{"id":67995,"date":"2022-11-21T04:13:00","date_gmt":"2022-11-21T09:13:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=67995"},"modified":"2022-11-21T04:13:00","modified_gmt":"2022-11-21T09:13:00","slug":"ai-needs-a-strong-moral-compass-for-a-positive-future","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2022\/11\/21\/ai-needs-a-strong-moral-compass-for-a-positive-future\/","title":{"rendered":"AI Needs a Strong Moral Compass for a Positive Future"},"content":{"rendered":"\n<p>An &#8220;AI Bill of Rights&#8221; is all well and good.  Who&#8217;s going to enforce it?  Will that enforcement come in time?  Hmmm&#8230; I wonder!<\/p>\n\n\n\n<p>We have cases where an <strong>AI <\/strong>has incorrectly identified a person of interest, or where <strong>AI<\/strong> vision has more problems identifying people of color, or the case of the Kentucky court system, using an <strong>AI <\/strong>algorithm to assess a person\u2019s risk to determine the possibility of bail only to find out later that the system has disproportionately determined blacks as higher risk, whereas previously, there was little difference. We have seen <strong>AI <\/strong>algorithms discard people\u2019s resumes based on their age. There is also the case of Tay, Microsoft\u2019s <strong>AI<\/strong>, which in less than 16 hours, Twitter taught to be a racist jerk where it began posting inflammatory and offensive tweets through its Twitter account, causing Microsoft to shut it down.<\/p>\n\n\n\n<p>The difference with <strong>AI<\/strong> and previous coding methods is that <strong>AI<\/strong> is, for the most part, is a statistical algorithm, whereas previous coding methods or languages are deterministic, if-then-else flows. Traditionally, we have seen the practice of coding evolve into something more rigorous, and several methodologies and practices have evolved: waterfall, Agile, Scrum, etc. practices and regulations have also evolved to protect information such as PCI (to protect a card holder\u2019s information), or HIPAA (to protect a patient\u2019s information), etc.\u00a0<\/p>\n\n\n\n<p>The purpose of these methodologies and practices is precisely to bring order to the chaos of development, to force planning and design practices and to bring rigorous testing methods to any development underway. The end objective is to have solid, resilient software solutions that solve needs and also protect people\u2019s and businesses interests.<\/p>\n\n\n\n<p>As mentioned, artificial intelligence algorithms are different. Pedro Domingos, a professor at the University of Washington, very well put it in his book, The Master Algorithm: \u201cLearning algorithms are the seeds, data is the soil, and the learned programs are the grown plants. The machine-learning expert is like a farmer, sowing the seeds, irrigating and fertilizing the soil, and keeping an eye on the health of the crop but otherwise staying out of the way.\u201d There is, as of today, no commonly accepted methodology to feed data to the current machine learning algorithms. There are also no guardrails that help determine right from wrong in these algorithms.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.spiceworks.com\/tech\/artificial-intelligence\/guest-article\/ai-needs-a-strong-moral-compass-for-future\/&amp;ct=ga&amp;cd=CAEYAioUMTIwMzA3NDU2Nzk0NDEwMjUzNjIyGjQ3N2UyZTUxNmVmMWQ0Nzk6Y29tOmVuOlVT&amp;usg=AOvVaw2CLrUvgp4VnUKRzoi6EPdb\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An &#8220;AI Bill of Rights&#8221; is all well and good. Who&#8217;s going to enforce it? Will that enforcement come in time? Hmmm&#8230; I wonder! We have cases where an AI has incorrectly identified a person of interest, or where AI <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2022\/11\/21\/ai-needs-a-strong-moral-compass-for-a-positive-future\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":67996,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[638,640],"tags":[639,641],"class_list":["post-67995","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-artificial-intelligence-ai","tag-ai","tag-artificial-intelligence-2"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/67995","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=67995"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/67995\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=67995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=67995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=67995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}