Beruflich Dokumente
Kultur Dokumente
ABSTRACT
The purpose of this study is to study how artificial intelligence has touched upon our lives.
The research is aimed to question the morality bounds of using AI bots in Home security
systems. It studies the readability of user to deploy AI bots in their homes while considering
economic factors and the accountability in case of any incidents involving a Bot.
2
Table of Contents
CHAPTER 1: INTRODUCTION ............................................................................................... 5
1.1 RESEARCH TOPIC ........................................................................................................................ 5
1.2 BACKGROUND ........................................................................................................................... 5
1.3 RATIONALE OF THE STUDY............................................................. ERROR! BOOKMARK NOT DEFINED.
1.4 RESEARCH AIM AND OBJECTIVES................................................................................................... 5
1.5 RESEARCH QUESTIONS ................................................................................................................ 5
1.6 RESEARCH OUTLINE .................................................................................................................... 6
CHAPTER 2: LITERATURE REVIEW ........................................................................................ 7
2.1 INTRODUCTION ........................................................................... ERROR! BOOKMARK NOT DEFINED.
2.2 WORKPLACE INCENTIVES .............................................................. ERROR! BOOKMARK NOT DEFINED.
2.3 TYPES OF INCENTIVES ................................................................... ERROR! BOOKMARK NOT DEFINED.
2.3.1 Relevant Terminologies ...................................................... Error! Bookmark not defined.
2.4 THE IMPACT OF INCENTIVES ON EMPLOYEE PERFORMANCE ................. ERROR! BOOKMARK NOT DEFINED.
2.5 HOW INCENTIVES INFLUENCE RETENTION RATES ............................... ERROR! BOOKMARK NOT DEFINED.
2.6 THEORY AND CONCEPTS ............................................................... ERROR! BOOKMARK NOT DEFINED.
2.6.1 Taylorism ............................................................................ Error! Bookmark not defined.
2.6.2 Theories that followed........................................................ Error! Bookmark not defined.
2.7 CONCLUSION .............................................................................. ERROR! BOOKMARK NOT DEFINED.
CHAPTER 3: RESEARCH METHODOLOGY ............................................................................ 10
3.1 INTRODUCTION ........................................................................................................................ 10
3.2 RESEARCH PHILOSOPHY............................................................................................................. 10
3.3 RESEARCH APPROACH ............................................................................................................... 10
3.4 RESEARCH DESIGN AND ANALYSIS ............................................................................................... 10
3.5 DATA COLLECTION ................................................................................................................... 10
3.5.1 Sampling Technique ........................................................................................................ 10
3.5.2 Limitations of Data Collection ......................................................................................... 11
3.5.3 Ethical Considerations ..................................................................................................... 11
CHAPTER 4: DATA FINDINGS AND DISCUSSION .................................................................. 12
4.1 INTRODUCTION ........................................................................................................................ 12
4.2 FINDINGS AND ANALYSIS ........................................................................................................... 12
CHAPTER 5: CONCLUSION & RECOMMENDATION .............................................................. 13
BIBLIOGRAPHY.......................................................................... ERROR! BOOKMARK NOT DEFINED.
APPENDICES .............................................................................................................................. 13
A1. LIST OF FIGURES .......................................................................... ERROR! BOOKMARK NOT DEFINED.
A2. LIST OF TABLES ........................................................................... ERROR! BOOKMARK NOT DEFINED.
A3. GANTT CHART ............................................................................ ERROR! BOOKMARK NOT DEFINED.
A4. REFLECTION ............................................................................... ERROR! BOOKMARK NOT DEFINED.
A5. ETHICAL CONSENT ....................................................................... ERROR! BOOKMARK NOT DEFINED.
A6. LETTER OF PERMISSION TO CASE STUDY .......................................... ERROR! BOOKMARK NOT DEFINED.
A7. SURVEY QUESTIONNAIRE .............................................................. ERROR! BOOKMARK NOT DEFINED.
A8(A). OVERALL SURVEY RESPONSE KEYS ............................................. ERROR! BOOKMARK NOT DEFINED.
A8(B). OVERALL SURVEY RESPONSE ..................................................... ERROR! BOOKMARK NOT DEFINED.
A8(C). OVERALL SURVEY PERCENTAGE OVERVIEW ................................. ERROR! BOOKMARK NOT DEFINED.
3
A9. ETHICS CHECKLIST ....................................................................... ERROR! BOOKMARK NOT DEFINED.
4
CHAPTER 1: INTRODUCTION
1.2 BACKGROUND
AI plays a key role in more and more public and social sectors day by day. Policing
and security is also one of them. Police departments of many countries are using an AI
system that has the ability to spatially identify crime sensitive areas as well as narrow down
possible suspects with help of the increasing data volumes and various techniques and
technologies.
For the basis of this research a paper by Joh et al.[7] will serve. It questions how the
legal issues involving unprecedented cases of AI-enabled security systems be evacuated.
Sooner or later, an AI bot is likely to harm or kill a human. Who will be questioned and
blamed for this behaviour of the robot? The first decision about such a case will form the
basis for precedence to help make decisions earie net time.
5
How much people are willing to pay for AI bots for usage in home security
purposes?
6
CHAPTER 2: LITERATURE REVIEW
2.1 INTRODUCTION
Machines today are equipped with tools of artificial intelligence. AI has invaded our
lives in various ways. It has enabled machines to perform tasks that humans may need
extensive training for performing. The potential of AI has expanded rapidly in the past few
decades and has influenced the big companies like Facebook, Amazon, Cisco and Google to
fund start-ups and researches in this field.
2.2 WHAT IS AI?
Artificial intelligence is a term that is used the group of technologies that enable
machines to learn from historical experience, is flexible enough to make adjustments in its
decisions according new inputs and perform functions and tasks that mimic human
behaviour. AI machines rely greatly on deep learning, machine learning and natural
language processing using which machines are taught to perform specific tasks by looking
for patterns in big data set.
Thus artificially intelligent machines are machines that can make decisions and learn
on the base of historical data. A machine that can mimic the functions and processes of the
human brain is said to have AI abilities.
An ideal artificial intelligent machine is a flexible agent that can perceive its
environment and make intelligent decisions to reach particular state which is called the goal
state. With the advent of time, the tasks that were considered AI like character recognition,
have been discarded from AI tasks and more complicated tasks like mimicking human
speech and understanding human speech have been classified as AI.
2.3 ARTIFICIAL INTELLIGENCE HISTORY
Even though Alan Turing’s Turing Test conducted in 1950 was the first mention of
machines with the ability to think, John McCarthy was the first person to use the term
Artificial intelligence in 1955. However, very slow progress was seen in this field until recent
decades thanks to the development of advance algorithms, increased amount of data,
increased storage and improved computational capabilities.
The early research in AI, in the 1950’s, focused on the issues of problem solving using
predicate theory i.e. symbolic methods. Later on the US defence department grew interest
in this field and started researching and developing algorithms that would make machines
imitate human behaviours when solving a problem.
The era of 1956-1974 is considered the golden era of computer science development
and research. The path finding using reasoning, the General problem solver, ELIZA-the first
chat bot and WABOT1-the first humanoid robot, are some of the most hyped AI
developments of this era.
These early researches laid foundation for the complex reasoning abilities and
automation that is seen in machines today. Some examples include smart search engines
and the automated assistants like Siri.
7
2.4 THE CHALLENGE OF CRIME PREVENTION
One of the biggest hindrance in the general growth and the social and economic
wellbeing of any nation is its Crime Ratio. If the authorities are unable to control criminal
situations, predict an upcoming natural disaster and be prepared to face the collateral of
these conditions, then the nation is not considered to be efficient and safe.
Criminal activities, when left unchecked, not only impair the spiritual development of
the people, but also harms their dignity and spreads a feeling of violence and fear
(WAMBUGU, 2017 [1]).
As technology and science has seen advent, it has infiltrated almost every possible
field of life. The prevention and prediction of crime and management of criminal situations
has also not been left untouched, rather it has many applications in this field.
8
The crime activities are producing more and more sophisticated events and
unstructured data that is difficult to learn and interpret. Also, there is a violent increase
in the volume of this data as well.
2.6 LITERATURE REPORT
AI has many applications in the field of crime control, prediction and management.
Agencies use AI-enabled applications to put a stop to crimes, to find and address people
that are potential suspects, predict the nature and location of the occurrence of a particular
crime, predict natural disasters, give efficient suggestions for management of any of such
scenarios. Some of the examples of crime management and control systems in which AI is
used are bomb disposal robots, surveillance drones that can give audible warnings and
control crowds by using some physical actions like pepper spray dispersion, social media
scanning applications that look for criminal patterns, interview conducting lie detector
robots.
Portugal et al. proposed an ROS-based framework for controlling patrolling robots and
carried out extensive experimentations and simulations to study the efficiency of their
framework proposal.
Mukhopadhyay et al.[3][4] presented a proposal for an incident prediction system
that works using two modules: a hierarchal clustering algorithm for allocating resources at
the site of incident based on the severity of the incident and using a predicted time period
of reaching the place of incident by emergency services, and a generative model that
predicts the time and spatial region of occurrence of an incident and places respondents
within this spatial regions to ensure timely response if the incident actually takes place.
Some of the issues are faced by the reception, Perry et al., point out that while bigger
agencies need systems that can manage the hurdle of bi data of unstructured form.
Even though predictive policing is perceivably the best possible path to walk on in light
of the studies suggesting efficiency of AI usage in crime management, some issues also arise
which need to be addressed. Situations that involve smaller scenarios include systems that
have simpler computational abilities.
Another issue of data inconsistence in criminal activities data is biased and the idea
presented by Lum et al. 2016 [6] presents a predictive policing system that is based on the
data that it is fed; if the data represents a bias, it will be reflected in the prediction as well. If
the data has an unknown bias hidden in its pattern, it is made worst due to a lack of data
transparency. Crawford et al. that a prediction software that is commonly used operates on
a bias against black people and marks then to be criminal.
One more issue is discussed by Joh et al. it is the issue of legal implication and
responsibility in case of accident which involves an automated or a decision making system.
This study also severs as a basis for an idea of this research.
2.7 CONCLUSION
While AI promises a better and improve prediction and management of law agencies,
there are many vulnerabilities in AI based systems for developers that are to design
solutions for dynamic law enforcing agencies. Invasion of privacy is one of the major
concern in the AI systems for policing that exist today. The belonging of liability in case of an
incident is also a talked about issue.
9
CHAPTER 3: RESEARCH METHODOLOGY
3.1 INTRODUCTION
In this section we will discuss the research methodologies to be used. It will include
outlining the philosophy, data collection techniques, etc.
10
3.5.2 .Limitations of Data Collection
Chosen people may or may not respond. Their responses may be vague or inefficient.
The results may be biased due to wrong sampling.
3.6 ETHICAL CONSIDERATIONS
While conducting a research, ethical and moral considerations are of grave
importance and can affect the quality of work. The ACS code of ethics will be considered as
a checklist and we will ensure that all our methods follow the guidelines and requirements
set by them. Rules of general morality will also be followed during the process of this
research, the participants’ data; name, e-mail, address, contact number; will be kept
confidential.
11
CHAPTER 4: DATA FINDINGS AND DISCUSSION
4.1 INTRODUCTION
This chapter will analytically present the results of the survey that was sent via email
to a test group of 100 residents of the city of Melbourne.
12
CHAPTER 5: CONCLUSION & RECOMMENDATION
The aim of this research was to find the readability of people to adapt to AI
technologies for security and crime control. For this purpose an in-depth literature review
was conducted and its summary is presented in this paper. A research was conducted
keeping ethical considerations in mind by using sample of 100 people from the city of
Melbourne.
The results indicate that people are willing to deploy AI bots as long as they do not
cost them a lot of money and they do not have to worry about being accountable for any
incidents that the bot may be involved in.
For conducting this research I had to study AI in depth, its characteristics and
applications in various fields. By studying AI’s contribution in crime prevention and the
framework by which it is made possible has increased my knowledge on this topic
considerably. Moreover after the completion of this assignment my proposal writing skills
have increased viably.
13
REFLECTIVE JOURNAL
Week no.1
This week I studied the basics of writing a research report and read and went
through some of the sample research papers so as to get an idea about how to
effectively write a research paper. This activity helped me plan how to structure my
research proposal and gave insight on different methods of citations, layout etc.
Week no.2
This week I narrowed down my research topic to the field of artificial intelligence. I
studied about the evolution of AI from Turing machine till present times and found it
to be very interesting. I decided to study application of AI in various fields of life and
made it a point to focus my research on one of these aspects.
Week no.3
After extensive literature research and thinking about various applications of I found
that my interest got spiked most by AI’s contribution in crime prevention. Thus I
selected the area of security and crime control for my research focus. I studied
different research papers for grasping the gist of the topic and found out many
informational facts. I chose to study AI usage in home security.
Week no.4
I started writing the literature review portion of my research proposal. It is a tedious
and a long task. But I found it to be a bit helpful to have read the literature
thoroughly before starting to write this portion. I restricted this portion to 1500
words.
Week no.5
After giving finishing touches to my literature review, my next objective was to
finalize my research question. After going through my selected papers once more,
the idea of AI bots intrigued me. I thought about them and decided to study their
usage for home security purpose. Thus I finalized my research questions according to
this theme. I developed a total of four research questions which created a further
outline for further research.
Week no.6
I composed my questionnaire and obtained approval from my professor. Then I selected a
sample of 100 random people, chosen from different areas of Melbourne, for distribution of
questionnaire.
Week no.7
The questionnaires were forwarded to the sample and I started developing my data
analysis procedure. This process was a learning one for me, as it was the first time I
was conducting an online survey. I was familiarized with the cost and time efficient
benefits of this technique.
Week no.8
After collection of responses, I converted them into quantitative data using ordinal
scale responses, then applied simple statistical summary technique on it. The
14
analysis was done by using two software; AMOS and SPSS, to get verification of
results.
Week no.9
The research report was completed. After completing my research report I reread it
several times to find errors and corrected them.
Week no.10
This week was for submission.
15
REFERENCES
16