Abstract
Informatics is more than just computer science and incorporates the impact of services on society, where individuals interact with information technology. The mode of interaction has not changed, and still requires adaption of humans to the system. This however, cannot be maintained with an “Internet of Things,” where physical entities interact with computers and Big Data transforms known concepts of learning and adaption. The NII (National Institute of Informatics) is Japan’s primary academic research body in evolving social infrastructures. Wiener’s vision of “cybernetics” and the objectives associated with the internationally almost forgotten term “informatics” may help in detecting the unifying “ribbon” around seemingly loosely coupled projects. While Wiener describes the conjunction of control and communication, where in a closed feedback loop the control logic is driven by physical measures, the NII extends this model to include humans, which expands the challenges of the control logic to the conjunction of cyberspace and physical processes. This may have social impacts as well as technical challenges, such as the ability to build a reverse interaction model. In addition, future development may lead to the emergence of unintended, unpredictable safety, reliability, and acceptance problems.
Similar content being viewed by others
References
Aida K: Aida Laboratory, http://www.aidalab.org, last access 17.07.2013
Aoki Y, Hayami K, De Sterck H, Konagaya A (2011) Cluster Newton Method for Sampling Multiple Solutions of an Underdetermined Inverse Problem: Parameter Identification for Pharmacokinetics. In: NII Technical Reports (NII-2011-002E), National Institute of Informatics, Tokyo, pp 1–38
Augusto J (2007) Ambient Intelligence: The Confluence of Ubiquitous/Pervasive Computing and Artificial Intelligence, Intelligent Computing Everywhere. Springer, Berlin Heidelberg, pp 213–234
Boin A, McConnell A (2007) Preparing for critical infrastructure breakdowns: the limits of crisis management and the need for resilience. J Conting Crisis Manage 15(1):50–59
Buchmann J (ed) (2013) Internet Privacy – Options for adequate realization, Acatech Study. Springer
Chan H, Darwiche A (2005) On the revision of probabilistic beliefs using uncertain evidence. Artif Intell 163(1):67–90
Cheung G, Ortega A, Cheung N (2011) Interactive streaming of stored multiview video using redundant frame structures. IEEE T Image Process 20(3):744–761
Collier N, Doan S, Kawazoe A, Matsuda Goodwin R, Conway M, Tateno Y, Ngo Q, Dien D, Kawtrakul A, Takeuchi K, Shigematsu M, Taniguchi K (2008) BioCaster: detecting public health rumors with a Web-based text mining system. Bioinformatics 24(24):2940–2941, Oxford University Press, DOI: 10.1093/bioinformatics/btn534
Collier N, Nobata C, Tsujii J (2000) Extracting the names of genes and gene products with a Hidden Markov Model. In: Proceedings of the International Conference on Computational Linguistics (COLING’2000), Saarbrucken, Germany, July 31st–August 4th, pp 201–207
Collier N, Park H, Ogata N, Tateishi Y, Nobata C, Ohta T, Sekimizu T, Imai H, Tsujii J (1999) The GENIA project: Corpus-based knowledge acquisition and information extraction from genome research papers. In: Proceedings of the Annual Meeting of the European Association for Computational Linguistics (EACL-99), Bergen, Norway, June 8–12, pp 271–272
Dijkstra EW (1972) The humble programmer. Commun ACM 15(10):859–866
Gajananan K, Nantes A, Miska M, Nakasone A, Prendinger H (2013) An experimental space for conducting controlled driving behavior studies based on a multiuser networked 3D virtual environment and the Scenario Markup Language. IEEE T Hum-Mach Syst 43(4):345–358
Hollnagel E, Pariès J, Woods D D (2011) Resilience Engineering in Practice: A Guidebook, Ashgate Studies in Resilience Engineering. Ashgate Publishing Company
Inamura T (2010) Simulator platform that enables social interaction simulation – SIGVerse: SocioIntelliGenesis simulator. In: Proceedings of the IEEE/SICE International Symposium on System Integration, pp 212–217
Kawarabayashi K, Klein P, Sommer C (2011) Linear-space approximate distance oracles for planar, bounded-genus and minor-free graphs. In: Aceto L, Henzinger M, Sgall J (eds) Automata, Languages and Programming, Lecture Notes in Computer Science 6755, Springer, Berlin Heidelberg, pp 135–146
Kim JD, Ohta T, Tsuruoka Y, Tateisi Y, Collier N (2004) Introduction to the bio-entity recognition task at JNLPBA. In: Proceedings of the Joint Workshop on Natural Language Processing in Biomedicine and its Applications, Geneva, Switzerland, August 28–29, pp 70–75
Kitamoto A (2009) Digital Typhoon: Emergency Information System Enabled By Ranking and Sharing of Multimedia Data. In: Pacific-Rim Symposium on Image and Video Technology (PSIVT 2009), CD-ROM Proceedings (Demo Session), pp D-II-7
Kitamoto A (2005) Digital Typhoon: Near real-time aggregation, recombination and delivery of typhoon-related information. In: Proceedings of the 4th International Symposium on Digital Earth (ISDE), (CD-ROM)
Kitamoto A (2012) Typhoon website. http://www.digital-typhoon.org, last access 17.07.2013
Kitamoto A (2000) The development of typhoon image database with content-based search. In: Proceedings of the 1st International Symposium on Advanced Informatics (AdInfo), pp 163–170
Kodama K, Furuyama N (2011) Comparing intra- and inter-personal coordination systems: Perceptual effect on stability of finger tapping movement. In: Proceedings of the IEEE/SICE International Symposium on System Integration (SII), pp 1096–1100
Konagaya A (2012) Towards an In Silico Approach to Personalized Pharmacokinetics. In: Meghea, Molecular Interactions, InTech, pp 263–282
Konieczny S, Marquis P, Schwind N (2011) Belief Base Rationalization for Propositional Merging. In: Proceedings of the 22nd International Joint Conference on Artificial Intelligence (IJCAI-11), pp 951–956
Longstaff P H (2005) Security, Resilience, and Communication in Unpredictable Environments Such as Terrorism, Natural Disasters, and Complexity Technology. Center for Information Policy Research, Harvard University Program on Information Resources Policy
Maruyama H, Inoue K, Tsubaki H, Akashi H, Okada H, Minami K (2012) Towards Systems Resilience. Forum on Information Technology (FIT) (in Japanese)
McAfee A, Brynjolfsson E (2008) Investing in the IT That Makes a Competitive Difference. Harvard Business Review, July-August
Mullen A, Collier N (2004) Sentiment analysis using support vector machines with diverse information sources. In: Proceedings of the 2004 Empirical Methods in Natural Language Processing (EMNLP), Barcelona, Spain, July 25–26, pp 412–418
Müller G, Sonehara N, Echizen I, Wohlgemuth S (2011) Sustainable cloud computing. Bus Inform Syst Eng 3(3):129–131
Nakajima S (2011) An Architecture of Dynamically Adaptive PHP-based Web Applications. In: Thu TD, Leung K (eds) Proceedings of the 17th Asia-Pacific Software Engineering Conference (APSEC). IEEE Computer Society Press, Los Alamitos, pp 203–210
National Institute of Informatics (NII) (2013) http://www.nii.ac.jp/en, last access 17.07.2013
Okimoto T, Joe Y, Iwasaki A, Matsui T, Hirayama K, Yokoo M (2012) Interactive Algorithm for Multi-Objective Constraint Optimization. In: Proceedings of the 18th International Conference on Principles and Practice of Constraint Programming (CP 2012), pp 561–576
Okuno K, Inamura T (2011) Motion Coaching with Emphatic Motions and Adverbial Expressions for Human beings by Robotic System – Method for Controlling Motions and Expressions with Sole Parameter. In: Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, pp 3381–3386
Prendinger H, Ullrich S, Nakasone A, Ishizuka M (2011) MPML3D: scripting agents for the 3D internet. IEEE T Vis Comput Gr 17(5):655–668
Sakama C, Inoue K (2012) Abduction, Unpredictability and Garden of Eden. In: Proceedings of the Model-Based Reasoning in Science and Technology (MBR 2012), Sestri Levante, Italy, June
Sato I (2010) Integrative studies of neural mechanisms and advanced information technologies for perception of material and surface qualities. http://shitsukan.jp/content/137, last access 17.07.2013
Smith D, Fischbacher M (2009) The changing nature of risk and risk management: The challenge of borders, uncertainty and resilience. Risk Manage 11(1):1–12
Steinbuch K (1971) Automat und Mensch. Auf dem Weg zu einer kybernetischen Anthropologie, Heidelberger Taschenbücher, Bd 81. Springer-Verlag, New York
Sterritt R (2005) Autonomic computing, Innovations in systems and software engineering, Springer, Berlin Heidelberg, pp 79–88
Tainaka M (2011) Faster and More Robust. The New, Evolved SINET4. In: SINET4 – The Next Stage of Information Lifelines (NII Special), NII Today No.38, Tokyo, http://www.nii.ac.jp/userdata/results/pr_data/NII_Today/52_en/p4-7.pdf, last access 17.07.2013
Ultra-Large-Scale Systems. http://www.sei.cmu.edu/uls/, last access 17.07.2013
Uno T, Arimura H (2004) Program Codes. http://research.nii.ac.jp/∼uno/codes.htm, last access 17.07.2013
Wattarujeekrit T, Shah P, Collier N (2004) PASBio: predicate-argument structures for event extraction in molecular biology. BMC Bioinform 5(155):182–196, DOI: 10.1186/1471-2105-5-155
Weitl F, Nakajima S (2011) Integrated Model Checking of Static Structure and Dynamic Behavior using Temporal Description Logics. In: Proceedings of the 11th AVoCS International Workshop on Automated Verification of Critical Systems, September 2011, Newcastle, ECEASST 46
Wiener N (1961) Cybernetics, or control and communication in the animal and the machine, 2nd edn., Wiley 1948. MIT Press
Wohlgemuth S, Echizen I, Sonehara N, Müller G (2010) Tagging disclosures of personal data to third parties to preserve privacy. In: Rannenberg K, Varadharajan V, Weber C (eds.) Security and Privacy – Silver Linings in the Cloud, volume 330 of IFIP Advances in Information and Communication Technology. Springer, Berlin Heidelberg, pp 241–252
Yamada T, Gohshi S, Echizen I (2012) Use of invisible noise signals to prevent privacy invasion through face recognition from camera images. In: Proceedings of the ACM Multimedia (ACM MM 2012), October, pp 1315–1316
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Müller, G., Wahlster, W. Placing Humans in the Feedback Loop of Social Infrastructures. Informatik Spektrum 36, 520–529 (2013). https://doi.org/10.1007/s00287-013-0735-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00287-013-0735-7