Abstract
Science and technology serve as the impetus of human progress. From the earliest bow-drill fire making to present-day AI, every small step of scientific–technological progress will propel human development by one giant leap. Yet, science is also a “double-edge sword,” as proved by human history that the abuse of technology will lead to the loss of freedom, even death to mankind. For example, although nuclear energy brings inexhaustible energy to human beings, nuclear weapon developed by such technology will endanger the security of the people around the world. As time passes, security threat keeps evolving. With the advent of AI, new opportunities are available for safety control. Meanwhile, there have arisen such issues as manipulated politics, fabrication of information, control of public opinions, and infringement of privacy, which will severely endanger human security. For this reason, we should be very prudent in developing AI, persist in attaching equal importance to security and development, and fully recognize the fact that without dead-sure security, there would have been no smooth development. In a word, human intelligence must learn to control AI and make it convoy the development of human society during the process of restructuring security order.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Bibliography
Allen, G., and T. Chan. 2017. Artificial intelligence and national security. Cambridge: Harvard College.
Artificial Intelligence: Opportunities and implications for the future of decision making. The British government, 2016.
Bai Shuo, Xiong Hao. 2014. Da Shu Ju Shi Dai De Jin Rong Jian Guan Chuang Xin (Innovation in financial regulation in the era of big data). China’s Finance, no. 15.
Carter, A. 2010. Intelligent transport systems. Traffic Engineering Design 54 (1).
Chio, C. 2017. Machine duping 101: Pwning deep learning systems. [20171010]. https://www.defcon.org/html/defcon24/dc24speakers.html.
Cramer, N. 2017. The climate is changing. So must architecture. (20171004) [20171010]. http://www.architectmagazine.com/design/editorial/the-climate-is-changing-so-must-architecture_o.
Curtis, S. 2016. Do you have the face of a killer? Faception software claims to be able to spot terrorists by analysing their faces. (20160525) [20170910]. http://www.mirror.co.uk/tech/you-face-killer-new-software8045646.
European Union food safety white paper. European Council, 2001.
Evtimov, I., K. Eykholt, E. Fernandes, et al. 2017. Robust physical: world attacks on deep learning models. (20170913) [20171010]. https://arxiv.org/abs/1707.08945.
Fact Sheet: Cybersecurity National Action Plan. (20160209) [20170910]. https://obamawhitehouse.archives.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan.
Fang Zhi Ren Gong Zhi Neng “Tuo Jiang” Ke Xue Jia Ji Ji Yan Jiu An Quan Dui Ce (Prevent AI “runaway” scientists actively research safety countermeasures). (20170907) [20171010]. http://tech.comnews.cn/ns/d/a/20170907/25116.html.
Fingas, J. 2017. Google AI could keep baby food safe. (20170725) [20170910]. https://www.engadget.com/2017/07/25/google-ai-helps-make-safer-baby-food/.
France fights to keep Emmanuel Macron’s email hack from distorting election. [20171010]. http://zeenews.india.com/world/france-fights-to-keep-emmanuel-macrons-email-hack-from-distorting-election2002784.html.
Gershgorn, D. 2016. Researchers have successfully tricked AI into seeing the wrong things. (20160728) [20171010]. https://www.popsci.com/researchers-have-successfully-tricked-ai-in-real-world#page-2.
Growing the Artificial Intelligence Industry in the UK. Gov. UK, 2017.
Guo Jia Hu Lian Wang Xin Xi Ban Gong Shi. Guo Jia Wang Luo Kong Jian An Quan Zhan Lüe (National cyberspace security strategy). (20161227) [20170910]. http://www.cac.gov.cn/201612/27/c_1120195926.htm.
Guo Nei Shou Chuang: Kuang En Wang Guan Cheng Gong Lan Jie “Fang Cheng Shi” Gong Ji (First in China: Converse gateway successfully intercepted the “equation” attack). (20150228) [20170910]. http://www.cctime.com/html/2015228/20152281753114192.htm.
Johnson, B.R., T.U. Kampe, M.A. Kuester, et al. 2010. NEON: The first continental scale ecological observatory with airborne remote sensing of vegetation canopy biochemistry and structure. Journal of Applied Remote Sensing, no. 4.
Knight, W. 2016. Baidu uses map searches to predict when crowds will get out of control. (20160324) [20170910]. https://www.technologyreview.com/s/601108/baidu-uses-map-searches-to-predict-when-crowds-will-get-out-of-control/.
Kohn L, T., J.M. Corrigan, and M.S. Donaldson. 2000. To err is human: Building a safer health system. Washington (DC): National Academies Press (US).
Larson, J., S. Mattu, L. Kirchner, et al. 2016. How we analyzed the COMPAS recidivism algorithm. (20160523) [20171010]. https://www.propublica.org/article/how-we-analyzed-the-compas-recidivism-algorithm.
Li Xiu Quan. 2017. Ren Gong Zhi Neng Ying Yong Zhong De An Quan, Yin Si He Lun Li Tiao Zhan Ji Ying Dui Si Kao (Security, privacy and ethical challenges in the application of artificial intelligence and their countermeasures). Science & Technology Review, no. 35.
Liu Hai Jiang, Sun Cong, Qi Yang, Deng. 2014. Guo Nei Wai Sheng Tai Huan Jing Guan Ce Yan Jiu Tai Zhan Wang Luo Fa Zhan Gai Kuang (The development of ecological environment observation and research station network at home and abroad). Environmental Monitoring in China, no. 30.
Morisy, M. 2016. How paypal boosts security with artificial intelligence. (20160125) [20170910]. https://www.technologyreview.com/s/545631/how-paypal-boosts-security-with-artificial-intelligence/.
National Research Council. 2011. Toward precision medicine: Building a knowledge network for biomedical research and a new taxonomy of disease. Washington (DC): National Academies Press.
Oktar, N. 2013. Human brain project. Journal of Neurological Sciences 30 (1).
PIN and password can be hacked via wearable device. (20160714) [20171010]. http://memeja.com/computing/pin-and-password-can-be-hacked-via-wearable-device/.
Podcast: How to train for a job developing AI at OpenAI or DeepMind. (20170721) [20170910]. https://80000hours.org/2017/07/podcast-the-world-needs-ai-researchers-heres-how-to-become-one/.
Preparing for the Future of Artificial Intelligence. America White House, 2016.
Regalado, A. 2016. Top U.S. intelligence official calls gene editing a WMD threat. (20160209) [20171010]. https://www.technologyreview.com/s/600774/top-us-intelligence-official-calls-gene-editing-a-wmd-threat/.
Ren Gong Zhi Neng Zai Jin Rong Ling Yu Ying Yong De Chu Bu Si Kao (Preliminary thinking on the application of artificial intelligence in financial field). (20160830) [20171010]. https://xueqiu.com/8020613086/74224087.
Roettgers, J. 2017. Instagram starts using artificial intelligence to moderate comments. Is Facebook up next? (20170629) [20170910]. http://variety.com/2017/digital/news/instagram-ai-machine-learning-facebook-filters1202482031/.
Stone, P., S. Kalyanakrishnan, S. Kraus, et al. 2016. Artificial intelligence and life in 2030. California: Stanford University.
Shi Chun Min. 2016. Ji Yin Bian Ji, Shi Jie Mo Ri Wu Qi? (Gene editing, doomsday weapons?). China National Defense Newspaper, 20160229.
System predicts 85 percent of cyber-attacks using input from human experts. (20160418) [20170910]. http://news.mit.edu/2016/ai-system-predicts85percent-cyber-attacks-using-input-human-experts0418.
The Directive on Security of Network and Information Systems. European Union, 2016.
The rise of the weaponized AI propaganda machine. (20170210) [20171010]. https://scout.ai/story/the-rise-of-the-weaponized-ai-propaganda-machine.
Thompson, C. 2016. 10 futuristic vehicles that will fundamentally transform how we travel. (20160813) [20171010]. http://www.businessinsider.com/vehicles-of-the-future20168.
Tian Chun Yuan. 2012. Ji Yu Shu Ju Wa Jue De Shi Pin An Quan Feng Xian Ping Jia Yu Yu Jing Xi Tong (Food safety risk assessment and early warning system based on data mining). Qingdao: Qingdao University of Technology.
Toyota announces Toyota Safety Sense and ICS safety support technologies that together reduce rear-end collisions by 90%. (20170828) [20171010]. http://www.acnnewswire.com/press-release/english/38148/toyota-announces-toyota-safety-sense-and-ics-safety-support-technologies-that-together-reduce-rear-end-collisions-by90.
Turner, K. 2016. AI may soon monitor your live videos on Twitter, Facebook. (20160727) [20170910]. https://www.washingtonpost.com/news/innovations/wp/2016/07/27/ai-may-soon-monitor-your-live-videos-on-twitter-facebook/?utm_term=.883cf49b355f.
Triggle, N. 2014. Care.data: How did it go so wrong? (20140219) [20170910]. http://www.bbc.com/news/health26259101.
World alliance for patient safety: Forward programme. Geneva, Switzerland: World Health Organization, 2004.
Yang Zong Xi, Tang Jin Rong, Zhou Ping, Deng. 2013. Da Shu Ju Shi Dai Xia Mei Guo Di Zhi Diao Cha Ju De Ke Xue Guan (The scientific view of usages in the era of big data). Geological Bulletin of China, no. 32.
Zhi Dong Xi. 2016. 31 Ye Ren Gong Zhi Neng Bao Gao : Shen Du Jie Ma Gui Gu Wu Ju Tou AI Bu Ju (31-page AI report: deep decoding the AI layout of silicon valley’s five giants). (20161107) [20170910]. http://www.sohu.com/a/118280162_115978.
Zi Dong Jia Shi Gei Wo Men De Jiao Tong An Quan Dai Lai Le Zen Yang De Ying Xiang? (How does autonomous driving affect our traffic safety?). (20170718) [20171010]. http://baijiahao.baidu.com/s?id=1573252860639611.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd. and Shanghai University Press
About this chapter
Cite this chapter
Lou, J. et al. (2018). Artificial Intelligence and Safety Control. In: Jin, D. (eds) Reconstructing Our Orders. Springer, Singapore. https://doi.org/10.1007/978-981-13-2209-9_6
Download citation
DOI: https://doi.org/10.1007/978-981-13-2209-9_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2208-2
Online ISBN: 978-981-13-2209-9
eBook Packages: EngineeringEngineering (R0)