From 035732392589177f9db46b65e20c0ceeddd99c77 Mon Sep 17 00:00:00 2001 From: kelleecawthorn Date: Fri, 7 Feb 2025 07:13:31 +0800 Subject: [PATCH] Add 'AI Pioneers such as Yoshua Bengio' --- AI-Pioneers-such-as-Yoshua-Bengio.md | 5 +++++ 1 file changed, 5 insertions(+) create mode 100644 AI-Pioneers-such-as-Yoshua-Bengio.md diff --git a/AI-Pioneers-such-as-Yoshua-Bengio.md b/AI-Pioneers-such-as-Yoshua-Bengio.md new file mode 100644 index 0000000..3b20cec --- /dev/null +++ b/AI-Pioneers-such-as-Yoshua-Bengio.md @@ -0,0 +1,5 @@ +
Artificial intelligence algorithms need large amounts of information. The methods used to obtain this data have actually raised issues about personal privacy, surveillance and [wiki-tb-service.com](http://wiki-tb-service.com/index.php?title=Benutzer:Milla01Z3855169) copyright.
+
AI-powered devices and services, such as virtual assistants and IoT items, constantly gather personal details, raising issues about invasive data gathering and unauthorized gain access to by 3rd parties. The loss of personal privacy is more intensified by AI's capability to procedure and integrate vast amounts of data, possibly leading to a security society where specific activities are constantly monitored and examined without sufficient safeguards or transparency.
+
Sensitive user information collected might include online activity records, geolocation data, video, or audio. [204] For example, in order to construct speech acknowledgment algorithms, Amazon has taped countless private conversations and enabled short-term employees to listen to and transcribe a few of them. [205] Opinions about this extensive monitoring range from those who see it as a needed evil to those for whom it is plainly unethical and an infraction of the right to privacy. [206] +
[AI](http://39.98.116.222:30006) developers argue that this is the only method to deliver valuable applications and have actually established a number of strategies that try to maintain privacy while still obtaining the information, such as data aggregation, de-identification and differential privacy. [207] Since 2016, some privacy specialists, such as Cynthia Dwork, have actually started to view personal privacy in terms of fairness. Brian Christian composed that specialists have rotated "from the question of 'what they know' to the question of 'what they're finishing with it'." [208] +
Generative AI is frequently trained on unlicensed copyrighted works, including in domains such as images or computer system code \ No newline at end of file