24,182 research outputs found

    Introduction to the AIS Code of Research Conduct

    Get PDF
    In this paper, we discuss the AIS Code of Research Conduct approved by AIS Council at its December 2003 meeting. . We explain the purpose of the Code, its focus, who developed the code, and indicate the participation of many leading scholars in our community. We discuss how the Code may be used as an instrument to assist in maintaining the integrity of our journals and conference proceedings. We identify processes by which scholars who were victimized may seek redress. The adoption of this code of research conduct is as an important step in the maturing of our IS community

    Punishing Artificial Intelligence: Legal Fiction or Science Fiction

    Get PDF
    Whether causing flash crashes in financial markets, purchasing illegal drugs, or running over pedestrians, AI is increasingly engaging in activity that would be criminal for a natural person, or even an artificial person like a corporation. We argue that criminal law falls short in cases where an AI causes certain types of harm and there are no practically or legally identifiable upstream criminal actors. This Article explores potential solutions to this problem, focusing on holding AI directly criminally liable where it is acting autonomously and irreducibly. Conventional wisdom holds that punishing AI is incongruous with basic criminal law principles such as the capacity for culpability and the requirement of a guilty mind. Drawing on analogies to corporate and strict criminal liability, as well as familiar imputation principles, we show how a coherent theoretical case can be constructed for AI punishment. AI punishment could result in general deterrence and expressive benefits, and it need not run afoul of negative limitations such as punishing in excess of culpability. Ultimately, however, punishing AI is not justified, because it might entail significant costs and it would certainly require radical legal changes. Modest changes to existing criminal laws that target persons, together with potentially expanded civil liability, are a better solution to AI crime

    University of Wales : institutional review

    Get PDF

    Research Agenda for Studying Open Source II: View Through the Lens of Referent Discipline Theories

    Get PDF
    In a companion paper [Niederman et al., 2006] we presented a multi-level research agenda for studying information systems using open source software. This paper examines open source in terms of MIS and referent discipline theories that are the base needed for rigorous study of the research agenda

    Reality Versus Grant Application Research “Plans”

    Get PDF
    This article describes the implementation of the American Indian mHealth Smoking Dependence Study focusing on the differences between what was written in the grant application compared to what happened in reality. The study was designed to evaluate a multicomponent intervention involving 256 participants randomly assigned to one of 15 groups. Participants received either a minimal or an intense level of four intervention components: (1) nicotine replacement therapy, (2) precessation counseling, (3) cessation counseling, and (4) mHealth text messaging. The project team met via biweekly webinars as well as one to two in-person meetings per year throughout the study. The project team openly shared progress and challenges and collaborated to find proactive solutions to address challenges as compared to what was planned in the original grant application. The project team used multiple strategies to overcome unanticipated intervention issues: (1) cell phone challenges, (2) making difficult staffing decisions, (3) survey lessons, (4) nicotine replacement therapy, (5) mHealth text messages, (6) motivational interviewing counseling sessions, and (7) use of e-cigarettes. Smoking cessation studies should be designed based on the grant plans. However, on the ground reality issues needed to be addressed to assure the scientific rigor and innovativeness of this study

    Government involvement in high performance sport: An Australian national sporting organisation perspective

    Get PDF
    The purpose of this paper is to examine the relationship between the Australian Sports Commission (ASC) and Summer Olympic National Sporting Organisations (NSOs) to determine the effect the relationship has on Olympic performance outcomes. Five Olympic NSOs were examined: Athletics Australia, Cycling Australia, Rowing Australia, Swimming Australia and Yachting Australia. All five NSOs represent sports in which Australia has consistently achieved strong results at previous Olympic Games. These NSOs receive significant funding from the ASC and, as such, are expected to achieve success at the Olympic Games. The ASC–NSO relationship was examined through an agency theory framework whereby the ‘contracts’ between the ASC (principal) and the NSOs (agents) were investigated through a survey, interviews and document analysis to identify potential management issues that may affect Olympic performance outcomes, such as agent or principal opportunism. The findings identified a lack of a collaborative high performance sport system in Australia, with the findings emphasising concerns over the ASC’s management of NSO programmes. While the ASC staff identified their organisation as the leader of high performance sport in Australia, the study’s NSO participants did not believe that the ASC had the capacity, capability and knowledge to fulfil this role.No Full Tex

    The AGI Containment Problem

    Get PDF
    There is considerable uncertainty about what properties, capabilities and motivations future AGIs will have. In some plausible scenarios, AGIs may pose security risks arising from accidents and defects. In order to mitigate these risks, prudent early AGI research teams will perform significant testing on their creations before use. Unfortunately, if an AGI has human-level or greater intelligence, testing itself may not be safe; some natural AGI goal systems create emergent incentives for AGIs to tamper with their test environments, make copies of themselves on the internet, or convince developers and operators to do dangerous things. In this paper, we survey the AGI containment problem - the question of how to build a container in which tests can be conducted safely and reliably, even on AGIs with unknown motivations and capabilities that could be dangerous. We identify requirements for AGI containers, available mechanisms, and weaknesses that need to be addressed
    • 

    corecore