Parker Gray
NMD 200
October 26, 2022
Task 5 – ‘Critical Issues In AI Today’

Artificial Intelligence and Machine Learning is a topic evolving at an exponential rate, with the introduction of generation-based AI software such as DALL-E being put in the spotlight for its controversial yet groundbreaking advancements, it does beg the question, what are the most critical issues in Artificial Intelligence today? What can we do to prevent these issues from evolving just as fast as the software itself?
The Center for International Governance Innovation (C.I.G.I), brings up a valid point of “big data”, this meaning the unprecedented size of modern data sets, i.e youtube, which gains an average of 400 hours of new video content each minute. CIGI states that these massive data sets will eventually have to be fully driven by AI, and Machine-learning algorithms, that divide all the content up into digestible bites that it has predetermined that the individual will enjoy. They state, “For instance, researchers have trained computer models to identify an individual’s personality traits more accurately than their friends based exclusively on what Facebook posts they had liked.”(C.I.G.I)
CIGI also tackles the point of cyberattacks, and how the evolution of AI/Machine Learning, will also constitute an equal amount of evolution for those who wish to use it for personal gain. Cyberattacks / cybersecurity will evolve not only together, but exponentially bouncing off each other until cyber hostility is deemed obsolete. Not only this, but the ‘new value of data’ constitutes not only theft, but modification of assets/algorithms. CIGI states, “While some cyber attacks aim solely to disrupt, inflict damage or wreak havoc, many intend to capture strategic assets such as intellectual property. Increasingly, aggressors in cyberspace are playing a long-term game, looking to acquire data for purposes yet unknown. The ability of AI systems to make use of even innocuous data is giving rise to the tactic of “data hoovering” — harvesting whatever information one can and storing it for future strategic use, even if that use is not well defined at present.”(C.I.G.I)
Works Cited
- Robert Fay, Wallace Trenholm. “The Cyber Security Battlefield.” Centre for International Governance Innovation, 2 Apr. 2019, https://www.cigionline.org/articles/cyber-security-battlefield/?utm_source=google_ads&utm_medium=grant&gclid=Cj0KCQjwteOaBhDuARIsADBqRei2rQz0LOfggwGsfQp4bew4IEy3C7NpVcx3U8lngD-dsaxaS-hcrQkaAm8PEALw_wcB.
You must be logged in to post a comment.