Skip to main content Accessibility help
×
Hostname: page-component-8448b6f56d-jr42d Total loading time: 0 Render date: 2024-04-25T04:30:04.542Z Has data issue: false hasContentIssue false

Part I - Technology

Published online by Cambridge University Press:  18 October 2019

Ali E. Abbas
Affiliation:
University of Southern California
Get access
Type
Chapter
Information
Next-Generation Ethics
Engineering a Better Society
, pp. 17 - 112
Publisher: Cambridge University Press
Print publication year: 2019

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

References

Ananny, M. (2016). Toward an ethics of algorithms: Convening, observation, probability, and timeliness, Science, Technology, and Human Values, 41(1), 9496.Google Scholar
Baldini, G., Botterman, M., Neisse, R., & Tallacchini, M. (2016). Ethical design in the Internet of Things. Science and Engineering Ethics, 24(3), 905925.CrossRefGoogle ScholarPubMed
Calvo, R. A., & Peters, D. (2014). Positive computing: Technology for wellbeing and human potential. Cambridge, MA: MIT Press.CrossRefGoogle Scholar
Cerf, V. G. (2017). Responsible engineering and the Internet of Things, CIO Review.Google Scholar
Cerf, V. G., Ryan, P. S., Senges, M., & Whitt, R. S. (2014). A perspective from the private sector: Ensuring that forum follows function. In Drake, William J. & Price, Monroe (Eds.), Beyond netmundial: The roadmap for institutional improvements to the global internet Governance Ecosystem. Center for Global Communication Studies, Annenberg School for Communication at the University of Pennsylvania.Google Scholar
Cerf, V. G., Ryan, P. S., Senges, M, & Whitt, R. S. (2016). IoT safety and security as shared responsibility. Journal of Business Informatics, 1(35), 719.Google Scholar
Cialdini, R. B. (2000). Influence: Science and practice, (4th ed.). Boston, MA: Allyn & Bacon Inc.Google Scholar
Clark, D. D., Wroclawski, J., Sollins, K., & Braden, R. (2002, August). Tussle in cyberspace: Defining tomorrow’s internet. Journal IEEE/ACM Transactions on Networking (TON), 13(3), 462475.Google Scholar
Durkheim, E. (1964). Rules of sociological method (p. 6). New York, NY: Free Press.Google Scholar
Fried, L. (2014, May 15). A bill of rights for the Internet of Things, The New York Times.Google Scholar
Gehlbach, H., Marietta, G., King, A., Karutz, C., Bailenson, J. N., & Dede, C. (2015). Many ways to walk a mile in another’s moccasins: Type of social perspective taking and its effect on negotiation outcomes. Computers in Human Behavior, 52, 523532.Google Scholar
Hagel, J., Brown, J. S., & Davison, L. (2008, October). Shaping strategy in a world of constant disruption. Harvard Business Review, https://hbr.org/2008/10/shaping-strategy-in-a-world-of-constant-disruption.Google Scholar
Hardt, M. (2016, October 7). Equality of opportunity in machine learning [blog post]. Retrieved from https://ai.googleblog.com/2016/10/equality-of-opportunity-in-machine.htmlGoogle Scholar
Haarkötter, H., & Weil, F. (Eds.). (2014, December). Ethics for the internet of things. IOT Council.Google Scholar
Himanen, P. (2001). The hacker ethic and the spirit of the information age.. New York, NY: Random House Inc.Google Scholar
Hoffman, P. (Ed.) (2012). The Tao of IETF: A novice’s guide to the internet engineering task force. Retrieved fromGoogle Scholar
IGF. (2016). Dynamic Coalition on the Internet of Things (DC-IoT).Google Scholar
Kontson, K. R. (2001). Critical review of the wireless device Bill of Rights, presentation at the FCC Spectrum Management Working Group (presentation made on December 4, 2002).Google Scholar
Latour, B. (1987). Science in action: How to follow scientists and engineers through society. Milton Keynes: Open University Press.Google Scholar
Levy, S. (1984). Hackers: Heroes of the Computer Revolution. New York, NY: Doubleday.Google Scholar
Merrill, J. C. (2011). Overview: Theoretical foundations for media ethics, 3–32. In David Gordon, A., Kittross, John M., Merrill, John C., Babcock, William, & Dorsher, Michael (Eds.), Controversies in media ethics (3rd ed.), New York, NY: Routledge.Google Scholar
Powell, M. K. (2001, October 30). Broadband migration III: New directions in wireless policy. Speech presented to the Silicon Flatirons Telecommunications Program, University of Colorado at Boulder.Google Scholar
Rickover, H. (1965, January). A humanistic technology. American Behavioral Scientist 8(5), 3.Google Scholar
Scott, S. (2016, March/April). The see change, Stanford Virtual Human Interaction Lab.Google Scholar
Stanford Virtual Human Interaction Lab (2016, October 6). Examining racism with virtual Reality. Stanford Virtual Human Interaction Lab.Google Scholar
Torrone, P. (2006, December 1). The maker’s bill of rights. Make Magazine.Google Scholar
USG Executive Office of the President (2016, October). Preparing for the future of artificial intelligence. Executive Office of the President, National Science and Technology Council Committee on Technology.Google Scholar
Von Schomberg, R. (2013). A vision of responsible innovation. In Owen, R., Heintz, M., & Bessant, J. (Eds.), Responsible innovation. London, UK: John Wiley & Sons.Google Scholar
Weil, F., & Haarkötter, H. (2014, December). Ethics for the Internet of Things, International Review of Ethics 22.Google Scholar
Werbach, K. (2001, November 28). Here’s a cure for bandwidth blues. ZDNet.com.Google Scholar
White House (2016, October). Preparing for the future of artificial intelligence. White Paper, Executive Office of the President National Science and Technology Council Committee on Technology, 2016.Google Scholar
Whitt, R. S. (2009). Adaptive policymaking: Evolving and applying emergent solutions for U.S. communications policy. Federal Communications Law Journal 61(3) Article 2.Google Scholar
Whitt, R. S., & Schultze, S. (2012). A deference to protocol. Cardozo Arts & Ent. LJ 31(689), 704705.Google Scholar

References

Alexander, O. et al. (2013). Digital Ira: Creating a real-time photoreal digital actor. In ACM SIGGRAPH 2013 Posters (SIGGRAPH ‘13). ACM, New York, NY, USA, Article 1, 1 page. DOI: https://doi.org/10.1145/2503385.2503387Google Scholar
Debevec, P. (2012). The light stages and their applications to photoreal digital actors. In SIGGRAPH Asia.Google Scholar
Gratch, J., Wang, N., Gerten, J., Fast, E., & Duffy, R. (2007). Creating rapport with virtual agents. In Proceedings of international conference on intelligent virtual agents, Paris, France.Google Scholar
Green, M., Brock, T., & Kaufman, G. (2004). Understanding the role of transportation into narrative worlds, Communication Theory, 14(4), 311327.Google Scholar
IEEE (2017). The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems. Ethically aligned design: A vision for prioritizing human well-being with autonomous and intelligent systems, Version 2. IEEE. Retrieved from http://standards.ieee.org/develop/indconn/ec/autonomous_systems.html.Google Scholar
Lucas, G. M. et al. (2017). Reporting mental health symptoms: Breaking down barriers to care with virtual human interviewers, Frontiers in Robotics and AI, 4, 51. DOI: 10.3389/frobt.2017.00051.CrossRefGoogle Scholar
Pierson, D. (2018, February 19). Fake videos are on the rise: As they become more realistic, seeing shouldn’t always be believing, Los Angeles Times. Retrieved from www.latimes.com/business/technology/la-fi-tn-fake-videos-20180219-story.htmlGoogle Scholar
Rizzo, A. et al. (2014). Detection and computational analysis of psychological signals using a virtual human interviewing agent. In Proceedings of ICDVRAT 2014, International Journal of Disability and Human Development.Google Scholar
Scherer, S., Lucas, G. M., Gratch, J., Rizzo, A., S., & Morency, L. (2016, January-March). Self-Reported symptoms of depression and PTSD are associated with reduced vowel space in screening interviewsIEEE Transactions on Affective Computing 7(1), 5973.Google Scholar
Traum, D., et al. (2015). New dimensions in testimony: Digitally preserving a holocaust survivor’s interactive storytelling. In Schoenau-Fog, H., Bruni, L., Louchart, S., & Baceviciute, S. (Eds.) Interactive Storytelling. ICIDS. Lecture Notes in Computer Science, Vol. 9445. London: Springer.Google Scholar

References

Howard, R. A, & Korver, C.. (2008). Ethics for the real world: Creating a personal code to guide decisions in work and life. Boston, MA: Harvard Business Press.Google Scholar
Howard, R. A, & Abbas, A. E.. (2015). Foundations of decision analysis. New York, NY: Pearson.Google Scholar
Facebook and Cambridge Analytica: What you need to know as fallout widens. (2018, March 19). The New York Times. Retrieved from www.nytimes.com/2018/03/19/technology/facebook-cambridge-analytica-explained.htmlGoogle Scholar
Kant, I. (1781). The critique of pure reason. Reprinted in 1998 by Cambridge University Press.Google Scholar
Lynch, L. J., Cutro, C., & Bird, E. (2016). The Volkswagen emissions scandal. Charlottesville, VA: Darden Business Publishing. Retrieved from http://store.darden.virginia.edu/the-volkswagen-emissions-scandalGoogle Scholar
Patel, P. (2015, September 25). Engineers, ethics, and the VW scandal. IEEE, Spectrum. Retrieved from https://spectrum.ieee.org/cars-that-think/at-work/education/vw-scandal-shocking-but-not-surprising-ethicists-sayGoogle Scholar
SEC Charges Theranos CEO Elizabeth Holmes with fraud. (2018, March 14). Wall Street Journal. Retrieved from www.wsj.com/articles/sec-charges-theranos-and-founder-elizabeth-holmes-with-fraud-1521045648Google Scholar
US NEWS: Volkswagen’s new CEO promises a more ethical culture. (2018). Retrieved from www.usnews.com/news/business/articles/2018-05-03/new-volkswagen-ceo-promises-push-for-more-ethical-cultureGoogle Scholar

References

Brownstein, J. S., Freifeld, C. C., & Madoff, L. C. (2009). Digital disease detection—harnessing the web for public health surveillance. New England Journal of Medicine 360(21), 21532155. Doi: 10.1056/NEJMp0900702Google Scholar
Broniatowski, J, Paul, D. A., , M. J., & Dredze, M. (2013). National and Local Influenza Surveillance through Twitter: An Analysis of the 2012-2013 Influenza Epidemic. PLOS ONE 8(12), e83672.Google Scholar
Change.org. Shut Down Samaritans Radar. Retrieved from www.change.org/p/twitter-inc-shut-down-samaritans-radarGoogle Scholar
De Choudhury, M., Counts, S., & Horvitz, E. (2013). Predicting postpartum changes in emotion and behavior via social media (pp. 3267–3276). In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Association for Computing Machinery, New York..Google Scholar
De Choudhury, M., Counts, S., Horvitz, E., & Hoff, A. (2014). Characterizing and predicting postpartum depression from Facebook data (pp. 626–638). In Proceedings of International Conference on Weblogs and Social Media. Association for the Advancement of Artificial Intelligence (AAAI), Palo Alto, CA.Google Scholar
Directive 95/46/EC of the European Parliament and of The Council of Europe, 24 October 1995.Google Scholar
Equal Employment Opportunity Commission (EEOC), 29 Code of Federal Regulations CFR (2013).Google Scholar
European Commission, Proposal for a Regulation of the European Parliament and of the Council on the Protection of Individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), COM(2012) 11 final (2012) Retrieved from http://bit.ly/1Lu5POvGoogle Scholar
Executive Office of the President. (2015). Big data and differential processing. White House, Washington, DC.Google Scholar
Executive Office of the president (2015b). Big data report. White House, Washington, DC. Retrieved from www.whitehouse.gov/sites/default/files/docs/Big_Data_Report_Nonembargo_v2.pdfGoogle Scholar
Executive Office of the President. (2014). Big data: seizing opportunities, preserving values. White House, Washington, DC. Retrieved from www.whitehouse.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdfGoogle Scholar
Eysenbach, G. J. (2009). Infodemiology and infoveillance: Framework for an emerging set of public health informatics methods to analyze search, communication and publication behavior on the internet. Journal of Medical Internet Research, 11(1), e11. doi: 10.2196/jmir.1157.Google Scholar
FTC. (2014a). Opening remarks FTC Chairwoman Edith Ramirez: Big data: A tool for inclusion or exclusion? Washington, DC September 15, 2014. Retrieved from www.ftc.gov/news-events/events-calendar/2014/09/big-data-tool-inclusion-or-exclusionGoogle Scholar
FTC. (2014b). Data brokers: A call for transparency and accountability. Report of the FTC, May 2014. Washington, DC). Retrieved from www.ftc.gov/system/files/documents/reports/data-brokers-call-transparency-accountability-report-federal-trade-commission-may-2014/140527databrokerreport.pdf p. 52Google Scholar
FTC. (2012). Protecting consumer privacy in an era of rapid change: Recommendations for businesses and policymakers. Report of the FTC. Washington, DC). Retrieved from www.ftc.gov/reports/protecting-consumer-privacy-era-rapid-change-recommendations-businesses-policymakersGoogle Scholar
Mithal, M. (2010). Letter from Maneesha Mithal, FTC, to Reed Freeman, Morrison, & Foerster LLP, Counsel for Netflix, 2 [closing letter]. Retrieved from http://1.usa.gov/1GCFyXRGoogle Scholar
President’s Council of Advisors on Science and Technology (PCAST). (2014, May). Big data and privacy: A technological perspective (pp. 48–50). Retrieved from www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy_-_may_2014.pdf (White House, Washington, DC). Retrieved from http://1.usa.gov/1C5ewNvGoogle Scholar
Podesta, J. (2015, February 5) Big data and privacy: 1 year out [blog]. Retrieved from www.whitehouse.gov/blog/2015/02/05/big-data-and-privacy-1-year-outGoogle Scholar
Rothstein, M. A., (2008). GINA, the ADA, and genetic discrimination in employment. The Journal of Law, Medicine & Ethics: A Journal of the American Society of Law, Medicine & Ethics, 36(4), 837840. doi:10.1111/j.1748-720X.2008.00341.x.Google Scholar
Sadilek, A., Kautz, H., & Silenzio, V. (2012). Predicting disease transmission from geo-tagged micro-blog data. In Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence (AAAI, Palo Alto, CA, 2012).Google Scholar
Schrems vs Facebook Ireland Limited, §J. Unlawful data transmission to the U.S.A. (“PRISM”), paras 166 and 167 (2013). Retrieved from www.europe-v-facebook.org/sk/sk_en.pdfGoogle Scholar
Sweeney, L. (2014). Online ads roll the dice [blog]. Retrieved from www.ftc.gov/news-events/blogs/techftc/2014/09/online-ads-roll-diceGoogle Scholar
White, R. W., Harpaz, R., Shah, N. H., DuMouchel, W., & Horvitz, E. (2014). Toward enhanced pharmacovigilance using patient-generated data on the internet. Clinical Pharmacology Therapeutics 96(2), pp. 239246. doi:10.1038/clpt.2014.77.Google Scholar
White House Council of Economic Advisers. (2015). Big data and differential pricing (White House, Washington, DC).Google Scholar

References

Abboud, G., Marean, J., & Yampolskiy, R. V. (2010). “Steganography and Visual Cryptography in Computer Forensics.” Paper presented at the Systematic Approaches to Digital Forensic Engineering (SADFE), 2010 5th IEEE International Workshop.Google Scholar
Ali, N., Hindi, M., & Yampolskiy, R. V. (2011). “Evaluation of Authorship Attribution Software on a Chat Bot Corpus.” Paper presented at the 23rd International Symposium on Information, Communication and Automation Technologies (ICAT2011), Sarajevo, Bosnia and Herzegovina.Google Scholar
Ali, N., Schaeffer, D., & Yampolskiy, R. V. (2012). Linguistic profiling and behavioral drift in chat bots. In Proceedings of the Midwest Artificial Intelligence and Cognitive Science Conference, 27.Google Scholar
Amodei, D., Olah, C., Steinhardt, J., Christiano, P., Schulman, J., & Mané, D. (2016). Concrete problems in AI safety. arXiv preprint arXiv:1606.06565.Google Scholar
Armstrong, S., Bostrom, N., & Shulman, C. (2016). Racing to the precipice: a model of artificial intelligence development. AI & Society, 31(2), 201206.Google Scholar
Armstrong, S., Sandberg, A., & Bostrom, N. (2012). Thinking inside the box: Controlling and using an oracle AI. Minds and Machines, 22(4), 299324.Google Scholar
Armstrong, S., & Sotala, K. (2015). How we’re predicting AI–or failing to. In Romportl, J., Zackova, E., & Kelemen, J. (Eds.), Beyond Artificial Intelligence (pp. 1129). Cham, Switzerland: Springer.Google Scholar
Babcock, J., Kramar, J., & Yampolskiy, R. (2016). “The AGI Containment Problem.” Paper presented at the 9th Conference on Artificial General Intelligence (AGI 2015), NYC, USA.Google Scholar
Beck, M. B., Rouchka, E. C., & Yampolskiy, R. V. (2013). Finding data in DNA: Computer forensic investigations of living organisms. In Gladyshev, P. & Rogers, M. K., Digital forensics and cyber crime (pp. 204219). Berlin; Heidelberg: Springer.CrossRefGoogle Scholar
Benthall, S. (2017). Don’t fear the reaper: Refuting Bostrom’s superintelligence argument. arXiv preprint arXiv:1702.08495.Google Scholar
Bostrom, N. (2014). Superintelligence: Paths, dangers, strategies. Oxford: Oxford University Press.Google Scholar
Cellan-Jones, R. (2014). Stephen Hawking warns artificial intelligence could end mankind. Paper presented at the BBC. Retrieved from www.bbc.com/news/technology-30290540Google Scholar
Collobert, R., Kavukcuoglu, K., & Farabet, C. (2012). Implementing neural networks efficiently. In Montavon, G., Orr, G. B., & Müller, K-R (Eds.), Neural networks: tricks of the trade, (pp. 537557). New York, NY: Springer.Google Scholar
Dafoe, A., & Russell, S. (2016). Yes, we are worried about the existential risk of artificial intelligence. Retrieved from www.technologyreview.com/s/602776/yes-we-are-worried-about-the-existential-risk-of-artificial-intelligence/.Google Scholar
Danaher, J. (2015). Why AI doomsayers are like sceptical theists and why it matters. Minds and Machines, 25(3), 231246.Google Scholar
Dietrich, E. (2007). After the humans are gone. Journal of Experimental & Theoretical Artificial Intelligence, 19 (1), 5567.Google Scholar
Garfinkel, T., & Rosenblum, M. (2003). A virtual machine introspection based architecture for intrusion detection. Paper presented at the NDSS.Google Scholar
Garis, H. D. (2005). The artilect war. Palm Spring, CA: ETC publications.Google Scholar
Good, I. J. (1966). Speculations concerning the first ultraintelligent machine. Advances in Computers, 6(1), 3188.Google Scholar
Guri, M., Kachlon, A., Hasson, O., Kedma, G., Mirsky, Y., & Elovici, Y. (2015). GSMem: Data exfiltration from air-gapped computers over GSM frequencies. Paper presented at the 24th USENIX Security Symposium (USENIX Security 15).Google Scholar
Kurzweil, R. (2005). The singularity is near: When humans transcend biology. New York, NY: Viking Press.Google Scholar
LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521(7553), 436444.Google Scholar
Legg, S. (2008, June). “Machine Super Intelligence.” Paper presented at the PhD Thesis, University of Lugano. Retrieved from www.vetta.org/documents/Machine_Super_Intelligence.pdfGoogle Scholar
Loosemore, R. (2014). The maverick nanny with a dopamine drip: Debunking fallacies in the theory of AI motivation. AAAI Spring Symposium Series 2014 (March).Google Scholar
Loosemore, R., & Goertzel, B. (2012). Why an intelligence explosion is probable. In Eden, A. H., Moor, J. H., Søraker, J. H., & Steinhart, E. (Eds.) Singularity hypotheses (pp. 8398). New York, NY: Springer.Google Scholar
Losavio, M. et al. (2009). Assessing the legal risks in network forensic probing. In Peterson, G. & Shenoi, S (Eds.) Advances in Digital Forensics V (pp. 255266), IFIP AICT. Heidelberg: Berlin: SpringerGoogle Scholar
Majot, A. M., & Yampolskiy, R. (2015). Global catastrophic risk and security implications of quantum computers. Futures, 72(1), 1726.Google Scholar
Majot, A. M., & Yampolskiy, R. V. (2014). AI safety engineering through introduction of self-reference into felicific calculus via artificial pain and pleasure. Paper presented at the IEEE International Symposium on Ethics in Science, Technology and Engineering, Chicago, IL (May 23–24).Google Scholar
McDaniel, R., & Yampolskiy, R. V. (2011). “Embedded non-interactive CAPTCHA for Fischer Random Chess.” Paper presented at the 16th International Conference on Computer Games (CGAMES), Louisville, KY.Google Scholar
Mnih, V., Kavukcuoglu, K., Silver, D., Rusu, A. A., Veness, J., Bellemare, M. G., & Ostrovski, G. (2015). Human-level control through deep reinforcement learning. Nature, 518(7540), 529533.Google Scholar
Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., & Rajarajan, M. (2013). A survey of intrusion detection techniques in cloud. Journal of Network and Computer Applications, 36(1), 4257.Google Scholar
Mohamed, A., Baili, N., D’Souza, D., & Yampolskiy, R. V. (2011). “Avatar face recognition using Wavelet Transform and hierarchical multi-scale LBP.” Paper presented at the Tenth International Conference on Machine Learning and Applications (ICMLA’11), Honolulu, USA (December 18–21).CrossRefGoogle Scholar
Muehlhauser, L., & Yampolskiy, R. (2013, July 15). “Roman Yampolskiy on AI Safety Engineering.” Paper presented at the Machine Intelligence Research Institute. Retrieved from http://intelligence.org/2013/07/15/roman-interview/Google Scholar
Musk, E. (2014). A ‘potentially dangerous outcome’ with AI. Paper presented at the CNBC. Retrieved from www.cnbc.com/video/2014/06/20/elon-musk-a-potentially-dangerous-outcome-with-ai.htmlGoogle Scholar
Novikov, D., Yampolskiy, R. V., & Reznik, L. (2006a). “Anomaly Detection Based Intrusion Detection.” Paper presented at the 3rd International Conference on Information Technology: New Generations (ITNG 2006), Las Vegas, Nevada, USA (April 10–12).Google Scholar
Novikov, D., Yampolskiy, R. V., & Reznik, L. (2006b). “Artificial intelligence Approaches for Intrusion Detection.” Paper presented at the Long Island Systems Applications and Technology Conference (LISAT 2006). Long Island, New York (May 5).Google Scholar
Omohundro, S. M. (2007). The nature of self-improving artificial intelligence. Paper presented at the Singularity Summit, San Francisco, CA.Google Scholar
Omohundro, S. M. (2008). The basic AI drives. In Wang, P., Goertzel, B., & Franklin, S. (Eds.), Proceedings of the first agi conference, volume 171, frontiers in artificial intelligence and applications. Amsterdam: IOS Press.Google Scholar
Pistono, F., & Yampolskiy, R. V. (2016). “Unethical Research: How to Create a Malevolent Artificial Intelligence.” Paper presented at the 25th International Joint Conference on Artificial Intelligence (IJCAI-16). Ethics for Artificial Intelligence Workshop (AI-Ethics-2016).Google Scholar
Potter, B., & McGraw, G. (2004). Software security testing. IEEE Security & Privacy, 2(5), 8185.Google Scholar
Russell, S., & Norvig, P. (2003). Artificial intelligence: a modern approach. Upper Saddle River, NJ: Prentice Hall.Google Scholar
Soares, N. (2015). The value learning problem. Machine Intelligence Research Institute, Berkley, CA, USA.Google Scholar
Soares, N., Fallenstein, B., Armstrong, S., & Yudkowsky, E. (2015). “Corrigibility.” Paper presented at the Workshops at the 29th AAAI Conference on Artificial Intelligence, Austin, Texas, USA (January 25–30).Google Scholar
Solomonoff, R. J. (1964). A formal theory of inductive inference. Part I. Information and Control, 7(1), 122.Google Scholar
Solomonoff, R. J. (1985). The time scale of artificial intelligence: Reflections on social effects. North-Holland Human Systems Management, 5, 149153.Google Scholar
Sotala, K. (2012). Advantages of artificial intelligences, uploads, and digital minds. International Journal of Machine Consciousness, 4(01), 275291.Google Scholar
Sotala, K., & Yampolskiy, R. V. (2015). Responses to catastrophic AGI risk: a survey. Physica Scripta, 90(1), 018001.Google Scholar
Spitzner, L. (2005). Know your enemy: Honeynets. Honeynet Project.Google Scholar
Turing, A. M. (1996). Intelligent machinery: A heretical theory. Philosophia Mathematica, 4(3), 256260.Google Scholar
Tuxedage, . (2013, September 5). I attempted the AI Box Experiment again! (And won – Twice!). Retrieved from http://lesswrong.com/lw/ij4/i_attempted_the_ai_box_experiment_again_and_won/.Google Scholar
Vinge, V. (1993). “The Coming Technological Singularity: How to Survive in the Post-Human Era.” Paper presented at the Vision 21: Interdisciplinary Science and Engineering in the Era of Cyberspace, Cleveland, OH (March 30–31).Google Scholar
Wiener, N. (1961). Cybernetics or control and communication in the animal and the machine 25. Cambridge, MA: MIT Press.Google Scholar
Yampolskiy, R., Cho, G., Rosenthal, R., & Gavrilova, M. (2012). Experiments in artimetrics: avatar face recognition. Transactions on Computational Science XVI, 77–94.Google Scholar
Yampolskiy, R., & Fox, J. (2013). Safety engineering for artificial general intelligence. Topoi, 32(2), 217226.Google Scholar
Yampolskiy, R. V. (2008a). Behavioral modeling: An overview. American Journal of Applied Sciences, 5(5), 496503.Google Scholar
Yampolskiy, R. V. (2008b). Computer security: From passwords to behavioral biometrics. New York, NY:New Academic Publishing.Google Scholar
Yampolskiy, R. V. (2012). Leakproofing singularity – Artificial intelligence confinement problem. Journal of Consciousness Studies (JCS), 19(1–2), 194214.Google Scholar
Yampolskiy, R. V. (2013a). Artificial intelligence safety engineering: Why machine ethics is a wrong approach. In Müller, V. C. (Ed.) Philosophy and theory of artificial intelligence (pp. 389396), Berlin; Heidelberg: Springer.Google Scholar
Yampolskiy, R. V. (2013a). Turing test as a defining feature of AI-completeness. In Yang, Xin-She (Ed.), Artificial intelligence, evolutionary computation and metaheuristics - In the footsteps of Alan Turing (pp. 317). Berlin; Heidelberg: Springer.Google Scholar
Yampolskiy, R. V. (2013b). What to do with the singularity paradox? In Müller, V. (Ed.) Philosophy and theory of artificial intelligence (pp. 397413). Berlin; Heidelberg: Springer.CrossRefGoogle Scholar
Yampolskiy, R. V. (2014a). The universe of minds. arXiv preprint arXiv:1410.0369.Google Scholar
Yampolskiy, R. V. (2014b). Utility function security in artificially intelligent agents. Journal of Experimental & Theoretical Artificial Intelligence, 26(3), 373389.Google Scholar
Yampolskiy, R. V. (2015). Artificial superintelligence: A futuristic approach. London: Chapman and Hall/CRC Press.Google Scholar
Yampolskiy, R. V. (2015). From seed AI to technological singularity via recursively self-improving software. arXiv preprint arXiv:1502.06512.Google Scholar
Yampolskiy, R. V. (2016). “Taxonomy of Pathways to Dangerous Artificial Intelligence.” Paper presented at the Workshops at the Thirtieth AAAI Conference on Artificial Intelligence.Google Scholar
Yampolskiy, R. V. (2018). Artificial intelligence safety and security. Boca Raton, FL: CRC Press.Google Scholar
Yampolskiy, R. V., & Gavrilova, M. L. (2012). Artimetrics: Biometrics for artificial entities. Robotics & Automation Magazine, IEEE, 19(4), 4858.Google Scholar
Yampolskiy, R. V., & Govindaraju, V. (2008). Behavioural biometrics: a survey and classification. International Journal of Biometrics, 1(1), 81113.CrossRefGoogle Scholar
Yampolskiy, R. V., & Govindaraju, V. (2009). Strategy-based behavioural biometrics: a novel approach to automated identification. International Journal of Computer Applications in Technology, 35(1), 2941.Google Scholar
Yampolskiy, R. V., Rebolledo-Mendez, J. D., & Hindi, M. M. (2014). Password protected Visual cryptography via cellular automaton Rule 30. Transactions on Data Hiding and Multimedia Security IX, 57–67.Google Scholar
Yampolskiy, R. V., & Spellchecker, M. (2016). Artificial intelligence safety and cybersecurity: A timeline of AI failures. arXiv preprint arXiv:1610.07997.Google Scholar
Yan, L.-K., Jayachandra, M., Zhang, M., & Yin, H. (2012). V2E: combining hardware virtualization and software emulation for transparent and extensible malware analysis. ACM Sigplan Notices, 47(7), 227238.Google Scholar
Yudkowsky, E. S. (2002). The AI-Box experiment. Retrieved from http://yudkowsky.net/singularity/aiboxGoogle Scholar
Yudkowsky, E. S. (2008a). That Alien Message. Retrieved from www.lesswrong.com/posts/5wMcKNAwB6X4mp9og/that-alien-message.Google Scholar
Yudkowsky, E. S. (2008b). Artificial intelligence as a positive and negative factor in global risk. In Bostrom, N. & Cirkovic, M. M. (Eds.), Global catastrophic risks (pp. 308345). Oxford, UK: Oxford University Press.Google Scholar
Yudkowsky, E. S. (2011). Complex value systems in friendly AI. In Proceedings of the Artificial General Intelligence: 4th International Conference, AGI 2011 (pp. 388393). Mountain View, CA: Springer.Google Scholar
Yudkowsky, E. S., & Hanson, R. (2008). “The Hanson-Yudkowsky AI-foom Debate.” Paper presented at the MIRI Technical Report. Retrieved from at: http://intelligence.org/files/AIFoomDebate.pdfGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Technology
  • Edited by Ali E. Abbas, University of Southern California
  • Book: Next-Generation Ethics
  • Online publication: 18 October 2019
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Technology
  • Edited by Ali E. Abbas, University of Southern California
  • Book: Next-Generation Ethics
  • Online publication: 18 October 2019
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Technology
  • Edited by Ali E. Abbas, University of Southern California
  • Book: Next-Generation Ethics
  • Online publication: 18 October 2019
Available formats
×