Training Robots & Human Bias

Robotic development is creating the construction, operation and design of these new robotic computer systems which can substitute and replicate human actions. From science fiction, to cinema and, to working next to us in the workplace, and perhaps, soon, even driving us home from the office, robots have been steadily advancing into our everyday lives.

This development is constantly going forward but often unintended human input courses problems with the robotic outcome. Ayanna Howard is Professor and chair of the school of interactive computing at Georgia Institute of Technology and a self-proclaimed “roboticist extraordinaire.” 

Howard said she feels it is important for people to manage their expectations when it comes to robots as many have the view that they should be infallible. 

“Somehow we believe that robots will be smarter than they are, and not have any mistakes, but how many times have you had to reset your phone or your computer? Technology is not perfect and these robots will not be either.”

Howard made clear that robots inherit flaws from the humans who create them and the data they are programmed with. “We train these robots based on human values, human concepts, human data, human understanding but it also means that all of our historical biases are put into the machine,” she said.

As a robotic programmer she collects data and analyses it for healthcare and models clinicians and doctors.

“If the historical data is wrong and I’m doing it right then my robot is doing exactly what it is supposed to do. It has that inaccuracy but if the data is wrong because we as humans have been doing things wrong, my system doesn’t know,” 

This statement sounds almost like a call to get more domain expertise into the programming stage so that biased, erroneous or problematic data can be highlighted and eradicated or counteracted before it is programmed into the robot. This could happen through the roboticists embedding with the clinicians and doctors to get a thorough understanding of what good looks like and bring that back to the lab. 

Alternatively, a clinician could work with the roboticists in the lab to highlight and correct any errors or mistakes that they see.
Howard also called on the public to keep roboticists and programmers in check by pushing back on questionable or problematic developments. She gave the example of one robotics company that proclaimed to come out with a robot that would teach children manners. However, there was a strong reaction from parents who made it clear manners are imbued with values and it was not the place of a commercial company to instill values in their children.

Prof. Howard believes robotics is an exciting area to work in because there is a universal fascination with robotics and everyone from the very young to very old has an opinion about robots and most has their favourite one. That could be Wall-e, iRobot or Terminator. 

DataIQ:

You Might Also Read: 

Next-Gen Robotic Process Automation Leverages AI And Machine Learning:

 

 

« N. Korea’s Hackers Stole $2b To Fund Its Missile Program
Webinar: How to Build a Threat Detection Strategy in AWS »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CERT-MU

CERT-MU

CERT-MU is the Mauritian National Computer Security Incident Response Team.

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

Cyber Security Academy - University of Southampton

Cyber Security Academy - University of Southampton

An industry/University partnership established to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.

Convercent

Convercent

We offer comprehensive and integrated compliance management, reporting, and analytics. A 360-degree view of compliance drives efficiency by aligning initiatives and data into a single dashboard.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

Pryv

Pryv

Pryv is a Swissmade software for privacy, personal data collection, usage, sharing and storage.

PhishX

PhishX

PhishX is a SaaS platform for security awareness that simulates Cyberthreats, train people, while measure and analysis results, reducing Cybersecurity risks for People and Companies.

DANAK

DANAK

DANAK is the national accreditation body for Denmark. The directory of members provides details of organisations offering certification services for ISO 27001.

Cybersecurity Collaboration Forum

Cybersecurity Collaboration Forum

The mission of the Cybersecurity Collaboration Forum is to foster information security communication and idea sharing across the C-Suite, enabling leaders to better protect their enterprises.

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

TROOPERS

TROOPERS

TROOPERS InfoSec event consists of two days of high-end training, followed by a two-day, three-track conference, culminating in Roundtables on the final day.

OXO Cybersecurity Lab

OXO Cybersecurity Lab

OXO Cybersecurity Lab is the first dedicated cybersecurity incubator in the Central & Eastern Europe region.

Crosspring

Crosspring

Crosspring is an incubator/accelerator for people who have the ambition to start a successful business or want to extend their existing business in the areas of FinTech, AR, VR, Cybersecurity and SaaS

TheGreenBow

TheGreenBow

TheGreenBow is a trusted VPN software company. We help organizations and individuals become cyber-responsible. For this, we design and develop reliable and easy-to-use solutions.

Infiot

Infiot

Infiot is a pioneer in enabling secure, reliable access with zero trust security, network optimization, edge-intelligence and AI driven operations for all remote users, devices, sites and cloud.

One82

One82

Serving emerging small and medium-sized businesses in California and neighboring regions for over 20 years, One82 has established itself as the most dependable provider of IT support services.