IEEE Technology and Society Magazine - Spring 2013 - 65
their robots in an ethically responsible manner.
Author Information
Jason Borenstein is with the
Georgia Institute of Technology,
Atlanta, GA. Email: borenstein@
gatech.edu.
Keith Miller is Schewe professor of Computer Science, University of Illinois at Springfield,
Springfield, IL.
Acknowledgment
The authors would like to thank
the anonymous reviewers for their
helpful and constructive comments.
References
[1] W. Wallach and C. Allen, Moral Machines:
Teaching Robots Right from Wrong. New
York, NY: Oxford Univ. press, Inc., 2009.
[2] N. Sharkey. "The ethical frontiers of robotics,"
Science, vol. 322, pp. 1800-1801, Dec. 2008.
[3] H. petroski. Success Through Failure: The
Paradox of Design. princeton, NJ: princeton
Univ. press, 2006.
[4] J. Kornblum. "New 'peace' virus infects
Excel," CNET News, Jan. 27, 1998; http://news.
cnet.com/New-peace-virus-infects-Excel/
2100-1001_3-207544.html, accessed May 3,
2012.
[5] S. Gorman, A. Cole, and Y. Dreazen.
"Computer spies breach fighter-jet project,"
Wall Street J.. Apr. 21, 2009; http://online.wsj.
com/article/SB124027491029837401.html,
accessed May 3, 2012.
[6] r. McMillian. "DNS problem linked to
DDoS attacks gets worse," ITworld, Nov. 13,
2009; http://www.itworld.com/security/84742/
dns-problem-linked-ddos-attacks-gets-worse,
accessed May 3, 2012.
[7] G. Keizer, "Half of Fortune 500 firms
infected with DNS Changer Machines will be
cut off from the Web next month, say experts,"
Computer World, Feb. 2, 2012; http://
geinvestigations.com/blog/tag/dns-changer/,
accessed Mar. 21, 2012.
[8] p. paganini. "DNS Changer: FBI's Internet Blackout postponed from 8 March to
9 July," Infosec Island, Mar. 6, 2012; http://
www.infosecisland.com/blogview/20612DNS C h a nge r- F BI s -I nt e r n e t-Bl a cko utpostponed.html, accessed Mar. 21, 2012.
[9] "Snooping through the power socket."
BBC News, July 13, 2009, http://news.bbc.
co.uk/2/hi/technology/8147534.stm, accessed
May 3, 2012.
[10] M. Campbell. "Mobile botnets show
their disruptive potential," New Scientist.
Nov. 17, 2009; http://www.newscientist.
c o m /a r t icle / m g 2 0 42 73 47.0 0 0 -m o b i le botnets-show-their-disr uptive-potential.
html, accessed May 3, 2012.
[11] N. potter. "Sony playStation network
hacked again, closes 93,000 accounts," Oct. 12,
2011; http://abcnews.go.com/blogs/technology/
2011/10/sony-playstation-network-hacked-againcloses-93000-accounts/, accessed Mar. 12, 2012.
[12] S. Wolfson. "Construction signs warn of
zombies: Hackers change public safety message," Austin News, Jan. 29, 2009; http://www.
kxan.com/dpp/news/road_signs_warn_of_
zombies, accessed May 3, 2012.
[13] K. poulsen. "Traffic hackers hit red
light," Wired.com. Aug. 12, 2005; http://www.
wired.com/science/discoveries/news/2005/
08/68507, accessed May 3, 2012.
[14] T.E. Humphreys et al. "Assessing
the spoofing threat: Development of a portable GpS civilian spoofer," in Proc. ION GNSS,
Institute of Navigation, Savannah, GA, 2008.
[15] D. Kravets, "Drones subject to GpS spoofing, privacy 'abuses,' GAO report warns,"
Wired, Sept. 25, 2012; http://www.wired.com/
threatlevel/2012/09/gao-drone-report/, accessed
Oct. 16, 2012.
[16] D. Kravets, "Jan. 25, 1979: robot kills human," Wired, Jan. 25, 2010; http://www.wired.
com/thisdayintech/2010/01/0125robot-killsworker/, accessed Mar. 12, 2012.
[17] D. Feil-Seifer and M.J. Mataric, "Socially
assistive robotics: Ethical issues related to
technology," IEEE Robotics & Automation
Mag., vol. 18, no. 1, Mar. 24-31, 2011.
[18] r. Clarke, "Asimov's laws of robotics: implications for information technology-part I,"
Computer, vol. 26, no. 12, pp. 53-61, 1993.
[19] r. Clarke, "Asimov's laws of robotics: Implications for information technology-part II,"
Computer, vol. 27, no. 1, pp. 57-66, 1994.
[20] S. Bratus. "Hacker curriculum: How
hackers learn networking," IEEE Distributed
Systems Online, vol. 8, no. 10, pp. 2, 2007.
[21] M. Nagenborg et al. "Ethical regulations
on robotics in Europe," AI & Society, vol. 22,
pp. 349-366, 2008.
[22] InterAcademy panel, "IAp Statement
on Biosecurity," Nov. 7, 2005; http://www.
interacademies.net/File.aspx?id=5401, accessed
May 3, 2012.
[23] F.S. Collins, "Statement by NIH Director
Francis Collins, M.D., ph.D. on the NSABB
review of revised H5N1 Manuscripts," Apr.
20, 2012; http://www.nih.gov/about/director/
04202012_NSABB.htm, accessed Apr. 24, 2012.
[24] r. Cohen. "Of fruit flies and drones,"
New York Times, Nov. 12, 2009; http://www.
nytimes.com /20 09/11/13/opin ion /13i htedcohen.html, accessed Mar. 12, 2012.
[25] "Group claims attack on Israel navy
boat off Gaza-TV," Reuters, Apr. 14, 2009.
http://www.reuters.com/article/latestCrisis/
idUSLE653294, accessed May 3, 2012.
[26] N. Sharkey, M. Goodman, and N. ross.
"The coming robot crime wave," Computer,
vol. 43, no. 8, pp. 116-115, Aug. 2010.
[27] T. Hornyak. "roomba pac-Man: Classic
game gets robot twist," CNET, Nov. 10,
2009; http://news.cnet.com/8301-17938_10510394057-1.html, accessed May 3, 2012.
[28] M.r. Calo, "Open robotics," Maryland Law Rev., vol. 70, no. 3, 2011; http://
papers.ssrn.com/sol3/papers.cfm?abstract_
id=1706293, accessed Oct. 15, 2012.
[29] Y-H Weng and S. Zhao, "The legal challenges of networked robotics: From the safety
intelligence perspective," presented at World
Congress on philosophy of Law and Social
philosophy, Special Workshop on AICOL,
Frankfurt am Main, Germany, Aug. 15, 2011;
http://works.bepress.com/cgi/viewcontent.
cgi?article=1018&context=weng_yueh_hsuan,
accessed Oct. 15, 2012.
IEEE TECHNOLOGY AND SOCIETY MAGAZINE
|
SprING 2013
[30] A. Goradia, N. Xi, and I.H. Elhaj.
"Internet based robots: Applications, impacts, challenges and future directions," in
Proc. 2005 IEEE Workshop on Advanced
Robotics and its Social Impacts, 2005,
pp. 73-78.
[31] T-H S. Li, et al. "An autonomous surveillance and security robot team," in Proc. IEEE
Workshop on Advanced Robotics and Its
Social Impacts, 2007, pp. 1-6.
[32] United Nations, "Globalization and its
impact on the full employment of all human
rights," in Society, Ethics, and Technology, by
Morton E. Winston and ralph D. Edelbach.
Thomson Wadsworth, 2006, pp. 196-207.
[33] T. Denning et al., "A spotlight on security and privacy risks with future household robots: Attacks and lessons," in Proc.
11th Int. Conf. on Ubiquitous Computing
(UbiComp '09), Sept. 30-Oct. 3, 2009; http://
www.cs.washington.edu/homes/tdenning/
files/papers/ubicomp_robots_authors_copy.
pdf, accessed May 3, 2012.
[34] B. Christensen, "Wii hacked to control
sword-wielding robot," Live Science, Feb. 2,
2007; http://www.livescience.com/technology/
070202_technov_wiibot.html, accessed May 3,
2012.
[35] p. Marks, "Wii and iphone to help
military control freaks," New Scientist,
Mar. 27, 2008; http://www.newscientist.com/
article/mg19726495.800-wii-and-iphonet o - h el p - m i l it a r y- c o n t r ol -f r e a k s . h t m l ,
accessed May 3, 2012.
[36] M. Clayton, "Stuxnet spyware targets
industrial facilities, via USB memory stick,"
CSM, July 23, 2010; http://www.csmonitor.com/USA/2010/0723/Stuxnet-spywaretargets-industrial-facilities-via-USB-memorystick, accessed Mar. 12, 2012.
[37] C. perrow, "Fukushima and the inevitability of accidents, Bulletin of the Atomic
Scientists, vol. 67, no. 6, pp. 44-52, 2011.
[38] C. perrow, The Next Catastrophe: Reducing Our Vulnerabilities to Natural, Industrial,
and Terrorist Disasters. princeton, NJ: princeton Univ. press, 2011.
[39] V. Madani and D. Novosel, "Getting
a grip on the grid," IEEE Spectrum,
Dec. 2005; http://spectrum.ieee.org/energy/
the-smarter-grid/getting-a-grip-on-the-grid,
accessed Mar. 21, 2012.
[40] r.E. Spier, "'Dual use' and 'intentionality': Seeking to prevent the manifestation of
deliberately harmful objectives," Science and
Engineering Ethics, 2009.
[41] E.M. Davidson, r. Frothingham, and r.
Cook-Deegan, "practical experiences in dual
use review," Science, vol. 316, pp. 1432-1433,
2007.
[42] Association for Computing Machinery,
ACM Code of Ethics and Professional Conduct, Oct. 16, 1992; http://www.acm.org/
about/code-of-ethics, accessed Mar. 21, 2012.
[43] K. Anderson, The Robotic Kindness
of Strangers, 2009; http://www.volokh.com/
2009/11/18/robotic_kindnessstrangers/, accessed Sept. 14, 2012.
[44] r. Calo, Robotics & The Law: Liability
For Personal Robots, 2009; http://cyberlaw.
stanford.edu/node/6365, accessed Sept. 14,
2012.
[45] G.E. Marchant and L.L. pope, "The problems with forbidding Science," Science and
Engineering Ethics, 2009.
|
65
http://www
http://www.kxan.com/dpp/news/road_signs_warn_of_
http://www.Wired.com
http://www
http://www.wired.com/science/discoveries/news/2005/
http://www.wired.com/
http://www.wired
http://http://
http://www.cs.washington.edu/homes/tdenning/
http://www.livescience.com/technology/
http://www.newscientist.com/
http://news
http://www.cnet.com/New-peace-virus-infects-Excel/
http://www.csmoni
http://www.tor.com/USA/2010/0723/Stuxnet-spyware
http://www
http://www.online.wsj
http://www.interacademies.net/File.aspx?id=5401
http://www.itworld.com/security/84742/
http://www.nih.gov/about/director/
http://www
http://www.imes.com/2009/11/13/opinion/13iht
http://spectrum.ieee.org/energy/
http://http://
http://www.geinvestigations.com/blog/tag/dns-changer/
http://www.reuters.com/article/latestCrisis/
http://http://
http://www.infosecisland.com/blogview/20612
http://news.cnet.com/8301-17938_105
http://www.news.bbc
http://www.co.uk/2/hi/technology/8147534.stm
http://www.acm.org/
http://http://
http://papers.ssrn.com/sol3/papers.cfm?abstract_
http://www.volokh.com/
http://www.newscientist
http://cyberlaw
http://www.stanford.edu/node/6365
http://abcnews.go.com/blogs/technology/
http://works.bepress.com/cgi/viewcontent
Table of Contents for the Digital Edition of IEEE Technology and Society Magazine - Spring 2013
IEEE Technology and Society Magazine - Spring 2013 - Cover1
IEEE Technology and Society Magazine - Spring 2013 - Cover2
IEEE Technology and Society Magazine - Spring 2013 - 1
IEEE Technology and Society Magazine - Spring 2013 - 2
IEEE Technology and Society Magazine - Spring 2013 - 3
IEEE Technology and Society Magazine - Spring 2013 - 4
IEEE Technology and Society Magazine - Spring 2013 - 5
IEEE Technology and Society Magazine - Spring 2013 - 6
IEEE Technology and Society Magazine - Spring 2013 - 7
IEEE Technology and Society Magazine - Spring 2013 - 8
IEEE Technology and Society Magazine - Spring 2013 - 9
IEEE Technology and Society Magazine - Spring 2013 - 10
IEEE Technology and Society Magazine - Spring 2013 - 11
IEEE Technology and Society Magazine - Spring 2013 - 12
IEEE Technology and Society Magazine - Spring 2013 - 13
IEEE Technology and Society Magazine - Spring 2013 - 14
IEEE Technology and Society Magazine - Spring 2013 - 15
IEEE Technology and Society Magazine - Spring 2013 - 16
IEEE Technology and Society Magazine - Spring 2013 - 17
IEEE Technology and Society Magazine - Spring 2013 - 18
IEEE Technology and Society Magazine - Spring 2013 - 19
IEEE Technology and Society Magazine - Spring 2013 - 20
IEEE Technology and Society Magazine - Spring 2013 - 21
IEEE Technology and Society Magazine - Spring 2013 - 22
IEEE Technology and Society Magazine - Spring 2013 - 23
IEEE Technology and Society Magazine - Spring 2013 - 24
IEEE Technology and Society Magazine - Spring 2013 - 25
IEEE Technology and Society Magazine - Spring 2013 - 26
IEEE Technology and Society Magazine - Spring 2013 - 27
IEEE Technology and Society Magazine - Spring 2013 - 28
IEEE Technology and Society Magazine - Spring 2013 - 29
IEEE Technology and Society Magazine - Spring 2013 - 30
IEEE Technology and Society Magazine - Spring 2013 - 31
IEEE Technology and Society Magazine - Spring 2013 - 32
IEEE Technology and Society Magazine - Spring 2013 - 33
IEEE Technology and Society Magazine - Spring 2013 - 34
IEEE Technology and Society Magazine - Spring 2013 - 35
IEEE Technology and Society Magazine - Spring 2013 - 36
IEEE Technology and Society Magazine - Spring 2013 - 37
IEEE Technology and Society Magazine - Spring 2013 - 38
IEEE Technology and Society Magazine - Spring 2013 - 39
IEEE Technology and Society Magazine - Spring 2013 - 40
IEEE Technology and Society Magazine - Spring 2013 - 41
IEEE Technology and Society Magazine - Spring 2013 - 42
IEEE Technology and Society Magazine - Spring 2013 - 43
IEEE Technology and Society Magazine - Spring 2013 - 44
IEEE Technology and Society Magazine - Spring 2013 - 45
IEEE Technology and Society Magazine - Spring 2013 - 46
IEEE Technology and Society Magazine - Spring 2013 - 47
IEEE Technology and Society Magazine - Spring 2013 - 48
IEEE Technology and Society Magazine - Spring 2013 - 49
IEEE Technology and Society Magazine - Spring 2013 - 50
IEEE Technology and Society Magazine - Spring 2013 - 51
IEEE Technology and Society Magazine - Spring 2013 - 52
IEEE Technology and Society Magazine - Spring 2013 - 53
IEEE Technology and Society Magazine - Spring 2013 - 54
IEEE Technology and Society Magazine - Spring 2013 - 55
IEEE Technology and Society Magazine - Spring 2013 - 56
IEEE Technology and Society Magazine - Spring 2013 - 57
IEEE Technology and Society Magazine - Spring 2013 - 58
IEEE Technology and Society Magazine - Spring 2013 - 59
IEEE Technology and Society Magazine - Spring 2013 - 60
IEEE Technology and Society Magazine - Spring 2013 - 61
IEEE Technology and Society Magazine - Spring 2013 - 62
IEEE Technology and Society Magazine - Spring 2013 - 63
IEEE Technology and Society Magazine - Spring 2013 - 64
IEEE Technology and Society Magazine - Spring 2013 - 65
IEEE Technology and Society Magazine - Spring 2013 - 66
IEEE Technology and Society Magazine - Spring 2013 - 67
IEEE Technology and Society Magazine - Spring 2013 - 68
IEEE Technology and Society Magazine - Spring 2013 - 69
IEEE Technology and Society Magazine - Spring 2013 - 70
IEEE Technology and Society Magazine - Spring 2013 - 71
IEEE Technology and Society Magazine - Spring 2013 - 72
IEEE Technology and Society Magazine - Spring 2013 - 73
IEEE Technology and Society Magazine - Spring 2013 - 74
IEEE Technology and Society Magazine - Spring 2013 - 75
IEEE Technology and Society Magazine - Spring 2013 - 76
IEEE Technology and Society Magazine - Spring 2013 - 77
IEEE Technology and Society Magazine - Spring 2013 - 78
IEEE Technology and Society Magazine - Spring 2013 - 79
IEEE Technology and Society Magazine - Spring 2013 - 80
IEEE Technology and Society Magazine - Spring 2013 - Cover3
IEEE Technology and Society Magazine - Spring 2013 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2013
https://www.nxtbookmedia.com