Sie sind auf Seite 1von 16

TOPIC NAME

ABSTRACT

The purpose of this study is to study how artificial intelligence has touched upon our lives.
The research is aimed to question the morality bounds of using AI bots in Home security
systems. It studies the readability of user to deploy AI bots in their homes while considering
economic factors and the accountability in case of any incidents involving a Bot.

2
Table of Contents
CHAPTER 1: INTRODUCTION ............................................................................................... 5
1.1 RESEARCH TOPIC ........................................................................................................................ 5
1.2 BACKGROUND ........................................................................................................................... 5
1.3 RATIONALE OF THE STUDY............................................................. ERROR! BOOKMARK NOT DEFINED.
1.4 RESEARCH AIM AND OBJECTIVES................................................................................................... 5
1.5 RESEARCH QUESTIONS ................................................................................................................ 5
1.6 RESEARCH OUTLINE .................................................................................................................... 6
CHAPTER 2: LITERATURE REVIEW ........................................................................................ 7
2.1 INTRODUCTION ........................................................................... ERROR! BOOKMARK NOT DEFINED.
2.2 WORKPLACE INCENTIVES .............................................................. ERROR! BOOKMARK NOT DEFINED.
2.3 TYPES OF INCENTIVES ................................................................... ERROR! BOOKMARK NOT DEFINED.
2.3.1 Relevant Terminologies ...................................................... Error! Bookmark not defined.
2.4 THE IMPACT OF INCENTIVES ON EMPLOYEE PERFORMANCE ................. ERROR! BOOKMARK NOT DEFINED.
2.5 HOW INCENTIVES INFLUENCE RETENTION RATES ............................... ERROR! BOOKMARK NOT DEFINED.
2.6 THEORY AND CONCEPTS ............................................................... ERROR! BOOKMARK NOT DEFINED.
2.6.1 Taylorism ............................................................................ Error! Bookmark not defined.
2.6.2 Theories that followed........................................................ Error! Bookmark not defined.
2.7 CONCLUSION .............................................................................. ERROR! BOOKMARK NOT DEFINED.
CHAPTER 3: RESEARCH METHODOLOGY ............................................................................ 10
3.1 INTRODUCTION ........................................................................................................................ 10
3.2 RESEARCH PHILOSOPHY............................................................................................................. 10
3.3 RESEARCH APPROACH ............................................................................................................... 10
3.4 RESEARCH DESIGN AND ANALYSIS ............................................................................................... 10
3.5 DATA COLLECTION ................................................................................................................... 10
3.5.1 Sampling Technique ........................................................................................................ 10
3.5.2 Limitations of Data Collection ......................................................................................... 11
3.5.3 Ethical Considerations ..................................................................................................... 11
CHAPTER 4: DATA FINDINGS AND DISCUSSION .................................................................. 12
4.1 INTRODUCTION ........................................................................................................................ 12
4.2 FINDINGS AND ANALYSIS ........................................................................................................... 12
CHAPTER 5: CONCLUSION & RECOMMENDATION .............................................................. 13
BIBLIOGRAPHY.......................................................................... ERROR! BOOKMARK NOT DEFINED.
APPENDICES .............................................................................................................................. 13
A1. LIST OF FIGURES .......................................................................... ERROR! BOOKMARK NOT DEFINED.
A2. LIST OF TABLES ........................................................................... ERROR! BOOKMARK NOT DEFINED.
A3. GANTT CHART ............................................................................ ERROR! BOOKMARK NOT DEFINED.
A4. REFLECTION ............................................................................... ERROR! BOOKMARK NOT DEFINED.
A5. ETHICAL CONSENT ....................................................................... ERROR! BOOKMARK NOT DEFINED.
A6. LETTER OF PERMISSION TO CASE STUDY .......................................... ERROR! BOOKMARK NOT DEFINED.
A7. SURVEY QUESTIONNAIRE .............................................................. ERROR! BOOKMARK NOT DEFINED.
A8(A). OVERALL SURVEY RESPONSE KEYS ............................................. ERROR! BOOKMARK NOT DEFINED.
A8(B). OVERALL SURVEY RESPONSE ..................................................... ERROR! BOOKMARK NOT DEFINED.
A8(C). OVERALL SURVEY PERCENTAGE OVERVIEW ................................. ERROR! BOOKMARK NOT DEFINED.

3
A9. ETHICS CHECKLIST ....................................................................... ERROR! BOOKMARK NOT DEFINED.

4
CHAPTER 1: INTRODUCTION

1.1 RESEARCH TOPIC


Is it efficient to use Artificial intelligence embedded systems for the prevention, prediction
and control of crime and emergency scenarios?

1.2 BACKGROUND
AI plays a key role in more and more public and social sectors day by day. Policing
and security is also one of them. Police departments of many countries are using an AI
system that has the ability to spatially identify crime sensitive areas as well as narrow down
possible suspects with help of the increasing data volumes and various techniques and
technologies.
For the basis of this research a paper by Joh et al.[7] will serve. It questions how the
legal issues involving unprecedented cases of AI-enabled security systems be evacuated.
Sooner or later, an AI bot is likely to harm or kill a human. Who will be questioned and
blamed for this behaviour of the robot? The first decision about such a case will form the
basis for precedence to help make decisions earie net time.

1.3 RESEARCH AIM AND OBJECTIVES


This research aims to examine the adaptability of security robots for home security. It
also studies the possibility of an incident that involves an AI hurting a human seriously or
even fatally. What action would be taken in such a scenario?
Some objectives of this study are:

1. Identify various applications of AI in crime control.


2. Examine the legal implications of using AI in crime control
3. Assess the efficiency of using autonomic bots for the security of builds like
homes and offices
4. Suggest future paths that can be taken based on findings.

1.4 RESEARCH QUESTIONS


 Is using AI bots for the purpose of Home security suitable?
 What are some of the ways we can ensure that the AI bots are working the
way want them to?
 If an incident occurs involving AI bots, who will be held accountable?

5
 How much people are willing to pay for AI bots for usage in home security
purposes?

1.5 RESEARCH OUTLINE


This research comprises of 5 parts.
1. The first is an introduction which tackles the purpose of the research, a little
background study and outlines the basic aims of the research. The research
questions are also jotted down.
2. Literature review is the second section of this report that consists of a detailed
analysis of the field of AI and its application in crime control.
3. The third section is the research methodologies which aim to outline the research
design used.
4. Section 4 will discuss the findings of data in detail
5. In the last section a conclusion is presented

6
CHAPTER 2: LITERATURE REVIEW

2.1 INTRODUCTION
Machines today are equipped with tools of artificial intelligence. AI has invaded our
lives in various ways. It has enabled machines to perform tasks that humans may need
extensive training for performing. The potential of AI has expanded rapidly in the past few
decades and has influenced the big companies like Facebook, Amazon, Cisco and Google to
fund start-ups and researches in this field.
2.2 WHAT IS AI?
Artificial intelligence is a term that is used the group of technologies that enable
machines to learn from historical experience, is flexible enough to make adjustments in its
decisions according new inputs and perform functions and tasks that mimic human
behaviour. AI machines rely greatly on deep learning, machine learning and natural
language processing using which machines are taught to perform specific tasks by looking
for patterns in big data set.
Thus artificially intelligent machines are machines that can make decisions and learn
on the base of historical data. A machine that can mimic the functions and processes of the
human brain is said to have AI abilities.
An ideal artificial intelligent machine is a flexible agent that can perceive its
environment and make intelligent decisions to reach particular state which is called the goal
state. With the advent of time, the tasks that were considered AI like character recognition,
have been discarded from AI tasks and more complicated tasks like mimicking human
speech and understanding human speech have been classified as AI.
2.3 ARTIFICIAL INTELLIGENCE HISTORY
Even though Alan Turing’s Turing Test conducted in 1950 was the first mention of
machines with the ability to think, John McCarthy was the first person to use the term
Artificial intelligence in 1955. However, very slow progress was seen in this field until recent
decades thanks to the development of advance algorithms, increased amount of data,
increased storage and improved computational capabilities.
The early research in AI, in the 1950’s, focused on the issues of problem solving using
predicate theory i.e. symbolic methods. Later on the US defence department grew interest
in this field and started researching and developing algorithms that would make machines
imitate human behaviours when solving a problem.
The era of 1956-1974 is considered the golden era of computer science development
and research. The path finding using reasoning, the General problem solver, ELIZA-the first
chat bot and WABOT1-the first humanoid robot, are some of the most hyped AI
developments of this era.
These early researches laid foundation for the complex reasoning abilities and
automation that is seen in machines today. Some examples include smart search engines
and the automated assistants like Siri.

7
2.4 THE CHALLENGE OF CRIME PREVENTION
One of the biggest hindrance in the general growth and the social and economic
wellbeing of any nation is its Crime Ratio. If the authorities are unable to control criminal
situations, predict an upcoming natural disaster and be prepared to face the collateral of
these conditions, then the nation is not considered to be efficient and safe.
Criminal activities, when left unchecked, not only impair the spiritual development of
the people, but also harms their dignity and spreads a feeling of violence and fear
(WAMBUGU, 2017 [1]).
As technology and science has seen advent, it has infiltrated almost every possible
field of life. The prevention and prediction of crime and management of criminal situations
has also not been left untouched, rather it has many applications in this field.

2.5 USE OF AI IN CRIME MANAGEMENT


Despite strict laws and vigilant police forces, a spike in crime has been seen in most of
the regions. Thus, it is suitable to adapt a pro-active approach to help predict crimes and
rectify these situations. The most suitable tool for achieving this goal is to use prediction
mechanisms that use AI. This would not only help eradicate the state of fear and violence
from the people but will also help to better allocate resources (Nayak, n.d.[2]).
AI is used in many countries by the crime prevention agencies, both private and
government, for monitoring and preventing crimes. The major hindrance in the way of the
development and deployment of such solutions on a large scale is a lack of uniform laws
regarding AI technology across organizations. AI has been a hot topic for debate under
ethical bounds since the time of its conception. However, despite all this debate, AI is a
promises of a well-organized, stronger and resource efficient crime control and
management.
2.5.1 Ups and Downs of AI-enabled Crime Management:
Security needs are complex and always evolving. Thus, when talking about
security system, it needs to be highly flexible and should be able to adapt its rules and
decisions based on the changing environment around it. This need arises because of the
vigorous nature of crime. While the man force of the crime agencies are able to adapt
to these changes, they pose the threat of err due to human nature. AI machines and
systems have an advantage of better adaptability, greater flexibility and faster learning.
For instance, let’s say we need to monitor a social media entity like Facebook, to
look for people with specific interests. Performing this task by using a technical expert
of the police department can be a tedious and time consuming task; whereas an AI
enabled system would do it seamlessly and with better accuracy due to advanced
learning abilities.
Regardless of the numerous benefits and promises of AI enabled security
systems, there is a lack of large scale adaptation and implementation ; this renders the
promises left unproven to be true or not. Prediction of crime can require a lot of
personal data of the common man, making law agencies a victim of criticism. These
issues make it a hard task to define set scope for boundaries of AI.

8
The crime activities are producing more and more sophisticated events and
unstructured data that is difficult to learn and interpret. Also, there is a violent increase
in the volume of this data as well.
2.6 LITERATURE REPORT
AI has many applications in the field of crime control, prediction and management.
Agencies use AI-enabled applications to put a stop to crimes, to find and address people
that are potential suspects, predict the nature and location of the occurrence of a particular
crime, predict natural disasters, give efficient suggestions for management of any of such
scenarios. Some of the examples of crime management and control systems in which AI is
used are bomb disposal robots, surveillance drones that can give audible warnings and
control crowds by using some physical actions like pepper spray dispersion, social media
scanning applications that look for criminal patterns, interview conducting lie detector
robots.
Portugal et al. proposed an ROS-based framework for controlling patrolling robots and
carried out extensive experimentations and simulations to study the efficiency of their
framework proposal.
Mukhopadhyay et al.[3][4] presented a proposal for an incident prediction system
that works using two modules: a hierarchal clustering algorithm for allocating resources at
the site of incident based on the severity of the incident and using a predicted time period
of reaching the place of incident by emergency services, and a generative model that
predicts the time and spatial region of occurrence of an incident and places respondents
within this spatial regions to ensure timely response if the incident actually takes place.
Some of the issues are faced by the reception, Perry et al., point out that while bigger
agencies need systems that can manage the hurdle of bi data of unstructured form.
Even though predictive policing is perceivably the best possible path to walk on in light
of the studies suggesting efficiency of AI usage in crime management, some issues also arise
which need to be addressed. Situations that involve smaller scenarios include systems that
have simpler computational abilities.
Another issue of data inconsistence in criminal activities data is biased and the idea
presented by Lum et al. 2016 [6] presents a predictive policing system that is based on the
data that it is fed; if the data represents a bias, it will be reflected in the prediction as well. If
the data has an unknown bias hidden in its pattern, it is made worst due to a lack of data
transparency. Crawford et al. that a prediction software that is commonly used operates on
a bias against black people and marks then to be criminal.
One more issue is discussed by Joh et al. it is the issue of legal implication and
responsibility in case of accident which involves an automated or a decision making system.
This study also severs as a basis for an idea of this research.

2.7 CONCLUSION
While AI promises a better and improve prediction and management of law agencies,
there are many vulnerabilities in AI based systems for developers that are to design
solutions for dynamic law enforcing agencies. Invasion of privacy is one of the major
concern in the AI systems for policing that exist today. The belonging of liability in case of an
incident is also a talked about issue.

9
CHAPTER 3: RESEARCH METHODOLOGY

3.1 INTRODUCTION
In this section we will discuss the research methodologies to be used. It will include
outlining the philosophy, data collection techniques, etc.

3.2 RESEARCH PHILOSOPHY


In this study we will conduct the research under the philosophy of positivism. This
philosophy states that when a phenomenon is explored and observed through
experimentations, no changes occurs in the environment. Therefore, positivist relies on
scientific quantitative methods

3.3 RESEARCH APPROACH


Now that philosophical assumption of the study is established; it is imperative that the
research design and approach must be determined. Our research approach is imperative.

3.4 RESEARCH DESIGN AND ANALYSIS


Out of the numerous and vast methodologies of research we need to now choose a
research methodology. We will conduct this research by using two methods; extensive
literature review and survey.

3.5 DATA COLLECTION


Data will be collected by using a test group via a survey. The questionnaire will be
composed of hypothetical questions that will identify the affecting variables, to get viable
responses which will later be converted into quantitative data. The data will be analyzed
using simple statistical summary technique. For the purpose of research the questionnaire
will be shared with 100 random people from the city via e-mail, this will save the cost
implications of paper, printing, delivery and time. The participants will be given instructions
in the e-mail that will help them understand the questionnaire and its purpose, and a
deadline of 72 hours will be given for responses. Before distribution, the questionnaire will
be forwarded to the professor to gain expert approval. Secondary data sources e.g.
published journals, internet sources will be consulted as well.
3.5.1 Sampling Technique
A sample of 100 people will be selected based on demographics. People from
different areas of the city will be sampled to fill the questionnaire.

10
3.5.2 .Limitations of Data Collection
Chosen people may or may not respond. Their responses may be vague or inefficient.
The results may be biased due to wrong sampling.
3.6 ETHICAL CONSIDERATIONS
While conducting a research, ethical and moral considerations are of grave
importance and can affect the quality of work. The ACS code of ethics will be considered as
a checklist and we will ensure that all our methods follow the guidelines and requirements
set by them. Rules of general morality will also be followed during the process of this
research, the participants’ data; name, e-mail, address, contact number; will be kept
confidential.

11
CHAPTER 4: DATA FINDINGS AND DISCUSSION

4.1 INTRODUCTION
This chapter will analytically present the results of the survey that was sent via email
to a test group of 100 residents of the city of Melbourne.

4.2 FINDINGS AND ANALYSIS


72 questionnaires were received after the window of 72 hours. Thus a total of 72%
response rate was achieved. The questionnaire data was analysed and reflected upon in
great detail.
Out of the received 72 questionnaires, 20% people showed an unwillingness to
deploy AI bots in their homes, no matter how much utility they may provide. From the rest
of the people, 70% were unwilling to spend more than they were spending on their current
security systems, while 30% were willing to spend as much as they could for making their
houses safe.
More than 80% of the people were unwilling to deploy the Bots if the vendors did
not take responsibility for any sort of incidences.

12
CHAPTER 5: CONCLUSION & RECOMMENDATION

The aim of this research was to find the readability of people to adapt to AI
technologies for security and crime control. For this purpose an in-depth literature review
was conducted and its summary is presented in this paper. A research was conducted
keeping ethical considerations in mind by using sample of 100 people from the city of
Melbourne.
The results indicate that people are willing to deploy AI bots as long as they do not
cost them a lot of money and they do not have to worry about being accountable for any
incidents that the bot may be involved in.
For conducting this research I had to study AI in depth, its characteristics and
applications in various fields. By studying AI’s contribution in crime prevention and the
framework by which it is made possible has increased my knowledge on this topic
considerably. Moreover after the completion of this assignment my proposal writing skills
have increased viably.

13
REFLECTIVE JOURNAL

 Week no.1
This week I studied the basics of writing a research report and read and went
through some of the sample research papers so as to get an idea about how to
effectively write a research paper. This activity helped me plan how to structure my
research proposal and gave insight on different methods of citations, layout etc.
 Week no.2
This week I narrowed down my research topic to the field of artificial intelligence. I
studied about the evolution of AI from Turing machine till present times and found it
to be very interesting. I decided to study application of AI in various fields of life and
made it a point to focus my research on one of these aspects.
 Week no.3
After extensive literature research and thinking about various applications of I found
that my interest got spiked most by AI’s contribution in crime prevention. Thus I
selected the area of security and crime control for my research focus. I studied
different research papers for grasping the gist of the topic and found out many
informational facts. I chose to study AI usage in home security.
 Week no.4
I started writing the literature review portion of my research proposal. It is a tedious
and a long task. But I found it to be a bit helpful to have read the literature
thoroughly before starting to write this portion. I restricted this portion to 1500
words.
 Week no.5
After giving finishing touches to my literature review, my next objective was to
finalize my research question. After going through my selected papers once more,
the idea of AI bots intrigued me. I thought about them and decided to study their
usage for home security purpose. Thus I finalized my research questions according to
this theme. I developed a total of four research questions which created a further
outline for further research.
 Week no.6
I composed my questionnaire and obtained approval from my professor. Then I selected a
sample of 100 random people, chosen from different areas of Melbourne, for distribution of
questionnaire.
 Week no.7
The questionnaires were forwarded to the sample and I started developing my data
analysis procedure. This process was a learning one for me, as it was the first time I
was conducting an online survey. I was familiarized with the cost and time efficient
benefits of this technique.
 Week no.8
After collection of responses, I converted them into quantitative data using ordinal
scale responses, then applied simple statistical summary technique on it. The

14
analysis was done by using two software; AMOS and SPSS, to get verification of
results.
 Week no.9
The research report was completed. After completing my research report I reread it
several times to find errors and corrected them.
 Week no.10
This week was for submission.

15
REFERENCES

16

Das könnte Ihnen auch gefallen