Lecture 27 4/19/04 22:09 Social Implications of Artificial Intelligence Lecture 27 Social & Legal Issues (S&G, ch. 14) 4/19/04 CS 100 - Lecture 27 1 4/19/04 Kismet (Brooks’ Lab, MIT) CS 100 - Lecture 27 2 Kismet (Brooks’ Lab, MIT) • Responds to a face with a happy expression • Responds to rapidly moving face with disgusted expression 4/19/04 CS 100 - Lecture 27 • Example of three-way conversational interaction 3 4/19/04 CS 100 - Lecture 27 4 Consider Computers that are More Intelligent than Humans Social Implications of AI • Suppose it’s impossible • Elimination of jobs • Replacing human judgment by machine judgment • Altering our understanding of ourselves – establishing this would require some kind of scientific proof that a computer cannot emulate a brain, or that a brain is not sufficient for intelligence – in either case, a major scientific breakthrough • Suppose it’s possible – could displace us in all intellectual activities – if we had nothing to do, what would it mean to be human? – would/should humans be obsolete? 4/19/04 CS 100 - Lecture 27 5 4/19/04 CS 100 - Lecture 27 6 1 Lecture 27 4/19/04 22:09 Promethean Fire • “All technology is non-neutral” • Computer technology has: Social & Legal Issues – social benefits – social costs • Often, issues are not peculiar to computers, but are amplified by computer technology • Sometimes problems arise from using computers as they are intended to be used 4/19/04 CS 100 - Lecture 27 7 4/19/04 Privacy • • • • CS 100 - Lecture 27 8 Uses of Personal Data Government databases (federal & state) Computer matching Computer profiling Open & closed files • Marketing • Decision making • Other uses: – secondary use – invisible information gathering – information from children • “Information underground” 4/19/04 CS 100 - Lecture 27 9 4/19/04 Protecting Privacy • • • • • Access control Audit trails Encryption Ethical use policies Informed consent 4/19/04 • • • • 10 Computer Error • • • • Regulation Ownership of data Contracts Markets, options & consumer pressure CS 100 - Lecture 27 CS 100 - Lecture 27 11 Overdependence on computers Major failures Lesser failures Limitations of computer simulation 4/19/04 CS 100 - Lecture 27 12 2 Lecture 27 4/19/04 22:09 Simulation & Models Evaluating Models • Recall our discussion of models: – a model is intended to address a certain class of questions or issues – models make simplifying assumptions • Recall the omission of aerodynamic stability from bridge models before the Tacoma Narrows Bridge disaster • Nevertheless, computer models & simulations are essential 4/19/04 CS 100 - Lecture 27 13 • Reductive aspects of computer technology • Viruses & worms: reproduce selves – may make it harder to detect crimes, identify criminals, etc. – virus: hides in another program – worm: an independent program 15 4/19/04 Constitutional & Civil Liberties Issues CS 100 - Lecture 27 16 Communication Media • 1st Amendment protects freedom of speech & press • 4th Amendment protects against unreasonable search & seizure • Do they apply to electronic & other new media? • So far, the courts generally have held them to apply, but there is much uncertainty CS 100 - Lecture 27 14 – individual systems – the information infrastructure – benign hacking? – may allow committing crimes on a larger scale 4/19/04 CS 100 - Lecture 27 • Fraud, embezzlement & theft • Stealing (data) • “Hacking” (system cracking) • Often just a new or “better” way to commit traditional crimes • Ampliative aspects of computer technology CS 100 - Lecture 27 4/19/04 Some Kinds of Computer Crime Computer Crime 4/19/04 • How well is the underlying science understood? • What sorts of simplifying assumptions are made? • How well does the model agree with experimental results? • Is the operator of a communication medium responsible for the information it carries? – analogy: telephone companies & post office – analogy: a privately-owned meeting room • Can the operator restrict this information? – analogy: telephone companies & post office – analogy: private presses 17 4/19/04 CS 100 - Lecture 27 18 3 Lecture 27 4/19/04 22:09 Encryption & Wiretapping • Encryption can be used to ensure privacy & authenticity – may be used for legal/illegal purposes • May be subject to export restrictions • What provisions should be made for government interception & recording of communications? • What limits should be imposed on the government 4/19/04 CS 100 - Lecture 27 19 4