Computer ethics In AI

Commandment 1: Thou shalt not use a computer to harm other people: If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other people’s books and notebooks, it is equally bad to access and destroy their files

Commandment 4: Thou shalt not use a computer to steal: Using a computer to break into the accounts of a company or a bank and transferring money should be judged the same way as robbery. It is illegal and there are strict laws against it.

(computer skills and research class DMUIC,  2022)


(Ucl, 2022)

The commandments above are linked to what hackers or people with terrible intentions could use Artificial Intelligence to do. Although all the ten commands are important and no single one is more important the other. This blog would mainly discuss on the three above.

There a number of ways in which artificial intelligence could be prone to tactful meddling which can use its features for criminal activities. These Include:

Compromising machine logic: AI can be prone to interferance from external efforts. Hackers can compromise the machine logic that powers the AI causing to not work effectively which could cause harm. For instance, in an industrial environment where AI might be tasked to carry out the monitoring of state of the equipment. It could malfunction and can lead to devastating results.

The use of reverse engineer algorithms: Given enough time hackers could expose the datasets used t train AI. hackers can use this has leverage to gain undisclosed information on markets, governments or general consumers, or they could cause the AI to malfunction

Learning about intended targets: The ability of AI to use data points, behavior or temperament to make judgement on a person's intention just from the way they type on a keyboard can be useful to cybersecurity teams by helping to spot out potential threats or cybercriminals. But in the hands of a hacker it could enable them prey people vulnerable to phishing and scams.

Probing network vulnerability: Cybersecurity personnels use AI to uncover vulnerabilities or potential weaknesses in networks or its security faster and more accurate than humans to prevent any damage to its artichetectural integrity. In the hand of a hacker who is excellent in his craft can use the same AI to spot out any weakness faster and more effectively than the human IT specialists can.

(Amos, 2022)









References

Amos, Z. (2022) How hackers are wielding Artificial Intelligence, Unite.AI. Available at: https://www.unite.ai/how-hackers-are-wielding-artificial-intelligence/ (Accessed: October 24, 2022)

Ucl (2022) UCL Medical School. Available at: https://www.ucl.ac.uk/medical-school/ (Accessed: October 29, 2022).



Comments

Popular posts from this blog

Software Overview- Visual studio code