Table of Contents
Risks perceived by ordinary people
CEOs who don’t want to become ex-CEOs anytime soon will spend considerable time and attention on some form of “TOWS” analysis (Threats, Opportunities) , weaknesses and strengths).
Silent AI-Based Threats: Human-Created Weaknesses
Phrases to Ignore
Home Technology peripherals AI How CIOs can address the perceived risks posed by AI

How CIOs can address the perceived risks posed by AI

Mar 21, 2024 pm 01:01 PM
ai risk ceo

How CIOs can address the perceived risks posed by AI

Ask the average person what the biggest risks of AI are and their answers might include: AI will make us humans obsolete, Skynet will become a reality, make us humans extinct, deepfake creation Tools will be used by bad people to do bad things.

General CEOs believe that the biggest risk of AI is missed opportunities, especially because competitors may implement AI-based business capabilities earlier than they do.

As a CIO, you need to consider the actual AI risks and also foresee potential risks. Here's how to achieve this effectively.

Risks perceived by ordinary people

1. Will AI impact humans? Answer: This is not a risk, but a choice. Personal computers, then the Internet, then smartphones, all opened up opportunities for computer-augmented humans. AI can do the same, and business leaders can focus on building a stronger, more competitive business by using AI capabilities to augment and empower their employees.

They can, some will, others will use AI to automate tasks currently performed by the humans they employ.

Or, more likely, they will do both, neither will be better in an absolute sense, but they will be different. As a CIO, you must help communicate the company's intentions, whether AI is used to add employees or replace them.

Skynet is one of the possible AI futures that inspires shudders, but is also considered the most unlikely scenario. This is not because it is impossible to create killer robots, but because there is no good reason to create and invest in such destructive artificial intelligence.

In nature, preying on other organisms is one of the survival needs of most organisms. Predators chase their prey to ensure its survival and ability to reproduce. However, very few creatures other than humans would harm other species simply for fun. This behavior is rare and is usually an abnormal behavior caused by human intervention or environmental damage. The interdependence and balance in nature enable the relationship between prey and prey to be maintained. Every living thing plays an important role in this ecosystem. In addition to the fields of electricity and semiconductors, will we discover and have a firm will? It remains to be seen whether competition for resources among AIs will become so fierce that killer robot scenarios will become a problem we must face.

That’s because if AI competes with us in power and semiconductors, it’s less likely to waste resources building killer robots.

3. Deepfakes, yes, deepfakes are a problem, and as the cusp of the reality war, they are a problem that will only get worse, deepfake AI and deepfake detection AI will have to Improving faster and faster just to maintain each other's status.

So just as malware countermeasures evolved from standalone antivirus measures to industry-wide cybersecurity, we can expect a similar trajectory for deep fake countermeasures as the war on reality heats up.

AI Risks as Perceived by CEOs

CEOs who don’t want to become ex-CEOs anytime soon will spend considerable time and attention on some form of “TOWS” analysis (Threats, Opportunities) , weaknesses and strengths).

As a CIO, one of your most important responsibilities for a long time has been to help drive business strategy by connecting the dots, from IT-based capabilities to business opportunities (if your business is the first to leverage them) or threats (if a competitor exploits them first).

This was the case before the current AI craze took over the IT industry, that’s what “digital” was all about, and it’s even more true now.

Coupled with AI, CIOs have another layer of responsibility, which is how to integrate their new capabilities into the entire business.

Silent AI-Based Threats: Human-Created Weaknesses

There is another type of risk to worry about that gets little attention, called “man-made human vulnerabilities.”

Start from Daniel Kahneman’s thinking, fast and slow. In the book, Kahneman identifies two ways in which we think. When we think quickly, we use brain circuits that allow us to understand things at a glance, without delay, and with almost no effort. Thinking fast is also what we do when we "trust our guts."

When we think slowly, we're using a circuit that lets us multiply 17 by 53—a process that requires considerable concentration, time, and brainpower.

When it comes to AI, slow thinking is what expert systems do, and to that extent, what old-school computer programming does, thinking fast is what's most exciting about AI, and that's what neural networks are for.

In its current state of development, AI’s rapid thinking form is also prone to the same cognitive errors as trusting our intuition. For example:

Inferring causation from correlation: We all know we shouldn’t do this, however, it’s hard to stop ourselves from inferring causation when all our evidence is juxtaposed.

As it happens, what is called AI today largely consists of machine learning of neural networks, which involves inferring causation from correlation.

Back to Moderation: You watched The Great British Baking Show. You'll notice that whoever wins the Star Baker Award in one episode tends to bake worse in the next episode, which is the curse of the Star Baker.

It's just that it's not a curse, it's just randomness in action, every baker's performance follows a bell curve, when one wins Star Baker in a week, their performance has reached the bell shape One tail of the curve, the next time they bake, they are most likely to perform at average, not again at Star Baker Tail, because every time they bake, they are most likely to perform at average, not the winning tail.

There is no reason to expect machine learning AI to be immune to this fallacy; quite the contrary, faced with random process performance data points, we should expect AI to predict improvements after each poor outcome.

Then conclude that causation works.

No “show your work”: Well, it’s not your job, it’s the AI’s job. There is some active research into developing so-called "explainable AI", which is necessary.

Suppose you assigned an employee to evaluate a possible business opportunity and recommend a course of action to you, and they would do so and you would ask, "Why do you think that?" Any competent person Employees look forward to this question and are ready to answer it.

Until “explainable AI” becomes a feature rather than a wish list, AI is less capable in this area than the workers many businesses hope they replace—they can’t explain their own thoughts.

Phrases to Ignore

No doubt you have heard someone claim, in the context of AI, that “a computer will never know .

They are wrong, this has been a popular assertion since I first started in this business, and since then it has been obvious that computers can do anything, no matter which x you choose, And do it better than us.

The only question is how long we have to wait for it to happen.

The above is the detailed content of How CIOs can address the perceived risks posed by AI. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Centos shutdown command line Centos shutdown command line Apr 14, 2025 pm 09:12 PM

The CentOS shutdown command is shutdown, and the syntax is shutdown [Options] Time [Information]. Options include: -h Stop the system immediately; -P Turn off the power after shutdown; -r restart; -t Waiting time. Times can be specified as immediate (now), minutes ( minutes), or a specific time (hh:mm). Added information can be displayed in system messages.

How to check CentOS HDFS configuration How to check CentOS HDFS configuration Apr 14, 2025 pm 07:21 PM

Complete Guide to Checking HDFS Configuration in CentOS Systems This article will guide you how to effectively check the configuration and running status of HDFS on CentOS systems. The following steps will help you fully understand the setup and operation of HDFS. Verify Hadoop environment variable: First, make sure the Hadoop environment variable is set correctly. In the terminal, execute the following command to verify that Hadoop is installed and configured correctly: hadoopversion Check HDFS configuration file: The core configuration file of HDFS is located in the /etc/hadoop/conf/ directory, where core-site.xml and hdfs-site.xml are crucial. use

What are the backup methods for GitLab on CentOS What are the backup methods for GitLab on CentOS Apr 14, 2025 pm 05:33 PM

Backup and Recovery Policy of GitLab under CentOS System In order to ensure data security and recoverability, GitLab on CentOS provides a variety of backup methods. This article will introduce several common backup methods, configuration parameters and recovery processes in detail to help you establish a complete GitLab backup and recovery strategy. 1. Manual backup Use the gitlab-rakegitlab:backup:create command to execute manual backup. This command backs up key information such as GitLab repository, database, users, user groups, keys, and permissions. The default backup file is stored in the /var/opt/gitlab/backups directory. You can modify /etc/gitlab

Centos install mysql Centos install mysql Apr 14, 2025 pm 08:09 PM

Installing MySQL on CentOS involves the following steps: Adding the appropriate MySQL yum source. Execute the yum install mysql-server command to install the MySQL server. Use the mysql_secure_installation command to make security settings, such as setting the root user password. Customize the MySQL configuration file as needed. Tune MySQL parameters and optimize databases for performance.

How is the GPU support for PyTorch on CentOS How is the GPU support for PyTorch on CentOS Apr 14, 2025 pm 06:48 PM

Enable PyTorch GPU acceleration on CentOS system requires the installation of CUDA, cuDNN and GPU versions of PyTorch. The following steps will guide you through the process: CUDA and cuDNN installation determine CUDA version compatibility: Use the nvidia-smi command to view the CUDA version supported by your NVIDIA graphics card. For example, your MX450 graphics card may support CUDA11.1 or higher. Download and install CUDAToolkit: Visit the official website of NVIDIACUDAToolkit and download and install the corresponding version according to the highest CUDA version supported by your graphics card. Install cuDNN library:

Detailed explanation of docker principle Detailed explanation of docker principle Apr 14, 2025 pm 11:57 PM

Docker uses Linux kernel features to provide an efficient and isolated application running environment. Its working principle is as follows: 1. The mirror is used as a read-only template, which contains everything you need to run the application; 2. The Union File System (UnionFS) stacks multiple file systems, only storing the differences, saving space and speeding up; 3. The daemon manages the mirrors and containers, and the client uses them for interaction; 4. Namespaces and cgroups implement container isolation and resource limitations; 5. Multiple network modes support container interconnection. Only by understanding these core concepts can you better utilize Docker.

How to choose a GitLab database in CentOS How to choose a GitLab database in CentOS Apr 14, 2025 pm 05:39 PM

When installing and configuring GitLab on a CentOS system, the choice of database is crucial. GitLab is compatible with multiple databases, but PostgreSQL and MySQL (or MariaDB) are most commonly used. This article analyzes database selection factors and provides detailed installation and configuration steps. Database Selection Guide When choosing a database, you need to consider the following factors: PostgreSQL: GitLab's default database is powerful, has high scalability, supports complex queries and transaction processing, and is suitable for large application scenarios. MySQL/MariaDB: a popular relational database widely used in Web applications, with stable and reliable performance. MongoDB:NoSQL database, specializes in

How to operate distributed training of PyTorch on CentOS How to operate distributed training of PyTorch on CentOS Apr 14, 2025 pm 06:36 PM

PyTorch distributed training on CentOS system requires the following steps: PyTorch installation: The premise is that Python and pip are installed in CentOS system. Depending on your CUDA version, get the appropriate installation command from the PyTorch official website. For CPU-only training, you can use the following command: pipinstalltorchtorchvisiontorchaudio If you need GPU support, make sure that the corresponding version of CUDA and cuDNN are installed and use the corresponding PyTorch version for installation. Distributed environment configuration: Distributed training usually requires multiple machines or single-machine multiple GPUs. Place

See all articles