Beyond the Algorithm
Home > Computing and Information Technology > Computer science > Artificial intelligence > Beyond the Algorithm: AI, Security, Privacy, and Ethics
Beyond the Algorithm: AI, Security, Privacy, and Ethics

Beyond the Algorithm: AI, Security, Privacy, and Ethics

|
     0     
5
4
3
2
1




Out of Stock


Notify me when this book is in stock
About the Book

As artificial intelligence (AI) becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology.   Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview. The book explores the ethical challenges that professionals—and, increasingly, users—are encountering as AI becomes not just a promise of the future, but a powerful tool of the present.   An overview of the history and development of AI, from the earliest pioneers in machine learning to current applications and how it might shape the future Introduction to AI models and implementations, as well as examples of emerging AI trends Examination of vulnerabilities, including insight into potential real-world threats, and best practices for ensuring a safe AI deployment Discussion of how to balance accountability, privacy, and ethics with regulatory and legislative concerns with advancing AI technology A critical perspective on regulatory obligations, and repercussions, of AI with copyright protection, patent rights, and other intellectual property dilemmas An academic resource and guide for the evolving technical and intellectual challenges of AI Leading figures in the field bring to life the ethical issues associated with AI through in-depth analysis and case studies in this comprehensive examination.

Table of Contents:
Preface.. . . . . . . . . . . . . . . . . xvii 1 Historical Overview of Artificial Intelligence (AI) and Machine Learning (ML).. . . . . . . . . . . . 1 The Story of Eva. . . . . . . . . . . . . 2 The Origins.. . . . . . . . . . . . . . 3 Advancements of Artificial Intelligence.. . . . . . . . . 5 Understanding AI and ML. . . . . . . . . . . 8 Concluding the Story of Eva.. . . . . . . . . . . 25 Summary. . . . . . . . . . . . . . 26 Test Your Skills. . . . . . . . . . . . . 27 Exercise 1-1: Exploring the Historical Development and Ethical Concerns of AI.. . . . . . . . . . . . 29 Exercise 1-2: Understanding AI and ML. . . . . . . . . 29 Exercise 1-3: Comparison of ML Algorithms.. . . . . . . . 30 Exercise 1-4: Assessing Applications of ML Algorithms. . . . . . 31 2 Fundamentals of AI and ML Technologies and Implementations.. . 33 What Are the Leading AI and ML Technologies and Algorithms?. . . . 34 ChatGPT and the Leading AI and ML Technologies: Exploring Capabilities and Applications.. . . . . . . . . . 43 Understanding the Two Categories of AI: Capability-Based Types and Functionality-Based Types. . . . . . . . 52 Leveraging AI and ML to Tackle Real-World Challenges: A Case Study. . . 53 Reflecting on the Societal and Ethical Implications of AI Technologies.. . 54 Assessing Future Trends and Emerging Developments in AI and ML Technologies.. . . . . . . . . . . . . 56 Summary. . . . . . . . . . . . . . 57 Test Your Skills. . . . . . . . . . . . . 59 Exercise 2-1: Algorithm Selection Exercise: Matching Scenarios with Appropriate Machine Learning Techniques.. . . . . . . . 61 Exercise 2-2: Exploring AI and ML Technologies.. . . . . . . 63 Exercise 2-3: Capabilities and Benefits of AI-Optimized Hardware.. . . 63 Exercise 2-4: Understanding the Two Categories of AI.. . . . . . 64 Exercise 2-5: Future Trends and Emerging Developments in AI and ML Technologies. . . . . . . . . . . . . . 64 3 Generative AI and Large Language Models.. . . . . . . 65 Introduction to Generative AI and LLMs. . . . . . . . 66 Large Language Models (LLMs): Revolutionizing Natural Language Processing (NLP). . . . . . . . . . . 88 Hugging Face.. . . . . . . . . . . . . 95 Auto-GPT: A Revolutionary Step in Autonomous AI Applications. . . . 97 Summary. . . . . . . . . . . . . . 98 Test Your Skills. . . . . . . . . . . . . 99 Exercise 3-1: Hugging Face.. . . . . . . . . . . 102 Exercise 3-2: Transformers in AI. . . . . . . . . . 102 Additional Resources. . . . . . . . . . . . 104 4 The Cornerstones of AI and ML Security.. . . . . . . . 105 Recognizing the Need for AI Security.. . . . . . . . . 105 Adversarial Attacks.. . . . . . . . . . . . 107 Data Poisoning Attacks. . . . . . . . . . . 109 OWASP Top Ten for LLMs. . . . . . . . . . . 112 Countermeasures Against Model Stealing Attacks. . . . . . 124 Membership Inference Attacks.. . . . . . . . . . 124 Evasion Attacks.. . . . . . . . . . . . . 130 Model Inversion Attacks.. . . . . . . . . . . 135 Backdoor Attacks. . . . . . . . . . . . . 137 Exploring Defensive Measures.. . . . . . . . . . 137 Summary. . . . . . . . . . . . . . 138 Test Your Skills. . . . . . . . . . . . . 140 Additional Resources. . . . . . . . . . . . 142 5 Hacking AI Systems.. . . . . . . . . . . . 143 Hacking FakeMedAI. . . . . . . . . . . . 143 MITRE ATLAS.. . . . . . . . . . . . . 146 A Deep Dive into the AI and ML Attack Tactics and Techniques.. . . . 147 Exploiting Prompt Injection.. . . . . . . . . . 161 Red-Teaming AI Models. . . . . . . . . . . 162 Summary. . . . . . . . . . . . . . 162 Test Your Skills. . . . . . . . . . . . . 163 Exercise 5-1: Understanding the MITRE ATT&CK Framework.. . . . 166 Exercise 5-2: Exploring the MITRE ATLAS Framework.. . . . . . 166 6 System and Infrastructure Security. . . . . . . . . 167 The Vulnerabilities and Risks Associated with AI Systems and Their Potential Impact. . . . . . . . . . . . 167 AI BOMs. . . . . . . . . . . . . . 176 Data Security Vulnerabilities.. . . . . . . . . . 177 Cloud Security Vulnerabilities.. . . . . . . . . . 179 Secure Design Principles for AI Systems.. . . . . . . . 182 AI Model Security.. . . . . . . . . . . . 183 Infrastructure Security for AI Systems. . . . . . . . . 184 Threat Detection and Incident Response for AI Systems.. . . . . 190 Additional Security Technologies and Considerations for AI Systems. . . 193 Summary. . . . . . . . . . . . . . 195 Test Your Skills. . . . . . . . . . . . . 196 Additional Resources. . . . . . . . . . . . 197 7 Privacy and Ethics: Navigating Privacy and Ethics in an AI-Infused World.. . . . . . . . . . . . . 199 Why Do We Need to Balance the Benefits of AI with the Ethical Risks and Privacy Concerns?.. . . . . . . . . . 200 What Are the Challenges Posed by AI in Terms of Privacy Protection, and What Is the Importance of Privacy and Ethics in AI Development and Deployment?. . . . . . . . . 201 The Dark Side of AI and ChatGPT: Privacy Concerns and Ethical Implications. . . . . . . . . . . . 203 Data Collection and Data Storage in AI Algorithms: Potential Risks and Ethical Privacy Concerns. . . . . . . . 206 The Moral Tapestry of AI and ChatGPT.. . . . . . . . 212 Preserving Privacy, Unleashing Knowledge: Differential Privacy and Federated Learning in the Age of Data Security.. . . . . . 223 Harmony in the Machine: Nurturing Fairness, Diversity, and Human Control in AI Systems.. . . . . . . . . . 224 Real-World Case Study Examples and Fictional Stories of Privacy Breaches in AI and ChatGPT.. . . . . . . . . 226 Summary. . . . . . . . . . . . . . 232 Test Your Skills. . . . . . . . . . . . . 234 Exercise 7-1: Privacy Concerns and Ethical Implications of AI. . . . 237 Exercise 7-2: Ethical Privacy Concerns in Data Collection and Storage by AI Algorithms.. . . . . . . . . . . . . 238 Exercise 7-3: Balancing Autonomy and Privacy in the Age of AI. . . . 238 Exercise 7-4: Safeguarding Privacy and Ethical Frontiers.. . . . . 239 8 Legal and Regulatory Compliance for AI Systems.. . . . . 241 Legal and Regulatory Landscape.. . . . . . . . . 242 Compliance with AI Legal and Regulatory Data Protection Laws. . . 245 Intellectual Property Issues in Conversational AI.. . . . . . 247 Unraveling Liability and Accountability in the Age of AI. . . . . 249 Ethical Development and Deployment of AI Systems: Strategies for Effective Governance and Risk Management.. . . . . . 252 International Collaboration and Standards in AI. . . . . . . 255 Future Trends and Outlook in AI Compliance.. . . . . . . 257 Unleashing the Quantum Storm: Fictional Story on AI Cybersecurity, Quantum Computing, and Novel Cyberattacks in Oxford, 2050. . . . 260 Summary. . . . . . . . . . . . . . 261 Test Your Skills. . . . . . . . . . . . . 263 Exercise 8-1: Compliance with Legal and Regulatory Data Protection Laws.. . . . . . . . . . . . 266 Exercise 8-2: Understanding Liability and Accountability in AI Systems. . . . . . . . . . . . . . 266 Exercise 8-3: International Collaboration and Standards in AI.. . . . 267 Test Your Skills Answers and Solutions. . . . . . . . . 269   9780138268459, TOC, 1/4/2024


Best Sellers


Product Details
  • ISBN-13: 9780138268398
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Addison Wesley
  • Language: English
  • ISBN-10: 0138268398
  • Publisher Date: 30 Jan 2024
  • Binding: Digital download
  • Sub Title: AI, Security, Privacy, and Ethics


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Beyond the Algorithm: AI, Security, Privacy, and Ethics
Pearson Education (US) -
Beyond the Algorithm: AI, Security, Privacy, and Ethics
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Beyond the Algorithm: AI, Security, Privacy, and Ethics

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!