W15 Edia 2016

Total Page:16

File Type:pdf, Size:1020Kb

W15 Edia 2016 Proceedings of the 1st Workshop on Ethics in the Design of Intelligent Agents (EDIA) 2016 Gregory´ Bonnet, Maaike Harbers, Koen Hindriks, Mike Katell, Catherine Tessier (eds.) Workshop co-located with the 22th European Conference on Artificial Intelligence (ECAI 2016) August 30th 2016, The Hague, Holland Preface Gregory´ Bonnet∗ Maaike Harbers† Koen Hindriks‡ Mike Katell§ Catherine Tessier¶ The development of Artificial Intelligence is experiencing a fruitful period of incredible progress and inno- vation. After decades of notable successes and disappointing failures, AI is now poised to emerge in the public sphere and completely transform human society, altering how we work, how we interact with each other and our environments, and how we perceive the world. Designers have already begun implementing AI that enables machines to learn new skills and make decisions in increasingly complex situations. The result is that these machines - also called intelligent agents - decide, act and interact in shared and dynamic environments under domain constraints, where they may interact with other agents and human beings to share tasks or execute tasks on behalf of others. Search engines, self-driving cars, electronic markets, smart homes, military technology, software for big data analysis, and care robots are just a few examples. As intelligent agents gain increased autonomy in their functioning, human supervision by operators or users decreases. As the scope of the agents activities broadens, it is imperative to ensure that such socio-technical systems will not make irrelevant, counter-productive, or even dangerous decisions. Even if regulation and control mechanisms are designed to ensure sound and consistent behaviors at the agent, multi-agent, and human- agent level, ethical issues are likely to remain quite complex, implicating a wide variety of human values, moral questions, and ethical principles. The issue is all the more important as intelligent agents encounter new situations, evolve in open environments, interact with other agents based on different design principles, act on behalf of human beings and share common resources. To address these concerns, design approaches should envision and account for important human values, such as safety, privacy, accountability and sustainability, and designers will have to make value trade-offs and plan for moral conflicts. For instance, we may want to design self-driving cars to exhibit human-like driving behaviors, rather than precisely following road rules, so that their actions are more predictable for other road users. This may require balancing deontic rule-following, utility maximization, and risk assessment in the agent’s logic to achieve the ultimate goal of road safety. Questions to be asked here are: How should we encode moral behavior into intelligent agents? Which ethical systems should we use to design intelligent, decision-making machines? Should end-users have ultimate control over the moral character of their devices? Should an intelligent agent be permitted to take over control from a human operator? If so, under what circumstances? Should an intelligent agent trust or cooperate with another agent embedded with other ethical principles or moral values? To what extent should society hold AI researchers and designers responsible for their creations and choices? This workshop focuses on two questions: (1) what kind of formal organizations, norms, policy models, and logical frameworks can be proposed to deal with the control of agents’ autonomous behaviors in a moral way?; and (2) what does it mean to be responsible designers of intelligent agents? The workshop welcomes contributions from researchers in Artificial Intelligence, Multi-Agent Systems, Machine Learning, Case-based reasoning, Value-based argumentations, AI and Law, Ontologies, Human Computer Interaction, Ethics, Philos- ophy, and related fields. The topics of interest include (but are not limited to): machine ethics, roboethics, machines and human dignity • reasoning mechanisms, legal reasoning, ethical engine • ∗University of Caen Normandy, UMR CNRS 6072 GREYC, France, email: [email protected] †Delft University, Interactive Intelligence Group, The Netherlands, email: [email protected] ‡Delft University, Interactive Intelligence Group, The Netherlands, email: [email protected] §University of Washington, Information School, USA, email: [email protected] ¶Onera, France, email: [email protected] 2 authority sharing, responsibility, delegating decision making to machines • organizations, institutions, normative systems • computational justice, social models • trust and reputation models • mutual intelligibility, explanations, accountability • consistency, conflicts management, validation • philosophy, sociology, law • applications, use cases • societal concerns, responsible innovation, privacy Issues • individual ethics, collective ethics, ethics of personalization • value sensitive design, human values, value theory • Ten papers were submitted to EDIA, nine of them have been accepted for presentation after being reviewed by three or four members of the Program Committee. The accepted papers have been organized in two sessions: 1. Ethical issues and ethical application of intelligent agents (four papers) 2. Ethical models of intelligent agents (five papers) The EDIA workshop would not have been possible without the support of many people. First of all, we would like to thank the members of the Program Committee for providing timely and thorough reviews of the papers submitted for the EDIA Workshop. We are also very grateful to all of the authors who submitted papers. We would also like to thank Bertram Malle and Jeremy Pitt for accepting the invitation to give a talk at the workshop. We also thank the organizers of ECAI 2016. 3 Program committee Huib Aldewereld, Delft University of Technology, The Netherlands • Mark Alfano, Delft University of Technology, The Netherlands • Peter Asaro, The New School, USA • Olivier Boissier, Mines Saint-Etienne, France • Tibor Bosse, Vrije Universiteit Amsterdam, The Netherlands • Gauvain Bourgne, Universit Pierre et Marie Curie, France • Selmer Bringsjord, Rensselear Polytechnic Institute, USA • Joanna Bryson, University of Bath, UK • Pompeu Casanovas, Royal Melbourne Institute of Technology, Melbourne, Australia • Nigel Crook, Oxford Brookes University, UK • Michal Dewyn, Ghent University, Belgium • Sjur Dyrkolbotn, Durham University and Utrecht University, UK and The Netherlands • Isabel Ferreira, University of Lisbon, Portugal • Jean-Gabriel Ganascia, Universit Pierre et Marie Curie, France • Pim Haselager, Radboud University, The Netherlands • Marilena Kyriakidou, Coventry University, UK • Bertram Malle, Brown University, USA • Pablo Noriega, Intitut d’Investigaci en Intelligncia Artificial Barcelona, Spain • Jeremy Pitt, Imperial College London, UK • Thomas Powers, Center for Science, Ethics and Public Policy, USA • Lambr Royakkers, Eindhoven University of Technology, The Netherlands • Giovanni Sartor, European University of Florence, Italy • Aimee van Wynsberghe, University of Twente, The Netherlands • Pieter Vermaas, Delft University of Technology, The Netherlands • Organization committee Gregory´ Bonnet, Normandy University, France • Maaike Harbers, Delft University of Technology, The Netherlands • Koen V. Hindriks, Delft University of Technology, The Netherlands • Michael A. Katell, University of Washington, USA • Catherine Tessier, Onera, France • 4 Contents Ethical Issues and Ethical Application of Intelligent Agents 5 MOOD: Massive Open Online Deliberation Platform. A Practical Application Ilse Verdiesen, Martijn Cligge, Jan Timmermans, Lennard Segers, Virginia Dignum and Jeroen van den Hoven ........................................... 5 Ethics in the Design of Automated Vehicles: the AVEthics project Ebru Dogan, Raja Chatila, Stephane Chauvier, Katherine Evans, Petria Hadjixenophontos and Jerome Perrin ............................................ 12 Processes of Reminding and Requesting in Supporting People with Special Needs: Human Practices as Basis for Modeling a Virtual Assistant? Antje Amrhein, Katharina Cyra and Karola Pitsch ......................... 18 What If: Robots Create Novel Goals? Ethics Based on Social Value Systems Matthias Rolf and Nigel Crook ................................... 24 Ethical Models of Intelligent Agents 28 Formal Verification of Ethical Properties in Multiagent Systems Bruno Mermet and Gaelle¨ Simon .................................. 28 Moral Systems of Agent Societies: Some Elements for their Analysis and Design Antonio Carlos Rocha Costa .................................... 34 Deontic Counteridenticals and the Design of Ethically Correct Intelligent Agents: First Steps Selmer Bringsjord, Rikhiya Ghosh and James Pane-Joyce ..................... 40 How Ethical Frameworks Answer to Ethical Dilemmas: Towards a Formal Model Vincent Bonnemains, Saurel Claire and Catherine Tessier ..................... 46 Multi-Agent Based Ethical Asset Management Nicolas Cointe, Gregory´ Bonnet and Olivier Boissier ....................... 54 5 MOOD: Massive Open Online Deliberation Platform A practical application Ilse Verdiesen and Martijn Cligge and Jan Timmermans and Lennard Segers and Virginia Dignum and Jeroen van den Hoven 1 Abstract. Nowadays, public debates often take place on social me- of both the majority as the minority into account, and therefore strive dia platforms like Facebook or Twitter and can be characterized as to be
Recommended publications
  • A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence ⋆
    A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence ? Bingsheng Zhang1, Roman Oliynykov2, and Hamed Balogun3 1 Lancaster University, UK [email protected] 2 Input Output Hong Kong Ltd. [email protected] 3 Lancaster University, UK [email protected] Abstract. A treasury system is a community controlled and decentralized collaborative decision- making mechanism for sustainable funding of the blockchain development and maintenance. During each treasury period, project proposals are submitted, discussed, and voted for; top-ranked projects are funded from the treasury. The Dash governance system is a real-world example of such kind of systems. In this work, we, for the first time, provide a rigorous study of the treasury system. We modelled, designed, and implemented a provably secure treasury system that is compatible with most existing blockchain infrastructures, such as Bitcoin, Ethereum, etc. More specifically, the proposed treasury system supports liquid democracy/delegative voting for better collaborative intelligence. Namely, the stake holders can either vote directly on the proposed projects or delegate their votes to experts. Its core component is a distributed universally composable secure end-to-end verifiable voting protocol. The integrity of the treasury voting decisions is guaranteed even when all the voting committee members are corrupted. To further improve efficiency, we proposed the world's first honest verifier zero-knowledge proof for unit vector encryption with logarithmic size communication. This partial result may be of independent interest to other cryptographic protocols. A pilot system is implemented in Scala over the Scorex 2.0 framework, and its benchmark results indicate that the proposed system can support tens of thousands of treasury participants with high efficiency.
    [Show full text]
  • VALLATH NANDAKUMAR 3105 Eaneswood Dr, Austin, TX 78746 (512)-923-9658 (Cell); [email protected]
    VALLATH NANDAKUMAR 3105 Eaneswood Dr, Austin, TX 78746 (512)-923-9658 (Cell); [email protected] EDUCATION • 1990 University of California, Berkeley, CA Ph.D. in Electrical Engineering. • 1985 University of California Berkeley, CA M.S. in Electrical Engineering. • 1982 Indian Institute of Technology, Madras, India BTech in Electrical Engineering (Electronics). EXPERIENCE • Teaching in the ECE and CS Department at the University of Texas, Austin (5 years) o C, C++, Java programming, Algorithm Design • Taught course modules at the graduate level in cell phone technology, VLSI testing, VLSI design, Internet hardware, technical writing, physics. (5 years) • Research and development activities in superconducting electronics, high-end optical communication, integrated circuit design methodologies, Computer-Aided Design tools, and cyber security software. • Published 6+ papers in IEEE journals on superconducting electronics. • Six patents granted in VLSI and superconductors. • Managed teams of 30+ people spanning multiple countries. • Have conducted computer programming contests with 400+ student participants from all over Asia coming together. EMPLOYMENT HISTORY AND EXPERIENCE Aug. 2013-Present Full-time Lecturer in the Departments of Computer Science, and Electrical and Computer Engineering, University of Texas, Austin • Courses taught: Algorithms, basic and advanced programming, Ethics of Computer Science, Writing for CS majors • Texas University Interscholastic League Director for Computer Science, 2013-2014. Mar 2012-Jun 2013 Substitute Teacher, Eanes Independent School District, Austin, TX • Substitute teacher for grades K-12 and all subjects. Mar 2012-Jun 2013 Tutor, Austin Community College, Austin, TX • Taught Algebra and Calculus, Business Economics, Statistics, Physics, English, German. Oct 2006-Jun 2013 Professor/Adjunct Professor, Amrita University, Amritapuri Campus, India (http://www.amrita.edu) • Director of Center of Excellence in Cyber Security • Taught courses in VLSI architecture, design and testing, and on Wireless systems.
    [Show full text]
  • Game Theory and Democracy Homework Problems
    Game Theory and Democracy Homework Problems PAGE 82 Challenge Problem: Show that any voting model (such as the Unit Interval Model or the Unit Square Model) which has a point symmetry always has a Condorcet winner for every election, namely the candidate who is closest to the point of symmetry! PAGE 93 Exercise: Show that if there are not any cycles of any length in the preferences of the voters, then there must be a Condorcet winner. (Don’t worry about making your proof rigorous, just convince yourself of this fact, to the point you could clearly explain your ideas to someone else.) PAGE 105 Exercise: Prove that the strongest chain strength of a chain from Candidate Y to Candidate X is 3. (If you can convince a skeptical friend that it is true, then that is a proof.) Exercise: Prove that it is never necessary to use a candidate more than once to find a chain with the strongest chain strength between two candidates. Hint: Show that whenever there is a loop, like the one shown in red Y (7) Z (3) W (9) Y (7) Z (3) W (11) X, we can consider a shortened chain by simply deleting the red loop Y (7) Z (3) W (11) X which is at least as strong as the original loop. Exercises: Prove that all of the chains above are in fact strongest chains, as claimed. Hint: The next figure, which has all of the information of the margin of victory matrix, will be useful, and is the type of figure you may choose to draw for yourself for other elections, from time to time.
    [Show full text]
  • Computational Perspectives on Democracy
    Computational Perspectives on Democracy Anson Kahng CMU-CS-21-126 August 2021 Computer Science Department School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Thesis Committee: Ariel Procaccia (Chair) Chinmay Kulkarni Nihar Shah Vincent Conitzer (Duke University) David Pennock (Rutgers University) Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Copyright c 2021 Anson Kahng This research was sponsored by the National Science Foundation under grant numbers IIS-1350598, CCF- 1525932, and IIS-1714140, the Department of Defense under grant number W911NF1320045, the Office of Naval Research under grant number N000141712428, and the JP Morgan Research grant. The views and conclusions contained in this document are those of the author and should not be interpreted as representing the official policies, either expressed or implied, of any sponsoring institution, the U.S. government or any other entity. Keywords: Computational Social Choice, Theoretical Computer Science, Artificial Intelligence For Grandpa and Harabeoji. iv Abstract Democracy is a natural approach to large-scale decision-making that allows people affected by a potential decision to provide input about the outcome. However, modern implementations of democracy are based on outdated infor- mation technology and must adapt to the changing technological landscape. This thesis explores the relationship between computer science and democracy, which is, crucially, a two-way street—just as principles from computer science can be used to analyze and design democratic paradigms, ideas from democracy can be used to solve hard problems in computer science. Question 1: What can computer science do for democracy? To explore this first question, we examine the theoretical foundations of three democratic paradigms: liquid democracy, participatory budgeting, and multiwinner elections.
    [Show full text]
  • An Optimal Single-Winner Preferential Voting System Based on Game Theory∗
    An Optimal Single-Winner Preferential Voting System Based on Game Theory∗ Ronald L. Rivest and Emily Shen Abstract • The election winner is determined by a random- ized method, based for example on the use of We present an optimal single-winner preferential vot- ten-sided dice, that picks outcome x with prob- ing system, called the \GT method" because of its in- ability p∗(x). If there is a Condorcet winner x, teresting use of symmetric two-person zero-sum game then p∗(x) = 1, and no dice are needed. We theory to determine the winner. Game theory is not also briefly discuss a deterministic variant of GT, used to describe voting as a multi-player game be- which we call GTD. tween voters, but rather to define when one voting system is better than another one. The cast ballots The GT system, essentially by definition, is opti- determine the payoff matrix, and optimal play corre- mal: no other voting system can produce election sponds to picking winners optimally. outcomes that are liked better by the voters, on the The GT method is quite simple and elegant, and average, than those of the GT system. We also look works as follows: at whether the GT system has several standard prop- erties, such as monotonicity, consistency, etc. • Voters cast ballots listing their rank-order pref- The GT system is not only theoretically interest- erences of the alternatives. ing and optimal, but simple to use in practice; it is probably easier to implement than, say, IRV. We feel • The margin matrix M is computed so that for that it can be recommended for practical use.
    [Show full text]
  • Selecting the Runoff Pair
    Selecting the runoff pair James Green-Armytage New Jersey State Treasury Trenton, NJ 08625 [email protected] T. Nicolaus Tideman Department of Economics, Virginia Polytechnic Institute and State University Blacksburg, VA 24061 [email protected] This version: May 9, 2019 Accepted for publication in Public Choice on May 27, 2019 Abstract: Although two-round voting procedures are common, the theoretical voting literature rarely discusses any such rules beyond the traditional plurality runoff rule. Therefore, using four criteria in conjunction with two data-generating processes, we define and evaluate nine “runoff pair selection rules” that comprise two rounds of voting, two candidates in the second round, and a single final winner. The four criteria are: social utility from the expected runoff winner (UEW), social utility from the expected runoff loser (UEL), representativeness of the runoff pair (Rep), and resistance to strategy (RS). We examine three rules from each of three categories: plurality rules, utilitarian rules and Condorcet rules. We find that the utilitarian rules provide relatively high UEW and UEL, but low Rep and RS. Conversely, the plurality rules provide high Rep and RS, but low UEW and UEL. Finally, the Condorcet rules provide high UEW, high RS, and a combination of UEL and Rep that depends which Condorcet rule is used. JEL Classification Codes: D71, D72 Keywords: Runoff election, two-round system, Condorcet, Hare, Borda, approval voting, single transferable vote, CPO-STV. We are grateful to those who commented on an earlier draft of this paper at the 2018 Public Choice Society conference. 2 1. Introduction Voting theory is concerned primarily with evaluating rules for choosing a single winner, based on a single round of voting.
    [Show full text]
  • Chapter 3 Voting Systems
    Chapter 3 Voting Systems 3.1 Introduction We rank everything. We rank movies, bands, songs, racing cars, politicians, professors, sports teams, the plays of the day. We want to know “who’s number one?” and who isn't. As a lo- cal sports writer put it, “Rankings don't mean anything. Coaches continually stress that fact. They're right, of course, but nobody listens. You know why, don't you? People love polls. They absolutely love ’em” (Woodling, December 24, 2004, p. 3C). Some rankings are just for fun, but people at the top sometimes stand to make a lot of money. A study of films released in the late 1970s and 1980s found that, if a film is one of the 5 finalists for the Best Picture Oscar at the Academy Awards, the publicity generated (on average) generates about $5.5 mil- lion in additional box office revenue. Winners make, on average, $14.7 million in additional revenue (Nelson et al., 2001). In today's inflated dollars, the figures would no doubt be higher. Actors and directors who are nominated (and who win) should expect to reap rewards as well, since the producers of new films are eager to hire Oscar-winners. This chapter is about the procedures that are used to decide who wins and who loses. De- veloping a ranking can be a tricky business. Political scientists have, for centuries, wrestled with the problem of collecting votes and moulding an overall ranking. To the surprise of un- 1 CHAPTER 3. VOTING SYSTEMS 2 dergraduate students in both mathematics and political science, mathematical concepts are at the forefront in the political analysis of voting procedures.
    [Show full text]
  • Math in Society
    Math in Society Edition 1.1 Revision 3 Contents Voting Theory . 1 David Lippman Weighted Voting . 19 David Lippman Fair Division . 31 David Lippman Graph Theory . 49 David Lippman Scheduling . 79 David Lippman Growth Models . 95 David Lippman Finance . 111 David Lippman Statistics . 131 David Lippman, Jeff Eldridge, onlinestatbook.com Describing Data . 143 David Lippman, Jeff Eldridge, onlinestatbook.com Historical Counting Systems . 167 Lawrence Morales Solutions to Selected Exercises . 201 David Lippman Pierce College Ft Steilacoom Copyright © 2010 David Lippman This book was edited by David Lippman, Pierce College Ft Steilacoom Development of this book was supported, in part, by the Transition Math Project Statistics and Describing Data contain portions derived from works by: Jeff Eldridge, Edmonds Community College (used under CC-BY-SA license) www.onlinestatbook.com (used under public domain declaration) Historical Counting Systems derived from work by: Lawrence Morales, Seattle Central Community College (used under CC-BY-SA license) Front cover photo: Jan Tik, http://www.flickr.com/photos/jantik/, CC-BY 2.0 This text is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/3.0/us/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA. You are free: to Share — to copy, distribute, display, and perform the work to Remix — to make derivative works Under the following conditions: Attribution. You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work).
    [Show full text]
  • How to Enhance Democracy?
    What is democracy? Towards a global democracy Democratic allocation of money Original voting systems E-democracy References How to enhance democracy? Adrien Fabre Paris School of Economics 11/2015 Adrien Fabre How to enhance democracy? What is democracy? Towards a global democracy Democratic allocation of money Original voting systems E-democracy References Contents 1 What is democracy? 2 Towards a global democracy 3 Democratic allocation of money 4 Original voting systems 5 E-democracy Adrien Fabre How to enhance democracy? What is democracy? Towards a global democracy Democratic allocation of money Original voting systems E-democracy References Denitions Democracy is a political regime such that : - the necessary conditions for well-being are insured for all - each person has the same power of decision on issues that matter for them, where the necessary conditions for well-being are the ability to have access to: - drinkable water, food, health-care - a healthy environment, security, housing - attention, an education, information Adrien Fabre How to enhance democracy? What is democracy? Towards a global democracy Subsidiarity Democratic allocation of money Some insights for a global governance Original voting systems What could a global governance enact? E-democracy References Denition Subsidiarity is the idea that a central authority should have a subsidiary function, performing only those tasks which cannot be performed eectively at a more immediate or local level. Subsidiarity principle reveals us that some stakes must be decided at the international scale, notably: ght and adaptation to the climate change regulation of nancial markets and the monetary system allocation of non renewable resources ght of poverty Adrien Fabre How to enhance democracy? What is democracy? Towards a global democracy Subsidiarity Democratic allocation of money Some insights for a global governance Original voting systems What could a global governance enact? E-democracy References A global governance should be inclusive, i.e.
    [Show full text]
  • Computing the Schulze Method for Large-Scale Preference Data Sets
    Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence (IJCAI-18) Computing the Schulze Method for Large-Scale Preference Data Sets Theresa Csar, Martin Lackner, Reinhard Pichler TU Wien, Austria fcsar, lackner, [email protected] Abstract nificant popularity and is widely used in group decisions of open-source projects and political groups2. The Schulze method is a voting rule widely used in Preference aggregation is often a computationally chal- practice and enjoys many positive axiomatic prop- lenging problem. It is therefore fortunate that the Schulze erties. While it is computable in polynomial time, method can be computed in polynomial time. More precisely, its straight-forward implementation does not scale given preference rankings of n voters over m candidates, it re- well for large elections. In this paper, we de- quires O(nm2 + m3) time to compute the output ranking of velop a highly optimised algorithm for computing all m candidates. However, while this runtime is clearly fea- the Schulze method with Pregel, a framework for sible for decision making in small- or medium sized groups, massively parallel computation of graph problems, it does not scale well for a larger number of candidates due and demonstrate its applicability for large prefer- to the cubic exponent. Instances with a huge number of alter- ence data sets. In addition, our theoretic analy- natives occur in particular in technical settings, such as pref- sis shows that the Schulze method is indeed par- erence data collected by e-commerce applications or sensor ticularly well-suited for parallel computation, in systems. If the number of alternatives is in the thousands, the stark contrast to the related ranked pairs method.
    [Show full text]
  • 2RS, See Two-Round System Accessibility, 4, 5, 26, 74, 76, 77
    Index 2RS, see Two-Round System Audit Trail, 8, 11, 12, 14, 27, 46, 58, 210, 211, 276, 327, 328, 330, 386, Accessibility, 4, 5, 26, 74, 76, 77, 151, 393 152, 181, 216, 241, 337, 341, Auditability, 4, 11, 27, 46, 313, 390 379, 387, 390, 391 Auditor, 7, 13, 67, 113, 122, 123, 125, Accountability, 7, 15, 58, 89, 100, 180, 127, 257–259, 266, 308, 319, 217, 300, 309, 313, 329, 338, 325, 369, 380, 398 342, 398 Australia, 54, 83, 84, 88, 89, 167, 169, AccuVote, 148, 151, 153 170, 187, 241, 313, 314, 335, AccuVote-OS, 151 336, 341 AccuVote-TS, 147, 148, 150, 151 AV, see Alternative Vote AccuVote-TSx, 147, 151 AV-net, see Anonymous Veto Network ACM, see Association for Computing AVC Advantage, 152 Machinery AVC Edge, 153, 154 Adder, 201 Advanced Voting Period, see Early Vot- Ballot Layout, see also Ballot Structure, ing 5, 60, 73, 391 Alternative Vote, 83 Ballot Secrecy, 146, 151, 160, 163, 179, Anonymous Veto Network, 346, 351, 244, 252, 260, 317 353–355 Ballot Structure, see also Ballot Layout, Aperio, 208, 210–212 80, 100 Approval Voting, 81, 91, 96, 99, 297, 298 BallotStation, 148, 149 Argentina, 54, 85, 156, 157 Bangladesh, 54 Armenia, 54 Barcelona, 72 Arrow’s Impossibility Theorem, 95, 96 Belgium, 54, 57, 59, 61, 68–70, 289, 357 Association for Computing Machinery, Benaloh Challenge, 288, 289, 301, 383 60, 204, 280 Bhutan, 54 Audiotegrity, 239, 241, 260, 263–266, Bingo Voting, 194, 195 277 Biometric, 71, 346 Black’s Method, 91 455 456 Index BlackBoxVoting, 148 Commission d’Accès aux Documents Block-Vote, 84, 85 Administratifs, 57 Boardroom
    [Show full text]
  • Programming for TV, Radio, and the Internet: Strategy, Development, and Evaluation
    Programming for TV, Radio, and the Internet: Strategy, Development, and Evaluation Philippe Perebinossoff Brian Gross Lynne S. Gross ELSEVIER Programming for TV, Radio, and the Internet Programming for TV, Radio, and the Internet Strategy, Development, and Evaluation Philippe Perebinossoff California State University, Fullerton Brian Gross EF Education, Jakarta, Indonesia Lynne S. Gross California State University, Fullerton AMSTERDAM · BOSTON · HEIDELBERG · LONDON NEW YORK · OXFORD · PARIS · SAN DIEGO SAN FRANCISCO · SINGAPORE · SYDNEY · TOKYO Focal Press is an imprint of Elsevier Acquisition Editor: Amy Jollymore Project Manager: Bonnie Falk Editorial Assistant: Cara Anderson Marketing Manager: Christine Degon Cover Design: Dardani Gasc Focal Press is an imprint of Elsevier 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA Linacre House, Jordan Hill, Oxford OX2 8DP, UK Copyright © 2005, Elsevier Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, e-mail: [email protected] may also complete your request on-line via the Elsevier homepage (http://elsevier.com), by selecting “Customer Support” and then “Obtaining Permissions.” Recognizing the importance of preserving what has been written, Elsevier prints its books on acid-free paper whenever possible. Library of Congress Cataloging-in-Publication Data British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library.
    [Show full text]