Intelligence Artificielle

Can businesses help build trustworthy and accurate generative AI?

  • Content generated by AI, such as ChatGPT, has raised questions of accuracy and trustworthiness.
  • Businesses should be aware that while generative AI technologies have sped up the creation of content they should not rely upon them solely.
  • They should instead use these technologies as assistive tools or in building solid AI strategies to mitigate the risks.

Automation relies on human dependence on machine intelligence, which is deeply affected by the universal values of accuracy and trust. Automation and efficiency initiatives will be hampered by a lack of adherence to these principles.

An entirely novel wave of automation entered the world in November 2022 with the launch of ChatGPT and its potent computational capacity and ability to generate content on its own. Some incorrect content produced by ChatGPT and its rival Bard, however, has damaged public belief in these artificially intelligent machines. While many were enthralled by how quickly these tools could produce content, many were worried about the accuracy and trustworthiness of this machine-generated material.

A major problem with deep learning algorithms that generate content is whether or not that content is fraudulent, erroneous, spreading disinformation or simply wrong. Some have warned against the era of fakery ushered in by generative artificial intelligence (AI) technologies, arguing that robust AI regulations and strategies should be devised to prevent defamation of individuals and businesses.

This situation is getting more challenging: a recent study suggests individuals have only a 50% chance of correctly identifying whether AI-generated content is real or fake. Although programmers work to train their algorithms on ethical and correct data, there are now start-ups that assist organizations in identifying fraudulent records, such as OARO, which assists businesses in authenticating and verifying digital identity, compliance and media.

Source

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

Sécurité des mots de passe : bonnes pratiques pour éviter les failles

Sécurité des mots de passe : bonnes pratiques pour éviter les failles La sécurité des…

4 jours ago

Ransomware : comment prévenir et réagir face à une attaque

Ransomware : comment prévenir et réagir face à une attaque Le ransomware est l’une des…

5 jours ago

Cybersécurité et e-commerce : protéger vos clients et vos ventes

Cybersécurité et e-commerce : protéger vos clients et vos ventes En 2025, les sites e-commerce…

1 semaine ago

Les ransomwares : comprendre et se défendre contre cette menace

Les ransomwares : comprendre et se défendre contre cette menace En 2025, les ransomwares représentent…

1 semaine ago

RGPD et cybersécurité : comment rester conforme en 2025

RGPD et cybersécurité : comment rester conforme en 2025 Depuis sa mise en application en…

1 semaine ago

VPN : un outil indispensable pour protéger vos données

VPN : un outil indispensable pour protéger vos données Le VPN, ou « Virtual Private…

2 semaines ago

This website uses cookies.