Results 91 to 100 of about 14,082 (218)
AI Alignment Versus AI Ethical Treatment: 10 Challenges
ABSTRACT A morally acceptable course of AI development should avoid two dangers: creating unaligned AI systems that pose a threat to humanity and mistreating AI systems that merit moral consideration in their own right. This paper argues these two dangers interact and that if we create AI systems that merit moral consideration, simultaneously avoiding ...
Adam Bradley, Bradford Saad
wiley +1 more source
Abstract Armed groups operating in conflicts around the world publish statements of denial to dissociate themselves from acts of violence. Existing research argues that armed groups publish denial statements to avoid public backlash, favorably frame the conduct of their campaigns, and distance themselves from unsanctioned actions conducted by rank‐and ...
Ilayda B. Onder, Mark Berlin
wiley +1 more source
The dangers, directness, and purposes of online collective actions
Abstract Most research on online collective action investigates low‐effort, social media‐based actions rather than tactics with highly disruptive potential. To better account for the variety of forms of collective actions that use digital technologies, we conducted an open‐source intelligence search (Study 1a) and an expert consultation survey (Study ...
Catherine G. Lowery +2 more
wiley +1 more source
The Strong Story Hypothesis and the Directed Perception Hypothesis [PDF]
I ask why humans are smarter than other primates, and I hypothesize that an important part of the answer lies in what I call the Strong Story Hypothesis, which holds that story telling and understanding have a central role in human intelligence.
Winston, Patrick Henry
core
Internet, Inequality, and Regime Stability
ABSTRACT This study examines the link between income inequality and political instability, focusing on the moderating role of Internet penetration. Using data from over 120 countries (1996–2020), we find a conditional relationship: in low‐Internet countries, higher inequality associates with lower instability, likely due to limited political awareness ...
Mohammad Reza Farzanegan +1 more
wiley +1 more source
Instrumenting OpenCTI with a Capability for Attack Attribution Support
In addition to identifying and prosecuting cyber attackers, attack attribution activities can provide valuable information for guiding defenders’ security procedures and supporting incident response and remediation.
Sami Ruohonen +3 more
doaj +1 more source
Trojans in Early Design Steps—An Emerging Threat [PDF]
Hardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks in the early steps of design
Becker, Georg T. +2 more
core
Artificial intelligence in blood donor management: A narrative review
Abstract Blood transfusions are vital in health care, yet maintaining an adequate and safe blood supply remains a significant challenge. To address blood donation–associated challenges, this review explores how integrating artificial intelligence (AI) technologies can improve donor recruitment, retention and management.
Maha A. Badawi
wiley +1 more source
Face Off: An Examination of State Biometric Privacy Statutes & Data Harm Remedies [PDF]
As biometric authentication becomes an increasingly popular method of security among consumers, only three states currently have statutes detailing how such data may be collected, used, retained, and released.
Rivera, Michael A.
core +1 more source
An interorganizational task force for disasters affecting US blood supply
Abstract Background and Objectives The US Interorganizational Task Force for Domestic Disasters and Acts of Terrorism (Interorganizational Disaster Task Force [IDTF]) is coordinated by the Association for the Advancement of Blood & Biotherapies (AABB).
Glenn Ramsey, Frank Berry
wiley +1 more source

