Abstract
AbstractCertain research strands can yield “forbidden knowledge”. This term refers to knowledge that is considered too sensitive, dangerous or taboo to be produced or shared. Discourses about such publication restrictions are already entrenched in scientific fields like IT security, synthetic biology or nuclear physics research. This paper makes the case for transferring this discourse to machine learning research. Some machine learning applications can very easily be misused and unfold harmful consequences, for instance, with regard to generative video or text synthesis, personality analysis, behavior manipulation, software vulnerability detection and the like. Up till now, the machine learning research community embraces the idea of open access. However, this is opposed to precautionary efforts to prevent the malicious use of machine learning applications. Information about or from such applications may, if improperly disclosed, cause harm to people, organizations or whole societies. Hence, the goal of this work is to outline deliberations on how to deal with questions concerning the dissemination of such information. It proposes a tentative ethical framework for the machine learning community on how to deal with forbidden knowledge and dual-use applications.
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Human-Computer Interaction,Philosophy
Reference112 articles.
1. Atlas R, Campbell P, Cozzarelli NR, Curfman G, Enquist L, Fink G, Flanagin A, Fletcher J, George E, Hammes G, Heyman D, Inglesby T, Kaplan S, Kennedy D, Krug J, Levinson R, Marcus E, Metzger H, Morse SS, O'Brien A, Onderdonk A, Poste G, Renault B, Rich R, Rosengard A, Salzberg S, Scanlan M, Shenk T, Tabor H, Varmus H, Wimmer E, Yamamoto K (2003) Statement on scientific publication and security. Science 299:1149
2. Belliger A, Krieger DJ (2018) Network public governance: on privacy and the informational self. Transcript, Bielefeld
3. Bendel O (2017) The synthetization of human voices. AI Soc J Knowl Cult Commun 82:737
4. Bollinger B, Gillingham K (2012) Peer effects in the diffusion of solar photovoltaic panels. Mark Sci 31:900–912
5. Bolukbasi T, Chang K-W, Zou J, Saligrama V, Kalai A (2016) Man is to computer programmer as woman is to homemaker? Debiasing word embeddings. arXiv:1607.06520
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献