In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/03 Report--
In today's rapid development of the Internet, people are paying more and more attention to personal information security, especially in recent years, the artificial intelligence of the fire, while artificial intelligence provides us with convenience, at the same time, it will also consider whether this system is safe or not. How to make artificial intelligence protect the privacy of users and customers has always been the focus of the technology field.
The constant scandals in the tech world over the past few years and a series of user data breaches by tech giants have led to growing concerns about user privacy issues in the next smart industry. User convenience and user privacy seem like two contradictory issues. Industry giants say that users exchange privacy for convenience. This is an equivalent exchange. If we can't crawl user privacy, then I don't know how to provide services to users.
This phrase is widely copied among business titans, as if privacy were less important than convenience. Even google CEO sandal pichai wrote on the new york times website that "privacy should not be a luxury. "In the face of such a strong attitude, users have sneered. In April this year, Amazon Alexa was exposed to eavesdropping scandals, but Bezos still said: " User trust is a valuable business asset. If you don't use their data properly, they'll know, they'll find out. Customers are smart, never underestimate customers. "
Although user convenience and privacy seem to be very contradictory opposites, but this is only a kind of excuse for the giants, in contrast, Apple has its own unique aspects of user privacy, compared with Android system IOS closed and self-built ecosystem will make mobile phones more secure. And in iOS 13, the mobile operating system released this fall, the new privacy design is as follows: Third-party software can no longer guess your location via Wi-Fi or Bluetooth triangulation.
As early as WWDC in 2016, Apple proposed the concept of so-called "differential privacy." Differential privacy uses algorithms to scramble individual user data so that no one can trace it to a specific user, but allows organizations to analyze data in batches to obtain large-scale overall trends. The goal of differential privacy is to preserve user identity and data details while still extracting some basic information for machine learning.
Apple also stores sensitive user information locally rather than in the cloud. For example, Face ID face information and Touch ID fingerprint information are stored on the iPhone chip, which explains why when you restore a phone through iCloud, you still have to re-enter Touch ID. Apple is more like a user-friendly company than the hypocrites above.
The above shows that user convenience and user privacy are not contradictory, among which there are many points that can be reconciled, just see how you plan and implement these, although it is very cumbersome, among which there are many technical difficulties. But these are not reasons to compromise the market.
The same is true of artificial intelligence. Intelligent technology is a double-edged sword. How to make artificial intelligence develop orderly on the track of ensuring user privacy and security is becoming the focus and difficulty of common concern at home and abroad.
Take "artificial intelligence + medical treatment" as an example, artificial intelligence technology has great potential for application in the field of medical health, but it also faces the problem of data_a large amount of medical data used to train artificial intelligence models may be images, genomes, electronic health records and other very sensitive information.
Intelligent voice interaction system helps enterprises to sell smart phone robots, also need some big data support, standardized voice outbound call system in the right enterprises have great help, but there are also some direct voice call into "call you" enterprises flood, these enterprises buy user information, these information sources all come from some APP or web crawler crawling user information, among which there are some large companies Internet company data. Departing from the initial intention of focusing on solving the problem of whether the telephone robot is good or not, the industry is also scarred by the adoption of the industry.
As inventors and users of new technologies, we need to think about these issues carefully and work together to promote the formation of new norms rather than ban them directly. "
With the use of big data, the improvement of computing power and the breakthrough of algorithms, artificial intelligence is becoming ubiquitous. The resulting problem is that people enjoy the "dividends" of artificial intelligence on the one hand, and face the dilemma of privacy being used excessively and illegally as a "resource" on the other. The challenge of how to deal with people's privacy "streaking" has become more and more serious.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.