Using AI In Classrooms Is A Test Of Public Trust

Teachers will soon be able to use artificial intelligence (AI) to create lesson plans and mark homework to help them in classrooms. A £4m project, announced by the UK government before the 2024 school year, includes giving AI companies access to school material to create educational content.

In support of educators, the Secretary of State for Science, Innovation, and Technology, the Rt Hon Dr Peter Kyle MP, said: “This is the first of many projects that will transform how we see and use public sector data. By making AI work for them [teachers], this project aims to ease admin burdens and help them deliver creative and inspiring lessons every day while reducing the time pressures they face.”

However, ministers were also keen to reassure parents and teachers that any use of AI would be safe. 

“The new project will bring teachers and tech companies together to develop and use trustworthy AI tools to help mark homework and save teachers time,” the government said in a statement. 

Balancing Innovation With Public Trust In AI

As part of its announcement, the government published research showing a degree of nervousness around AI, especially among parents. While it should come as no surprise that schools were “most trusted to make decisions about the use of pupils’ work and data,” the same cannot be said for tech companies with a possible interest in building AI platforms and tools. 

“Trust in tech companies was extremely limited and there was little to no support for them to be granted control over AI and pupil work and data use,” the government said. This touches on an issue relevant to this project and every AI deployment - trust. 

While no one can doubt the good that comes from AI-driven applications, this must be balanced against public perceptions around fairness and privacy. For many people, the algorithms behind AI can appear opaque. So, when AI systems fail, whether through error, bias, or misuse, it’s little wonder the public becomes sceptical. 

Transparency & Accountability Must Be On The Curriculum

Trust is a cornerstone for any successful AI implementation. And regarding AI, accountability can only be achieved deep within the system by adhering to a robust observability strategy. This approach allows IT professionals to monitor and understand a system based on the data it generates. 

As the name suggests, observability provides in-depth visibility into an IT system. It’s an essential resource for overseeing extensive tools and intricate public sector workloads and vital for helping ensure AI operations function correctly and ethically. It also can play a crucial role in regulatory compliance by providing detailed data points for auditing and reporting. 

Not only does observability enhance the operational aspects of AI systems, but it also plays a pivotal role in building public trust by helping ensure these systems are transparent and aligned with user needs.

Data Privacy Is A Top Concern

Then, there are the issues most likely to gain public scrutiny. As the government’s research in the schools' AI project showed, protecting data privacy is often a top concern. Proper protocols include embedding robust data encryption, stringent access controls, and comprehensive vulnerability assessments as standard. These steps help ensure that sensitive information is safeguarded and systems protected against external attacks and internal leaks.

Any AI project also needs to consider the end user. There needs to be a gradual build-up of trust in the tools rather than a jarring change, which can immediately put users on the defensive. 

Beyond the pace of adoption, regular engagement with stakeholders and other interest groups is essential for understanding public expectations and concerns about AI. In this regard, open communication and educating both the public and agency personnel about AI’s capabilities and limitations can help quell any concerns about the technology and promote a public conversation. 

That’s why I’m watching this education project in the UK with such interest. It’s an examination of the public sector’s approach to one of the most precious things - the education of our children. One thing is clear: stakeholders, including teachers, parents, and students, will be looking to see whether those behind this AI project pass with flying colours or need to go back to the drawing board. 

Rob Johnson is VP and Global Head of Solutions Engineering at SolarWinds

Image: Unsplash

You Might Also Read:

Teach Your Children About Safer Cyber Security:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Ireland Orders X, TikTok & Instagram To Cut Terrorist Content
Hamas Affiliates Attacking Israel »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CloudSigma

CloudSigma

CloudSigma, a pure-cloud IaaS provider offers flexible and innovative cloud hosting solutions for companies of all sizes both in Europe and the US.

Masergy Communications

Masergy Communications

Masergy delivers hybrid networking, managed security and cloud communication solutions to enterprises around the globe.

Sungard Availability Services (Sungard AS)

Sungard Availability Services (Sungard AS)

Sungard AS partners with customers around the globe to understand their unique business needs and provide production and recovery services tailored to their requirements.

BlueKrypt

BlueKrypt

BlueKrypt is a consulting firm for the security of IT systems and their management.

Baker Donelson

Baker Donelson

Baker Donelson is a law firm with a team of more than 700 attorneys and advisors representing more than 30 practice areas including Data Protection, Privacy and Cybersecurity.

ITsMine

ITsMine

ITsMine’s Beyond DLP solution is a leading Data Loss Prevention solution used by organizations to protect against internal and external threats automatically.

SOFTwarfare

SOFTwarfare

SOFTwarfare deliver high-quality, reliable and secure enterprise application integrations through RESTful APIs for Cyber, Ops & Dev.

Lifetech

Lifetech

Lifetech is a software development, product engineering and system integration company. Cybersecurity services include SIEM deployment and training.

Netizen

Netizen

Netizen is an award-winning company that develops and leverages innovative solutions to enable a more secure cyberspace for clients in government and commercial markets.

Palitronica

Palitronica

Palitronica build cutting-edge hardware and breakthrough software that revolutionizes how we defend critical infrastructure and key resources.

Ekco

Ekco

Ekco is one of Europe’s leading managed cloud providers. With a network of infrastructure and security specialists across Europe, we’ve perfected our approach to supporting digital transformation.

AVEVA

AVEVA

AVEVA has a long history in providing Supervisory Control and Data Acquisition software for meeting complex and evolving automation requirements.

Keepit

Keepit

Keepit offer all-inclusive, secure, and reliable backup and recovery services for your data.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

Simbian

Simbian

Simbian, with its hardened TrustedLLM system, is the first to accelerate security by empowering every member of a security team from the C-Suite to frontline practitioners.

NST Cyber

NST Cyber

NST Cyber provides comprehensive Threat Exposure Management to Global banks and Forbes 2000 companies.