
foresee the
associated outcomes
has the ability to
assess actions
according to a certain
preference/value
structure
An agent has (agentive) responsibility if it:
necessary e.g. to inhibit
wrong behaviour
Sileno, G., Boer, A., Gordon, G., Rieder, B., Like Circles in the Water: Responsibility as a System-Level Function.
Proceedings of 3rd XAILA workshop: Explainable and Responsible AI and Law, in conjunction with JURIX 2020 (2020)
Requirements for responsibility
necessary e.g. to identify
wrong behaviour
Responsibility gap
has the ability to
control its own
behaviour
has the ability to
foresee the
associated outcomes
has the ability to
assess actions
according to a certain
preference/value
structure
In the Responsible Internet proposal,
users gain controllability by low-level
programmability (via the NCP).
Responsibility gap
has the ability to
control its own
behaviour
has the ability to
foresee the
associated outcomes
has the ability to
assess actions
according to a certain
preference/value
structure
In the Responsible Internet proposal,
users gain controllability by low-level
programmability (via the NCP).
...but nothing is
said about the two
other components.
Responsibility gap
has the ability to
control its own
behaviour
has the ability to
foresee the
associated outcomes
has the ability to
assess actions
according to a certain
preference/value
structure
In the Responsible Internet proposal,
users gain controllability by low-level
programmability (via the NCP).
...but nothing is
said about the two
other components.
HOW CAN WE REPAIR THIS?
has the ability to
control its own
behaviour
has the ability to
foresee the
associated outcomes
has the ability to
assess actions
according to a certain
preference/value
structure
[1] We need a model of how
the world functions.
EXPECTATIONS artefact
Reducing the responsibility gap
has the ability to
control its own
behaviour
has the ability to
foresee the
associated outcomes
has the ability to
assess actions
according to a certain
preference/value
structure
[1] We need a model of how
the world functions.
EXPECTATIONS artefact
[2] We need a model of what is
valuable in the world.
high-level POLICY artefact
Reducing the responsibility gap
Reducing the responsibility gap
has the ability to
control its own
behaviour
has the ability to
foresee the
associated outcomes
has the ability to
assess actions
according to a certain
preference/value
structure
[1] We need a model of how
the world functions.
EXPECTATIONS artefact
[2] We need a model of what is
valuable in the world.
high-level POLICY artefact
norm as in
normal
norm as in
normative
Reducing the responsibility gap
has the ability to
control its own
behaviour
has the ability to
foresee the
associated outcomes
has the ability to
assess actions
according to a certain
preference/value
structure
[1] We need a model of how
the world functions.
EXPECTATIONS artefact(s)
[2] We need a model of what is
valuable in the world.
high-level POLICY artefact(s)
norm as in
normal
norm as in
normative
norm pluralism
[3] We need to take into account
several external sources of norms
Reducing the responsibility gap
has the ability to
control its own
behaviour
has the ability to
foresee the
associated outcomes
has the ability to
assess actions
according to a certain
preference/value
structure
[1] We need a model of how
the world functions.
EXPECTATIONS artefact(s)
[2] We need a model of what is
valuable in the world.
high-level POLICY artefact(s)
norm as in
normal
norm as in
normative
[3] We need to take into account
several external sources of norms
need for “normware” technology
norm pluralism
high-level
policy
expectations
value
effects
synthesis
situated
policy
low-level
policy
From higher-level to lower-level policies
user’s policy
on policies
ex
policy
artefact
import
import
external
expectations
artefact
external
expectations
artefact
external
expectations
artefact
ex
policy
artefact
external
policy artefact
CONSOLIDATION
NCP
OPERATIONALIZATION
The paper elaborates on the functions required to pass from
high-level specifications to low-level policies (e.g. BGP
policies and community tags for routing)...
user’s policy
on expectations
Regulative contingency
Users, network operators, and the various governance bodies have all
legitimate interests to play a role in policy-making.
Prototypical conflictual design choice: anonymity vs accountability.
Regulative contingency
Users, network operators, and the various governance bodies have all
legitimate interests to play a role in policy-making.
Prototypical conflictual design choice: anonymity vs accountability.
Governmental, public agencies are users of the infrastructure, and play a role
in the infrastructure governance bodies.
The Responsible Internet proposal says that POL
● should be informed by NIP and
● should drive the NCP.
users
governance
bodies
network
operators
data logistic tasks
requirements
POL
NIP
NCP
Regulative contingency
Users, network operators, and the various governance bodies have all
legitimate interests to play a role in policy-making.
Prototypical conflictual design choice: anonymity vs accountability.
Governmental, public agencies are users of the infrastructure, and play a role
in the infrastructure governance bodies.
The Responsible Internet proposal says that POL
● should be informed by NIP and
● should drive the NCP.
users
governance
bodies
network
operators
data logistic tasks
requirements
POL
NIP
NCP
but how? to what extent regulators can intervene on
users’ activity on the infrastructure?
Regulative contingency
Users, network operators, and the various governance bodies have all
legitimate interests to play a role in policy-making.
Prototypical conflictual design choice: anonymity vs accountability.
Govermental, public agencies are users of the infrastructure, and play a role in
the infrastructure governance bodies.
The Responsible Internet proposal says that POL
● should be informed by NIP and
● should drive the NCP.
users
governance
bodies
network
operators
data logistic tasks
requirements
POL
NIP
NCP
but how? to what extent regulators can intervene on
users’ activity on the infrastructure?
There is no definitive, global solution: checks & balances vary on a local basis.
● Power-relationships between roles should not be hard-coded, but
programmable.
Regulative contingency
Users, network operators, and the various governance bodies have all
legitimate interests to play a role in policy-making.
Prototypical conflictual design choice: anonymity vs accountability.
Govermental, public agencies are users of the infrastructure, and play a role in
the infrastructure governance bodies.
The Responsible Internet proposal says that POL
● should be informed by NIP and
● should drive the NCP.
users
governance
bodies
network
operators
data logistic tasks
requirements
POL
NIP
NCP
but how? to what extent regulators can intervene on
users’ activity on the infrastructure?
There is no definitive, global solution: checks & balances vary on a local basis.
● Power-relationships between roles should not be hard-coded, but
programmable. → an additional use case for a policy-based technology
Conclusions (1a)
“give me eyes, and I’ll know where I’ll go” Computation cannot be
“responsible” if the computational agent has no means to evaluate the effect of
its actions, and then to prevent wrong outcomes.
Conclusions (1b)
“give me eyes, and I’ll know where I’ll go” Computation cannot be
“responsible” if the computational agent has no means to evaluate the effect of
its actions, and then to prevent wrong outcomes.
“pipes are dumb, water drinkers are not” Networks are supposed to
operate blindly with respect to the content they transport, by making decisions
on packets and unaware of the value of the whole transactions. But this
information is (to some extent) available at the users’ endpoints!
In full control, users should be able to provide some artefact specifying their
preference/value structure and their expectations. Network operators should
operate, still blindly, just according to these directives.
Conclusions (2a)
“do not hard-code what is soft-coded” It is premature, if not wrong, to aim
to a definitive solution concerning power-relationships (e.g. full-control for
users and full-blindness for network operators). Too many local contextual
factors intervene to set which are the “right” checks and balances. We need
programmability also at this level. But what to program?
Conclusions (2b)
“do not hard-code what is soft-coded” It is premature, if not wrong, to aim
to a definitive solution concerning power-relationships (e.g. full-control for
users and full-blindness for network operators). Too many local contextual
factors intervene to set which are the “right” checks and balances. We need
programmability also at this level. But what to program?
“what works, it may work” For a global network like the Internet, possible
starting points would be normative constructs and frameworks developed in
non-computational contexts, as in international law, or most plausibly in
international private law, already operative across very diverse jurisdictions.
Accounting Value Effects
for Responsible Networking
Giovanni Sileno g.sileno@uva.nl Complex Cyber Infrastructure (CCI)
Paola Grosso p.grosso@uva.nl Multiscale Networked Systems (MNS)
University of Amsterdam
ACM SIGCOMM 2021 Workshop on Technologies, Applications, and Uses of a
Responsible Internet (TAURIN 2021), 23 August 2021

More Related Content

What's hot

Measure Twice, Cut Once - Solving the Legal Profession Biggest Challenges Tog...
Measure Twice, Cut Once - Solving the Legal Profession Biggest Challenges Tog...Measure Twice, Cut Once - Solving the Legal Profession Biggest Challenges Tog...
Measure Twice, Cut Once - Solving the Legal Profession Biggest Challenges Tog...Daniel Katz
 
Ethical Issues in Machine Learning Algorithms. (Part 1)
Ethical Issues in Machine Learning Algorithms. (Part 1)Ethical Issues in Machine Learning Algorithms. (Part 1)
Ethical Issues in Machine Learning Algorithms. (Part 1)Vladimir Kanchev
 
Legal Analytics - Introduction to the Course - Professor Daniel Martin Katz +...
Legal Analytics - Introduction to the Course - Professor Daniel Martin Katz +...Legal Analytics - Introduction to the Course - Professor Daniel Martin Katz +...
Legal Analytics - Introduction to the Course - Professor Daniel Martin Katz +...Daniel Katz
 
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...Karlos Svoboda
 
Truth, Justice, and Technicity: from Bias to the Politics of Systems
Truth, Justice, and Technicity: from Bias to the Politics of SystemsTruth, Justice, and Technicity: from Bias to the Politics of Systems
Truth, Justice, and Technicity: from Bias to the Politics of SystemsBernhard Rieder
 
Engines of Order. Social Media and the Rise of Algorithmic Knowing.
Engines of Order. Social Media and the Rise of Algorithmic Knowing.Engines of Order. Social Media and the Rise of Algorithmic Knowing.
Engines of Order. Social Media and the Rise of Algorithmic Knowing.Bernhard Rieder
 
What AI is and examples of how it is used in legal
What AI is and examples of how it is used in legalWhat AI is and examples of how it is used in legal
What AI is and examples of how it is used in legalBen Gardner
 
Law, Ethics and Tech Aspects for an Irrevocable BlockChain Based Curriculum V...
Law, Ethics and Tech Aspects for an Irrevocable BlockChain Based Curriculum V...Law, Ethics and Tech Aspects for an Irrevocable BlockChain Based Curriculum V...
Law, Ethics and Tech Aspects for an Irrevocable BlockChain Based Curriculum V...eraser Juan José Calderón
 
Fairness and Privacy in AI/ML Systems
Fairness and Privacy in AI/ML SystemsFairness and Privacy in AI/ML Systems
Fairness and Privacy in AI/ML SystemsKrishnaram Kenthapadi
 
On Digital Markets, Data, and Concentric Diversification
On Digital Markets, Data, and Concentric DiversificationOn Digital Markets, Data, and Concentric Diversification
On Digital Markets, Data, and Concentric DiversificationBernhard Rieder
 
Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...
Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...
Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...Bernhard Rieder
 
Ethical Issues in Machine Learning Algorithms (Part 2)
Ethical Issues in Machine Learning Algorithms (Part 2)Ethical Issues in Machine Learning Algorithms (Part 2)
Ethical Issues in Machine Learning Algorithms (Part 2)Vladimir Kanchev
 
Ethical Issues in Machine Learning Algorithms. (Part 3)
Ethical Issues in Machine Learning Algorithms. (Part 3)Ethical Issues in Machine Learning Algorithms. (Part 3)
Ethical Issues in Machine Learning Algorithms. (Part 3)Vladimir Kanchev
 
Tweets are Not Created Equal. Intersecting Devices in the 1% Sample
Tweets are Not Created Equal. Intersecting Devices in the 1% SampleTweets are Not Created Equal. Intersecting Devices in the 1% Sample
Tweets are Not Created Equal. Intersecting Devices in the 1% SampleBernhard Rieder
 
Project etapas ethical technology adoption in public administration service(1)
Project etapas   ethical technology adoption in public administration service(1)Project etapas   ethical technology adoption in public administration service(1)
Project etapas ethical technology adoption in public administration service(1)PanagiotisKeramidis
 
Platforms and Analytical Gestures
Platforms and Analytical GesturesPlatforms and Analytical Gestures
Platforms and Analytical GesturesBernhard Rieder
 
Summit EU Machine Learning
Summit EU  Machine LearningSummit EU  Machine Learning
Summit EU Machine LearningTed Dunning
 
Fairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedInFairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedInKrishnaram Kenthapadi
 
Technologies for Lawyers - Legal Sector
Technologies for Lawyers - Legal SectorTechnologies for Lawyers - Legal Sector
Technologies for Lawyers - Legal SectorSatya Pal
 

What's hot (20)

Measure Twice, Cut Once - Solving the Legal Profession Biggest Challenges Tog...
Measure Twice, Cut Once - Solving the Legal Profession Biggest Challenges Tog...Measure Twice, Cut Once - Solving the Legal Profession Biggest Challenges Tog...
Measure Twice, Cut Once - Solving the Legal Profession Biggest Challenges Tog...
 
Ethical Issues in Machine Learning Algorithms. (Part 1)
Ethical Issues in Machine Learning Algorithms. (Part 1)Ethical Issues in Machine Learning Algorithms. (Part 1)
Ethical Issues in Machine Learning Algorithms. (Part 1)
 
Legal Analytics - Introduction to the Course - Professor Daniel Martin Katz +...
Legal Analytics - Introduction to the Course - Professor Daniel Martin Katz +...Legal Analytics - Introduction to the Course - Professor Daniel Martin Katz +...
Legal Analytics - Introduction to the Course - Professor Daniel Martin Katz +...
 
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...
 
Fair Recommender Systems
Fair Recommender Systems Fair Recommender Systems
Fair Recommender Systems
 
Truth, Justice, and Technicity: from Bias to the Politics of Systems
Truth, Justice, and Technicity: from Bias to the Politics of SystemsTruth, Justice, and Technicity: from Bias to the Politics of Systems
Truth, Justice, and Technicity: from Bias to the Politics of Systems
 
Engines of Order. Social Media and the Rise of Algorithmic Knowing.
Engines of Order. Social Media and the Rise of Algorithmic Knowing.Engines of Order. Social Media and the Rise of Algorithmic Knowing.
Engines of Order. Social Media and the Rise of Algorithmic Knowing.
 
What AI is and examples of how it is used in legal
What AI is and examples of how it is used in legalWhat AI is and examples of how it is used in legal
What AI is and examples of how it is used in legal
 
Law, Ethics and Tech Aspects for an Irrevocable BlockChain Based Curriculum V...
Law, Ethics and Tech Aspects for an Irrevocable BlockChain Based Curriculum V...Law, Ethics and Tech Aspects for an Irrevocable BlockChain Based Curriculum V...
Law, Ethics and Tech Aspects for an Irrevocable BlockChain Based Curriculum V...
 
Fairness and Privacy in AI/ML Systems
Fairness and Privacy in AI/ML SystemsFairness and Privacy in AI/ML Systems
Fairness and Privacy in AI/ML Systems
 
On Digital Markets, Data, and Concentric Diversification
On Digital Markets, Data, and Concentric DiversificationOn Digital Markets, Data, and Concentric Diversification
On Digital Markets, Data, and Concentric Diversification
 
Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...
Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...
Analyzing Social Media with Digital Methods. Possibilities, Requirements, and...
 
Ethical Issues in Machine Learning Algorithms (Part 2)
Ethical Issues in Machine Learning Algorithms (Part 2)Ethical Issues in Machine Learning Algorithms (Part 2)
Ethical Issues in Machine Learning Algorithms (Part 2)
 
Ethical Issues in Machine Learning Algorithms. (Part 3)
Ethical Issues in Machine Learning Algorithms. (Part 3)Ethical Issues in Machine Learning Algorithms. (Part 3)
Ethical Issues in Machine Learning Algorithms. (Part 3)
 
Tweets are Not Created Equal. Intersecting Devices in the 1% Sample
Tweets are Not Created Equal. Intersecting Devices in the 1% SampleTweets are Not Created Equal. Intersecting Devices in the 1% Sample
Tweets are Not Created Equal. Intersecting Devices in the 1% Sample
 
Project etapas ethical technology adoption in public administration service(1)
Project etapas   ethical technology adoption in public administration service(1)Project etapas   ethical technology adoption in public administration service(1)
Project etapas ethical technology adoption in public administration service(1)
 
Platforms and Analytical Gestures
Platforms and Analytical GesturesPlatforms and Analytical Gestures
Platforms and Analytical Gestures
 
Summit EU Machine Learning
Summit EU  Machine LearningSummit EU  Machine Learning
Summit EU Machine Learning
 
Fairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedInFairness, Transparency, and Privacy in AI @ LinkedIn
Fairness, Transparency, and Privacy in AI @ LinkedIn
 
Technologies for Lawyers - Legal Sector
Technologies for Lawyers - Legal SectorTechnologies for Lawyers - Legal Sector
Technologies for Lawyers - Legal Sector
 

Similar to Accounting Value Effects for Responsible Networking

2005-03-29 Web Services: ES Rationale and Assertions
2005-03-29 Web Services: ES Rationale and Assertions2005-03-29 Web Services: ES Rationale and Assertions
2005-03-29 Web Services: ES Rationale and AssertionsRudolf Husar
 
Big data challenges for e governance
Big data challenges for e governanceBig data challenges for e governance
Big data challenges for e governancebharati k
 
6G: Potential Use Cases and Enabling Technologies
6G: Potential Use Cases and Enabling Technologies6G: Potential Use Cases and Enabling Technologies
6G: Potential Use Cases and Enabling Technologies3G4G
 
How Cyber-Physical Systems Are Reshaping the Robotics Landscape
How Cyber-Physical Systems Are Reshaping the Robotics LandscapeHow Cyber-Physical Systems Are Reshaping the Robotics Landscape
How Cyber-Physical Systems Are Reshaping the Robotics LandscapeCognizant
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Editor IJAIEM
 
Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...
Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...
Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...Claudia Acosta
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...IRJET Journal
 
Safe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh EssaySafe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh EssaySusan Cox
 
A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...Amber Wheeler
 
Women's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning TechniquesWomen's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning TechniquesIRJET Journal
 
ICT349RDines31510992Assign1ResearchEssay
ICT349RDines31510992Assign1ResearchEssayICT349RDines31510992Assign1ResearchEssay
ICT349RDines31510992Assign1ResearchEssayRod Dines
 
Assignment Of Sensing Tasks To IoT Devices Exploitation Of A Social Network ...
Assignment Of Sensing Tasks To IoT Devices  Exploitation Of A Social Network ...Assignment Of Sensing Tasks To IoT Devices  Exploitation Of A Social Network ...
Assignment Of Sensing Tasks To IoT Devices Exploitation Of A Social Network ...Dustin Pytko
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next? PayamBarnaghi
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies Shamima Akther
 
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16The Internet of Things - IoT and EHS - Alex Lima - 3 15 16
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16Alex Lima
 
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...josephjonse
 
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...ijngnjournal
 
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...josephjonse
 

Similar to Accounting Value Effects for Responsible Networking (20)

2005-03-29 Web Services: ES Rationale and Assertions
2005-03-29 Web Services: ES Rationale and Assertions2005-03-29 Web Services: ES Rationale and Assertions
2005-03-29 Web Services: ES Rationale and Assertions
 
Big data challenges for e governance
Big data challenges for e governanceBig data challenges for e governance
Big data challenges for e governance
 
6G: Potential Use Cases and Enabling Technologies
6G: Potential Use Cases and Enabling Technologies6G: Potential Use Cases and Enabling Technologies
6G: Potential Use Cases and Enabling Technologies
 
Intelligent Agents in Telecommunications
Intelligent Agents in TelecommunicationsIntelligent Agents in Telecommunications
Intelligent Agents in Telecommunications
 
How Cyber-Physical Systems Are Reshaping the Robotics Landscape
How Cyber-Physical Systems Are Reshaping the Robotics LandscapeHow Cyber-Physical Systems Are Reshaping the Robotics Landscape
How Cyber-Physical Systems Are Reshaping the Robotics Landscape
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
 
Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...
Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...
Application Of Distributed AI And Cooperative Problem Solving To Telecommunic...
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
 
Safe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh EssaySafe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh Essay
 
A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...
 
Women's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning TechniquesWomen's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning Techniques
 
ICT349RDines31510992Assign1ResearchEssay
ICT349RDines31510992Assign1ResearchEssayICT349RDines31510992Assign1ResearchEssay
ICT349RDines31510992Assign1ResearchEssay
 
Assignment Of Sensing Tasks To IoT Devices Exploitation Of A Social Network ...
Assignment Of Sensing Tasks To IoT Devices  Exploitation Of A Social Network ...Assignment Of Sensing Tasks To IoT Devices  Exploitation Of A Social Network ...
Assignment Of Sensing Tasks To IoT Devices Exploitation Of A Social Network ...
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16The Internet of Things - IoT and EHS - Alex Lima - 3 15 16
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16
 
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
 
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
 
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
 
P01821104110
P01821104110P01821104110
P01821104110
 

More from Giovanni Sileno

Code-driven Law NO, Normware SI!
Code-driven Law NO, Normware SI!Code-driven Law NO, Normware SI!
Code-driven Law NO, Normware SI!Giovanni Sileno
 
DPCL: a Language Template for Normative Specifications
DPCL: a Language Template for Normative SpecificationsDPCL: a Language Template for Normative Specifications
DPCL: a Language Template for Normative SpecificationsGiovanni Sileno
 
Unexpectedness and Bayes' Rule
Unexpectedness and Bayes' RuleUnexpectedness and Bayes' Rule
Unexpectedness and Bayes' RuleGiovanni Sileno
 
Operationalizing Declarative and Procedural Knowledge
Operationalizing Declarative and Procedural KnowledgeOperationalizing Declarative and Procedural Knowledge
Operationalizing Declarative and Procedural KnowledgeGiovanni Sileno
 
History of AI, Current Trends, Prospective Trajectories
History of AI, Current Trends, Prospective TrajectoriesHistory of AI, Current Trends, Prospective Trajectories
History of AI, Current Trends, Prospective TrajectoriesGiovanni Sileno
 
Computing Contrast on Conceptual Spaces
Computing Contrast on Conceptual SpacesComputing Contrast on Conceptual Spaces
Computing Contrast on Conceptual SpacesGiovanni Sileno
 
On the problems of interface: explainability, conceptual spaces, relevance
On the problems of interface: explainability, conceptual spaces, relevanceOn the problems of interface: explainability, conceptual spaces, relevance
On the problems of interface: explainability, conceptual spaces, relevanceGiovanni Sileno
 
A Computational Model of Moral and Legal Responsibility via Simplicity Theory
A Computational Model of Moral and Legal Responsibility via Simplicity TheoryA Computational Model of Moral and Legal Responsibility via Simplicity Theory
A Computational Model of Moral and Legal Responsibility via Simplicity TheoryGiovanni Sileno
 
Similarity and Contrast on Conceptual Spaces for Pertinent Description Genera...
Similarity and Contrast on Conceptual Spaces for Pertinent Description Genera...Similarity and Contrast on Conceptual Spaces for Pertinent Description Genera...
Similarity and Contrast on Conceptual Spaces for Pertinent Description Genera...Giovanni Sileno
 
A Petri net-based notation for normative modeling: evaluation on deontic para...
A Petri net-based notation for normative modeling: evaluation on deontic para...A Petri net-based notation for normative modeling: evaluation on deontic para...
A Petri net-based notation for normative modeling: evaluation on deontic para...Giovanni Sileno
 
Reading Agendas Between the Lines, an exercise
Reading Agendas Between the Lines, an exerciseReading Agendas Between the Lines, an exercise
Reading Agendas Between the Lines, an exerciseGiovanni Sileno
 
Bridging Representation of Laws, of Implementations and of Behaviours
Bridging Representation of Laws, of Implementations and of BehavioursBridging Representation of Laws, of Implementations and of Behaviours
Bridging Representation of Laws, of Implementations and of BehavioursGiovanni Sileno
 
Revisiting Constitutive Rules
Revisiting Constitutive RulesRevisiting Constitutive Rules
Revisiting Constitutive RulesGiovanni Sileno
 
Commitments, Expectations, Affordances and Susceptibilities: Towards Position...
Commitments, Expectations, Affordances and Susceptibilities: Towards Position...Commitments, Expectations, Affordances and Susceptibilities: Towards Position...
Commitments, Expectations, Affordances and Susceptibilities: Towards Position...Giovanni Sileno
 
A Constructivist Approach to Rule Bases
A Constructivist Approach to Rule BasesA Constructivist Approach to Rule Bases
A Constructivist Approach to Rule BasesGiovanni Sileno
 
On the Interactional Meaning of Fundamental Legal Concepts
On the Interactional Meaning of Fundamental Legal ConceptsOn the Interactional Meaning of Fundamental Legal Concepts
On the Interactional Meaning of Fundamental Legal ConceptsGiovanni Sileno
 
Legal Knowledge Conveyed by Narratives: towards a representational model
Legal Knowledge Conveyed by Narratives: towards a representational modelLegal Knowledge Conveyed by Narratives: towards a representational model
Legal Knowledge Conveyed by Narratives: towards a representational modelGiovanni Sileno
 
Implementing Explanation-Based Argumentation using Answer Set Programming
Implementing Explanation-Based Argumentation using Answer Set ProgrammingImplementing Explanation-Based Argumentation using Answer Set Programming
Implementing Explanation-Based Argumentation using Answer Set ProgrammingGiovanni Sileno
 
From Inter-Agent to Intra-Agent Representations
From Inter-Agent to Intra-Agent RepresentationsFrom Inter-Agent to Intra-Agent Representations
From Inter-Agent to Intra-Agent RepresentationsGiovanni Sileno
 

More from Giovanni Sileno (20)

Code-driven Law NO, Normware SI!
Code-driven Law NO, Normware SI!Code-driven Law NO, Normware SI!
Code-driven Law NO, Normware SI!
 
DPCL: a Language Template for Normative Specifications
DPCL: a Language Template for Normative SpecificationsDPCL: a Language Template for Normative Specifications
DPCL: a Language Template for Normative Specifications
 
Unexpectedness and Bayes' Rule
Unexpectedness and Bayes' RuleUnexpectedness and Bayes' Rule
Unexpectedness and Bayes' Rule
 
Operationalizing Declarative and Procedural Knowledge
Operationalizing Declarative and Procedural KnowledgeOperationalizing Declarative and Procedural Knowledge
Operationalizing Declarative and Procedural Knowledge
 
History of AI, Current Trends, Prospective Trajectories
History of AI, Current Trends, Prospective TrajectoriesHistory of AI, Current Trends, Prospective Trajectories
History of AI, Current Trends, Prospective Trajectories
 
Computing Contrast on Conceptual Spaces
Computing Contrast on Conceptual SpacesComputing Contrast on Conceptual Spaces
Computing Contrast on Conceptual Spaces
 
On the problems of interface: explainability, conceptual spaces, relevance
On the problems of interface: explainability, conceptual spaces, relevanceOn the problems of interface: explainability, conceptual spaces, relevance
On the problems of interface: explainability, conceptual spaces, relevance
 
A Computational Model of Moral and Legal Responsibility via Simplicity Theory
A Computational Model of Moral and Legal Responsibility via Simplicity TheoryA Computational Model of Moral and Legal Responsibility via Simplicity Theory
A Computational Model of Moral and Legal Responsibility via Simplicity Theory
 
Aligning Law and Action
Aligning Law and ActionAligning Law and Action
Aligning Law and Action
 
Similarity and Contrast on Conceptual Spaces for Pertinent Description Genera...
Similarity and Contrast on Conceptual Spaces for Pertinent Description Genera...Similarity and Contrast on Conceptual Spaces for Pertinent Description Genera...
Similarity and Contrast on Conceptual Spaces for Pertinent Description Genera...
 
A Petri net-based notation for normative modeling: evaluation on deontic para...
A Petri net-based notation for normative modeling: evaluation on deontic para...A Petri net-based notation for normative modeling: evaluation on deontic para...
A Petri net-based notation for normative modeling: evaluation on deontic para...
 
Reading Agendas Between the Lines, an exercise
Reading Agendas Between the Lines, an exerciseReading Agendas Between the Lines, an exercise
Reading Agendas Between the Lines, an exercise
 
Bridging Representation of Laws, of Implementations and of Behaviours
Bridging Representation of Laws, of Implementations and of BehavioursBridging Representation of Laws, of Implementations and of Behaviours
Bridging Representation of Laws, of Implementations and of Behaviours
 
Revisiting Constitutive Rules
Revisiting Constitutive RulesRevisiting Constitutive Rules
Revisiting Constitutive Rules
 
Commitments, Expectations, Affordances and Susceptibilities: Towards Position...
Commitments, Expectations, Affordances and Susceptibilities: Towards Position...Commitments, Expectations, Affordances and Susceptibilities: Towards Position...
Commitments, Expectations, Affordances and Susceptibilities: Towards Position...
 
A Constructivist Approach to Rule Bases
A Constructivist Approach to Rule BasesA Constructivist Approach to Rule Bases
A Constructivist Approach to Rule Bases
 
On the Interactional Meaning of Fundamental Legal Concepts
On the Interactional Meaning of Fundamental Legal ConceptsOn the Interactional Meaning of Fundamental Legal Concepts
On the Interactional Meaning of Fundamental Legal Concepts
 
Legal Knowledge Conveyed by Narratives: towards a representational model
Legal Knowledge Conveyed by Narratives: towards a representational modelLegal Knowledge Conveyed by Narratives: towards a representational model
Legal Knowledge Conveyed by Narratives: towards a representational model
 
Implementing Explanation-Based Argumentation using Answer Set Programming
Implementing Explanation-Based Argumentation using Answer Set ProgrammingImplementing Explanation-Based Argumentation using Answer Set Programming
Implementing Explanation-Based Argumentation using Answer Set Programming
 
From Inter-Agent to Intra-Agent Representations
From Inter-Agent to Intra-Agent RepresentationsFrom Inter-Agent to Intra-Agent Representations
From Inter-Agent to Intra-Agent Representations
 

Recently uploaded

PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257subhasishdas79
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information SystemsAnge Felix NSANZIYERA
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsmeharikiros2
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxhublikarsn
 

Recently uploaded (20)

PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 

Accounting Value Effects for Responsible Networking

  • 1. Accounting Value Effects for Responsible Networking Giovanni Sileno g.sileno@uva.nl Complex Cyber Infrastructure (CCI) Paola Grosso p.grosso@uva.nl Multiscale Networked Systems (MNS) University of Amsterdam ACM SIGCOMM 2021 Workshop on Technologies, Applications, and Uses of a Responsible Internet (TAURIN 2021), 23 August 2021
  • 2. Why responsible computing? the more we delegate activities to machines,
  • 3. Why responsible computing? the more we delegate activities to machines, the more we need machines to behave "responsibly"
  • 4. Why responsible computing? the more we delegate activities to machines, the more we need machines to behave "responsibly" Today, focus on this issue is mostly on ML-based AI, however, any technology -- because it has effects on the world -- should fulfill the same requirement.
  • 5. Why responsible computing? the more we delegate activities to machines, the more we need machines to behave "responsibly" Today, focus on this issue is mostly on ML-based AI, however, any technology -- because it has effects on the world -- should fulfill the same requirement. Including the Internet and networking!
  • 6. Looking at application level, data-sharing has practical effects because having access to relevant information has value for agents!
  • 7. Looking at application level, data-sharing has practical effects because having access to relevant information has value for agents! people, organizations, systems which act to achieve certain purposes
  • 8. + - no exchange exchange enabled/allowed + - exchange disabled/disallowed Looking at application level, data-sharing has practical effects because having access to relevant information has value for agents!
  • 9. + - no exchange exchange enabled/allowed + - exchange disabled/disallowed ability (power) dimension e.g. Internet with new forms of knowledge sharing, aggregation, making business, etc. ● technologies provide new abilities Looking at application level, data-sharing has practical effects because having access to relevant information has value for agents!
  • 10. + - no exchange exchange enabled/allowed + - exchange disabled/disallowed ability (power) dimension permission dimension e.g. norms on privacy, data regulation (e.g. GDPR), competition laws, etc. ● societies introduce checks & balances Looking at application level, data-sharing has practical effects because having access to relevant information has value for agents!
  • 11. + - no exchange exchange enabled/allowed + - exchange disabled/disallowed e.g. norms on privacy, data regulation (e.g. GDPR), competition laws, etc. ● societies introduce checks & balances How these checks and balances are reflected at infrastructural level? Looking at application level, data-sharing has practical effects because having access to relevant information has value for agents!
  • 12. Data transmission as “logistic” task X Y How to transport data from node X to node Y? no path specification (only end-point nodes)
  • 13. X Y ● Enabling transmission from X to Y requires the network to provide some form of routing services. partial path specification (with intermediary steps) full specification (all intermediary steps as “primitive” actions) X Y X Y no path specification (only end-point nodes) How to transport data from node X to node Y? Data transmission as “logistic” task
  • 14. X Y ● Enabling transmission from X to Y requires the network to provide some form of routing services. partial path specification (with intermediary steps) full specification (all intermediary steps as “primitive” actions) X Y X Y no path specification (only end-point nodes) For inter-domain routing, network operators typically rely on BGP policies and community tags. How to transport data from node X to node Y? Data transmission as “logistic” task
  • 15. Data transmission as “logistic” task X Y X Y Z abusive transmission (e.g. data-leak) X inefficient or expensive transmission (in terms of resources load/usage, environmental impact, etc.) Main issues possibly occurring at network level: faulty transmission
  • 16. X Y X Y Z X Main issues possibly occurring at network level: Intuitively, a ‘responsible’ networking should reduce these issues. faulty transmission abusive transmission (e.g. data-leak) inefficient or expensive transmission (in terms of resources load/usage, environmental impact, etc.) Data transmission as “logistic” task
  • 17. X Y X Y Z X Main issues possibly occurring at network level: Intuitively, a ‘responsible’ networking should reduce these issues. but... who defines what is faulty, abusive, expensive? who monitors? who prevents (predicts) or reacts to failures? faulty transmission abusive transmission (e.g. data-leak) inefficient or expensive transmission (in terms of resources load/usage, environmental impact, etc.) Data transmission as “logistic” task
  • 18. X Y X Y Z X Main issues possibly occurring at network level: Intuitively, a ‘responsible’ networking should reduce these issues. but... who defines what is faulty, abusive, expensive? who monitors? who prevents (predicts) or reacts to failures? faulty transmission abusive transmission (e.g. data-leak) inefficient or expensive transmission (in terms of resources load/usage, environmental impact, etc.) “responsibility” is a matter of social coordination policy Data transmission as “logistic” task
  • 19. Internet social structure Three main roles can be recognized around Internet’s activities: ● users (applications, software agents, etc.) ● network operators ● governance bodies users governance bodies network operators data logistic tasks requirements
  • 20. Responsible Internet social structure users governance bodies network operators data logistic tasks requirements POL NIP NCP Cristian Hesselman, Paola Grosso, Ralph Holz, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter, Anna Sperotto, Roland van Rijswijk-Deij, Giovane C.M. Moura, Aiko Pras, and Cees de Laat. A Responsible Internet to Increase Trust in the Digital World. Journal of Network and Systems Management 28, 4 (2020), 882–922. The Responsible Internet proposal (Hesselman et al., 2020) essentially envisions to redistribute control and monitoring abilities to users, supported by regulations issued by relevant societal stakeholders.
  • 21. Responsible Internet social structure users governance bodies network operators data logistic tasks requirements POL NIP NCP Cristian Hesselman, Paola Grosso, Ralph Holz, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter, Anna Sperotto, Roland van Rijswijk-Deij, Giovane C.M. Moura, Aiko Pras, and Cees de Laat. A Responsible Internet to Increase Trust in the Digital World. Journal of Network and Systems Management 28, 4 (2020), 882–922. open-source programmable networks (e.g. for routing, via BGP policies) large-scale measuring techniques The Responsible Internet proposal (Hesselman et al., 2020) essentially envisions to redistribute control and monitoring abilities to users, supported by regulations issued by relevant societal stakeholders.
  • 22. Responsible Internet social structure users governance bodies network operators data logistic tasks requirements POL NIP NCP Cristian Hesselman, Paola Grosso, Ralph Holz, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter, Anna Sperotto, Roland van Rijswijk-Deij, Giovane C.M. Moura, Aiko Pras, and Cees de Laat. A Responsible Internet to Increase Trust in the Digital World. Journal of Network and Systems Management 28, 4 (2020), 882–922. open-source programmable networks (e.g. for routing, via BGP policies) informed policy-making The Responsible Internet proposal (Hesselman et al., 2020) essentially envisions to redistribute control and monitoring abilities to users, supported by regulations issued by relevant societal stakeholders. large-scale measuring techniques
  • 23. Responsible Internet social structure users governance bodies network operators data logistic tasks requirements POL NIP NCP Cristian Hesselman, Paola Grosso, Ralph Holz, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter, Anna Sperotto, Roland van Rijswijk-Deij, Giovane C.M. Moura, Aiko Pras, and Cees de Laat. A Responsible Internet to Increase Trust in the Digital World. Journal of Network and Systems Management 28, 4 (2020), 882–922. open-source programmable networks (e.g. for routing, via BGP policies) informed policy-making IS THIS COMPLETE? The Responsible Internet proposal (Hesselman et al., 2020) essentially envisions to redistribute control and monitoring abilities to users, supported by regulations issued by relevant societal stakeholders. large-scale measuring techniques
  • 24. Our paper raises two critiques ● RESPONSIBILITY GAP: Low-level programmability (e.g. for routing, via BGP policies) is not sufficient to capture and behaviourally operationalize the value structure of users. ● REGULATIVE CONTINGENCY: Power-relationships between roles should not be hard-coded (that is, should be partially programmable).
  • 25. Requirements for responsibility has the ability to control its own behaviour has the ability to foresee the associated outcomes has the ability to assess actions according to a certain preference/value structure An agent has (agentive) responsibility if it: Sileno, G., Boer, A., Gordon, G., Rieder, B., Like Circles in the Water: Responsibility as a System-Level Function. Proceedings of 3rd XAILA workshop: Explainable and Responsible AI and Law, in conjunction with JURIX 2020 (2020)
  • 26. Requirements for responsibility has the ability to control its own behaviour has the ability to foresee the associated outcomes has the ability to assess actions according to a certain preference/value structure An agent has (agentive) responsibility if it: Sileno, G., Boer, A., Gordon, G., Rieder, B., Like Circles in the Water: Responsibility as a System-Level Function. Proceedings of 3rd XAILA workshop: Explainable and Responsible AI and Law, in conjunction with JURIX 2020 (2020) necessary e.g. to identify wrong behaviour
  • 27. has the ability to control its own behaviour has the ability to foresee the associated outcomes has the ability to assess actions according to a certain preference/value structure An agent has (agentive) responsibility if it: necessary e.g. to inhibit wrong behaviour Sileno, G., Boer, A., Gordon, G., Rieder, B., Like Circles in the Water: Responsibility as a System-Level Function. Proceedings of 3rd XAILA workshop: Explainable and Responsible AI and Law, in conjunction with JURIX 2020 (2020) Requirements for responsibility necessary e.g. to identify wrong behaviour
  • 28. Responsibility gap has the ability to control its own behaviour has the ability to foresee the associated outcomes has the ability to assess actions according to a certain preference/value structure In the Responsible Internet proposal, users gain controllability by low-level programmability (via the NCP).
  • 29. Responsibility gap has the ability to control its own behaviour has the ability to foresee the associated outcomes has the ability to assess actions according to a certain preference/value structure In the Responsible Internet proposal, users gain controllability by low-level programmability (via the NCP). ...but nothing is said about the two other components.
  • 30. Responsibility gap has the ability to control its own behaviour has the ability to foresee the associated outcomes has the ability to assess actions according to a certain preference/value structure In the Responsible Internet proposal, users gain controllability by low-level programmability (via the NCP). ...but nothing is said about the two other components. HOW CAN WE REPAIR THIS?
  • 31. has the ability to control its own behaviour has the ability to foresee the associated outcomes has the ability to assess actions according to a certain preference/value structure [1] We need a model of how the world functions. EXPECTATIONS artefact Reducing the responsibility gap
  • 32. has the ability to control its own behaviour has the ability to foresee the associated outcomes has the ability to assess actions according to a certain preference/value structure [1] We need a model of how the world functions. EXPECTATIONS artefact [2] We need a model of what is valuable in the world. high-level POLICY artefact Reducing the responsibility gap
  • 33. Reducing the responsibility gap has the ability to control its own behaviour has the ability to foresee the associated outcomes has the ability to assess actions according to a certain preference/value structure [1] We need a model of how the world functions. EXPECTATIONS artefact [2] We need a model of what is valuable in the world. high-level POLICY artefact norm as in normal norm as in normative
  • 34. Reducing the responsibility gap has the ability to control its own behaviour has the ability to foresee the associated outcomes has the ability to assess actions according to a certain preference/value structure [1] We need a model of how the world functions. EXPECTATIONS artefact(s) [2] We need a model of what is valuable in the world. high-level POLICY artefact(s) norm as in normal norm as in normative norm pluralism [3] We need to take into account several external sources of norms
  • 35. Reducing the responsibility gap has the ability to control its own behaviour has the ability to foresee the associated outcomes has the ability to assess actions according to a certain preference/value structure [1] We need a model of how the world functions. EXPECTATIONS artefact(s) [2] We need a model of what is valuable in the world. high-level POLICY artefact(s) norm as in normal norm as in normative [3] We need to take into account several external sources of norms need for “normware” technology norm pluralism
  • 36. high-level policy expectations value effects synthesis situated policy low-level policy From higher-level to lower-level policies user’s policy on policies ex policy artefact import import external expectations artefact external expectations artefact external expectations artefact ex policy artefact external policy artefact CONSOLIDATION NCP OPERATIONALIZATION The paper elaborates on the functions required to pass from high-level specifications to low-level policies (e.g. BGP policies and community tags for routing)... user’s policy on expectations
  • 37. Regulative contingency Users, network operators, and the various governance bodies have all legitimate interests to play a role in policy-making. Prototypical conflictual design choice: anonymity vs accountability.
  • 38. Regulative contingency Users, network operators, and the various governance bodies have all legitimate interests to play a role in policy-making. Prototypical conflictual design choice: anonymity vs accountability. Governmental, public agencies are users of the infrastructure, and play a role in the infrastructure governance bodies. The Responsible Internet proposal says that POL ● should be informed by NIP and ● should drive the NCP. users governance bodies network operators data logistic tasks requirements POL NIP NCP
  • 39. Regulative contingency Users, network operators, and the various governance bodies have all legitimate interests to play a role in policy-making. Prototypical conflictual design choice: anonymity vs accountability. Governmental, public agencies are users of the infrastructure, and play a role in the infrastructure governance bodies. The Responsible Internet proposal says that POL ● should be informed by NIP and ● should drive the NCP. users governance bodies network operators data logistic tasks requirements POL NIP NCP but how? to what extent regulators can intervene on users’ activity on the infrastructure?
  • 40. Regulative contingency Users, network operators, and the various governance bodies have all legitimate interests to play a role in policy-making. Prototypical conflictual design choice: anonymity vs accountability. Govermental, public agencies are users of the infrastructure, and play a role in the infrastructure governance bodies. The Responsible Internet proposal says that POL ● should be informed by NIP and ● should drive the NCP. users governance bodies network operators data logistic tasks requirements POL NIP NCP but how? to what extent regulators can intervene on users’ activity on the infrastructure? There is no definitive, global solution: checks & balances vary on a local basis. ● Power-relationships between roles should not be hard-coded, but programmable.
  • 41. Regulative contingency Users, network operators, and the various governance bodies have all legitimate interests to play a role in policy-making. Prototypical conflictual design choice: anonymity vs accountability. Govermental, public agencies are users of the infrastructure, and play a role in the infrastructure governance bodies. The Responsible Internet proposal says that POL ● should be informed by NIP and ● should drive the NCP. users governance bodies network operators data logistic tasks requirements POL NIP NCP but how? to what extent regulators can intervene on users’ activity on the infrastructure? There is no definitive, global solution: checks & balances vary on a local basis. ● Power-relationships between roles should not be hard-coded, but programmable. → an additional use case for a policy-based technology
  • 42. Conclusions (1a) “give me eyes, and I’ll know where I’ll go” Computation cannot be “responsible” if the computational agent has no means to evaluate the effect of its actions, and then to prevent wrong outcomes.
  • 43. Conclusions (1b) “give me eyes, and I’ll know where I’ll go” Computation cannot be “responsible” if the computational agent has no means to evaluate the effect of its actions, and then to prevent wrong outcomes. “pipes are dumb, water drinkers are not” Networks are supposed to operate blindly with respect to the content they transport, by making decisions on packets and unaware of the value of the whole transactions. But this information is (to some extent) available at the users’ endpoints! In full control, users should be able to provide some artefact specifying their preference/value structure and their expectations. Network operators should operate, still blindly, just according to these directives.
  • 44. Conclusions (2a) “do not hard-code what is soft-coded” It is premature, if not wrong, to aim to a definitive solution concerning power-relationships (e.g. full-control for users and full-blindness for network operators). Too many local contextual factors intervene to set which are the “right” checks and balances. We need programmability also at this level. But what to program?
  • 45. Conclusions (2b) “do not hard-code what is soft-coded” It is premature, if not wrong, to aim to a definitive solution concerning power-relationships (e.g. full-control for users and full-blindness for network operators). Too many local contextual factors intervene to set which are the “right” checks and balances. We need programmability also at this level. But what to program? “what works, it may work” For a global network like the Internet, possible starting points would be normative constructs and frameworks developed in non-computational contexts, as in international law, or most plausibly in international private law, already operative across very diverse jurisdictions.
  • 46. Accounting Value Effects for Responsible Networking Giovanni Sileno g.sileno@uva.nl Complex Cyber Infrastructure (CCI) Paola Grosso p.grosso@uva.nl Multiscale Networked Systems (MNS) University of Amsterdam ACM SIGCOMM 2021 Workshop on Technologies, Applications, and Uses of a Responsible Internet (TAURIN 2021), 23 August 2021