Towards Defining a Trustworthy Artificial Intelligence System Development Maturity Model

被引:1
作者
Das, Sibanjan Debeeprasad [1 ,2 ]
Bala, Pradip Kumar [1 ]
Mishra, Arindra Nath [1 ]
机构
[1] Indian Inst Management Ranchi, Ranchi, India
[2] Indian Inst Management Ranchi, Prabandhan Nagar Nayasarai Rd, Ranchi 835303, Jharkhand, India
关键词
Trustworthy AI; security; fairness; machine learning; maturity model; INFORMATION-SYSTEMS; DESIGN SCIENCE; ONLINE TRUST; SECURITY; FRAMEWORK;
D O I
10.1080/08874417.2023.2251443
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The trustworthiness of artificial intelligence (AI) has been challenged for quite some time. The AI results will be trustworthy and reliable if trust-related principles are built into the AI system along with effective AI governance and monitoring. Therefore, this study seeks to define a trustworthy AI system development maturity model to assist firms in understanding where they stand in terms of developing a trustworthy AI platform. Since trust is time-bound, it is difficult to regain once lost, and this maturity model helps to establish robust controls and governance mechanisms in AI systems from their inception to minimize risk and establish trust. Hence, this study starts by defining the trustworthy enhancing techniques (TET) to build a trustworthy AI system, then advances on to the Trustworthy AI system maturity model (TAS-MM). The study's findings include a maturity model with four stages of trustworthy AI system growth and maturity progression.
引用
收藏
页码:775 / 796
页数:22
相关论文
共 92 条
[11]   Artificial Intelligence Crime: An Overview of Malicious Use and Abuse of AI [J].
Blauth, Tais Fernanda ;
Gstrein, Oskar Josef ;
Zwitter, Andrej .
IEEE ACCESS, 2022, 10 :77110-77122
[12]   Three naive Bayes approaches for discrimination-free classification [J].
Calders, Toon ;
Verwer, Sicco .
DATA MINING AND KNOWLEDGE DISCOVERY, 2010, 21 (02) :277-292
[13]  
Central Digital Office and Data, 2020, DAT ETH FRAM
[14]  
Chatila R., 2021, REFLECTIONS ARTIFICI, P13, DOI [DOI 10.1007/978-3-030-69128-82/COVER, 10.1007/978-3-030-69128-8_2, DOI 10.1007/978-3-030-69128-8_2]
[15]   Adversarial attack and defense in reinforcement learning-from AI security view [J].
Chen, Tong ;
Liu, Jiqiang ;
Xiang, Yingxiao ;
Niu, Wenjia ;
Tong, Endong ;
Han, Zhen .
CYBERSECURITY, 2019, 2 (01)
[16]   On-line trust: concepts, evolving themes, a model [J].
Corritore, CL ;
Kracher, B ;
Wiedenbeck, S .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2003, 58 (06) :737-758
[17]  
Cowls J., 2018, SSRN Electronic Journal, DOI DOI 10.2139/SSRN.3198732
[18]  
Creager E., 2019, ARXIV
[19]  
Deshpande A., 2022, P 2022 AAAI ACM C AI
[20]   Recommender Systems under European AI Regulations [J].
Di Noia, Tommaso ;
Tintarev, Nava ;
Fatourou, Panagiota ;
Schedl, Markus .
COMMUNICATIONS OF THE ACM, 2022, 65 (04) :69-73