scispace - formally typeset
Search or ask a question

Showing papers on "Delegation published in 2019"


Journal ArticleDOI
TL;DR: In this paper, the authors conceptualize algorithms as value-laden, rather than neutral, in that algorithms create moral consequences, reinforce or undercut ethical principles, and enable or diminish stakeholder rights and dignity.
Abstract: Algorithms silently structure our lives. Algorithms can determine whether someone is hired, promoted, offered a loan, or provided housing as well as determine which political ads and news articles consumers see. Yet, the responsibility for algorithms in these important decisions is not clear. This article identifies whether developers have a responsibility for their algorithms later in use, what those firms are responsible for, and the normative grounding for that responsibility. I conceptualize algorithms as value-laden, rather than neutral, in that algorithms create moral consequences, reinforce or undercut ethical principles, and enable or diminish stakeholder rights and dignity. In addition, algorithms are an important actor in ethical decisions and influence the delegation of roles and responsibilities within these decisions. As such, firms should be responsible not only for the value-laden-ness of an algorithm but also for designing who-does-what within the algorithmic decision. As such, firms developing algorithms are accountable for designing how large a role individual will be permitted to take in the subsequent algorithmic decision. Counter to current arguments, I find that if an algorithm is designed to preclude individuals from taking responsibility within a decision, then the designer of the algorithm should be held accountable for the ethical implications of the algorithm in use.

256 citations


Journal ArticleDOI
TL;DR: A novel framework is built outlining how both modes of decision making may be combined to optimally benefit the quality of organizational decision making and three structural categories in which decisions of organizational members can be combined with AI-based decisions are presented.
Abstract: How does organizational decision-making change with the advent of artificial intelligence (AI)-based decision-making algorithms? This article identifies the idiosyncrasies of human and AI-based dec...

191 citations


Journal ArticleDOI
TL;DR: In this paper, the authors explore the evolution of different participants' behavior and their evolutionary stable strategy in line with the duplication of dynamic equations, enabling a robust, quantitative analysis of this iterative, interactive, three-player game.

99 citations


Journal ArticleDOI
TL;DR: This paper proposes a novel decentralized architecture for permission delegation and access control for IoT application, with demands on event and query base permission delegation, and applies Blockchain (BC) technology to make delegation services secure, trusted, verifiable and decentralized.

65 citations


01 Oct 2019
TL;DR: In this paper, the authors proposed that UNFCCC should come up with some policy guidelines to ensure optimum assembly of academics, researcher, practitioners, government officials and private sector for countries to select delegation team for COPs.
Abstract: Although criticized on management and outcome, attendance in environmental mega conferences has been continuously increasing. Recent Conference of the Parties (COP) of the United Nations Framework Convention on Climate Change (UNFCCC) has hosted thousands of delegates. Climate vulnerable countries show similar trend in size of national delegation. Size of delegation team is positively correlated with the total population while environmental performance and political stability of the country do not influence the size of delegation team. In formation of state representatives, countries differ in their preferences to academic community, public and private sector, business community etc. Bangladesh, one of the highly climate vulnerable countries, shows some exceptions – participants from non-government organizations (NGOs) and private sectors are minimal, while political personality, irrespective of their level of expertise in relevant field, are substantial. It is proposed that UNFCCC should come up with some policy guidelines to ensure optimum assembly of academics, researcher, practitioners, government officials and private sector for countries to select delegation team for COPs.

54 citations


Journal ArticleDOI
TL;DR: It is shown that the KP-ABE scheme is insecure even in the weaker security notion, namely, one-way encryption under the same attack and model, and an attacker can decrypt a ciphertext which does not satisfy the policy imposed on his decryption key.
Abstract: In this paper, we present the enhancement of a lightweight key-policy attribute-based encryption (KP-ABE) scheme designed for the Internet of Things (IoT). The KP-ABE scheme was claimed to achieve ciphertext indistinguishability under chosen-plaintext attack in the selective-set model but we show that the KP-ABE scheme is insecure even in the weaker security notion, namely, one-way encryption under the same attack and model. In particular, we show that an attacker can decrypt a ciphertext which does not satisfy the policy imposed on his decryption key. Subsequently, we propose an efficient fix to the KP-ABE scheme as well as extending it to be a hierarchical KP-ABE (H-KP-ABE) scheme that can support role delegation in IoT applications. An example of applying our H-KP-ABE on an IoT-connected healthcare system is given to highlight the benefit of the delegation feature. Lastly, using the NIST curves secp192k1 and secp256k1, we benchmark the fixed (hierarchical) KP-ABE scheme on an Android phone and the result shows that the scheme is still the fastest in the literature.

52 citations


Book ChapterDOI
01 Jan 2019
TL;DR: The results indicate that in general, the occupation of respondents did not seem to play a significant role in perceptions of which tasks are most appropriate for robots in tourism-related industries, although respondents employed in robotics seem to be more receptive towards robots, while tourism educators – more pessimistic.
Abstract: While robots have been used extensively for many years in manufacturing, many robots are fairly new arrivals in tourism-related industries. This paper delves into how the general public and stakeholders in the travel, tourism and hospitality industries view the incorporation of robots into tourism-related industries. Based upon a sample of over 1,000 respondents to an international online survey, it analyses which tasks are deemed as most appropriate for being delegated to a robot. In addition, it segments the respondents to determine whether the professions of those responding view the delegation of tasks to robots differently. The results indicate that in general, the occupation of respondents did not seem to play a significant role in perceptions of which tasks are most appropriate for robots in tourism-related industries, although respondents employed in robotics seem to be more receptive towards robots, while tourism educators – more pessimistic.

46 citations


Journal ArticleDOI
TL;DR: In this article, the impact of choice complexity and cognitive perceptions on the willingness to delegate a strategic decision to an algorithm was investigated with 310 participants and they found that although choice complexity has no effect, participants with low levels of situational awareness are more likely to delegate.
Abstract: Artificial intelligence is revolutionizing the way we do business. Whereas both the adoption of technological innovations and strategic decision making have been subject to prior research, this experimental study is first to combine both. To understand the impact of choice complexity and cognitive perceptions on the willingness to delegate a strategic decision to an algorithm, we conducted an experiment with 310 participants. We find that although choice complexity has no effect, participants with low levels of situational awareness are more likely to delegate. The findings augment research on choice complexity in decision making by emphasizing the relevance of cognitive perceptions.

40 citations


Journal ArticleDOI
TL;DR: Building on the few programs that have successfully included aides as key members of home care teams, federal and state policymakers, educators, and health systems and providers should standardize competency‐based training requirements, expand nurse delegation consistently across states, and support evaluation, dissemination, and replication of successful programs.
Abstract: Home health, home care, and personal care aides provide most of the paid hands-on care delivered to seriously ill, functionally impaired individuals in their homes, assisted living, and other noninstitutional settings. This workforce delivers personal care, assistance with activities of daily living, and emotional support to their patients. They are often the eyes and ears of the health system, observing subtle changes in condition that can provide important information for clinical decision making and therapeutic intervention. Despite this fact, the growing number of team-based home care initiatives have failed to incorporate this workforce into their programs. Barriers to inclusion of aides into teams include a basic lack of value and understanding on the part of clinical team members and society in general of the complex tasks that these caregivers perform, inadequate investments in training and education of this workforce to develop their knowledge and competencies, and variation in state delegation laws that limit the scope of practice and consequently the ability of aides to work effectively in teams and to advance in their careers. Building on the few programs that have successfully included aides as key members of home care teams, federal and state policymakers, educators, and health systems and providers should standardize competency-based training requirements, expand nurse delegation consistently across states, and support evaluation, dissemination, and replication of successful programs. J Am Geriatr Soc 67:S444-S448, 2019.

39 citations


Proceedings Article
01 Jan 2019
TL;DR: WAVE is an authorization framework offering decentralized trust: no central services can modify or see permissions and any participant can delegate a portion of their permissions autonomously, and stores them in an untrusted scalable storage solution.
Abstract: Most deployed authorization systems rely on a central trusted service whose compromise can lead to the breach of millions of user accounts and permissions. We present WAVE, an authorization framework offering decentralized trust: no central services can modify or see permissions and any participant can delegate a portion of their permissions autonomously. To achieve this goal, WAVE adopts an expressive authorization model, enforces it cryptographically, protects permissions via a novel encryption protocol while enabling discovery of permissions, and stores them in an untrusted scalable storage solution. WAVE provides competitive performance to traditional authorization systems relying on central trust. It is an open-source artifact and has been used for two years for controlling 800 IoT devices.

38 citations


Journal ArticleDOI
TL;DR: In this article, the authors identify two preconditions for judicialization to occur: delegation to an adjudicatory body charged with applying designated legal rules, and legal rights-claiming by actors who bring or threaten to bring a complaint to one or more of these bodies.
Abstract: This article introduces a Thematic Section and theorizes the multiple ways that judicializing international relations shifts power away from national executives and legislatures toward litigants, judges, arbitrators, and other nonstate decision-makers. We identify two preconditions for judicialization to occur—(1) delegation to an adjudicatory body charged with applying designated legal rules, and (2) legal rights-claiming by actors who bring—or threaten to bring—a complaint to one or more of these bodies. We classify the adjudicatory bodies that do and do not contribute to judicializing international relations, including but not limited to international courts. We then explain how rights-claiming initiates a process for authoritatively determining past violations of the law, identifying remedies for those violations, and preventing future violations. Because judicializing international relations occurs in multiple phases, in multiple locations, and involves multiple actors as decision-makers, governments often do not control the timing, nature, or extent to which political and policy decisions are adjudicated. Delegation—and the associated choice of institutional design features—is thus only the first step in a chain of processes that determine how a diverse array of nonstate actors influence politically consequential decisions.

Journal ArticleDOI
TL;DR: A common explanation for the rise in outcome evaluation among American human service agencies is the concomitant spread of performance-based funding in the late twentieth century as mentioned in this paper, which is not the case here.
Abstract: A common explanation for the rise in outcome evaluation among American human service agencies is the concomitant spread of performance-based funding in the late twentieth century. Although ...

Posted Content
TL;DR: This work develops a framework on human perception of task delegation to AI, and finds little preference for full AI control and a strong preference for machine-in-the-loop designs, in which humans play the leading role.
Abstract: While artificial intelligence (AI) holds promise for addressing societal challenges, issues of exactly which tasks to automate and to what extent to do so remain understudied. We approach this problem of task delegability from a human-centered perspective by developing a framework on human perception of task delegation to AI. We consider four high-level factors that can contribute to a delegation decision: motivation, difficulty, risk, and trust. To obtain an empirical understanding of human preferences in different tasks, we build a dataset of 100 tasks from academic papers, popular media portrayal of AI, and everyday life, and administer a survey based on our proposed framework. We find little preference for full AI control and a strong preference for machine-in-the-loop designs, in which humans play the leading role. Among the four factors, trust is the most correlated with human preferences of optimal human-machine delegation. This framework represents a first step towards characterizing human preferences of AI automation across tasks. We hope this work encourages future efforts towards understanding such individual attitudes; our goal is to inform the public and the AI research community rather than dictating any direction in technology development.

Journal ArticleDOI
TL;DR: Scholarship on bureaucratic responsiveness to Congress typically focuses on delegation and formal oversight hearings as discussed by the authors, and overlooked are daily requests to executive agencies made by legislators that prune their budgets.
Abstract: Scholarship on bureaucratic responsiveness to Congress typically focuses on delegation and formal oversight hearings. Overlooked are daily requests to executive agencies made by legislators that pr...

Journal ArticleDOI
TL;DR: This work characterize the communication problems that make the expert acquire information of equal use to expert and decision maker and suggests that communication outperforms delegation in these problems.
Abstract: A decision maker needs to reach a decision and relies on an expert to acquire information. Ideal actions of expert and decision maker are partially aligned and the expert chooses what to learn about each. The decision maker can either get advice from the expert or delegate decision making to him. Under delegation, the expert learns his privately optimal action and chooses it. Under communication, advice based on such information is discounted, resulting in losses from strategic communication. We characterize the communication problems that make the expert acquire information of equal use to expert and decision maker. In these problems, communication outperforms delegation.

Journal ArticleDOI
TL;DR: Wang et al. as mentioned in this paper systematically analyzed the relationship between different influencing factors of wind power growth, including the level of government regulation and the impact of vested interest groups, based on the private interest theory of government regulations.

Journal ArticleDOI
TL;DR: In this paper, a focused comparison of the transposition of several provisions of the Asylum Reception Conditions Directive in France, Germany, and the Netherlands is presented, showing that while all three states formally comply with the directive, the level of European Union discretion delegated to practical implementers varies considerably across the cases.
Abstract: This article seeks to map and explain the extent to which national legislators constrain discretion contained in European Union directives during transposition. To this end, we use standard hypotheses from the domestic delegation literature regarding the necessity of policy conflict and transaction costs. Our empirical approach is based on a focused comparison of the transposition of several provisions of the Asylum Reception Conditions Directive in France, Germany, and the Netherlands. In order to capture content-specific aspects of discretion we employ an innovative measurement tool, the so-called Institutional Grammar Tool. The study shows that while all three states formally comply with the directive, the level of European Union discretion delegated to practical implementers varies considerably across the cases. Standard delegation theory cannot fully explain the patterns. Instead, existing delegation theories have to be adjusted to the transposition context, by accounting for domestic preferences regarding the status quo.

Proceedings ArticleDOI
01 Jan 2019
TL;DR: This paper presents an OAuth-based method to delegate the processing and access policy management to the Authorisation Server thus allowing also systems with constrained IoT devices to benefit from DIDs and VCs.
Abstract: Decentralised identifiers (DIDs) and verifiable credentials (VCs) are upcoming standards for self-sovereign privacypreserving identifiers and authorisation, respectively. This focus on privacy can help improve many services and open up new business models, but using DIDs and VCs directly on constrained IoT devices can be problematic due to the management and resource overhead. This paper presents an OAuth-based method to delegate the processing and access policy management to the Authorisation Server thus allowing also systems with constrained IoT devices to benefit from DIDs and VCs.

Reference EntryDOI
17 Jan 2019
TL;DR: In this article, the authors explore the black box of IIGOs and explore how they "administer the global" without a large degree of delegation to an independent secretariat and illustrate how states utilize a taxonomy of different administrative designs.
Abstract: International Relations and public administration scholars are now recognizing that formal intergovernmental organizations (FIGOs) are no longer the only way that states cooperate across borders. This chapter shows that states are increasingly interacting through informal intergovernmental organizations (IIGOs) which have neither a treaty nor an independent secretariat. This chapter opens the black box of IIGOs and explores how they ‘administer the global’ without a large degree of delegation to an independent secretariat. IIGOs illustrate how states utilize a taxonomy of different administrative designs. Organizational structures without a high degree of delegation include leveraging the bureaucratic structure of existing organizations, leaning on a state for technocratic functions, and setting up a rotating Chair. Each choice preserves sovereignty while also accepting the downsides of maintaining control. This chapter utilizes a state- and civil servant focus to examine how intergovernmental organizations work, showing the promise and benefits of crossing disciplinary boundaries.

Proceedings ArticleDOI
01 Dec 2019
TL;DR: This paper proposes a Capability-Based Access Control (CapBAC) scheme by applying the emerging Ethereum blockchain technology, which uses Ethereum smart contracts to store and manage the capability tokens, i.e., special data structures that maintain the allowed actions of a user on a certain resource.
Abstract: The large-scale and trustless nature of the Internet of Things (IoT) calls for distributed and trustworthy access control schemes to prevent unauthorized resource access. This paper proposes a Capability-Based Access Control (CapBAC) scheme by applying the emerging Ethereum blockchain technology. This scheme uses Ethereum smart contracts, i.e., executable codes residing in the blockchain, to store and manage the capability tokens, i.e., special data structures that maintain the allowed actions of a user (i.e., subject) on a certain resource (i.e., object). To provide more fine-grained access control and more flexible token management, this scheme defines capability tokens in units of actions, i.e., by dividing a conventional capability token containing multiple actions into multiple ones with each being associated with a certain action. In addition, this scheme uses a delegation graph instead of the delegation tree in existing smart contract-based CapBAC schemes to store the token delegation relationship among the subjects. By storing the tokens and the delegation graph in smart contracts, this scheme allows object owners to verify the ownership and validity of the capability tokens of the subjects. To demonstrate the feasibility of the scheme, we constructed a local Ethereum blockchain network and conducted extensive experiments.

Journal ArticleDOI
TL;DR: The main method of modeling is to convert the attack or defense of rationally delegated computation into communication problems in information theory and construct the attack channel and defense channel for the client and the calculator respectively.
Abstract: Rational delegation of computation is an important technology of mobile Internet at present, which is significant to the construction of intelligent urban computing. In order to close to practical applications, many tasks need cooperation with edge computing and cloud computing. The delegated computation scheme with rational players guarantees the reliability of the calculation results by the utility function. This paper studies the rational delegation of computation and the security attack-defense from attack and defense. Combining with the concept of average mutual information in information theory, this paper presents the attack and defense model for rationally delegating the computation. The main method of modeling is to convert the attack or defense of rationally delegated computation into communication problems in information theory and construct the attack channel and defense channel for the client and the calculator respectively. The channel capacity of the attack channel represents the attack capacity limitation of the adversary in the delegated computing environment, and that of the defense channel denotes the defense capacity limitation of clients in the delegated computation. Then, we discuss the relationship between attack limitation and defense limitation, and it shows that there are different strengths and weaknesses between the calculator and the client under different mixed strategies. Finally, the numerical analysis of experiments demonstrates that the optimal strategy of attack and defense is the strategy when the game between client and calculator reaches the equilibrium point.

Journal ArticleDOI
TL;DR: The DSM-5 revision envisioned a paradigm shift away from traditional diagnostic categories as discussed by the authors, and plans for a major move from descriptive to etiologic diagnoses were quickly abandoned as infeasible.
Abstract: The initial plans for the DSM-5 revision envisioned a paradigm shift away from traditional diagnostic categories. However, plans for a major move from descriptive to etiologic diagnoses were quickly abandoned as infeasible. Support was much broader for adding dimensional/spectrum constructs to the categorical diagnoses, although this was interpreted in various ways. Delegation of substantial autonomy to work groups with modest central coordination was seen as problematic by some work groups and positively by others. Controversies emerged around the standards for diagnostic change, and the degree to which the same standards should be used across diagnostic groups. The Summit Group was given the final task of trying to forge a consensus among the various review groups. We conclude with thoughts about the difficulty of trying to revise an entire manual all at once and the desirability of developing clear rules for change at the outset of such a diagnostic project.

Book ChapterDOI
30 Sep 2019
TL;DR: In this paper, the authors study the stability of the delegation process in liquid democracy and model it as a game in which the players are the voters and the strategies are their possible delegations.
Abstract: Liquid democracy is a collective decision making paradigm which lies between direct and representative democracy. One of its main features is that voters can delegate their votes in a transitive manner so that: A delegates to B and B delegates to C leads to A indirectly delegates to C. These delegations can be effectively empowered by implementing liquid democracy in a social network, so that voters can delegate their votes to any of their neighbors in the network. However, it is uncertain that such a delegation process will lead to a stable state where all voters are satisfied with the people representing them. We study the stability (w.r.t. voters preferences) of the delegation process in liquid democracy and model it as a game in which the players are the voters and the strategies are their possible delegations. We answer several questions on the equilibria of this process in any social network or in social networks that correspond to restricted types of graphs.

Journal ArticleDOI
TL;DR: A novel capability-based access right delegation framework designed specifically for IoT systems that relies on light weight symmetric-key cryptography and efficiently provides a fine-grained, dynamic and secure accessright delegation for IoT devices in constrained environments.

Journal ArticleDOI
TL;DR: Results revealed that the optimal model forSolid waste management in the case of Lebanon incurs devolving collection, which would assimilate local populations into the decision-making process and reduce opposition towards devised solid waste management plans.

Journal ArticleDOI
TL;DR: A new RFID time-bound group ownership delegate protocol based on homomorphic encryption and quadratic residues is presented, which offers options for the e-th time verification as well as the revocation of earlier delegation.
Abstract: In recent years, Radio Frequency Identification (RFID) applications of various kinds have been blooming. However, along with the stunning advancement have come all sorts of security and privacy issues, for RFID tags oftentimes store private data and so the permission to read a tag or any other kind of access needs to be carefully controlled. Therefore, of all the RFID-related researches released so far, a big portion focuses on the issue of authentication. There have been so many cases where the legal access to or control over a tag needs to be switched from one reader to another, which has encouraged the development of quite a number of different kinds of ownership transfer protocols. On the other hand, not only has the need for ownership transfer been increasing, but a part of it has also been evolving from individual ownership transfer into group ownership transfer. However, in spite of the growing need for practical group ownership transfer services, little research has been done to offer an answer to the need. In this paper, we shall present a new RFID time-bound group ownership delegate protocol based on homomorphic encryption and quadratic residues. In addition, in order to provide more comprehensive service, on top of mutual authentication and ownership delegation, we also offer options for the e-th time verification as well as the revocation of earlier delegation.

Journal ArticleDOI
TL;DR: In this article, the authors investigate the optimal government intervention contrasting two different regulatory measures; (possibly partial) privatization and an output subsidy, and find that the effects of the policy implemented crucially depend on the decision timing.
Abstract: In a mixed quantity-setting oligopoly with an inefficient public firm, we investigate the optimal government intervention contrasting two different regulatory measures; (possibly partial) privatization and an output subsidy. We find that the effects of the policy implemented crucially depend on the decision timing. Using an interdependent payoff structure in the fashion of a delegation contract to model imperfect competition, we show that privatization incentives are generally larger if it takes place before private firms determine the degree of competition since, in this case, the private firms’ output is higher. On the contrary, if the regulator incorporates a production subsidy after the degree of competition is set, the private sector benefits from a high subsidy and achieves perfect collusion.

Journal ArticleDOI
TL;DR: In this article, the European Union (EU) level as the starting point of knowledge creation and delegation trajectories, and concentrating on transaction costs, policy knowledge and models generated at the international level provide the most cost-effective solution.
Abstract: The problem‐solving capacity and problem‐generating potential of multilevel systems entail the need for the delegation of authority. When the problem concerned is about how to put an abstract policy concept into a practicable policy tool, the choice of the respective delegation trajectory depends on the policy models or the policy‐relevant knowledge that the respective political levels can supply. When regarding the European Union (EU) level as the starting point of knowledge creation and delegation trajectories, and concentrating on transaction costs, policy knowledge and models generated at the international level provide the most cost‐effective solution. Only when the international level is not able to provide further policy knowledge and innovation, the EU delegates its definitional authority, first downward to the member states and then sideward to EU agencies. We illustrate the plausibility of our dynamic understanding of multilevel governance by using Environmental Policy Integration as an example.

Journal ArticleDOI
TL;DR: This article found that subjects are more willing to lie through a delegate than to lie directly despite controlling for potential effects of delegated decision-making on preferences over payoffs, probabilities of actions, and/or the desire to avoid taking a decision.

Posted Content
TL;DR: In this paper, the authors extend a threshold public goods framework to allow donors to contribute through an intermediary rather than directly to the public goods, and show that the presence of an intermediary increases public good success and subjects' earnings only when the intermediary is formally committed to direct donations to socially beneficial goods.
Abstract: When multiple charities, social programs and community projects simultaneously vie for funding, donors risk miscoordinating their contributions leading to an inefficient distribution of funding across projects. Community chests and other intermediary organizations facilitate coordination among donors and reduce such risks. To study this, we extend a threshold public goods framework to allow donors to contribute through an intermediary rather than directly to the public goods. Through a series of experiments, we show that the presence of an intermediary increases public good success and subjects' earnings only when the intermediary is formally committed to direct donations to socially beneficial goods. Without such a restriction, the presence of an intermediary has a negative impact, complicating the donation environment, decreasing contributions and public good success.