The aim of this research/project is to investigate and analyze the opportunities and challenges of implementing AI technologies in general and in the transport and logistics sectors. Also, the potential impacts of AI at sectoral, regional, and societal scales that can be identified and chan- neled, in the field of transport and logistics sectors, are investigated. Special attention will be given to the importance and significance of AI adoption in the development of sustainable transport and logistics activities using intelligent and autonomous transport and cleaner transport modalities. The emphasis here is therefore on the pursuit of ‘zero emissions’ in transport and logistics at the urban/city and regional levels.Another goal of this study is to examine a new path for follow-up research topics related to the economic and societal impacts of AI technology and the adoption of AI systems at organizational and sectoral levels.This report is based on an exploratory/descriptive analysis and focuses mainly on the examination of existing literature and (empirical) scientific research publica- tions, previous and ongoing AI initiatives and projects (use cases), policy documents, etc., especially in the fields of transport and logistics in the Netherlands. It presents and discusses many aspects of existing challenges and opportunities that face organizations, activities, and individuals when adopting AI technology and systems.
This book brings together voices from various fields of intellectual inquiry, based on the idea that technological, legal and societal aspects of the information sphere are interlinked and co-dependent from each other. In order to tackle the existing gap in shared semantics, this glossary converges the efforts of experts from various disciplines to build a shared vocabulary on the social, technical, economic, political aspects of decentralised, distributed or sovereign technologies: artefacts which seek to challenge the techno-social status quo by, for example, circumventing law enforcement, resisting surveillance, or being participative.The idea ofthis glossary arose from the need for a workable, flexible and multidisciplinary resource for terminological clarity, which reflects instead of denying complexity. Situating the terms emerging through technology development in the wider context of multidisciplinary scientific, policy and political discourses, this glossary provides a conceptual toolkit for the study of the various political, economic, legal and technical struggles that decentralised, encryption-based, peer-to-peer technologies bring about and go through.Choosing relevant technology-related terms and understanding them is to investigate their affordances within a given ecosystem of actors, discourses and systems of incentives. This requires an interdisciplinary, multi-layered approach that is attentive to the interlinkages between technological design nuances and socio-political, economic implications.The glossary was envisioned as a long-term collaborative project, and as a work-in-progress, as new entries are periodically added over time. The present book collects the entries published on the Internet Policy Review between 2021 and 2023. Therefore, it represents the first volume of what hopefully will be a long-term, ever-evolving editorial collaboration, whose sources of inspiration and goals evolve with the evolving of the broader discussions on decentralized technologies.
From the article: This paper describes the external IT security analysis of an international corporate organization, containing a technical and a social perspective, resulting in a proposed repeatable approach and lessons learned for applying this approach. Part of the security analysis was the utilization of a social engineering experiment, as this could be used to discover employee related risks. This approach was based on multiple signals that indicated a low IT security awareness level among employees as well as the results of a preliminary technical analysis. To carry out the social engineering experiment, two techniques were used. The first technique was to send phishing emails to both the system administrators and other employees of the company. The second technique comprised the infiltration of the office itself to test the physical security, after which two probes were left behind. The social engineering experiment proved that general IT security awareness among employees was very low. The results allowed the research team to infiltrate the network and have the possibility to disable or hamper crucial processes. Social engineering experiments can play an important role in conducting security analyses, by showing security vulnerabilities and raising awareness within a company. Therefore, further research should focus on the standardization of social engineering experiments to be used in security analyses and further development of the approach itself. This paper provides a detailed description of the used methods and the reasoning behind them as a stepping stone for future research on this subject. van Liempd, D., Sjouw, A., Smakman, M., & Smit, K. (2019). Social Engineering As An Approach For Probing Organizations To Improve It Security: A Case Study At A Large International Firm In The Transport Industry. 119-126. https://doi.org/10.33965/es2019_201904l015