Редактирование:
Chapter 5. "Surveillance and security"
Перейти к навигации
Перейти к поиску
Внимание:
Вы не вошли в систему. Ваш IP-адрес будет общедоступен, если вы запишете какие-либо изменения. Если вы
войдёте
или
создадите учётную запись
, её имя будет использоваться вместо IP-адреса, наряду с другими преимуществами.
Анти-спам проверка.
Не
заполняйте это!
[[File:Transcending Politics cover.jpg|thumb|200px|right|Chapter 5. "Surveillance and security" pages 95 - 121]] '''Chapter 5. "Surveillance and security"''' is the title of the fifth Chapter in the book ''Transcending Politics'' by [[David Wood]]. <blockquote>"Connectivity has its advantages. Consider the needs of hard-pressed parents, who must periodically break away from other tasks to check how well their baby is sleeping. Remote baby monitors, plugged into domestic networks, can cut these parents some slack, by guaranteeing to alert them if their child wakes unexpectedly. Other systems, using small sensors in a “smart sock” worn by the baby, can provide additional assurance about the baby’s heart rate and blood oxygen level. This can reduce anxiety about sudden cot death. The vendor’s website explains, “More data, less worry: 83% of parents report having better sleep while using the Smart Sock on their baby”.<br> What’s not to like about this innovative use of connected technology?"</blockquote> :: - [[David Wood]], Executive Director, [[Transpolitica]]<ref>https://transpolitica.org/</ref> ==The perils of connectivity== <blockquote> Let’s reflect on the predicament experienced by more than 100 car owners in Austin, Texas, as a result of the actions of a disgruntled former employee of used car retail firm Texas Auto Center. </blockquote> ==Big Brother is watching== <blockquote>We are being monitored as never before. We've grown accustomed to CCTV cameras that allow security officials and property owners to keep an eye on goings-on. We're aware that online companies use cookies to keep track of our interactions with websites. </blockquote> ==The Internet of Insecure Things== <blockquote>How bad can things become? Renowned management consultant Tom Peters foresees that a "catastrophic cyber disaster" is almost inevitable sometime in the next five to ten years. With rhetorical flourish, he tweeted that the only people who would deny this eventuality where "silicon kool-aid drinkers" who were "clueless, dangerous fools. <ref>https://twitter.com/tom_peters/status/820440755214827521</ref> </blockquote> ==Taking control of surveillance and security== <blockquote>What steps should we be taking, in the face of so many challenges to the security and wellbeing of our connected infrastructure? </blockquote> ==Small thinking won’t save the Internet== <blockquote>If you're still unconvinced about the grave risks posed to our collective security by flaws in the networks and that connect more and more aspects of our lives, you should take the time to read the 2015 book ''Future Crimes''<ref>“Future Crimes” http://www.futurecrimesbook.com/</ref> by Marc Goodman. </blockquote> ==Controlling military AI== <blockquote>I'll drop this chapter towards a close by reviewing 2 ways in which the problems of insecure unsafe software could be even more significant than what's already been covered the first of these is when the software is connected to military armament </blockquote> ==Controlling superintelligent AI== <blockquote>But wwhat about software with a very different mission? For example, is there any risk from software with the mission to calculate the optimal stock market investment strategy for a company? How about calculating the optimal set of marketing messages to boost the revenues for that company? What could go wrong if there are bugs in such software? </blockquote> ==Raising awareness of the threat landscape== <blockquote>The positive news about existential risks posed by malfunctioning superintelligence is that a number of clear and accessible books on this subject have been published in the last few years. These include:... </blockquote> ==Towards truly beneficial AI== <blockquote>In early January 2017...meeting was taking place in Asilomar, California...organized by the [[Future of Life Institute]] <ref>“Beneficial AI 2017” https://futureoflife.org/bai-2017/</ref> and had the title "Beneficial AI 2017". AI researchers from academia and industry spent five days in workshops with thought leaders from the fields of economics, law, ethics, and philosophy. </blockquote> ==External links== * [https://www.amazon.com/gp/product/B079R3RHCL/ref=dbs_a_def_rwt_bibl_vppi_i3 Buy the Book] * [https://transpolitica.org/projects/transcending-politics/endnotes/ For convenience of readers, this page lists all the endnotes from Transcending Politics, in easily clickable form.] ==References== {{Reflist}} [[Category:Books]] [[Category:Non-fiction]] [[Category:Politics]] [[Category:Transpolitica]] [[Category:Transcending Politics]] [[Category:David Wood]]
Описание изменений:
Пожалуйста, учтите, что любой ваш вклад в проект «hpluswiki» может быть отредактирован или удалён другими участниками. Если вы не хотите, чтобы кто-либо изменял ваши тексты, не помещайте их сюда.
Вы также подтверждаете, что являетесь автором вносимых дополнений, или скопировали их из источника, допускающего свободное распространение и изменение своего содержимого (см.
Hpluswiki:Авторские права
).
НЕ РАЗМЕЩАЙТЕ БЕЗ РАЗРЕШЕНИЯ ОХРАНЯЕМЫЕ АВТОРСКИМ ПРАВОМ МАТЕРИАЛЫ!
Отменить
Справка по редактированию
(в новом окне)
Шаблон, используемый на этой странице:
Шаблон:Reflist
(
править
)
Навигация
Персональные инструменты
Вы не представились системе
Обсуждение
Вклад
Создать учётную запись
Войти
Пространства имён
Статья
Обсуждение
русский
Просмотры
Читать
Править
История
Ещё
Навигация
Начало
Свежие правки
Случайная страница
Инструменты
Ссылки сюда
Связанные правки
Служебные страницы
Сведения о странице
Дополнительно
Как редактировать
Вики-разметка
Telegram
Вконтакте
backup