160 likes | 379 Views
methodology - ontology. who identifies who? how? how to structure input of research?. D2.1 Nabeth 2004. ontology in computer sciences: ‘explicit specification of a conceptualisation’ ontology (what is) epistemology (what can we know) methodology (how can we produce knowledge).
E N D
methodology - ontology who identifies who? how? how to structure input of research?
D2.1 Nabeth 2004 • ontology in computer sciences: ‘explicit specification of a conceptualisation’ • ontology (what is) • epistemology (what can we know) • methodology (how can we produce knowledge) 2nd WP2 Workshop @ INSEAD
ontology in computer science is an instrument to clarify and share the use of terms (pragmatic approach) • better not get into a discussion on ‘real meaning’ or ‘true identity’ • better see the difference between 1st and 3rd person perspective or self and same 2nd WP2 Workshop @ INSEAD
identity concept modeling (mix of 1st/3rd p. perspective) • I, me and self (Mead) • true identity, assigned identity, abstracted identity (Durand) • identities and territories (contexts, Nabeth?) • relational and dynamic concept of identity as nexus of different roles, evershifting 2nd WP2 Workshop @ INSEAD
identification concept 3rd person perspective • risks, mechanisms, protection against, management importance 1st person perspective • (organisations, national state) 2nd WP2 Workshop @ INSEAD
Inventory of terms and some categorisation • definitions, illustrations and references, relations between terms • beginnings of the construction of a semantic network: • lexical (syntactic, definitions that relate a term to other terms) 2nd WP2 Workshop @ INSEAD
Canhoto Backhouse • categorization theory and semiotics case-study: • EU-directive to combat money laundering • objective the same in all MS’s • wide variation in submission levels 2nd WP2 Workshop @ INSEAD
Suspicious Transaction Report • STR to Financial Intelligence Unit • trade off between false negatives and false positives, reporting institution is stimulated to over-report, law enforcement agents should minimize false positives • over-reporting creates backlog 2nd WP2 Workshop @ INSEAD
how to reduce false negatives and false positives: • how to expand knowledge to refine the identification of suspicious financial transactions 2nd WP2 Workshop @ INSEAD
role of automatic monitoring • role of intuition (practical wisdom, experience, refined judgement) • traditional methodology too much oriented towards technological design and legal regulation, plea for incorporation of semiotics 2nd WP2 Workshop @ INSEAD
semiotics I • physical level records of actions and users • empirical level aggregation of data at client level • syntactical level automatic monitoring systems 2nd WP2 Workshop @ INSEAD
semiotics II • semantic level legal landscape, differentiation MS’s • pragmatic level cognitive prototype developed by professionals with significant experience • social level formal/informal norms, cultural context 2nd WP2 Workshop @ INSEAD
profiling/categorisation • how to generate profiles that yield few false negatives and few false positives (balance between the two will depend per context) • this is a matter of both privacy and security • but privacy/security is also about not being profiled (anonymity, pseudonymity, unlinkability) 2nd WP2 Workshop @ INSEAD
refinement of identification • syntactical level: develop intelligent automatic monitoring systems • pragmatic level: learning theory: interpretation of automatically generated profiles, how to generate/recognise new patterns • social level: diversity of socio-cultural norms 2nd WP2 Workshop @ INSEAD
semiotics • recognition of intersubjective perspective in objectification: • beyond reification of ontologies • beyond reductive interpretations of identity • challenge: how to further refine profiling technologies while protecting indeterminate identity (freedom to (re)define yourself) 2nd WP2 Workshop @ INSEAD