The Ethical Robot
University of Connecticut (11/08/10) Christine Buckley; Bret Eckhardt
University of Connecticut professor Susan Anderson and University of Hartford computer scientist Michael Anderson have programmed a robot to behave ethically. Their work is part of a relatively new field of research known as machine ethics. "There are machines out there that are already doing things that have ethical import, such as automatic cash withdrawal machines, and many others in the development stages, such as cars that can drive themselves and eldercare robots," says Susan Anderson. Machine ethics combines artificial intelligence with ethical theory to determine how to program machines to behave ethically. The robot, called Nao, is programmed with an ethical principle that determines how often to remind people to take their medicine and when to notify a doctor when they do not comply. "We should think about the things that robots could do for us if they had ethics inside them," says Michael Anderson. Interacting with robots that have been programmed to behave ethically could inspire humans to behave more ethically, says Susan Anderson.
Monday, November 8, 2010
Blog: The Ethical Robot
Subscribe to:
Post Comments (Atom)
Blog Archive
-
►
2012
(35)
- ► April 2012 (13)
- ► March 2012 (16)
- ► February 2012 (3)
- ► January 2012 (3)
-
►
2011
(118)
- ► December 2011 (9)
- ► November 2011 (11)
- ► October 2011 (7)
- ► September 2011 (13)
- ► August 2011 (7)
- ► April 2011 (8)
- ► March 2011 (11)
- ► February 2011 (12)
- ► January 2011 (15)
-
▼
2010
(183)
- ► December 2010 (16)
-
▼
November 2010
(15)
- Blog: IBM Chip Breakthrough May Lead to Exascale S...
- Blog: ECS Researcher Highlights Need for Transpare...
- Blog: 'Chaogates' Hold Promise for the Semiconduct...
- Blog: Rensselaer Team Shows How to Analyze Raw Gov...
- Blog: Time to blow up best practices myths
- Blog: Rats to Robots--Brain's Grid Cells Tell Us H...
- Blog: Algorithm Pioneer Wins Kyoto Prize
- Blog: The Ethical Robot
- Blog: Part Moth, Part Machine: Cyborgs Are on the ...
- Blog: Gartner Report: The Future of Information Se...
- Blog: Metasploit and SCADA exploits: dawn of a new...
- Blog: The bigger the system, the greater the chanc...
- Blog: New Google Tool Makes Websites Twice as Fast
- Blog: A Software Application Recognizes Human Emot...
- Blog: New Help on Testing for Common Cause of Soft...
- ► October 2010 (15)
- ► September 2010 (25)
- ► August 2010 (19)
- ► April 2010 (21)
- ► March 2010 (7)
- ► February 2010 (6)
- ► January 2010 (6)
-
►
2009
(120)
- ► December 2009 (5)
- ► November 2009 (12)
- ► October 2009 (2)
- ► September 2009 (3)
- ► August 2009 (16)
- ► April 2009 (4)
- ► March 2009 (20)
- ► February 2009 (9)
- ► January 2009 (19)
-
►
2008
(139)
- ► December 2008 (15)
- ► November 2008 (16)
- ► October 2008 (17)
- ► September 2008 (2)
- ► August 2008 (2)
- ► April 2008 (12)
- ► March 2008 (25)
- ► February 2008 (16)
- ► January 2008 (6)
-
►
2007
(17)
- ► December 2007 (4)
- ► November 2007 (4)
- ► October 2007 (7)
Blog Labels
- research
- CSE
- security
- software
- web
- AI
- development
- hardware
- algorithm
- hackers
- medical
- machine learning
- robotics
- data-mining
- semantic web
- quantum computing
- Cloud computing
- cryptography
- network
- EMR
- search
- NP-complete
- linguistics
- complexity
- data clustering
- optimization
- parallel
- performance
- social network
- HIPAA
- accessibility
- biometrics
- connectionist
- cyber security
- passwords
- voting
- XML
- biological computing
- neural network
- user interface
- DNS
- access control
- firewall
- graph theory
- grid computing
- identity theft
- project management
- role-based
- HTML5
- NLP
- NoSQL
- Python
- cell phone
- database
- java
- open-source
- spam
- GENI
- Javascript
- SQL-Injection
- Wikipedia
- agile
- analog computing
- archives
- biological
- bots
- cellular automata
- computer tips
- crowdsourcing
- e-book
- equilibrium
- game theory
- genetic algorithm
- green tech
- mobile
- nonlinear
- p
- phone
- prediction
- privacy
- self-book publishing
- simulation
- testing
- virtual server
- visualization
- wireless
No comments:
Post a Comment