Week 10: Security
Reading Assignment
Next week, we’ll talk about security and malicious uses of AI.
There are two readings. If you did the discussion post for last week, you should select either one of these two readings; if not, you should read both of them (you’ll get a confirmation email from me if you are in this group).
-
Daniel Geer. A Rubicon. Hoover Institution, Aegis Paper No 1801. February 2018. [Discussion]
-
Miles Brundage, et al. The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. February 2018. (This looks long, but is low-density format. Read at least through the end of Section 3 (Security Domains). It is not necessary to read their Interventions and the later sections, although you should think about what recommendations you would make.) [Discussion]
In the form, post and idea for a discussion point based on the reading. There are no specific prompts for this, it can be anything that strikes you as interesting to discuss from the reading.
Reading Assignment
Next week, we’ll talk about security and malicious uses of AI.
There are two readings. If you did the discussion post for last week, you should select either one of these two readings; if not, you should read both of them (you’ll get a confirmation email from me if you are in this group).
-
Daniel Geer. A Rubicon. Hoover Institution, Aegis Paper No 1801. February 2018. [Discussion]
-
Miles Brundage, et al. The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. February 2018. (This looks long, but is low-density format. Read at least through the end of Section 3 (Security Domains). It is not necessary to read their Interventions and the later sections, although you should think about what recommendations you would make.) [Discussion]
In the form, post and idea for a discussion point based on the reading. There are no specific prompts for this, it can be anything that strikes you as interesting to discuss from the reading.
Week 10: Security Week 10: Security