meta_pixel
Tapesearch Logo
Log in
EUVATION: Spotlight on European Innovation

Ethics and Technology (5) – a Prerequisite for European Research: Engineering and Technology

EUVATION: Spotlight on European Innovation

Technikon

Tech News, Technology, Science, News

5 β€’ 1 Ratings

πŸ—“οΈ 7 October 2021

⏱️ 13 minutes

🧾️ Download transcript

Summary

In this episode we speak with Elisabeth Oswald professor from the department of artificial intelligence and cybersecurity at The University of Klagenfurt about the ethics considerations in the world of education and research. 

See omnystudio.com/listener for privacy information.

Transcript

Click on a timestamp to play from that location

0:00.0

This is a Technicom podcast.

0:05.0

In this Ethics in Technology podcast series, we have determined that how the role of ethics

0:15.0

should play out in research projects is not always clear.

0:18.0

And we have seen this in all of our episodes. We also learned

0:22.1

that the advancement of science as a whole relies on responsible research and sticking

0:27.4

to ethics principles. It would seem then that the most effective approach is to tackle ethics

0:33.0

training early on in the careers of the next generation of researchers.

0:41.0

And I'm talking about at the university level here.

0:43.0

But is this happening?

0:44.6

And does it work?

0:55.5

I'm Peter Ballant from Technicon, and today we speak with Elizabeth Oswald. She is a professor in the Department of Artificial Intelligence and Cybersecurity at the University of Klogenfort in Austria.

1:03.7

Her research projects deal with the concept of side channel exploitations.

1:09.2

She's here today to give us a glimpse into the academic side of ethics and research.

1:14.8

Welcome, Elizabeth, and thanks for coming on today.

1:18.1

You're welcome. I'm looking forward to it.

1:20.2

While most of your focus is on the anatomy of side channel attacks, there are, of course, ethical considerations in your work as a researcher and professor.

1:29.3

First, tell us what a side-channel attack is.

1:33.4

Okay, let's perhaps start with what is a side-channel in the first place.

1:38.0

So in security, we are very conscientious about the way in which we argue about the security of a system. Thus, when we

1:45.8

define a system and its security properties, then we are normally very, very explicit about all

1:52.4

of the channels of information that we think an adversary has access to. And then we build a security

1:58.9

model based on these known channels of information. So a

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Technikon, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Technikon and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright Β© Tapesearch 2025.