Results for 'AI Safety and Security'

973 found
Order:
  1.  7
    Identify and Assess Hydropower Project’s Multidimensional Social Impacts with Rough Set and Projection Pursuit Model.Hui An, Wenjing Yang, Jin Huang, Ai Huang, Zhongchi Wan & Min An - 2020 - Complexity 2020:1-16.
    To realize the coordinated and sustainable development of hydropower projects and regional society, comprehensively evaluating hydropower projects’ influence is critical. Usually, hydropower project development has an impact on environmental geology and social and regional cultural development. Based on comprehensive consideration of complicated geological conditions, fragile ecological environment, resettlement of reservoir area, and other factors of future hydropower development in each country, we have constructed a comprehensive evaluation index system of hydropower projects, including 4 first-level indicators of social economy, environment, (...), and fairness, which contain 26 second-level indicators. To solve the problem that existing models cannot evaluate dynamic nonlinear optimization, a projection pursuit model is constructed by using rough set reduction theory to simplify the index. Then, an accelerated genetic algorithm based on real number coding is used to solve the model and empirical study is carried out with the Y hydropower station as a sample. The evaluation results show that the evaluation index system and assessment model constructed in our paper effectively reduce the subjectivity of index weight. Applying our model to the social impact assessment of related international hydropower projects can not only comprehensively analyze the social impact of hydropower projects but also identify important social influencing factors and effectively analyze the social impact level of each dimension. Furthermore, SIA assessment can be conducive to project decision-making, avoiding social risks and social stability. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  15
    Applying ethics to AI in the workplace: the design of a scorecard for Australian workplace health and safety.Andreas Cebulla, Zygmunt Szpak, Catherine Howell, Genevieve Knight & Sazzad Hussain - 2023 - AI and Society 38 (2):919-935.
    Artificial Intelligence (AI) is taking centre stage in economic growth and business operations alike. Public discourse about the practical and ethical implications of AI has mainly focussed on the societal level. There is an emerging knowledge base on AI risks to human rights around data security and privacy concerns. A separate strand of work has highlighted the stresses of working in the gig economy. This prevailing focus on human rights and gig impacts has been at the expense of a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3. Transparency and the Black Box Problem: Why We Do Not Trust AI.Warren J. von Eschenbach - 2021 - Philosophy and Technology 34 (4):1607-1622.
    With automation of routine decisions coupled with more intricate and complex information architecture operating this automation, concerns are increasing about the trustworthiness of these systems. These concerns are exacerbated by a class of artificial intelligence that uses deep learning, an algorithmic system of deep neural networks, which on the whole remain opaque or hidden from human comprehension. This situation is commonly referred to as the black box problem in AI. Without understanding how AI reaches its conclusions, it is an open (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  4. Shaping a culture of safety and security in researhc on emerging technologies : time to move beyond "simple compliance" ethics.Monique Ischi & Johannes Rath - 2019 - In Zvonimir Koporc (ed.), Ethics and integrity in health and life sciences research. United Kingdom: Emerald Publishing.
    No categories
     
    Export citation  
     
    Bookmark  
  5.  14
    AI safety: necessary, but insufficient and possibly problematic.Deepak P. - forthcoming - AI and Society:1-3.
  6.  5
    Ai Development and the ‘Fuzzy Logic' of Chinese Cyber Security and Data Laws.Max Parasol - 2021 - Cambridge University Press.
    The book examines the extent to which Chinese cyber and network security laws and policies act as a constraint on the emergence of Chinese entrepreneurialism and innovation. Specifically, how the contradictions and tensions between data localisation laws affect innovation in artificial intelligence. The book surveys the globalised R&D networks, and how the increasing use of open-source platforms by leading Chinese AI firms during 2017–2020, exacerbated the apparent contradiction between Network Sovereignty and Chinese innovation. The drafting of the Cyber (...) Law did not anticipate the changing nature of globalised AI innovation. It is argued that the deliberate deployment of what the book refers to as 'fuzzy logic' in drafting the Cyber Security Law allowed regulators to subsequently interpret key terms regarding data in that Law in a fluid and flexible fashion to benefit Chinese innovation. (shrink)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  47
    Bringing older people’s perspectives on consumer socially assistive robots into debates about the future of privacy protection and AI governance.Andrea Slane & Isabel Pedersen - forthcoming - AI and Society:1-20.
    A growing number of consumer technology companies are aiming to convince older people that humanoid robots make helpful tools to support aging-in-place. As hybrid devices, socially assistive robots (SARs) are situated between health monitoring tools, familiar digital assistants, security aids, and more advanced AI-powered devices. Consequently, they implicate older people’s privacy in complex ways. Such devices are marketed to perform functions common to smart speakers (e.g., Amazon Echo) and smart home platforms (e.g., Google Home), while other functions are more (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  8. Thinking Inside the Box: Controlling and Using an Oracle AI.Stuart Armstrong, Anders Sandberg & Nick Bostrom - 2012 - Minds and Machines 22 (4):299-324.
    There is no strong reason to believe that human-level intelligence represents an upper limit of the capacity of artificial intelligence, should it be realized. This poses serious safety issues, since a superintelligent system would have great power to direct the future according to its possibly flawed motivation system. Solving this issue in general has proven to be considerably harder than expected. This paper looks at one particular approach, Oracle AI. An Oracle AI is an AI that does not act (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  9. Acceleration AI Ethics, the Debate between Innovation and Safety, and Stability AI’s Diffusion versus OpenAI’s Dall-E.James Brusseau - manuscript
    One objection to conventional AI ethics is that it slows innovation. This presentation responds by reconfiguring ethics as an innovation accelerator. The critical elements develop from a contrast between Stability AI’s Diffusion and OpenAI’s Dall-E. By analyzing the divergent values underlying their opposed strategies for development and deployment, five conceptions are identified as common to acceleration ethics. Uncertainty is understood as positive and encouraging, rather than discouraging. Innovation is conceived as intrinsically valuable, instead of worthwhile only as mediated by social (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  10.  17
    When the future meets the past: Can safety and cyber security coexist in modern critical infrastructures?Awais Rashid, Sveta Milyaeva & Ola Michalec - 2022 - Big Data and Society 9 (1).
    Big data technologies are entering the world of ageing computer systems running critical infrastructures. These innovations promise to afford rapid Internet connectivity, remote operations or predictive maintenance. As legacy critical infrastructures were traditionally disconnected from the Internet, the prospect of their modernisation necessitates an inquiry into cyber security and how it intersects with traditional engineering requirements like safety, reliability or resilience. Looking at how the adoption of big data technologies in critical infrastructures shapes understandings of risk management, we (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  11. Algorithmic content moderation: Technical and political challenges in the automation of platform governance.Christian Katzenbach, Reuben Binns & Robert Gorwa - 2020 - Big Data and Society 7 (1):1–15.
    As government pressure on major technology companies builds, both firms and legislators are searching for technical solutions to difficult platform governance puzzles such as hate speech and misinformation. Automated hash-matching and predictive machine learning tools – what we define here as algorithmic moderation systems – are increasingly being deployed to conduct content moderation at scale by major platforms for user-generated content such as Facebook, YouTube and Twitter. This article provides an accessible technical primer on how algorithmic moderation works; examines some (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   14 citations  
  12. AI armageddon and the three laws of robotics.Lee McCauley - 2007 - Ethics and Information Technology 9 (2):153-164.
    After 50 years, the fields of artificial intelligence and robotics capture the imagination of the general public while, at the same time, engendering a great deal of fear and skepticism. Isaac Asimov recognized this deep-seated misconception of technology and created the Three Laws of Robotics. The first part of this paper examines the underlying fear of intelligent robots, revisits Asimov’s response, and reports on some current opinions on the use of the Three Laws by practitioners. Finally, an argument against robotic (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  13.  22
    Who is controlling whom? Reframing “meaningful human control” of AI systems in security.Pascal Vörös, Serhiy Kandul, Thomas Burri & Markus Christen - 2023 - Ethics and Information Technology 25 (1):1-7.
    Decisions in security contexts, including armed conflict, law enforcement, and disaster relief, often need to be taken under circumstances of limited information, stress, and time pressure. Since AI systems are capable of providing a certain amount of relief in such contexts, such systems will become increasingly important, be it as decision-support or decision-making systems. However, given that human life may be at stake in such situations, moral responsibility for such decisions should remain with humans. Hence the idea of “meaningful (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  43
    Ethical considerations and proposed guidelines for the use of radio frequency identification: Especially concerning its use for promoting public safety and national security[REVIEW]Vladimir Labay & Amber McKee Anderson - 2006 - Science and Engineering Ethics 12 (2):265-272.
    Radio Frequency Identification (RFID) is quickly growing in its applications. A variety of uses for the technology are beginning to be developed, including chips which can be used in identification cards, in individual items, and for human applications, allowing a chip to be embedded under the skin. Such chips could provide numerous benefits ranging from day-to-day convenience to the increased ability of the federal government to adequately ensure the safety of its citizens. However, there are also valid concerns about (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  15.  75
    Surveillance, security, and AI as technological acceptance.Yong Jin Park & S. Mo Jones-Jang - 2023 - AI and Society 38 (6):2667-2678.
    Public consumption of artificial intelligence (AI) technologies has been rarely investigated from the perspective of data surveillance and security. We show that the technology acceptance model, when properly modified with security and surveillance fears about AI, builds an insight on how individuals begin to use, accept, or evaluate AI and its automated decisions. We conducted two studies, and found positive roles of perceived ease of use (PEOU) and perceived usefulness (PU). AI security concern, however, negatively affected PEOU (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  15
    Generative AI Security: Theories and Practices.Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.) - 2024 - Springer Nature Switzerland.
    This book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensive guide that intertwines theories and practices, aiming to equip cybersecurity professionals, CISOs, AI researchers, developers, architects and college students with an understanding of GenAI’s profound impacts on cybersecurity. The scope of the book ranges from the foundations of GenAI, including underlying principles, advanced architectures, and cutting-edge research, to specific aspects of GenAI security such as data security, model security, application-level security, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  20
    Punishment, Public Safety, and Collateral Legal Consequences.Richard L. Lippke - forthcoming - Journal of Applied Philosophy.
    What are termed the ‘collateral legal consequences’ (or CLCs) of criminal conviction have been defended in a variety of ways. The focus in this article is on efforts to justify the burdens and restrictions they involve as nonpenal measures designed to secure public safety. Zachary Hoskins' careful defense of such public‐safety CLCs is utilized as a point of departure. Although it is granted that such measures might be defensible, the many complications and problems of ensuring that they do (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  47
    Beyond Bounded Selves and Places: The Relational Making of Vulnerability and Security.Erinn Cunniff Gilson - 2018 - Journal of the British Society for Phenomenology 49 (3):229-242.
    ABSTRACTThis essay elaborates how an imbalanced reciprocity between inhabitants of places of relative safety and places of greater precarity results from pursuing security on the basis of a reactive fear of vulnerability. It analyzes a range of features that shape the complex forms that vulnerability takes with a particular focus on how the constitution of places as rhetorically and corporeally secure or not renders different groups of people secure and/or subject to heightened exposure to harm. This analysis suggests (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  19.  25
    Ethical concerns around privacy and data security in AI health monitoring for Parkinson’s disease: insights from patients, family members, and healthcare professionals.Itai Bavli, Anita Ho, Ravneet Mahal & Martin J. McKeown - forthcoming - AI and Society:1-11.
    Artificial intelligence (AI) technologies in medicine are gradually changing biomedical research and patient care. High expectations and promises from novel AI applications aiming to positively impact society raise new ethical considerations for patients and caregivers who use these technologies. Based on a qualitative content analysis of semi-structured interviews and focus groups with healthcare professionals (HCPs), patients, and family members of patients with Parkinson’s Disease (PD), the present study investigates participant views on the comparative benefits and problems of using human versus (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20.  9
    Food Security and Food Safety for the Twenty-first Century: Proceedings of APSAFE2013.Soraj Hongladarom (ed.) - 2015 - Singapore: Imprint: Springer.
    This book is a collection of selected papers that were presented at the First International Conference of the Asia-Pacific Society for Agricultural and Food Ethics (APSAFE 2013), which was held at Chulalongkorn University from November 28 - 30, 2013. The papers are interdisciplinary, containing insights into food security and food ethics from a variety of perspectives, including, but not limited to, philosophy, sociology, law, sociology, economics, as well as the natural sciences. The theme of the conference was to consider (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  75
    Explanation and trust: what to tell the user in security and AI? [REVIEW]Wolter Pieters - 2011 - Ethics and Information Technology 13 (1):53-64.
    There is a common problem in artificial intelligence (AI) and information security. In AI, an expert system needs to be able to justify and explain a decision to the user. In information security, experts need to be able to explain to the public why a system is secure. In both cases, an important goal of explanation is to acquire or maintain the users’ trust. In this paper, I investigate the relation between explanation and trust in the context of (...)
    Direct download (13 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  22.  35
    Individual consistency in the accuracy and distribution of confidence judgments.Joaquín Ais, Ariel Zylberberg, Pablo Barttfeld & Mariano Sigman - 2016 - Cognition 146 (C):377-386.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  23.  99
    Reweaving the food security safety net: Mediating entitlement and entrepreneurship. [REVIEW]Patricia Allen - 1999 - Agriculture and Human Values 16 (2):117-129.
    The American food system has produced both abundance and food insecurity, with production and consumption dealt with as separate issues. The new approach of community food security (CFS) seeks to re-link production and consumption, with the goal of ensuring both an adequate and accessible food supply in the present and the future. In its focus on consumption, CFS has prioritized the needs of low-income people; in its focus on production, it emphasizes local and regional food systems. These objectives are (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   22 citations  
  24.  21
    Ethics and Health Security in the Australian COVID-19 Context: A Critical Interpretive Literature Review.Anson Fehross, Kari Pahlman & Diego S. Silva - 2024 - Journal of Bioethical Inquiry 21 (1):131-150.
    Background The concept of “health security” is often used to motivate public health responses, yet the ethical values that underpin this concept remain largely unexamined. The recent Australian responses to COVID-19 serve as an important case study by which we can analyse the pre-existing literature to see what ethical values shaped, and continue to shape, Australia’s response. Methods We conducted a critical interpretive literature review of academic and grey literatures within key databases, resulting in 2,220 sources. After screening for (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  81
    Evidentiality.A. I︠U︡ Aĭkhenvalʹd - 2004 - New York: Oxford University Press.
    In some languages every statement must contain a specification of the type of evidence on which it is based: for example, whether the speaker saw it, or heard it, or inferred it from indirect evidence, or learnt it from someone else. This grammatical reference to information source is called 'evidentiality', and is one of the least described grammatical categories. Evidentiality systems differ in how complex they are: some distinguish just two terms (eyewitness and noneyewitness, or reported and everything else), while (...)
    Direct download  
     
    Export citation  
     
    Bookmark   46 citations  
  26.  8
    Enhancing academic integrity in a UAE safety, security defence emergency management academy – the Covid- 19 response and beyond.Rami Al Sharefeen & Amanda Davies - 2022 - International Journal for Educational Integrity 18 (1).
    Globally, academic integrity and misconduct is a continuing conundrum for education institutions. Whilst the online delivery of education is not new, the onset of Covid-19 with accompanying health and safety limitations and the consequential rapid transition to emergency online delivery of education has, for many, exacerbated the need to focus on emerging potential for new forms of student academic misconduct i.e., e-dishonesty. This paper presents the strategies developed by a higher education institution specializing in university courses for safety (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  27.  18
    Participants’ awareness of ethical compliance, safety and protection during participation in pharmaceutical industry clinical trials: a controlled survey.Gerardo González-Saldivar, René Rodríguez-Gutiérrez, Jose Luis Viramontes-Madrid, Alejandro Salcido-Montenegro, Neri Alejandro Álvarez-Villalobos, Victoria González-Nava & José Gerardo González-González - 2019 - BMC Medical Ethics 20 (1):2.
    The rapid increase of industry-sponsored clinical research towards developing countries has led to potentially complex ethical issues to assess. There is scarce evidence about the perception of these participants about the ethical compliance, security, and protection. We sought to evaluate and contrast the awareness and perception of participants and non-participants of industry-sponsored research trials on ethical, safety, and protection topics. A Cases-control survey conducted at twelve research sites in México. Previous and current participants of ISRT as well as (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  28.  45
    Algorithms and values in justice and security.Paul Hayes, Ibo van de Poel & Marc Steen - 2020 - AI and Society 35 (3):533-555.
    This article presents a conceptual investigation into the value impacts and relations of algorithms in the domain of justice and security. As a conceptual investigation, it represents one step in a value sensitive design based methodology. Here, we explicate and analyse the expression of values of accuracy, privacy, fairness and equality, property and ownership, and accountability and transparency in this context. We find that values are sensitive to disvalue if algorithms are designed, implemented or deployed inappropriately or without sufficient (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  29.  93
    Obligation or Desire: Variation in Motivation for Compliance With COVID-19 Public Health Guidance.Ting Ai, Glenn Adams & Xian Zhao - 2021 - Frontiers in Psychology 12.
    Why do people comply with coronavirus disease 2019 public health guidance? This study considers cultural-psychological foundations of variation in beliefs about motivations for such compliance. Specifically, we focused on beliefs about two sources of prosocial motivation: desire to protect others and obligation to society. Across two studies, we observed that the relative emphasis on the desire to protect others as an explanation for compliance was greater in the United States settings associated with cultural ecologies of abstracted independence than in Chinese (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Developed socialism and cultural progress.Ai Arnoldov - 1977 - Filosoficky Casopis 25 (1):1-22.
     
    Export citation  
     
    Bookmark  
  31. The socialist way of life and the moral culture of personality.Ai Arnoldov - 1981 - Filosoficky Casopis 29 (3):329-337.
     
    Export citation  
     
    Bookmark  
  32.  3
    Zekhor le-Avraham: asupat maʼamarim be-Yahadut uve-ḥinukh le-zekher Dr. Avraham Zalḳin = Zekhor le-Avraham: an academic anthology on Jewish studies and education in memory of Dr. Avraham Zalkin.Yaʼir Barḳai, Ḥayim Gaziʼel, Mordekhai Zalḳin, Luba Charlap, S. Kogut & Avraham Zalḳin (eds.) - 2020 - Yerushalayim: Mikhlelet Lifshits.
    An academic anthology on Jewish studies and education in memory of dr. Avraham Zalkin.
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  16
    Civics and Moral Education in Singapore: lessons for citizenship education?Joy Ai - 1998 - Journal of Moral Education 27 (4):505-524.
    Civics and Moral Educationwas implemented as a new moral education programme in Singapore schools in 1992. This paper argues that the underlying theme is that of citizenship training and that new measures are under way to strengthen the capacity of the school system to transmit national values for economic and political socialisation. The motives and motivation for retaining a formal moral education programme have remained strong. A discussion of the structure and content of key modules in Civics and Moral Education (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  34. "My Place in the Sun": Reflections on the Thought of Emmanuel Levinas.Committee of Public Safety - 1996 - Diacritics 26 (1):3-10.
    In lieu of an abstract, here is a brief excerpt of the content:Martin Heidegger and OntologyEmmanuel Levinas (bio)The prestige of Martin Heidegger 1 and the influence of his thought on German philosophy marks both a new phase and one of the high points of the phenomenological movement. Caught unawares, the traditional establishment is obliged to clarify its position on this new teaching which casts a spell over youth and which, overstepping the bounds of permissibility, is already in vogue. For once, (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  35.  10
    Ai Silin lun wen xuan.Silin Ai - 2011 - Beijing Shi: Zhonghua shu ju.
  36.  48
    Sports and human rights: Sport Philosophy Colloquium 2012 in Tokyo.Ai Aramaki, Hideki Takaoka, Taro Obayashi, Miyako Fukuda & Koyo Fukasawa - 2012 - Journal of the Philosophy of Sport and Physical Education 34 (2):151-159.
  37.  10
    Building the Modern State in Developing Countries: Perceptions of Public Safety and (Un)willingness to Pay Taxes in Mexico.Mariano Sánchez-Talanquer & Gustavo Flores-Macías - 2020 - Politics and Society 48 (3):423-451.
    What is the relationship between taxation and public safety? Contrary to studies suggesting that personal victimization and heightened perceptions of insecurity increase pro-social attitudes and support for state intervention in the form of greater taxation, this article argues that such concerns decrease willingness to pay taxes to address public safety. It estimates what citizens are willing to pay to reduce crime, using an original representative survey conducted in Mexico and relying on the contingent valuation method to assess the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  27
    Understanding and Avoiding AI Failures: A Practical Guide.Robert Williams & Roman Yampolskiy - 2021 - Philosophies 6 (3):53.
    As AI technologies increase in capability and ubiquity, AI accidents are becoming more common. Based on normal accident theory, high reliability theory, and open systems theory, we create a framework for understanding the risks associated with AI applications. This framework is designed to direct attention to pertinent system properties without requiring unwieldy amounts of accuracy. In addition, we also use AI safety principles to quantify the unique risks of increased intelligence and human-like qualities in AI. Together, these two fields (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  38
    Influence of trait empathy on the emotion evoked by sad music and on the preference for it.Ai Kawakami & Kenji Katahira - 2015 - Frontiers in Psychology 6.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  40.  14
    A Defect Detection Method for the Surface of Metal Materials Based on an Adaptive Ultrasound Pulse Excitation Device and Infrared Thermal Imaging Technology.Yibo Ai, Yingjie Zhang, Xingzhao Cao & Weidong Zhang - 2021 - Complexity 2021:1-9.
    Ultrasonic excitation has been widely used in the detection of microcracks on metal surfaces, but there are problems such as poor excitation effect of ultrasonic pulse, long time to reach the best excitation, and difficult to find microcracks. In this paper, an adaptive ultrasonic pulse excitation device and infrared thermal imaging technology have been combined, as well as their control method, to solve the problem. The adaptive ultrasonic pulse excitation device adds intelligent modules to realize automatic adjustment of detection parameters, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41. Safety Engineering for Artificial General Intelligence.Roman Yampolskiy & Joshua Fox - 2012 - Topoi 32 (2):217-226.
    Machine ethics and robot rights are quickly becoming hot topics in artificial intelligence and robotics communities. We will argue that attempts to attribute moral agency and assign rights to all intelligent machines are misguided, whether applied to infrahuman or superhuman AIs, as are proposals to limit the negative effects of AIs by constraining their behavior. As an alternative, we propose a new science of safety engineering for intelligent artificial agents based on maximizing for what humans value. In particular, we (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  42. Saliva Ontology: An ontology-based framework for a Salivaomics Knowledge Base.Jiye Ai, Barry Smith & David Wong - 2010 - BMC Bioinformatics 11 (1):302.
    The Salivaomics Knowledge Base (SKB) is designed to serve as a computational infrastructure that can permit global exploration and utilization of data and information relevant to salivaomics. SKB is created by aligning (1) the saliva biomarker discovery and validation resources at UCLA with (2) the ontology resources developed by the OBO (Open Biomedical Ontologies) Foundry, including a new Saliva Ontology (SALO). We define the Saliva Ontology (SALO; http://www.skb.ucla.edu/SALO/) as a consensus-based controlled vocabulary of terms and relations dedicated to the salivaomics (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  43.  18
    An Investigation Into the Effects of Destination Sensory Experiences at Visitors’ Digital Engagement: Empirical Evidence From Sanya, China.Jin Ai, Ling Yan, Yubei Hu & Yue Liu - 2022 - Frontiers in Psychology 13.
    This study investigates the mechanism of how sensory experiences influence visitors’ digital engagement with a destination through establishing a strong bond and identification between a destination and tourist utilizing a two-step process. First, visitors’ sensory experiences in a destination are identified through a content analysis of online review comments posted by visitors. Afterward, the effects of those sensory experiences on visitors’ digital engagement through destination dependence and identification with that destination are examined. Findings suggest that sensory experiences are critical antecedents (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  7
    Editorial: A Collection of Systematic Reviews or Meta-Analyses on the Effects of Behavioral and Psychosocial Interventions for Psychological Well-Being.Ai Bo, Iris Chi, Fang Fu & Zhenggang Bai - 2022 - Frontiers in Psychology 13.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45. Towards a Body Fluids Ontology: A unified application ontology for basic and translational science.Jiye Ai, Mauricio Barcellos Almeida, André Queiroz De Andrade, Alan Ruttenberg, David Tai Wai Wong & Barry Smith - 2011 - Second International Conference on Biomedical Ontology , Buffalo, Ny 833:227-229.
    We describe the rationale for an application ontology covering the domain of human body fluids that is designed to facilitate representation, reuse, sharing and integration of diagnostic, physiological, and biochemical data, We briefly review the Blood Ontology (BLO), Saliva Ontology (SALO) and Kidney and Urinary Pathway Ontology (KUPO) initiatives. We discuss the methods employed in each, and address the project of using them as starting point for a unified body fluids ontology resource. We conclude with a description of how the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  14
    Subject Index accuracy, 97-101 action theory, 21n A IBS code, 123 analytic philosophy, 119.Consumer Product Safety Act - 2005 - In Wenceslao J. González (ed.), Science, Technology and Society: A Philosophical Perspective. Netbiblo. pp. 207.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  47.  16
    The 40th Annual Conference of the International Association for the Philosophy of Sport, Porto, Portugal, 2012.Ai Aramaki - 2012 - Journal of the Philosophy of Sport and Physical Education 34 (2):141-142.
  48.  16
    Caregiver Depression and Early Child Development: A Mixed-Methods Study From Rural China.Ai Yue, Jiaqi Gao, Meredith Yang, Lena Swinnen, Alexis Medina & Scott Rozelle - 2018 - Frontiers in Psychology 9.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  16
    Conserving involution in residuated structures.Ai-ni Hsieh & James G. Raftery - 2007 - Mathematical Logic Quarterly 53 (6):583-609.
    This paper establishes several algebraic embedding theorems, each of which asserts that a certain kind of residuated structure can be embedded into a richer one. In almost all cases, the original structure has a compatible involution, which must be preserved by the embedding. The results, in conjunction with previous findings, yield separative axiomatizations of the deducibility relations of various substructural formal systems having double negation and contraposition axioms. The separation theorems go somewhat further than earlier ones in the literature, which (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  50.  4
    Weiwei-Isms.Ai Weiwei - 2012 - Princeton University Press.
    This collection of quotes demonstrates the elegant simplicity of Ai Weiwei's thoughts on key aspects of his art, politics, and life. A master at communicating powerful ideas in astonishingly few words, Ai Weiwei is known for his innovative use of social media to disseminate his views. The book is organized into six categories: freedom of expression; art and activism; government, power, and moral choices; the digital world; history, the historical moment, and the future; and personal reflections. Together, these quotes span (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 973