We noted you are experiencing viewing problems
-
Check with your IT department that JWPlatform, JWPlayer and Amazon AWS & CloudFront are not being blocked by your network. The relevant domains are *.jwplatform.com, *.jwpsrv.com, *.jwpcdn.com, jwpltx.com, jwpsrv.a.ssl.fastly.net, *.amazonaws.com and *.cloudfront.net. The relevant ports are 80 and 443.
-
Check the following talk links to see which ones work correctly:
Auto Mode
HTTP Progressive Download Send us your results from the above test links at access@hstalks.com and we will contact you with further advice on troubleshooting your viewing problems. -
No luck yet? More tips for troubleshooting viewing issues
-
Contact HST Support access@hstalks.com
-
Please review our troubleshooting guide for tips and advice on resolving your viewing problems.
-
For additional help, please don't hesitate to contact HST support access@hstalks.com
We hope you have enjoyed this limited-length demo
This is a limited length demo talk; you may
login or
review methods of
obtaining more access.
Printable Handouts
Navigable Slide Index
- Introduction
- Human looping and its implications
- CyberS/T on the world stage
- Core questions and issues
- Big data caveats
- AI caveats
- Issues, tensions, and conflicts
- Globally relevant design
- Particularity of 'collective efforts'
- Mechanisms for change
- Process in praxis
- Preparedness process
- Get SMART
- Select bibliography
- Thank you for listening
Topics Covered
- Human looping
- Ethics and morals behind big data
- Big data caveats
- AI caveats
- Globally relevant technology
- Get SMART
Talk Citation
Giordano, J. (2023, February 28). Big data, artificial intelligence and biosecurity on the global stage 2 [Video file]. In The Biomedical & Life Sciences Collection, Henry Stewart Talks. Retrieved December 3, 2024, from https://doi.org/10.69645/SYXO8379.Export Citation (RIS)
Publication History
Financial Disclosures
- There are no commercial financial matters and/or conflict(s) of interest to disclose. Prof. Giordano’s work is supported in part by funding from the Henry Jackson Foundation for Military Medicine; National Sciences Foundation Award 2113811 - Amendment ID 001; Award UL1TR001409 from the National Center for Advancing Translational Sciences (NCATS), National Institutes of Health, through the Clinical and Translational Science Awards Program (CTSA), a trademark of the Department of Health and Human Services, part of the Roadmap Initiative, “Re-Engineering the Clinical Research Enterprise”; The Institute for Defense Analysis; Asklepios Biosciences; Veterans of War Foundation, and Leadership Initiatives.
Big data, artificial intelligence and biosecurity on the global stage 2
Published on February 28, 2023
31 min
A selection of talks on Pharmaceutical Sciences
Transcript
Please wait while the transcript is being prepared...
0:00
I'm Dr. James Giordano,
and welcome to part 2 of
our discussion of big data,
artificial intelligence
and biosecurity
on the global stage.
0:11
As you may recall, we left off
with the discussion
of human looping and
its potential implications to
what extent humans are in,
on or out of the loop,
but also which humans?
This becomes not just
a trivial question
when we consider
that at this point,
the use of big data systems,
that use of old data
and cyber systems are
human enterprises
that are essentially
generated for other
human enterprises.
In other words, humans
build these things and use
these things and put them to use
in human effort,
human endeavors.
But the question
then becomes what
endeavors? Where? For whom?
It begs the question,
if you will, Which rationality?
What approach towards
this rationality?
And what are the
relative guidelines in
governances that are
in place based upon
human distinctions as
well as similarities?
Distinctions in terms of
various needs and
values and also
those that had been propagated
historically within
and between cultures.
So if we look for example at
cyber science and technology
on the world stage,
it becomes important to take
a realistic view of what
this obtains an entails.
1:16
In the global site picture for
2020 and for the next
decade sees China,
for example on a pace to
outspend the United States
by an order of magnitude within
the next 10 to 15 years,
and obviously with
this then does,
is creates something
of an omnibus,
a juggernaut and capability.
China as an exemplar,
I think is important
not to highlight
any particular dissonances per
se that may be
capricious or nefarious,
but realistically
because we're seeing
is arising capability in
those social cultures
that have not been
exclusively western
over the past 50 years.
Certainly a country like China,
as well as a number of others
have distinct histories.
Distinct history's
both individually
and within their
interactions with the
"Proverbial West" as well
as their interactions
internationally.
And as such, the use of data and
cyber sciences and technology
reflects probably
first and foremost,
what those intranational
initiatives
agendas needs may bespeak in
demand and then
secondarily what that then
confers in terms of
international capability,
leverage, interaction,
and in some cases,
hegemony in and across
a variety of domains
and dimensions.
If we look to the
2025 to 2030 vista,
we also see similar,
if not equivalent progress,
investment and
therefore engagement in
data science and
the cyber science
and technology by Russia,
Iran, North Korea,
virtual nations and
even non-state actors.
The idea of data and
cyber scientific,
quote, "hacking, public
science", if you will,
is not inherently problematic,
but it does open up
particular vulnerabilities as
regards to penetration of
these public science groups
and a variety of individuals and
systems that may, "Hack them".
Hacking the hacker, if you will.
This then brings up a
number of core issues.
Not least of which is how
secure are these systems given
the increasing
utility of data and
the relative ubiquity of
data acquisition
and use systems.
At this point it becomes
important to consider
that security,
literally security,
how secure are these systems
and how secure are patterns of
engagement in use becomes at
least an important factor,
if not, a predicate
for moving forward.
One of the important
considerations here is that
a lack of focus
and or commitment
to cybersecurity may provide
exponential growth and
opportunities for
relative exploitation.
That doesn't
necessarily infer that,
that exploitation need be
capricious or nefarious,
but rather that literally
the lack of commitment in
any one particular
area may create
opportunities for others
to then assume that area.
This then opens
the door for what
cybersecurity actually means,
it could mean, and should mean.
Hide