339 research outputs found

    A Broad View on Robot Self-Defense: Rapid Scoping Review and Cultural Comparison

    Get PDF
    With power comes responsibility: as robots become more advanced and prevalent, the role they will play in human society becomes increasingly important. Given that violence is an important problem, the question emerges if robots could defend people, even if doing so might cause harm to someone. The current study explores the broad context of how people perceive the acceptability of such robot self-defense (RSD) in terms of (1) theory, via a rapid scoping review, and (2) public opinion in two countries. As a result, we summarize and discuss: increasing usage of robots capable of wielding force by law enforcement and military, negativity toward robots, ethics and legal questions (including differences to the well-known trolley problem), control in the presence of potential failures, and practical capabilities that such robots might require. Furthermore, a survey was conducted, indicating that participants accepted the idea of RSD, with some cultural differences. We believe that, while substantial obstacles will need to be overcome to realize RSD, society stands to gain from exploring its possibilities over the longer term, toward supporting human well-being in difficult times

    The Artificially Intelligent Trolley Problem: Understanding Our Criminal Law Gaps in a Robot Driven World

    Get PDF
    Not only is Artificial Intelligence (AI) present everywhere in people’s lives, but the technology is also now capable of making unpredictable decisions in novel situations. AI poses issues for the United States’ traditional criminal law system because this system emphasizes mens rea’s importance in determining criminal liability. When AI makes unpredictable decisions that lead to crimes, it will be impractical to determine what mens rea to ascribe to the human agents associated with the technology, such as AI’s creators, owners, and users. To solve this issue, the United States’ legal system must hold AI’s creators, owners, and users strictly liable for their AI’s actions and also create standards that can provide these agents immunity from strict liability. Although other legal scholars have proposed solutions that fit within the United States’ traditional criminal law system, these proposals fail to strike the right balance between encouraging AI’s development and holding someone criminally liable when AI causes harm. This Note illuminates this issue by exploring an artificially intelligent trolley problem. In this problem, an AI-powered self-driving car must decide between running over and killing five pedestrians or swerving out of the way and killing its one passenger; ultimately, the AI decides to kill the five pedestrians. This Note explains why the United States’ traditional criminal law system would struggle to hold the self-driving car’s owner, programmers, and creator liable for the AI’s decision, because of the numerous human agents this problem brings into the criminal liability equation, the impracticality of determining these agents’ mens rea, and the difficulty in satisfying the purposes of criminal punishment. Looking past the artificially intelligent trolley problem, these issues can be extended to most criminal laws that require a mens rea element. Criminal law serves as a powerful method of regulating new technologies, and it is essential that the United States’ criminal law system adapts to solve the issues that AI poses

    Unmanned Aircraft Systems in the Cyber Domain

    Get PDF
    Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions. This second edition discusses state-of-the-art technology issues facing US UAS designers. It focuses on counter unmanned aircraft systems (C-UAS) – especially research designed to mitigate and terminate threats by SWARMS. Topics include high-altitude platforms (HAPS) for wireless communications; C-UAS and large scale threats; acoustic countermeasures against SWARMS and building an Identify Friend or Foe (IFF) acoustic library; updates to the legal / regulatory landscape; UAS proliferation along the Chinese New Silk Road Sea / Land routes; and ethics in this new age of autonomous systems and artificial intelligence (AI).https://newprairiepress.org/ebooks/1027/thumbnail.jp

    Attention and Social Cognition in Virtual Reality:The effect of engagement mode and character eye-gaze

    Get PDF
    Technical developments in virtual humans are manifest in modern character design. Specifically, eye gaze offers a significant aspect of such design. There is need to consider the contribution of participant control of engagement. In the current study, we manipulated participants’ engagement with an interactive virtual reality narrative called Coffee without Words. Participants sat over coffee opposite a character in a virtual café, where they waited for their bus to be repaired. We manipulated character eye-contact with the participant. For half the participants in each condition, the character made no eye-contact for the duration of the story. For the other half, the character responded to participant eye-gaze by making and holding eye contact in return. To explore how participant engagement interacted with this manipulation, half the participants in each condition were instructed to appraise their experience as an artefact (i.e., drawing attention to technical features), while the other half were introduced to the fictional character, the narrative, and the setting as though they were real. This study allowed us to explore the contributions of character features (interactivity through eye-gaze) and cognition (attention/engagement) to the participants’ perception of realism, feelings of presence, time duration, and the extent to which they engaged with the character and represented their mental states (Theory of Mind). Importantly it does so using a highly controlled yet ecologically valid virtual experience

    Security Risk Management for the Internet of Things

    Get PDF
    In recent years, the rising complexity of Internet of Things (IoT) systems has increased their potential vulnerabilities and introduced new cybersecurity challenges. In this context, state of the art methods and technologies for security risk assessment have prominent limitations when it comes to large scale, cyber-physical and interconnected IoT systems. Risk assessments for modern IoT systems must be frequent, dynamic and driven by knowledge about both cyber and physical assets. Furthermore, they should be more proactive, more automated, and able to leverage information shared across IoT value chains. This book introduces a set of novel risk assessment techniques and their role in the IoT Security risk management process. Specifically, it presents architectures and platforms for end-to-end security, including their implementation based on the edge/fog computing paradigm. It also highlights machine learning techniques that boost the automation and proactiveness of IoT security risk assessments. Furthermore, blockchain solutions for open and transparent sharing of IoT security information across the supply chain are introduced. Frameworks for privacy awareness, along with technical measures that enable privacy risk assessment and boost GDPR compliance are also presented. Likewise, the book illustrates novel solutions for security certification of IoT systems, along with techniques for IoT security interoperability. In the coming years, IoT security will be a challenging, yet very exciting journey for IoT stakeholders, including security experts, consultants, security research organizations and IoT solution providers. The book provides knowledge and insights about where we stand on this journey. It also attempts to develop a vision for the future and to help readers start their IoT Security efforts on the right foot

    Technologies on the stand:Legal and ethical questions in neuroscience and robotics

    Get PDF

    Robotics and the Future of International Asymmetric Warfare

    Get PDF
    In the post-Cold War world, the world's most powerful states have cooperated or avoided conflict with each other, easily defeated smaller state governments, engaged in protracted conflicts against insurgencies and resistance networks, and lost civilians to terrorist attacks. This dissertation explores various explanations for this pattern, proposing that some non-state networks adapt to major international transitions more quickly than bureaucratic states. Networks have taken advantage of the information technology revolution to enhance their capabilities, but states have begun to adjust, producing robotic systems with the potential to grant them an advantage in asymmetric warfare

    The Fabulous Future?

    Get PDF
    Will the future be one of economic expansion, greater tolerance, liberating inventions, and longer, happier lives? Or do we face stagnation, declining quality of life, and a techno­logically enhanced totalitarianism worse than any yet seen? The Fabulous Future? draws its inspi­ration from a more optimistic time, and tome, The Fabulous Fu­ture: America in 1980, in which Fortune magazine celebrated its anniversary by publishing the predictions of thought leaders of its time. In the present volume, the world’s leading specialists project developments in their areas of expertise, from religion and the media to the environment and nanotechnology. Will we be happier, and what does happiness have to do with our economic future? Where is higher education heading and how should it develop? And what is the future of prediction itself? These exciting essays provoke sharper questions, reflect unexpectedly on one another, and testify to our present anxieties about the surprising world to come

    Disruptive Technologies with Applications in Airline & Marine and Defense Industries

    Get PDF
    Disruptive Technologies With Applications in Airline, Marine, Defense Industries is our fifth textbook in a series covering the world of Unmanned Vehicle Systems Applications & Operations On Air, Sea, and Land. The authors have expanded their purview beyond UAS / CUAS / UUV systems that we have written extensively about in our previous four textbooks. Our new title shows our concern for the emergence of Disruptive Technologies and how they apply to the Airline, Marine and Defense industries. Emerging technologies are technologies whose development, practical applications, or both are still largely unrealized, such that they are figuratively emerging into prominence from a background of nonexistence or obscurity. A Disruptive technology is one that displaces an established technology and shakes up the industry or a ground-breaking product that creates a completely new industry.That is what our book is about. The authors think we have found technology trends that will replace the status quo or disrupt the conventional technology paradigms.The authors have collaborated to write some explosive chapters in Book 5:Advances in Automation & Human Machine Interface; Social Media as a Battleground in Information Warfare (IW); Robust cyber-security alterative / replacement for the popular Blockchain Algorithm and a clean solution for Ransomware; Advanced sensor technologies that are used by UUVs for munitions characterization, assessment, and classification and counter hostile use of UUVs against U.S. capital assets in the South China Seas. Challenged the status quo and debunked the climate change fraud with verifiable facts; Explodes our minds with nightmare technologies that if they come to fruition may do more harm than good; Propulsion and Fuels: Disruptive Technologies for Submersible Craft Including UUVs; Challenge the ammunition industry by grassroots use of recycled metals; Changing landscape of UAS regulations and drone privacy; and finally, Detailing Bioterrorism Risks, Biodefense, Biological Threat Agents, and the need for advanced sensors to detect these attacks.https://newprairiepress.org/ebooks/1038/thumbnail.jp
    • …
    corecore