Computing-Model and Computing-Hardware Selection for ICT under Societal and Judicial Constraints
Permanent lenke
https://hdl.handle.net/10037/36253Dato
2024-12-18Type
Journal articleTidsskriftartikkel
Peer reviewed
Sammendrag
This article discusses a formalization of aspects of Cyber-Sovereignty (CyS) for information
and communication technology (ICT), linking them to technological trustworthiness and deriving an
associated paradigm for hard- and software design. The upcoming 6G ICT standard is considered a keystone
within modern society’s increasing interconnectedness and automatization, as it provides the necessary
technological infrastructure for applications such as the Metaverse or large-scale digital twinning. Since
emerging technological systems increasingly affect sensitive human goods, hard- and software manufacturers
must consider a new dimension of societal and judicial constraints in the context of technological
trustworthiness. This article aims to establish a formalized theory of specific aspects of CyS, providing
a paradigm for hard- and software engineering in ICT. This paradigm is directly applicable in formal
technology assessment and ensures that the relevant facets of CyS – specifically, the principle of Algorithmic
Transparency (AgT) – are satisfied. The framework follows an axiomatic approach. Particularly, the formal
basis of our theory consists of four fundamental assumptions about the general nature of physical problems
and algorithmic implementations. This formal basis allows for drawing general conclusions on the relation
between CyS and technological trustworthiness and entails a formal meta-thesis on AgT in digital computing.
Forlag
IEEESitering
Bock, Boche, Fitzek, Kutyniok. Computing-Model and Computing-Hardware Selection for ICT under Societal and Judicial Constraints. IEEE Access. 2024Metadata
Vis full innførselSamlinger
Copyright 2024 The Author(s)