scholarly journals Guilty Artificial Minds: Folk Attributions of Mens Rea and Culpability to Artificially Intelligent Agents

2021 ◽  
Vol 5 (CSCW2) ◽  
pp. 1-27
Author(s):  
Michael T. Stuart ◽  
Markus Kneer
Keyword(s):  
1980 ◽  
Vol 25 (7) ◽  
pp. 524-525
Author(s):  
SALEEM A. SHAH
Keyword(s):  

2020 ◽  
Vol 5 ◽  
pp. 59-66
Author(s):  
Y.M. Iskanderov ◽  

Aim. The use of intelligent agents in modeling an integrated information system of transport logistics makes it possible to achieve a qualitatively new level of design of control systems in supply chains. Materials and methods. The article presents an original approach that implements the possibilities of using multi-agent technologies in the interests of modeling the processes of functioning of an integrated information system of transport logistics. It is shown that the multi-agent infrastructure is actually a semantic shell of the information system, refl ecting the rules of doing business and the interaction of its participants in the supply chains. The characteristic of the model of the class of an intelligent agent, which is basic for solving problems of management of transport and technological processes, is given. Results. The procedures of functioning of the model of integration of information resources of the participants of the transport services market on the basis of intelligent agents are considered. The presented procedures provide a wide range of network interaction operations in supply chains, including traffi c and network structure “fl exible” control, mutual exchange of content and service information, as well as their distributed processing, and information security. Conclusions. The proposed approach showed that the use of intelligent agents in modeling the functioning of an integrated information system makes it possible to take into account the peculiarities of transport and technological processes in supply chains, such as the integration of heterogeneous enterprises, their distributed organization, an open dynamic structure, standardization of products, interfaces and protocols.


2010 ◽  
Author(s):  
Nidhi Vaidya ◽  
Raghvendra Singh Raghuvanshi
Keyword(s):  

Author(s):  
Richard Holton

This paper develops an account of core criminal terms like ‘murder’ that parallels Williamson’s account of knowledge. It is argued that while murder requires that the murderer killed, and that they did so with a certain state of mind, murder cannot be regarded as the conjunction of these two elements (the action, the actus reus, and the associated mental element, the mens rea). Rather, murder should be seen as a primitive notion, which entails each of them. This explains some of the problems around criminal attempt. Attempted murder cannot be seen simply as involving the state of mind of murder minus success; rather, it has to be seen as a self-standing offence, that of attempting to commit the murder.


2020 ◽  
Vol 48 (S4) ◽  
pp. 112-118
Author(s):  
Joseph Blocher ◽  
Bardia Vaseghi

Does the Second Amendment protect those who threaten others by negligently or recklessly wielding firearms? What line separates constitutionally legitimate gun displays from threatening activities that can be legally proscribed? This article finds guidance in the First Amendment doctrine of true threats, which permits punishment of “statements where the speaker means to communicate a serious expression of an intent to commit an act of unlawful violence to a particular individual or group of individual.” The Second Amendment, like the First, should not be read to protect those who threaten unlawful violence. And to the degree that the constitution requires a culpable mental state (mens rea) in such circumstances, the appropriate standard should be recklessness.


SAGE Open ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 215824402098885
Author(s):  
Kuan-Jui Huang ◽  
Kuo-Huie Chiang

Organizations suffer more than ever from the inability to securely manage the information system, despite their myriad efforts. By introducing a real cyberattack of a bank, this research analyzes the characteristics of modern cyberattacks and simulates the dynamic propagation that makes them difficult to manage. It develops a self-adaptive framework that through simulation, distinctly improves cyberdefense efficiency. The results illustrate the discrepancies of the previous studies and validate the use of a time-based self-adaptive model for cybersecurity management. The results further show the significance of human and organizational learning effects and a coordination mechanism in obtaining a highly dependable cyberdefense setting. This study also provides an illuminating analysis for humans to position themselves in the collaborations with increasingly intelligent agents in the future.


Sign in / Sign up

Export Citation Format

Share Document