Skip to main content

Advertisement

Log in

Placing Humans in the Feedback Loop of Social Infrastructures

NII Research Strategies on Cyber-Physical Systems

  • HAUPTBEITRAG
  • FEEDBACK LOOP OF SOCIAL INFRASTRUCTURES
  • Published:
Informatik-Spektrum Aims and scope

Abstract

Informatics is more than just computer science and incorporates the impact of services on society, where individuals interact with information technology. The mode of interaction has not changed, and still requires adaption of humans to the system. This however, cannot be maintained with an “Internet of Things,” where physical entities interact with computers and Big Data transforms known concepts of learning and adaption. The NII (National Institute of Informatics) is Japan’s primary academic research body in evolving social infrastructures. Wiener’s vision of “cybernetics” and the objectives associated with the internationally almost forgotten term “informatics” may help in detecting the unifying “ribbon” around seemingly loosely coupled projects. While Wiener describes the conjunction of control and communication, where in a closed feedback loop the control logic is driven by physical measures, the NII extends this model to include humans, which expands the challenges of the control logic to the conjunction of cyberspace and physical processes. This may have social impacts as well as technical challenges, such as the ability to build a reverse interaction model. In addition, future development may lead to the emergence of unintended, unpredictable safety, reliability, and acceptance problems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Aida K: Aida Laboratory, http://www.aidalab.org, last access 17.07.2013

  2. Aoki Y, Hayami K, De Sterck H, Konagaya A (2011) Cluster Newton Method for Sampling Multiple Solutions of an Underdetermined Inverse Problem: Parameter Identification for Pharmacokinetics. In: NII Technical Reports (NII-2011-002E), National Institute of Informatics, Tokyo, pp 1–38

  3. Augusto J (2007) Ambient Intelligence: The Confluence of Ubiquitous/Pervasive Computing and Artificial Intelligence, Intelligent Computing Everywhere. Springer, Berlin Heidelberg, pp 213–234

  4. Boin A, McConnell A (2007) Preparing for critical infrastructure breakdowns: the limits of crisis management and the need for resilience. J Conting Crisis Manage 15(1):50–59

    Google Scholar 

  5. Buchmann J (ed) (2013) Internet Privacy – Options for adequate realization, Acatech Study. Springer

  6. Chan H, Darwiche A (2005) On the revision of probabilistic beliefs using uncertain evidence. Artif Intell 163(1):67–90

    Google Scholar 

  7. Cheung G, Ortega A, Cheung N (2011) Interactive streaming of stored multiview video using redundant frame structures. IEEE T Image Process 20(3):744–761

    Google Scholar 

  8. Collier N, Doan S, Kawazoe A, Matsuda Goodwin R, Conway M, Tateno Y, Ngo Q, Dien D, Kawtrakul A, Takeuchi K, Shigematsu M, Taniguchi K (2008) BioCaster: detecting public health rumors with a Web-based text mining system. Bioinformatics 24(24):2940–2941, Oxford University Press, DOI: 10.1093/bioinformatics/btn534

    Google Scholar 

  9. Collier N, Nobata C, Tsujii J (2000) Extracting the names of genes and gene products with a Hidden Markov Model. In: Proceedings of the International Conference on Computational Linguistics (COLING’2000), Saarbrucken, Germany, July 31st–August 4th, pp 201–207

  10. Collier N, Park H, Ogata N, Tateishi Y, Nobata C, Ohta T, Sekimizu T, Imai H, Tsujii J (1999) The GENIA project: Corpus-based knowledge acquisition and information extraction from genome research papers. In: Proceedings of the Annual Meeting of the European Association for Computational Linguistics (EACL-99), Bergen, Norway, June 8–12, pp 271–272

  11. Dijkstra EW (1972) The humble programmer. Commun ACM 15(10):859–866

    Google Scholar 

  12. Gajananan K, Nantes A, Miska M, Nakasone A, Prendinger H (2013) An experimental space for conducting controlled driving behavior studies based on a multiuser networked 3D virtual environment and the Scenario Markup Language. IEEE T Hum-Mach Syst 43(4):345–358

    Google Scholar 

  13. Hollnagel E, Pariès J, Woods D D (2011) Resilience Engineering in Practice: A Guidebook, Ashgate Studies in Resilience Engineering. Ashgate Publishing Company

  14. Inamura T (2010) Simulator platform that enables social interaction simulation – SIGVerse: SocioIntelliGenesis simulator. In: Proceedings of the IEEE/SICE International Symposium on System Integration, pp 212–217

  15. Kawarabayashi K, Klein P, Sommer C (2011) Linear-space approximate distance oracles for planar, bounded-genus and minor-free graphs. In: Aceto L, Henzinger M, Sgall J (eds) Automata, Languages and Programming, Lecture Notes in Computer Science 6755, Springer, Berlin Heidelberg, pp 135–146

  16. Kim JD, Ohta T, Tsuruoka Y, Tateisi Y, Collier N (2004) Introduction to the bio-entity recognition task at JNLPBA. In: Proceedings of the Joint Workshop on Natural Language Processing in Biomedicine and its Applications, Geneva, Switzerland, August 28–29, pp 70–75

  17. Kitamoto A (2009) Digital Typhoon: Emergency Information System Enabled By Ranking and Sharing of Multimedia Data. In: Pacific-Rim Symposium on Image and Video Technology (PSIVT 2009), CD-ROM Proceedings (Demo Session), pp D-II-7

  18. Kitamoto A (2005) Digital Typhoon: Near real-time aggregation, recombination and delivery of typhoon-related information. In: Proceedings of the 4th International Symposium on Digital Earth (ISDE), (CD-ROM)

  19. Kitamoto A (2012) Typhoon website. http://www.digital-typhoon.org, last access 17.07.2013

  20. Kitamoto A (2000) The development of typhoon image database with content-based search. In: Proceedings of the 1st International Symposium on Advanced Informatics (AdInfo), pp 163–170

  21. Kodama K, Furuyama N (2011) Comparing intra- and inter-personal coordination systems: Perceptual effect on stability of finger tapping movement. In: Proceedings of the IEEE/SICE International Symposium on System Integration (SII), pp 1096–1100

  22. Konagaya A (2012) Towards an In Silico Approach to Personalized Pharmacokinetics. In: Meghea, Molecular Interactions, InTech, pp 263–282

  23. Konieczny S, Marquis P, Schwind N (2011) Belief Base Rationalization for Propositional Merging. In: Proceedings of the 22nd International Joint Conference on Artificial Intelligence (IJCAI-11), pp 951–956

  24. Longstaff P H (2005) Security, Resilience, and Communication in Unpredictable Environments Such as Terrorism, Natural Disasters, and Complexity Technology. Center for Information Policy Research, Harvard University Program on Information Resources Policy

  25. Maruyama H, Inoue K, Tsubaki H, Akashi H, Okada H, Minami K (2012) Towards Systems Resilience. Forum on Information Technology (FIT) (in Japanese)

  26. McAfee A, Brynjolfsson E (2008) Investing in the IT That Makes a Competitive Difference. Harvard Business Review, July-August

  27. Mullen A, Collier N (2004) Sentiment analysis using support vector machines with diverse information sources. In: Proceedings of the 2004 Empirical Methods in Natural Language Processing (EMNLP), Barcelona, Spain, July 25–26, pp 412–418

  28. Müller G, Sonehara N, Echizen I, Wohlgemuth S (2011) Sustainable cloud computing. Bus Inform Syst Eng 3(3):129–131

    Google Scholar 

  29. Nakajima S (2011) An Architecture of Dynamically Adaptive PHP-based Web Applications. In: Thu TD, Leung K (eds) Proceedings of the 17th Asia-Pacific Software Engineering Conference (APSEC). IEEE Computer Society Press, Los Alamitos, pp 203–210

  30. National Institute of Informatics (NII) (2013) http://www.nii.ac.jp/en, last access 17.07.2013

  31. Okimoto T, Joe Y, Iwasaki A, Matsui T, Hirayama K, Yokoo M (2012) Interactive Algorithm for Multi-Objective Constraint Optimization. In: Proceedings of the 18th International Conference on Principles and Practice of Constraint Programming (CP 2012), pp 561–576

  32. Okuno K, Inamura T (2011) Motion Coaching with Emphatic Motions and Adverbial Expressions for Human beings by Robotic System – Method for Controlling Motions and Expressions with Sole Parameter. In: Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, pp 3381–3386

  33. Prendinger H, Ullrich S, Nakasone A, Ishizuka M (2011) MPML3D: scripting agents for the 3D internet. IEEE T Vis Comput Gr 17(5):655–668

    Google Scholar 

  34. Sakama C, Inoue K (2012) Abduction, Unpredictability and Garden of Eden. In: Proceedings of the Model-Based Reasoning in Science and Technology (MBR 2012), Sestri Levante, Italy, June

  35. Sato I (2010) Integrative studies of neural mechanisms and advanced information technologies for perception of material and surface qualities. http://shitsukan.jp/content/137, last access 17.07.2013

  36. Smith D, Fischbacher M (2009) The changing nature of risk and risk management: The challenge of borders, uncertainty and resilience. Risk Manage 11(1):1–12

    Google Scholar 

  37. Steinbuch K (1971) Automat und Mensch. Auf dem Weg zu einer kybernetischen Anthropologie, Heidelberger Taschenbücher, Bd 81. Springer-Verlag, New York

  38. Sterritt R (2005) Autonomic computing, Innovations in systems and software engineering, Springer, Berlin Heidelberg, pp 79–88

  39. Tainaka M (2011) Faster and More Robust. The New, Evolved SINET4. In: SINET4 – The Next Stage of Information Lifelines (NII Special), NII Today No.38, Tokyo, http://www.nii.ac.jp/userdata/results/pr_data/NII_Today/52_en/p4-7.pdf, last access 17.07.2013

  40. Ultra-Large-Scale Systems. http://www.sei.cmu.edu/uls/, last access 17.07.2013

  41. Uno T, Arimura H (2004) Program Codes. http://research.nii.ac.jp/∼uno/codes.htm, last access 17.07.2013

  42. Wattarujeekrit T, Shah P, Collier N (2004) PASBio: predicate-argument structures for event extraction in molecular biology. BMC Bioinform 5(155):182–196, DOI: 10.1186/1471-2105-5-155

    Google Scholar 

  43. Weitl F, Nakajima S (2011) Integrated Model Checking of Static Structure and Dynamic Behavior using Temporal Description Logics. In: Proceedings of the 11th AVoCS International Workshop on Automated Verification of Critical Systems, September 2011, Newcastle, ECEASST 46

  44. Wiener N (1961) Cybernetics, or control and communication in the animal and the machine, 2nd edn., Wiley 1948. MIT Press

  45. Wohlgemuth S, Echizen I, Sonehara N, Müller G (2010) Tagging disclosures of personal data to third parties to preserve privacy. In: Rannenberg K, Varadharajan V, Weber C (eds.) Security and Privacy – Silver Linings in the Cloud, volume 330 of IFIP Advances in Information and Communication Technology. Springer, Berlin Heidelberg, pp 241–252

  46. Yamada T, Gohshi S, Echizen I (2012) Use of invisible noise signals to prevent privacy invasion through face recognition from camera images. In: Proceedings of the ACM Multimedia (ACM MM 2012), October, pp 1315–1316

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Günter Müller.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Müller, G., Wahlster, W. Placing Humans in the Feedback Loop of Social Infrastructures. Informatik Spektrum 36, 520–529 (2013). https://doi.org/10.1007/s00287-013-0735-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00287-013-0735-7

Keywords

Navigation