SlideShare a Scribd company logo
1
Digital Authoritarianism: Possible Implementation, Associated Ethics,
and Safeguards
Andrew Aukerman
December 2018
2
Artificial intelligence, or AI, constitutes a common motif in science fiction literature – the
aspect of a “robot uprising”, where AI becomes sufficiently advanced such that it surpasses human
intelligence and escapes human control. Common perceptions of AI focus on the ethical and
human impacts of a malevolent, artificially intelligent agent itself. In this document, I wish to
instead focus on an equally important, and, I will argue, more plausible case of sufficiently
advanced AI which poses immense risk to human activity: the use of AI in conjunction with big
data for authoritarian rule and population control. In these scenarios, AI has no agency, and instead
serves as a sufficiently advanced and intelligent tool for human agents. Throughout this document,
I summarize current and potential applications of this type of AI, explore the ethical ramifications,
and last, propose and evaluate solutions and safeguards.
KEY CONCEPTS OF DIGITAL AUTHORITARIANISM
Authoritarian regimes exhibit certain key identifying features, two of which have great
importance in the context of AI. The first being strength of a centralized and consolidated
government [1] and the second being the destruction of dissenting or auxiliary institutions.
Dictatorships and rising authoritarian governments today display these traits. Military parades are
a prominent common example of power; it is important for an authoritarian regime to maintain a
façade (whether true or false) of power and control over possible threats to the regime [2].
Destruction of institutions is also key, however also problematic for the long term success of such
regimes. Liberal-democratic systems, (e.g. political, judiciary, cultural, and civil institutions) are
regarded as essential to a country’s growth.
Failure to grow will lead to economic regression, which in turn leads to instability of the
ruling regime [1]. History reveals this, as democracies produce lasting economic success [3]. The
same article found that in more modern years, dictatorships did provide increasingly lasting
3
“economic miracles” keeping them on par with democratic and free economies. One such example
is China; where a one party system has successfully lead China to become the most prominent and
emerging economy in the world [3]. This jeopardizes the comfortable idea that economic success
and liberal democracy go “hand in hand” [1], and begs the question of, “what changed?”
I focus on the element of careful control in these successful non-liberal economies. China
in particular has a vast bureaucracy [4], keeping political and economic actives entrenched in a
large system which employs 50 million people. Deployed alongside this is careful information
control. The so-called “Great Firewall” censors the internet in China, limiting information access
[5]. As markets that require open internet emerge, China has faced tension in maintaining control
and promoting economic activity. “Digital authoritarianism” lies at this intersection of software
and this type of one-party rule [1].
AI USE IN DIGITAL AUTHORITARIANISM
The proposed use of AI come into play here, as countries (such as China) are facing the
very real dichotomy between economic success and political control. AI in conjunction with “big
data”, i.e., data that is massively collected, diverse, and (usually) unstructured, promise a new
means of control while guaranteeing economic success on two fronts: AI implementation for
economic systems and large-scale, predictive AI for population control.
Economic Planning: These systems already exist – businesses today have already
turned to AI to manage everything from their supply chains to employee schedules. Machine
learning demonstrates great success in targeted adverting [6], prediction of demand [7], and
currently serves as a quickly growing tool in the financial sector [8]. Companies have realized that
they have incidentally amassed a valuable but unused resource: big data. Transaction history,
4
invoices, browser history, user activity, and stock prices all underpin the essential data for these
AI analytics. It has proven essential to exploit this data for financial gain.
Jack Ma, a giant in Chinese tech and proponent of the Communist Party of China, sees no
limit to using AI in predicting and optimizing to market forces. The localized technology used by
companies, he argues, can be scaled up to the economic activities of China as a whole. The
beginnings of such have already come to pass [9]; the technology is there, and increasing
bureaucracy and state-interplay provides more than enough political infrastructure to implement
enhanced surveillance programs.
Predicting Human Behavior with Varied Input: The technology to predict human
strategic behavior exists today in limited forms; a popular example being AlphaGo [10], which
went on to beat the world champion in the board game Go. Some underlying, albeit symbolic,
understanding of its opponent’s strategic stance must be necessary for such success. Further,
during the match, surprising and novel moves were played, which “overturned hundreds of
years of received wisdom” [10]. However, it is not evident that this understanding can be
expanded to the more complex world of human behavior in social environments. Go is a zero-sum,
sequential game with a fixed action and input space, while our usual interactions in the real world
are general-sum and varied.
Advancements in AI show promise in handling these types of inputs and outputs. In
machine learning models, structured data input is important; one needs to know what kind of data
is used, and what the desired outcomes are so that training can take place. Such data are difficult
to produce when extrapolating to general human behavior, whereof anything collected – social
media activity, text conversations, transactions, criminal history, education, health – can serve as
input vectors, and the output space is ill-defined. Hartford et al. detail a software architecture that
5
accepts varied input by pooling arbitrary length-input vectors into “feature layers” (much like a
convolutional neural net) and propagating these aggregated features into action response layers
[11]. This removes the need to “tune by hand” the neural network, allowing for greater generality
in how the network is used. It is still similar to feed-forward neural networks, however would
allow learning of certain patterned behavior from inputs. The conclusions reached by the article
show that input vectors, such as aggregated data about some person, can be utilized in AI systems.
Classification Algorithms: Recurrent neural networks may also provide the ability to
follow the evolution of person over large time scales and classify activity. A key feature of
recurrent neural nets is context awareness – a simple example being that ‘bat’ appearing near-by
the word ‘flew’ provides a different context than if appearing in a sentence with the word ‘ball’.
Latest advancements go above and beyond simple recurrent neural networks in aggregating time-
sequence data, responding to inputs in the context of previous inputs in a temporarily deep sense
that also compounds overtime, as shown in Long-term Recurrent Convolutional Networks for
Visual Recognition and Description [12]. This work shows the ability to perform “activity
detection”. While this example is on the time-frame of seconds, there is no real limit to the
‘deepness’ in the time domain. Activity detection is quite fruitful in security and crime prevention
[7]; however, if crime is defined as political dissent, protesting, or even talking about political
reform, such systems can be deployed to squash this type of activity. Ultimately, an authoritarian
regime would be interested in classification using largely amassed data. This exists today; as
shown by Rasoul Kiani, AI implementations already provide geographic profiles, social network
analysis, crime patterns and suspect detection [13].
Summary: These algorithms are incredibly complex – and might provide insights that go
above and beyond that which a human reviewer could, practically or even ultimately, manifest.
6
But – these algorithms are also dumb in the sense that they are not aware, not sentient, not
conscious, and have no agency. As stated by Scott Bauguess in his keynote speech about the role
of AI: “The algorithm doesn’t care why the association exists. It doesn’t matter if the predictions
don’t make intuitive sense. The algorithm just cares about the accuracy of the prediction”. The
trend throughout history follows a similar note: people in power like to stay in power, and will use
whatever tools necessary to do so. The AI algorithms need not be perfect; they just need to be
effective. It is this growing efficacy that poses legitimate risk, and motivates exploration of ethics
in the face of this risk.
ETHICS OF DIGITAIL AUTHORITARIANISM
Trusting Algorithms and Accountability: This occurs already in the social media
spheres, and I surmise this effect as a type of accountability vagueness. Such vagueness is the
first ethical challenge posed by digital authoritarianism. While there has been a pleasant shift in,
e.g. Facebook’s attitude in the face of unsavory outcomes from the very algorithms deployed on
their platform1
, most responses still come down to “it’s the algorithm”. The complexity of these
algorithms requires a degree of trust, both in algorithm itself, and from those who are affected by
it. The vagueness in accountability can help dismiss legitimate abuses of such technology, as
expanded upon by Amitai Etzioni in Are New Technologies the Enemy of Privacy? [14].
For example, what happens when AI messes up? Is the engineer to blame? Is the fault in
those trusting the AI, or perhaps society is at fault, in the case that an AI algorithm takes on a racist
or sexist prejudice? AI can amplify existing prejudices and perpetuate modes of oppression [7].
On the other hand, it may simply reveal these prejudices and help eliminate them. Crime detection
is one such example. By pooling information about a person’s character, including their race,
1
There is still a long way to go, see [19] for a opinions (in pop-culture) on this.
7
prejudices can be induced into an AI model of criminal activity. Some argue that such prejudices
are simply true, as it is the most faithful reflection of the data. However, examples exist already in
which biased data, through human error, consequently produced biased algorithms. See Gender
Shades: Intersectional Accuracy Disparities in Commercial Gender Classification [15] for a more
detailed look at biases in facial recognition.
Privacy and Freedom: Working on the Privacy and Security axis, two dichotomies
emerge: Privacy and innocence in the face of surveillance, and freedom in the face of control. The
primary stakeholders being those in countries with advanced digital surveillance programs, and
secondary stakeholders are those in still liberal-democratic countries, who will likely feel the
effects of such countries [1]. AI technology can actually provide greater control over a population
in two ways, one being direct, where human intervention directly removes, imprisons, or
subjugates dissenters, while the other is indirect, where those who know they are being watched
and fear repercussions alter their behaviors.
In the direct sense, a population would face even greater violation of privacy, and near-
complete removal of freedom of speech, protest, and press. AI exacerbates these violations through
classification and pattern recognition. In a sense, these algorithms generate a new type of (private)
information2
that is immediately abused and violated. In trying to model behavior, one reduces
someone (even if partially) down to whatever an algorithm spits-out. As varied as that output may
be, it is prone to error, but the lack of transparency in the would make understanding possible
errors (i.e. proving one’s innocence) near impossible. This lack of transparency against relates
2
Even though this information is purely symbolic, there does exists interesting arguments that something new is
happening – See Clocksin, William F. "Artificial Intelligence and the Future." Philosophical Transactions:
Mathematical, Physical and Engineering Sciences 361, no. 1809 (2003): 1721-748.
http://www.jstor.org.pitt.idm.oclc.org/stable/3559219.
8
back to trust and accountability – that is, if the computer says no3
, or if the computer says you’re
a criminal, who is to say otherwise, or what counts as sufficient counter evidence? In authoritarian
regimes, such a question may be unimportant – perfection is not needed, only intimidation. This
indirect sense of control is much more powerful, as research shows that the fear of being watched
may impact behavior, which in turn, may impact one’s own beliefs and thoughts [1].
Global Impacts: In the social view of human rights, all aspects of AI driven, digital
authoritarianism are unstatutable. Assuming universal human right to autonomy, enjoyment of
liberty, justice, and access to free and open culture, it is clear these rights are all harshly infringed.
However, a proponent of successful types of authoritarianism may offer a different perspective.
China already stands as a complex example, especially ethically. If not for their economic success,
one may easily point to them as a regressive state. Rather, many Chinese citizens enjoy aspects of
liberal-democracy, with social programs, education, increasing health access, and vibrant culture
[16]. Beijing itself is quite cosmopolitan, and a great number of Chinese citzens, while unhappy
with certain aspects of their country, have healthy levels of appreciation and patriotism for China.
Hence, we find the waters muddied, as it may become increasingly difficult to untangle the notion
of freedom from political or social determinism. As we enter an age where AI-driven analysis
provides a greater access to and control of human activity, our sense of freedom and autonomy
may be altered.
POTENTIAL SOLUTIONS
The solutions and safeguards against digital authoritarianism fall into three spheres, policy
about data use, promoting privacy as a human right, and AI-driven encryption and digital warfare.
3
Making reference to the Little Britain skits, see [20].
9
Defining Ethical Data Use: It is not illegal to buy uranium, one can go online and buy
a radioactive source4
. However, anyone familiar with the Iran nuclear deal will understand that
possession of certain types of uranium is a point of immense contention, and the focus of precarious
global policy [17]. This dichotomy reveals an important insight: the type and use of some resource
is what makes it dangerous. In the same sense that uranium itself has no ethically charged value,
data does not either; it is human interaction with these entities that begets ethical questions.
Working within the framework of consequentialism, one can safely argue that data
collection, by itself, has no ethical dilemmas; instead, it is the use of data that does. It is this
distinction that must be explored and worked out as data collection becomes more apparent and
powerful. Companies have tried skirting this distinction, inferring that data being an inert entity
means any use of that data is equally ethically inert. Instead, it must be made clear, in the context
of global policy, that there is ethical and unethical use of data and implementation of technology.
Unfortunately, it would be impossible, and possibly regressive itself, to ban certain types
of AI, or to try and regulate a country’s “right” to collect data about its citizenry. No country could
really suggest such without being hypocritical, as justification of data collection are always made.
Data collection is somewhat accepted in the US, perhaps because either Google is considered
trustworthy and just wants to ‘curate our experience’, or the NSA is only concerned chiefly with
our security. Likewise, in defense of a regime that has implemented AI for successful economic
and political control, one can provide the justification that such a regime is chiefly interested in
the health, success, and stability of the country. Giving up privacy or liberty is a necessary
component of that success. It seems that trying to regulate data on a global scale has challenges, it
may be more fruitful to appeal to aspects of human rights instead.
4
I presume for calibrating a scintillator or testing a Giger counter.
10
Promoting Privacy as a Right: This requires a redefinition of success in the global
system. It is a privileged comfort that we perceive economically successful countries as such
because they are free democracies (with exceptions). If the landscape shifts, such that authoritarian
governments enjoy equal or greater success, alongside near absolute control of its citizenry, one
must rely on a different definition of success in the modern world. This is a nuanced point, and
ties into economic systems on the global scale. Naturally, types of political systems that enhance
economic growth are the ones pursued. It had been expected that China would eventually fail a
few years after establishing communist rule [4], while today its GDP is on pace to out rank the US
in about 10 years.
This solution relies, perhaps heavily, on the idea that freedom of speech, protest, press, is
not a privileged right, bestowed selectively, but rather, a universal human right. Thus, recognition
of this right would help in the fight against digital authoritarianism, and good policy in this regard
is key [7]. However, this is again difficult to implement – if no natural market forces promote
privacy, little realistic expectation could be made that authoritarian regimes would care for it.
Though, some promising changes have taken place in recent years, as companies such as Apple
[7] pursue differential privacy and promote user privacy as an important aspect of their business.
Encryption and Digital Warfare: Smart Encryption is the first line of defense against
privacy violation. As much as our activities exist on a platform where information is easily
duplicated, copied, and stored, equally those platforms provide encryption and security that make
certain content only accessible by you as the user [14]. As AI progresses, it will also become better
at protecting privacy. Biometric information can enhance this, as AI-driven systems guarantee both
security and privacy.5
5
See, for example, Apple’s Face ID technology https://support.apple.com/en-us/HT208108
11
If the desire for privacy outpaces the capabilities of privacy violation, economic forces may
easily overtake authoritarian attempts to trespass on private data. This requires a multi-faceted
approach: privacy must be viewed as a desirable and necessary right, and, I would hope, those
interested in selling that idea can develop technology to promote that right. In the same way that
anti-fraud or “anti-dissent” technology may flag “undesirable” activity, smart privacy software
could detect equally “undesirable” activity, protecting users against unauthorized use of their data.
Regimes that exhibit economic success will also pose a significant perceived threat to
liberal-democratic countries [1]. As real or empty as this threat may be, another technical solution
does exist: the undermining of digital authoritarian states with AI itself. This is perhaps the most
far-fetched solution. It may be that a digital type of war is upon us, but instead of robots with guns,
it’s software with algorithms.
Drawing on the words of Scott Bauguess, “It doesn’t matter if the predictions don’t make
intuitive sense.” [8], it also doesn’t matter, in a sense, if the way AI works doesn’t make sense. We
may design systems that have so much complexity that they exceed human understanding entirely
– this doesn’t mean they suddenly rise up, but rather, we develop digital weapons that we don’t
understand. As data becomes increasingly valuable, its loss becomes equally destructive. We
already see the possible beginnings of such a war, the launch of Stuxnet [18] (a “smart virus”),
exploitation of Facebook’s AI algorithms, and ransomware, which locks data with outside
encryption. The smarter these programs become, the more damage they can do to authoritarian
uses of data. As the stakes in data and software rise, the tensions between countries that wield this
software them can be expected to increase [1].
Promoting privacy, and encouraging the development of AI driven encryption and privacy,
I argue, is the best bet moving into the future. The political forces to maintain control may be too
12
strong to regulate or combat, perhaps the only force on par is that of economic gain: to sell
advanced privacy options to individuals. Regardless, focus on ethical use of data in global politics
will prove important, else we may face the erosion of privacy all together.
CONCLUSION
Throughout the course of this document, I have covered the key components of
authoritarianism, and how AI can curb the pitfalls or exacerbate the dangerous aspects of such a
political system. AI can promise greater optimization of economic systems, and in countries like
China, implementing the insights from this system can only further accelerate their economic
progress. At the same time, with increased data collection and the implementation of increasingly
advanced algorithms, such as temporally deep recurrent neural nets, behaviors and actions of a
citizenry falls under greater scrutiny and, ultimately, greater control. The “all seeing eye” of AI
can, and already does, affect behavior, whether directly or indirectly. As these capabilities expand,
infringement of privacy will too, and upset of the global system, which today favors liberal
democracies, will become more probable. Defining and enforcing ethical use of data is important,
however difficult. A more economical solution may be advocating of privacy, and cultural change
to appreciate privacy as a right. This will motivate natural markets to develop advanced privacy
software and technology. In all cases, conflicts between countries will take on an increasingly
digital flavor as the stakes of big data increases. Perhaps AI will never escape human control, but
only human understanding. Wielding tools that we don’t understand may have severe
consequences, and moving carefully into this future is of the utmost importance.
13
REFERENCES
[1] Wright, Nicholas. How Artificial Intelligence Will Reshape the Global Order. Foreign Affairs. Web
Article. (2018). https://www.foreignaffairs.com/articles/world/2018-07-10/how-artificial-intelligence-
will-reshape-global-order
[2] Wynne Davis. PHOTOS: North Korea Celebrates 70 Years with Military Parade and Mass Games.
(2018). https://www.npr.org/2018/09/10/646102084/photos-north-korea-celebrates-70-years-with-
military-parade-and-mass-games
[3] Miljenko Antić. Democracy Versus Dictatorship: The Influence of Political Regime On GDP per
Capita Growth. UDK 330.55:32 JEL Classification E10, O11. Prethodno priopćenje.
[4] Yuen Yuen Ang. Autocracy with Chinese Characteristics. Foreign Affairs (2018).
https://www.foreignaffairs.com/articles/asia/2018-04-16/autocracy-chinese-characteristics
[5] Xiaoru Wang. Behind the Great Firewall: The Internet and Democratization in China. Thesis,
University of Michigan. (2009).
https://deepblue.lib.umich.edu/bitstream/handle/2027.42/64681/wangx_1.pdf
[6] Ng, Andrew. What Artificial Intelligence Can and Can’t Do Right Now. Web Article. Harvard
Business Review (2016).
[7] Faggella, Daniel. Artificial Intelligence and Security: Current Applications and Tomorrow’s
Potentials. Web Article. (2017). Emerg. https://emerj.com/ai-sector-overviews/artificial-intelligence-
and-security-applications/
[8] Bauguess, Scott W. “The Role of Big Data, Machine Learning, and AI in Assessing Risks: A
Regulatory Perspective. Speech. OpRisk North America 2017, New York, New York.
[9] Louise Lucas. The Chinese Communist Party Entangles Big Tech. Financial Times. (2018).
[10] The Story of AlphaGo So Far. DeepMind Technologies Limited. (2018).
https://deepmind.com/research/alphago/
[11] Jason Hartford, James Wright, Kevin Leyton-Brown. Deep Learning for Predicting Human Strategic
Behavior. (2016). Advances in Neural Information Processing Systems. NIPS
[12] Jeff Donahue, Lisa Anne Hendricks, Marcus Rohrbach, Subhashini Venugopalan, Sergio
Guadarrama, Kate Saenko, Trevor Darrell. Long-term Recurrent Convolutional Networks for Visual
Recognition and Description. arXiv:1411.4389v4
[13] Kiani, Rasoul; Bahdavi, Siamak; Keshavarzi, Amin. Analysis and Prediction of Crimes by Clustering
and Classification. International Journal of Advanced Research in Artificial Intelligence Vol. 4, No.8.
(2015).
[14] Etzioni, A. (2007). "Are new technologies the enemy of privacy?" Knowledge, Technology &
Policy, 20, 115–119.
[15] Joy Buolamwini, Timnit Gebru. Gender Shades: Intersectional Accuracy Disparities in Commercial
Gender Classification. (2018). Proceedings of Machine Learning Research 81:1–15.
[16]. OECD. 2012. Inequality: Recent Trends in China and Experience in the OECD Area. China in
Focus: Lessons and Challenges.
[17] Iran nuclear deal: Key details. BBC. (2018). https://www.bbc.com/news/world-middle-east-
33521655
[18] Bruce Schneier. The Story Behind the Stuxnet Virus. (2010).
https://www.forbes.com/2010/10/06/iran-nuclear-computer-technology-security-stuxnet-
worm.html#4914795051e8
[19] Charlie Warzel Mark Zuckerberg Can’t Stop You From Reading This Because The Algorithms
Have Already Won. Buzzfeed News. (2017). https://www.ft.com/content/5d0af3c4-846c-11e8-a29d-
73e3d454535d
[20] Bank accounts. "Who to blame when 'computer says no'?". Telegraph.

More Related Content

What's hot

Ethical Issues on eGovernment 3.0: Big Data and AI
Ethical Issues on eGovernment 3.0: Big Data and AIEthical Issues on eGovernment 3.0: Big Data and AI
Ethical Issues on eGovernment 3.0: Big Data and AI
Samos2019Summit
 
Government & IT sector
Government & IT sectorGovernment & IT sector
Government & IT sector
Prashant Joshi
 
Technology and accountability – ideas
Technology and accountability – ideasTechnology and accountability – ideas
Technology and accountability – ideas
Laina Emmanuel
 
Surveillance Capitalism
Surveillance  CapitalismSurveillance  Capitalism
Surveillance Capitalism
Ken Berkun
 
Internet of Everything: A $4.6 Trillion Public-Sector Opportunity
Internet of Everything: A $4.6 Trillion Public-Sector OpportunityInternet of Everything: A $4.6 Trillion Public-Sector Opportunity
Internet of Everything: A $4.6 Trillion Public-Sector Opportunity
Joseph M Bradley
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "The dangers of tech-dete...
"Towards Value-Centric Big Data" e-SIDES Workshop - "The dangers of tech-dete..."Towards Value-Centric Big Data" e-SIDES Workshop - "The dangers of tech-dete...
"Towards Value-Centric Big Data" e-SIDES Workshop - "The dangers of tech-dete...
e-SIDES.eu
 
The algorithms that are already changing your life By.Dr.Mahboob ali khan Phd
The algorithms that are already changing your life By.Dr.Mahboob ali khan PhdThe algorithms that are already changing your life By.Dr.Mahboob ali khan Phd
The algorithms that are already changing your life By.Dr.Mahboob ali khan Phd
Healthcare consultant
 
E-Governance a change management tool - P Panneervel
E-Governance a change management tool - P PanneervelE-Governance a change management tool - P Panneervel
E-Governance a change management tool - P Panneervel
Amith hillshow
 
Ai in government
Ai in government Ai in government
Eight mega trends in e-government for the next eight years
Eight mega trends in e-government for the next eight yearsEight mega trends in e-government for the next eight years
Eight mega trends in e-government for the next eight years
Smart Cities Project
 
A DESCRIPTIVE STUDY ON E-GOVERNANCE
A DESCRIPTIVE STUDY ON E-GOVERNANCEA DESCRIPTIVE STUDY ON E-GOVERNANCE
A DESCRIPTIVE STUDY ON E-GOVERNANCE
ijcsity
 
From AI to Analytics
From AI to AnalyticsFrom AI to Analytics
From AI to Analytics
Deloitte UK
 
The Impact of the Consumerization of IT on the Public Sector
The Impact of the Consumerization of IT on the Public SectorThe Impact of the Consumerization of IT on the Public Sector
The Impact of the Consumerization of IT on the Public Sector
GovLoop
 
Policy Primer
Policy PrimerPolicy Primer
Policy Primer
Aleisha1
 
Leadership talk: Artificial Intelligence Institute at UofSC Feb 2019
Leadership talk: Artificial Intelligence Institute at UofSC Feb 2019Leadership talk: Artificial Intelligence Institute at UofSC Feb 2019
Leadership talk: Artificial Intelligence Institute at UofSC Feb 2019
Amit Sheth
 
The Age of Artificial Intelligence and the Reinvention of the Tax Function
The Age of Artificial Intelligence and the Reinvention of the Tax Function The Age of Artificial Intelligence and the Reinvention of the Tax Function
The Age of Artificial Intelligence and the Reinvention of the Tax Function
VasudhaSharma33
 
Responsible AI
Responsible AIResponsible AI
Responsible AI
Neo4j
 
Rapid fire with Douglas Van Praet
Rapid fire with Douglas Van PraetRapid fire with Douglas Van Praet
Rapid fire with Douglas Van Praet
Praz Hari
 
e-Governance Implementation In Ebonyi State Nigeria: Challenges and Prospects
e-Governance Implementation In Ebonyi State Nigeria: Challenges and Prospectse-Governance Implementation In Ebonyi State Nigeria: Challenges and Prospects
e-Governance Implementation In Ebonyi State Nigeria: Challenges and Prospects
Editor IJCATR
 
Road to Analytical Stardom
Road to Analytical StardomRoad to Analytical Stardom
Road to Analytical Stardom
GovLoop
 

What's hot (20)

Ethical Issues on eGovernment 3.0: Big Data and AI
Ethical Issues on eGovernment 3.0: Big Data and AIEthical Issues on eGovernment 3.0: Big Data and AI
Ethical Issues on eGovernment 3.0: Big Data and AI
 
Government & IT sector
Government & IT sectorGovernment & IT sector
Government & IT sector
 
Technology and accountability – ideas
Technology and accountability – ideasTechnology and accountability – ideas
Technology and accountability – ideas
 
Surveillance Capitalism
Surveillance  CapitalismSurveillance  Capitalism
Surveillance Capitalism
 
Internet of Everything: A $4.6 Trillion Public-Sector Opportunity
Internet of Everything: A $4.6 Trillion Public-Sector OpportunityInternet of Everything: A $4.6 Trillion Public-Sector Opportunity
Internet of Everything: A $4.6 Trillion Public-Sector Opportunity
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "The dangers of tech-dete...
"Towards Value-Centric Big Data" e-SIDES Workshop - "The dangers of tech-dete..."Towards Value-Centric Big Data" e-SIDES Workshop - "The dangers of tech-dete...
"Towards Value-Centric Big Data" e-SIDES Workshop - "The dangers of tech-dete...
 
The algorithms that are already changing your life By.Dr.Mahboob ali khan Phd
The algorithms that are already changing your life By.Dr.Mahboob ali khan PhdThe algorithms that are already changing your life By.Dr.Mahboob ali khan Phd
The algorithms that are already changing your life By.Dr.Mahboob ali khan Phd
 
E-Governance a change management tool - P Panneervel
E-Governance a change management tool - P PanneervelE-Governance a change management tool - P Panneervel
E-Governance a change management tool - P Panneervel
 
Ai in government
Ai in government Ai in government
Ai in government
 
Eight mega trends in e-government for the next eight years
Eight mega trends in e-government for the next eight yearsEight mega trends in e-government for the next eight years
Eight mega trends in e-government for the next eight years
 
A DESCRIPTIVE STUDY ON E-GOVERNANCE
A DESCRIPTIVE STUDY ON E-GOVERNANCEA DESCRIPTIVE STUDY ON E-GOVERNANCE
A DESCRIPTIVE STUDY ON E-GOVERNANCE
 
From AI to Analytics
From AI to AnalyticsFrom AI to Analytics
From AI to Analytics
 
The Impact of the Consumerization of IT on the Public Sector
The Impact of the Consumerization of IT on the Public SectorThe Impact of the Consumerization of IT on the Public Sector
The Impact of the Consumerization of IT on the Public Sector
 
Policy Primer
Policy PrimerPolicy Primer
Policy Primer
 
Leadership talk: Artificial Intelligence Institute at UofSC Feb 2019
Leadership talk: Artificial Intelligence Institute at UofSC Feb 2019Leadership talk: Artificial Intelligence Institute at UofSC Feb 2019
Leadership talk: Artificial Intelligence Institute at UofSC Feb 2019
 
The Age of Artificial Intelligence and the Reinvention of the Tax Function
The Age of Artificial Intelligence and the Reinvention of the Tax Function The Age of Artificial Intelligence and the Reinvention of the Tax Function
The Age of Artificial Intelligence and the Reinvention of the Tax Function
 
Responsible AI
Responsible AIResponsible AI
Responsible AI
 
Rapid fire with Douglas Van Praet
Rapid fire with Douglas Van PraetRapid fire with Douglas Van Praet
Rapid fire with Douglas Van Praet
 
e-Governance Implementation In Ebonyi State Nigeria: Challenges and Prospects
e-Governance Implementation In Ebonyi State Nigeria: Challenges and Prospectse-Governance Implementation In Ebonyi State Nigeria: Challenges and Prospects
e-Governance Implementation In Ebonyi State Nigeria: Challenges and Prospects
 
Road to Analytical Stardom
Road to Analytical StardomRoad to Analytical Stardom
Road to Analytical Stardom
 

Similar to Digital Authoritarianism: Implications, Ethics, and Safegaurds

HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCEHUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
eraser Juan José Calderón
 
Governance of artificial intelligence
Governance of artificial intelligenceGovernance of artificial intelligence
Governance of artificial intelligence
Araz Taeihagh
 
Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...
Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...
Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...
AJHSSR Journal
 
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyFeb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Timothy Holborn
 
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Turner Sparks
 
Governing AI-A Blueprint for the Future.pdf
Governing AI-A Blueprint for the Future.pdfGoverning AI-A Blueprint for the Future.pdf
Governing AI-A Blueprint for the Future.pdf
Cade Soluciones
 
Why Democracy Matters in AI Development.pdf
Why Democracy Matters in AI Development.pdfWhy Democracy Matters in AI Development.pdf
Why Democracy Matters in AI Development.pdf
Anshulsharma874284
 
ARTIFICIAL INTELLIGENCE, COGNITIVE TECHNOLOGIES AND DIGITAL LABOR
ARTIFICIAL INTELLIGENCE, COGNITIVE TECHNOLOGIES AND DIGITAL LABORARTIFICIAL INTELLIGENCE, COGNITIVE TECHNOLOGIES AND DIGITAL LABOR
ARTIFICIAL INTELLIGENCE, COGNITIVE TECHNOLOGIES AND DIGITAL LABOR
Emmanuel Gillain
 
Networks, swarms and policy: what collective intelligence means for policy ma...
Networks, swarms and policy: what collective intelligence means for policy ma...Networks, swarms and policy: what collective intelligence means for policy ma...
Networks, swarms and policy: what collective intelligence means for policy ma...
Alberto Cottica
 
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Chris Marsden
 
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAChallenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
vishal dineshkumar soni
 
Is artificial intelligence the future tool for anti corruption
Is artificial intelligence the future tool for anti corruption Is artificial intelligence the future tool for anti corruption
Is artificial intelligence the future tool for anti corruption
GlobalTechCouncil
 
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja
Saidot
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdf
Internet Law Center
 
Student Presentation: AI & Government
Student Presentation: AI & GovernmentStudent Presentation: AI & Government
Student Presentation: AI & Government
ShaynaBlum
 
1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx
teresehearn
 
1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx
aulasnilda
 
Transhuman Crypto Cloudminds.  Melanie Swan
Transhuman Crypto Cloudminds.  Melanie SwanTranshuman Crypto Cloudminds.  Melanie Swan
Transhuman Crypto Cloudminds.  Melanie Swan
eraser Juan José Calderón
 
Legal Risks and Preventive Measures in ChatGPT Applications in China
Legal Risks and Preventive Measures in ChatGPT Applications in ChinaLegal Risks and Preventive Measures in ChatGPT Applications in China
Legal Risks and Preventive Measures in ChatGPT Applications in China
ijtsrd
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
waiforchi Wagiteerhh
 

Similar to Digital Authoritarianism: Implications, Ethics, and Safegaurds (20)

HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCEHUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
 
Governance of artificial intelligence
Governance of artificial intelligenceGovernance of artificial intelligence
Governance of artificial intelligence
 
Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...
Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...
Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...
 
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyFeb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
 
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
 
Governing AI-A Blueprint for the Future.pdf
Governing AI-A Blueprint for the Future.pdfGoverning AI-A Blueprint for the Future.pdf
Governing AI-A Blueprint for the Future.pdf
 
Why Democracy Matters in AI Development.pdf
Why Democracy Matters in AI Development.pdfWhy Democracy Matters in AI Development.pdf
Why Democracy Matters in AI Development.pdf
 
ARTIFICIAL INTELLIGENCE, COGNITIVE TECHNOLOGIES AND DIGITAL LABOR
ARTIFICIAL INTELLIGENCE, COGNITIVE TECHNOLOGIES AND DIGITAL LABORARTIFICIAL INTELLIGENCE, COGNITIVE TECHNOLOGIES AND DIGITAL LABOR
ARTIFICIAL INTELLIGENCE, COGNITIVE TECHNOLOGIES AND DIGITAL LABOR
 
Networks, swarms and policy: what collective intelligence means for policy ma...
Networks, swarms and policy: what collective intelligence means for policy ma...Networks, swarms and policy: what collective intelligence means for policy ma...
Networks, swarms and policy: what collective intelligence means for policy ma...
 
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
 
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAChallenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
 
Is artificial intelligence the future tool for anti corruption
Is artificial intelligence the future tool for anti corruption Is artificial intelligence the future tool for anti corruption
Is artificial intelligence the future tool for anti corruption
 
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja
Spring Splash 3.4.2019: When AI Meets Ethics by Meeri Haataja
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdf
 
Student Presentation: AI & Government
Student Presentation: AI & GovernmentStudent Presentation: AI & Government
Student Presentation: AI & Government
 
1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx
 
1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx
 
Transhuman Crypto Cloudminds.  Melanie Swan
Transhuman Crypto Cloudminds.  Melanie SwanTranshuman Crypto Cloudminds.  Melanie Swan
Transhuman Crypto Cloudminds.  Melanie Swan
 
Legal Risks and Preventive Measures in ChatGPT Applications in China
Legal Risks and Preventive Measures in ChatGPT Applications in ChinaLegal Risks and Preventive Measures in ChatGPT Applications in China
Legal Risks and Preventive Measures in ChatGPT Applications in China
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 

Digital Authoritarianism: Implications, Ethics, and Safegaurds

  • 1. 1 Digital Authoritarianism: Possible Implementation, Associated Ethics, and Safeguards Andrew Aukerman December 2018
  • 2. 2 Artificial intelligence, or AI, constitutes a common motif in science fiction literature – the aspect of a “robot uprising”, where AI becomes sufficiently advanced such that it surpasses human intelligence and escapes human control. Common perceptions of AI focus on the ethical and human impacts of a malevolent, artificially intelligent agent itself. In this document, I wish to instead focus on an equally important, and, I will argue, more plausible case of sufficiently advanced AI which poses immense risk to human activity: the use of AI in conjunction with big data for authoritarian rule and population control. In these scenarios, AI has no agency, and instead serves as a sufficiently advanced and intelligent tool for human agents. Throughout this document, I summarize current and potential applications of this type of AI, explore the ethical ramifications, and last, propose and evaluate solutions and safeguards. KEY CONCEPTS OF DIGITAL AUTHORITARIANISM Authoritarian regimes exhibit certain key identifying features, two of which have great importance in the context of AI. The first being strength of a centralized and consolidated government [1] and the second being the destruction of dissenting or auxiliary institutions. Dictatorships and rising authoritarian governments today display these traits. Military parades are a prominent common example of power; it is important for an authoritarian regime to maintain a façade (whether true or false) of power and control over possible threats to the regime [2]. Destruction of institutions is also key, however also problematic for the long term success of such regimes. Liberal-democratic systems, (e.g. political, judiciary, cultural, and civil institutions) are regarded as essential to a country’s growth. Failure to grow will lead to economic regression, which in turn leads to instability of the ruling regime [1]. History reveals this, as democracies produce lasting economic success [3]. The same article found that in more modern years, dictatorships did provide increasingly lasting
  • 3. 3 “economic miracles” keeping them on par with democratic and free economies. One such example is China; where a one party system has successfully lead China to become the most prominent and emerging economy in the world [3]. This jeopardizes the comfortable idea that economic success and liberal democracy go “hand in hand” [1], and begs the question of, “what changed?” I focus on the element of careful control in these successful non-liberal economies. China in particular has a vast bureaucracy [4], keeping political and economic actives entrenched in a large system which employs 50 million people. Deployed alongside this is careful information control. The so-called “Great Firewall” censors the internet in China, limiting information access [5]. As markets that require open internet emerge, China has faced tension in maintaining control and promoting economic activity. “Digital authoritarianism” lies at this intersection of software and this type of one-party rule [1]. AI USE IN DIGITAL AUTHORITARIANISM The proposed use of AI come into play here, as countries (such as China) are facing the very real dichotomy between economic success and political control. AI in conjunction with “big data”, i.e., data that is massively collected, diverse, and (usually) unstructured, promise a new means of control while guaranteeing economic success on two fronts: AI implementation for economic systems and large-scale, predictive AI for population control. Economic Planning: These systems already exist – businesses today have already turned to AI to manage everything from their supply chains to employee schedules. Machine learning demonstrates great success in targeted adverting [6], prediction of demand [7], and currently serves as a quickly growing tool in the financial sector [8]. Companies have realized that they have incidentally amassed a valuable but unused resource: big data. Transaction history,
  • 4. 4 invoices, browser history, user activity, and stock prices all underpin the essential data for these AI analytics. It has proven essential to exploit this data for financial gain. Jack Ma, a giant in Chinese tech and proponent of the Communist Party of China, sees no limit to using AI in predicting and optimizing to market forces. The localized technology used by companies, he argues, can be scaled up to the economic activities of China as a whole. The beginnings of such have already come to pass [9]; the technology is there, and increasing bureaucracy and state-interplay provides more than enough political infrastructure to implement enhanced surveillance programs. Predicting Human Behavior with Varied Input: The technology to predict human strategic behavior exists today in limited forms; a popular example being AlphaGo [10], which went on to beat the world champion in the board game Go. Some underlying, albeit symbolic, understanding of its opponent’s strategic stance must be necessary for such success. Further, during the match, surprising and novel moves were played, which “overturned hundreds of years of received wisdom” [10]. However, it is not evident that this understanding can be expanded to the more complex world of human behavior in social environments. Go is a zero-sum, sequential game with a fixed action and input space, while our usual interactions in the real world are general-sum and varied. Advancements in AI show promise in handling these types of inputs and outputs. In machine learning models, structured data input is important; one needs to know what kind of data is used, and what the desired outcomes are so that training can take place. Such data are difficult to produce when extrapolating to general human behavior, whereof anything collected – social media activity, text conversations, transactions, criminal history, education, health – can serve as input vectors, and the output space is ill-defined. Hartford et al. detail a software architecture that
  • 5. 5 accepts varied input by pooling arbitrary length-input vectors into “feature layers” (much like a convolutional neural net) and propagating these aggregated features into action response layers [11]. This removes the need to “tune by hand” the neural network, allowing for greater generality in how the network is used. It is still similar to feed-forward neural networks, however would allow learning of certain patterned behavior from inputs. The conclusions reached by the article show that input vectors, such as aggregated data about some person, can be utilized in AI systems. Classification Algorithms: Recurrent neural networks may also provide the ability to follow the evolution of person over large time scales and classify activity. A key feature of recurrent neural nets is context awareness – a simple example being that ‘bat’ appearing near-by the word ‘flew’ provides a different context than if appearing in a sentence with the word ‘ball’. Latest advancements go above and beyond simple recurrent neural networks in aggregating time- sequence data, responding to inputs in the context of previous inputs in a temporarily deep sense that also compounds overtime, as shown in Long-term Recurrent Convolutional Networks for Visual Recognition and Description [12]. This work shows the ability to perform “activity detection”. While this example is on the time-frame of seconds, there is no real limit to the ‘deepness’ in the time domain. Activity detection is quite fruitful in security and crime prevention [7]; however, if crime is defined as political dissent, protesting, or even talking about political reform, such systems can be deployed to squash this type of activity. Ultimately, an authoritarian regime would be interested in classification using largely amassed data. This exists today; as shown by Rasoul Kiani, AI implementations already provide geographic profiles, social network analysis, crime patterns and suspect detection [13]. Summary: These algorithms are incredibly complex – and might provide insights that go above and beyond that which a human reviewer could, practically or even ultimately, manifest.
  • 6. 6 But – these algorithms are also dumb in the sense that they are not aware, not sentient, not conscious, and have no agency. As stated by Scott Bauguess in his keynote speech about the role of AI: “The algorithm doesn’t care why the association exists. It doesn’t matter if the predictions don’t make intuitive sense. The algorithm just cares about the accuracy of the prediction”. The trend throughout history follows a similar note: people in power like to stay in power, and will use whatever tools necessary to do so. The AI algorithms need not be perfect; they just need to be effective. It is this growing efficacy that poses legitimate risk, and motivates exploration of ethics in the face of this risk. ETHICS OF DIGITAIL AUTHORITARIANISM Trusting Algorithms and Accountability: This occurs already in the social media spheres, and I surmise this effect as a type of accountability vagueness. Such vagueness is the first ethical challenge posed by digital authoritarianism. While there has been a pleasant shift in, e.g. Facebook’s attitude in the face of unsavory outcomes from the very algorithms deployed on their platform1 , most responses still come down to “it’s the algorithm”. The complexity of these algorithms requires a degree of trust, both in algorithm itself, and from those who are affected by it. The vagueness in accountability can help dismiss legitimate abuses of such technology, as expanded upon by Amitai Etzioni in Are New Technologies the Enemy of Privacy? [14]. For example, what happens when AI messes up? Is the engineer to blame? Is the fault in those trusting the AI, or perhaps society is at fault, in the case that an AI algorithm takes on a racist or sexist prejudice? AI can amplify existing prejudices and perpetuate modes of oppression [7]. On the other hand, it may simply reveal these prejudices and help eliminate them. Crime detection is one such example. By pooling information about a person’s character, including their race, 1 There is still a long way to go, see [19] for a opinions (in pop-culture) on this.
  • 7. 7 prejudices can be induced into an AI model of criminal activity. Some argue that such prejudices are simply true, as it is the most faithful reflection of the data. However, examples exist already in which biased data, through human error, consequently produced biased algorithms. See Gender Shades: Intersectional Accuracy Disparities in Commercial Gender Classification [15] for a more detailed look at biases in facial recognition. Privacy and Freedom: Working on the Privacy and Security axis, two dichotomies emerge: Privacy and innocence in the face of surveillance, and freedom in the face of control. The primary stakeholders being those in countries with advanced digital surveillance programs, and secondary stakeholders are those in still liberal-democratic countries, who will likely feel the effects of such countries [1]. AI technology can actually provide greater control over a population in two ways, one being direct, where human intervention directly removes, imprisons, or subjugates dissenters, while the other is indirect, where those who know they are being watched and fear repercussions alter their behaviors. In the direct sense, a population would face even greater violation of privacy, and near- complete removal of freedom of speech, protest, and press. AI exacerbates these violations through classification and pattern recognition. In a sense, these algorithms generate a new type of (private) information2 that is immediately abused and violated. In trying to model behavior, one reduces someone (even if partially) down to whatever an algorithm spits-out. As varied as that output may be, it is prone to error, but the lack of transparency in the would make understanding possible errors (i.e. proving one’s innocence) near impossible. This lack of transparency against relates 2 Even though this information is purely symbolic, there does exists interesting arguments that something new is happening – See Clocksin, William F. "Artificial Intelligence and the Future." Philosophical Transactions: Mathematical, Physical and Engineering Sciences 361, no. 1809 (2003): 1721-748. http://www.jstor.org.pitt.idm.oclc.org/stable/3559219.
  • 8. 8 back to trust and accountability – that is, if the computer says no3 , or if the computer says you’re a criminal, who is to say otherwise, or what counts as sufficient counter evidence? In authoritarian regimes, such a question may be unimportant – perfection is not needed, only intimidation. This indirect sense of control is much more powerful, as research shows that the fear of being watched may impact behavior, which in turn, may impact one’s own beliefs and thoughts [1]. Global Impacts: In the social view of human rights, all aspects of AI driven, digital authoritarianism are unstatutable. Assuming universal human right to autonomy, enjoyment of liberty, justice, and access to free and open culture, it is clear these rights are all harshly infringed. However, a proponent of successful types of authoritarianism may offer a different perspective. China already stands as a complex example, especially ethically. If not for their economic success, one may easily point to them as a regressive state. Rather, many Chinese citizens enjoy aspects of liberal-democracy, with social programs, education, increasing health access, and vibrant culture [16]. Beijing itself is quite cosmopolitan, and a great number of Chinese citzens, while unhappy with certain aspects of their country, have healthy levels of appreciation and patriotism for China. Hence, we find the waters muddied, as it may become increasingly difficult to untangle the notion of freedom from political or social determinism. As we enter an age where AI-driven analysis provides a greater access to and control of human activity, our sense of freedom and autonomy may be altered. POTENTIAL SOLUTIONS The solutions and safeguards against digital authoritarianism fall into three spheres, policy about data use, promoting privacy as a human right, and AI-driven encryption and digital warfare. 3 Making reference to the Little Britain skits, see [20].
  • 9. 9 Defining Ethical Data Use: It is not illegal to buy uranium, one can go online and buy a radioactive source4 . However, anyone familiar with the Iran nuclear deal will understand that possession of certain types of uranium is a point of immense contention, and the focus of precarious global policy [17]. This dichotomy reveals an important insight: the type and use of some resource is what makes it dangerous. In the same sense that uranium itself has no ethically charged value, data does not either; it is human interaction with these entities that begets ethical questions. Working within the framework of consequentialism, one can safely argue that data collection, by itself, has no ethical dilemmas; instead, it is the use of data that does. It is this distinction that must be explored and worked out as data collection becomes more apparent and powerful. Companies have tried skirting this distinction, inferring that data being an inert entity means any use of that data is equally ethically inert. Instead, it must be made clear, in the context of global policy, that there is ethical and unethical use of data and implementation of technology. Unfortunately, it would be impossible, and possibly regressive itself, to ban certain types of AI, or to try and regulate a country’s “right” to collect data about its citizenry. No country could really suggest such without being hypocritical, as justification of data collection are always made. Data collection is somewhat accepted in the US, perhaps because either Google is considered trustworthy and just wants to ‘curate our experience’, or the NSA is only concerned chiefly with our security. Likewise, in defense of a regime that has implemented AI for successful economic and political control, one can provide the justification that such a regime is chiefly interested in the health, success, and stability of the country. Giving up privacy or liberty is a necessary component of that success. It seems that trying to regulate data on a global scale has challenges, it may be more fruitful to appeal to aspects of human rights instead. 4 I presume for calibrating a scintillator or testing a Giger counter.
  • 10. 10 Promoting Privacy as a Right: This requires a redefinition of success in the global system. It is a privileged comfort that we perceive economically successful countries as such because they are free democracies (with exceptions). If the landscape shifts, such that authoritarian governments enjoy equal or greater success, alongside near absolute control of its citizenry, one must rely on a different definition of success in the modern world. This is a nuanced point, and ties into economic systems on the global scale. Naturally, types of political systems that enhance economic growth are the ones pursued. It had been expected that China would eventually fail a few years after establishing communist rule [4], while today its GDP is on pace to out rank the US in about 10 years. This solution relies, perhaps heavily, on the idea that freedom of speech, protest, press, is not a privileged right, bestowed selectively, but rather, a universal human right. Thus, recognition of this right would help in the fight against digital authoritarianism, and good policy in this regard is key [7]. However, this is again difficult to implement – if no natural market forces promote privacy, little realistic expectation could be made that authoritarian regimes would care for it. Though, some promising changes have taken place in recent years, as companies such as Apple [7] pursue differential privacy and promote user privacy as an important aspect of their business. Encryption and Digital Warfare: Smart Encryption is the first line of defense against privacy violation. As much as our activities exist on a platform where information is easily duplicated, copied, and stored, equally those platforms provide encryption and security that make certain content only accessible by you as the user [14]. As AI progresses, it will also become better at protecting privacy. Biometric information can enhance this, as AI-driven systems guarantee both security and privacy.5 5 See, for example, Apple’s Face ID technology https://support.apple.com/en-us/HT208108
  • 11. 11 If the desire for privacy outpaces the capabilities of privacy violation, economic forces may easily overtake authoritarian attempts to trespass on private data. This requires a multi-faceted approach: privacy must be viewed as a desirable and necessary right, and, I would hope, those interested in selling that idea can develop technology to promote that right. In the same way that anti-fraud or “anti-dissent” technology may flag “undesirable” activity, smart privacy software could detect equally “undesirable” activity, protecting users against unauthorized use of their data. Regimes that exhibit economic success will also pose a significant perceived threat to liberal-democratic countries [1]. As real or empty as this threat may be, another technical solution does exist: the undermining of digital authoritarian states with AI itself. This is perhaps the most far-fetched solution. It may be that a digital type of war is upon us, but instead of robots with guns, it’s software with algorithms. Drawing on the words of Scott Bauguess, “It doesn’t matter if the predictions don’t make intuitive sense.” [8], it also doesn’t matter, in a sense, if the way AI works doesn’t make sense. We may design systems that have so much complexity that they exceed human understanding entirely – this doesn’t mean they suddenly rise up, but rather, we develop digital weapons that we don’t understand. As data becomes increasingly valuable, its loss becomes equally destructive. We already see the possible beginnings of such a war, the launch of Stuxnet [18] (a “smart virus”), exploitation of Facebook’s AI algorithms, and ransomware, which locks data with outside encryption. The smarter these programs become, the more damage they can do to authoritarian uses of data. As the stakes in data and software rise, the tensions between countries that wield this software them can be expected to increase [1]. Promoting privacy, and encouraging the development of AI driven encryption and privacy, I argue, is the best bet moving into the future. The political forces to maintain control may be too
  • 12. 12 strong to regulate or combat, perhaps the only force on par is that of economic gain: to sell advanced privacy options to individuals. Regardless, focus on ethical use of data in global politics will prove important, else we may face the erosion of privacy all together. CONCLUSION Throughout the course of this document, I have covered the key components of authoritarianism, and how AI can curb the pitfalls or exacerbate the dangerous aspects of such a political system. AI can promise greater optimization of economic systems, and in countries like China, implementing the insights from this system can only further accelerate their economic progress. At the same time, with increased data collection and the implementation of increasingly advanced algorithms, such as temporally deep recurrent neural nets, behaviors and actions of a citizenry falls under greater scrutiny and, ultimately, greater control. The “all seeing eye” of AI can, and already does, affect behavior, whether directly or indirectly. As these capabilities expand, infringement of privacy will too, and upset of the global system, which today favors liberal democracies, will become more probable. Defining and enforcing ethical use of data is important, however difficult. A more economical solution may be advocating of privacy, and cultural change to appreciate privacy as a right. This will motivate natural markets to develop advanced privacy software and technology. In all cases, conflicts between countries will take on an increasingly digital flavor as the stakes of big data increases. Perhaps AI will never escape human control, but only human understanding. Wielding tools that we don’t understand may have severe consequences, and moving carefully into this future is of the utmost importance.
  • 13. 13 REFERENCES [1] Wright, Nicholas. How Artificial Intelligence Will Reshape the Global Order. Foreign Affairs. Web Article. (2018). https://www.foreignaffairs.com/articles/world/2018-07-10/how-artificial-intelligence- will-reshape-global-order [2] Wynne Davis. PHOTOS: North Korea Celebrates 70 Years with Military Parade and Mass Games. (2018). https://www.npr.org/2018/09/10/646102084/photos-north-korea-celebrates-70-years-with- military-parade-and-mass-games [3] Miljenko Antić. Democracy Versus Dictatorship: The Influence of Political Regime On GDP per Capita Growth. UDK 330.55:32 JEL Classification E10, O11. Prethodno priopćenje. [4] Yuen Yuen Ang. Autocracy with Chinese Characteristics. Foreign Affairs (2018). https://www.foreignaffairs.com/articles/asia/2018-04-16/autocracy-chinese-characteristics [5] Xiaoru Wang. Behind the Great Firewall: The Internet and Democratization in China. Thesis, University of Michigan. (2009). https://deepblue.lib.umich.edu/bitstream/handle/2027.42/64681/wangx_1.pdf [6] Ng, Andrew. What Artificial Intelligence Can and Can’t Do Right Now. Web Article. Harvard Business Review (2016). [7] Faggella, Daniel. Artificial Intelligence and Security: Current Applications and Tomorrow’s Potentials. Web Article. (2017). Emerg. https://emerj.com/ai-sector-overviews/artificial-intelligence- and-security-applications/ [8] Bauguess, Scott W. “The Role of Big Data, Machine Learning, and AI in Assessing Risks: A Regulatory Perspective. Speech. OpRisk North America 2017, New York, New York. [9] Louise Lucas. The Chinese Communist Party Entangles Big Tech. Financial Times. (2018). [10] The Story of AlphaGo So Far. DeepMind Technologies Limited. (2018). https://deepmind.com/research/alphago/ [11] Jason Hartford, James Wright, Kevin Leyton-Brown. Deep Learning for Predicting Human Strategic Behavior. (2016). Advances in Neural Information Processing Systems. NIPS [12] Jeff Donahue, Lisa Anne Hendricks, Marcus Rohrbach, Subhashini Venugopalan, Sergio Guadarrama, Kate Saenko, Trevor Darrell. Long-term Recurrent Convolutional Networks for Visual Recognition and Description. arXiv:1411.4389v4 [13] Kiani, Rasoul; Bahdavi, Siamak; Keshavarzi, Amin. Analysis and Prediction of Crimes by Clustering and Classification. International Journal of Advanced Research in Artificial Intelligence Vol. 4, No.8. (2015). [14] Etzioni, A. (2007). "Are new technologies the enemy of privacy?" Knowledge, Technology & Policy, 20, 115–119. [15] Joy Buolamwini, Timnit Gebru. Gender Shades: Intersectional Accuracy Disparities in Commercial Gender Classification. (2018). Proceedings of Machine Learning Research 81:1–15. [16]. OECD. 2012. Inequality: Recent Trends in China and Experience in the OECD Area. China in Focus: Lessons and Challenges. [17] Iran nuclear deal: Key details. BBC. (2018). https://www.bbc.com/news/world-middle-east- 33521655 [18] Bruce Schneier. The Story Behind the Stuxnet Virus. (2010). https://www.forbes.com/2010/10/06/iran-nuclear-computer-technology-security-stuxnet- worm.html#4914795051e8 [19] Charlie Warzel Mark Zuckerberg Can’t Stop You From Reading This Because The Algorithms Have Already Won. Buzzfeed News. (2017). https://www.ft.com/content/5d0af3c4-846c-11e8-a29d- 73e3d454535d [20] Bank accounts. "Who to blame when 'computer says no'?". Telegraph.