Threats of Artificial Intelligence

with technology advancing and artificial intelligence developing, robots are becoming more exceptional and smarter. AI is quickly replacing many jobs and may even surpass humans in the future. Although it benefits many sectors, researching Ai safety is important as it could potentially undergo self-improvement, triggering an intelligence explosion leaving humans far behind. AI’s impact could be cataclysmic unless rapid development is strictly and ethically controlled.

Hence, today we will dive into the topic of artificial intelligence, how it was introduced, the remarkable benefits, and the existential risks we may face with its development. I will be introducing Artificial Intelligence briefly, then elaborating on its threats and dangers,

What is Artificial Intelligence?

Artificial intelligence consists of building intelligent machines capable of performing tasks that require human knowledge. Advancement in sectors like machine learning and computer science has enabled technology to progress in AI and deep learning of robots.AI is not an ordinary robot. they do not need to receive commands to operate and can operate autonomously, and they can learn and execute tasks independently. ( it has the character of a human)

some examples of artifical intelligence in our everyday life are:

  • smart assistants(Google, Siri)
  • Online shopping and personalized advertisements(cookies)
  • Smart homes and infrastructure in cities(using Ai to reduce traffic jams and smart devices that can control home)
  • Self-driving cars, cars that use Ai-powered safety functions.

Threats of Artificial Intelligence

However, although this brings many benefits, it also comes with costs and setbacks. The smarter machines become, the more they could expand their goals to do more complicated things, and move away from their job scope. Once computers can effectively reprogram and improve themselves, destructive superintelligence can escape our control to wreak havoc.

Here are some of the concerns and threats of artifical intelligence.

Examples

1. AI involving the use of autonomous weapons can result in AIs doing something devastating. (Military use of AI)

Three Groups of Threats from Lethal Autonomous Weapons Systems - Modern  Diplomacy

Autonomous weapons are autonomous military systems that can independently search and engage targets. humans could become arrogant and lose control of Ai in an arms race. Ai labs will feel increasing pressure to take shortcuts around safety precautions during an arms race, and these threats could become more dangerous.

Secondly,Ai requires no costly or hard-to-obtain raw materials, hence they will become notorious, fall into the hands of the wrong people, and be used against humans. these weapons could be hacked, which would enable assassinations and become weapons of oppression.

2. Privacy and ‘deepfakes’

Deepfakes, which is the use of digital alteration to imitate someone else in a video.

Deepfakes are typically maliciously used to spread false and bad information about someone, to manipulate society into thinking a politician or well-known person in society has spouted racist or sexist views when they never had any of these intentions. This could have devastating impacts on political campaigns. It may even cause political outrage and lead to high-ranking people being framed and possibly arrested for something they never did.

Other nefarous uses of deepfakes are:

  • -scams and hoaxes
  • identity theft and financial fraud
  • Social engineering

3.Job automation

with AI introduced, jobs involving repetitive and predictable tasks- disruption is well underway. Robots now overpower humans because of their productivity and accuracy, not needing energy, and are less prone to errors.

Here are jobs and sectors which are vulnerable to job automation.

Find Out How Likely Your Job Is to Be Automated | Fortune
credit: Fortune

As shown in statistics, the most vulnerable group is accommodation and food services. Delivery jobs, waiters, bellhops, and the front desk are repetitive jobs that involve little thinking and creativity. This is why lifelong continuous learning is vital.

Companies must upskill their employees as automation occurs. We have to understand that artificial intelligence is not stealing our jobs but helps to increase efficiency and improve the way we work. Hence, for humans and AI to both succeed, they must collaborate, humans excelling at creative thinking and have social connection skills, while AI helps to do the repetitive and boring work.

4.Accidents and physical safety concerns (Autonomous cars)

During testing and after the process, it is possible for errors and imperfections to appear, which may result in accidents. self-driving cars may malfunction and if the driver does not know how to troubleshoot the problems, it could pose an immediate risk to other drivers and the passenger.

Safety and ability of self-driving cars to avoid mistakes are the... |  Download Scientific Diagram
here are some concerns that consumers have about autonomous cars.

Hence, it will be more important for designers to prioritize safety over comfortability and rider preferences if they want to live up to the promise to be safer than human drivers.

Solutions and prevention of AI threats

1.Protect data and privacy (Digital Security)

Only the data types necessary to create the AI should be collected, and the data should be kept secure. penetration testing should be done to make sure that the data is protected well. If this data is breached, hackers can take control of the Ais and exploit these vulnerabilities.

2.Safety should be the first priority

Artificial Intelligence: The Challenge to Keep It Safe - Future of Life  Institute

When creating AI, producers should always ensure that their product is safe and tests should be done to make sure they meet the necessary safety requirements. They need to ensure they can recover from errors and can troubleshoot themselves if they face such circumstances.

3. Upskill and adapt

Ai is going to reform our world, and it’s going to change the way we do many things. Hence, for us to benefit and harvest its fruits, we need to ensure continuous learning and come up with new creative ideas. This will allow us to cooperate and work with AI, making our lives and the world better.

IT Careers: 10 Job Skills in High Demand This Year - InformationWeek

*Here is a challenge and action I have for you. During this quarantine and pandemic, upskill yourself and learn new skills(preferably technology-related). Learn about coding, ethical hacking, or learn about data science or machine learning. Start now, and I assure you these skills will benefit you in the future.

Conclusion

hence, AI is like a double-edged sword, and to harvest its full potential and benefits, we have to take preventive measures and find solutions to these threats. We also have to grow and adapt to the technological world, and this will allow us to appreciate AI, collaborating with it to solve more global issues and improve the effectiveness of our lives.

Credit to these websites:

https://www.skyfilabs.com/blog/difference-between-robotics-and-artificial-intelligence#:~:text=What%20is%20the%20basic%20difference,t%20need%20to%20be%20physical.

https://builtin.com/artificial-intelligence/risks-of-artificial-intelligence

Tagged : / / /

Internet safety/Cybersecurity

What is Internet Safety/Cybersecurity?

In simple terms, internet safety is defined as staying safe on the internet and protecting yourself from cyber threats or cyber harms. Cyber threats and cyber harms usually consist of protecting your personal information, protecting your identity on the internet, and unsafe communications or people that may even affect your well-being or health.

What are the risks and dangers on the internet?

The internet can be an unforgiving and treacherous place if we do not use it responsibly. Aside from the obvious risks such as grooming, cyberbullying, and scams, there are many others that are harder to spot and might be more convincing. given that now in this digital world, everyone has the ability to post whatever and do whatever they desire on the internet. Many turn to the internet instead as they remain anonymous and they are able to escape into an online world.

Here are some of the more common internet threats:

  • cyberbullying: this is basically bullying, but it takes place on the internet and on social media platforms instead.
  • scams/phishing: misleading or untruthful websites that get you to give out your private or personal information for a reason
  • grooming/cyber predators: pedophiles or sex offenders slowly manipulate you until you can be victimized and they gain your trust
  • oversharing private information on social media:this means that you share too much about personal information on the internet(such as where you live, the school you go to,e.t.c)
  • downloading dangerous malware/files:this is when you download either files or applications that contain viruses and can affect your computer

although i will not go in-depth into all of the internet threats, I want to share my experience on cyberbullying/grooming. this will be an example of how cyberbullying/grooming is like.

Blue Whale Challenge(My personal experience)

I was browsing on social media platforms when i suddenly got a message and a friend request from someone called “Jonathon Gallindo.”When i opened up the message, the person was asking me to play a game. Curious, i decided to continue to talk to him even though his profile picture and name were suspicious. When he asked me to play the “Blue Whale Challenge”,i decided to look it up on the web since i had never heard of it before.

I was shocked to find out that it was not an actual game meant for entertainment, but the objective of this game was to target young children and teenagers and make them commit suicide. It was named the blue whale challenge, as blue whales usually strand themselves at the beach or shore to die. Basically, the curator gives you 50 tasks to do over 50 days, and these are NOT normal tasks or even a game. They involve manipulating the victim slowly from a normal person to a depressed and suicidal one. The tasks include using a knife to make a cut in the victim’s arm, waking up at wee hours of the morning, or watching horror movies.

But why follow the curator’s tasks and instructions? Well, if the victim does not follow what the curator instructs him or her to do, they will post highly sensitive personal information on the internet, or threaten the victim that he will kill their family or kill the victim. And this leads me back to my point on why oversharing isn’t exactly the best idea.

New age of bullying,Trolling, Grooming, and Criminal Activity

many of us do not see the dark side of the internet, and all of the dangerous threats, risks, and dangers out there. The good news is, the criminal behind this has already been arrested and sentenced to prison. However, there are many impersonators of him still looking for children to cause harm.

How to be safe on the internet(Dos and Donts)

So, here are the solutions to those cyber threats and dangers.I mentioned a couple of points before stating some of the dangers and threats of using the internet.

1.Cyberbullying

Now, many teenagers and children do not know how to respond or react whenever they are being cyberbullied. i want to share some tips and what you should and should not do when you are being cyberbullied online.

1.Never or try not to respond or retaliate. In most cases, your response is what the aggresors are trying to achieve. Eventually, it will escalate and this will affect your mental health, and you may keep trying to retaliate at the suspect, which may eventually also turn you into a cyberbully.

2.Ignore or block and report the posts/aggresors. IF they keep spamming or try to get you to respond, or post something that may shame/aggravate you, just leave them alone and block or report them.
3. Like I mentioned before, never share your personal accounts/ passwords with anyone you don’t know online or even in real life. Someone could use your accounts to impersonate you and do something negative on your account- and this could lead you to be the one responsible for it.

4. Lastly, you want to report the incident to a trusted adult or your teacher.Save the evidence of the suspect cyberbullying as proof. They will know better on what to do and eventually will find the person responsible for this.

2.Scams/Phising( tries to obtain your personal banking/credit information)

Before we know how to protect ourselves against scams or phising attempts, we need to know how to recognise them first.

Phishing is basically disguising a website or an email as a legitimate letter to the victim, and the purpose of this message is to get the victim to click on the attachment so they can enter their personal banking details. Why should the victim follow up with this? Well, for example, they threaten the victim with a specific time limit to make them more anxious to get it done faster. Here is an example of a phishing scam.

The purpose of this email is to lead you into entering your personal details for a reason. Therefore, do not follow the instructions, and to avoid these phishing scams, always check the credibility of the website before proceeding to follow the instructions. There will also be no time limit for these types of cancellations for accounts, so it is likely that this is a scam or a phishing email. So in summary, when you get these types of emails, think logically and check the source, and if it sounds too true or exaggerated to be true, don’t follow what they say.

3.grooming/ oversharing on social media

I will talk about both points here as they are similar and oversharing usually leads to predators/pedophiles messaging you and then after you are groomed and victimized.

So first of all, how do we avoid or prevent ourselves from oversharing?

  1. Do not create too many accounts on many social media platforms
  2. DO not post or share about personal details( your location, the school you go to, your number, e.g)
  3. Try not to share too much about your life( keep yourself anonymous on social media)
  4. Turn your settings to only allow your friends to see your posts
  5. Be wary of who you talk to/ accept friend request to
  6. NEVER give out any personal details/ location to anyone you don’t know in person online(you never know who they may be)
  7. Use a VPN(Virtual Private Network) which will protect your IP address and this will protect you from hackers and scammers on social media

Conclusion

And with that, I conclude my blog today with the solutions and what you can do when you face these threats or dangers. The internet may be convenient and helpful for many, but we need to stay aware and avoid or prevent falling into these threats while we are browsing. I hope that you have learnt the dangers and threats on the internet today, and also know how to protect yourself and keep yourself safe on the internet. Let’s all use the internet responsibly and safely.

Tagged : /

Gender Inequality/Sexism

What is Gender Inequality?

Gender inequality is prejudice or discrimination based on a person’s gender. It has been linked to stereotypes and gender roles, and it includes the belief that one gender is intrinsically superior to another.

This can include the belief that gender is more superior to the other or more valuable than the other gender. For example, girls might be stereotyped to not go to school in some countries, and instead, they would stay at home to clean the house. Thus, these countries only allow the boys to go to school and the girls would have to stay at home to become housewives. Or we can stereotype that only girls can be nurses, but however,2 this is untrue, as there are also many male nurses.

thus in conclusion,gender inequality is legal, social and cultural situation in which sex and/or gender determine different rights and dignity for women and men, which are reflected in their unequal access to or enjoyment of rights, as well as the assumption of stereotyped social and cultural roles.

Gender discrimination(examples)

Gender discrimination describes the situation in which people are treated differently simply because they are of a different gender, rather than on their individual skills or capabilities.

Gender stereotypes at work and at school

Stereotypes are how societies expect people to act based on their gender. For example, girls should stay at home and help with housework and childcare, should dress modestly and not stay out late at night. People are often judged by how well they adhere to gender stereotypes.

These stereotypes can often bleed out into school and work, where girls are less likely to be encouraged into science and technology subjects or leadership roles, due to the perceived ‘male nature’ of these pursuits. Likewise, seemingly positive stereotypes and gender roles such as men being the ‘provider’ or ‘protector’ of the family, put an unnecessary burden on men and boys that could more positively be shared in an equal partnership.

These attitudes limit girls’ power by rendering them less able to help contribute to making the world around them a better place, as they do not have the same basic education as boys and thus, they are limited to contribute much to society.

Indirect discrimination

Indirect discrmination is not directly discriminating the person, but for example, have a rule,policy or practice that applies to all employees in the same way but disadvantages some because of their gender. Thus, the rules, policy or practice might benefit the other gender but disadvantages the other.

For example, there might be employers requiring all their employees to work full-time. However, a lot of women are usually the caretakers of their children, thus they might not e able to work full time unlike men as they are usually the housewives or caretakers of young adults, children or maybe even the elderly. This discriminates against one gender as it is unfair for that gender, and thus this disadvantages them.

Sex discrimination in employment and training


It is illegal for an employer to discriminate against you because of your sex. This includes all employers, no matter how few people they employ. Most workers, including employees, agency workers, trainees and those who are self-employed have protection from sex discrimination at work. This includes:

recruitment and selection
promotion
training, pay and benefits
redundancy and dismissal
terms and conditions of work
There are special rules to protect women who are pregnant or on maternity leave from discrimination at work.

Conclusion

gender inequality and gender discrimination is very much like racism, whereas racism includes stereotyping, judging and discriminating against someone because of their race or colour. The same goes for sexism, and people of a different gender are being discriminated unfairly and it is unequal for both genders. Let us treat both genders equally, and not based on stereotypes or judge by their gender.

Solutions(my opinion)

how to eliminate gender bias and gender discrimination in the workplace and workforce.

  1. start organizations to educate people about sexism before they go out in the workforce

people are taking initiatives to start organizations that educate the general public about sexism and its effects. They are educating businesses and companies to have policies that will benefit both genders, instead of ignoring the other gender. companies should also standardize pay and salaries for everyone. interviewers should also not stereotype person skills or background based on their gender. for example, we should not think that women are less capable and are weaker than men. we should give both genders equal opportunities in the workforce, and not limit them to a certain job or lower-paying positions.

2. governments should have policies and laws that punish people for sexism

gender discrimination is illegal in most countries, and many states and countries have laws that provide stronger protection to women from discrimination.