SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
What can we know of computational inforgs?




                                    *F. Gobbo & M. Benini
                                   Univ. of L’Aquila & Leeds
                                                       C
                                       CC    BY:   $




                                                   
                                  WPI5, Univ. of Hertfordshire,
                                      March 27-28, 2013
1 of 17
Introduction
What is computational information?


   ‘Information’ may be understood in many ways, e.g. as
   signals, natural patterns or nomic regularities, as instructions, as
   content, as news, as synonymous with data, as power, or as
   economic resource, and so forth [Floridi (2011), 226, our
   emphasis].


We will consider only a special class: computational information,
i.e., where information is part of a modern Von Neumann’s machine
(VNM), being by far the most used computing machine model ever.



 3 of 17
Why computational inforgs matter


   The digital revolution, which began with the popularization of
   the personal computer around 1980, inaugurated an era in which
   people appear in consort on an extended network intermixed
   with other, non-human information processors, all “inforgs”
   to use Floridi’s term [Beavers (2011), 264, our emphasis].


In our analysis, we address strictly inforgs with computational
information only, i.e., computational inforg (c-inforgs).




 4 of 17
How computational inforgs are made


Every c-inforg requires to be programmed by an agent (Ag) by
definition.

   Ags should be real computer programmers.
   In other words, conscious-less artificial Ags (robots) or biological
   Ags (zombies) are not possible.

                          for details, see [Gobbo and Benini (2013b)].




 5 of 17
The dual nature of computational information


As underlined by the philosophers of Computer Science, programs
appear to have a dual nature ([Turner (2013)]):

1. source code, the textual nature, which is human-readable;
2. object code, the binary nature, which is machine-readable;

We apply the system-level-model-structure (SLMS) scheme within the
method of levels of abstraction (LoAs) in order to analyse c-inforgs.




 6 of 17
The SLMS scheme and the ontological commitments
  By accepting an LoA a theory commits itself to the existence of
  certain types of objects. . . constituting the LoA. . . while by
  endorsing the ensuing models the theory commits itself to the
  corresponding tokens [. . . ]

  The assumption is that there is no direct knowledge of the
  intrinsic nature of the entities. . . Once a theory has ontologically
  committed itself to the structural properties of the system,
  one is entitled to infer indirectly that, whatever the system and
  its components (i.e. the objects or relata) may in themselves,
  they must be such as to allow the theory to model at least
  some of their structural/relational properties.


                               [Floridi (2011), 349, 351, our emphasis]
7 of 17
Knowledge within c-inforgs
Open vs. closed c-inforgs

A crucial distinction emerge from a property of the VNM-counterpart:

   either source code of the c-inforg is open, i.e., it can be inspected
   and modified by the Ag;
   or conversely it is closed – and hence the Ag can be a (power)
   end-user but not a programmer.


           Now, we are going to apply the SLMS scheme in both cases.




 9 of 17
Remind of the SLMS scheme

                                    analysed at
                      System                            LoA


            attributed to                                  generates



                     Structure                         Model
                                     identifies

           Figure : The SLMS scheme, adapted from [Floridi (2011), 349]



10 of 17
Open c-inforg: a possible LoE of a programmer


                   information    analysed at      abstract
                    technology                     machine


           attributed to                                generates


                                                    design
                  source code
                                   identifies       patterns


           Figure : The SLMS scheme applied to a programmer at work



11 of 17
Closed c-inforg: an example of LoE for an end-user

                                analysed at      desktop
                    black box
                                                application


           attributed to                               generates

                   WYSIWYG
                                                users’ best
                    menus &
                                 identifies       practices
                    windows

 Figure : The SLMS scheme applied to a ‘classic’ desktop application use



12 of 17
Reflections on open vs. closed c-inforgs
The possible analyses of open c-inforgs can be more fine-grained than
the one on closed c-inforgs. In particular:
   from Software Engineering, direct metrics (i.e., they do not
   depend on any other attribute, see IEEE Standard 1016) can be
   applied to open c-inforgs straightforwardly, being purely
   quantitative;
   the analyses on closed c-inforgs cannot be purely quantitative, and
   therefore they use indirect metrics, which are more
   qualitative-oriented.


             See the presentation by Marco Benini (here!) for details.


13 of 17
Future directions of work

We aim to apply the SLMS scheme of the method of LoAs to compare
quantitative and qualitative properties of inforgs. Sketched ideas:
1. Let’s take the inforg user-of-Facebook as a closed c-inforg;




The description of the Ag Bob, who is keen to access his Facebook
account with his laptop, is an exercise left to the reader.


14 of 17
Future directions of work

We aim to apply the SLMS scheme of the method of LoAs to compare
quantitative and qualitative properties of inforgs. Sketched ideas:
1. Let’s take the inforg user-of-Facebook as a closed c-inforg;
2. Alice (Ag) prefers to access her Facebook account with her
   smartphone; then:




The description of the Ag Bob, who is keen to access his Facebook
account with his laptop, is an exercise left to the reader.


14 of 17
Future directions of work

We aim to apply the SLMS scheme of the method of LoAs to compare
quantitative and qualitative properties of inforgs. Sketched ideas:
1. Let’s take the inforg user-of-Facebook as a closed c-inforg;
2. Alice (Ag) prefers to access her Facebook account with her
   smartphone; then:
           LoE: she loves to share photos more than blogging;




The description of the Ag Bob, who is keen to access his Facebook
account with his laptop, is an exercise left to the reader.


14 of 17
Future directions of work

We aim to apply the SLMS scheme of the method of LoAs to compare
quantitative and qualitative properties of inforgs. Sketched ideas:
1. Let’s take the inforg user-of-Facebook as a closed c-inforg;
2. Alice (Ag) prefers to access her Facebook account with her
   smartphone; then:
           LoE: she loves to share photos more than blogging;
           LoA: there is a different graphic end-user’s interface;



The description of the Ag Bob, who is keen to access his Facebook
account with his laptop, is an exercise left to the reader.


14 of 17
Future directions of work

We aim to apply the SLMS scheme of the method of LoAs to compare
quantitative and qualitative properties of inforgs. Sketched ideas:
1. Let’s take the inforg user-of-Facebook as a closed c-inforg;
2. Alice (Ag) prefers to access her Facebook account with her
   smartphone; then:
           LoE: she loves to share photos more than blogging;
           LoA: there is a different graphic end-user’s interface;
           LoO: the combination mobile operating system + app allows her to
           perform a definite set of actions and not others;
The description of the Ag Bob, who is keen to access his Facebook
account with his laptop, is an exercise left to the reader.


14 of 17
An advice for ourselves...




The working philosopher of information cannot
   avoid the continuous interplay between
quantitative and qualitative points of views of
                 information



15 of 17
References

     Beavers, Anthony F. (2011), “Historicizing Floridi: The Question of Method, the
     State of the Profession, and the Timeliness of Floridi’s Philosophy of Information,”
     in Etica & Politica / Ethics & Politics, XIII, 2, 225–275.
     Turner, R. (2013), “Programming Languages as Technical Artifacts,” in Philos.
     Technol., feb, 1–21.
     Floridi, L. (2011), The Philosophy of Information, Oxford: Oxford University Press.

     Gobbo, F. and Benini, M. (2013b), “Why zombies can’t write significant source
     code,” Journal of Experimental & Theoretical Artificial Intelligence, forthcoming.
     Gobbo, F. and Benini, M. (2013a), “From Ancient to Modern Computing: A History
     of Information Hiding,” in IEEE Annals of the History of Computing, 4 Feb. IEEE
     computer Society Digital Library. IEEE Computer Society. DOI:
     10.1109/MAHC.2013.1




16 of 17
Thanks for your attention!

                          Questions?
                      For proposals, ideas & comments:
           federico.gobbo@univaq.it & marco.benini@uninsubria.it



                     Download & share these slides here:
                       http://slidesha.re/14rFzQE


                                             C
                              CC   BY:   $       Federico Gobbo & Marco Benini 2013
                                         




17 of 17

Más contenido relacionado

Similar a Computational inforgs knowledge

Towards XMAS: eXplainability through Multi-Agent Systems
Towards XMAS: eXplainability through Multi-Agent SystemsTowards XMAS: eXplainability through Multi-Agent Systems
Towards XMAS: eXplainability through Multi-Agent SystemsGiovanni Ciatto
 
Universal io t communications
Universal io t communicationsUniversal io t communications
Universal io t communicationsBrian Gormanly
 
Software Preservation: challenges and opportunities for reproductibility (Sci...
Software Preservation: challenges and opportunities for reproductibility (Sci...Software Preservation: challenges and opportunities for reproductibility (Sci...
Software Preservation: challenges and opportunities for reproductibility (Sci...Roberto Di Cosmo
 
ScilabTEC 2015 - Irill
ScilabTEC 2015 - IrillScilabTEC 2015 - Irill
ScilabTEC 2015 - IrillScilab
 
Man in-the-browser-in-depth-report
Man in-the-browser-in-depth-reportMan in-the-browser-in-depth-report
Man in-the-browser-in-depth-reportHai Nguyen
 
Modul mBlock 5 and arduino.pdf
Modul mBlock 5 and arduino.pdfModul mBlock 5 and arduino.pdf
Modul mBlock 5 and arduino.pdfshalihentinggal1
 
principle of oop’s in cpp
principle of oop’s in cppprinciple of oop’s in cpp
principle of oop’s in cppgourav kottawar
 
Reports on Fairness aware and privacy preserving friend matching protocol in ...
Reports on Fairness aware and privacy preserving friend matching protocol in ...Reports on Fairness aware and privacy preserving friend matching protocol in ...
Reports on Fairness aware and privacy preserving friend matching protocol in ...Shailesh kumar
 
Project presentation by Debendra Adhikari
Project presentation by Debendra AdhikariProject presentation by Debendra Adhikari
Project presentation by Debendra AdhikariDEBENDRA ADHIKARI
 
BBA 3551, Information Systems Management Course Learn.docx
BBA 3551, Information Systems Management Course Learn.docxBBA 3551, Information Systems Management Course Learn.docx
BBA 3551, Information Systems Management Course Learn.docxtarifarmarie
 
State of AI Report 2023 - Air Street Capital
State of AI Report 2023 - Air Street CapitalState of AI Report 2023 - Air Street Capital
State of AI Report 2023 - Air Street CapitalAI Geek (wishesh)
 
Data Visualizations in Cyber Security: Still Home of the WOPR?
Data Visualizations in Cyber Security: Still Home of the WOPR?Data Visualizations in Cyber Security: Still Home of the WOPR?
Data Visualizations in Cyber Security: Still Home of the WOPR?Matthew Park
 
‘CodeAliker’ - Plagiarism Detection on the Cloud
‘CodeAliker’ - Plagiarism Detection on the Cloud ‘CodeAliker’ - Plagiarism Detection on the Cloud
‘CodeAliker’ - Plagiarism Detection on the Cloud acijjournal
 
The Impact of Software Engineering Research on Modern Programming Languages
The Impact of Software Engineering Research on Modern Programming LanguagesThe Impact of Software Engineering Research on Modern Programming Languages
The Impact of Software Engineering Research on Modern Programming LanguagesFederico Govoni
 
Programming In C++
Programming In C++ Programming In C++
Programming In C++ shammi mehra
 
GitHub halp app - Minimizing platform-specific code with MVVM - Justin Spahr-...
GitHub halp app - Minimizing platform-specific code with MVVM - Justin Spahr-...GitHub halp app - Minimizing platform-specific code with MVVM - Justin Spahr-...
GitHub halp app - Minimizing platform-specific code with MVVM - Justin Spahr-...Xamarin
 
Landscape of AI/ML in 2023
Landscape of AI/ML in 2023Landscape of AI/ML in 2023
Landscape of AI/ML in 2023HyunJoon Jung
 
Information to Wisdom: Commonsense Knowledge Extraction and Compilation - Part 2
Information to Wisdom: Commonsense Knowledge Extraction and Compilation - Part 2Information to Wisdom: Commonsense Knowledge Extraction and Compilation - Part 2
Information to Wisdom: Commonsense Knowledge Extraction and Compilation - Part 2Dr. Aparna Varde
 
Technology and UX,UI design trends for 2023
Technology and UX,UI design trends for 2023Technology and UX,UI design trends for 2023
Technology and UX,UI design trends for 2023Cocoon Experience
 
Leveraging mobile devices to enhance the performance and ease of programming ...
Leveraging mobile devices to enhance the performance and ease of programming ...Leveraging mobile devices to enhance the performance and ease of programming ...
Leveraging mobile devices to enhance the performance and ease of programming ...IJITE
 

Similar a Computational inforgs knowledge (20)

Towards XMAS: eXplainability through Multi-Agent Systems
Towards XMAS: eXplainability through Multi-Agent SystemsTowards XMAS: eXplainability through Multi-Agent Systems
Towards XMAS: eXplainability through Multi-Agent Systems
 
Universal io t communications
Universal io t communicationsUniversal io t communications
Universal io t communications
 
Software Preservation: challenges and opportunities for reproductibility (Sci...
Software Preservation: challenges and opportunities for reproductibility (Sci...Software Preservation: challenges and opportunities for reproductibility (Sci...
Software Preservation: challenges and opportunities for reproductibility (Sci...
 
ScilabTEC 2015 - Irill
ScilabTEC 2015 - IrillScilabTEC 2015 - Irill
ScilabTEC 2015 - Irill
 
Man in-the-browser-in-depth-report
Man in-the-browser-in-depth-reportMan in-the-browser-in-depth-report
Man in-the-browser-in-depth-report
 
Modul mBlock 5 and arduino.pdf
Modul mBlock 5 and arduino.pdfModul mBlock 5 and arduino.pdf
Modul mBlock 5 and arduino.pdf
 
principle of oop’s in cpp
principle of oop’s in cppprinciple of oop’s in cpp
principle of oop’s in cpp
 
Reports on Fairness aware and privacy preserving friend matching protocol in ...
Reports on Fairness aware and privacy preserving friend matching protocol in ...Reports on Fairness aware and privacy preserving friend matching protocol in ...
Reports on Fairness aware and privacy preserving friend matching protocol in ...
 
Project presentation by Debendra Adhikari
Project presentation by Debendra AdhikariProject presentation by Debendra Adhikari
Project presentation by Debendra Adhikari
 
BBA 3551, Information Systems Management Course Learn.docx
BBA 3551, Information Systems Management Course Learn.docxBBA 3551, Information Systems Management Course Learn.docx
BBA 3551, Information Systems Management Course Learn.docx
 
State of AI Report 2023 - Air Street Capital
State of AI Report 2023 - Air Street CapitalState of AI Report 2023 - Air Street Capital
State of AI Report 2023 - Air Street Capital
 
Data Visualizations in Cyber Security: Still Home of the WOPR?
Data Visualizations in Cyber Security: Still Home of the WOPR?Data Visualizations in Cyber Security: Still Home of the WOPR?
Data Visualizations in Cyber Security: Still Home of the WOPR?
 
‘CodeAliker’ - Plagiarism Detection on the Cloud
‘CodeAliker’ - Plagiarism Detection on the Cloud ‘CodeAliker’ - Plagiarism Detection on the Cloud
‘CodeAliker’ - Plagiarism Detection on the Cloud
 
The Impact of Software Engineering Research on Modern Programming Languages
The Impact of Software Engineering Research on Modern Programming LanguagesThe Impact of Software Engineering Research on Modern Programming Languages
The Impact of Software Engineering Research on Modern Programming Languages
 
Programming In C++
Programming In C++ Programming In C++
Programming In C++
 
GitHub halp app - Minimizing platform-specific code with MVVM - Justin Spahr-...
GitHub halp app - Minimizing platform-specific code with MVVM - Justin Spahr-...GitHub halp app - Minimizing platform-specific code with MVVM - Justin Spahr-...
GitHub halp app - Minimizing platform-specific code with MVVM - Justin Spahr-...
 
Landscape of AI/ML in 2023
Landscape of AI/ML in 2023Landscape of AI/ML in 2023
Landscape of AI/ML in 2023
 
Information to Wisdom: Commonsense Knowledge Extraction and Compilation - Part 2
Information to Wisdom: Commonsense Knowledge Extraction and Compilation - Part 2Information to Wisdom: Commonsense Knowledge Extraction and Compilation - Part 2
Information to Wisdom: Commonsense Knowledge Extraction and Compilation - Part 2
 
Technology and UX,UI design trends for 2023
Technology and UX,UI design trends for 2023Technology and UX,UI design trends for 2023
Technology and UX,UI design trends for 2023
 
Leveraging mobile devices to enhance the performance and ease of programming ...
Leveraging mobile devices to enhance the performance and ease of programming ...Leveraging mobile devices to enhance the performance and ease of programming ...
Leveraging mobile devices to enhance the performance and ease of programming ...
 

Más de Federico Gobbo

Open Issues of Language Contestation in Italy
Open Issues of Language Contestation in ItalyOpen Issues of Language Contestation in Italy
Open Issues of Language Contestation in ItalyFederico Gobbo
 
Human-Machine Communication strategies in today’s Esperanto community of prac...
Human-Machine Communication strategies in today’s Esperanto community of prac...Human-Machine Communication strategies in today’s Esperanto community of prac...
Human-Machine Communication strategies in today’s Esperanto community of prac...Federico Gobbo
 
Esperanto as Lingua Receptiva / Esperanto Ricevema
Esperanto as Lingua Receptiva / Esperanto RicevemaEsperanto as Lingua Receptiva / Esperanto Ricevema
Esperanto as Lingua Receptiva / Esperanto RicevemaFederico Gobbo
 
L’utilizzo di lingue inventate come strumento di educazione interculturale in...
L’utilizzo di lingue inventate come strumento di educazione interculturale in...L’utilizzo di lingue inventate come strumento di educazione interculturale in...
L’utilizzo di lingue inventate come strumento di educazione interculturale in...Federico Gobbo
 
One species, many languages
One species, many languagesOne species, many languages
One species, many languagesFederico Gobbo
 
Una lingua comune per l'Europa?
Una lingua comune per l'Europa?Una lingua comune per l'Europa?
Una lingua comune per l'Europa?Federico Gobbo
 
Esperanto: el Eŭropa lulilo al disvastiĝo tra la tuta mondo
Esperanto: el Eŭropa lulilo al disvastiĝo tra la tuta mondoEsperanto: el Eŭropa lulilo al disvastiĝo tra la tuta mondo
Esperanto: el Eŭropa lulilo al disvastiĝo tra la tuta mondoFederico Gobbo
 
Reflecting upon the European Day of Languages
Reflecting upon the European Day of LanguagesReflecting upon the European Day of Languages
Reflecting upon the European Day of LanguagesFederico Gobbo
 
Interlinguistica ed esperantologia oggi: l’esperienza di Amsterdam
Interlinguistica ed esperantologia oggi: l’esperienza di AmsterdamInterlinguistica ed esperantologia oggi: l’esperienza di Amsterdam
Interlinguistica ed esperantologia oggi: l’esperienza di AmsterdamFederico Gobbo
 
Adpositional Argumentation: How Logic Originates In Natural Argumentative Dis...
Adpositional Argumentation: How Logic Originates In Natural Argumentative Dis...Adpositional Argumentation: How Logic Originates In Natural Argumentative Dis...
Adpositional Argumentation: How Logic Originates In Natural Argumentative Dis...Federico Gobbo
 
Complex Arguments in Adpositional Argumentation
Complex Arguments in Adpositional ArgumentationComplex Arguments in Adpositional Argumentation
Complex Arguments in Adpositional ArgumentationFederico Gobbo
 
Assessing linguistic unease to understand (socio)linguistic justice
Assessing linguistic unease to understand (socio)linguistic justiceAssessing linguistic unease to understand (socio)linguistic justice
Assessing linguistic unease to understand (socio)linguistic justiceFederico Gobbo
 
Lingua di contatto e mobilità: il caso dell'esperanto
Lingua di contatto e mobilità: il caso dell'esperantoLingua di contatto e mobilità: il caso dell'esperanto
Lingua di contatto e mobilità: il caso dell'esperantoFederico Gobbo
 
Le lingue di minoranza: il caso dell'esperanto
Le lingue di minoranza: il caso dell'esperantoLe lingue di minoranza: il caso dell'esperanto
Le lingue di minoranza: il caso dell'esperantoFederico Gobbo
 
The Religious Dimensions of the Esperanto Collective Identity
The Religious Dimensions of the Esperanto Collective IdentityThe Religious Dimensions of the Esperanto Collective Identity
The Religious Dimensions of the Esperanto Collective IdentityFederico Gobbo
 
I limiti dell'invenzione linguistica: la tipologia linguistica dall'esperanto...
I limiti dell'invenzione linguistica: la tipologia linguistica dall'esperanto...I limiti dell'invenzione linguistica: la tipologia linguistica dall'esperanto...
I limiti dell'invenzione linguistica: la tipologia linguistica dall'esperanto...Federico Gobbo
 
Sei definizioni in cerca di una disciplina - Interlinguistica tra comunicazio...
Sei definizioni in cerca di una disciplina - Interlinguistica tra comunicazio...Sei definizioni in cerca di una disciplina - Interlinguistica tra comunicazio...
Sei definizioni in cerca di una disciplina - Interlinguistica tra comunicazio...Federico Gobbo
 
Lingva Kafejo: Esperanto
Lingva Kafejo: EsperantoLingva Kafejo: Esperanto
Lingva Kafejo: EsperantoFederico Gobbo
 
Fare musica in esperanto : ieri, oggi, domani
Fare musica in esperanto : ieri, oggi, domaniFare musica in esperanto : ieri, oggi, domani
Fare musica in esperanto : ieri, oggi, domaniFederico Gobbo
 
Hollywood Languages: The Challenge of Interlinguistics in the New Millennium
Hollywood Languages: The Challenge of Interlinguistics in the New MillenniumHollywood Languages: The Challenge of Interlinguistics in the New Millennium
Hollywood Languages: The Challenge of Interlinguistics in the New MillenniumFederico Gobbo
 

Más de Federico Gobbo (20)

Open Issues of Language Contestation in Italy
Open Issues of Language Contestation in ItalyOpen Issues of Language Contestation in Italy
Open Issues of Language Contestation in Italy
 
Human-Machine Communication strategies in today’s Esperanto community of prac...
Human-Machine Communication strategies in today’s Esperanto community of prac...Human-Machine Communication strategies in today’s Esperanto community of prac...
Human-Machine Communication strategies in today’s Esperanto community of prac...
 
Esperanto as Lingua Receptiva / Esperanto Ricevema
Esperanto as Lingua Receptiva / Esperanto RicevemaEsperanto as Lingua Receptiva / Esperanto Ricevema
Esperanto as Lingua Receptiva / Esperanto Ricevema
 
L’utilizzo di lingue inventate come strumento di educazione interculturale in...
L’utilizzo di lingue inventate come strumento di educazione interculturale in...L’utilizzo di lingue inventate come strumento di educazione interculturale in...
L’utilizzo di lingue inventate come strumento di educazione interculturale in...
 
One species, many languages
One species, many languagesOne species, many languages
One species, many languages
 
Una lingua comune per l'Europa?
Una lingua comune per l'Europa?Una lingua comune per l'Europa?
Una lingua comune per l'Europa?
 
Esperanto: el Eŭropa lulilo al disvastiĝo tra la tuta mondo
Esperanto: el Eŭropa lulilo al disvastiĝo tra la tuta mondoEsperanto: el Eŭropa lulilo al disvastiĝo tra la tuta mondo
Esperanto: el Eŭropa lulilo al disvastiĝo tra la tuta mondo
 
Reflecting upon the European Day of Languages
Reflecting upon the European Day of LanguagesReflecting upon the European Day of Languages
Reflecting upon the European Day of Languages
 
Interlinguistica ed esperantologia oggi: l’esperienza di Amsterdam
Interlinguistica ed esperantologia oggi: l’esperienza di AmsterdamInterlinguistica ed esperantologia oggi: l’esperienza di Amsterdam
Interlinguistica ed esperantologia oggi: l’esperienza di Amsterdam
 
Adpositional Argumentation: How Logic Originates In Natural Argumentative Dis...
Adpositional Argumentation: How Logic Originates In Natural Argumentative Dis...Adpositional Argumentation: How Logic Originates In Natural Argumentative Dis...
Adpositional Argumentation: How Logic Originates In Natural Argumentative Dis...
 
Complex Arguments in Adpositional Argumentation
Complex Arguments in Adpositional ArgumentationComplex Arguments in Adpositional Argumentation
Complex Arguments in Adpositional Argumentation
 
Assessing linguistic unease to understand (socio)linguistic justice
Assessing linguistic unease to understand (socio)linguistic justiceAssessing linguistic unease to understand (socio)linguistic justice
Assessing linguistic unease to understand (socio)linguistic justice
 
Lingua di contatto e mobilità: il caso dell'esperanto
Lingua di contatto e mobilità: il caso dell'esperantoLingua di contatto e mobilità: il caso dell'esperanto
Lingua di contatto e mobilità: il caso dell'esperanto
 
Le lingue di minoranza: il caso dell'esperanto
Le lingue di minoranza: il caso dell'esperantoLe lingue di minoranza: il caso dell'esperanto
Le lingue di minoranza: il caso dell'esperanto
 
The Religious Dimensions of the Esperanto Collective Identity
The Religious Dimensions of the Esperanto Collective IdentityThe Religious Dimensions of the Esperanto Collective Identity
The Religious Dimensions of the Esperanto Collective Identity
 
I limiti dell'invenzione linguistica: la tipologia linguistica dall'esperanto...
I limiti dell'invenzione linguistica: la tipologia linguistica dall'esperanto...I limiti dell'invenzione linguistica: la tipologia linguistica dall'esperanto...
I limiti dell'invenzione linguistica: la tipologia linguistica dall'esperanto...
 
Sei definizioni in cerca di una disciplina - Interlinguistica tra comunicazio...
Sei definizioni in cerca di una disciplina - Interlinguistica tra comunicazio...Sei definizioni in cerca di una disciplina - Interlinguistica tra comunicazio...
Sei definizioni in cerca di una disciplina - Interlinguistica tra comunicazio...
 
Lingva Kafejo: Esperanto
Lingva Kafejo: EsperantoLingva Kafejo: Esperanto
Lingva Kafejo: Esperanto
 
Fare musica in esperanto : ieri, oggi, domani
Fare musica in esperanto : ieri, oggi, domaniFare musica in esperanto : ieri, oggi, domani
Fare musica in esperanto : ieri, oggi, domani
 
Hollywood Languages: The Challenge of Interlinguistics in the New Millennium
Hollywood Languages: The Challenge of Interlinguistics in the New MillenniumHollywood Languages: The Challenge of Interlinguistics in the New Millennium
Hollywood Languages: The Challenge of Interlinguistics in the New Millennium
 

Computational inforgs knowledge

  • 1. What can we know of computational inforgs? *F. Gobbo & M. Benini Univ. of L’Aquila & Leeds C CC BY: $ WPI5, Univ. of Hertfordshire, March 27-28, 2013 1 of 17
  • 3. What is computational information? ‘Information’ may be understood in many ways, e.g. as signals, natural patterns or nomic regularities, as instructions, as content, as news, as synonymous with data, as power, or as economic resource, and so forth [Floridi (2011), 226, our emphasis]. We will consider only a special class: computational information, i.e., where information is part of a modern Von Neumann’s machine (VNM), being by far the most used computing machine model ever. 3 of 17
  • 4. Why computational inforgs matter The digital revolution, which began with the popularization of the personal computer around 1980, inaugurated an era in which people appear in consort on an extended network intermixed with other, non-human information processors, all “inforgs” to use Floridi’s term [Beavers (2011), 264, our emphasis]. In our analysis, we address strictly inforgs with computational information only, i.e., computational inforg (c-inforgs). 4 of 17
  • 5. How computational inforgs are made Every c-inforg requires to be programmed by an agent (Ag) by definition. Ags should be real computer programmers. In other words, conscious-less artificial Ags (robots) or biological Ags (zombies) are not possible. for details, see [Gobbo and Benini (2013b)]. 5 of 17
  • 6. The dual nature of computational information As underlined by the philosophers of Computer Science, programs appear to have a dual nature ([Turner (2013)]): 1. source code, the textual nature, which is human-readable; 2. object code, the binary nature, which is machine-readable; We apply the system-level-model-structure (SLMS) scheme within the method of levels of abstraction (LoAs) in order to analyse c-inforgs. 6 of 17
  • 7. The SLMS scheme and the ontological commitments By accepting an LoA a theory commits itself to the existence of certain types of objects. . . constituting the LoA. . . while by endorsing the ensuing models the theory commits itself to the corresponding tokens [. . . ] The assumption is that there is no direct knowledge of the intrinsic nature of the entities. . . Once a theory has ontologically committed itself to the structural properties of the system, one is entitled to infer indirectly that, whatever the system and its components (i.e. the objects or relata) may in themselves, they must be such as to allow the theory to model at least some of their structural/relational properties. [Floridi (2011), 349, 351, our emphasis] 7 of 17
  • 9. Open vs. closed c-inforgs A crucial distinction emerge from a property of the VNM-counterpart: either source code of the c-inforg is open, i.e., it can be inspected and modified by the Ag; or conversely it is closed – and hence the Ag can be a (power) end-user but not a programmer. Now, we are going to apply the SLMS scheme in both cases. 9 of 17
  • 10. Remind of the SLMS scheme analysed at System LoA attributed to generates Structure Model identifies Figure : The SLMS scheme, adapted from [Floridi (2011), 349] 10 of 17
  • 11. Open c-inforg: a possible LoE of a programmer information analysed at abstract technology machine attributed to generates design source code identifies patterns Figure : The SLMS scheme applied to a programmer at work 11 of 17
  • 12. Closed c-inforg: an example of LoE for an end-user analysed at desktop black box application attributed to generates WYSIWYG users’ best menus & identifies practices windows Figure : The SLMS scheme applied to a ‘classic’ desktop application use 12 of 17
  • 13. Reflections on open vs. closed c-inforgs The possible analyses of open c-inforgs can be more fine-grained than the one on closed c-inforgs. In particular: from Software Engineering, direct metrics (i.e., they do not depend on any other attribute, see IEEE Standard 1016) can be applied to open c-inforgs straightforwardly, being purely quantitative; the analyses on closed c-inforgs cannot be purely quantitative, and therefore they use indirect metrics, which are more qualitative-oriented. See the presentation by Marco Benini (here!) for details. 13 of 17
  • 14. Future directions of work We aim to apply the SLMS scheme of the method of LoAs to compare quantitative and qualitative properties of inforgs. Sketched ideas: 1. Let’s take the inforg user-of-Facebook as a closed c-inforg; The description of the Ag Bob, who is keen to access his Facebook account with his laptop, is an exercise left to the reader. 14 of 17
  • 15. Future directions of work We aim to apply the SLMS scheme of the method of LoAs to compare quantitative and qualitative properties of inforgs. Sketched ideas: 1. Let’s take the inforg user-of-Facebook as a closed c-inforg; 2. Alice (Ag) prefers to access her Facebook account with her smartphone; then: The description of the Ag Bob, who is keen to access his Facebook account with his laptop, is an exercise left to the reader. 14 of 17
  • 16. Future directions of work We aim to apply the SLMS scheme of the method of LoAs to compare quantitative and qualitative properties of inforgs. Sketched ideas: 1. Let’s take the inforg user-of-Facebook as a closed c-inforg; 2. Alice (Ag) prefers to access her Facebook account with her smartphone; then: LoE: she loves to share photos more than blogging; The description of the Ag Bob, who is keen to access his Facebook account with his laptop, is an exercise left to the reader. 14 of 17
  • 17. Future directions of work We aim to apply the SLMS scheme of the method of LoAs to compare quantitative and qualitative properties of inforgs. Sketched ideas: 1. Let’s take the inforg user-of-Facebook as a closed c-inforg; 2. Alice (Ag) prefers to access her Facebook account with her smartphone; then: LoE: she loves to share photos more than blogging; LoA: there is a different graphic end-user’s interface; The description of the Ag Bob, who is keen to access his Facebook account with his laptop, is an exercise left to the reader. 14 of 17
  • 18. Future directions of work We aim to apply the SLMS scheme of the method of LoAs to compare quantitative and qualitative properties of inforgs. Sketched ideas: 1. Let’s take the inforg user-of-Facebook as a closed c-inforg; 2. Alice (Ag) prefers to access her Facebook account with her smartphone; then: LoE: she loves to share photos more than blogging; LoA: there is a different graphic end-user’s interface; LoO: the combination mobile operating system + app allows her to perform a definite set of actions and not others; The description of the Ag Bob, who is keen to access his Facebook account with his laptop, is an exercise left to the reader. 14 of 17
  • 19. An advice for ourselves... The working philosopher of information cannot avoid the continuous interplay between quantitative and qualitative points of views of information 15 of 17
  • 20. References Beavers, Anthony F. (2011), “Historicizing Floridi: The Question of Method, the State of the Profession, and the Timeliness of Floridi’s Philosophy of Information,” in Etica & Politica / Ethics & Politics, XIII, 2, 225–275. Turner, R. (2013), “Programming Languages as Technical Artifacts,” in Philos. Technol., feb, 1–21. Floridi, L. (2011), The Philosophy of Information, Oxford: Oxford University Press. Gobbo, F. and Benini, M. (2013b), “Why zombies can’t write significant source code,” Journal of Experimental & Theoretical Artificial Intelligence, forthcoming. Gobbo, F. and Benini, M. (2013a), “From Ancient to Modern Computing: A History of Information Hiding,” in IEEE Annals of the History of Computing, 4 Feb. IEEE computer Society Digital Library. IEEE Computer Society. DOI: 10.1109/MAHC.2013.1 16 of 17
  • 21. Thanks for your attention! Questions? For proposals, ideas & comments: federico.gobbo@univaq.it & marco.benini@uninsubria.it Download & share these slides here: http://slidesha.re/14rFzQE C CC BY: $ Federico Gobbo & Marco Benini 2013 17 of 17