Improving Stability in Developing Nations through Automation 2006 -

Improving Stability in Developing Nations through Automation 2006 (eBook)

Peter Kopacek (Herausgeber)

eBook Download: PDF | EPUB
2007 | 1. Auflage
128 Seiten
Elsevier Science (Verlag)
978-0-08-046764-1 (ISBN)
Systemvoraussetzungen
Systemvoraussetzungen
78,95 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Technological development has caused profound changes and social stability. Regions which have had stable populations for centuries have experienced enormous population growth leading to the emergence of sometimes unmanageable megaplex cities as well as bringing about macroscopic environmental change. The scope of this IFAC SWIIS Conference is to offer insights into mitigating unwanted side-effects of rapid development and to share methodologies for appropriate ways of managing the introduction of technologies which will alter social stability.
Contributions included in this volume cover a very broad field of interest for subjects such as social aspects of technology transfer, managing the introduction of technological change, ethical aspects, technology and environmental stability, and anticipating secondary and tertiary effects of technological development.

* 3 survey papers, 17 technical papers and a summary of the panel discussion
* Bringing together scientists and engineers working in these subjects to discuss solutions
Technological development has caused profound changes and social stability. Regions which have had stable populations for centuries have experienced enormous population growth leading to the emergence of sometimes unmanageable megaplex cities as well as bringing about macroscopic environmental change. The scope of this IFAC SWIIS Conference is to offer insights into mitigating unwanted side-effects of rapid development and to share methodologies for appropriate ways of managing the introduction of technologies which will alter social stability. Contributions included in Improving Stability in Developing Nations through Automation 2006 cover a very broad field of interest for subjects such as social aspects of technology transfer, managing the introduction of technological change, ethical aspects, technology and environmental stability, and anticipating secondary and tertiary effects of technological development. 3 survey papers, 17 technical papers and a summary of the panel discussion Bringing together scientists and engineers working in these subjects to discuss solutions

Cover 1
Copyright Page 3
Table of Contents 8
Survey Papers 10
Mechatronics Education and International Stability - The Development Of University-Level Education Programmes in Advanced Engineering in Kosovo 10
Abstract 10
1. Background and Context 10
2. Mechatronics & Engineering Management
3. Engineering Management Education & Mechatronics Management
4. Developing a Kosovan Mechatronics Management Programme 12
5. Curriculum Design: Theoretical Approach 12
4. Summary 14
6. Conclusion 15
Acknowledgements 15
References 15
Terrorism, Human Rights and Ethics: A Modelling Approach 18
Abstract 18
1. Introduction: What Is 'Terrorism'? 18
2. Context for Terrorism 19
3. Ethical Analysis 21
4. The Ethics of Counter Terrorism 25
5. Human Rights and the Fear of Terrorism 26
5. Conclusions 28
References 29
Acknowledgements 29
Energy Providing and Consumption Can Cause Instability 30
Abstract 30
1. Introduction 30
2. Control (Systems) Engineering and Conflict Solution 30
3. Energy Production and Consumption in the World 31
4. Modelling 32
5. Discussion 38
6. Conclusion 38
7. References 38
Mechatronics 40
A Role of Mechanical Engineering in Mechatronics 40
Abstract 40
1. Mechatronic Systems and Mechatronics 40
2. Mechanical Issues 42
3. Experiences at University of Cassino 42
4. Conclusions 44
References 44
A Mechatronics Management Laboratory 46
Abstract 46
1. Introduction 46
2 Equipment 46
3. Organisation for Effective, Active Learning 49
4. Summary and Outlook 49
5. Acknowledgement 50
6. Literature 50
Various 52
Social Stability in a Stressed Ecosystem 52
Abstract 52
1. Introduction 52
2. Ecological Decline 52
3. Challenges to Social Stability 53
4. Underemployment and Stress on Existing Social Paradigms 53
5. A New Social Paradigm 53
6. Views of Human Society 54
7. Social Determinants 54
8. Representative Approaches to Global Stability 55
9. Conditions for Sustainable Stability 55
References 55
Critical Infrastructure 58
Abstract 58
1. Introduction 58
2. Critical Infrastructure 58
3. Security 59
4. Dependability 61
5. Conclusion 61
References 61
Decision Making in TOC-Product-Mix Selection Via Fuzzy Cost Function Optimization 64
Abstract 64
1. Introduction 64
2. A Fuzzy System Approch to Toc Product-Mix Problem 65
3. Conclusions 69
References 69
Learnmaths: A Case Study of the Development of Learning Software to Support Social Inclusion 70
Abstract 70
1. Background and Context 70
2. Learning Disability in Mathematics 71
3. The Need for Education Support Solutions 71
4. The Learnmaths Assitive Technology Solution 74
5. Conclusions 75
References 75
Current Ethical Scruples Concerning Information Engineering 76
Abstract 76
1. Introduction 76
2. Privacy and Security, Two Dramas of Our Days 76
3. Privacy and Security Means Liberty and Solidarity with all their Coherence and Contradictions 77
4. Who Guards the Guards? — Feedback of Enlightened Democracy 77
5. Advances in Conflict Resolution 78
6. Strong Ethics of a Sceptic View 78
7. Hungarian Situation and Some about Our Group's Activity 78
8. Conclusion and Warning 79
Complexity of Social System Cybernetics: Risk and Uncertainty Management in Negotiations 80
Abstract 80
1. Introduction 80
2. Negotiation Structure: Issues and Views on Information and Uncertainty 81
3. The Nature of Information: Hatfield-Hipel Theory Revisited 83
4. Conclusion 84
References 85
Energy 86
The Economics and Politics of Energy Generation 86
Abstract 86
1. Introduction: Energy Supply and Demand 86
2. Renewable Energy 87
3. The Economics of Renewables 89
4. Conclusions 91
References 91
Economic, Ethical and Cultural Aspects of ICT Change 92
Abstract 92
1. Introduction 92
2. Final Remarks 96
Acknowledgements 96
References 96
Automation, Control and Supervision of Combined Heat and Power Systems 98
Abstract 98
1. Introduction 98
2. The Powerster System 99
3. Exemplary Problem Solution 102
4. Some Technology Transfer Issues 102
5. Conclusions 103
References 103
Robotsoccer 104
Coordination of the Muli Agent System and its Application to Robot Soccer 104
Abstract 104
1. Introduction 104
2. Robot Soccer System 104
3. Microrobot Architecture of Robot Soccer 105
4. Mobile Robot Movement Coordination 106
5. Conclusions 108
6. References 108
Humanoid Robots for Human Life Support 110
Abstract 110
1. Why Should We Use Robots? 110
2. Typical Household Activities 110
3. Humanoid Robots for Daily Life Support 112
4. Summary 114
References 114
Strategies and Prediction in Multi-Agent Systems 116
Abstract 116
1. Introduction 116
2. Strategies 117
3. Micro Mobile Robot 117
4. Prediction Algorithms for Multiagent System (Kopacek, et al. 2001) 118
5. Conclusions and Future Perspectives 119
References 120
Panel Discussion 122
Control Strategies for a Sustainable Future 122
Author’s Index 126

Terrorism, Human Rights and Ethics: A Modelling Approach


M.A. Hersh m.hersh@elec.gla.ac.uk    Electronics and Electrical Engineering, University of Glasgow, Glasgow G12 8LT, Scotland. Tel: + 44 141 330 4906. Fax: + 44 141 330 6004.

Abstract


This paper applies ethical analysis techniques, including multi-loop adaptive learning and virtue ethics, to the analysis of both state and private terrorism. It also discusses the use of the fear of terrorism as a control mechanism by the state, the ways in which this fear can be encouraged, including by the media, and used to scapegoat minority groups to divert attention from government policies. A number of feedback models are presented to illustrate the relationships between terrorist acts, fear of terrorism, vested interests and scapegoating.

Keywords

Feedback

ethics

terrorism

human rights

modelling

I INTRODUCTION: WHAT IS ‘TERRORISM’?


This paper aims to apply ethical analysis and modelling techniques to improve understanding of the circumstances which encourage or promote terrorism and the ethical issues associated with terrorism and counter-terrorism. It is organised as follows: Section 1.1 and Section 2 provide the framework for the ethical analysis in Sections 3-5 through discussion of the various definitions of terrorism and the context for terrorism, as well as the meaning of individual and collective responsibility. Section 3 presents a number of different approaches to the ethical analysis of terrorism and Section 4 considers some of the ethical issues arising in counter-terrorism. Section 5 continues this discussion with consideration of the extent of the terrorist threat and the nature of the response to terrorism and conclusions are presented in Section 6.

1.1 Definitions of Terrorism


The theoretical analysis requires a definition of terrorism, but ‘terrorism’ is a political concept and consequently its definition is not uncontroversial. Etymologically terrorism is derived from the Latin verb terrere, to frighten and the term was probably first used in its French form terrorisme to describe the use of the arrest or execution of opponents by the Jacobin club in post-revolutionary France to terrorise the general public into compliance (Anon, undated).

Common elements of a number of definitions include (Anon, undated; Corlett, 2003; Meggle, 2005a) the use of violence, intimidation or the threat of violence against one person or group in order to achieve political, ideological, social or religious goals by putting pressure on or intimidating another group of people or another individual to carry out actions they would otherwise be opposed to. Therefore the people to be influenced are generally different from those who experience the violence, though they may be members of the same group. Thus, for instance, violence could be directed against civilians to put pressure on a government or against a particular government minister to put pressure on other government ministers. Some definitions include acts carried out by agents on behalf of other people and acts which may aim to provoke extreme counter measures to win public support for the terrorists (Corlett, 2003). There is disagreement as to whether terrorism only includes violence (or the threat of it) directed against civilians and/or innocent people with ‘innocent’ defined with regard to the activity or issue of concern to the ‘terrorists’, whether the violence may be directed against property and whether or not terrorism includes acts of violence by governments in power or acts of violence in war. It has also been suggested that the aim of terrorism is to publicise and draw attention to issues in the sense of a violent demonstration, rather than to achieve change (Baier, 1991) and that terrorism may include other aims, such as punishment, calling attention to problems or expression of frustration, in addition to coercion (Held, 1991). However, it should be noted that, analogously to non-violent demonstrations, terrorist acts are more likely to achieve change as part of a concerted campaign, rather than as isolated acts.

War crimes, government repression or disappearance of civilians and genocide are generally excluded from definitions of terrorism Even when governments are excluded as terrorists, state-sponsored terrorism in which governments support terrorism in another state is recognised. ‘Organised crime’ is generally excluded from definitions of terrorism, even when it involves violence and intimidation. However there may be arguments for labelling acts of intimidation aimed at extorting ‘protection’ money and giving a ‘crime lord’ control of a particular area as terrorist.

It has been suggested that state terrorism is morally worse than terrorism by non-state actors. In particular, the scale of death, injury and general destruction in state terrorism is many times greater in state than non-state terrorism. State terrorism is frequently accompanied by deception of the public, a hypocritical condemnation of terrorism and the commission of acts prohibited by human rights declarations to which most governments, but not non-state bodies, are signatories (Primoratz, 2005). The term state terror is sometimes used to describe the actions of official organisations such as the Gestapo, the KGB and the Stasi against dissidents or ethnic minorities. One of the main differences between terrorism by states and other actors is that states generally use terrorism to oppose changes to the status quo, whereas non-state actors use terrorism to try to change the status quo (Narveson, 1991). Government definitions of terrorism tend to be slanted to include their enemies, but not their irregular allies or friends (Lutz et al, 2004; Kapitan, 2005). In addition it has been suggested that use of the term terrorist is solely about propaganda and prevents examination of the causes and consequences of the political situation which has given rise to terrorist acts (Messelken, 2005). Thus definitions of terrorism have a political and ideological nature, with care being taken to differentiate acts by governments from those carried out by other (terrorist) individuals and organisations.

Terrorism is a type of political violence, which is not a recent phenomenon, but its importance may have increased (Corlett, 2003). The term violence has a number of definitions. For instance Coady (1986) presents three definitions, ‘wide’ and ‘legitimate’ definitions generally relating to left and right wing political philosophies and including social injustices and the ‘illegal employment of methods of physical coercion for person or group ends’ respectively. It should be noted, that these two approaches respectively question and support the status quo. Coady’s ‘restricted’ definition relates mainly to the infliction of physical harm (Coady, 1986), but excludes verbal violence and mental cruelty. Coady also makes a useful distinction between harm to oneself or others caused directly by actions and harm resulting from omissions, which he labels positive and negative violence respectively. This will be touched on later in the discussion in Section 2.1 of collective responsibility resulting from omissions. In the subsequent discussion the expression ‘terrorist’ will be used as short-hand for people who have committed terrorist acts.

2 CONTEXT FOR TERRORISM


However it may appear to outsiders, the behaviour of ‘terrorists’ is generally sell-consistent and rational. It is therefore useful to consider the factors which increase the likelihood of the commission of terrorist acts. The following list of factors has been compiled from a combination of analysis of the literature and my own analysis. It is not necessarily exhaustive and not all the factors are necessarily required as a precondition for terrorist acts, but the likelihood of the commission of terrorist acts will generally increase with the presence of an increasing number of these factors. Although it is not being claimed that there is a total symmetry between terrorism and the use of violence in anti-terrorism, many of the following factors also characterize this case.

 An issue, problem or cause, which may be political, ideological, religious or other.

 Lack of success of other methods or a very slow or insufficient response.

 A focus on ends rather than means or the belief that ends justify means.

 A culture which accepts or glorifies violence

 Marginalisation, discrimination and social exclusion, including from decision making structures and access to decision makers.

 The taking away of rights, dehumanization or even demonisation of certain groups, which then justifies any type of abuse or alternatively the instrumentalisation of certain groups, to make their needs and rights subordinate to those of other social groups. This view frequently characterises society’s attitude to terrorists and at least some terrorists’ attitude to their victims.

 Creation of a...

Erscheint lt. Verlag 29.3.2007
Sprache englisch
Themenwelt Technik Elektrotechnik / Energietechnik
Technik Maschinenbau
ISBN-10 0-08-046764-4 / 0080467644
ISBN-13 978-0-08-046764-1 / 9780080467641
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 32,9 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

EPUBEPUB (Adobe DRM)
Größe: 4,8 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Ressourcen und Bereitstellung

von Martin Kaltschmitt; Karl Stampfer

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
66,99