Skip to main content

Social Challenges for the Social Machine

  • Chapter
  • First Online:
Social Machines

Abstract

Given that cognitive computing technologies enable the computer to search for, pattern match, parse, synthesize, and interpret volumes of data at a very fast rate, the fear being described by some researchers is that these systems will go beyond helping humans and instead will become the next dominant entity on earth.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Stephen Hawking; “AI could spell end of the human race”, December 2, 2014; www.bbc.com/news/science-environment-30289705 .

  2. 2.

    Sainato, M., “Stephen Hawking, Elon Musk, and Bill Gates Warn About Artificial Intelligence”, Observer Opinion, August 19, 2015, http:// observer.com/2015/08/stephen-hawking-elon-musk-and-bill-gates-warn-about-artificial-intelligence/.

  3. 3.

    Bostrom, Nick, Superintelligence: Paths, dangers, strategies, OUP Oxford, 2014.

  4. 4.

    www.weforum.org/agenda/2016/01/the-fourth-industrial-revolution-what-it-means-and-how-to-respond

  5. 5.

    Orwell, George, 1984, New American Library, 1950.

  6. 6.

    Dietterich, Thomas G. and Horvitz, Eric J., “Rise of Concerns about AI: Reflections and Directions”, Communications of the ACM, Vol. 58 No. 10, Pages 38-40, 2015.

  7. 7.

    Dunn, J., “Are public Wi-Fi hotspots a security risk? Security risks of using public Wi-Fi explained”, Computerworld UK, August 20, 2015, www.computerworlduk.com/security/are-public-wi-fi-hotspots-really-major-security-risk-3623447/ .

  8. 8.

    www.ted.com/talks/sherry_turkle_alone_together

  9. 9.

    Hampton, K., Goulet, L.S., Her, E. J., and Rainie, L., “Social Isolation and New Technology”, www.pewinternet.org/2009/11/04/social-isolation-and-new-technology/ .

  10. 10.

    Toor, A., “A dangerous precedent that threatens everyone’s civil liberties, read Tim Cook’s email to Apple employees about its fight against the FBI”, February 22, 2016, www.theverge.com/2016/2/22/11092028/apple-tim-cook-fbi-encryption-internal-memo .

  11. 11.

    Weitzner, D. J., Abelson, H., Berners-Lee, T., Feigenbaum, J., Hendler, J., and Sussman, G. J., “Information accountability”, Communications of the ACM, 51(6), pp. 82-87, 2008.

  12. 12.

    Massy-Beresford, Helen, “Robot rescuers to help save lives after disasters”, Horizon, the EU Research and Innovation Magazine, March 19, 2014.

  13. 13.

    http://dronewars.net/2015/03/31/think-drones-technology-is-not-really-the-problem-think-again/

  14. 14.

    https://en.wikipedia.org/wiki/Flash_crash

  15. 15.

    Growing up with Technology, http://online.purdue.edu/ldt/learning-design-technology/resources/growing-up-with-technology , 2016.

  16. 16.

    Asimov, Isaac, “Runaround”, published in Astounding Science Fiction, March, 1942.

  17. 17.

    Carnegie Mellon University, “CareMedia: Automated Video and Sensor Analysis for a Geriatric Care, NSF Cooperative agreement no IIS-0205219, annual progress report”, 2004; http://internetofthingsagenda.techtarget.com/definition/pervasive-computing-ubiquitous-computing .

  18. 18.

    Bharucha, A., J. et. al., “Intelligent Assistive Technology Applications to Dementia Care: Current Capabilities, Limitations, and Future Challenges”, American Journal Geriatric Psychiatry, 17(2): 88-104, Feb 2009, www.ncbi.nlm.nih.gov/pmc/articles/PMC2768007/#R66 .

  19. 19.

    www.alz.org/research/funding/alzheimers_research_partnerships.asp

  20. 20.

    https://aspe.hhs.gov/basic-report/barriers-implementing-technology-residential-long-term-care-settings

  21. 21.

    www.wearables.com/5-baby-monitors-wearable-infant-tech/

  22. 22.

    http://blogs.microsoft.com/blog/2016/03/25/learning-tays-introduction/

  23. 23.

    Nikolov, D., Oliveira, D.F.M., Flammini, A., Menczer, F., “Measuring online social bubbles”, PeerJ Computer Science, 1:e38, https://doi.org/10.7717/peerj-cs.38.

  24. 24.

    Pariser, Eli, The filter bubble: How the new personalized web is changing what we read and how we think, Penguin, 2011.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 James Hendler and Alice M. Mulvehill

About this chapter

Cite this chapter

Hendler, J., Mulvehill, A.M. (2016). Social Challenges for the Social Machine. In: Social Machines. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-1156-4_8

Download citation

Publish with us

Policies and ethics