{"id":153,"date":"2021-09-01T20:05:38","date_gmt":"2021-09-01T20:05:38","guid":{"rendered":"https:\/\/lsi.asulaw.org\/softlaw\/?post_type=report&#038;p=153"},"modified":"2021-10-18T15:55:30","modified_gmt":"2021-10-18T15:55:30","slug":"1-methodology","status":"publish","type":"report","link":"https:\/\/lsi.asulaw.org\/softlaw\/report\/1-methodology\/","title":{"rendered":"1. Methodology"},"content":{"rendered":"\n<div id=\"standard-header-block_612fdd0a55780\" class=\"standard-header alignfull standard-grid\">\n    \n    <div class=\"header-image standard-grid\">\n        <img src=\"https:\/\/lsi.asulaw.org\/softlaw\/wp-content\/uploads\/sites\/7\/2021\/09\/research-header-1.jpg\">\n\n        <div class=\"page-title\">\n                            \n\n<p class=\"supertitle\">The report<\/p>\n\n                        <h1>1. Methodology<\/h1>\n        <\/div>\n    <\/div>\n\n   \n<\/div>\n\n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\" style=\"flex-basis:70%\">\n<p>This section details the steps taken by our team to identify, screen, and classify AI soft law programs. The methodology was heavily inspired by prior research aimed at characterizing the state of AI governance [1], [2]. It begins with a description of our multi-pronged strategy to identify a list of candidate programs. The second section details the screening of programs and our approach to classifying them with up to 107 variables and themes. The last section cautions readers on this project\u2019s limitations. Although precautions were taken to guarantee the database\u2019s reliability, we realize that areas of opportunity will be found within our methodology.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column\">\n<div id=\"table-of-contents-block_612fdd0a55781\" class=\"table-of-contents\">\n    <div class=\"toc-container\">\n        <h2 class=\"is-style-sidebar-title\">Table of Contents<\/h2>\n        <ul>\n            <li class=\"page_item page-item-129\"><a href=\"https:\/\/lsi.asulaw.org\/softlaw\/report\/executive-summary\/\">Summary<\/a><\/li>\n<li class=\"page_item page-item-152\"><a href=\"https:\/\/lsi.asulaw.org\/softlaw\/report\/introduction\/\">Introduction<\/a><\/li>\n<li class=\"page_item page-item-153 page_item_has_children\"><a href=\"https:\/\/lsi.asulaw.org\/softlaw\/report\/1-methodology\/\">1. Methodology<\/a>\n<ul class='children'>\n\t<li class=\"page_item page-item-154\"><a href=\"https:\/\/lsi.asulaw.org\/softlaw\/report\/1-methodology\/1-1-identification\/\">1.1 Identification<\/a><\/li>\n\t<li class=\"page_item page-item-155\"><a href=\"https:\/\/lsi.asulaw.org\/softlaw\/report\/1-methodology\/1-2-screening-and-classification\/\">1.2 Screening and classification<\/a><\/li>\n\t<li class=\"page_item page-item-156\"><a href=\"https:\/\/lsi.asulaw.org\/softlaw\/report\/1-methodology\/1-3-limitations\/\">1.3 Limitations<\/a><\/li>\n<\/ul>\n<\/li>\n<li class=\"page_item page-item-160 page_item_has_children\"><a href=\"https:\/\/lsi.asulaw.org\/softlaw\/report\/2-results\/\">2. Results<\/a>\n<ul class='children'>\n\t<li class=\"page_item page-item-161\"><a href=\"https:\/\/lsi.asulaw.org\/softlaw\/report\/2-results\/2-1-year-of-publication\/\">2.1 Year of publication<\/a><\/li>\n\t<li class=\"page_item page-item-162\"><a href=\"https:\/\/lsi.asulaw.org\/softlaw\/report\/2-results\/2-2-geography\/\">2.2 Geography<\/a><\/li>\n\t<li class=\"page_item page-item-165\"><a href=\"https:\/\/lsi.asulaw.org\/softlaw\/report\/2-results\/2-3-influence\/\">2.3 Influence<\/a><\/li>\n\t<li class=\"page_item page-item-167\"><a href=\"https:\/\/lsi.asulaw.org\/softlaw\/report\/2-results\/2-4-type-of-program\/\">2.4 Type of program<\/a><\/li>\n\t<li class=\"page_item page-item-168\"><a href=\"https:\/\/lsi.asulaw.org\/softlaw\/report\/2-results\/2-5-role-of-stakeholders\/\">2.5 Role of stakeholders<\/a><\/li>\n\t<li class=\"page_item page-item-169\"><a href=\"https:\/\/lsi.asulaw.org\/softlaw\/report\/2-results\/2-6-enforcement\/\">2.6 Enforcement<\/a><\/li>\n\t<li class=\"page_item page-item-170\"><a href=\"https:\/\/lsi.asulaw.org\/softlaw\/report\/2-results\/2-7-themes\/\">2.7 Themes<\/a><\/li>\n<\/ul>\n<\/li>\n<li class=\"page_item page-item-171\"><a href=\"https:\/\/lsi.asulaw.org\/softlaw\/report\/conclusion\/\">Conclusion<\/a><\/li>\n<li class=\"page_item page-item-172\"><a href=\"https:\/\/lsi.asulaw.org\/softlaw\/report\/references\/\">References<\/a><\/li>\n<li class=\"page_item page-item-173\"><a href=\"https:\/\/lsi.asulaw.org\/softlaw\/report\/appendix-1-sources-of-information\/\">Appendix 1 \u2013 Sources of information<\/a><\/li>\n<li class=\"page_item page-item-174\"><a href=\"https:\/\/lsi.asulaw.org\/softlaw\/report\/appendix-2-keyword-search\/\">Appendix 2 \u2013 Keyword search<\/a><\/li>\n<li class=\"page_item page-item-1528\"><a href=\"https:\/\/lsi.asulaw.org\/softlaw\/report\/appendix-3\/\">Appendix 3 \u2013 Screening of soft law programs<\/a><\/li>\n<li class=\"page_item page-item-1532\"><a href=\"https:\/\/lsi.asulaw.org\/softlaw\/report\/appendix-4-codebook-for-database\/\">Appendix 4 \u2013 Codebook for database<\/a><\/li>\n        <\/ul>\n    <\/div>\n\n          <a href=\"https:\/\/lsi.asulaw.org\/softlaw\/wp-content\/uploads\/sites\/7\/2022\/08\/final-database-report-002-compressed.pdf\" class=\"is-style-icon-button\"><span class=\"fas fa-download\"><\/span> Download the Report<\/a>\n    \n<\/div><\/div>\n<\/div>\n","protected":false},"featured_media":0,"parent":0,"menu_order":0,"template":"","acf":[],"_links":{"self":[{"href":"https:\/\/lsi.asulaw.org\/softlaw\/wp-json\/wp\/v2\/report\/153"}],"collection":[{"href":"https:\/\/lsi.asulaw.org\/softlaw\/wp-json\/wp\/v2\/report"}],"about":[{"href":"https:\/\/lsi.asulaw.org\/softlaw\/wp-json\/wp\/v2\/types\/report"}],"wp:attachment":[{"href":"https:\/\/lsi.asulaw.org\/softlaw\/wp-json\/wp\/v2\/media?parent=153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}