Training Robots & Human Bias

Robotic development is creating the construction, operation and design of these new robotic computer systems which can substitute and replicate human actions. From science fiction, to cinema and, to working next to us in the workplace, and perhaps, soon, even driving us home from the office, robots have been steadily advancing into our everyday lives.

This development is constantly going forward but often unintended human input courses problems with the robotic outcome. Ayanna Howard is Professor and chair of the school of interactive computing at Georgia Institute of Technology and a self-proclaimed “roboticist extraordinaire.” 

Howard said she feels it is important for people to manage their expectations when it comes to robots as many have the view that they should be infallible. 

“Somehow we believe that robots will be smarter than they are, and not have any mistakes, but how many times have you had to reset your phone or your computer? Technology is not perfect and these robots will not be either.”

Howard made clear that robots inherit flaws from the humans who create them and the data they are programmed with. “We train these robots based on human values, human concepts, human data, human understanding but it also means that all of our historical biases are put into the machine,” she said.

As a robotic programmer she collects data and analyses it for healthcare and models clinicians and doctors.

“If the historical data is wrong and I’m doing it right then my robot is doing exactly what it is supposed to do. It has that inaccuracy but if the data is wrong because we as humans have been doing things wrong, my system doesn’t know,” 

This statement sounds almost like a call to get more domain expertise into the programming stage so that biased, erroneous or problematic data can be highlighted and eradicated or counteracted before it is programmed into the robot. This could happen through the roboticists embedding with the clinicians and doctors to get a thorough understanding of what good looks like and bring that back to the lab. 

Alternatively, a clinician could work with the roboticists in the lab to highlight and correct any errors or mistakes that they see.
Howard also called on the public to keep roboticists and programmers in check by pushing back on questionable or problematic developments. She gave the example of one robotics company that proclaimed to come out with a robot that would teach children manners. However, there was a strong reaction from parents who made it clear manners are imbued with values and it was not the place of a commercial company to instill values in their children.

Prof. Howard believes robotics is an exciting area to work in because there is a universal fascination with robotics and everyone from the very young to very old has an opinion about robots and most has their favourite one. That could be Wall-e, iRobot or Terminator. 

DataIQ:

You Might Also Read: 

Next-Gen Robotic Process Automation Leverages AI And Machine Learning:

 

 

« N. Korea’s Hackers Stole $2b To Fund Its Missile Program
Webinar: How to Build a Threat Detection Strategy in AWS »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Information Security Group (ISG) - Royal Holloway

Information Security Group (ISG) - Royal Holloway

The Information Security Group, Royal Holloway, University of London, is an Academic Centres of Excellence in Cyber Security Research.

Avatu

Avatu

Avatu specialise in providing clients the advice, technology and tools they need to fight cyber and insider threats.

IABG

IABG

Activities include consulting services in the development of software systems in the area of secure information and data communication.

InnoSec

InnoSec

InnoSec is a software manufacturer of cyber risk management technology.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

DTS Solution

DTS Solution

DTS Solution delivers advanced cyber security solutions through is technology partnerships with industry leading security vendors and advanced consulting services.

Ekran System

Ekran System

Ekran System is an advanced insider threat detection solution for companies of any size.

BigWeb Technologies

BigWeb Technologies

BigWeb Technologies is dedicated to provide its clients with ICT related services including Infrastructure Solutions, Consultancy and Security.

Cyber Security Education

Cyber Security Education

CybersecurityEducation.org is an online directory of cyber security education and careers.

ERI

ERI

ERI is the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States.

Identity Management Institute (IMI)

Identity Management Institute (IMI)

Identity Management Institute (IMI) provides professional training and certification in cyber security with a focus on identity and access management, identity theft, and data protection.

Larsen & Toubro Infotech (LTI)

Larsen & Toubro Infotech (LTI)

LTI is a global technology consulting and digital solutions company with operations in 33 countries.

NXM Labs

NXM Labs

NXM is a leader in a leader in advanced cybersecurity software for connected devices.

Involta

Involta

Involta orchestrates IT transformation journeys using well-defined and rigorous processes to deliver hybrid cloud solutions, consulting and data center services tailored to our clients’ needs.

Polestar Industrial IT

Polestar Industrial IT

Polestar work on both sides of the IT & OT divide. Network, Data & Asset Security is our priority. Polestar installations are robust and resilient and comply with the appropriate security.

Reken

Reken

Reken are building a new type of AI platform and products to protect against generative AI threats.