Content of Ethics, Laws, and Security in Open Source and AI in our journal

        Published in last 1 year |  In last 2 years |  In last 3 years |  All
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Brief discussion on fair use for distribution of open-source large model datasets
    Yunhu ZHAO, Yuzhou YANG, Lin QIN
    J* E* C* N* U* N* S*    2025, 2025 (5): 183-190.   DOI: 10.3969/j.issn.1000-5641.2025.05.017
    Abstract24)   HTML2)    PDF(pc) (741KB)(7)       Save

    The openness of large models requires not only sharing conventional computer software elements such as model architectures and training codes but also disclosing model parameters and datasets. Applying the analytical frameworks of the “four-factor test” and “three-step test” while considering the transformative nature and purpose of dataset distribution under open licenses as well as the public interest in technological development and application, one may conclude that distributing datasets for open-source large models constitutes fair use, thus obviating the necessity for obtaining copyright licenses from upstream right holders. Such an approach satisfies governance requirements regarding artificial-intelligence transparency and actively contributes to promoting knowledge sharing.

    Reference | Related Articles | Metrics | Comments0
    Dynamics model in two-layer networks and case study on generative artificial intelligence bias cognition propagation
    Hongmiao ZHU, Xiaodong ZHAO, Huimin ZHOU, Jiayin QI
    J* E* C* N* U* N* S*    2025, 2025 (5): 191-201.   DOI: 10.3969/j.issn.1000-5641.2025.05.018
    Abstract33)   HTML6)    PDF(pc) (1263KB)(27)       Save

    This study developed a model to understand the communication dynamics of generative artificial intelligence (GAI) bias cognition within a two-layer network comprising enterprise managers and ordinary employees. The model integrated the effects of communication between different levels and the impact of cognitive training. Using the next-generation matrix method, the study accurately calculated the propagation threshold, R0, that served as a crucial quantitative foundation for effective governance. Specifically, when R0<1, deviant cognition tended to disappear spontaneously, whereas when R0>1, a risk of biased cognition spreading existed. Additionally, the study compared and evaluated two intervention strategies through numerical simulations, providing a comprehensive analysis of the mechanisms that drove the generation and dissemination of deviant cognition within enterprises, supported by case studies.

    Table and Figures | Reference | Related Articles | Metrics | Comments0
    Historical transformations and future prospects of open source ethics
    Biaowei ZHUANG, Runtao LIU
    J* E* C* N* U* N* S*    2025, 2025 (5): 202-208.   DOI: 10.3969/j.issn.1000-5641.2025.05.019
    Abstract47)   HTML3)    PDF(pc) (545KB)(2)       Save

    Open source ethics are unique and are the moral code and values that the open-source ecosystem should follow. Through the evaluation of open-source socialization behaviors, open-source classic texts, and typical cases, three stages of ethical evolution are observed in open source: the “elite ethics” phase driven by early hackers; the “commercial ethics” phase marked by growing corporate involvement; and the current “external ethics” phase shaped by social responsibility, privacy concerns, and geopolitical issues. The integration of China’s open-source technology and traditional culture has driven open source ethics into a new phase of development.

    Reference | Related Articles | Metrics | Comments0