1,870 research outputs found

    The Cowl - v.27 - n.19 - May 12, 1965

    Get PDF
    The Cowl - student newspaper of Providence College. Vol 27, Number 19 - May 12, 1965. 10 pages

    On the computational complexity of ethics: moral tractability for minds and machines

    Get PDF
    Why should moral philosophers, moral psychologists, and machine ethicists care about computational complexity? Debates on whether artificial intelligence (AI) can or should be used to solve problems in ethical domains have mainly been driven by what AI can or cannot do in terms of human capacities. In this paper, we tackle the problem from the other end by exploring what kind of moral machines are possible based on what computational systems can or cannot do. To do so, we analyze normative ethics through the lens of computational complexity. First, we introduce computational complexity for the uninitiated reader and discuss how the complexity of ethical problems can be framed within Marr’s three levels of analysis. We then study a range of ethical problems based on consequentialism, deontology, and virtue ethics, with the aim of elucidating the complexity associated with the problems themselves (e.g., due to combinatorics, uncertainty, strategic dynamics), the computational methods employed (e.g., probability, logic, learning), and the available resources (e.g., time, knowledge, learning). The results indicate that most problems the normative frameworks pose lead to tractability issues in every category analyzed. Our investigation also provides several insights about the computational nature of normative ethics, including the differences between rule- and outcome-based moral strategies, and the implementation-variance with regard to moral resources. We then discuss the consequences complexity results have for the prospect of moral machines in virtue of the trade-off between optimality and efficiency. Finally, we elucidate how computational complexity can be used to inform both philosophical and cognitive-psychological research on human morality by advancing the moral tractability thesis

    Adapting a Kidney Exchange Algorithm to Align with Human Values

    Get PDF
    The efficient and fair allocation of limited resources is a classical problem in economics and computer science. In kidney exchanges, a central market maker allocates living kidney donors to patients in need of an organ. Patients and donors in kidney exchanges are prioritized using ad-hoc weights decided on by committee and then fed into an allocation algorithm that determines who gets what--and who does not. In this paper, we provide an end-to-end methodology for estimating weights of individual participant profiles in a kidney exchange. We first elicit from human subjects a list of patient attributes they consider acceptable for the purpose of prioritizing patients (e.g., medical characteristics, lifestyle choices, and so on). Then, we ask subjects comparison queries between patient profiles and estimate weights in a principled way from their responses. We show how to use these weights in kidney exchange market clearing algorithms. We then evaluate the impact of the weights in simulations and find that the precise numerical values of the weights we computed matter little, other than the ordering of profiles that they imply. However, compared to not prioritizing patients at all, there is a significant effect, with certain classes of patients being (de)prioritized based on the human-elicited value judgments

    A critical and experimental study in the development of moral ideas

    Get PDF
    This study makes no attempt at a comprehensive history of ethics. It rather approaches some representative theories from the standpoint of the thesis that morality is the socialized behaviour of the integrated personality. The interest is primarily in what tendencies these various theories consider to be innate in man; in their treatment of the socialization of the individual; and of the integration of the personality; in their suggested solutions to the ego -alter conflict; and in their consideration of religion as an integrative force within the personality.The experimental section makes no attempt to measure morality or moral traits, for it is difficult, if indeed it be possible, for a laboratorial test situation, which would be a necessary prerequisite to such measurement, to elicit natural moral reactions from subjects. Furthermore, the objective measurement of morality would necessitate the establishment of a norm as a standard which, when it has been secured, is, after all, a somewhat arbitrary gauge for measuring what many think to be incommensurable. Henri Clavier (1) speaks to the point in these words: " There is no algebra or arithmetic of the soul, neither a physics, a chemistry, nor a physiology ".This study, rather, tries to discover what development of moral ideas takes place in the mind of the child in early adolescence, in that period of growth when self -consciousness and moral responsibility are thought to become manifest.The method used is the group questionnaire. Since words are but the symbols of ideas, it is assumed that ethical ideas and moral vocabulary develop together. It may be objected that words carry varying shades of meaning for various children; but this difficulty inheres in language itself. It may be further held that the questionnaire measures intelligence by means of a moral vocabulary; but even if this be the case, such measurement of intelligence does not exclude a simultaneous measurement of moral ideas.The questions of the test are based upon the theory that central to the development of moral behaviour is the development, within society, of the self -regarding sentiment.Some writers hold that morality is merely custom, a social phenomenon. Others hold that ethics treats of what ought to be, that it is constituted of those principles which determine the true worth of ultimate ends of conduct. The present essay presents the thesis that the criteria of morality are two: first, socialization of behaviour; second, integration of the personality around a worthy master sentiment.Although "meta- psychological" theories are not.legitimately a part of psychology, this essay, in one instance, dares to trespass slightly upon metaphysical territory, because in this case that field is not wholly foreign to the present thesis. This transgression is noted where made."Ideas" are considered to be simply the conditions of one's thinking upon any subject - the " enduring cognitive dispositions and systems of dispositions ""Concepts ", in addition, are thought of as partaking of the nature of the universal rather than of the particular. "Ideals" are those constructs of the imagination and reflection which embody highest values; they serve as archetypes for the determination of the copy. ideals are mental constructs " in which needs find their fulfilment"

    An Explanatory Model of Motivation for Cyber-Attacks Drawn from Criminological Theories

    Get PDF
    A new influence model for Cyber Security is presented that deals with security attacks and implementation of security measures from an attacker's perspective. The underlying hypothesis of this model is that Criminological theories of Rational Choice, Desire for Control, and Low Self-Control are relevant to cybercrime and thereby aid in the understanding its basic Motivation. The model includes the roles of Consequences, Moral Beliefs such as Shame and Embarrassment together with Formal Sanctions in deterring cybercrime, as well as role of Defense Posture to limit the Opportunity to attack and increase the likelihood that an attacker will be detected and exposed. One of the motivations of the study was the observation that few attempts have been made to understand cybercrime, in the context of typical crime because: (a) an attacker may consider his actions as victimless due to remoteness of the victim; (b) ease to commit cybercrimes due to opportunities afforded by the Internet and its accessibility, and readily available tools and knowledge for an attack; and (c) vagueness of cybercrime laws that makes prosecution difficult. In developing the model, information from studies in classical crime was related to Cybercrime allowing for analysis of past cyber-attacks, and subsequently preventing future IS attacks, or mitigating their effects. The influence model's applicability is demonstrated by applying it to case studies of actual information attacks which were prosecuted through the United States Courts, and whose judges' opinions are used for statements of facts. Additional, demonstration of the use and face validity of the model is through the mapping of the model to major annual surveys' and reports' results of computer crime. The model is useful in qualitatively explaining "best practices" in protecting information assets and in suggesting emphasis on security practices based on similar results in general criminology
    • …
    corecore