Intelligence Artificielle

‘Tech for Good’ Needs a ‘Good Tech’ Approach

Responsible practices using tested processes must be the focus when creating new technology.

Technology has always been a double-edged sword. While it’s been a major force for progress, it has also been abused and caused harm. From steam power to Fordism, history shows that technology is neither good nor bad – by itself. It can, of course, be both, depending on how it’s used.

Telecommunications, specifically the intrnet, and more recently AI, which is estimated to contribute more than €11 illion to the global economy by 2030, are no diffrent.

On one hand, the internet connects us all – and kept us in touch with one another during the pandemic. AI and machine learning can help solve some of the world’s most pressing problems. Just a few examples are diagnosing diseasethwarting cyberattacks and fighting climate change. Yet, if left unchecked, algorithms can also perpetuate biases, create online echo-chambers, radicalisation and compromise safety and privacy.

2022 is poised to bring sweeping changes to digital regulations. The EU Parliament approved the Digital Services Act to increase online safety and consumer protection and is preparing the Artificial Intelligence Act to govern AI. The US Federal Trade Commission has published its guidance on AI, while China has launched a wave of regulations. The OECD currently tracks more than 700 AI policy initiatives across 60 countries.

Meanwhile, for years, the private and non-profit sectors have rallied behind the Tech for Good movement which strives to “put digital and technology at the service of humanity”. In its shortest and most sweeping form, it promises technology can help the world achieve the UN’s Sustainable Development Goals.

But in light of history, we must ask: Is it possible for Tech for Good to succeed without doing harm? We argue that the answer is largely about focusing on what we call “Good Tech”.

Good Tech prioritises processes before outcomes

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

Le règlement DORA : un tournant majeur pour la cybersécurité des institutions financières

Le règlement DORA : un tournant majeur pour la cybersécurité des institutions financières Le 17…

2 jours ago

Cybersécurité des transports urbains : 123 incidents traités par l’ANSSI en cinq ans

L’Agence nationale de la sécurité des systèmes d'information (ANSSI) a publié un rapport sur les…

2 jours ago

Directive NIS 2 : Comprendre les obligations en cybersécurité pour les entreprises européennes

Directive NIS 2 : Comprendre les nouvelles obligations en cybersécurité pour les entreprises européennes La…

4 jours ago

NIS 2 : entre retard politique et pression cybersécuritaire, les entreprises dans le flou

Alors que la directive européenne NIS 2 s’apprête à transformer en profondeur la gouvernance de…

5 jours ago

Quand l’IA devient l’alliée des hackers : le phishing entre dans une nouvelle ère

L'intelligence artificielle (IA) révolutionne le paysage de la cybersécurité, mais pas toujours dans le bon…

5 jours ago

APT36 frappe l’Inde : des cyberattaques furtives infiltrent chemins de fer et énergie

Des chercheurs en cybersécurité ont détecté une intensification des activités du groupe APT36, affilié au…

5 jours ago

This website uses cookies.