skip to main content
10.1145/3316615.3316627acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicscaConference Proceedingsconference-collections
research-article
Open Access

Artificial Intelligence Legal Policy: Limits of Use of Some Kinds of AI

Published:19 February 2019Publication History

ABSTRACT

The paper is devoted to analysis of legal issues concerned to development of AI technologies. The main question here: should governments develop rules regulating use of artificial intelligence and a system of licensing like with automobile transport or ban some types of AI? Comprehension of the current and future legal framework is very important. First of all, law is used to govern a society. It implies that examining AI from legal point of view allows to realize what challenges to social security are caused by expansive introduction of autonomous systems. Secondly, for developer of high technology products it is easier to decide what products should not be invested to since they may lead to negative legal consequences.

References

  1. Celli, F., Bruni, E., Lepri, B. 2014. Automatic personality and interaction style recognition from Facebook profile pictures. In Proceedings of the 2014 ACM Conference on Multimedia, 2014. 1101--1104 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Corruption, drug trafficking and other serious crimes (confiscation of benefits) act, (Chapter 65a), Singapore, https://sso.agc.gov.sg/Act/CDTOSCCBA1992Google ScholarGoogle Scholar
  3. Criminal Law of the People's Republic of China, Section 7: crimes of smuggling, trafficking in, transporting and manufacturing narcotic drugs, http://www.fmprc.gov.cn/ce/cgvienna/eng/dbtyw/jdwt/crimelaw/t209043.htm.Google ScholarGoogle Scholar
  4. Criminal Code of the Russian Federation, Articles 228--234, http://www.wipo.int/edocs/lexdocs/laws/en/ru/ru080en.pdf.Google ScholarGoogle Scholar
  5. Kaur, A. 2018. Automatic personality assessment in the wild. In 2017 7th International Conference on Affective Computing and Intelligent Interaction, ACII 2017, Volume 2018-January, 29 January 2018, 586--590Google ScholarGoogle Scholar
  6. Ke, X., Zhu, Y., Wen, L., Zhang, W. 2018. Speech emotion recognition based on SVM and ANN. International Journal of Machine Learning and Computing, 8(3), 198--202.Google ScholarGoogle Scholar
  7. Khalil, A., Hajjdiab, H., Al-Qirim, N. 2017. Detecting fake followers in twitter: A machine learning approach. International Journal of Machine Learning and Computing. 7(6), 198--202.Google ScholarGoogle ScholarCross RefCross Ref
  8. Kosinski, M., Wang, Y. 2018. Deep neural networks are more accurate than humans at detecting sexual orientation from facial images. Journal of Personality and Social Psychology, 2018. 114(2), 246--257Google ScholarGoogle Scholar
  9. Lay, A., Ferwerda, B. 2018. Predicting users' personality based on their 'liked' images on Instagram. In CEUR Workshop Proceedings, Volume 2068, 2018, 2018 Joint ACM IUI Workshops, ACMIUI-WS 2018.Google ScholarGoogle Scholar
  10. Sharkey, N. Killing Made Easy: From Joysticks to Politics in P.Lin, K. Abney and G. A. Bekey (eds.) 2012. Robot Ethics: The Ethical and Social Implications of Robotics, MIT Press, London, 2012.Google ScholarGoogle Scholar
  11. Van der Sloot, B. 2018 A new approach to the right to privacy, or how the European Court of Human Rights embraced the non-domination principle. Computer Law and Security Review, 2018. 34(3), 539--549Google ScholarGoogle Scholar
  12. Vernick, J.S. 2013. Carrying Guns in Public: Legal and Public Health Implications. Journal of Law, Medicine and Ethics, 2013. 41(SUPPL. 1)Google ScholarGoogle Scholar
  13. Violent Crime Control and Law Enforcement Act of 1994 of the United States, http://legisworks.org/GPO/STATUTE-108-Pg1796.pdfGoogle ScholarGoogle Scholar
  14. U.S. Code, Title 18, Chapter 40 ---- «Importation, manufacture, distribution and storage of explosive materials», https://www.law.cornell.edu/uscode/text/18/part-I/chapter-40.Google ScholarGoogle Scholar
  15. Zhao, L, Jia, J., Feng, L. 2015. 'Teenagers' stress detection based on time-sensitive micro-blog comment/response actions. In Artificial Intelligence in Theory and Practice IV, 4th IFIP TC 12 International Conference on Artificial Intelligence, IFIP AI 2015, Held as Part of WCC 2015, Daejeon, South Korea, October 4-7, 2015, Proceedings. 26--35.Google ScholarGoogle Scholar
  16. Zhao, L., Li, Q., Xue, Y. 2017. Correlating stressor events for social network based adolescent stress prediction. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10177 LNCS, 642--658.Google ScholarGoogle Scholar

Index Terms

  1. Artificial Intelligence Legal Policy: Limits of Use of Some Kinds of AI

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ICSCA '19: Proceedings of the 2019 8th International Conference on Software and Computer Applications
            February 2019
            611 pages
            ISBN:9781450365734
            DOI:10.1145/3316615

            Copyright © 2019 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 19 February 2019

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader