1. Principle 1 — Human Rights
Principle 1 — human rights
1. Principle 1 — Human Rights
Issue: How can we ensure that A IS do not infringe upon human rights?
1. Principle 1 — Human Rights
To best honor human rights, society must assure the safety and security of A IS so that they are designed and operated in a way that benefits humans:
1. Principle 1 — Human Rights
Governance frameworks, including standards and regulatory bodies, should be established to oversee processes assuring that the use of A IS does not infringe upon human rights, freedoms, dignity, and privacy, and of traceability to contribute to the building of public trust in A IS.
1. Principle 1 — Human Rights
Governance frameworks, including standards and regulatory bodies, should be established to oversee processes assuring that the use of A IS does not infringe upon human rights, freedoms, dignity, and privacy, and of traceability to contribute to the building of public trust in A IS.
1. Principle 1 — Human Rights
Governance frameworks, including standards and regulatory bodies, should be established to oversee processes assuring that the use of A IS does not infringe upon human rights, freedoms, dignity, and privacy, and of traceability to contribute to the building of public trust in A IS.
1. Principle 1 — Human Rights
For the foreseeable future, A IS should not be granted rights and privileges equal to human rights: A IS should always be subordinate to human judgment and control.
2. Principle 2 — Prioritizing Well being
Principle 2 — Prioritizing well being
2. Principle 2 — Prioritizing Well being
Issue: Traditional metrics of prosperity do not take into account the full effect of A IS technologies on human well being.
2. Principle 2 — Prioritizing Well being
A IS should prioritize human well being as an outcome in all system designs, using the best available, and widely accepted, well being metrics as their reference point.
5. Principle 5 — A IS Technology Misuse and Awareness of It
Providing ethics education and security awareness that sensitizes society to the potential risks of misuse of A IS (e.g., by providing “data privacy” warnings that some smart devices will collect their user’s personal data).
5. Principle 5 — A IS Technology Misuse and Awareness of It
Delivering this education in scalable and effective ways, beginning with those having the greatest credibility and impact that also minimize generalized (e.g., non productive) fear about A IS (e.g., via credible research institutions or think tanks via social media such as Facebook or YouTube).
5. Principle 5 — A IS Technology Misuse and Awareness of It
educating government, lawmakers, and enforcement agencies surrounding these issues so citizens work collaboratively with them to avoid fear or confusion (e.g., in the same way police officers have given public safety lectures in schools for years; in the near future they could provide workshops on safe A IS).