Training Robots & Human Bias

Robotic development is creating the construction, operation and design of these new robotic computer systems which can substitute and replicate human actions. From science fiction, to cinema and, to working next to us in the workplace, and perhaps, soon, even driving us home from the office, robots have been steadily advancing into our everyday lives.

This development is constantly going forward but often unintended human input courses problems with the robotic outcome. Ayanna Howard is Professor and chair of the school of interactive computing at Georgia Institute of Technology and a self-proclaimed “roboticist extraordinaire.” 

Howard said she feels it is important for people to manage their expectations when it comes to robots as many have the view that they should be infallible. 

“Somehow we believe that robots will be smarter than they are, and not have any mistakes, but how many times have you had to reset your phone or your computer? Technology is not perfect and these robots will not be either.”

Howard made clear that robots inherit flaws from the humans who create them and the data they are programmed with. “We train these robots based on human values, human concepts, human data, human understanding but it also means that all of our historical biases are put into the machine,” she said.

As a robotic programmer she collects data and analyses it for healthcare and models clinicians and doctors.

“If the historical data is wrong and I’m doing it right then my robot is doing exactly what it is supposed to do. It has that inaccuracy but if the data is wrong because we as humans have been doing things wrong, my system doesn’t know,” 

This statement sounds almost like a call to get more domain expertise into the programming stage so that biased, erroneous or problematic data can be highlighted and eradicated or counteracted before it is programmed into the robot. This could happen through the roboticists embedding with the clinicians and doctors to get a thorough understanding of what good looks like and bring that back to the lab. 

Alternatively, a clinician could work with the roboticists in the lab to highlight and correct any errors or mistakes that they see.
Howard also called on the public to keep roboticists and programmers in check by pushing back on questionable or problematic developments. She gave the example of one robotics company that proclaimed to come out with a robot that would teach children manners. However, there was a strong reaction from parents who made it clear manners are imbued with values and it was not the place of a commercial company to instill values in their children.

Prof. Howard believes robotics is an exciting area to work in because there is a universal fascination with robotics and everyone from the very young to very old has an opinion about robots and most has their favourite one. That could be Wall-e, iRobot or Terminator. 

DataIQ:

You Might Also Read: 

Next-Gen Robotic Process Automation Leverages AI And Machine Learning:

 

 

« N. Korea’s Hackers Stole $2b To Fund Its Missile Program
Webinar: How to Build a Threat Detection Strategy in AWS »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYBER 1

CYBER 1

CYBER 1 provides cyber security solutions to customers wanting to be resilient against new and existing threats.

Bittium

Bittium

Bittium provides proven information security solutions for mobile devices and portable computers.

Secure Innovations

Secure Innovations

Secure Innovations is a cybersecurity firm dedicated to providing top-tier cyber security solutions for the Defense and the Intelligence Community.

ACA Group

ACA Group

ACA Group are a leading governance, risk, and compliance (GRC) advisor in financial services.

BLUECYFORCE

BLUECYFORCE

BLUECYFORCE is the leading professional training and cyber defense training organization in France.

iSolutions

iSolutions

iSolutions is an official reseller and engineering company of leading products and solutions for cybersecurity and information protection, optimization, visualization and control of applications

Russell Reynolds Associates

Russell Reynolds Associates

Russell Reynolds Associates is a global leadership advisory and search firm with functional expertise in Digital Leadership, Data & Analytics, and Compliance.

ISTC Foundation

ISTC Foundation

ISTC Foundation is one of the leading innovation centers in Armenia, founded by joint initiative of IBM, USAID, Armenian Government and Enterprise Incubator Foundation.

FPT Software

FPT Software

As a leading technology service provider, FPT assists customers of all sizes and from any industries in implementing and adapting digital technologies including cybersecurity.

SECUINFRA

SECUINFRA

Since 2010, SECUINFRA have specialized in detecting, analyzing and defending against cyber attacks.

Truvantis

Truvantis

Truvantis is a cybersecurity consulting organization providing best-in-class cybersecurity services to secure your organization’s infrastructure, data, operations and products.

Secfix

Secfix

Secfix helps companies get secure and compliant in weeks instead of months. We are on a mission to automate security and compliance for small and medium-sized businesses.

Cybastion

Cybastion

Cybastion develops robust world-class cybersecurity solutions tailored to suit the needs of different businesses, governments and public sector entities.

Applied Connective Technologies

Applied Connective Technologies

Applied Connective is one team for all your technology needs, from IT to phones, cyber security to physical security, audio/video and the infrastructure to support it.

EkoCyber

EkoCyber

EkoCyber partner with businesses as a value-added MSSP to provide top-tier, trusted and transparent cyber security services at an affordable price point.

Star Lab

Star Lab

Star Lab specializes in the development and productization of embedded security technologies.