Lecture 27 Social Implications of Artificial Intelligence Kismet (Brooks’ Lab, MIT)

advertisement
Lecture 27
4/19/04 22:09
Social Implications of
Artificial Intelligence
Lecture 27
Social & Legal Issues
(S&G, ch. 14)
4/19/04
CS 100 - Lecture 27
1
4/19/04
Kismet (Brooks’ Lab, MIT)
CS 100 - Lecture 27
2
Kismet (Brooks’ Lab, MIT)
• Responds to a face
with a happy
expression
• Responds to rapidly
moving face with
disgusted expression
4/19/04
CS 100 - Lecture 27
• Example of three-way
conversational
interaction
3
4/19/04
CS 100 - Lecture 27
4
Consider Computers that are
More Intelligent than Humans
Social Implications of AI
• Suppose it’s impossible
• Elimination of jobs
• Replacing human judgment by machine
judgment
• Altering our understanding of ourselves
– establishing this would require some kind of scientific
proof that a computer cannot emulate a brain, or that a
brain is not sufficient for intelligence
– in either case, a major scientific breakthrough
• Suppose it’s possible
– could displace us in all intellectual activities
– if we had nothing to do, what would it mean to be
human?
– would/should humans be obsolete?
4/19/04
CS 100 - Lecture 27
5
4/19/04
CS 100 - Lecture 27
6
1
Lecture 27
4/19/04 22:09
Promethean Fire
• “All technology is non-neutral”
• Computer technology has:
Social & Legal Issues
– social benefits
– social costs
• Often, issues are not peculiar to computers,
but are amplified by computer technology
• Sometimes problems arise from using
computers as they are intended to be used
4/19/04
CS 100 - Lecture 27
7
4/19/04
Privacy
•
•
•
•
CS 100 - Lecture 27
8
Uses of Personal Data
Government databases (federal & state)
Computer matching
Computer profiling
Open & closed files
• Marketing
• Decision making
• Other uses:
– secondary use
– invisible information gathering
– information from children
• “Information underground”
4/19/04
CS 100 - Lecture 27
9
4/19/04
Protecting Privacy
•
•
•
•
•
Access control
Audit trails
Encryption
Ethical use policies
Informed consent
4/19/04
•
•
•
•
10
Computer Error
•
•
•
•
Regulation
Ownership of data
Contracts
Markets, options &
consumer pressure
CS 100 - Lecture 27
CS 100 - Lecture 27
11
Overdependence on computers
Major failures
Lesser failures
Limitations of computer simulation
4/19/04
CS 100 - Lecture 27
12
2
Lecture 27
4/19/04 22:09
Simulation & Models
Evaluating Models
• Recall our discussion of models:
– a model is intended to address a certain class of
questions or issues
– models make simplifying assumptions
• Recall the omission of aerodynamic
stability from bridge models before the
Tacoma Narrows Bridge disaster
• Nevertheless, computer models &
simulations are essential
4/19/04
CS 100 - Lecture 27
13
• Reductive aspects of computer technology
• Viruses & worms: reproduce selves
– may make it harder to detect crimes, identify
criminals, etc.
– virus: hides in another program
– worm: an independent program
15
4/19/04
Constitutional & Civil Liberties
Issues
CS 100 - Lecture 27
16
Communication Media
• 1st Amendment protects freedom of speech
& press
• 4th Amendment protects against
unreasonable search & seizure
• Do they apply to electronic & other new
media?
• So far, the courts generally have held them
to apply, but there is much uncertainty
CS 100 - Lecture 27
14
– individual systems
– the information infrastructure
– benign hacking?
– may allow committing crimes on a larger scale
4/19/04
CS 100 - Lecture 27
• Fraud, embezzlement & theft
• Stealing (data)
• “Hacking” (system cracking)
• Often just a new or “better” way to commit
traditional crimes
• Ampliative aspects of computer technology
CS 100 - Lecture 27
4/19/04
Some Kinds of Computer Crime
Computer Crime
4/19/04
• How well is the underlying science
understood?
• What sorts of simplifying assumptions are
made?
• How well does the model agree with
experimental results?
• Is the operator of a communication medium
responsible for the information it carries?
– analogy: telephone companies & post office
– analogy: a privately-owned meeting room
• Can the operator restrict this information?
– analogy: telephone companies & post office
– analogy: private presses
17
4/19/04
CS 100 - Lecture 27
18
3
Lecture 27
4/19/04 22:09
Encryption & Wiretapping
• Encryption can be used to ensure privacy &
authenticity
– may be used for legal/illegal purposes
• May be subject to export restrictions
• What provisions should be made for
government interception & recording of
communications?
• What limits should be imposed on the
government
4/19/04
CS 100 - Lecture 27
19
4
Download