Iain Barclay
Identifying Roles, Requirements and Responsibilities in Trustworthy AI Systems
Barclay, Iain; Abramson, Will
Authors
Will Abramson
Abstract
Artificial Intelligence (AI) systems are being deployed around the globe in critical fields such as healthcare and education. In some cases, expert practitioners in these domains are being tasked with introducing or using such systems, but have little or no insight into what data these complex systems are based on, or how they are put together. In this paper, we consider an AI system from the domain practitioner’s perspective and identify key roles that are involved in system deployment. We consider the differing requirements and responsibilities of each role, and identify tensions between transparency and confidentiality that need to be addressed so that domain practitioners are able to intelligently assess whether a particular AI system is appropriate for use in their domain.
Citation
Barclay, I., & Abramson, W. (2021). Identifying Roles, Requirements and Responsibilities in Trustworthy AI Systems. In UbiComp '21: Adjunct Proceedings of the 2021 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2021 ACM International Symposium on Wearable Computers (264-271). https://doi.org/10.1145/3460418.3479344
Conference Name | UbiComp '21: The 2021 ACM International Joint Conference on Pervasive and Ubiquitous Computing |
---|---|
Conference Location | Online |
Start Date | Sep 21, 2021 |
End Date | Sep 26, 2021 |
Online Publication Date | Sep 24, 2021 |
Publication Date | 2021-09 |
Deposit Date | Jan 28, 2022 |
Publisher | Association for Computing Machinery |
Pages | 264-271 |
Book Title | UbiComp '21: Adjunct Proceedings of the 2021 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2021 ACM International Symposium on Wearable Computers |
ISBN | 978-1-4503-8461-2 |
DOI | https://doi.org/10.1145/3460418.3479344 |
Keywords | Assurance, Trust, Artificial Intelligence, Machine Learning, Ethics |
Public URL | http://researchrepository.napier.ac.uk/Output/2832737 |
You might also like
Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device
(2022)
Conference Proceeding
PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching
(2022)
Conference Proceeding
Evaluating Trust Assurance in Indy-Based Identity Networks Using Public Ledger Data
(2021)
Journal Article