{"id":1697,"date":"2019-05-15T02:44:59","date_gmt":"2019-05-15T02:44:59","guid":{"rendered":"http:\/\/kusuaks7\/?p=1302"},"modified":"2023-08-23T08:42:22","modified_gmt":"2023-08-23T08:42:22","slug":"verifiable-ai-data-why-its-critical-for-the-automation-revolution","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/ai-ml\/verifiable-ai-data-why-its-critical-for-the-automation-revolution\/","title":{"rendered":"Verifiable AI Data: Why It\u2019s Critical for the Automation Revolution"},"content":{"rendered":"<p>Businesses are increasingly using AI to automate processes to gain efficiencies, be more competitive and avoid disruption in their markets. According to a recent<a href=\"https:\/\/www.accenture.com\/us-en\/insight-technology-trends-2018\" target=\"_blank\" rel=\"noreferrer noopener\" label=\" (opens in a new tab)\" class=\"broken_link\">\u00a0Accenture survey<\/a>, 82% of executives say that their organizations are using data and algorithms based on that data to drive critical and automated decision-making at unprecedented scale.<\/p>\n<p>But what if the data entering the AI algorithms has been compromised along the way, or the algorithms themselves altered?<\/p>\n<p>Admiral Michael S. Rogers of the U.S. Navy and Director of the NSA has said that\u00a0<a href=\"https:\/\/www.doncio.navy.mil\/CHIPS\/ArticleDetails.aspx?ID=10070\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">data tampering could become the greatest cybersecurity threat<\/a>organizations face. Kissinger Associates CEO Jami Miscik\u00a0<a href=\"http:\/\/fortune.com\/2018\/11\/06\/jami-miscik-kissinger-associates\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">agrees<\/a>\u00a0that a more damaging brand of cyberattack would be where perpetrators don\u2019t steal the data \u2014\u00a0\u00a0<em>but change it<\/em>!\u00a0 She offered potential examples of companies not knowing where their inventories are, or financial services firms having the balances changed in their accounts and noted that such tactics could wreak havoc for businesses and the broader economy at a time when there is already flagging confidence in the media and the political system.<\/p>\n<p>One prime example comes from the oil industry. If hackers access data sources and attempt to shut down an oil rig for a few days, it causes business disruption and lost productivity. But what if those same hackers covertly alter the data, and the oil company spends months drilling in the wrong places? That\u2019s an enterprise-level existential threat.<\/p>\n<p>In an age of manipulated data, deepfake techniques, and unending data breaches, companies need to know that they are using pristine data in their AI systems. Toxic data will wreak havoc in business systems and cripple an organization\u2019s faith in AI and its customers\u2019 faith in it. Before understanding how and why decisions were made, organizations must be able to stand by the integrity of the data and algorithms used by AI. This might be called\u00a0<strong>Verifiable AI<\/strong>\u00a0\u2014 when an organization can provide immutable proof that the data used by their AI systems is unaltered.<\/p>\n<p>So how do vendors implement Verifiable AI into their products to ensure that their AI algorithms are not handling data that has been tampered with? And how do companies build Verifiable AI into their systems to verify that they are using safe data?<\/p>\n<p>Two leading pharmaceutical companies \u2014 Merck and Company, Inc. and Amerisource Bergen \u2014 have implemented a fast-track project to more efficiently detect counterfeits and irrefutably document compliance at scale. The project is designed to\u00a0<strong>Track and Trace<\/strong>billions of items throughout their supply chains. In just a few weeks they were able to ensure:<\/p>\n<ul>\n<li>Full regulatory compliance around sellable return verifications<\/li>\n<li>Instant verification of the authenticity of returned items<\/li>\n<li>No replication of manufacturer data required for wholesalers<\/li>\n<li>Minimal complexity, maximal security<\/li>\n<li>Immutable, single source of truth provided to all parties, including regulators<\/li>\n<li>Interoperable with existing Track and Trace solutions<\/li>\n<li>Scalable-to-consumer scanning at the point of dispense<\/li>\n<\/ul>\n<p>With this project, these companies were able to achieve full data verification at multiple stages across their supply chain. By extending the real-time Track and Trace ability, they are now able to add a new \u201cTrain\u201d element into the process. The verification that is used to ensure that their supply chain is not handling counterfeit goods can also be used to verify that data used to train AI systems for supply chain automation is also safe. For these companies,\u00a0<strong>Track, Trace\u00a0<em>and<\/em>\u00a0Train<\/strong>\u00a0is an additional benefit of a chain of custody solution, but for many other companies, this will be their core safeguard of their AI systems.<\/p>\n<p>Data tampering is now the single greatest cybersecurity threat that organizations face. From a simple act of revenge by a disgruntled employee, to corporate espionage, or even a nation-state attack, data tampering is an existential threat that cannot be ignored. While AI automation holds the promise of operational efficiencies, it also has the ability to introduce and replicate toxic data across an enterprise, into business systems and decision-making, and expose customers and partners to those very same risks.<\/p>\n<p>The AI automation revolution is already upon us. But its success hinges on the authenticity of the data that drives the AI, and the ability to verify this authenticity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Organizations are using data and algorithms based on that data to drive critical and automated decision-making at unprecedented scale.&nbsp; But what if the data entering the AI algorithms has been compromised along the way or the algorithms themselves altered? Companies need to know that they are using pristine data in their AI systems. They must be able to stand by the integrity of the data and algorithms used by AI. This might be called&nbsp;Verifiable AI&nbsp;&mdash; when an organization can provide immutable proof that the data used by their AI systems is unaltered.<\/p>\n","protected":false},"author":552,"featured_media":2730,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[183],"tags":[97],"ppma_author":[3225],"class_list":["post-1697","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-ml","tag-artificial-intelligence"],"authors":[{"term_id":3225,"user_id":552,"is_guest":0,"slug":"dirk-kanngiesser","display_name":"Dirk Kanngiesser","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","user_url":"","last_name":"Kanngiesser","first_name":"Dirk","job_title":"","description":"<a href=\"https:\/\/www.linkedin.com\/in\/dirkkanngiesser\/\">Dirk Kanngiesser<\/a>, a technology startup entrepreneur and investor, is a co-founder and CEO of Cryptowerk Corp., a Silicon Valley start-up for enterprise blockchain applications. He is also an active angel investor and a board member of technology companies both in the U.S. and in Europe."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/552"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=1697"}],"version-history":[{"count":2,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1697\/revisions"}],"predecessor-version":[{"id":31181,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1697\/revisions\/31181"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/2730"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=1697"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=1697"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=1697"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=1697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}