Training Robots & Human Bias

Robotic development is creating the construction, operation and design of these new robotic computer systems which can substitute and replicate human actions. From science fiction, to cinema and, to working next to us in the workplace, and perhaps, soon, even driving us home from the office, robots have been steadily advancing into our everyday lives.

This development is constantly going forward but often unintended human input courses problems with the robotic outcome. Ayanna Howard is Professor and chair of the school of interactive computing at Georgia Institute of Technology and a self-proclaimed “roboticist extraordinaire.” 

Howard said she feels it is important for people to manage their expectations when it comes to robots as many have the view that they should be infallible. 

“Somehow we believe that robots will be smarter than they are, and not have any mistakes, but how many times have you had to reset your phone or your computer? Technology is not perfect and these robots will not be either.”

Howard made clear that robots inherit flaws from the humans who create them and the data they are programmed with. “We train these robots based on human values, human concepts, human data, human understanding but it also means that all of our historical biases are put into the machine,” she said.

As a robotic programmer she collects data and analyses it for healthcare and models clinicians and doctors.

“If the historical data is wrong and I’m doing it right then my robot is doing exactly what it is supposed to do. It has that inaccuracy but if the data is wrong because we as humans have been doing things wrong, my system doesn’t know,” 

This statement sounds almost like a call to get more domain expertise into the programming stage so that biased, erroneous or problematic data can be highlighted and eradicated or counteracted before it is programmed into the robot. This could happen through the roboticists embedding with the clinicians and doctors to get a thorough understanding of what good looks like and bring that back to the lab. 

Alternatively, a clinician could work with the roboticists in the lab to highlight and correct any errors or mistakes that they see.
Howard also called on the public to keep roboticists and programmers in check by pushing back on questionable or problematic developments. She gave the example of one robotics company that proclaimed to come out with a robot that would teach children manners. However, there was a strong reaction from parents who made it clear manners are imbued with values and it was not the place of a commercial company to instill values in their children.

Prof. Howard believes robotics is an exciting area to work in because there is a universal fascination with robotics and everyone from the very young to very old has an opinion about robots and most has their favourite one. That could be Wall-e, iRobot or Terminator. 

DataIQ:

You Might Also Read: 

Next-Gen Robotic Process Automation Leverages AI And Machine Learning:

 

 

« N. Korea’s Hackers Stole $2b To Fund Its Missile Program
Webinar: How to Build a Threat Detection Strategy in AWS »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

AtkinsRéalis

AtkinsRéalis

AtkinsRealis is a market-leading design, engineering and project management consultancy operating in fields ranging from infrastructure, through energy and transport to cybersecurity.

Information Security Media Group (ISMG)

Information Security Media Group (ISMG)

Information Security Media Group is the world’s largest media organization devoted solely to information security and risk management.

Brit

Brit

Brit PLC is a market-leading global specialty insurer and reinsurer, focused on underwriting complex risks including cyber, privacy and technology.

Cyber Security & Information Systems Information Analysis Center (CSIAC)

Cyber Security & Information Systems Information Analysis Center (CSIAC)

CSIAC is chartered to leverage best practices and expertise from government, industry, and academia on cyber security and information technology.

SAASPASS

SAASPASS

SAASPASS is a full-stack identity and access management solution, a single product which allows you to manage all your digital and physical access needs securely and conveniently.

Plurilock Security Solutions

Plurilock Security Solutions

Plurilock is a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

Global Cyber Alliance (GCA)

Global Cyber Alliance (GCA)

Global Cyber Alliance is an international, cross-sector effort dedicated to eradicating cyber risk and improving our connected world.

Center for Cyber & Homeland Security (CCHS)

Center for Cyber & Homeland Security (CCHS)

The Center for Cyber and Homeland Security at Auburn University is a nonpartisan think tank that works to develop innovative strategies to address current and future threats to the United States.

Qmulos

Qmulos

Qmulos’ real-time continuous monitoring risk management suite, Q-Compliance, provides a massively flexible and scalable solution to optimizing operational security.

CloudBolt Software

CloudBolt Software

CloudBolt provide solutions for your toughest cloud challenges. From automation, to cost and security, and hybrid IT governance — we have you covered.

Cybrella

Cybrella

Cybrella offers professional cybersecurity services for small to medium sized businesses and to larger enterprises looking to expand their cybersecurity capabilities.

MindWise

MindWise

MindWise is a comprehensive global threat monitoring solution with implementations for fraud prevention and enterprise threat intelligence.

Buguard

Buguard

Buguard is a multi-award-winning supplier of Application Security Assessments and GRC services.

Robosoft Technologies

Robosoft Technologies

Robosoft Technologies is a full-service digital transformation partner. We provide end-to-end digital transformation services in areas including cybersecurity.

S4E (Security for Everyone)

S4E (Security for Everyone)

At S4E.io, our mission is to democratize digital security, making it accessible, simple, and effective for individuals and businesses of all sizes.