{"id":42213,"date":"2021-10-06T03:56:07","date_gmt":"2021-10-06T07:56:07","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=42213"},"modified":"2022-07-27T07:32:20","modified_gmt":"2022-07-27T11:32:20","slug":"ethical-ai-artificial-intelligence","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/ethical-ai-artificial-intelligence\/42213\/","title":{"rendered":"When AI goes low, go high: How ethical AI fights unethical AI"},"content":{"rendered":"<p>\u201cThis is the world now. Logged on, plugged in, all the time,\u201d said Jason Clarke in 2015 movie <a href=\"https:\/\/en.wikipedia.org\/wiki\/Terminator_Genisys\" target=\"_blank\" rel=\"noopener nofollow\">Terminator: Genisys<\/a> set in 2029. He might as well have been talking about today. Devices have become so integral that today\u2019s world wouldn\u2019t be possible without artificial intelligence (AI.) AI powers everything from smart homes to customer service to airport security.<\/p>\n<p>In Terminator, sentient artificial neural network Skynet sends robots back in time from 2029 to kill the humans who will, in the future, lead the resistance against it. Technology today might be quickly catching up to some aspects of Terminator\u2019s fictional 2029, but AI experts say we\u2019re a long way from evil, self-aware humanoid robots taking over the world. AI coming close to human intelligence is such a long way off that CEO of Allen Institute for Artificial Intelligence Oren Etzioni says it\u2019s \u201c<a href=\"https:\/\/www.nbcnews.com\/science\/science-news\/terminator-35-how-ai-militarization-tech-has-evolved-n1068771\" target=\"_blank\" rel=\"noopener nofollow\">like being worried about overpopulation on Mars before we even have gotten a person on Mars<\/a>.\u201d<\/p>\n<p>But there\u2019s more to AI than what science fiction shows us. Surveillance and <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/machine-learning-ai-cybersecurity\/32188\/\" target=\"_blank\" rel=\"noopener nofollow\">cybercrime applications of AI<\/a> are concerning, but <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/machine-learning-ai-cybersecurity\/32188\/\" target=\"_blank\" rel=\"noopener nofollow\">AI can also strengthen systems<\/a> and improve data privacy. Like in Terminator, real-life AI can be ethical or unethical.<\/p>\n\t\t\t<div class=\"c-promo-product\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/video-series\/can-machines-outsmart-us\/41235\/%20\" class=\"c-promo-product__figure\">\n\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/09\/30041634\/Fast_Forward_podcast_logo_PSD_ver_2usethis_xgtgyh_300x300.jpg\" class=\"attachment-card-default size-card-default\" alt=\"\" data-src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/09\/30041634\/Fast_Forward_podcast_logo_PSD_ver_2usethis_xgtgyh_300x300.jpg\" data-srcset=\"\" srcset=\"\">\t\t\t\t<\/a>\n\t\t\t\t\t\t<article class=\"c-card c-card--link c-card--medium@sm c-card--aside-hor@lg\">\n\t\t\t\t<div class=\"c-card__body  \">\n\t\t\t\t\t<header class=\"c-card__header\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"c-card__headline\">Fast Forward audio series<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"c-card__title \"><span>Can machines outsmart us?<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t\t\t<\/header>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"c-card__desc \">\n\t\t\t\t\t\t\t<p>Are we capable of telling machines apart from humans? Some evidence suggests we\u2019re surprisingly easy to fool.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"c-card__aside\">\n\t\t\t\t\t<a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/video-series\/can-machines-outsmart-us\/41235\/%20\" class=\"c-button c-card__link\" target=\"_blank\" rel=\"noopener nofollow\">Listen now<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/article>\n\t\t<\/div>\n\t\n<h2>How can AI be ethical?<\/h2>\n<p>As well as keeping databases and systems safe, ethical AI can influence human behavior, \u2018<a href=\"https:\/\/en.wikipedia.org\/wiki\/Nudge_theory\" target=\"_blank\" rel=\"noopener nofollow\">nudging<\/a>\u2018 people to make better decisions.<\/p>\n<p>Geoff Webb, vice president for solutions, product and marketing strategy at AI-enabled payroll firm <a href=\"https:\/\/www.isolvedhcm.com\/\" target=\"_blank\" rel=\"noopener nofollow\">isolved<\/a>, says, \u201cWe should expect to see greater use of AI not only to protect privacy, but to enhance ethical behavior. A good example is the use of AI to evaluate things like diversity and inclusion within a business. We\u2019ll see AI moving from protecting data to helping us see what that data means.\u201d<\/p>\n<blockquote><p>If ethical AI can nudge us to make better decisions, nefarious AI could nudge us into making unethical decisions.<\/p>\n<\/blockquote>\n<p>\u201cBusinesses are looking to implement machine learning which gives them a smart, efficient and effective way of querying all of the data they hold about people and chop that data up in various ways that can be useful to them. But we need to recognize criminals can also make use of this,\u201d says David Emm, Principal Security Researcher at Kaspersky in audio series <a href=\"https:\/\/www.tomorrowunlocked.com\/fast-forward-audio-4-intelligence\" target=\"_blank\" rel=\"noopener nofollow\">Fast Forward by Tomorrow Unlocked<\/a>.<\/p>\n<h2>Anonymizing and analyzing data more privately<\/h2>\n<p>Companies collect mountains of data going about their business, and each of us generates data when we check a message from a friend, browse the internet or use an app to check the weather. Some of that data will be sensitive and confidential. To analyze that data, someone\u2019s had to look at it. But AI might be able to fix that.<\/p>\n<p>AI models can scrub data of identifying characteristics and draw conclusions from large data sets. Francesco Di Cerbo, AI privacy research lead at SAP Security Research, said, \u201cIt\u2019s like looking at blurred shadows of people. We can still see how many there are, their heights and postures, but not their faces. We can extract information like average and distribution of heights, but it will be hard to identify them. For example, an AI technique like Named Entity Recognition (NER) can detect a date in a sentence, but it might be an invoice date or birth date. Our models must know if that date is personal information. Once different pieces of information are detected in a sentence, we proceed to anonymization.\u201d<\/p>\n<blockquote><p>Using AI tools to anonymize data keeps it safe from inadvertent human slips or breaches. \u201cWell-written AI tools don\u2019t get distracted, share data when they shouldn\u2019t or forget to delete sensitive data, but people do, all the time,\u201d says Webb.<\/p>\n<\/blockquote>\n<h2>Humans make mistakes. AI (mostly) doesn\u2019t.<\/h2>\n<p>The weakest points of a database are always those where humans are involved. A Kaspersky survey found <a href=\"https:\/\/www.kaspersky.com\/blog\/the-human-factor-in-it-security\/\" target=\"_blank\" rel=\"noopener nofollow\">46 percent of security incidents that led to business data being exposed were linked to employee error<\/a>.<\/p>\n<p>AI could mean human operators don\u2019t need to see sensitive data, giving the processing and sharing of data stronger privacy and security.<\/p>\n<p>\u201cAI tools can operate on the data without exposing it to humans. Analysis within platform means reduced risk of someone needing to copy it or print it, or accidentally exposing it,\u201d says Webb. \u201cIf the platform is secure, granting an AI tool access is often less risky than a human pawing through the data.\u201d<\/p>\n<p>AI can\u2019t be bribed into revealing healthcare data or details of a celebrity\u2019s divorce proceedings, for instance. It doesn\u2019t leave <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/digital-clutter-data-management\/28023\/\" target=\"_blank\" rel=\"noopener nofollow\">sensitive data sitting around on a desk or unsecured device<\/a>.<\/p>\n<h2>Ethical AI in cybersecurity<\/h2>\n<p>In 1999, a <a href=\"https:\/\/abcnews.go.com\/Technology\/story?id=119423&amp;page=1\" target=\"_blank\" rel=\"noopener nofollow\">15-year-old hacked into NASA with the US Department of Defense<\/a>, downloading software worth 1.7 million US dollars and shutting systems down for three weeks. Over two decades later, security systems are more sophisticated and harder to break into, but cybercriminals are smarter too. The days of teenagers hacking into government databases are gone \u2013 cyberattacks today are dynamic and customized.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-large wp-image-42218\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/09\/30042059\/244_ethical_data_AI_privacy_inline-1024x768.jpg\" alt=\"ethical data AI privacy\" width=\"1024\" height=\"768\">Traditional security can fail against targeted attacks, but AI can strengthen fortifications and respond more effectively to phishing attacks or breaches. Di Cerbo says, \u201cAutomatic defense approaches using AI are highly effective.\u201d AI is especially effective in password protection and user authentication.<\/p>\n<p>Defensive AI can rapidly detect and contain any emerging cyberthreats, and it\u2019s the best way to fight back when AI is part of the attack method. According to Capgemini\u2019s report <a href=\"https:\/\/www.capgemini.com\/research\/reinventing-cybersecurity-with-artificial-intelligence\/\" target=\"_blank\" rel=\"noopener nofollow\">AI in Cybersecurity<\/a>, hackers use AI for more sophisticated attacks, including <a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/spear-phishing\" target=\"_blank\" rel=\"noopener nofollow\">spear phishing<\/a> Tweets \u2013 personalized Twitter messages sent to targeted users tricking them into sharing sensitive information. AI can send Tweets six times faster than a human, with twice the success. But while AI can be used for foul play, it also deters these attacks. \u201cAlongside traditional methods, AI is a powerful tool for protecting against cybersecurity attacks,\u201d says Capgemini.<\/p>\n<h2>AI can\u2019t do everything, but its potential is great<\/h2>\n<p>AI is far from an alternative to all human oversight. AI programs have famously replicated human biases \u2013 from <a href=\"https:\/\/news.mit.edu\/2018\/study-finds-gender-skin-type-bias-artificial-intelligence-systems-0212\" target=\"_blank\" rel=\"noopener nofollow\">facial recognition systems not recognizing People of Color<\/a> to <a href=\"https:\/\/www.reuters.com\/article\/us-amazon-com-jobs-automation-insight-idUSKCN1MK08G\" target=\"_blank\" rel=\"noopener nofollow\">AI recruitment tools not wanting to hire women<\/a>.<\/p>\n<p>But well-designed AI can create a more secure online world, keep data safe and nudge humans towards <a href=\"https:\/\/theconversation.com\/ai-can-now-learn-to-manipulate-human-behaviour-155031\" target=\"_blank\" rel=\"noopener nofollow\">more ethical behavior<\/a>. \u201cSecurity, privacy and compliance will remain business challenges because the counter-pressures are always changing \u2013 hackers develop new tools, new privacy expectations and legislation evolve,\u201d says Webb.<\/p>\n<p>\u201cWhile businesses could try to manage these risks without AI, it would be complex and expensive. And the more humans involved in processes, the more likely human error or malicious activity will result in a breach,\u201d Webb continues. \u201cAI tools can\u2019t do everything, but they can deliver better insight more quickly and with less risk of expensive and ugly data exposure.\u201d<\/p>\n<p>US technology historian <a href=\"https:\/\/en.wikipedia.org\/wiki\/Melvin_Kranzberg\" target=\"_blank\" rel=\"noopener nofollow\">Melvin Kranzberg<\/a>\u2018s first law of technology famously says, \u201cTechnology is neither good nor bad, nor is it neutral.\u201d There may be no greater example of a technology more often called good, bad and non-neutral than AI, and perhaps fairly. So AI is what tech has always been.<\/p>\n<p>As in Terminator: Genysis, when good AI robots battle bad AI robots to save humans, today we see AI on both sides of the ethical fence. Using this power wisely isn\u2019t a question of if we use it, but how.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>AI is much maligned for its many nefarious uses, but where AI can be a problem, it may also be a solution.<\/p>\n","protected":false},"author":2644,"featured_media":42214,"template":"","coauthors":[4159],"class_list":{"0":"post-42213","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-artificial-intelligence","7":"emagazine-category-data-and-privacy","8":"emagazine-tag-data-privacy","9":"emagazine-tag-ethics"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/ethical-ai-artificial-intelligence\/42213\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/ethical-ai-artificial-intelligence\/25543\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/42213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2644"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/42214"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=42213"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=42213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}