Social and Legal Implications of Artificial Intelligence
Explore the social and legal issues surrounding artificial intelligence, including job displacement, human judgment, computer enhancements of humans, privacy concerns, computer crime, and constitutional rights.
Social and Legal Implications of Artificial Intelligence
E N D
Presentation Transcript
Lecture 27 Social & Legal Issues (S&G, ch. 14) CS 100 - Lecture 27
Social Implications ofArtificial Intelligence CS 100 - Lecture 27
Kismet (Brooks’ Lab, MIT) • Responds to a face with a happy expression • Responds to rapidly moving face with disgusted expression CS 100 - Lecture 27
Kismet (Brooks’ Lab, MIT) • Example of three-way conversational interaction CS 100 - Lecture 27
Social Implications of AI • Elimination of jobs • Replacing human judgment by machine judgment • Altering our understanding of ourselves CS 100 - Lecture 27
Consider Computers that are More Intelligent than Humans • Suppose it’s impossible • establishing this would require some kind of scientific proof that a computer cannot emulate a brain, or that a brain is not sufficient for intelligence • in either case, a major scientific breakthrough • Suppose it’s possible • could displace us in all intellectual activities • if we had nothing to do, what would it mean to be human? • would/should humans be obsolete? CS 100 - Lecture 27
Computer Enhancements of Humans • Computers are already embedded in humans to correct problems • pacemakers, cochlear implants, etc. • Computers have also been embedded for enhancing human abilities • This technology may advance very quickly • How does this affect our understanding of human ability and accomplishment • analogy: use of performance-enhancing drugs CS 100 - Lecture 27
Social & Legal Issues CS 100 - Lecture 27
Promethean Fire • “All technology is non-neutral” • Technologies influencefocus & action • Computer technology has: • social benefits • social costs • Often, issues are not peculiar to computers, but are amplified by computer technology • Sometimes problems arise from using computers as they are intended to be used CS 100 - Lecture 27
Privacy • Government databases (federal & state) • Computer matching • Computer profiling • Open & closed files CS 100 - Lecture 27
Uses of Personal Data • Marketing • Decision making • Other uses: • secondary use • invisible information gathering • information from children • “Information underground” CS 100 - Lecture 27
Example: Google Mail • Google.com is introducing a new, free email service • Why? • By scanning the content of your emails, they will be able to compile a profile of your interests • Then they will be able to present advertisements targeted to you • A way of bringing you only the information you are potentially interested in and stimulating business? • An invasion of privacy? CS 100 - Lecture 27
Access control Audit trails Encryption Ethical use policies Informed consent Regulation Ownership of data Contracts Markets, options & consumer pressure Protecting Privacy CS 100 - Lecture 27
Computer Error • Overdependence on computers • Example illustrating issues: computerized voting • ampliative & reductive • Major failures • Lesser failures • Limitations of computer simulation CS 100 - Lecture 27
Simulation & Models • Recall our discussion of models: • a model is intended to address a certain class of questions or issues • models make simplifying assumptions • Recall the omission of aerodynamic stability from bridge models before the Tacoma Narrows Bridge disaster • Nevertheless, computer models & simulations are essential CS 100 - Lecture 27
Evaluating Models • How well is the underlying science understood? • What sorts of simplifying assumptions are made? • How well does the model agree with experimental results? CS 100 - Lecture 27
Computer Crime • Often just a new or “better” way to commit traditional crimes • Ampliative aspects of computer technology • may allow committing crimes on a larger scale • Reductive aspects of computer technology • may make it harder to detect crimes, identify criminals, etc. CS 100 - Lecture 27
Some Kinds of Computer Crime • Fraud, embezzlement & theft • Stealing (data) • “Hacking” (system cracking) • individual systems • the information infrastructure • benign hacking? • Viruses & worms: reproduce selves • virus: hides in another program • worm: an independent program CS 100 - Lecture 27
Constitutional & Civil Liberties Issues • 1st Amendment protects freedom of speech & press • 4th Amendment protects against unreasonable search & seizure • Do they apply to electronic & other new media? • So far, the courts generally have held them to apply, but there is much uncertainty CS 100 - Lecture 27
Communication Media • Is the operator of a communication medium responsible for the information it carries? • analogy: telephone companies & post office • analogy: a privately-owned meeting room • Can the operator restrict this information? • analogy: telephone companies & post office • analogy: private presses CS 100 - Lecture 27
Encryption & Wiretapping • Encryption can be used to ensure privacy & authenticity • may be used for legal/illegal purposes • May be subject to export restrictions • What provisions should be made for government interception & recording of communications? • What limits should be imposed on the government CS 100 - Lecture 27
These issues are especially relevant since passage of“USA PATRIOT” Act CS 100 - Lecture 27