SlideShare a Scribd company logo
1 of 17
Automated Prediction 
Perception, Law, and Policy
Overview 
• Author 
• Introducing Automated Prediction 
• The Case For AP 
• Other Considerations & Challenges 
• Take Aways 
• Discussion
Author 
Dr. Tal Zarsky
Automated Prediction (AP) 
BIG DATA 
Predictive Analytics
Automated Prediction (AP) 
(Personal Information) 
AP 3000 
IN 
OUT 
CRIME 
PREDICTION
Automated Prediction (AP)
Automated Prediction (AP) 
KEYWORD 
ASSOCIATION 
IP ADDRESS WEBSITE 
PURCHASE 
TARGET POOL 
Probability 
High
War on Terror
nctc.gov 
-McKean, Virginia
The Greater Good? 
Privacy 
vs Safety
Cost & Efficiency 
Human Driven Computer Driven
Vast Amounts of Data 
- Hard for humans to analyze 
- Easily analyzed by computers 
- Programmed by humans 
- Errors and Bias
We Make Mistakes
Hidden Biases 
Values 
Prejudice 
Beliefs 
Identity 
Culture 
Status 
Emotion
Equality & Fairness
Take Aways 
• AP will be hard to do right but 
the positives outweigh the negatives 
• Good for some complex and costly 
problems - hopefully terrorism 
• If done right, AP will increase 
equality & fairness
Questions Comments 
- Robot Fortune Teller London, England 1934

More Related Content

Similar to Automated Prediction

The law and ethics of data-driven artificial intelligence
The law and ethics of data-driven artificial intelligenceThe law and ethics of data-driven artificial intelligence
The law and ethics of data-driven artificial intelligencePyData
 
Big Data Past, Present and Future – Where are we Headed? - StampedeCon 2014
Big Data Past, Present and Future – Where are we Headed? - StampedeCon 2014Big Data Past, Present and Future – Where are we Headed? - StampedeCon 2014
Big Data Past, Present and Future – Where are we Headed? - StampedeCon 2014StampedeCon
 
A time series of networks. Is everything OK? Are there anomalies?
A time series of networks. Is everything OK? Are there anomalies?A time series of networks. Is everything OK? Are there anomalies?
A time series of networks. Is everything OK? Are there anomalies?CSIRO
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceDeep Shankar Yadav
 
New Developments in Machine Learning - Prof. Dr. Max Welling
New Developments in Machine Learning - Prof. Dr. Max WellingNew Developments in Machine Learning - Prof. Dr. Max Welling
New Developments in Machine Learning - Prof. Dr. Max WellingTextkernel
 
Towards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity ModelTowards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity ModelAlex Pinto
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced AnalyticsHaystax Technology
 
Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspacezapp0
 
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting AutomationBiting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting AutomationAlex Pinto
 
AI Septicism - Law Libraries of the Northeast (LLNE) Fall 2020 Meeting
AI Septicism - Law Libraries of the Northeast (LLNE) Fall 2020 MeetingAI Septicism - Law Libraries of the Northeast (LLNE) Fall 2020 Meeting
AI Septicism - Law Libraries of the Northeast (LLNE) Fall 2020 MeetingJohn Mayer
 
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...Alexandre Sieira
 
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and SharingData-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and SharingAlex Pinto
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Raffael Marty
 
Confessions of an Architect
Confessions of an ArchitectConfessions of an Architect
Confessions of an ArchitectJeff Jonas
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacyJoshua Johnston
 

Similar to Automated Prediction (20)

The law and ethics of data-driven artificial intelligence
The law and ethics of data-driven artificial intelligenceThe law and ethics of data-driven artificial intelligence
The law and ethics of data-driven artificial intelligence
 
Big Data Past, Present and Future – Where are we Headed? - StampedeCon 2014
Big Data Past, Present and Future – Where are we Headed? - StampedeCon 2014Big Data Past, Present and Future – Where are we Headed? - StampedeCon 2014
Big Data Past, Present and Future – Where are we Headed? - StampedeCon 2014
 
A time series of networks. Is everything OK? Are there anomalies?
A time series of networks. Is everything OK? Are there anomalies?A time series of networks. Is everything OK? Are there anomalies?
A time series of networks. Is everything OK? Are there anomalies?
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
New Developments in Machine Learning - Prof. Dr. Max Welling
New Developments in Machine Learning - Prof. Dr. Max WellingNew Developments in Machine Learning - Prof. Dr. Max Welling
New Developments in Machine Learning - Prof. Dr. Max Welling
 
Big Data: How does it fit in your data strategy?
Big Data: How does it fit in your data strategy?Big Data: How does it fit in your data strategy?
Big Data: How does it fit in your data strategy?
 
Bias in AI
Bias in AIBias in AI
Bias in AI
 
Towards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity ModelTowards a Threat Hunting Automation Maturity Model
Towards a Threat Hunting Automation Maturity Model
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced Analytics
 
Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspace
 
Fair AI
Fair AIFair AI
Fair AI
 
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting AutomationBiting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
 
AI Septicism - Law Libraries of the Northeast (LLNE) Fall 2020 Meeting
AI Septicism - Law Libraries of the Northeast (LLNE) Fall 2020 MeetingAI Septicism - Law Libraries of the Northeast (LLNE) Fall 2020 Meeting
AI Septicism - Law Libraries of the Northeast (LLNE) Fall 2020 Meeting
 
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...
Threat Intelligence Baseada em Dados: Métricas de Disseminação e Compartilham...
 
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and SharingData-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
 
Big databigideasit4bc
Big databigideasit4bcBig databigideasit4bc
Big databigideasit4bc
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?
 
Ethics and Data
Ethics and DataEthics and Data
Ethics and Data
 
Confessions of an Architect
Confessions of an ArchitectConfessions of an Architect
Confessions of an Architect
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacy
 

More from showslidedump

2010 nasig integrating_usage_statistics
2010 nasig integrating_usage_statistics2010 nasig integrating_usage_statistics
2010 nasig integrating_usage_statisticsshowslidedump
 
Slides Chapter10.1 10.2
Slides Chapter10.1 10.2Slides Chapter10.1 10.2
Slides Chapter10.1 10.2showslidedump
 
5.2 Strong Induction
5.2 Strong Induction5.2 Strong Induction
5.2 Strong Inductionshowslidedump
 
The life and_times_of_biomet_1977-2012____trine
The life and_times_of_biomet_1977-2012____trineThe life and_times_of_biomet_1977-2012____trine
The life and_times_of_biomet_1977-2012____trineshowslidedump
 
Computational Thinking
Computational ThinkingComputational Thinking
Computational Thinkingshowslidedump
 

More from showslidedump (9)

2010 nasig integrating_usage_statistics
2010 nasig integrating_usage_statistics2010 nasig integrating_usage_statistics
2010 nasig integrating_usage_statistics
 
Slides Chapter10.1 10.2
Slides Chapter10.1 10.2Slides Chapter10.1 10.2
Slides Chapter10.1 10.2
 
5.2 Strong Induction
5.2 Strong Induction5.2 Strong Induction
5.2 Strong Induction
 
5.1 Induction
5.1 Induction5.1 Induction
5.1 Induction
 
2.2 Set Operations
2.2 Set Operations2.2 Set Operations
2.2 Set Operations
 
2.1 Sets
2.1 Sets2.1 Sets
2.1 Sets
 
Exam 2 Study Guide
Exam 2 Study GuideExam 2 Study Guide
Exam 2 Study Guide
 
The life and_times_of_biomet_1977-2012____trine
The life and_times_of_biomet_1977-2012____trineThe life and_times_of_biomet_1977-2012____trine
The life and_times_of_biomet_1977-2012____trine
 
Computational Thinking
Computational ThinkingComputational Thinking
Computational Thinking
 

Recently uploaded

Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Automated Prediction

Editor's Notes

  1. Dr. Tal Zarsky – is the Senior Lecturer in the Faculty of Law at the University of Haifa in Israel. His specializations are listed as Property, Cyberlaw, Information Privacy, and Telecommunication Law and Policy and much of his research centers around Data Mining issues. He did his undergrad in Law & Psychology at the Hebrew University of Jerusalem and both his Masters and Doctorate of Law at Columbia University.
  2. So Automated Prediction, what exactly is it? Well there are a handful of interchangeable terms all of which fit within the larger and growing field of Big Data and Predictive Analytics. This has been a growing field that has garnered a great deal of attention.
  3. I realize we’ve all likely heard of it but the idea is that they can tap into the growing pool of available data, often and increasingly what they refer to as Unstructured Data, and they work to extract new knowledge and information from it. In this article Zarsky uses the term Automated Prediction and focuses specifically on the technologies application towards predicting and fighting crime.
  4. In the context of crime, Zarsky defines Automated Prediction, or “AP” as we will refer to it here, as the practice of using computerized algorithms to analyze human behavior patterns to predict, prevent, and police antisocial behavior.
  5. This may be obvious but the key takeaway is that this technology is not explicitly predicting the future, it still depends on the science of probability. It looks to create actionable and accurate likelihoods from data that humans could not generate without the technology. Governments are the key player that Zarsky focuses on here. Zarsky mentions a few different specific crimes, or Anti-Social Behaviors – as he refererred to them, that governments use AP to combat, they included Tax Fraud, International Parcel and Travel Crime, Insider Trading, but the crime he chose to focus mostly on was Terrorism.
  6. Zarsky mentions how in America the policy decisions and public response to 9-11 created an opening that allowed the government to move towards more and more invasive tactics, in terms of privacy. (Needs checked, just typing thoughts in here, I am not sure if he said this exactly.)
  7. Zarsky explains that today, the National Counter-Terrorism Center is the lead government agency using AP to take personal information and other data to build enormous databases with the aim of helping to combat terrorism.
  8. Zarsky explains that, “ When Personal Information is Available & The Cost and Difficulty of Enforcment is High, Governments now “Consider” Automated Predictions. To talk specifically about laws Zarsky highlighted two key principles of the European Data Protection Directive. The first is for cases when information is used for purposes other than their original intent, in this case under the law, consent should then be received from the individual the data relates to. But Zarsky admitted that this is currently not the case. The second principle is that all AP processes that could potentially have substantial impact on an individual should have some element of human review.
  9. Zarsky explains that, “ When Personal Information is Available & The Cost and Difficulty of Enforcment is High, Governments now “Consider” Automated Predictions.
  10. He did mention that outside of commercial success application in the areana of crime is unproven and hard to prove. One interesting point he made and admitted was that AP has only proven to be successful in the commercial realm. He explains that AP is still unproven in government applications and that it will be challenging for the public to be able to measure success there.
  11. Zarsky admits that systems make errors but systems driven more by human intervention are much worse.
  12. Because we also allow Bias to enter into our decision making process. Computer or Automated systems do not and thus they promote increased equality and fairness into any such process.
  13. Because we also allow Bias to enter into our decision making process. Computer or Automated systems do not and thus they promote increased equality and fairness into any such process.
  14. Successful application can only be achieved if it is logical and respects individual liberty. This will be difficult but the positives far outweigh the negatives. Though the author is strongly in favor of AP he gave extended and fair consideration to many of the counter arguments throughout this article.
  15. Photo is of the Robot Fortune Teller, from a 1934 British Department Store anniversary celebration. exhibited as part of the 25th anniversary celebrations for Selfridges department store in London in March 1934.