Abstract
Given that cognitive computing technologies enable the computer to search for, pattern match, parse, synthesize, and interpret volumes of data at a very fast rate, the fear being described by some researchers is that these systems will go beyond helping humans and instead will become the next dominant entity on earth.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Stephen Hawking; “AI could spell end of the human race”, December 2, 2014; www.bbc.com/news/science-environment-30289705 .
- 2.
Sainato, M., “Stephen Hawking, Elon Musk, and Bill Gates Warn About Artificial Intelligence”, Observer Opinion, August 19, 2015, http:// observer.com/2015/08/stephen-hawking-elon-musk-and-bill-gates-warn-about-artificial-intelligence/.
- 3.
Bostrom, Nick, Superintelligence: Paths, dangers, strategies, OUP Oxford, 2014.
- 4.
- 5.
Orwell, George, 1984, New American Library, 1950.
- 6.
Dietterich, Thomas G. and Horvitz, Eric J., “Rise of Concerns about AI: Reflections and Directions”, Communications of the ACM, Vol. 58 No. 10, Pages 38-40, 2015.
- 7.
Dunn, J., “Are public Wi-Fi hotspots a security risk? Security risks of using public Wi-Fi explained”, Computerworld UK, August 20, 2015, www.computerworlduk.com/security/are-public-wi-fi-hotspots-really-major-security-risk-3623447/ .
- 8.
- 9.
Hampton, K., Goulet, L.S., Her, E. J., and Rainie, L., “Social Isolation and New Technology”, www.pewinternet.org/2009/11/04/social-isolation-and-new-technology/ .
- 10.
Toor, A., “A dangerous precedent that threatens everyone’s civil liberties, read Tim Cook’s email to Apple employees about its fight against the FBI”, February 22, 2016, www.theverge.com/2016/2/22/11092028/apple-tim-cook-fbi-encryption-internal-memo .
- 11.
Weitzner, D. J., Abelson, H., Berners-Lee, T., Feigenbaum, J., Hendler, J., and Sussman, G. J., “Information accountability”, Communications of the ACM, 51(6), pp. 82-87, 2008.
- 12.
Massy-Beresford, Helen, “Robot rescuers to help save lives after disasters”, Horizon, the EU Research and Innovation Magazine, March 19, 2014.
- 13.
- 14.
- 15.
Growing up with Technology, http://online.purdue.edu/ldt/learning-design-technology/resources/growing-up-with-technology , 2016.
- 16.
Asimov, Isaac, “Runaround”, published in Astounding Science Fiction, March, 1942.
- 17.
Carnegie Mellon University, “CareMedia: Automated Video and Sensor Analysis for a Geriatric Care, NSF Cooperative agreement no IIS-0205219, annual progress report”, 2004; http://internetofthingsagenda.techtarget.com/definition/pervasive-computing-ubiquitous-computing .
- 18.
Bharucha, A., J. et. al., “Intelligent Assistive Technology Applications to Dementia Care: Current Capabilities, Limitations, and Future Challenges”, American Journal Geriatric Psychiatry, 17(2): 88-104, Feb 2009, www.ncbi.nlm.nih.gov/pmc/articles/PMC2768007/#R66 .
- 19.
- 20.
- 21.
- 22.
- 23.
Nikolov, D., Oliveira, D.F.M., Flammini, A., Menczer, F., “Measuring online social bubbles”, PeerJ Computer Science, 1:e38, https://doi.org/10.7717/peerj-cs.38.
- 24.
Pariser, Eli, The filter bubble: How the new personalized web is changing what we read and how we think, Penguin, 2011.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 James Hendler and Alice M. Mulvehill
About this chapter
Cite this chapter
Hendler, J., Mulvehill, A.M. (2016). Social Challenges for the Social Machine. In: Social Machines. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-1156-4_8
Download citation
DOI: https://doi.org/10.1007/978-1-4842-1156-4_8
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-1157-1
Online ISBN: 978-1-4842-1156-4
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)