Training Robots & Human Bias

Robotic development is creating the construction, operation and design of these new robotic computer systems which can substitute and replicate human actions. From science fiction, to cinema and, to working next to us in the workplace, and perhaps, soon, even driving us home from the office, robots have been steadily advancing into our everyday lives.

This development is constantly going forward but often unintended human input courses problems with the robotic outcome. Ayanna Howard is Professor and chair of the school of interactive computing at Georgia Institute of Technology and a self-proclaimed “roboticist extraordinaire.” 

Howard said she feels it is important for people to manage their expectations when it comes to robots as many have the view that they should be infallible. 

“Somehow we believe that robots will be smarter than they are, and not have any mistakes, but how many times have you had to reset your phone or your computer? Technology is not perfect and these robots will not be either.”

Howard made clear that robots inherit flaws from the humans who create them and the data they are programmed with. “We train these robots based on human values, human concepts, human data, human understanding but it also means that all of our historical biases are put into the machine,” she said.

As a robotic programmer she collects data and analyses it for healthcare and models clinicians and doctors.

“If the historical data is wrong and I’m doing it right then my robot is doing exactly what it is supposed to do. It has that inaccuracy but if the data is wrong because we as humans have been doing things wrong, my system doesn’t know,” 

This statement sounds almost like a call to get more domain expertise into the programming stage so that biased, erroneous or problematic data can be highlighted and eradicated or counteracted before it is programmed into the robot. This could happen through the roboticists embedding with the clinicians and doctors to get a thorough understanding of what good looks like and bring that back to the lab. 

Alternatively, a clinician could work with the roboticists in the lab to highlight and correct any errors or mistakes that they see.
Howard also called on the public to keep roboticists and programmers in check by pushing back on questionable or problematic developments. She gave the example of one robotics company that proclaimed to come out with a robot that would teach children manners. However, there was a strong reaction from parents who made it clear manners are imbued with values and it was not the place of a commercial company to instill values in their children.

Prof. Howard believes robotics is an exciting area to work in because there is a universal fascination with robotics and everyone from the very young to very old has an opinion about robots and most has their favourite one. That could be Wall-e, iRobot or Terminator. 

DataIQ:

You Might Also Read: 

Next-Gen Robotic Process Automation Leverages AI And Machine Learning:

 

 

« N. Korea’s Hackers Stole $2b To Fund Its Missile Program
Webinar: How to Build a Threat Detection Strategy in AWS »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

National Authority Against Electronic Attacks (NAAEA) - Greece

National Authority Against Electronic Attacks (NAAEA) - Greece

The National Authority Against Electronic Attacks (NAAEA) is the national computer emergency response team of Greece.

Fluency Security

Fluency Security

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

Redjack

Redjack

Redjack is a cutting-edge network analytics company focused on enterprise and ISP security and intelligence solutions.

Nexus Group

Nexus Group

Nexus Group develops identity solutions for physical and digital access.

Hudson Cybertec

Hudson Cybertec

Hudson Cybertec are an internationally recognized Subject Matter Expert for cyber security in the Industrial Automation & Control Systems (IACS) domain.

EYE Security

EYE Security

EYE provides enterprise-grade cyber security services and cyber insurance to SMEs in Europe, Cyber Incident Response and strategic advice in board rooms.

Emtec

Emtec

Emtec’s cyber security team provides advisory, assessment, & managed security services that help you build the cyber security policies, toolsets & best practices to elevate your cyber security posture

Phronesis Security

Phronesis Security

Phronesis Security is committed to delivering world-class cyber security consulting with a tangible social and environmental impact.

Secrutiny

Secrutiny

Scrutiny's core services include Cyber Maturity, Cyber Risk Analyser, Cyber Controls, Incident Response, SOC, Cyber Recovery and Assurance Testing.

BAE Systems

BAE Systems

BAE Systems develop, engineer, manufacture, and support products and systems to deliver military capability, protect national security, and keep critical information and infrastructure secure.

AWARE7

AWARE7

IT security for human and machine. With the help of our products and services, we work with you to increase the IT security level of your organization.

Anura

Anura

The world’s most accurate ad fraud solution protects your web assets by eliminating bots, malware and human fraud, ensuring your content is seen by real people.

Allure Security

Allure Security

Allure Security AI-driven brand protection scans more of the online world for faster, more accurate detection & removal of spoof websites, social media & mobile apps -- before customers fall victim.

SecurWeave

SecurWeave

SecurWeave's Configurable Hardware Enforced Safety and Security (CHESS) platform has been designed to meet the security and safety criticality needs of the evolving digital industry.

Barquin Solutions

Barquin Solutions

Barquin Solutions is a full-service information technology consulting firm focused on supporting U.S. federal government agencies and their partners.

Baselime

Baselime

Baselime, the cloud-native observability platform. Resolve issues in your cloud application before they become problems.