An Axiology of Information Security for Futuristic Neuroprostheses: Upholding Human Values in the Context of Technological Posthumanization

Frontiers in Neuroscience 11, 605 (2017); MNiSW 2016 List A: 30 points; 2017 Impact Factor: 3.566

ABSTRACT: Previous works exploring the challenges of ensuring information security for neuroprosthetic devices and their users have typically built on the traditional InfoSec concept of the “CIA Triad” of confidentiality, integrity, and availability. However, we argue that the CIA Triad provides an increasingly inadequate foundation for envisioning information security for neuroprostheses, insofar as it presumes that (1) any computational systems to be secured are merely instruments for expressing their human users’ agency, and (2) computing devices are conceptually and practically separable from their users. Drawing on contemporary philosophy of technology and philosophical and critical posthumanist analysis, we contend that futuristic neuroprostheses could conceivably violate these basic InfoSec presumptions, insofar as (1) they may alter or supplant their users’ biological agency rather than simply supporting it, and (2) they may structurally and functionally fuse with their users to create qualitatively novel “posthumanized” human-machine systems that cannot be secured as though they were conventional computing devices. Simultaneously, it is noted that many of the goals that have been proposed for future neuroprostheses by InfoSec researchers (e.g., relating to aesthetics, human dignity, authenticity, free will, and cultural sensitivity) fall outside the scope of InfoSec as it has historically been understood and touch on a wide range of ethical, aesthetic, physical, metaphysical, psychological, economic, and social values. We suggest that the field of axiology can provide useful frameworks for more effectively identifying, analyzing, and prioritizing such diverse types of values and goods that can (and should) be pursued through InfoSec practices for futuristic neuroprostheses.

Read more

Strategic Management Instruments for Cyber-Physical Organizations: Technological Posthumanization as a Driver of Strategic Innovation

International Journal of Contemporary Management 16, no. 3 (2017), pp. 139-55; MNiSW 2016 List B: 14 points

ABSTRACT: Strategic management instruments (SMIs) are tools used to analyze an organization’s strategic situation, formulate effective strategies, and successfully implement them. Despite SMIs’ importance, there has been little systematic research into them – and especially regarding the impact of emerging technologies on SMIs. Here we investigate whether the forces of technological posthumanization that are creating a new class of ‘cyber-physical organizations’ can be expected to affect innovation in the use of SMIs within such organizations. Through a review of strategic management literature, we identify nearly 100 SMIs and categorize them according to their use in (a) strategic analysis, (b) strategy formulation, or (c) strategy implementation. Meanwhile, an analysis of cyber-physical systems and technological posthumanization reveals three dynamics that are converging to create an emerging class of cyber-physical organizations: (a) roboticization of the workforce; (b) deepening human-computer integration; and (c) the ubiquitization of computation. A framework is developed for mapping the impacts of these dynamics onto the inputs, agents, processes, and outputs involved with the three types of SMIs. Application of the framework shows that technological posthumanization should be expected to both facilitate and require innovation in cyber-physical organizations’ use of all three types of SMIs.

Read more

Technomancy and the Conjuring of Virtual Worlds: The Utilization of ‘Digital Magical Practice’ as Organizational Strategy

Technomancy and the Conjuring of Virtual Worlds

The 3rd DELab UW International Conference: Ongoing Digitalisation of Economies and Societies • Digital Economy Lab, Uniwersytet Warszawski, Warszawa • September 29, 2017

ABSTRACT: Efforts to formally define ‘magic’ and to identify the aspects that distinguish magical practice from other human pursuits have been made from both a theological perspective (e.g., St. Thomas Aquinas) and, more recently, an anthropological perspective (e.g., Frazer, Mauss, Durkheim, Malinowski, and Tambiah). Frequently cited elements of magic include its use of esoteric symbols, gestures, and speech that are only understood only by a small, elite group of initiated practitioners; its use of specially prepared ritual instruments; its attempt to harness the power of invisible, intelligent, nonhuman entities (such as demons or nature deities) to produce specific physical effects; and its attempt to manipulate hidden (or ‘occult’) forms of causality rather than obviously explicable physical causality.

As early as the 1970s, scholars noted that the practice of computer programming reflects several such aspects of magic as it is traditionally defined. For example, conventional computer programming requires mastery of an esoteric body of knowledge passed down between generations of programmers; it employs arcane symbols arranged in elaborate sequential scripts structurally similar to magical incantations; and it allows computers to perform highly complex, seemingly ‘intelligent’ behaviors by means of causal processes that may be comprehensible to programmers but which to ordinary computer users appear quite mystifying.

In this presentation, we argue that it can be expected that the ‘magical’ aspects of computing technology will be transformed and enhanced over the coming years through the development of increasingly sophisticated technologies for virtual reality (VR), artificial intelligence (AI), and ubiquitous computing (UC) that converge to create ‘magically responsive’ digital-physical ecosystems and ‘enchanted’ cyber-physical societies.

Read more

Cyborgization and Virtual Worlds: Portals to Altered Reality

Volume 02 in the Posthuman Cyberware Sourcebook series • ISBN 978-1-944373-20-7 • Mnemoclave, 2017 • 36 pages

SUMMARY: Whether it’s adding a night-vision cybereye or acquiring a full cyborg body, the process of cyborgization reshapes the way in which an individual relates to the physical environment around her. But how does it transform her ability to dive – or to be pulled – into virtual worlds?

Cyborgization and Virtual Worlds: Portals to Altered Reality is a resource for designing campaigns grounded in near-future hard-SF settings in which synthetic bodies and VR cyberware offer characters entirely new ways of perceiving, interpreting, and manipulating the analog and digital worlds…

Read more

Posthuman Cyberware: Blurring the Boundaries of Mind, Body, and Computer

Volume 01 in the Posthuman Cyberware Sourcebook series • ISBN 978-1-944373-18-4. Indianapolis: Mnemoclave, 2017 • 40 pages

SUMMARY: What realities lie behind the glimmering advertisements for designer cyberlimbs, combat neuroaugmentations, prosthetic eyes with squalor-suppression filters, and downloadable charisma?

Posthuman Cyberware: Blurring the Boundaries of Mind, Body, and Computer is a resource for designing campaigns set in near-future hard-SF worlds where sensory, cognitive, and motor neuroprostheses are being increasingly employed for human enhancement – and society is tilting ever further toward the dystopian.

Read more

From Strategic Analysis to Organizational Foresight: 65 Techniques for Diagnosing Present Realities and Potential Futures

ISBN 978-1-944373-11-5 • Synthypnion Business, 2017 • 298 pages

The challenge of developing sound organizational strategy is growing increasingly difficult as accelerating technological change transforms the world’s competitive ecosystems in ways that render many traditional approaches to strategy obsolete. What are the concrete tools and techniques that a contemporary strategic analyst can employ to understand the critical elements of an organization’s internal structure and dynamics and external competitive environment – and to predict the ways in which they may evolve in the future? This book provides a practical step-by-step guide to using dozens of the most important tools for generating organizational insight and foresight, along with an investigation of their underlying nature and purpose. It serves as an accessible introduction for those seeking to learn the essentials of strategic analysis, as well as a comprehensive reference for the experienced organizational strategist.

The book employs the concept of the Strategic Futures Hub as a means for understanding eight domains that are key to the development of strategic foresight for any organization. These are: (1) an organization’s financial resources and realities; (2) its internal architecture and capacities; (3) its current and potential products; (4) consumers’ needs and anticipated future behaviors; (5) competitors and their expected future behaviors; (6) the current and future dynamics of the organization’s competitive ecosystem; (7) causal chains and possible, probable, and desirable organizational futures; and (8) potential organizational strategies. For each of these domains, the reader is taught when and why to choose (or avoid) specific techniques in order to answer a range of the most frequently encountered strategic questions. The volume explains not only traditional analytical tools like market opportunity analysis, benchmarking, resource analysis, stakeholder analysis, SWOT and PESTEL analyses, and the Delphi method, but also emerging techniques like internal prediction markets for organizations, as well as longer-range diagnostic tools from the field of futures studies, such as emerging issues analysis, backcasting, morphological analysis, the futures wheel, and cross-impact analysis.

The nature of each analytical technique is clearly and succinctly described, along with recommended approaches to its use and investigation of practical considerations such as the time commitment and skills required. Discussion of the techniques is enriched by a wealth of diagrams and extensive bibliographic references to the best contemporary scholarship and practice. While a few of the analytical techniques are targeted specifically at commercial enterprises, most will also be of great value to nonprofit organizations, government agencies, and other non-commercial entities that are seeking to better understand their current realities and prospective futures from a strategic perspective.

Read more

The Dystopian Megacorp: Non-Financial Strategies for Domination in Near-Future Cyber-Physical Ecosystems

The Dystopian Megacorp

His Master’s Voice 4th Annual Symposium: Utopias, Dystopias, and Ecotopias • Facta Ficta Research Centre, Kraków • March 25, 2017

ABSTRACT: Creators of cyberpunk science fiction envision a near future in which technological, political, and economic change yield a powerful new type of organization: the megacorporation or ‘megacorp,’ which is frequently depicted as contributing to (and exploiting) the dystopian nature of its society. By analyzing such fictional works, we formulate a definition of the ‘megacorp’ along with two conceptual frameworks: (1) a model of the megacorp as cyber-physical organism; and (2) a typology that reveals the ways in which different kinds of megacorps generate dystopian or (limited) utopian dynamics within their cyber-physical ecosystems. In developing the first framework, concepts from artificial life and management cybernetics are employed to argue that some megacorps are presented as incorporating artificial agency into their organizational architecture in such ways that they do not simply act ‘like’ living organisms but indeed constitute massive synthetic life-forms that inhabit the globalized digital-physical ecosystems of the near future. In developing the second framework, it is noted that contemporary corporations typically pursue a narrow range of strategies for achieving financial profitability so they can purchase resources needed to adapt and grow. However, we contend that – as depicted in cyberpunk science fiction – dystopian megacorps have available to them a broader range of non-financial strategies that they exploit to subdue competitors and obtain the resources needed to survive, evolve, and grow.

Such strategies may employ approaches that are legal and political (e.g., extraterritoriality; corporate courts; corporate citizenship; EULAs; ownership of individuals’ genetic code, cybernetic augmentations, and output); paramilitary (deployment of private military, police, and security forces; cyberwarfare); geospatial (construction of facilities isolated in fortified, orbital, or undersea arcologies; use of ubiquitous sensors and effectors to convert the entire Internet of Things into a corporate facility; virtualization and nonlocalization of organizational architecture; construction of new digital-physical ecosystems to dominate); biological (engineering of biomedical dependencies among employees and consumers; creation of ‘walled-garden’ commercial ecosystems requiring genetic modification for entry); psychological and sociocultural (direct neurocybernetic access to a population’s sensory, cognitive, and motor activity; cultural engineering; memetic warfare); or technological and informatic (monopolization of core global ICT infrastructure; ‘megascale’ data mining, computational simulation, and prediction; automated decision-making by AI; workforce roboticization and cyborgization). Three ‘views’ for analyzing competitive strategies of a megacorp are presented, each of which utilizes two dimensions to distinguish four types of megacorps according to their interactions with their ecosystem and resulting generation of dystopian or utopian dynamics.

The framework is then applied to numerous megacorps described in cyberpunk RPGs, including Arasaka and WorldSat (from Cyberpunk 2020); Evo, NeoNET, Proteus, Renraku, Saeder-Krupp, and Shiawase (from Shadowrun); Belltower Associates, the Picus Group, Tai Yong Medical, and VersaLife (from Deus Ex); Anubis, Augustus, and Imperial (from Ex Machina); and Golden Promise (from Interface Zero).

It is hoped that such frameworks can facilitate efforts to: (1) analyze the roles that creators of cyberpunk science fiction envision for megacorps in their worlds’ ecosystems; (2) explicate how megacorps’ competitive strategies contribute to the dystopian nature of their societies; (3) anticipate new competitive strategies that may emerge if our world’s actual business ecosystems evolve to resemble those presented in cyberpunk fiction; and (4) recognize any real-world corporations that begin to acquire characteristics of (dystopian) megacorps.

Read more

Neuroprosthetic Supersystems Architecture: Considerations for the Design and Management of Neurocybernetically Augmented Organizations

ISBN 978-1-944373-07-8 • Synthypnion Academic, 2017 • 312 pages

This volume serves a resource for the design and analysis of neuroprosthetic supersystems, which can be defined as organizations – either small or large, simple or complex – whose human members have been neuroprosthetically augmented. While numerous other texts focus on the biomedical engineering of neuroprostheses as technological devices or on the biocybernetic engineering of the host-device system comprising a neuroprosthesis and its human host, this volume presents a unique investigation of the intentional creation of higher-order supersystems that allow multiple neuroprosthetically augmented human beings to interact with one another and with external information systems in order to accomplish some shared task. In essence, this can be understood as the work of designing and managing neuroprosthetically enhanced organizations.

Individual chapters present an ontology of the neuroprosthesis as a computing device; a biocybernetic ontology of the host-device system; an ontology of the neuroprosthesis as an instrument of ‘cyborgization’; motivating and inhibiting factors for the organizational deployment of posthumanizing neuroprostheses by military organizations and other early adopters; an introduction to enterprise architecture in the context of technological posthumanization; an exploration of the implications of neuroprosthetic augmentation for enterprise architecture; and considerations for the development of effective network topologies for neuroprosthetically augmented organizations.

The conceptual frameworks formulated within this book offer a wide range of tools that can be of use to policymakers, ethicists, neuroprosthetic device manufacturers, organizational decision-makers, and others who must analyze or manage the complex legal, ethical, and managerial implications that result from the use of emerging neuroprosthetic technologies within an organizational context.

Read more

The Handbook of Information Security for Advanced Neuroprosthetics

ISBN 978-1-944373-09-2 • Second edition • Synthypnion Academic, 2017 • 324 pages

How does one ensure information security for a computer that is entangled with the structures and processes of a human brain – and for the human mind that is interconnected with such a device? The need to provide information security for neuroprosthetic devices grows more pressing as increasing numbers of people utilize therapeutic technologies such as cochlear implants, retinal prostheses, robotic prosthetic limbs, and deep brain stimulation devices. Moreover, emerging neuroprosthetic technologies for human enhancement are expected to increasingly transform their human users’ sensory, motor, and cognitive capacities in ways that generate new ‘posthumanized’ sociotechnological realities. In this context, it is essential not only to ensure the information security of such neuroprostheses themselves but – more importantly – to ensure the psychological and physical health, autonomy, and personal identity of the human beings whose cognitive processes are inextricably linked with such devices. InfoSec practitioners must not only guard against threats to the confidentiality and integrity of data stored within a neuroprosthetic device’s internal memory; they must also guard against threats to the confidentiality and integrity of thoughts, memories, and desires existing within the mind the of the device’s human host.

This second edition of The Handbook of Information Security for Advanced Neuroprosthetics updates the previous edition’s comprehensive investigation of these issues from both theoretical and practical perspectives. It provides an introduction to the current state of neuroprosthetics and expected future trends in the field, along with an introduction to fundamental principles of information security and an analysis of how they must be re-envisioned to address the unique challenges posed by advanced neuroprosthetics. A two-dimensional cognitional security framework is presented whose security goals are designed to protect a device’s human host in his or her roles as a sapient metavolitional agent, embodied embedded organism, and social and economic actor. Practical consideration is given to information security responsibilities and roles within an organizational context and to the application of preventive, detective, and corrective or compensating security controls to neuroprosthetic devices, their host-device systems, and the larger supersystems in which they operate. Finally, it is shown that while implantable neuroprostheses create new kinds of security vulnerabilities and risks, they may also serve to enhance the information security of some types of human hosts (such as those experiencing certain neurological conditions).

Read more

The Diffuse Intelligent Other: An Ontology of Nonlocalizable Robots as Moral and Legal Actors

In Social Robots: Boundaries, Potential, Challenges, edited by Marco Nørskov, pp. 177-98 • Farnham: Ashgate, 2016

ABSTRACT: Much thought has been given to the question of who bears moral and legal responsibility for actions performed by robots. Some argue that responsibility could be attributed to a robot if it possessed human-like autonomy and metavolitionality, and that while such capacities can potentially be possessed by a robot with a single spatially compact body, they cannot be possessed by a spatially disjunct, decentralized collective such as a robotic swarm or network. However, advances in ubiquitous robotics and distributed computing open the door to a new form of robotic entity that possesses a unitary intelligence, despite the fact that its cognitive processes are not confined within a single spatially compact, persistent, identifiable body. Such a “nonlocalizable” robot may possess a body whose myriad components interact with one another at a distance and which is continuously transforming as components join and leave the body. Here we develop an ontology for classifying such robots on the basis of their autonomy, volitionality, and localizability. Using this ontology, we explore the extent to which nonlocalizable robots—including those possessing cognitive abilities that match or exceed those of human beings—can be considered moral and legal actors that are responsible for their own actions.

Read more

Managing the Ethical Dimensions of Brain-Computer Interfaces in eHealth: An SDLC-based Approach

In 9th Annual EMAB Conference: Innovation, Entrepreneurship and Digital Ecosystems (EUROMED 2016) Book of Proceedings, edited by Demetris Vrontis, Yaakov Weber, and Evangelos Tsoukatos, pp. 876-90 • Engomi: EuroMed Press, 2016

ABSTRACT: A growing range of brain-computer interface (BCI) technologies is being employed for purposes of therapy and human augmentation. While much thought has been given to the ethical implications of such technologies at the ‘macro’ level of social policy and ‘micro’ level of individual users, little attention has been given to the unique ethical issues that arise during the process of incorporating BCIs into eHealth ecosystems. In this text a conceptual framework is developed that enables the operators of eHealth ecosystems to manage the ethical components of such processes in a more comprehensive and systematic way than has previously been possible. The framework’s first axis defines five ethical dimensions that must be successfully addressed by eHealth ecosystems: 1) beneficence; 2) consent; 3) privacy; 4) equity; and 5) liability. The second axis describes five stages of the systems development life cycle (SDLC) process whereby new technology is incorporated into an eHealth ecosystem: 1) analysis and planning; 2) design, development, and acquisition; 3) integration and activation; 4) operation and maintenance; and 5) disposal. Known ethical issues relating to the deployment of BCIs are mapped onto this matrix in order to demonstrate how it can be employed by the managers of eHealth ecosystems as a tool for fulfilling ethical requirements established by regulatory standards or stakeholders’ expectations. Beyond its immediate application in the case of BCIs, we suggest that this framework may also be utilized beneficially when incorporating other innovative forms of information and communications technology (ICT) into eHealth ecosystems.

Read more

Information Security Concerns as a Catalyst for the Development of Implantable Cognitive Neuroprostheses

In 9th Annual EMAB Conference: Innovation, Entrepreneurship and Digital Ecosystems (EUROMED 2016) Book of Proceedings, edited by Demetris Vrontis, Yaakov Weber, and Evangelos Tsoukatos, pp. 891-904 • Engomi: EuroMed Press, 2016

ABSTRACT: Standards like the ISO 27000 series, IEC/TR 80001, NIST SP 1800, and FDA guidance on medical device cybersecurity define the responsibilities that manufacturers and operators bear for ensuring the information security of implantable medical devices. In the case of implantable cognitive neuroprostheses (ICNs) that are integrated with the neural circuitry of their human hosts, there is a widespread presumption that InfoSec concerns serve only as limiting factors that can complicate, impede, or preclude the development and deployment of such devices. However, we argue that when appropriately conceptualized, InfoSec concerns may also serve as drivers that can spur the creation and adoption of such technologies. A framework is formulated that describes seven types of actors whose participation is required in order for ICNs to be adopted; namely, their 1) producers, 2) regulators, 3) funders, 4) installers, 5) human hosts, 6) operators, and 7) maintainers. By mapping onto this framework InfoSec issues raised in industry standards and other literature, it is shown that for each actor in the process, concerns about information security can either disincentivize or incentivize the actor to advance the development and deployment of ICNs for purposes of therapy or human enhancement. For example, it is shown that ICNs can strengthen the integrity, availability, and utility of information stored in the memories of persons suffering from certain neurological conditions and may enhance information security for society as a whole by providing new tools for military, law enforcement, medical, or corporate personnel who provide critical InfoSec services.

Read more

Posthuman Management: Creating Effective Organizations in an Age of Social Robotics, Ubiquitous AI, Human Augmentation, and Virtual Worlds

ISBN 978-1-944373-05-4 • Second edition • Defragmenter Media, 2016 • 442 pages

What are the best practices for leading a workforce in which human employees have merged cognitively and physically with electronic information systems and work alongside social robots, artificial life-forms, and self-aware networks that are ‘colleagues’ rather than simply ‘tools’? How does one manage organizational structures and activities that span both actual and virtual worlds? How are the forces of technological posthumanization transforming the theory and practice of management?

This volume explores the reality that an organization’s workers, managers, customers, and other stakeholders increasingly comprise a complex network of human agents, artificial agents, and hybrid human-synthetic entities. The first part of the book develops the theoretical foundations of an emerging ‘organizational posthumanism’ and presents conceptual frameworks for understanding and managing the evolving workplace relationship between human and synthetic beings. Subsequent chapters investigate concrete management topics such as the likelihood that social robots might utilize charismatic authority to inspire and lead human workers; potential roles of AIs as managers of cross-cultural virtual teams; the ethics and legality of entrusting organizational decision-making to spatially diffuse robots that have no discernible identity or physical form; quantitative approaches to comparing the managerial capabilities of human and artificial agents; the creation of artificial life-forms that function as autonomous enterprises which evolve by competing against human businesses; neural implants as gateways that allow their human users to participate in new forms of organizational life; and the implications of advanced neuroprosthetics for information security and business model design.

As the first comprehensive application of posthumanist methodologies to the field of management, this volume will be of use to scholars and students of contemporary management and to management practitioners who must increasingly understand and guide the forces of technologization that are rapidly reshaping organizations’ form, dynamics, and societal roles.

Read more

Neural Implants as Gateways to Digital-Physical Ecosystems and Posthuman Socioeconomic Interaction

In Digital Ecosystems: Society in the Digital Age, edited by Łukasz Jonak, Natalia Juchniewicz, and Renata Włoch, pp. 85-98 • Warsaw: Digital Economy Lab, University of Warsaw, 2016

ABSTRACT: For many employees, ‘work’ is no longer something performed while sitting at a computer in an office. Employees in a growing number of industries are expected to carry mobile devices and be available for work-related interactions even when beyond the workplace and outside of normal business hours. In this article it is argued that a future step will increasingly be to move work-related information and communication technology (ICT) inside the human body through the use of neuroprosthetics, to create employees who are always ‘online’ and connected to their workplace’s digital ecosystems. At present, neural implants are used primarily to restore abilities lost through injury or illness, however their use for augmentative purposes is expected to grow, resulting in populations of human beings who possess technologically altered capacities for perception, memory, imagination, and the manipulation of physical environments and virtual cyberspace. Such workers may exchange thoughts and share knowledge within posthuman cybernetic networks that are inaccessible to unaugmented human beings. Scholars note that despite their potential benefits, such neuroprosthetic devices may create numerous problems for their users, including a sense of alienation, the threat of computer viruses and hacking, financial burdens, and legal questions surrounding ownership of intellectual property produced while using such implants. Moreover, different populations of human beings may eventually come to occupy irreconcilable digital ecosystems as some persons embrace neuroprosthetic technology, others feel coerced into augmenting their brains to compete within the economy, others might reject such technology, and still others will simply be unable to afford it.

In this text we propose a model for analyzing how particular neuroprosthetic devices will either facilitate human beings’ participation in new forms of socioeconomic interaction and digital workplace ecosystems – or undermine their mental and physical health, privacy, autonomy, and authenticity. We then show how such a model can be used to create device ontologies and typologies that help us classify and understand different kinds of advanced neuroprosthetic devices according to the impact that they will have on individual human beings.

Read more

Onboarding Pracowników: Witamy w Metaphorescence HDI

Fronda Lux 78 (2016), pp. 10-21

SUMMARY: This text envisions two different “employee onboarding documents” provided to new workers joining a global conglomerate in the year 2050. One neuroprosthetically augmented and genetically enhanced worker – who joins the company as a Reality Designer – is granted a drastically different welcome from the other worker, an unmodified human being, who joins the company as a Biological Service Drone. A variety of scholars have formulated two radically divergent conceptions of the future of human work: one vision imagines that the development of advanced artificial intelligence, nanorobotics, and other technologies will create a utopian society in which human beings are freed from the drudgery menial labor to focus on art, leisure, and self-fulfillment; the other vision imagines that such technologies will result in the wholesale oppression, instrumentalization, and disintegration of human beings. This text highlights the fact that these two extreme visions of the future are not necessarily incompatible – and might even be reflected within the activities of a single company.

Read more

From Stand Alone Complexes to Memetic Warfare: Cultural Cybernetics and the Engineering of Posthuman Popular Culture

50 Shades of Popular Culture International Conference • Facta Ficta Research Centre, Kraków • February 19, 2016

ABSTRACT: Here we argue that five emerging social and technological trends are creating new possibilities for the instrumentalization (or even “weaponization”) of popular culture for commercial, ideological, political, or military ends and for the development of a posthuman popular culture that is no longer solely produced by or for “humanity” as presently understood. These five trends are the: 1) decentralization of the sources of popular culture, as reflected in the ability of ordinary users to create and upload content that “goes viral” within popular culture, as well as the use of “astroturfing” and paid “troll armies” by corporate or state actors to create the appearance of broad-based grassroots support for particular products, services, actions, or ideologies; 2) centralization of the mechanisms for accessing popular culture, as seen in the role of instruments like Google’s search engine, YouTube, Facebook, Instagram, and Wikipedia in concentrating the distribution channels for cultural products, as well as efforts by state actors to censor social media content perceived as threatening or disruptive; 3) personalization of popular culture, as manifested in the growth of cultural products like computer games that dynamically reconfigure themselves in response to a player’s behavior, thereby creating a different product for each individual that is adapted to a user’s unique experiences, desires, and psychological characteristics; 4) automatization of the creation of products of popular culture, as seen in the automated high-speed generation of webpages, artwork, music, memes, and computer game content by AI systems that could potentially allow venues of popular culture (such as the Internet) to be flooded with content designed to influence a social group in particular ways; and 5) virtualization of the technological systems and mechanisms for creating, transmitting, and experiencing the products of popular culture, as witnessed in the development of all-purpose nodes (such as smartphones) that are capable of handling a full range of cultural products in the form of still images, video, audio, text, and interactive experiences, and the growing digitalization of cultural products that allows them to be more easily manipulated and injected into the popular culture of other states or social groups, bypassing physical and political barriers.

While these trends are expected to yield a broad range of positive and negative impacts, we focus on a particular subset of these impacts. Namely, we argue that the convergence of these five trends opens the door for the creation of popular culture that: 1) does not exist in any permanent, tangible physical artifacts but only as a collection of continuously transforming digital data that that is stored on the servers of a few powerful corporate or state actors and is subject to manipulation or degradation as a result of computer viruses, hacking, power outages, or other factors; 2) can be purposefully and effectively engineered using techniques commonly employed within IT management, electronics engineering, marketing, and other disciplines; 3) can become a new kind of weapon and battleground in struggles for military, political, ideological, and commercial superiority on the part of corporate, state, and other actors.

In order to stimulate thinking about ways in which these trends might develop, we conclude by considering two fictional near-future worlds – those depicted in Ghost in the Shell: Stand Alone Complex and Transhuman Space: Toxic Memes – in which the further evolution of these five trends is shown as leading to the neurocybernetically facilitated manipulation of popular culture, “memetic warfare,” and related phenomena. We suggest that these fictional works represent examples of self-reflexive futurology: i.e., elements of contemporary popular culture that attempt to anticipate and explore the ways in which future popular culture could be purposefully engineered, instrumentalized, and even weaponized in the service of a diverse array of ends.

Read more

Cryptocurrency with a Conscience: Using Artificial Intelligence to Develop Money that Advances Human Ethical Values

Annales. Etyka w Życiu Gospodarczym / Annales: Ethics in Economic Life 18, no. 4 (2015), pp. 85-98; MNiSW 2015 List B: 10 points

ABSTRACT: Cryptocurrencies like Bitcoin are offering new avenues for economic empowerment to individuals around the world. However, they also provide a powerful tool that facilitates criminal activities such as human trafficking and illegal weapons sales that cause great harm to individuals and communities. Cryptocurrency advocates have argued that the ethical dimensions of cryptocurrency are not qualitatively new, insofar as money has always been understood as a passive instrument that lacks ethical values and can be used for good or ill purposes. In this paper, we challenge such a presumption that money must be “value-neutral.” Building on advances in artificial intelligence, cryptography, and machine ethics, we argue that it is possible to design artificially intelligent cryptocurrencies that are not ethically neutral but which autonomously regulate their own use in a way that reflects the ethical values of particular human beings – or even entire human societies. We propose a technological framework for such cryptocurrencies and then analyze the legal, ethical, and economic implications of their use. Finally, we suggest that the development of cryptocurrencies possessing ethical as well as monetary value can provide human beings with a new economic means of positively influencing the ethos and values of their societies.

Read more