(Translated by https://www.hiragana.jp/)
Search | arXiv e-print repository
Skip to main content

Showing 1–4 of 4 results for author: Dempsey, J X

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10430  [pdf

    cs.CY cs.AI

    Challenging the Machine: Contestability in Government AI Systems

    Authors: Susan Landau, James X. Dempsey, Ece Kamar, Steven M. Bellovin, Robert Pool

    Abstract: In an October 2023 executive order (EO), President Biden issued a detailed but largely aspirational road map for the safe and responsible development and use of artificial intelligence (AI). The challenge for the January 24-25, 2024 workshop was to transform those aspirations regarding one specific but crucial issue -- the ability of individuals to challenge government decisions made about themsel… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

  2. arXiv:2403.01649  [pdf

    cs.CY cs.AI

    Recommendations for Government Development and Use of Advanced Automated Systems to Make Decisions about Individuals

    Authors: Susan Landau, James X. Dempsey, Ece Kamar, Steven M. Bellovin

    Abstract: Contestability -- the ability to effectively challenge a decision -- is critical to the implementation of fairness. In the context of governmental decision making about individuals, contestability is often constitutionally required as an element of due process; specific procedures may be required by state or federal law relevant to a particular program. In addition, contestability can be a valuabl… ▽ More

    Submitted 3 March, 2024; originally announced March 2024.

    ACM Class: K.4; K.5; I.2

  3. arXiv:2305.14553  [pdf

    cs.CR cs.AI cs.CY

    Adversarial Machine Learning and Cybersecurity: Risks, Challenges, and Legal Implications

    Authors: Micah Musser, Andrew Lohn, James X. Dempsey, Jonathan Spring, Ram Shankar Siva Kumar, Brenda Leong, Christina Liaghati, Cindy Martinez, Crystal D. Grant, Daniel Rohrer, Heather Frase, Jonathan Elliott, John Bansemer, Mikel Rodriguez, Mitt Regan, Rumman Chowdhury, Stefan Hermanek

    Abstract: In July 2022, the Center for Security and Emerging Technology (CSET) at Georgetown University and the Program on Geopolitics, Technology, and Governance at the Stanford Cyber Policy Center convened a workshop of experts to examine the relationship between vulnerabilities in artificial intelligence systems and more traditional types of software vulnerabilities. Topics discussed included the extent… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

  4. arXiv:1805.12266  [pdf

    cs.CY cs.CR

    Cybersecurity Information Sharing Governance Structures: An Ecosystem of Diversity, Trust, and Tradeoffs

    Authors: Elaine M. Sedenberg, James X. Dempsey

    Abstract: In recent years the cybersecurity policy debate in Washington has been dominated by calls for greater information sharing within the private sector, and between the private sector and the federal government. The passage of the Cybersecurity Information Sharing Act (CISA) (signed into law under the Cybersecurity Act of 2015) underscored federal efforts to collect information from the private sector… ▽ More

    Submitted 30 May, 2018; originally announced May 2018.