-
Quantifying the Cross-sectoral Intersecting Discrepancies within Multiple Groups Using Latent Class Analysis Towards Fairness
Authors:
Yingfang Yuan,
Kefan Chen,
Mehdi Rizvi,
Lynne Baillie,
Wei Pang
Abstract:
The growing interest in fair AI development is evident. The ''Leave No One Behind'' initiative urges us to address multiple and intersecting forms of inequality in accessing services, resources, and opportunities, emphasising the significance of fairness in AI. This is particularly relevant as an increasing number of AI tools are applied to decision-making processes, such as resource allocation an…
▽ More
The growing interest in fair AI development is evident. The ''Leave No One Behind'' initiative urges us to address multiple and intersecting forms of inequality in accessing services, resources, and opportunities, emphasising the significance of fairness in AI. This is particularly relevant as an increasing number of AI tools are applied to decision-making processes, such as resource allocation and service scheme development, across various sectors such as health, energy, and housing. Therefore, exploring joint inequalities in these sectors is significant and valuable for thoroughly understanding overall inequality and unfairness. This research introduces an innovative approach to quantify cross-sectoral intersecting discrepancies among user-defined groups using latent class analysis. These discrepancies can be used to approximate inequality and provide valuable insights to fairness issues. We validate our approach using both proprietary and public datasets, including EVENS and Census 2021 (England & Wales) datasets, to examine cross-sectoral intersecting discrepancies among different ethnic groups. We also verify the reliability of the quantified discrepancy by conducting a correlation analysis with a government public metric. Our findings reveal significant discrepancies between minority ethnic groups, highlighting the need for targeted interventions in real-world AI applications. Additionally, we demonstrate how the proposed approach can be used to provide insights into the fairness of machine learning.
△ Less
Submitted 11 July, 2024; v1 submitted 24 May, 2024;
originally announced July 2024.
-
Introducing and Interfacing with Cybersecurity -- A Cards Approach
Authors:
Ryan Shah,
Manuel Maarek,
Shenando Stals,
Lynne Baillie,
Sheung Chi Chan,
Robert Stewart,
Hans-Wolfgang Loidl,
Olga Chatzifoti
Abstract:
Cybersecurity is an important topic which is often viewed as one that is inaccessible due to steep learning curves and a perceived requirement of needing specialist knowledge. With a constantly changing threat landscape, practical solutions such as best-practices are employed, but the number of critical cybersecurity-related incidents remains high. To address these concerns, the National Cyber Sec…
▽ More
Cybersecurity is an important topic which is often viewed as one that is inaccessible due to steep learning curves and a perceived requirement of needing specialist knowledge. With a constantly changing threat landscape, practical solutions such as best-practices are employed, but the number of critical cybersecurity-related incidents remains high. To address these concerns, the National Cyber Security Centre published a Cybersecurity Body of Knowledge (CyBOK) to provide a comprehensive information base used to advise and underpin cybersecurity learning. Unfortunately, CyBOK contains over 1000 pages of in-depth material and may not be easy to navigate for novice individuals. Furthermore, it does not allow for easy expression of various cybersecurity scenarios that such individuals may be exposed to. As a solution to these two issues, we propose the use of a playing cards format to provide introductory cybersecurity knowledge that supports learning and discussion, using CyBOK as the foundation for the technical content. Upon evaluation in two user studies, we found that 80% of the participants agreed the cards provided them with introductory knowledge of cybersecurity topics, and 70% agreed the cards provided an interface for discussing topics and enabled them to make links between attacks, vulnerabilities and defences.
△ Less
Submitted 31 July, 2023;
originally announced July 2023.
-
Investigating Concerns of Security and Privacy Among Rohingya Refugees in Malaysia
Authors:
Theodoros Georgiou,
Lynne Baillie,
Ryan Shah
Abstract:
The security and privacy of refugee communities have emerged as pressing concerns in the context of increasing global migration. The Rohingya refugees are a stateless Muslim minority group in Myanmar who were forced to flee their homes after conflict broke out, with many fleeing to neighbouring countries and ending up in refugee camps, such as in Bangladesh. However, others migrated to Malaysia an…
▽ More
The security and privacy of refugee communities have emerged as pressing concerns in the context of increasing global migration. The Rohingya refugees are a stateless Muslim minority group in Myanmar who were forced to flee their homes after conflict broke out, with many fleeing to neighbouring countries and ending up in refugee camps, such as in Bangladesh. However, others migrated to Malaysia and those who arrive there live within the community as urban refugees. However, the Rohingya in Malaysia are not legally recognized and have limited and restricted access to public resources such as healthcare and education. This means they face security and privacy challenges, different to other refugee groups, which are often compounded by this lack of recognition, social isolation and lack of access to vital resources. This paper discusses the implications of security and privacy of the Rohingya refugees, focusing on available and accessible technological assistance, uncovering the heightened need for a human-centered approach to design and implementation of solutions that factor in these requirements. Overall, the discussions and findings presented in this paper on the security and privacy of the Rohingya provides a valuable resource for researchers, practitioners and policymakers in the wider HCI community.
△ Less
Submitted 4 April, 2023;
originally announced April 2023.
-
Addressing Potential Pitfalls of SAR Assistance on the Aging Population
Authors:
Emilyann Nault,
Ronnie Smith,
Lynne Baillie
Abstract:
In the field of Human Robot Interaction (HRI), socially assistive robots are being investigated to see if they can help combat challenges that can come with aging by providing different forms of support to older adults. As a result, it is imperative that the HRI community are aware of the potential pitfalls that can occur such as over-attachment, over-reliance, and increased isolation. This positi…
▽ More
In the field of Human Robot Interaction (HRI), socially assistive robots are being investigated to see if they can help combat challenges that can come with aging by providing different forms of support to older adults. As a result, it is imperative that the HRI community are aware of the potential pitfalls that can occur such as over-attachment, over-reliance, and increased isolation. This position paper argues designers should (a) avoid pitfalls that can lead to a negative impact on decline, and (b) leverage SAR decision making to avoid the pitfalls while attaining the benefits of this technology. Finally, we describe the concept for a framework as a starting point for addressing the concerns raised in this paper.
△ Less
Submitted 24 March, 2023;
originally announced March 2023.
-
Communicating Complex Decisions in Robot-Assisted Therapy
Authors:
Carl Bettosi,
Kefan Chen,
Ryan Shah,
Lynne Baillie
Abstract:
Socially Assistive Robots (SARs) have shown promising potential in therapeutic scenarios as decision-making instructors or motivational companions. In human-human therapy, experts often communicate the thought process behind the decisions they make to promote transparency and build trust. As research aims to incorporate more complex decision-making models into these robots to drive better interact…
▽ More
Socially Assistive Robots (SARs) have shown promising potential in therapeutic scenarios as decision-making instructors or motivational companions. In human-human therapy, experts often communicate the thought process behind the decisions they make to promote transparency and build trust. As research aims to incorporate more complex decision-making models into these robots to drive better interaction, the ability for the SAR to explain its decisions becomes an increasing challenge. We present the latest examples of complex SAR decision-makers. We argue that, based on the importance of transparent communication in human-human therapy, SARs should incorporate such components into their design. To stimulate discussion around this topic, we present a set of design considerations for researchers.
△ Less
Submitted 24 March, 2023;
originally announced March 2023.
-
Towards an Adaptive Robot for Sports and Rehabilitation Coaching
Authors:
Martin K. Ross,
Frank Broz,
Lynne Baillie
Abstract:
The work presented in this paper aims to explore how, and to what extent, an adaptive robotic coach has the potential to provide extra motivation to adhere to long-term rehabilitation and help fill the coaching gap which occurs during repetitive solo practice in high performance sport. Adapting the behavior of a social robot to a specific user, using reinforcement learning (RL), could be a way of…
▽ More
The work presented in this paper aims to explore how, and to what extent, an adaptive robotic coach has the potential to provide extra motivation to adhere to long-term rehabilitation and help fill the coaching gap which occurs during repetitive solo practice in high performance sport. Adapting the behavior of a social robot to a specific user, using reinforcement learning (RL), could be a way of increasing adherence to an exercise routine in both domains. The requirements gathering phase is underway and is presented in this paper along with the rationale of using RL in this context.
△ Less
Submitted 13 September, 2019;
originally announced September 2019.
-
Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors
Authors:
Hilmi Gunes Kayacik,
Mike Just,
Lynne Baillie,
David Aspinall,
Nicholas Micallef
Abstract:
We propose a lightweight, and temporally and spatially aware user behaviour modelling technique for sensor-based authentication. Operating in the background, our data driven technique compares current behaviour with a user profile. If the behaviour deviates sufficiently from the established norm, actions such as explicit authentication can be triggered. To support a quick and lightweight deploymen…
▽ More
We propose a lightweight, and temporally and spatially aware user behaviour modelling technique for sensor-based authentication. Operating in the background, our data driven technique compares current behaviour with a user profile. If the behaviour deviates sufficiently from the established norm, actions such as explicit authentication can be triggered. To support a quick and lightweight deployment, our solution automatically switches from training mode to deployment mode when the user's behaviour is sufficiently learned. Furthermore, it allows the device to automatically determine a suitable detection threshold. We use our model to investigate practical aspects of sensor-based authentication by applying it to three publicly available data sets, computing expected times for training duration and behaviour drift. We also test our model with scenarios involving an attacker with varying knowledge and capabilities.
△ Less
Submitted 28 October, 2014;
originally announced October 2014.