While many of us in this profession are paranoid, being killed by an evil AI ranks relatively low on our list of imminent daily threats. Still, some dire warnings (attributed to pundits or experts) about the dangers of artificial intelligence (AI) have flooded the media. In Gartner GTP SRMS team, we agree, of course – an AI will probably kill you [in the future]
However, we hypothesize that such sad happenstance will not occur due to some robot revolution or artificial sentience – but because some smart [but evil] humans will make it do it. To prove the point, we just started a new research project to cover topics like AI / smart machine exploitation, AI social engineering, algorithm cognitive bias exploitation, abusing machine ethics, trusted AI criteria, smart machine transparency / auditing and other SUPER-exciting subjects.
Note that this is “Maverick” research, designed to spark new, unconventional insights. Maverick research is unconstrained by our typical broad consensus-formation process to deliver breakthrough, innovative and disruptive ideas from our research incubator [this is a quote from standard Gartner disclaimer for Maverick research].
- Maverick* Research: The Industrialization of Nonroutine Work
- Maverick* Research: We Analyze Too Much, and Synthesize Too Little
- Maverick* Research: The Death of Authentication
- Maverick* Research: Kill Off Security Controls to Reduce Risk
Looking forward to a fun project!
P.S. BTW, if you have to fight an evil AI or a malignant robot before you have a chance to read our research, we suggest looking for an evil human who is manipulating the said machine. Take care of the human and the machine won’t harm you…eh…probably.
Possibly related posts:
Read Complimentary Relevant Research
Managing Risk and Security at the Speed of Digital Business
Digital business challenges the basic principles of information risk and security management. Risk and security leaders must understand...
View Relevant Webinars
Ransomware Protection: Facts and Myths
Solutions for preventing, detecting and recovering from ransomware have strengths and weaknesses. What are the true facts, and what myths...
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.