{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T15:02:24Z","timestamp":1773414144945,"version":"3.50.1"},"reference-count":46,"publisher":"Informa UK Limited","issue":"2","funder":[{"name":"Future of Life Institute","award":["2015-143911"],"award-info":[{"award-number":["2015-143911"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Experimental &amp; Theoretical Artificial Intelligence"],"published-print":{"date-parts":[[2017,3,4]]},"DOI":"10.1080\/0952813x.2016.1186228","type":"journal-article","created":{"date-parts":[[2016,5,24]],"date-time":"2016-05-24T12:20:39Z","timestamp":1464092439000},"page":"397-414","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":43,"title":["A model of pathways to artificial superintelligence catastrophe for risk and decision analysis"],"prefix":"10.1080","volume":"29","author":[{"given":"Anthony M.","family":"Barrett","sequence":"first","affiliation":[]},{"given":"Seth D.","family":"Baum","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,5,23]]},"reference":[{"key":"CIT0001","first-page":"397","volume":"4","author":"Alstott J.","year":"2014","journal-title":"Journal of Artificial General Intelligence"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1007\/s11023-012-9282-2"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1080\/08929882.2013.798984"},{"key":"CIT0004","volume-title":"On the overwhelming importance of shaping the far future","author":"Beckstead N.","year":"2013"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511813597"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1111\/1758-5899.12002"},{"key":"CIT0007","volume-title":"Superintelligence: Paths, dangers, strategies","author":"Bostrom N.","year":"2014"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32560-1"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1080\/0952813X.2014.895108"},{"key":"CIT0010","volume-title":"Risk assessment process for informed decision-making (RAPID): A progress report","author":"Cheesebrough A. J.","year":"2010"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2012.01914.x"},{"key":"CIT0012","volume-title":"Making hard decisions","author":"Clemen R. T.","year":"2001","edition":"2"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1037\/e722812011-003"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32560-1"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511611308"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68677-4"},{"key":"CIT0017","first-page":"116","volume":"22","author":"Goertzel B.","year":"2012","journal-title":"Journal of Evolution and Technology"},{"key":"CIT0018","first-page":"31","volume-title":"Advances in Computers","author":"Good I. J.","year":"1965"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511978036"},{"key":"CIT0020","volume-title":"Probabilistic risk assessment and management for engineers and scientists","author":"Kumamoto H.","year":"1996"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1111\/risk.2007.27.issue-5"},{"key":"CIT0022","volume-title":"Mathematical proofs improve but don\u2019t guarantee security, safety, and friendliness","author":"Muehlhauser L.","year":"2013"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1017\/S1477175613000316"},{"key":"CIT0024","volume-title":"United States government policy for oversight of life sciences dual use research of concern","author":"OBA","year":"2012"},{"key":"CIT0025","first-page":"171","volume-title":"Proceedings of the first AGI conference, frontiers in artificial intelligence and applications","author":"Omohundro S.","year":"2008"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32560-1"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1080\/0952813X.2014.895111"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1126\/science.1236194"},{"key":"CIT0029","volume-title":"Probabilistic reasoning in intelligent systems: Networks of plausible inference","author":"Pearl J.","year":"1988"},{"key":"CIT0030","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195178135.001.0001","volume-title":"Catastrophe: Risk and response","author":"Posner R. A.","year":"2004"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.eg.06.110181.001011"},{"key":"CIT0032","doi-asserted-by":"crossref","DOI":"10.1609\/aimag.v36i4.2577","volume-title":"Research priorities for robust and beneficial artificial intelligence","author":"Russell S.","year":"2015"},{"key":"CIT0033","volume-title":"Whole brain emulation: A roadmap (Technical Report #2008-3)","author":"Sandberg A.","year":"2008"},{"key":"CIT0034","volume-title":"Implications of a Software-limited Singularity","author":"Shulman C.","year":"2010"},{"key":"CIT0035","volume-title":"Corrigibility","author":"Soares N.","year":"2015"},{"key":"CIT0036","volume-title":"Aligning superintelligence with human interests: A technical research Agenda (Technical Report 2014\u20138)","author":"Soares N.","year":"2014"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1142\/S1793843012400161"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1088\/0031-8949\/90\/1\/018001"},{"key":"CIT0039","doi-asserted-by":"crossref","DOI":"10.2307\/j.ctt13x0kg1","volume-title":"Worst-case scenarios","author":"Sunstein C. R.","year":"2009"},{"key":"CIT0040","unstructured":"Waser, M. R. (2008).Discovering the foundations of a universal system of ethics as a road to safe artificial intelligence. Biologically inspired cognitive architectures: Papers from the AAAI fall symposium (pp. 195\u2013200). Menlo Park, CA:\u00a0AAAI Press."},{"key":"CIT0041","first-page":"307","volume":"31","author":"Wilson G.","year":"2013","journal-title":"Virginia Environmental Law Journal"},{"key":"CIT0042","first-page":"217","volume":"32","author":"Yampolskiy R. V.","year":"2013","journal-title":"Topoi"},{"key":"CIT0043","volume-title":"Creating friendly AI 10: The analysis and design of benevolent goal architectures","author":"Yudkowsky E.","year":"2001"},{"key":"CIT0044","volume-title":"Coherent extrapolated volition","author":"Yudkowsky E.","year":"2004"},{"key":"CIT0045","first-page":"308","volume-title":"Global catastrophic risks","author":"Yudkowsky E.","year":"2008"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32560-1"}],"container-title":["Journal of Experimental &amp; Theoretical Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0952813X.2016.1186228","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T02:36:26Z","timestamp":1718591786000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0952813X.2016.1186228"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,23]]},"references-count":46,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2016,2,22]]},"published-print":{"date-parts":[[2017,3,4]]}},"alternative-id":["10.1080\/0952813X.2016.1186228"],"URL":"https:\/\/doi.org\/10.1080\/0952813x.2016.1186228","relation":{},"ISSN":["0952-813X","1362-3079"],"issn-type":[{"value":"0952-813X","type":"print"},{"value":"1362-3079","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,23]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teta20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teta20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}