{"1d8a0cfc-df53-467f-88e8-cd378990da4b": "What are the key steps to obtain input from stakeholder communities to identify unacceptable use in AI systems?", "9ec9d981-9115-4672-bd74-23035ecc2e7f": "How can organizations maintain an updated hierarchy of identified and expected GAI risks?", "0605df28-3443-4e71-b065-c5e957b1a3be": "What are some examples of unacceptable uses of AI as identified by stakeholder communities?", "bf3d5106-092b-4dcd-84c8-a6f876550060": "How do harmful bias and homogenization impact AI systems?", "84fa4ea9-be18-4dd5-9e29-a6a5c02feb54": "What is the significance of reevaluating organizational risk tolerances in the context of AI and GAI?", "bb5dcf48-cb19-47b4-b313-265f9f7cb3c8": "What are the potential risks associated with model collapse and algorithmic monoculture in GAI systems?", "bc5f183f-8819-4d54-9853-b8f799e02906": "How can organizations address issues related to obscene, degrading, and/or abusive content in AI systems?", "8d9f5ceb-fce8-4d14-9811-6140c0e69900": "What strategies can be employed to mitigate dangerous, violent, or hateful content in AI applications?", "2f174ff7-4261-4c60-a49e-51bc536fd900": "How do immature safety or risk cultures affect the design, development, and deployment of AI and GAI systems?", "1cef392e-71ff-400b-a4bb-39f4c8d78dab": "What are the public information integrity risks associated with AI and GAI, and how can they be managed?", "b2fdeb09-6112-4cbd-a860-6b770d65c9ef": "What are the short, mid, and long-term impacts of AI in cybersecurity according to De Angelo (2024)?", "50a10f19-e2b0-4f53-bf39-c09e6b2adedb": "How do chatbots and generative AI affect mental health, based on the insights from De Freitas et al (2023)?", "41d1c796-9d40-450d-bb90-58541f4dc294": "What is algorithm aversion and why do people avoid algorithms after seeing them err, as discussed by Dietvorst et al (2014)?", "8ea4ce00-241b-4a28-9f10-127da59b19a3": "How do companies learn consumer secrets according to Duhigg (2012)?", "ee13b775-a27a-4b83-b019-8da1bfe33cd4": "How can images altered to trick machine vision influence humans, as explored by Elsayed et al (2024)?", "0835eb5b-ff9b-4c95-98a1-c1aa96b695d1": "What are the key findings of the Harvard Business School study on the safety of generative AI in mental health?", "a25fa3f1-5fad-4e5f-8635-3c5d7564bc9d": "How does the New York Times article by Duhigg (2012) explain the methods companies use to track shopping habits?", "cad3f6f1-e1cf-428f-b6c0-986a72e27923": "What are the implications of the research by Google DeepMind on altered images and machine vision?", "7795698f-b343-44b2-90b7-333d3e874947": "How does the study by Dietvorst et al (2014) contribute to our understanding of human interaction with algorithms?", "0563fa4d-b516-4410-ba89-1f0315067735": "What are the potential risks and benefits of AI in cybersecurity as outlined by Palo Alto Networks?", "32e11143-ad57-48c7-b0ce-e4922c8b1cc7": "What are the different risk response options mentioned in MANAGE 13 for high-priority AI risks?", "94e3e1d2-3500-48e6-97a6-8c83517b41e0": "How should organizations document trade-offs and decision processes for AI risks that do not surpass risk tolerance?", "abb3f98f-480d-4f2d-bf70-0bb22379dbae": "What is a staged release approach in the context of model release for AI systems?", "2a61da93-9e17-4be7-862f-ff9f941284a1": "How can organizations mitigate, transfer, or avoid AI risks that surpass their risk tolerances?", "6b6dc282-ed05-4387-ae3c-28fea9f6aa32": "What methods can be used to monitor the robustness and effectiveness of AI risk controls and mitigation plans?", "a435043d-540e-4134-9d59-e921db6866dd": "What is the role of red-teaming in assessing AI risk controls?", "c64396a8-0017-4d46-aea9-58f81191f6b9": "How can participatory engagements help in monitoring AI risk mitigation plans?", "90341a67-3948-47fe-acaa-32e9896acdd5": "Why is it important to consider the projected use cases of a model when planning its release?", "a93e9f47-5572-4f65-810c-e65f0c0cbc35": "What are some examples of performance assessments for AI risk controls?", "6b14b109-2e7e-4d40-b149-1eb05bc882a0": "How can user feedback mechanisms contribute to the effectiveness of AI risk mitigation plans?", "cde52e0d-45eb-41b7-89ac-0e8e28ac0457": "What methods can be used to trace the origin and modifications of digital content?", "0d6f47cc-2f11-4d1e-9d54-90b10f6bf2b6": "How can tools designed to analyze content provenance help in detecting data anomalies?", "ed8c6ae4-9a32-44a5-b820-0681f03fd325": "What are the best practices for verifying the authenticity of digital signatures?", "cf07e760-9b9f-4be0-aaf2-9ce158ee1c98": "How can patterns associated with misinformation or manipulation be identified?", "7a9b270d-4022-4dee-8044-c221948c7d25": "Why is it important to disaggregate evaluation metrics by demographic factors?", "93f3824c-e2a6-424d-a45b-f7a6e593c5d7": "What are the potential risks of harmful bias and homogenization in AI systems?", "c0441d12-0139-47e0-a780-13868a3b0469": "How can discrepancies in content provenance mechanisms across diverse populations be identified?", "7a65af06-b620-44fe-90b4-53bdcb7c8559": "What metrics can be used to evaluate structured public feedback exercises?", "3cc7ff9c-22a7-4d2c-a02f-353ba7ef9fe1": "How should risks or trustworthiness characteristics that cannot be measured be documented?", "daf97136-c510-4453-a3f3-dfdd41c8a7eb": "What are the most significant AI risks that should be prioritized for measurement?", "4f8ef4f7-9616-44aa-abfe-8cdaf1756b90": "What are the key points of the Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence issued by the White House in 2023?", "6f46f00e-c286-4eb0-815e-32faf4967e59": "How does the 2022 Roadmap for Researchers on Priorities Related to Information Integrity Research and Development address misinformation?", "bf6d72d3-a20e-4589-8cbd-9e4fcf8ff4f9": "What were the findings of the Stanford Cyber Policy Center's investigation into AI image generation models trained on child abuse?", "1c142ec8-b4a3-456e-ba1c-a485944b6ca4": "How does the White House's 2023 Executive Order aim to ensure the ethical development of AI technologies?", "b39288aa-0a9d-4d94-82e2-35409659c7d1": "What are the main objectives outlined in the White House's 2022 Roadmap for Information Integrity Research and Development?", "21eaa61b-6208-40e7-b9a3-5a37038f9d48": "What measures are being proposed to secure AI development according to the 2023 Executive Order by the White House?", "1233bc76-0ce0-4740-bad7-5de774ca0fd7": "How does the 2022 Roadmap for Researchers contribute to combating disinformation and ensuring information integrity?", "988d7c42-6b16-42d7-8c3b-eca27423ec98": "What are the implications of the findings from the Stanford Cyber Policy Center regarding AI image generation models and child abuse?", "d0ee89a9-21ce-4521-a946-de628b905143": "How does the White House plan to address the challenges of AI safety and security as per the 2023 Executive Order?", "23394fb9-945c-4c8e-a361-a1cfd375abe0": "What steps are being taken to ensure trustworthy AI development according to the latest executive order from the White House?", "37aabec8-0539-4438-8489-8a52afbff96e": "What are the best practices for implementing real-time monitoring processes for content integrity?", "a8ce087b-ada7-4cca-8488-e90b57a28b9f": "How can machine learning models be used to flag illegal or violent content in GAI applications?", "607fa183-8c10-4e68-860f-41798c764cc8": "What are the challenges in detecting CSAM and NCII content using automated filters?", "f9c3b55d-7f98-4fca-a8b3-2276e0cf58d9": "How can rule-based filters be effectively combined with machine learning models to identify harmful content?", "f8fcd7dd-4077-4dd8-8a19-cea03ba0bda5": "What measures can be taken to ensure information integrity in generated content?", "21f56f77-f14f-4eb0-ae84-a15ddf44c478": "How can real-time monitoring help in identifying deviations from content standards?", "c1c10c23-aba8-48a1-a47f-0ea7b9ee4058": "What are the key characteristics to monitor for ensuring content trustworthiness?", "bb1d1592-7123-4163-a963-913da8006be9": "How can human intervention be effectively triggered by automated alerts in content monitoring systems?", "07ea05d4-6b90-4936-9dae-b67d0e70640d": "What are the potential biases that can arise in machine learning models used for content filtering?", "2f84ffbd-1a21-475b-a55e-ed7b70ad40b5": "How can the homogenization of content be prevented in GAI applications?", "9e4c34f4-3d3e-45f8-b44c-86725048d92b": "What are the key findings of the study \"Dissecting racial bias in an algorithm used to manage the health of populations\" by Ziad Obermeyer and colleagues?", "64f82a67-4768-4e6b-a43d-f04086818e85": "How does the Data & Trust Alliance propose to safeguard against algorithmic bias in the workforce?", "7f45b7a7-9fcf-4391-89e9-8cc77c095f2a": "What are the main IT accessibility laws and policies outlined on Section 508gov?", "78c93a0c-adfa-4c7e-a126-d47d3e13352b": "Can you summarize the 2019 Science article on racial bias in health management algorithms?", "f9d25a5e-23c8-45ee-aef2-d7db0c12b767": "What measures are recommended by the Data & Trust Alliance to ensure fairness in workforce algorithms?", "86604d73-f71a-46b4-b444-0f78f434d3a8": "How does Section 508gov help organizations comply with IT accessibility requirements?", "511742cc-dc64-43a3-a033-bd545ce33e57": "What are the implications of the findings by Obermeyer et al on racial bias in health algorithms for healthcare providers?", "04a0b08c-92b8-44bb-886c-252f86746d2c": "What is the purpose of the Algorithmic Bias Safeguards for Workforce document by the Data & Trust Alliance?", "3e71278b-e893-4a19-955e-1505554c8686": "How can organizations implement the guidelines provided by Section 508gov for IT accessibility?", "04516eef-32ce-4fcc-8b77-263ca9de6e10": "What are the potential impacts of algorithmic bias in workforce management as discussed by the Data & Trust Alliance?", "a0c0459c-054c-42ad-bffd-3e69e7a03bbc": "What are the potential impacts of automated systems on data privacy?", "b159acfb-35e3-4cbb-8158-d4d89ccc5870": "How can we ensure that automated systems do not use data inappropriately?", "391ca451-b0e7-43cc-afcc-32b7d1fa8da7": "What measures can be taken to protect against the compounded harm of data reuse in automated systems?", "b15c0ca5-79fe-4cb6-971d-891ab63966bb": "Why is independent evaluation important for the safety and effectiveness of automated systems?", "f8ed278b-212e-45c9-ae9f-5fe98bbd00fb": "What steps should be taken to mitigate potential harms of automated systems?", "c034102c-8cc6-4f9f-aa97-54c4123b05b8": "How can the results of independent evaluations of automated systems be made public?", "19a80a1d-4c42-4b4a-a9f1-8c58f96c948b": "What are the foreseeable uses of automated systems in various industries?", "84b94c19-44d8-4b0e-a9ea-21d1b4e745a9": "How can we ensure transparency in the development and deployment of automated systems?", "08b5ee06-991e-4f06-9629-71d3500295ab": "What are the best practices for reporting the safety and effectiveness of automated systems?", "4328f04f-39f0-472e-a479-26bcd1915133": "How can we protect individuals from the misuse of data by automated systems?", "03a9fe91-d78e-473a-a2f8-3106648d7314": "What are black-box credit models and why is the CFPB acting to protect the public from them?", "c5f06a48-24b4-4bf0-85f8-836e9d96099d": "What does California's AB 701 law entail for warehouse employers regarding quotas?", "2335610a-fe1a-4ccd-b194-0d8b2734a4d1": "How does the National Institute of Standards and Technology (NIST) contribute to AI explainability research?", "fe0c5f11-3d4c-44d7-8f27-6a2da2f8536e": "What is the significance of explainable artificial intelligence (XAI) according to DARPA?", "5342b516-b61d-4ea4-a2da-9a05638d3918": "How might complex algorithms in credit models impact consumer finance?", "f43fcf7f-345c-4942-b43d-e75917a9d53a": "What are the potential benefits and challenges of implementing AB 701 in California warehouses?", "4a15e20a-7144-40e1-93e3-114864d97085": "Why is explainability important in artificial intelligence research?", "32cfcd73-0b8c-4469-91c1-5f5209f15d84": "What are some examples of black-box models in the context of credit scoring?", "85538c5c-826d-45bc-8de8-297408b1897a": "How does DARPA's XAI program aim to improve the transparency of AI systems?", "08be8570-a2e0-4e56-af80-157c2427baf9": "What steps can employers take to comply with California's AB 701 law on warehouse quotas?", "24c87258-bf5b-4144-b1cf-149daa5a5c29": "What is the NIST framework for AI technologies and systems?", "1f1e3f39-8772-4eb1-b7f0-12ff89060503": "How does the NIST framework address robustness in AI systems?", "69e2d6b3-12b3-47d1-a249-65657ba34d64": "What measures does the NIST framework propose for ensuring the safety of AI technologies?", "f139859c-a3ce-4700-a971-5548dc026253": "How does the NIST framework aim to enhance the security and resilience of AI systems?", "04bebb3a-8ecf-4543-8736-671e1a4585be": "What strategies does the NIST framework suggest for mitigating unintended and harmful biases in AI?", "df7b1cdc-bb0a-43b5-a10c-7189eb63373e": "How does the NIST framework promote transparency in the development and deployment of AI technologies?", "7cb4296e-4abe-4bd0-a8ff-edaf4a243ffd": "What accountability mechanisms are included in the NIST framework for AI systems?", "12b8555f-380e-4b4a-adc7-418d59a61297": "How does the NIST framework ensure fairness during the pre-design and design phases of AI development?", "3aef7413-5f60-4e9b-a6ac-191b6972651c": "What are the key principles of the NIST framework for AI testing and evaluation?", "65303757-3ce8-4416-96eb-99d843d040d1": "When is the NIST framework for AI technologies expected to be released?", "a7a1d3dc-f420-48c3-a3cb-1e0a676e9e7b": "What are the key considerations for using AI in sensitive domains like criminal justice and health?", "24566fed-3d75-47f8-80b2-03f3d0e9e7d3": "How can meaningful access for oversight be ensured in AI systems used in employment and education?", "1cc3e51d-3cba-4b58-b525-f86babb21bfb": "What kind of training should be provided to people interacting with AI systems in sensitive areas?", "e0f9ad8a-c33a-4717-88ac-d8559f6c974a": "Why is it important to incorporate human consideration in high-risk AI decisions?", "d4342127-5df0-405f-bbe8-dc24711944be": "How can organizations report on the human governance processes of their AI systems?", "65bf43cf-81c8-4872-ae3b-81bf21751ba3": "What are the best practices for assessing the timeliness and effectiveness of AI systems in sensitive domains?", "2f3abec1-74b5-405f-b734-843ecc211a3a": "How can transparency be maintained when using AI in areas like criminal justice and health?", "a4768a2a-62c0-471c-ab81-e9e0d81d83c0": "What are the potential risks of not including human oversight in AI systems used in employment?", "d68eeb41-7bcf-4744-80e9-7614c92438a8": "How can adverse decisions made by AI systems be mitigated in sensitive fields?", "5d143734-c64d-4ee5-9600-544de3dc380b": "What role does public reporting play in the governance of AI systems in education and health?", "2aac2f6a-920b-4393-b61e-98aa36d35f27": "What is the role of NIST in the research on explainable AI systems?", "6de62d16-19cb-45d2-949b-92609186983f": "What are the core tenets of explainable AI that NIST aims to support?", "8d9912fd-4615-4118-8134-a893b80920c1": "How does the Defense Advanced Research Projects Agency contribute to explainable AI?", "8e48c274-2976-4927-b9ab-6bef0546c6e1": "What are the goals of the Defense Advanced Research Projects Agency's program on Explainable Artificial Intelligence?", "7c6ecd5b-5475-43a4-8259-af3a5f014d39": "What is the importance of explainable AI in machine learning models?", "cfab0915-6e9f-412a-a432-bc0a06148923": "How do explainable AI systems help human users?", "eaa0dca7-f7a9-4bac-a8f3-dc0e410b9a94": "What are the potential adverse employment actions for failing to meet a defined quota?", "67312adb-b7a3-4c16-84b9-4e4697e002e8": "What kind of research is being conducted across federal agencies on explainable AI?", "d1c669d5-4d91-4300-8e70-5a49b9b7b517": "What are the best practices for implementing explainable AI according to NIST?", "a44278d2-1d80-4211-93b9-785f091ee871": "How does explainable AI maintain a high level of learning performance while being understandable to users?", "670b6be9-bff2-4e3f-9ddb-48503a59925b": "What are the key components of effective governance procedures for automated business processes?", "966409cb-250a-4100-9cb5-4cc606c16452": "How can organizations ensure that stakeholders are adequately involved in the governance of automated systems?", "42ce5b4d-fe04-4d95-87e8-bd0a8f2a1cf3": "What level of organizational responsibility is necessary for prompt decision-making in resource allocation and incident response?", "5a9cd608-2ac4-4bfa-8cfa-ca357e9841ac": "Why is it important to consider risk mitigation objectives against competing concerns in automated systems?", "a18b2932-8fa5-4635-9302-7ee0cbaf194a": "How should organizations handle use cases that have a significant impact on people's rights and opportunities?", "379549a5-d7e5-47a9-bafb-a7408746aca0": "When is it appropriate to conduct an independent ethics review before deploying an automated system?", "03540efe-c7b8-4bd6-8835-c6f7bb4e30b5": "What are the risks associated with the use of inappropriate or low-quality data in automated systems?", "09f74024-8869-4f32-b626-2138e3564a74": "How can organizations prevent the compounded harm of reusing low-quality or irrelevant data?", "d8dc0a3b-18dc-42ae-93f3-7614e9b55cfa": "What procedures should be in place for risk identification in automated business processes?", "ecdf8fe5-f149-44ac-b465-3fbacb40865e": "How can organizations balance the need for automation with the potential ethical implications for stakeholders?", "f5606d22-27dc-4b36-9ace-72d6cc48660e": "What are the best practices for engaging diverse communities when introducing a new automated system?", "ae491447-4cf4-4991-b43e-08454411a5a6": "How can we ensure that the concerns of disproportionately impacted communities are adequately addressed?", "7ee78a3e-1ea7-4da5-875a-f65aa6f20054": "What types of experts should be consulted during the development phase of an automated system?", "2078e8f7-9bea-4153-bc28-2944699c7a6e": "How can privacy and civil liberties be protected when implementing large changes in automated systems?", "7b087c9c-e491-4d32-b692-81313a1e6afe": "What are the challenges of maintaining confidentiality in private sector consultations before product launch?", "208c1297-47eb-4aca-9561-f53fdb900d7b": "How should government applications balance the need for confidentiality with stakeholder engagement?", "44b1a320-c340-4a37-bcf5-c93a6963e2e0": "What are the specific considerations for law enforcement applications of automated systems?", "c223bce2-8a81-489c-9230-31400072a3fc": "How do preexisting oversight laws impact the consultation process for new automated systems?", "8b96696a-d368-4159-b644-3e82a3269da4": "What strategies can be used to engage sector-specific experts effectively in the consultation process?", "e0ca9dfa-fbe1-41a0-b064-9e4655a76477": "How can the risks unique to certain communities be identified and mitigated during system development?", "ee3ed9e9-e13a-43ae-8468-ceb8ffcf49b6": "What are some current uses of technology that impact equity of opportunity in employment?", "56c869aa-9f69-476f-bb2c-ff1cb0080445": "How is technology influencing equal opportunities in education?", "ecc2c5eb-78a6-4d19-b33b-19b08c0fdbfe": "What role does the White House Office of Science and Technology Policy play in promoting civil justice?", "db262b36-e3f4-48a0-bddc-dc36a289a41e": "How can technology be leveraged to ensure fair housing opportunities?", "6d61f78a-7ebf-45f4-a5e6-4881a583f4c8": "What insights did Christo Wilson provide regarding technology and employment equity?", "d1b8703a-3114-4088-9309-0c02821f5a37": "How does Pymetrics, led by Frida Polli, use technology to promote equal opportunities?", "80cdf547-f019-49d5-b954-fc44fb501eef": "What are some emerging technologies that could impact civil justice, according to Karen Levy?", "074222ac-fda2-47de-b57c-5ddc1063b7ba": "How does Upturn, directed by Natasha Duarte, address issues of technology and equity?", "55189c9a-9917-4b08-9b39-7f0a6c48256e": "What legal perspectives did Elana Zeide offer on technology's role in civil justice?", "50e8150e-4538-45b0-a17d-be191d1fa248": "How does Fabian Rogers' work with NY State Senator Jabari Brisport's office relate to technology and community advocacy?", "eb5cb844-864a-468b-8c58-527d3531343d": "What are the best practices for involving national security professionals in AI system risk management?", "62d2b5a7-b986-4048-bb97-766d7b98ce5e": "How can organizations effectively map and measure national security risks associated with AI systems?", "f72b3652-6c80-4c83-8aeb-9eee8ef96c3e": "What mechanisms can be implemented to protect whistleblowers in AI governance?", "afb866f7-aa0b-4116-9378-f258a4bf12ad": "How should organizations handle CBRN information or capabilities in AI systems?", "a1ddee9f-3320-4745-8c67-624c95b262a7": "What steps can be taken to manage dangerous, violent, or hateful content in AI applications?", "099e3b3a-218d-4c72-8460-0c899484ecd1": "What are the key components of an effective whistleblower protection mechanism in AI governance?", "b923df73-4a58-4d22-8b55-1a01145c5ac7": "How can AI systems be designed to comply with information security requirements?", "1464f6bf-4914-46ea-a181-13cbb9e7058b": "What role do national security professionals play in the oversight of AI systems?", "4e333af2-62cb-4a18-9737-5e42d27891af": "How can organizations ensure that they are not violating laws related to public safety with their AI systems?", "44cf4f5a-ee5c-4173-8c24-e6a9084636d9": "What are the challenges in providing protections for whistleblowers in the context of AI governance?", "732e3e58-5725-48ab-a40c-961aea398141": "What are some methods to evaluate gender bias in coreference resolution systems?", "c0e18063-83e5-462a-b99d-ca04e73f72f1": "How can gender bias in NLP coreference resolution systems be detected?", "ab81895e-d428-4fd5-bed3-030440a61e22": "What datasets are available for assessing gender bias in coreference resolution?", "33ec5775-e26d-4365-a8e5-69cfded28cf2": "Are there specific metrics to measure gender bias in coreference resolution systems?", "595f4527-0e21-40a7-b9ec-6a757d80f511": "How does gender bias impact the performance of coreference resolution systems?", "1bc870b7-1589-44a0-ae78-e41f637ce93b": "Can you recommend tools for evaluating gender bias in NLP coreference resolution?", "25ab951c-e59e-43dc-9315-79f04297d81b": "What are the challenges in evaluating gender bias in coreference resolution systems?", "c8004ebf-4187-4dab-b1fe-1c725fa9d4f4": "How can we mitigate gender bias in coreference resolution models?", "99062576-8040-45bb-ba14-33e7d06843c4": "What role do pronouns play in gender bias within coreference resolution systems?", "f631fe4b-8511-4605-b562-6b32a5fc4ce3": "Are there any case studies on gender bias in coreference resolution systems?", "e909abea-82ea-425e-9eb4-e7fc5cfd1afa": "What are the key technical and governance interventions needed to protect against the harms of emerging technologies?", "8f2b141e-7e25-48c4-8d6e-c7649407098e": "How can transparency and data collection help in mitigating the negative impacts of new technologies?", "2504edde-ca0f-4ab0-b316-072c94ed4fd7": "Why is flexible and reactive policy development important in the context of technological advancements?", "ee944244-c6e4-4f82-81c9-f965ee4f8f7c": "What role do clear guidelines play in fostering a consistent environment for innovation in technology companies?", "fddee110-d5c1-4e71-a392-a18885c4d603": "How can principles and guardrails contribute to responsible innovation in the tech industry?", "0a8ddcee-d0d1-41e1-a6c9-246be5b5ae5f": "What are the current and emergent uses of technology in the criminal justice system?", "c51a2c1a-9f87-488a-9d42-41968bf4cab1": "How do technological advancements in the criminal justice system impact public safety?", "95c6ba82-ae2a-411b-8572-31a3d48cc6a7": "In what ways can technology undermine justice and democratic values within the criminal justice system?", "0c97280b-063a-46a8-bbd5-f47e888354e5": "What are the potential benefits of using technology in the criminal justice system?", "fa8d6dc4-7eba-45d5-a66a-eb6b8ab2ecad": "Who is Suresh Venkatasubramanian and what is his role in the White House Office of Science and Technology Policy?", "21ceca0c-ce44-43e3-8f77-a9dc1f5fbcc7": "How has facial recognition technology led to wrongful arrests?", "d3a9c980-e575-44e6-bab5-07aaca0e2886": "What are the implications of AI bias in law enforcement?", "7f116d0d-2c08-40d1-817d-6f4c1826f047": "How many Black men have been wrongfully arrested due to facial recognition errors?", "380fee90-ebb8-4757-8fa4-7bb4a3b50dfd": "What steps are being taken to prevent wrongful arrests based on AI?", "f0b6fb64-5d64-4512-97bb-0a674ad3b42f": "How did the wrongful arrest affect the Jersey man accused of shoplifting?", "e2b27dbd-6b32-4fba-8260-c9b54e2ac8de": "What are the consequences of AI bias in recruitment, as seen with Amazon's tool?", "dbe0bf87-a716-4127-9f80-f9e325332d95": "How can AI systems be improved to avoid racial and gender biases?", "b8b6fbea-dea8-487e-bf33-6235d3a607e2": "What is educational redlining, and how does it affect student borrowers?", "a0a96c91-6c5a-4fd0-8127-b7c974303838": "How did the wrongful arrests based on AI impact the lives of the three men mentioned?", "dbd41bb0-0c09-4495-b286-dc9622de9e86": "What measures are being implemented to address AI bias in various sectors?", "0e1301c3-0b83-4603-9d39-8c374b37340d": "What are the benefits of documenting and reporting GAI incidents?", "c00fe054-52c2-4561-80e1-4b27a535ac03": "How can standardization of GAI incident reporting improve risk management?", "fd45462e-12d0-40d0-a428-90041a7dff99": "What roles do AI Actors play in reporting AI incidents?", "a531e2af-3989-43fb-8d5a-5808c6ec17bc": "Why is it important for organizations to develop guidelines for incident reporting?", "69db45ba-aef9-4c24-b15a-824ead34c0cf": "How can guidelines help AI system operators identify GAI incidents?", "c8828f01-879b-4d90-bc2c-f97dde5bf765": "What should be included in the guidelines for publicly available incident reporting?", "ce0d270a-d64e-4526-97cf-96ef519cf24a": "Why is the documentation of third-party inputs and plugins crucial for GAI systems?", "b8747453-8022-467b-b1b5-5145d44ff203": "How can greater awareness of GAI incident reporting promote transparency?", "ddd8c6c0-1296-4762-b557-374a51ff3add": "What measures can organizations implement to prevent future AI incidents?", "14fc80ec-eef8-48bb-9d01-33069ee9b8fe": "How can AI Actors trace the impacts of GAI incidents to their source?", "df8094ac-8e28-4a78-838d-606526447758": "What are the different applications of GAI systems in organizational settings?", "4b8eb074-1b7f-448a-ac6d-be4d1ddaed05": "How can organizations restrict AI applications that exceed risk tolerances?", "3710b3fa-3a13-4381-b514-9fc7f8dea69b": "What governance tools can be applied to GAI systems?", "8aa6ab37-2653-45b2-a725-a7735747f754": "How is content moderation handled by AI technology?", "4c0876f0-776a-4fac-a0e2-a3148db5b6f9": "What are the qualifications required for AI actors interacting with GAI systems?", "288d8ca3-7d48-4d33-8b24-d9e7bc4d94a8": "How can AI technology be used for code generation and review?", "fe80034d-0f1d-4bd0-8551-8f0d79001f23": "What protocols are involved in auditing and assessing GAI systems?", "23dc8c4c-f982-4955-b9bd-af9b54a6b57e": "How do organizations ensure AI applications align with their values?", "90900ded-0b53-44a3-9a22-13f8a5988204": "What are the change-management controls for GAI systems?", "0ca2f759-ebbe-4a9b-817b-1c16c7d1e376": "How can AI technology assist in data labeling and preparation?", "40801caf-7abe-479e-9818-e654ea44c389": "What are the key differences between AI risks and traditional software risks according to the National Institute of Standards and Technology (NIST)?", "0943156a-41b4-4d6c-8add-0bb5010e1936": "How does the NIST AI Risk Management Framework (AI RMF) address AI-specific risks?", "10a26c62-5c72-487a-b041-044cc2f6e7e7": "What resources are available in the NIST AI RMF Playbook for managing AI risks?", "66155b2d-caf6-421b-86c6-ca18b2579570": "How does NIST suggest framing risk in the context of AI?", "120752de-fe52-4f54-9e4a-49a9641d77ff": "What terms are included in NIST's glossary for trustworthy AI?", "28130de3-a5d1-4a75-aef6-60681684793e": "What steps does NIST recommend for identifying and managing bias in artificial intelligence?", "a74132c1-3fa1-462f-88d0-d418f51aaebf": "How can the NIST AI RMF Playbook be utilized by organizations to improve AI risk management?", "66be8191-b960-4fed-b0ba-c92018e56838": "What foundational information does NIST provide for understanding AI risks?", "edbb2f46-b7fe-4483-98f0-ebc5eef57da8": "How does NIST's 2022 publication contribute to the standardization of bias management in AI?", "cb87b719-4b5f-41e2-af94-c5ee3c301e18": "What are the main components of the NIST AI Risk Management Framework?", "02e280c0-6258-47f4-bb62-1324b012cd32": "What are the key challenges in ensuring automated systems work as intended?", "57a1c358-afc7-4547-8390-0545a91d0b6f": "How can automated systems be protected from unintended harmful outcomes?", "9ec63ba3-4a78-4919-9641-06406a26d3df": "What are the consequences of 'alert fatigue' in medical settings?", "30f03404-8efd-4a10-8b15-4563ba490e24": "How can the accuracy of predictive models in healthcare be improved?", "5911ed64-f3fb-4bbc-a354-710e9eb4a6c8": "What measures can be taken to prevent automated moderation systems from silencing counter speech?", "0a2e4e30-4e96-4313-8701-66fb74fbaa6e": "How do automated systems impact the safety and well-being of the public?", "754bdb70-fd0d-42db-b514-ed3e792c9c66": "What are the ethical considerations in designing automated systems for social media moderation?", "2b123ed9-5e26-4f5b-8bac-71dde9f51ca1": "How can hospitals mitigate the negative effects of false alerts in predictive models?", "a72510fb-3627-482b-bc59-e8a9d2d9c7fe": "What role do independent studies play in validating the performance of automated systems?", "77f146ae-3822-4a25-b535-3110c58c0759": "How can automated systems be designed to better distinguish between harmful and non-harmful content?", "b2d56c7c-fa94-47b2-9b32-0c4729fb2f12": "What are the primary information security risks associated with Generative AI (GAI)?", "31cf8128-b127-4673-88f6-875bd9d671be": "How can GAI lower the barriers for offensive cybersecurity capabilities?", "4c7d4d1b-256a-408a-8d84-d8a691961a20": "What types of attacks are GAI systems vulnerable to?", "b5d4dcd0-59de-49a8-97e5-1bc4c4de0c99": "How might GAI expand the available attack surface in cybersecurity?", "43f7aac1-4168-4700-b4c2-ba575419b046": "In what ways can GAI augment traditional cybersecurity attacks like hacking, malware, and phishing?", "b5e47640-3a12-4f25-80db-01036d1872b5": "Are there reports indicating that Large Language Models (LLMs) can discover system vulnerabilities?", "032a7d8e-cbd4-4005-96ab-461828a13663": "How can sophisticated threat actors use GAI-powered security co-pilots in cyber attacks?", "7ab5047e-51ca-40c0-8cc4-48fd68fcb7df": "What role can GAI play in helping attackers evade threat detection?", "0338aa3a-47c1-4a51-acce-90bfd9a2dcf2": "How might GAI assist attackers in escalating privileges after gaining system access?", "5001a4f7-f1ac-4bf1-9152-b893c1f45412": "What measures are necessary to maintain the availability of GAI systems in the context of information security?", "06e02bbe-ec13-46b6-a82a-c3eedbe9df94": "What is the significance of a waiver of sovereign immunity in legal terms?", "c5af22e4-d127-4a04-a563-47eaad15d6e0": "How does sovereign immunity protect the United States and its entities?", "d073d233-f4cd-4e5a-a3af-b8fa829b6a27": "What is the difference between substantive and procedural defenses?", "f810f097-05b7-43e9-b7e2-fa7d21b5c53b": "Can a work of the United States Government be copyrighted?", "b56876d6-1fb9-40ab-86b9-a78a889bbbec": "What does 17 USC \u00a7105 state about government works and public domain?", "73e2f0c1-f0cf-49da-906d-fc8510921e3f": "How can one enforce a legal defense against a US government agency?", "d8c94105-67dc-479c-a469-65e8104efca1": "What are the implications of a document being in the public domain?", "1a7e6b55-7f76-4439-9567-12cc8d835c96": "What legal protections do officers, employees, or agents of the US government have?", "c0aa67d6-de29-4bf6-8b18-04bbaf49240a": "How does the concept of equity differ from law in legal proceedings?", "88df5351-74b0-465c-9de9-b5807548c0dd": "What are the limitations of enforcing legal claims against the United States government?", "168b2e48-4e05-44a6-b944-aa2feb95f9e4": "What are the potential impacts of surveillance technologies on individual rights and opportunities?", "b72701b8-aef7-496e-8747-79854e65fcda": "How can one ensure that their data decisions are respected in automated systems?", "68af651a-6b8b-41bb-8f3e-14604272284d": "Why is it important to have access to reporting on the use of surveillance technologies?", "7faa544a-97f1-4d9c-804c-36a978652159": "What kind of documentation should designers and developers of automated systems provide?", "3d27b603-05bb-4a64-bc55-e9add2c9f314": "How can automated systems limit access to education, work, and housing?", "63d1952d-d789-4fd2-b18a-c7ddf8ce8cc1": "What should be included in the notice provided by automated systems?", "44065a66-2c8a-4d0f-9ebb-8dcfbdefe195": "Why is plain language documentation important for automated systems?", "fa9aff28-f81d-4034-acb6-19b295cae5fa": "Who is responsible for providing explanations of outcomes in automated systems?", "7e79602f-7d17-47d4-8874-50337e61fdc9": "How can individuals understand the role of automation in systems that impact them?", "eba5ba0f-95a3-4429-9437-7d0be9b5e0b8": "What measures can be taken to ensure transparency in the use of automated systems?", "b3486f90-735d-49df-86bc-739ba6403a31": "What are some top progressive companies building ethical AI in 2021?", "d5195aba-7870-4c55-961d-ed0ffe276376": "What methods are being used to assess equity according to the Office of Management and Budget's 2021 report?", "f0365668-2d3e-4a22-aac1-d25a64683ef8": "What is the AI Risk Management Framework by the National Institute of Standards and Technology?", "ce4365ac-9fdf-43ce-b139-503ec9ad37a4": "What is the purpose of the US Department of Energy's Artificial Intelligence Advancement Council?", "6737307a-5bbc-4ab4-b524-9437eee812f1": "When was the US Department of Energy's Artificial Intelligence Advancement Council established?", "e209d21e-f9c1-41cd-bbf5-14d112a1db70": "What are the key points of the US Department of Defense's Responsible Artificial Intelligence Strategy?", "139ad9ad-384f-497d-af84-dc9b24d2dade": "How does the AI Risk Management Framework help in managing AI risks?", "a24c2df7-395d-4019-8e4c-feb9d16b19d6": "What are the main objectives of the US Department of Energy's Artificial Intelligence and Technology Office?", "93b1cd97-2fe1-4152-ab7c-a0efbf49a6b5": "How can companies ensure they are building ethical AI?", "9c028b3c-c92c-4ca5-b7c4-e8d1c358b6c6": "What are the latest developments in AI ethics according to the 2021 article by Disha Sinha?", "0bfaf653-4226-41e5-865c-a5d63578d4e7": "What are the main concerns associated with the expense of broadband service for telehealth?", "0fd4687b-e9e7-498f-acd7-9eb020850852": "How do privacy concerns impact the adoption of telehealth systems?", "ebdadd5c-1215-40f5-8b2b-f242fbd35451": "What are the equity issues related to the cost of health monitoring devices?", "fba46c57-4104-40f5-bc91-fb9b706c2ef2": "How can racial biases in technology-enhanced care perpetuate discrimination in medicine?", "dfef4df6-fa61-419f-82ae-6a148536db56": "Why is it important for medical technologies to be accountable to relevant stakeholders?", "0fa04860-d710-40b5-856d-1dbc9d3bc759": "How can the voices of those subjected to medical technologies be better heard?", "6275567f-707b-48df-93ce-787e58e407de": "What are the potential solutions to address the expense of broadband service for telehealth?", "5c0dd9dd-bd3d-4f2f-b1d3-e8d142665e33": "How can privacy concerns in telehealth systems be mitigated?", "be446845-3854-499c-886a-d08121ae6700": "What steps can be taken to reduce the cost of health monitoring devices?", "21abc9b0-3037-4ca1-bebe-3ebbb20cbd20": "How can the medical community ensure that technology-enhanced care does not perpetuate racial biases?", "735c4032-1519-4fd5-8cdb-0e9a0ce6da5c": "How can the principles of the AI Bill of Rights be implemented in real-life scenarios?", "9daf1259-d81a-4cc8-8d81-e60f2962b064": "What are some practical technical approaches to protecting rights and opportunities in AI?", "d927d226-242f-4436-8243-c62ee8339ab8": "How can sociotechnical approaches help in actualizing the AI Bill of Rights?", "920eaf59-a989-498c-8964-7ac0a342d7b2": "What role do laws and policies play in ensuring the AI Bill of Rights is respected?", "1ddaf3a2-3fbb-4e1f-8bea-3a5bd70e5f8d": "Can you provide examples of how industry and civil society can collaborate to protect AI rights?", "aa9fb7f7-6205-45a6-8e2c-e7713a8420fc": "What are some illustrative cases that show the implementation of the AI Bill of Rights?", "f738f637-ecf5-43fc-b89f-65431bac4cb2": "How important is the cooperation among researchers, policymakers, and technologists in implementing AI rights?", "9db348ec-94bf-435c-aec7-b1da0e3acad9": "What are the expectations about technologies in the context of the AI Bill of Rights?", "2af37117-da7d-4d16-afb2-b96ea0513e67": "How can the public contribute to the effective implementation of the AI Bill of Rights?", "2939615e-23fc-4214-966c-6ba4fe1b7335": "What are the challenges in moving the principles of the AI Bill of Rights into practice?", "a7c4e78f-9e12-4e77-80a9-1b6d0e378dc7": "What are the key findings of Karasavva et al (2021) regarding the predictors of non-consensual dissemination of intimate images?", "f9d93ab9-108e-49db-901e-3dc647847f97": "How does the study by Katzman et al (2023) contribute to understanding representational harms in image tagging?", "73c8f947-0282-4541-8b91-1746ecf82b5a": "What are the main components of the value chain analysis for generative AI as discussed by Khan et al (2024)?", "f28b1c3a-c692-41ea-8144-dd7b5230aab8": "What is the purpose of the watermark proposed by Kirchenbauer et al (2023) for large language models?", "14f8c882-d08f-4bd0-923e-5d8b8841fd45": "How does Kleinberg et al (2021) address the issue of algorithmic monoculture and its impact on social welfare?", "17eb019d-fa03-4024-90b1-435b97d565de": "What insights does Lakatos (2023) provide in the report \"A Revealing Picture\" published by Graphika?", "e0f19f85-0585-4ce1-b033-c658c72c6731": "How can the findings of Karasavva et al (2021) be applied to prevent the non-consensual dissemination of intimate images?", "ff276cd8-c1b4-4ac4-ad1a-fe49517a74c0": "What methodologies were used by Katzman et al (2023) to measure representational harms in image tagging?", "afaa6994-4806-44cf-958a-057084b24a97": "What are the implications of the value chain analysis by Khan et al (2024) for the future development of generative AI?", "b7b673c0-0b37-42fe-9b9a-93758490f9ef": "How effective is the watermarking technique proposed by Kirchenbauer et al (2023) in protecting large language models?", "98816e76-3c36-44a7-9f7b-e1c94ca23586": "How can active learning techniques be used to identify model failures or unexpected outputs?", "8fe3db0a-9fc1-49f4-b08a-ed387dd67784": "What are the benefits of sharing transparency reports with stakeholders regarding GAI system updates?", "62865470-d8f3-4ebf-bf2b-050f5fcbce3b": "How does tracking dataset modifications help in maintaining the provenance and integrity of information?", "fe41122b-c0e0-4a47-9424-b21efd0d8405": "What role do AI actors play in user research and experience?", "c5fabcc7-22e9-49c6-b965-c80316d5b4d8": "How can harmful bias and homogenization be mitigated in Human-AI configurations?", "8086f26a-3e53-45ca-8e09-adcaeb35b100": "What steps should be included in transparency reports to enhance accountability in AI systems?", "61e1e6a5-ba18-4763-9a90-5f6b278dcda0": "Why is it important to monitor data deletions and rectification requests in AI datasets?", "45090c7b-a6aa-4517-8b79-30964e872d62": "How can collaboration with AI actors improve content performance and impact?", "3b005aea-9582-4e7e-b2ed-86f7c16dffa6": "What are some effective methods for ensuring the veri\ufb01ability of content origins in AI systems?", "2bb3e489-4c81-4e1b-aa8a-149336e61c0f": "How does confabulation affect the transparency and accountability of AI systems?", "77aa993b-372c-4534-8252-ca9c4010c1cf": "What is predictive policing and how does it work?", "6a1dc5f7-53a2-431d-80bd-8ddfbb546084": "How can predictive policing systems impact individuals' privacy and rights?", "0b5870d7-28c3-4da6-82be-4f2dcc63e1bf": "What are the potential risks of using automated systems in law enforcement?", "673c25a5-a7a8-4bfc-82aa-81b7f1bda04f": "Why is transparency important in predictive policing systems?", "ea441231-122d-47f5-8f5c-11085f9fd1f4": "How can data entry errors in automated systems affect individuals' access to benefits?", "0ed1645c-4661-46cb-8443-35a4c8e8ce60": "What measures can be taken to ensure fairness in automated decision-making systems?", "11076db2-fd60-471a-aba9-62b355aed19e": "How can the public be informed about the criteria used by predictive policing systems?", "3ae32342-738f-4cb9-b5dc-16fcf2130ea2": "What are the ethical concerns surrounding the use of predictive policing?", "ff50e166-1288-43c1-a067-65b0cf902d06": "How can individuals challenge decisions made by automated systems?", "f12d83b4-be05-4565-86df-f93a0c64b324": "What role does public transparency play in the effectiveness of predictive policing systems?", "37dd7447-0e75-4e14-8e17-865d6555c74a": "What is the Labor-Management Reporting and Disclosure Act (LMRDA) and what does Section 203 cover?", "1687fec4-dc70-4040-b728-4b5e44edc435": "How do I fill out the US Department of Labor Form LM-10?", "10d62236-489c-42fd-81dd-7885112ad9b2": "What are the key points in the OLMS Fact Sheet regarding Form LM-10?", "e9cd49c5-55d2-4b58-b05a-d0534264115e": "How does Apple protect user privacy according to their documentation?", "e659b628-dfa2-49f4-a768-e8761ae1c74e": "What measures does Google take to ensure Android is secure by default and private by design?", "7ea78477-98bc-4ff3-8d95-b316f391a035": "What are the main arguments in Karen Hao's article about algorithms trapping people in poverty?", "74061af4-43ea-4d23-9765-abe2b5fbb9e1": "How are lawyers fighting back against hidden algorithms that create poverty traps, as discussed in the MIT Tech Review article?", "dfdb3835-219b-4d3a-9673-d2923df2fb4b": "What concerns does the ACLU raise about family surveillance by algorithm?", "18a0946d-d4d3-4c73-b1bc-ef5d2d6cca86": "What are the implications of algorithmic surveillance on families, according to the ACLU fact sheet?", "3f73048f-6c23-48db-be72-402295190c87": "How can developers design for safety and privacy in mobile applications, as suggested by Apple and Google?", "f9d78f26-8f38-45a5-a05d-126e99e0b295": "What are the best practices for testing automated systems in real-world contexts?", "caec4118-4465-454f-8361-aebd8d21a912": "How should feedback be documented when reconsidering the deployment of an automated system?", "318fb3a4-b202-4e61-870b-b9a18c7c8f54": "What are the key differences between automated systems testing and human-led testing?", "3681a289-6754-4f14-9c68-bba82f3179af": "Why is it important to mirror real-world conditions during the testing of automated systems?", "424ac5ef-46e1-4f01-bee3-d71a0e907e5d": "How can material differences in deployment conditions affect the performance of automated systems?", "032fd89f-0b92-4533-a520-39fe68cc1744": "What role do human operators or reviewers play in the effectiveness of automated systems?", "a788ae08-165b-4797-b530-9054fffc79b9": "How should system performance be compared with existing human-driven procedures after testing?", "c823ae3a-5c23-421a-a316-3fb0a90fdff6": "What domain-specific best practices should be followed for testing new technologies?", "4e06d594-f59f-43ed-9c42-766b3d71377a": "Why might new testing be required for each deployment of an automated system?", "f0a8cfb7-ca5a-41af-874f-24ca1c10564a": "How can the outcomes of testing influence the decision to deploy an automated system?", "ceea82a8-3f36-499c-8999-f705089fd5c4": "What are the expectations for automated systems in sensitive domains?", "4da1b1fe-5a0f-4873-9a51-592e7031b5f0": "How can users opt out of automated systems in favor of human alternatives?", "2d5f0e7a-37f4-41f3-a270-083718406673": "What mechanisms should automated systems provide for human oversight?", "b597f3f4-73ca-41d6-805f-ea8566ee4335": "Why is it important to have human consideration and remedy in automated systems?", "51a36031-cbe6-4896-a26f-0d1231ac9ac5": "What kind of training and assessment is necessary for human-based portions of automated systems?", "28e9d3c8-9aad-4ac2-8b76-8112ba317fc7": "How should automated systems ensure the effectiveness of human alternatives?", "3cd1b051-c5ec-4ba6-85a3-6c8ecc3d382e": "What safeguards are recommended for automated systems in sensitive areas?", "93157218-65e8-4b27-bdc0-d3b5c75016f2": "How can automated systems provide clear and accessible instructions for opting out?", "6a607a7d-6808-444f-a772-aa55eccd8e61": "What role does human oversight play in the effectiveness of automated systems?", "522e086d-9b12-48c9-b070-b9f0c6b871e8": "Why is it important to have fallback systems with human oversight in automated systems?", "ce02496c-71b3-4ab7-98bb-eed1cc3edc11": "What are built-in protections for abusive data practices?", "55c73a61-2c93-43db-b06b-142fea09d1a3": "How can I ensure I have control over how my data is used?", "8dae2406-bb95-4836-9224-224fa830dd81": "What design choices help protect my privacy by default?", "1ddfec1f-63dc-4114-8d2c-6c6b080df23d": "What are reasonable expectations for data collection?", "ca588f53-c672-4ec4-8c2f-4edb75780625": "How can designers and developers seek my permission for data use?", "f01609ce-a9ca-4166-bc21-4837e9f8dbe6": "What are alternative privacy by design safeguards?", "bf05189a-5783-4529-9a04-33ecb2b039f6": "How can I avoid privacy-invasive default settings?", "69cd9e44-ebad-4444-bd6a-0ffe7dd0fea1": "When is consent necessary for data collection?", "5592a53b-bc51-4eb2-ad09-d91eab84cbca": "What are the best practices for respecting user decisions on data use?", "da87855a-e8d3-464f-b44a-2f1c0f36efd9": "How can automated systems ensure my data privacy?", "537d6d33-2d70-4cda-bfd2-a7e7d58dca1c": "What are the guidelines for ensuring surveillance is proportionate and necessary?", "f9c45eea-e5e9-4963-b36b-eac4e1041f10": "How can designers and developers minimize the invasiveness of surveillance systems?", "95df7bca-5759-48de-aded-0bdcfd73b47d": "What measures should be taken to inform individuals about surveillance activities?", "08b6077f-18cf-437e-93e3-b2272cafdf09": "How can surveillance systems be designed to protect civil liberties and civil rights?", "32c66693-7c38-4482-b27e-1226a0d82810": "What are the legal requirements for providing notice to individuals subject to surveillance?", "b0213953-d766-4b10-aa1b-c7170ea2c1ab": "How can surveillance be limited to avoid infringing on democratic rights like voting?", "a7153e52-4939-4c06-bfa6-43f880a88d70": "What are the best practices for restricting the number of subjects monitored by surveillance systems?", "c1a6fa3b-e163-482c-8ca2-b05ca142d9f1": "How should data gathered through surveillance be managed and used responsibly?", "1b8e4a92-c4c9-4200-9e7f-a441aa82cd9b": "What are the ethical considerations for deploying automated surveillance systems?", "b3ed9e28-9cca-467c-9c04-1b533b1ff751": "How can surveillance systems be aligned with national security needs without compromising individual rights?", "b814a05e-73e6-4ac4-8098-646df1806acd": "What are the common biases found in automated sentiment analyzers?", "e2b9260e-db2c-4449-9f56-d5cbf8e617c2": "How do automated sentiment analyzers affect social media content moderation?", "9a8125b8-6346-4652-9584-b5e5399fa7bd": "What steps are being taken to address bias in sentiment analysis tools?", "2c59dede-dec0-4ef4-9a1c-f4e8e47a6727": "Why do searches for terms like \"Black girls\" or \"Asian girls\" often return sexualized content?", "3c7f39ce-861e-4abc-8b91-941233a6ff50": "How can researchers help in mitigating bias in sentiment analysis tools?", "0e532265-3e9e-4043-ac99-d073b610bb72": "What are the implications of biased sentiment analysis on minority groups?", "3479b71e-e61b-42b5-9866-827680891f1c": "How can technology platforms ensure fair sentiment analysis for all users?", "6334ec05-5071-42d8-98b8-fc5306d236b2": "What examples illustrate the bias in automated sentiment analyzers?", "c5293c46-c7bd-4332-b088-0f07e7fca312": "How does bias in sentiment analysis impact online communities?", "5386554b-00b3-4e7e-b130-eafd4d8eb057": "What measures can be taken to improve the accuracy of sentiment analyzers?", "22b750f1-231b-489a-bebd-3b193bea2a49": "What is the importance of calibrating automated systems to the level of risk?", "5de799b0-d874-492e-aa45-4fd7647abab2": "How can summary information about automated systems be effectively communicated in plain language?", "81900311-01e7-4092-a602-1d8187f760e4": "Why should assessments of the clarity and quality of notices and explanations be made public?", "65bccbee-7732-4dd2-be47-39627cdfeab0": "What are the key components of a good notice and explanation for automated systems?", "db31ef6b-186d-4690-9967-65f38c663c5b": "How can organizations ensure that their automated systems are transparent to the public?", "540f0169-64c9-4548-888a-05f286d81496": "What methods can be used to assess the quality of explanations provided by automated systems?", "415e4fbc-b69e-428a-9f94-7312d737e467": "Why is it important to report on the clarity of notices related to automated systems?", "1bfaa0c5-41a4-4311-a8ca-15d61ff4d3cf": "How can the public benefit from having access to summary information about automated systems?", "768e8af3-91d4-480a-8e3c-f3fb6fa362a0": "What are the challenges in making automated system reports understandable to the general public?", "85eec5c3-d2d6-458e-ada1-b311bf4a72f9": "How often should assessments of automated systems' notices and explanations be updated and made public?", "3d150e71-c79a-4bd8-8084-2ae5bafda260": "What are the key findings of Acemoglu's 2024 paper \"The Simple Macroeconomics of AI\"?", "1a24bdd1-8636-4d56-8125-f82bbece4d8e": "How does the AI Incident Database track and report AI-related incidents?", "84f606b0-d5e2-46fe-b0fe-9f8bd603926f": "What were the main incidents and responses discussed in Atherton's 2024 survey on deepfakes and child safety?", "b0068345-aa37-45f2-a66d-ab765c64e4c3": "What are the implications of intentional biases in LLM responses as discussed by Badyal et al in their 2023 paper?", "322cd2e4-d7f9-48b7-8de7-f1bb820e45a4": "How was the Bing Chat data exfiltration exploit discovered and fixed, according to Embrace The Red's 2023 blog post?", "555f7d72-2732-4953-b60e-5aa9bb3b5329": "What is the concept of algorithmic monoculture and its potential impact on outcome homogenization as explored by Bommasani et al in 2022?", "0a9a8d6d-03b6-4a09-a022-86b5bcbb4f9d": "What strategies do Boyarskaya et al suggest for overcoming failures of imagination in AI system development and deployment?", "28ffa310-5101-4271-a96f-ae81552638be": "What are the main security challenges in the AI pipeline as identified by Browne et al in their 2023 report?", "e59e161d-73b9-44a7-ad00-86e936500c7d": "How does the AI Incident Database contribute to improving AI safety and accountability?", "7712df59-b5e6-4300-81f2-1d0e16da04e2": "What are the potential risks associated with deepfakes, particularly concerning child safety, as highlighted in Atherton's 2024 analysis?", "ecfdcb90-ee70-422b-9850-10c9ebbf34c6": "What is the AI Bill of Rights?", "6dd78dc1-02ed-4f5b-abe6-398caa87184d": "How can AI improve Americans' lives?", "43f126a5-f5cf-47b2-a267-d84e162dc483": "What are the potential harms of AI technologies?", "2d69fe62-48f6-443a-af60-47dd8aa8e223": "How can we prevent the harms of AI technologies?", "b15d2c3c-6578-4ac7-bf29-1bb9ffae84d3": "What role did public servants play in shaping the AI Bill of Rights?", "c4aaa7b2-60f1-480b-9a24-5f8d421c6136": "How did the international community contribute to the AI Bill of Rights?", "98490660-182e-4994-a0e9-79f5063132a2": "What are some examples of public engagements included in the Appendix?", "db8d310e-c511-4d66-9486-f8723f206d2f": "Why is it important to have a formal request for information regarding AI?", "4dce7da8-27f9-40a3-917b-17d3726fd5ee": "How was the input from the public collected for the AI Bill of Rights?", "9f0a6fe1-594c-447e-8837-2a78a94f7b03": "What are the core messages from the discussions about AI technologies?", "60709a95-43fe-4194-a602-00bee13a364a": "What is algorithmic discrimination?", "d64d1e05-da97-4caa-a99f-c615a4ec29f3": "How can we protect against algorithmic discrimination?", "ec9e492e-7c12-49e0-b47d-e552f7d1f972": "What are some examples of algorithmic discrimination?", "336ad8fa-faaf-4447-bfc6-ef161da017ce": "What laws exist to prevent algorithmic discrimination?", "3b634a49-58a5-4fcf-a112-9a86f5ac0893": "How do algorithms contribute to discrimination in hiring practices?", "4b58cb88-0109-4889-95e2-055c73c49939": "Can algorithmic discrimination be completely eliminated?", "21b86043-f03c-4c93-a916-be8fd8b2ad61": "What role does transparency play in preventing algorithmic discrimination?", "63133742-a77f-4db6-846d-4d1f5059f01a": "How can companies ensure their algorithms are not discriminatory?", "661fa6f5-10ba-4b3b-a3aa-67fcb6b7c0ec": "What are the ethical implications of algorithmic discrimination?", "d181a784-4cc1-4749-98e2-0f0ce4f2e3be": "How do biases in data lead to algorithmic discrimination?", "ebf17b14-0e3f-4c3d-904d-649dfc42fa95": "What are examples of automated systems that can impact individuals' rights or opportunities?", "a6fabc41-7dfb-4c46-aa88-b4a3530b1d84": "How do automated systems derived from machine learning differ from passive computing infrastructure?", "24c03da2-ba86-485a-86f8-59894c03d3e1": "What is considered passive computing infrastructure in the context of automated systems?", "5e4464c8-91c2-44f1-9ab2-914ebaa083c0": "How can automated systems influence policy implementation?", "6784a5e2-6056-4306-93f8-80a495e09e01": "What types of data processing techniques are included in the definition of automated systems?", "79f1c48b-968c-4851-928d-ae6f42c61343": "Why are web hosting and domain registration considered passive computing infrastructure?", "925e7b0d-8fe7-40c2-a359-c8ee0f5ed344": "How do automated systems interact with individuals and communities?", "3397b416-793c-48c5-be7e-199cd416c910": "What criteria determine if an automated system is in scope for impacting communities' rights?", "fc6683f3-3edb-4168-be40-07bfdd0d288b": "How do automated systems aid in decision-making processes?", "f7d73d0c-df20-4ca2-91d2-a8c5afdc14c4": "What is the significance of excluding passive computing infrastructure from the definition of automated systems?", "36690cae-c8ac-4416-86a2-94636c14e662": "What is algorithmic discrimination and how can it be avoided in automated systems?", "ed1dbeba-1948-4424-9f4e-49940e6ced35": "Why is it important to limit data use in automated systems to avoid group-based inferences?", "6144bb8c-dc20-482c-b508-3a6746a31aad": "How can human oversight ensure that automated systems are tailored to specific use cases?", "10bc0fe7-54f9-4f07-8e70-4dc100547fa8": "What are the risks of using automated systems in sensitive domains without human oversight?", "a2df3dd2-4f82-4dc5-a09b-87f4bb447213": "Why should validation testing of automated systems not be assumed to transfer to different locations or use cases?", "1ceaf948-0544-42aa-998b-834363202b17": "What role should human consideration play in high-risk decisions involving automated systems?", "7ecb6173-5692-4d0c-9c5e-8b0b13bffa23": "How can automated systems provide positive outcomes without directly intervening in high-risk situations?", "1e214f08-1e4a-4588-b61a-55376c21b541": "What are some examples of high-risk decisions where automated systems should not intervene without human oversight?", "68fab0c7-c29b-44ec-af9d-05ad2474f8b0": "How can evaluation testing ensure that an automated system is safe and effective for a specific situation?", "7bd24a17-0f1e-4165-ad6c-a177ddda289f": "What are the potential consequences of allowing automated systems to make high-risk decisions without human consideration?", "c8b856a5-bdd4-468f-967f-2a2d971d1c03": "What are the legal limitations on the use of surveillance technologies by the government?", "403aa84b-752d-4588-b4e3-fa5a8c170913": "How do surveillance technologies impact the rights and opportunities of individuals?", "d6cc3ca1-888e-40c0-be4f-a80b26fe264f": "What constitutes \"real-time or subsequent automated analysis\" in the context of surveillance?", "33590f14-1e42-4a8a-b98e-4b50ed420647": "How can surveillance technologies affect underserved communities?", "a2a6d551-b7e7-4648-9043-311d908a8546": "What is the definition of \"underserved communities\" in relation to surveillance technology?", "8da5e9a2-f967-4417-a687-2d49feb921bc": "How does the framework address the protection of data and communications?", "2826ff48-bba2-4f87-9f2e-e425dd1999ff": "What are the ethical considerations for using surveillance technologies on individuals or groups?", "ff195633-1d86-4b29-8add-e361af17a5fd": "How can commercial use of surveillance technologies be regulated to protect individual rights?", "d1ee3ce0-b52c-4ea9-a326-9e3a36f91eab": "What are the potential consequences of surveillance technologies on community access to opportunities?", "655de1e5-ce3a-4bce-95ec-ebe789004f66": "How does the framework ensure the preservation and protection of identifying information?", "ec6b21b6-677f-430b-b3f1-682615b0c999": "What are the best practices for obtaining consent for data collection in sensitive domains?", "16885872-4b72-4e64-b7db-18121bb64984": "How can notice-and-choice practices for data use be made more understandable?", "f9d9b18c-d71e-4abd-b3ca-0223dec3ad95": "What are the enhanced protections for data related to health, work, education, criminal justice, and finance?", "2bb558fb-06ba-4259-b5c2-1069543d1700": "How should data pertaining to youth be handled to ensure their protection?", "9082084b-5bcf-44c9-acbf-4b018579d045": "What are the necessary functions for which data and related inferences can be used in sensitive domains?", "5fc54a90-cce1-45f8-8502-abf134313535": "What ethical reviews are required for the use of data in sensitive domains?", "98454bb2-eaf7-45a3-8e6d-9781a4a9d584": "How can communities protect themselves from unchecked surveillance?", "e9753e53-f009-433f-83b1-86b01c4fdf46": "What kind of oversight is necessary for surveillance technologies to protect privacy and civil liberties?", "7c787e2d-b2de-4444-a4e9-08b349e388a4": "What are the potential harms of surveillance technologies that need to be assessed before deployment?", "6c304545-a0cf-4473-aec5-25670f40a825": "How can continuous surveillance and monitoring be regulated to protect individual privacy?", "34a2354d-7bf6-4914-8c4a-cf196db36040": "What are the key points discussed in the document \"Records, Computers, and the Rights of Citizens\" from July 1973?", "0aad6105-223c-4dab-912f-526f486cdc6c": "How does the Office of Management and Budget's Circular A-130 guide the management of information as a strategic resource?", "f59c944c-112c-40a8-a47f-ac2b0347e2c4": "What are the main recommendations in the OECD's guidelines on the protection of privacy and transborder flows of personal data?", "c8df4ea5-17bd-4cca-a295-e7ee59f9e7d0": "How effective is the proprietary sepsis prediction model validated by Andrew Wong and colleagues in hospitalized patients?", "98b08556-abfd-4833-ae35-a8535571fea9": "What are the implications of the findings from the study on the sepsis prediction model published in JAMA Internal Medicine?", "cba6f835-caec-48d5-9b82-232ba8416963": "How does Facebook's moderation policy affect discussions about racism, according to Jessica Guynn's article in USA Today?", "d5c902d5-6803-43ce-9cc7-e41da57f53fe": "What does the term 'Zucked' mean in the context of Facebook users discussing racism?", "b810fe11-8639-4aa1-9680-e9aed0a7f23f": "How has the recommendation of the OECD Council concerning privacy and data flows evolved since its revision in 2013?", "cf8d9d77-d12d-4feb-affb-6668a8f6b2ce": "What are the criticisms of Facebook's handling of hate speech and discussions about racism as reported by USA Today?", "d47a2d26-34fd-45b5-b3ae-e8dfe20c77ac": "How does the 2016 update to Circular A-130 impact federal agencies' information management practices?", "345ce069-495e-49b5-af9c-c3149193f72c": "How can new technologies help reduce health disparities?", "74332ba4-7dba-484a-b7f3-db3c9b6c6955": "What are the potential risks of relying on technology for healthcare delivery?", "8480a6c9-125b-435b-87a1-ffad65340e1f": "How can policymakers ensure equitable access to healthcare technology?", "d4afcb88-ecf5-4717-9b29-d9b4cd68121b": "What role does artificial intelligence play in improving healthcare outcomes?", "468af870-6b02-4fa5-9205-37a33e43b63c": "How can healthcare providers integrate new technologies into their practice effectively?", "12891465-101e-4897-a86f-046d85706186": "What are the ethical considerations of using technology in healthcare?", "14c6eb6a-036f-4f26-bb80-a075fd2979a1": "How can technology improve healthcare access in underserved communities?", "861a1a80-5a7a-4b03-b86b-e6d7b357b14c": "What are the most promising areas for research in health technology?", "beb717de-9182-47e4-82bf-c27fde4a43fa": "How can healthcare systems balance technology use with patient privacy concerns?", "840b62a5-c2ca-45e6-9793-40fed59c838d": "What impact has telemedicine had on healthcare delivery during the COVID-19 pandemic?", "bd65a985-6adf-4ca0-800a-2f5e4eaf9313": "What are the best practices for monitoring AI-generated content for privacy risks?", "d1bdd54c-5d9d-4677-b5ac-065fd4b4e8e8": "How can organizations address instances of PII or sensitive data exposure in AI-generated content?", "e937f160-66b0-4289-83b1-2a5616b701ae": "What processes should be implemented to respond to potential intellectual property infringement claims in AI?", "a9f3fd07-2b06-4abc-9bae-9cb5c884420a": "How can new GAI policies be integrated with existing IT governance and legal compliance activities?", "00c694b6-964a-4ff8-9c00-082579e3705e": "What are the key components of effective data curation policies for AI training data?", "0d2d3927-99e8-44c3-aec5-08fdc4fc2fd1": "How can companies ensure their AI technology does not infringe on third-party intellectual property rights?", "227007e5-7052-4b42-b7b0-b914bcbe185f": "What are the legal risks associated with using third-party data or software in AI development?", "262df558-56e7-445f-9a93-ad716c929f95": "How often should organizations conduct monitoring of AI-generated content for privacy risks?", "b6f4c293-115e-4811-a3aa-9a9b8ddf6f11": "What steps can be taken to document AI training data curation policies according to applicable laws?", "46fd166c-6f0e-4c3f-85c3-b30f0a1d53a0": "How can information security be maintained while integrating new GAI policies with existing systems?", "560ee295-11c4-41df-a82c-d7e7f0f44386": "What is a performance baseline for an algorithm, and why is it important before deployment?", "66e50da4-fea8-4795-8a27-663c0cde6f02": "How can human performance be used as a lifecycle minimum performance standard for automated systems?", "4d449176-2653-4092-8b2f-4f047ac02fb5": "What are the decision possibilities resulting from performance testing of an automated system?", "b8a080cb-dbf5-4ca7-b5a4-5c84f821b1ef": "Why is it important to consider the possibility of not deploying an automated system after performance testing?", "cde58352-24e9-4fc4-aae0-9d41f4d197d6": "What are the key steps in identifying and mitigating risks before deploying an automated system?", "3426f11e-e5f4-418e-b97a-01f241a68b12": "How can potential risks of an automated system impact people's rights, opportunities, or access?", "f3e038cf-7997-4724-8e6b-99c701363442": "Why should risks to impacted communities that are not direct users of the automated system be considered?", "d730bbe4-b1d4-48dc-9ae6-737485ab0e96": "What are some examples of risks resulting from the purposeful misuse of an automated system?", "e4aae9a3-d377-43f0-b0b7-61cca8c61714": "How can the consultation process help in identifying concerns related to the deployment of an automated system?", "4237e65b-dc5a-4002-b88b-cd45f37bc5f7": "Why is it important to measure the impact of risks and balance attention towards high impact risks?", "a824bf8c-fd69-4e1b-a7fa-d8a0e946b3e3": "What are the key factors to consider when determining the expected and acceptable GAI system context of use?", "305a21f4-80f2-4d2b-9d75-6745caca88fb": "How can organizations assess the potential positive and negative impacts of GAI systems on public safety and democratic institutions?", "d4751075-70d8-4ec0-ae48-12518f492e05": "What are some common assumptions and limitations that need to be documented for GAI systems?", "9a023a00-7a74-40a4-9616-0444aeadb0bb": "How can socio-cultural and domain experts contribute to the assessment of GAI systems?", "01f67521-6c20-4fd8-8434-616c85133c1e": "What are the potential risks associated with individual and group cognitive biases in the design and use of GAI systems?", "2fd099a7-bb3b-4ae7-97cf-d4a44e7b14fd": "How should organizations document risk measurement plans for GAI systems?", "c09872bc-2fe0-44c2-92ff-4737772a9980": "What are some known past incidents and failure modes of GAI systems that should be considered in risk assessment?", "01e6920d-c467-4660-aeea-b58e1ad39cbf": "How can organizations address the issue of over-reliance on quantitative metrics in the evaluation of GAI systems?", "1ef08275-0345-43e2-87d8-2c0014a954c9": "What are the potential consequences of harmful bias and homogenization in GAI systems?", "5d1ea4e8-03c0-4918-a4b0-ee3fb7de061a": "How can organizations ensure that GAI systems align with social norms and expectations?", "f15a27f7-7498-4ada-be1c-3cac898dc341": "What are the key expectations for automated systems in terms of notice and explanation?", "b3491e6c-e129-4aa9-81b0-cb27a5390728": "How should an automated system provide notice of its use?", "02f41084-6947-4e5d-a014-2701aa7a8524": "What type of documentation should be provided for an automated system?", "37901011-f77e-472d-bc43-758d35691417": "Why is it important for the documentation of an automated system to be in plain language?", "d152bc28-9605-4041-84f0-75278caf5c62": "Who is responsible for ensuring that the documentation of an automated system is accessible?", "29842944-f55f-426a-b9fe-f93af91ad99a": "What should the documentation of an automated system include?", "8eb02857-2af2-4998-a936-ddb76db5f513": "How can an entity ensure that the documentation for an automated system is easy to find?", "7bebfe19-175e-4123-abe1-e08b0c2d683d": "What are the benefits of providing clear and understandable explanations for automated system decisions?", "98de5d6b-fc75-4dd6-90ed-3be730aeab0c": "How can automated systems ensure that their actions are transparent to users?", "45c83246-49f0-4517-8449-22f61e1ac6a2": "What role do human components play in the documentation of automated systems?", "d0176225-348b-4c83-ab7d-82277925e6e9": "What is the Blueprint for an AI Bill of Rights?", "f75dba8f-4254-4fad-b3ba-5ce51b3065e9": "How do AI and data-driven systems impact Indigenous communities like Tribes and Clans?", "d6be5ece-a538-4e8a-a374-7789a34d34c8": "Why is the concept of community integral to the Blueprint for an AI Bill of Rights?", "a1d04dee-74ab-4d43-8717-6e2684c5670b": "How does United States law currently protect the rights of individuals against AI harms?", "48ff1eaf-6834-4862-8e80-624bb71169e7": "What challenges exist in protecting communities from the effects of automated systems?", "7b9de209-f9fa-4ef0-8ced-8969ee2ae73c": "How can the harms of automated systems be evaluated at the community level?", "a2d29100-ebeb-4076-9ddf-1f64b365290a": "What are some examples of formal organizational ties mentioned in the context?", "fd57bf95-f994-4cf5-b914-af75dc140b11": "Why might the impacts of AI be more visible at the community level than the individual level?", "4eae01bd-26ed-4b64-9606-abf42d1039e7": "How does the Blueprint for an AI Bill of Rights propose to redress harms caused by AI systems?", "c93c5ccd-cd7b-4a31-b8fe-2730399bf76e": "What are the potential benefits of evaluating AI impacts at both individual and community levels?", "8e93918d-d152-4bda-a527-51eb1e4a563a": "What are interpretability and explainability methods in AI systems?", "8bd0ab3a-519e-4f8b-bd09-52e086f06ab1": "How can we evaluate GAI system decisions for alignment with their intended purpose?", "9ea19168-923a-4776-b043-9cc4c8d33b84": "What is the importance of monitoring and documenting instances where human operators override GAI decisions?", "48f1823c-987c-43b8-ba09-2f7f30c39478": "How can content provenance issues affect GAI system decisions?", "69904a33-e3bc-4725-a589-ae8903083507": "What are structured public feedback exercises in the context of AI system design and deployment?", "1ff81582-703f-4f1c-9591-b190d995ac44": "How should the results of public feedback be incorporated into AI system decisions?", "70b48d78-cf62-458d-9cc8-cdee5b6b30ce": "What are the roles of AI deployment, domain experts, end-users, and operation and monitoring in AI systems?", "3cbba8c5-608e-41ba-acc1-e266269a8d04": "What is the significance of verifying information integrity in AI systems?", "c0dbcb52-583f-455e-ae5b-a4baefe89ffb": "How can harmful bias and homogenization be addressed in AI systems?", "022fb6ca-e847-4f32-a2d8-a01f772f1c21": "What are the key considerations for making \"go\"/\"no-go\" decisions in AI system deployment?", "776a11f6-1df2-463f-8f5e-9ab8c838c2ed": "What is the role of the Connected Health Initiative in advancing healthcare technology?", "b183d8c6-087c-4de9-9b29-7b89974ffa14": "How does the Consumer Technology Association influence tech policy and innovation?", "611c347f-fd3b-498b-87ff-095aa469d501": "What contributions has Courtney Radsch made to digital rights and online freedom?", "ccd936e2-e89b-41c3-9b5d-4c171d9f1eb6": "What are the primary research focuses of the Data & Society Research Institute?", "de9aab5b-822b-43a9-97f2-e9d6959e33ba": "How does Data for Black Lives use data to address racial disparities?", "daa39ee8-a5c1-4bef-bb7a-eadbcc70f33b": "What projects are currently being undertaken by the Data to Actionable Knowledge Lab at Harvard University?", "cc6d42a1-429f-4ea8-a0c8-481571c586ea": "What services does Deloitte provide in the realm of technology consulting?", "1fa9c10e-8e74-472e-98c1-62ee3c81305f": "How does the Digital Therapeutics Alliance support the development of digital health solutions?", "3d8c9a00-451d-4097-95da-7db467588dc5": "What is the mission of the Electronic Frontier Foundation in protecting digital privacy?", "d5fd9d65-12bb-4f39-a0f1-3cb54d012fe7": "How does the Electronic Privacy Information Center advocate for consumer privacy rights?", "cb0bf5f3-38b6-4eec-81ff-530a778e0328": "What are the key findings of Smith et al (2023) regarding the use of neuroanatomy as a metaphor in large language models?", "207c0258-6572-48ec-ab8d-8f6558681013": "How do Soice et al (2023) propose that large language models can democratize access to dual-use biotechnology?", "eba2a62c-de0b-4649-8f1e-438799536f1a": "What methods and considerations are discussed by Solaiman et al (2023) in \"The Gradient of Generative AI Release\"?", "015148ae-410b-409f-a89d-73d1a425a37d": "What privacy concerns are raised by Staab et al (2023) in their study on violating privacy via inference with large language models?", "b4463b2e-409a-48a2-9a74-455373d37285": "According to Stanford et al (2023), whose opinions do language models reflect, and what implications does this have?", "6ae4fc70-185d-4aae-bc07-faedd4dbae8e": "What are the energy and policy considerations for deep learning in NLP discussed by Strubell et al (2019)?", "f67fd894-f032-407f-8771-8f564f4f9ca2": "How does the White House's Circular No A-130 (2016) relate to managing information as a strategic resource?", "ae278041-1973-4238-aa7f-a6cac1551a8c": "What are the potential risks of hallucination or confabulation in large language models as discussed by Smith et al (2023)?", "f6cbd86e-2f15-4311-9c83-e407554ff032": "How might the democratization of dual-use biotechnology through large language models impact society, according to Soice et al (2023)?", "38192107-9ce8-4cda-b34a-cc111e33be8a": "What are the ethical considerations in the release of generative AI as outlined by Solaiman et al (2023)?", "af1bb742-8ec7-4495-9141-a44df3bda1a0": "What is the Jigsaw Unintended Bias in Toxicity Classification competition on Kaggle about?", "379fa7b3-02e9-4abb-a67d-f5611f67453f": "How does the paper by Lucas Dixon et al address unintended bias in text classification?", "938ae17a-7800-4fa0-9d13-64d885add576": "What are the key findings of the AAAI/ACM Conference on AI, Ethics, and Society paper by Lucas Dixon and colleagues?", "c1a34901-9205-4c40-81b9-92d9bccfe577": "How has Google reduced racy search results for terms like 'Latina teenager'?", "fcd299fd-aad2-49b8-9fd4-d6d51e7d6d06": "What impact did Google's reduction of racy search results have on search outcomes?", "8fe9af88-6425-4dce-ba89-5f8170af3a50": "What are the main arguments presented in Safiya Umoja Noble's book \"Algorithms of Oppression\"?", "dbf83cba-a1ec-4513-a5ee-dbb91d87f238": "How do search engines reinforce racism according to Safiya Umoja Noble?", "07560e9e-9c12-44bd-8b3e-a2aa039ef9bc": "What measures has Google taken to address bias in its search algorithms?", "773283eb-6b5a-4256-8ddf-8f255df3f593": "How effective are Google's efforts in mitigating unintended bias in search results?", "d57e3ef2-9ba0-4083-91e5-bbbc46ea63c6": "What are the ethical implications of unintended bias in text classification and search algorithms?", "ae1eb349-2033-4722-ae50-edd77d230dee": "What are the expectations for automated systems in sensitive domains like criminal justice and health?", "f123f8ad-0f9d-473a-a63f-f10e7686745d": "How can human oversight be implemented in automated systems to avoid discriminatory impacts?", "61295097-606f-4249-968f-47372578c40c": "What safeguards should be in place for automated systems used in employment and education?", "663dd7a9-c1b9-432e-8fbf-ea8ec15a775b": "Why is it important for automated systems to have narrowly scoped data and inferences in sensitive domains?", "a0a14c6f-86f9-4164-99b9-4db3716b659e": "What are some examples of inappropriate impacts that automated systems should avoid in sensitive areas?", "5b5f3867-1803-4238-af24-bd788829ee4c": "How can technical standards and practices be tailored for specific sectors when developing automated systems?", "5e60b645-855e-47df-8ee9-48b1a1a83efd": "What role does human oversight play in ensuring the proper functioning of automated systems in sensitive domains?", "7e2af9b3-68e7-46c0-9213-acdc636f4273": "How can automated systems justify each included data item or attribute in sensitive domains?", "3176e372-80fb-44f7-ba7b-210022be925b": "What are the potential risks of using automated systems in criminal justice and how can they be mitigated?", "dc35ee01-7ac3-4ccf-8b45-14b5aa5a6c9e": "How can automated systems be designed to meet the expectations laid out in the framework for sensitive domains?", "d599c961-25c4-4fee-8ed1-d5c62a73647f": "What is AI red-teaming and how does it work?", "73118592-ad30-419d-b6b2-3dd0d9384da9": "Why is it important to have large groups of AI red-teamers?", "e5807faa-9a9f-4510-807d-c4553fcd9780": "What are the benefits of having domain experts in AI red-teaming exercises?", "d70f0a08-4229-4e3c-96e1-75b97e2bd955": "How can AI red-teaming be applied in the field of cybersecurity?", "e56fdc33-7ce6-4293-9d14-efd06aa134c7": "What challenges are faced when recruiting specialists for AI red-teaming?", "e3954bfb-ba3d-4cae-bbcf-993ccb500b97": "How can a combination of experts and non-experts improve AI red-teaming exercises?", "1bbd547f-2198-4ec1-ae87-5a5ac9ebc2d1": "What specific skills are required for effective AI red-teaming in medicine?", "54655f06-a110-44d5-84da-2b618c017d76": "How do AI red-teaming exercises help in identifying harmful model behaviors?", "775f37c2-5451-467c-8c55-81cbdf42dc44": "What are some examples of harmful behaviors that AI red-teaming aims to prevent?", "6092bd99-29ad-4e06-bb27-ad1ae9006a58": "How can AI red-teaming be beneficial in the biotech industry?", "bc600deb-fbcd-400f-9140-0d915fcdaa91": "What are the limitations of current pre-deployment TEVV processes for GAI applications?", "2aef734a-ac35-429c-a7ed-45f4bc41a30b": "How do organizations measure performance and capabilities in pre-deployment testing for GAI?", "14c90494-2295-4e90-ae42-73e7ae4a413c": "Why might anecdotal testing through video games be inadequate for GAI systems?", "cb928351-26a1-491c-9262-10297fb46ede": "What are some recommended \"pre-deployment testing\" practices for GAI?", "90e2f5ef-ab38-4486-ac93-f172d2500a85": "How do current pre-deployment TEVV processes fail to reflect deployment contexts?", "d860db03-3ac9-4ee9-8e9d-68730a2dbd6e": "What are the risks associated with using standardized tests designed for humans on GAI systems?", "7629f220-d4f3-493d-8160-89a311a495a7": "How can organizations improve the validity and reliability of GAI system testing?", "e54dbc2a-f5cc-47d4-b7f5-2cdad36a161d": "What is the role of risk measurement and estimation in pre-deployment TEVV for GAI?", "864610a5-0a37-4ef4-98d4-1b6d7d32f886": "Why might jailbreaking or prompt engineering tests be insufficient for assessing GAI systems?", "8fc6576e-192f-4f3b-af15-d1c21b908da9": "What are the state-of-play methodologies for pre-deployment testing of GAI systems?", "9bec12eb-4fa7-477e-a667-fd165c16f38d": "What are the key principles of the Privacy Act of 1974?", "ce2ec10e-da61-4462-b06b-0aa052282a80": "How does the Privacy Act of 1974 limit data retention in federal records systems?", "782d7b57-c109-49a4-aee8-fce11007be0d": "What rights do individuals have under the Privacy Act of 1974 regarding their personal information?", "04329baa-7e91-421f-b129-dcab9672ade8": "How can federal agencies determine what data is \"relevant and necessary\" under the Privacy Act?", "f84ca6ea-58d1-48f6-a5a1-cd8ef9f4658f": "What are some real-life examples of laws that protect data privacy?", "f2ce84d8-0c07-4e0e-9bcf-3aaecc8dc8a2": "How do technical approaches help in protecting data privacy?", "366462e4-8d9e-40ee-b30d-f4817377ba05": "What are sociotechnical approaches to data privacy, and how do they work?", "e8433dc8-3bc8-4eee-9a40-71e4005f3386": "How can policies be designed to ensure data privacy in practice?", "ead8c5d0-e517-4da2-b4b7-885f6c6031b4": "What are the limitations of the Privacy Act of 1974 in protecting personal information?", "7f75740d-9d77-4338-9f3a-78ab85ae1906": "How can individuals access and correct their data under the Privacy Act of 1974?", "caeaec67-6507-428f-8b4b-41751a7af496": "What are the common data privacy violations in system training data?", "2987bea3-66c4-4ccc-92fb-5c073f60fd97": "How can organizations address intellectual property concerns in AI training data?", "48581f7f-03f6-4ee0-abe0-09bdb7f54800": "What measures can be taken to prevent obscene or degrading content in AI outputs?", "66f09013-2126-4c82-bc9a-c3a11320b3d7": "How can harmful bias and homogenization be mitigated in AI systems?", "a7a8bc83-2e72-4a24-a793-f1b816f0c283": "What are the risks associated with dangerous, violent, or hateful content in AI-generated outputs?", "cfb4d915-c088-4618-925e-02e974b919bd": "How should organizations re-evaluate safety features of fine-tuned models when risks exceed tolerance levels?", "ae31cf33-efff-4297-a26b-ea5db0b92c1c": "What steps should be taken to review GAI system outputs for validity and safety?", "c8138f61-21b5-4802-ac6d-f18233410054": "How can organizations ensure that generated code does not lead to unreliable downstream decision-making?", "0f1e8318-43b1-4523-8576-17ceb1fc8061": "What are the best practices for verifying that GAI system architecture can handle and recover from security anomalies?", "25ff123c-f46a-4669-9903-16149a4ec2d2": "How can confabulation and information integrity issues be addressed in AI systems?", "1e6c80b3-721c-45ae-88a6-cf0f8ced7156": "How can organizations effectively leverage feedback from boards or committees when deploying GAI applications?", "df6054be-5a75-416a-9eaf-0be1a05ee1d6": "What are the best practices for using human moderation systems to review AI-generated content?", "288339c7-c00a-4dd4-aa6b-e2002ba889ce": "How should organizations align human-AI configuration policies with socio-cultural norms?", "deaad193-bda5-46ff-afa9-72206425c873": "What criteria should be used to evaluate the performance of pre-trained AI models?", "2d47d0ae-c76d-4ae5-a638-a6517c6220ba": "When is it appropriate to decommission or retrain pre-trained AI models?", "76fab1b0-0e24-4c35-a7ed-8d49cfe2720b": "How can organizations determine their risk tolerance for AI deployment?", "495b8ac6-a421-46e9-a6c3-985e29b71272": "What are the key considerations for integrating third-party pre-trained models into an organization's value chain?", "9326e08e-8852-4d72-a983-7e09ff35af6e": "How can human moderation systems be configured to handle AI models that perform poorly?", "a4b17ec5-fc35-40d7-9721-d18501274964": "What role do organizational boards or committees play in ensuring information integrity in AI applications?", "9bc8756b-e0e6-4b2c-8ff9-a26618ca918d": "How can organizations monitor and manage the risks associated with AI deployment and operation?", "fc3b2287-133b-4a7d-beb3-436fe108fc3f": "What are the best practices for reporting AI system errors and near-misses?", "b35cb75c-71fc-4af1-9c57-c5ae6ccd8cb3": "How should incidents involving AI systems be communicated to regulatory bodies?", "381e4eab-6b5b-4ca7-8571-31aba3dfe943": "What policies should be in place to track negative impacts of AI systems?", "08bba123-7cf2-4473-830e-9c28dc6dbce4": "How can organizations ensure information integrity when dealing with AI confabulation?", "ff25d5f3-7350-498b-8341-45dae4e79977": "What are the legal requirements for reporting AI-related incidents?", "8ae5b2b8-aeff-4c5e-aa72-6924b2fc4dd3": "How can companies establish effective procedures for recording AI system errors?", "c1f383d3-687b-4a57-a98a-c2f2212368bf": "What steps should be taken to maintain information security in AI systems?", "a8540ee7-471f-42c8-8ff5-4d74af3e9e84": "How do you handle confabulation in AI systems to ensure accurate information?", "abee8f0e-95b6-4a66-9584-2fa2c87344cd": "What are the key components of an incident communication plan for AI systems?", "86a7086e-9edd-4247-96a7-f4bd37a9d20e": "How can organizations track and mitigate the negative impacts of AI systems?", "582fa583-c146-4227-a529-e7428ecadbd5": "What are transparency artifacts in AI, such as system cards and model cards?", "f5ab7c6f-0d8c-4379-a524-ea0abad40378": "How do transparency artifacts help in managing third-party AI models?", "62dbacb4-0a6c-437d-b130-68d38e4fb182": "What is the importance of monitoring pre-trained models in AI systems?", "a8ba6c23-7fb6-47bc-8dcd-4242dca46afe": "What are some techniques used in explainable AI (XAI)?", "495f990c-cfe1-4bd2-99e7-728aaca889b1": "How can explainable AI (XAI) techniques mitigate risks in AI systems?", "dbf021da-491b-4d03-b6c9-7641362406aa": "What is model compression/distillation in the context of explainable AI?", "f2e9d547-10c8-470f-be55-7919d3b9fc76": "How does gradient-based attribution work in explainable AI?", "333ba50b-1816-4a01-9ec5-0dc8942bd96e": "What is the role of counterfactual prompts in explainable AI?", "f743f398-d354-4757-a791-669763758105": "Why is it important to document adaptations of pre-trained models?", "493410a8-8da9-4c05-af25-02344ce5fb36": "What are the risks associated with unexplainable generative AI systems?", "d43b5165-b424-4efb-8ac5-c70839068a9b": "What are the key components that should be included in the reporting of accessibility evaluations for sensitive domain systems?", "e745cebf-169d-42f5-a769-451d4e947df1": "How should training and governance procedures for technologies in sensitive domains be documented?", "48cc0ef1-0635-4131-ad9d-a75b6f87ba6c": "What kind of information should be included in the documentation of goals and their assessment?", "77a87b11-faf6-450d-bc8c-8fc3bb450471": "Why is it important to consider the data included in the reporting of accessibility evaluations?", "32dbfbc4-6fc4-4307-879f-1a14277108ac": "How can the governance of reasonable access to technology be documented effectively?", "d129f587-db8c-42b2-b15b-f48854e829b5": "What are the benefits of providing reporting in a clear and machine-readable manner?", "595e4aba-2967-46e1-9276-4619eaf23ee3": "What are the best practices for documenting training procedures for sensitive domain technologies?", "70ad54f1-132d-4b05-b0d5-ec776fc6a092": "How can organizations ensure that their accessibility evaluation reports meet the required standards?", "e782da3f-efb4-4a2b-952d-815b7704c1c2": "What challenges might arise in documenting the governance of access to technology?", "d7780233-e970-44f8-941c-d04776c461f0": "How can the assessment of meeting goals be effectively reported in accessibility evaluations?", "411f2cb4-761f-4481-acc9-3379b98be822": "What are gradient-based attributions in the context of GAI risk measurement?", "aff655e4-7805-4005-96dd-97e57a4ed1f6": "How does occlusion/term reduction help in improving the transparency of GAI systems?", "b2cca45d-920c-4cfe-81d7-5dfa18ea4ac3": "What are counterfactual prompts and how are they used in GAI risk assessment?", "c834f9d2-569f-4a49-aecb-ae1382201dda": "Can you explain the role of prompt engineering in mitigating risks associated with GAI systems?", "15467914-2915-4097-a975-a2b7a2bf6e0d": "How is the analysis of embeddings useful in measuring GAI risks?", "7233a36e-44dd-4945-bdca-92ff30a47933": "Why is it important to assess and update risk measurement approaches for GAI systems regularly?", "22334989-4055-455c-a95e-7e517df2a381": "What are the benefits of using standardized measurement protocols in GAI risk assessment?", "d818454e-443f-4926-8398-9edbf7ce1b23": "How can AI red-teaming contribute to the risk measurement of GAI systems?", "895f4711-def6-4b59-833c-f71a070facef": "What is the significance of independent external evaluations in the context of GAI risk measurement?", "c4d00e1c-836a-4ceb-973d-e0df3779b23f": "How do policies, procedures, and processes help in detailing risk measurement for GAI systems?", "1057d1c5-3ac4-4d8c-9193-566dac0f5640": "How do new surveillance technologies in education disproportionately harm disabled people?", "8c3f757b-977d-4050-b35d-aea49c010cf6": "What are the impacts of surveillance technologies on disabled individuals in the workplace?", "1468fc8a-bccd-4e2e-a99c-fd18b4bd12c2": "How does policing with new surveillance technologies affect disabled people?", "ff6dc571-3da6-4cb6-ab29-a41494392ed0": "What are the specific ways in which health care surveillance technologies harm disabled individuals?", "5e523726-a9d1-4807-9295-3881cd46f457": "How can we mitigate the negative effects of surveillance technologies on disabled people in various sectors?", "83c676ae-600e-4c27-98f4-24e784b1d7e9": "What are some examples of ableism in new surveillance technologies?", "c2b9fec3-5182-456a-8d05-894e91037f8d": "How does the Center for Democracy and Technology suggest addressing disability discrimination in surveillance?", "0da8dd83-5ddb-4544-a4ca-0fe64ff97e5d": "What are the ethical concerns regarding the use of surveillance technologies on disabled people?", "3d03cf3e-8e29-4424-b5ee-db3ce2aef10c": "How can education systems ensure that surveillance technologies do not harm disabled students?", "9466ba73-2db9-4dbb-a45c-9cf5fc4b9233": "What policies can be implemented to protect disabled people from the harms of surveillance technologies in the workplace?", "c8753999-1abf-4fe0-b602-96c7badbe1b8": "What is the main argument presented by Tirrell in \"Toxic Speech: Toward an Epidemiology of Discursive Harm\"?", "b146064b-3808-4dc7-ae9c-1fd32c51462d": "How does Tufekci address the challenges of computational agency beyond Facebook and Google?", "26296ada-303b-4757-99c1-d0b666b5ebe6": "What are the key findings of Turri et al in their study on AI incident documentation practices?", "22a9a1b9-5625-453a-8f38-7e6e1faece16": "What concerns are raised by Urbina et al regarding the dual use of AI-powered drug discovery?", "456281a3-2fc9-42d0-aaee-b9e644b01898": "How do Wang et al evaluate the energy and carbon considerations of fine-tuning BERT?", "d0fe0b08-146c-467e-8042-9160ccec66de": "What is the purpose of the \"Do-Not-Answer\" dataset introduced by Wang et al in their 2023 study?", "1c65bc00-7698-4aac-ac75-f4cf0a56d7d7": "How does the concept of discursive harm relate to toxic speech according to Tirrell?", "3b23f18c-6948-482c-ad4b-4094da577801": "What emergent challenges of computational agency are highlighted by Tufekci in her 2015 paper?", "4474dccd-e072-4606-bf97-01a59797d81c": "Why do Turri et al believe it is important to improve AI incident documentation practices?", "bc98f064-db21-492e-8cbe-6bb73bfc8422": "What are the potential risks associated with AI-powered drug discovery as discussed by Urbina et al?", "660c7ba7-9614-4425-afbe-8e9230f9e5a3": "What are the main risks and harms associated with automated systems discussed in the panel?", "3d79fef1-7ec1-4629-8dbb-c4c88e55354f": "How do automated systems impact consumer rights and protections?", "19a6f91d-d99b-479f-974f-60046204684a": "What insights were offered regarding the use of automated systems in the criminal justice system?", "926d89a3-3c21-4df7-9dfd-ced249915ecb": "How can automated systems promote equal opportunities and civil justice?", "8aee8607-430b-469e-86d5-4232adc7e194": "What are the policy opportunities for regulating artificial intelligence to align with democratic values?", "f7611088-a63f-4ae9-a027-929e84a6f966": "How do automated systems affect social welfare and development?", "93b98b07-e59b-4886-bc4c-6b487d0c9dc7": "What are the benefits of automated systems in the healthcare system?", "47a623c2-1493-45ff-82a5-c288ad0a01c7": "Who were the key experts and practitioners involved in these panel discussions?", "b42c870c-4507-4740-8c36-662932a8b9fc": "Are there any specific case studies or examples mentioned in the discussions about automated systems?", "38e32513-a3a7-4720-96e6-35e11ae830b5": "How can the public access the recordings of these panel discussions?", "1c8ce2b7-1996-402e-b151-319c407a4805": "What is the purpose of the framework developed by non-profit organizations and companies for machine learning systems?", "0ac24fc9-606c-4eaa-8576-5bafe235903d": "How does the framework for machine learning systems go beyond simple notice to inform the public?", "66d10b11-4e1c-4323-90e6-162723085f38": "What are some of the reporting elements included in the framework for machine learning systems?", "be510be5-869b-457f-8999-878fdb0b09ba": "What federal laws require lenders to notify consumers about certain credit decisions?", "e5d619fa-49b5-435a-adc3-565acb71c415": "What is an \"adverse action\" notice in the context of credit reporting?", "c5c5e007-9f35-46e7-aa48-ce8e0f608d5b": "Under the Fair Credit Reporting Act, what must be included in an \"adverse action\" notice?", "5437738f-c791-44c0-bb4c-acc4b6d2ff09": "How do the Fair Credit Reporting Act and the Equal Credit Opportunity Act protect consumers?", "cfe9c2ed-5bf9-478c-89c7-794e93148715": "What are disparity assessments in the context of machine learning systems?", "48425d12-7cb9-4383-b947-e6e9566b9e7e": "Why is transparency important for machine learning systems used by companies and non-profits?", "692bc9da-55ae-42fc-b205-f3bafca5a068": "How do safety evaluations contribute to the transparency of machine learning systems?", "d7c50441-1bb2-4a13-a9b7-608f14fd60fe": "What are the key actions taken based on the results of independent evaluations?", "614fef06-0fe5-4830-8050-73ba9a266f5a": "How can I ensure that my reporting is in plain language and machine-readable?", "1a1246aa-f540-4d9b-970a-69324e141925": "What procedures are typically followed during independent evaluations?", "c5c03047-1888-498b-8f37-9d697a2d08d0": "Why is it important for reporting to be in a machine-readable format?", "0b6f15fa-f4eb-4918-81c3-03c0a661c2c6": "What are the benefits of using plain language in reporting?", "69197eb3-9af4-4e2f-a207-c4e672d92d0c": "How do independent evaluations impact decision-making processes?", "018142f3-7555-4ee1-9679-91e57ae8774f": "What tools can be used to create machine-readable reports?", "fb522bed-6381-4de1-8e9f-51b4ea153f04": "How often should independent evaluations be conducted?", "1cb575b3-9f7b-4da7-8af1-f027dd6c2a12": "What are some common challenges in making reports machine-readable?", "433a4b30-f091-441a-af1e-ce2dcc4d8afb": "How can I improve the clarity of my reports using plain language?", "1437e5d7-0d57-47c3-a4a7-051a8d7ff1b3": "What are the best practices for allocating risk management resources in the context of GAI use?", "ad5327c9-e60c-470b-8f4b-f68f13ef62c3": "How can organizations effectively assess the severity and likelihood of negative impacts from GAI?", "e37a9ed4-73f7-42c6-8260-88f6a0063f99": "What are the differences between model-level and use-case level risk mitigations in GAI?", "f2c16031-33cc-4d57-989d-4964ca15cdae": "How can unknown GAI risks be scoped or evaluated given the uncertainty about its scale and capabilities?", "118530e2-7547-4cc3-ad5b-6568ecae31c4": "What challenges do organizations face in estimating known GAI risks?", "c573b1a0-67f0-492f-bcc7-67d803c58308": "How does the lack of visibility into GAI training data affect risk estimation?", "e343ee0e-f5b4-42b5-bc79-b18001db5dc5": "What are the current limitations in the science of AI measurement and safety?", "55a01f18-ee4f-4970-ac12-de3cd610e0b0": "How can empirical evidence be used to address GAI risks?", "0bd8ff53-8c08-4507-a5f3-550b439e5efc": "What are some examples of speculative risks associated with GAI?", "bb56381e-85cc-43fb-8e88-7117f7aacd52": "How can stakeholders manage the wide range of inputs and outputs in GAI to mitigate risks?", "a975c7d1-2ee6-4b57-849b-847b4a68ac46": "What happens to former Apple employees' titles when employers verify their resume information?", "0611d75e-5339-4d6b-8f5d-9768777ec2f5": "Why does Apple replace former employees' titles with a generic title?", "afb164b5-c73e-4af5-984b-7ac0babf5ec6": "What is the National Institute of Standards and Technology's Privacy Framework?", "290e48c4-183f-4050-a61b-d3d835bca368": "Where can I find success stories related to the NIST Privacy Framework?", "6bb17fa3-0268-4f77-a5f6-77274be300b9": "What is the ACLU of New York's stance on facial recognition in schools?", "741f4783-a448-4014-a7f1-a230bb81f3da": "What should I know about New York\u2019s temporary ban on facial recognition in schools?", "46545ce3-f86d-4a59-89f3-76f23173b07e": "When was the amendment to the New York State Education Law enacted?", "9cc2b4c1-cc01-463e-bc84-67dd2629f727": "How can I access the text of the New York State Assembly's amendment to the Education Law?", "818ef24e-1ab9-460f-ab5c-12753804fd50": "What is the Labor-Management Reporting and Disclosure Act of 1959?", "5741db49-72b8-4e42-bb0c-8b664a4b6a54": "Where can I find information about the amendments to the Labor-Management Reporting and Disclosure Act of 1959?", "243360b2-c711-4a99-94ee-2d017ae0b586": "How can generative AI contribute to the spread of disinformation and misinformation?", "a6579796-6adc-43f8-b162-a104e18bfd58": "What impact did the synthetic image of a Pentagon blast have on the stock market?", "4e1b2a11-72d4-409a-bff8-53dbfd748eef": "How do generative AI models assist malicious actors in creating propaganda?", "867fc430-fe4c-420b-a096-016280fb19a5": "What are the characteristics of trustworthy AI?", "1c1161cf-f257-43b3-820c-89d59cf30c25": "How can generative AI be used to create fraudulent content?", "b06a86d1-7e66-456c-ac18-f879ce265907": "What are the potential downstream effects of disinformation facilitated by generative AI?", "78140874-f80e-4e3b-929f-f5a10c950800": "How can AI-generated imagery affect public trust in valid information?", "cffecf56-bb7c-43ce-ac11-2bc5285c2d7a": "What are the standardized practices for information security in computer systems?", "782f973d-10c8-4637-b58d-78028023f937": "How can generative AI models be made accountable and transparent?", "c1507631-a4af-4438-86d8-01fe4c764de7": "What are the challenges in ensuring the safety and reliability of generative AI systems?", "77d8a4e8-7880-4a14-9f78-6951755d3877": "What are the five principles identified by the White House Office of Science and Technology Policy for guiding the design and use of automated systems?", "31445acf-bbb3-4ba2-815f-8f4fc6c17277": "How does the Blueprint for an AI Bill of Rights aim to protect civil rights in the age of artificial intelligence?", "45302ae8-2e25-49cc-bf44-08b27c61b02b": "What role does the right to privacy play in President Biden\u2019s vision for civil rights?", "3bbac743-bb7b-4abb-901a-036782abe40d": "How can the Blueprint for an AI Bill of Rights reinforce the highest values of society?", "3c04f443-114b-4094-b7ea-0850a1205413": "Who contributed insights to the framework for the Blueprint for an AI Bill of Rights?", "5f301a21-1a6e-4fe4-bbc4-3ed0207e093c": "What is the purpose of the technical companion to the Blueprint for an AI Bill of Rights?", "117fc83e-30f4-4fe8-b500-30f64f143ed2": "How does the Blueprint for an AI Bill of Rights respond to the experiences of the American public?", "0cb33d22-ac9a-4005-af6e-aa9926c5be8b": "What are some threats that the Blueprint for an AI Bill of Rights aims to protect people from?", "bb631381-802a-4eaf-ad0f-69f0760683bd": "How can policymakers incorporate the protections outlined in the Blueprint for an AI Bill of Rights into practice?", "f58c6ed9-bdbc-40f5-a23e-b7a8a3b74b39": "What is the significance of the right to privacy in the context of automated systems and artificial intelligence?", "c4d1371c-ac60-4fbb-9bbf-22fd9a717c1f": "What is the role of the Innovation Foundation in the tech industry?", "fd3f2838-886a-4dc2-b79c-47708237c0d6": "How does the Information Technology Industry Council influence IT policies?", "1c90fdb5-fe0e-4f62-81ef-68f4f27e5611": "What are the main objectives of the Innocence Project?", "7d7082bc-3629-4c33-bf06-8d1de10409f5": "What research areas does the Institute for Human-Centered Artificial Intelligence at Stanford University focus on?", "b9df2f99-799c-46bd-a20d-5f8d2914b226": "How does the Integrated Justice Information Systems Institute contribute to law enforcement?", "a6631d31-0e87-473e-a319-90fcda9c1c3d": "What initiatives does the International Association of Chiefs of Police undertake to improve policing?", "d7d6e108-130a-4ab9-915e-d9ee5a20c635": "What are the key functions of the International Biometrics + Identity Association?", "b9ccc9b0-0028-4ba4-bbb6-5233720451b2": "How is IBM (International Business Machines Corporation) involved in AI development?", "609aa6d8-e41e-4fc7-83a5-2cf32901c497": "What humanitarian efforts are led by the International Committee of the Red Cross?", "2e407155-794d-4127-a539-3071466d8964": "What is the mission of the Lawyers\u2019 Committee for Civil Rights Under Law?", "b3a14e62-cbd5-446d-bce9-c73acd2baea8": "What are the main challenges in mitigating bias in AI systems?", "236f0306-90cd-49d3-8ec0-6a0cba6252a5": "How do datasets contribute to bias in AI?", "e08d701d-e244-404e-a35d-5e7a74b18eb5": "What are the best practices for testing and evaluating AI for bias?", "a0516a4f-2bd5-4c53-9ddc-49b6d709e2ef": "How can human factors influence bias in AI?", "18f7d41a-eacc-4b77-bff7-dd63adf0b0e5": "What is a socio-technical perspective in the context of AI bias?", "b1ff8e57-f9c8-4c9c-b80d-0b8cab8414d0": "What preliminary guidance is available for addressing AI bias?", "99396743-8ac7-4e6a-8174-ca002a8bc22c": "How can algorithmic discrimination protections be implemented in AI systems?", "e1119908-110c-41ef-a480-2c1db95e1206": "What role do datasets play in algorithmic discrimination?", "59a7e5e5-28fd-40e7-9eef-7a8c47988333": "How can we ensure fair testing and evaluation of AI systems?", "f6fccc6d-ae1d-4832-a6a1-6a02d216d0ef": "What are some strategies to manage human factors that contribute to AI bias?", "2ad0d5f2-d9ad-4172-9854-643c6a273f4a": "What are the ethical considerations for human subject experimentation in medical and scientific research?", "d378ac98-249d-4ce1-9350-5282c48770f8": "How can organizations ensure the quality of data in sensitive domains?", "7dee64d8-bf12-4366-bc43-ff71821a2047": "What are the consequences of using flawed or inaccurate data in decision-making?", "79cbd8a2-e147-44bc-8a55-26401ebfb951": "Why is it important to conduct regular, independent audits of data?", "5841722f-bf15-4fbd-a76a-b321b179aec4": "What measures can be taken to maintain accurate, timely, and complete data?", "6b8892ae-acb4-4abd-9d0e-befbaa39382f": "How should entities handle the burden of reviewing and correcting data?", "d7804551-0ff7-4e12-b264-7be2a008bed1": "What are the best practices for limiting access to sensitive data?", "f7d942c1-1e8f-484b-8edf-c8d0a64caf8b": "Why should sensitive data and derived data not be sold?", "42a9d92b-e27b-472c-ad56-07cb1140ffd9": "What governance procedures are necessary for human subject experimentation ethics?", "480733dd-d93f-4c4b-9b40-56e5910e831f": "How can organizations prevent adverse consequences from decision-making based on inaccurate data?", "7798df83-4529-4317-b89d-746485eb64a4": "What is the purpose of the yearlong process led by the OSTP?", "f695f50d-54d0-49c4-be89-203b99be0e61": "How did the OSTP gather input from people across the country?", "0daa74c8-7975-4a0e-ad33-5c760795c2d8": "What types of stakeholders were involved in the OSTP's process?", "28c42deb-d5d5-4709-b15d-3cea81950b3f": "What are some potential harms of algorithmic and data-driven technologies discussed?", "ae24e00b-3f03-4260-b4ed-5e6848c7864b": "How did public listening sessions contribute to the Blueprint for an AI Bill of Rights?", "8b794925-1544-465c-82ec-bc7f37298137": "What role did the Center for American Progress play in the panel discussions?", "605617f7-69f2-410c-b50a-c0974457693e": "How were impacted communities involved in the OSTP's process?", "47c40993-468f-4792-b50a-d2624c30ed04": "What is the Blueprint for an AI Bill of Rights?", "8f2a4098-0fb5-4199-b811-3a63eacf1485": "How did the OSTP ensure the process was inclusive of various experts and policymakers?", "ebef13ba-6679-4da6-92e5-0cf132673dba": "What were some of the promises of algorithmic and data-driven technologies mentioned?", "bc196094-f147-4147-8ab1-25cf7cad041b": "What are the key components of effective change-management controls?", "aa3c17a6-1a44-48e0-9bac-245822879aee": "How can businesses ensure data provenance in their commercial operations?", "d4eb8817-0f37-4caa-ab0c-ed5583f18564": "What are the best practices for implementing change-management controls in a commercial setting?", "74a83c47-6ea7-4e21-9325-9cd0a9b29316": "Why is data provenance important for commercial use?", "40cace51-c6f7-4263-909a-934539ab4313": "How do change-management controls impact data integrity?", "104aa783-0d34-44c5-bf81-967d2c43daf8": "What tools are available for tracking data provenance in commercial applications?", "e1f816cd-f3d5-4510-b7af-29babd74b1d9": "How can change-management controls help in regulatory compliance for businesses?", "561ce82a-df07-4979-adaa-2450c3b8fcda": "What challenges do companies face in maintaining data provenance?", "8868798f-7d64-4e60-bc77-56725a2a1c37": "How can change-management controls be integrated into existing business processes?", "8474f531-52b9-49b1-96e3-7e64a855cafe": "What are the benefits of ensuring data provenance for commercial enterprises?", "2f0ad5b7-bd5d-4662-a86c-d0ad96f67935": "What is the DeepNude app and how does it work?", "6a01a7c9-235a-4a09-9bd5-e38c1dbc4b94": "Why is the DeepNude app considered horrifying?", "b8db359d-0588-4011-aae6-c6838c31805d": "What are the ethical concerns surrounding the use of the DeepNude app?", "754f8572-6872-48c8-a9c5-c998b8091f62": "How has the public reacted to the release of the DeepNude app?", "eeb0bfdc-2e3d-4d88-b02e-9c4f33d462a8": "What measures have been taken to address the issues caused by the DeepNude app?", "5412af4a-850c-44fb-9945-95686cb9ad6a": "How do Amazon\u2019s AI cameras monitor drivers?", "6351f3cd-667a-4aad-857f-81df7b601da0": "What kind of mistakes are Amazon\u2019s AI cameras punishing drivers for?", "8dbba1cb-269d-4957-b4fd-308f00b91882": "What are the implications of AI cameras punishing drivers for mistakes they didn\u2019t make?", "fcbbdd00-85b9-4396-9b7a-5de417c1179f": "How have Amazon drivers responded to the AI camera system?", "4d05c32c-5866-4426-a745-2d2c554a5691": "What steps can be taken to improve the accuracy of AI cameras used by Amazon?", "7f590c18-47a2-438e-977a-cdd098e7fa86": "What are participatory engagement methods in product development?", "edde2af3-d243-4ef8-869b-bbc0626bc609": "How can focus groups with experts be used in AI development?", "541450fd-838a-4b58-94cc-20e3944691ea": "What is the role of small user studies in evaluating new products?", "b0e29ede-db9c-4382-943f-c21b4946bdb7": "How do anonymous surveys help in gauging reactions to specific features?", "e6832258-3b72-4cb6-a1d3-f906eb781da4": "Why are participatory engagement methods often used in the early stages of AI development?", "b6d68612-46b8-42cc-ab3e-31be5702199b": "What is the difference between field testing and participatory engagement methods?", "f46074c9-19da-4ec7-90c0-400d08cb34d4": "How can field testing simulate the conditions under which an AI system will be deployed?", "a8106443-688c-4550-a5fe-1c5ab81fcab9": "What are the benefits of using structured settings in field testing for AI systems?", "4b8e23f4-abf1-4143-93a4-47f53784794f": "How can field style tests be adapted to focus on AI risks and impacts?", "fb69db56-a88a-4b72-818e-8881601a2bc5": "What are the key differences between field testing and red teaming in AI development?", "b78a1120-785c-4e9b-adaa-d3f2d69f0561": "What initiatives has the Biden-Harris Administration taken to increase the number of Health Care Navigators?", "18726698-c2d1-4390-aa93-ba12c019bdec": "How has the number of Health Care Navigators changed ahead of the HealthCaregov Open Enrollment Period?", "05e386f4-de4f-4b24-911b-1719161ea196": "What are the key findings of McKinsey & Company's report on the state of customer care in 2022?", "3cd1a4cc-ca2b-4d1e-8ada-446a7c42cb20": "What customer service solutions are recommended for small businesses according to Business News Daily?", "182886ff-5412-4948-8295-701e0d7fbfe1": "How can small businesses improve their customer service based on Sara Angeles' article?", "37631ff1-592b-4472-94a4-2ce2caf8eafc": "What are the benefits of co-intelligence between robots and humans in customer service, as discussed by Mike Hughes?", "75e3d9c3-d911-48df-9ddb-8914d28e9008": "How effective are bots in customer service according to the Forbes article by Mike Hughes?", "421b5545-cea3-4524-bdc8-d3a22c30dd6c": "What strategies can businesses use to get the best out of their bots in customer service?", "83379563-52c0-4b59-b40b-f4418017f011": "What are the latest trends in customer care as reported by McKinsey & Company in 2022?", "d76b947b-8f88-4163-9e86-05a0d2e86981": "How has the Biden-Harris Administration's approach to Health Care Navigators impacted the HealthCaregov Open Enrollment Period?", "9bd4e2e2-cd2d-4535-9dce-679178b1e43c": "How can we reduce the environmental impacts of AI models during inference time?", "d3ba2ee8-7ef9-41ad-92b7-b27c7adbe4b0": "What are the challenges in estimating the environmental impacts of Generative AI (GAI)?", "787e31c9-98ed-4d18-a73c-6e891f3e92a6": "How do AI systems perpetuate harmful biases?", "0649769f-3bca-4cfa-8515-d227e06e7fe9": "What are some examples of biases in text-to-image models?", "83843f77-efa5-4c8e-b8ea-95ff293e2900": "How can AI systems be made more accountable and transparent?", "94bc029d-f508-4768-a427-507ea45dfe8e": "What steps can be taken to ensure AI systems are safe?", "679f0e14-0fda-4866-baa6-90cbd9892af0": "How do biases in AI systems affect different demographic groups?", "93f909c5-8ab0-445e-893d-16ef7d118607": "What is the impact of harmful biases on society when using AI systems?", "571ae548-9f61-4e1e-95a1-4357dbb1c8b8": "How can we address the underrepresentation of women and racial minorities in AI-generated images?", "30e3bc0e-5f22-4216-a2c0-f27f861b5634": "What are the consequences of biased or stereotyped outputs from image generator models?", "1b6a2ed0-d374-4c90-9b2f-26802ca2cc85": "What are examples of sensitive domains that require enhanced data protections?", "6c6d9102-09bf-4244-b8ba-21686bf078c4": "How do sensitive domains impact human rights such as autonomy and dignity?", "397d1460-bd65-4980-8b60-2ff58fcfc82e": "Why is health considered a sensitive domain?", "bc39145c-d1dd-4e69-a545-04944b0249af": "What makes family planning and care a sensitive domain?", "c567b788-ba2a-471d-8a61-f8acc8154f67": "How does employment fall under the category of sensitive domains?", "29011969-35fb-4185-9b93-65a5945bf067": "Why is education considered a sensitive domain?", "5f790da9-449c-41e8-865a-7f51afe460fc": "What are the implications of criminal justice being a sensitive domain?", "cd10682a-f510-462e-b688-e6038e4d2166": "How is personal finance classified as a sensitive domain?", "20c5ca9a-d0a2-4fa0-b02f-0f7351890b70": "How do societal norms influence what is considered a sensitive domain?", "7d213d18-b9dc-4003-bf54-21ec8dfb8397": "What is the role of surveillance technology in sensitive domains?", "575386df-5852-4b96-98b2-146127539141": "What are the established security measures to assess vulnerabilities and threats in AI systems?", "f0b324e0-dd60-4f57-b879-e56ece38360e": "How can backdoors and compromised dependencies in AI systems be identified and mitigated?", "5d3ecf42-2ce1-468b-9dbf-e4bbc5707389": "What are the best practices for benchmarking AI system security and resilience?", "e4d68479-8a79-4216-bc1a-4c8b156f3b37": "How do industry standards for AI system security compare to state-of-the-art methods?", "fc9490b3-396e-4ac3-95ef-80d13f6cf544": "What methods are used to ensure the integrity and security of AI-generated content?", "1cd90900-c572-4975-b7b8-fc93f4189d8e": "How can data breaches and eavesdropping be prevented in AI systems?", "2e2511f7-776d-400f-99e8-22c70ecc04d5": "What are the common threats to AI system security, such as model theft or exposure of model weights?", "e3b81075-8ba7-49f1-a7d2-87168a99617e": "How can user satisfaction with AI-generated content be effectively measured?", "e5339170-f4f7-4d0f-851e-a4b684f4de56": "What are the implications of man-in-the-middle attacks on AI systems?", "db8ab762-0912-47d7-9d30-648164bab39b": "How can the security of AI inference and extraction processes be ensured?", "59c7ac21-d712-480d-b1f2-638dff0439e1": "What are the potential risks of using technology in social welfare systems as discussed by the panelists?", "00e72162-956b-4ed9-94b5-b0ce264a828b": "How can digital ID systems impact the efficiency and cost of social welfare programs?", "0dcfc118-6d07-45b7-9542-8c8fa5036354": "What concerns did the panelists raise about the burden on individuals interacting with new technology in social welfare?", "60fe80fd-12ab-4a19-acb4-511d6cade220": "How can feedback loops in technology systems reinforce inequality according to the panelists?", "6152c7f7-4267-40c0-a522-620e1574f605": "What are some methods suggested by the panelists to mitigate the harms caused by technology in social welfare?", "bc2942af-52bd-4fbb-816d-9db9e02d78c1": "Why is community input important in the design process of social welfare technologies?", "ba3309a2-8a2a-4ac9-a89a-5df5b997a37c": "What role does data collection play in the potential harm caused by social welfare technologies?", "8f11cb0a-3059-4f8b-991a-c534983d2ab8": "How can individuals opt out of technology systems in social welfare programs?", "18631367-2871-45d9-8b6f-049eee6e413e": "What are the benefits and drawbacks of using technology for fraud detection in social welfare?", "da3446ed-9014-4635-b576-0dc495e48111": "How can the implementation of technology in social welfare systems affect government agencies and the people they serve?", "bf7e5553-71b4-4912-8f36-d5596c343802": "What is the Blueprint for an AI Bill of Rights?", "99d4fab5-34b6-4be5-ae63-ed96a8f6f688": "How are federal agencies ensuring AI systems comply with the Executive Order?", "cee03924-6fe3-43d2-8378-250f3240ea48": "What are the key principles outlined in the Blueprint for an AI Bill of Rights?", "1ccab29f-bc4b-428c-98d7-f783de1b512b": "How does the National Highway Traffic Safety Administration ensure vehicle safety?", "e3ea9516-f177-4b9a-b7a2-f1e46892ec09": "What role do local rules play in the implementation of road safety measures?", "bc2b4942-0fd8-48fa-989a-4c49c46c7b96": "How can strong safety regulations enhance innovation in complex technologies?", "6c84c34b-2170-4b7d-b82c-331dd7539cbd": "What measures are in place to address harms caused by AI systems?", "278b5143-0278-4559-bf04-512ef1f0c323": "How are AI use case inventories being utilized by federal agencies?", "0059e842-db08-4e0a-a061-7d5f37511184": "What is the relationship between safety regulations and innovation in the automotive industry?", "ae4d086c-aee0-4107-8d11-6d98cd132c52": "How does the law and policy landscape for motor vehicles relate to AI systems?", "0f1efd9c-7fbd-4b7b-ab5b-c3e90282a9ce": "What is algorithmic discrimination and how does it affect individuals?", "067133f9-c096-431e-b340-aaafffcd7f18": "How can automated systems be designed to prevent inappropriate or irrelevant data use?", "f50ad4e5-8546-4e08-aa4a-2f9430c6ef48": "What steps can be taken to mitigate potential harms from automated systems?", "74155138-199c-4f03-8c74-36f550d07afc": "Why is independent evaluation and reporting important for automated systems?", "bc6e0508-7335-48f1-89e2-85a0b185e8d7": "How can the public access the results of evaluations of automated systems?", "8c0cd3e7-b416-4eef-9685-68b4a810756b": "What measures can be implemented to ensure equitable use of automated systems?", "90cd38de-1740-48c6-b5cd-21899eb63f8b": "How does algorithmic discrimination impact people based on their race or ethnicity?", "f5303ea3-19f1-4a4f-952a-803e65a5a0fa": "What are some examples of algorithmic discrimination in automated systems?", "4d896f9d-2d20-47a9-8054-3f5b528ef495": "How can organizations ensure that their automated systems do not contribute to unjustified different treatment?", "18fd587a-4be2-4840-9c67-9ea224d4de50": "What protections should be in place to prevent compounded harm from the reuse of data in automated systems?", "dfe37234-9ca3-43f7-a3e8-b86a80b04f3c": "What is the AI Bill of Rights?", "f23d3c7e-3ec7-4ff7-bdab-5cdac88803fa": "Why was the AI Bill of Rights created?", "702c8d56-ad6f-4de1-9926-285169f470d4": "How does the AI Bill of Rights aim to protect American citizens?", "be6e8191-35d3-4f3f-94a2-c509ba2c3e49": "What are the key principles outlined in the AI Bill of Rights?", "4f8e4872-d2dc-4de1-aea1-da76b4471020": "Who is responsible for enforcing the AI Bill of Rights?", "e614182a-3697-4fd6-9166-b61c28d345dc": "How will the AI Bill of Rights impact the development of automated systems?", "d01414e7-9f4e-4a8f-b650-88cbc28f03f1": "What are the potential benefits of the AI Bill of Rights for the American people?", "d6520c9d-85d3-4d22-81a2-22649cf66c30": "Are there any specific guidelines for companies developing AI under the AI Bill of Rights?", "ec9b0344-0489-4878-b603-f0e89be5311b": "How can individuals report violations of the AI Bill of Rights?", "85e83a32-66ea-4124-934e-cc197072ddea": "What role does the government play in the implementation of the AI Bill of Rights?", "00bb38cc-b363-4224-9cad-242db0bd67bb": "What are the applications of General Artificial Intelligence (GAI) in CBRN information management?", "a221d1ab-5fd6-45a4-b6d8-8b93d9ab4bdd": "How can AI be used to detect and prevent the spread of obscene, degrading, and abusive content online?", "12a024fb-ee6f-4e56-a00e-3f762d802ec5": "What are the key considerations for data privacy when deploying AI systems?", "857a98f9-c84c-4e60-a015-c7857dfc889e": "How can AI help in monitoring and preventing civil rights violations?", "77ca506b-f725-4298-bb8b-1192ff1727c0": "What tasks are involved in AI development and how do they differ from AI deployment?", "6ad116cd-414d-4fbe-9971-f3c0165700e9": "What governance and oversight mechanisms are necessary for responsible AI deployment?", "06c33b54-b7f9-4684-ae49-4ef790e2a2ee": "How can AI improve capabilities in handling Chemical, Biological, Radiological, and Nuclear (CBRN) threats?", "3af5e01d-6e1d-41c7-a864-f35d9f4c081a": "What are the ethical concerns related to AI in terms of degrading and abusive content?", "1e4703d7-50c1-48e9-9662-fd835aca738f": "How can AI be used to enhance data privacy protections?", "d84d75d8-f21b-48d5-87ba-40e65b40b8e5": "What roles do governance and oversight play in ensuring ethical AI development and deployment?", "dff03de3-cf16-47fe-8c62-7acc7396c8e5": "How is technology helping farmers grow food more efficiently?", "f5dd8a98-1cb1-46cc-9437-9e36b92e9027": "What role do computers play in predicting storm paths?", "4c8db1bc-307b-4041-a352-9f9af6cbb286": "How do algorithms identify diseases in patients?", "8ec278ab-326a-4b26-81cf-07a2748a5f1c": "In what ways is data revolutionizing global industries?", "8e131803-f72b-4edd-a60c-cdf1ae47f020": "How is American innovation redefining different parts of society?", "c4536521-f7e6-42da-876e-138c80d5af1d": "What are the potential benefits of these technological tools for society?", "28061b71-fa18-4a73-973b-595f5e9f23b5": "How is President Biden's administration addressing civil rights in the context of technological progress?", "6a32e6c5-5b4d-425c-9310-ac9e34058595": "What steps has the Federal government taken to root out inequity and embed fairness in decision-making processes?", "8b41d54a-0e4f-4063-9bfb-e5633ef01f3d": "How is the Biden administration advancing civil rights, equal opportunity, and racial justice in America?", "620c90fd-87a8-4508-aef6-49ce040c25b3": "What are the urgent challenges to democracy that President Biden has spoken about?", "b2771425-f693-4b11-8a2c-cd5ece2a9f39": "What are some examples of sensitive data that have changed over time due to societal norms?", "d5648e81-154d-4e7a-9f98-89e26af03143": "How do societal norms influence what is considered sensitive data?", "8c9a7763-5902-48de-9624-1fe4f06180aa": "Why is it important to understand that sensitive data can change over time?", "71023f86-db69-4922-aa49-0c7884cda337": "Can you provide historical examples of data that were once considered sensitive but are no longer viewed that way?", "95e33fee-d6c2-4676-8f91-f97b88f4e897": "How do organizations adapt to changes in what is considered sensitive data?", "c5122f36-0c06-4f80-9d69-d7b5b7ba4c0c": "What role does context play in determining the sensitivity of data?", "6eda9f1e-d41d-4951-aeeb-6e3163a690d8": "How can individuals stay informed about changes in what is considered sensitive data?", "1ee096ea-f4e1-48d5-8859-1d486e08313e": "Are there any legal implications when sensitive data definitions change over time?", "3908a945-dd75-4d68-b75a-c42acfd1c173": "How do cultural differences impact the perception of sensitive data?", "e20ddb14-9cac-4fc8-8013-cc39c4a8924f": "What are the challenges in managing sensitive data that evolves with societal norms?", "52b9675c-9516-452a-94a4-69f03f5c10d5": "What is a fallback and escalation system in the context of automated systems?", "f678bc09-26c6-49a9-838d-b7ed1c773949": "How can human consideration be proportionate to the impact of an automated system?", "56255088-9e23-47d6-b73f-3890da92fc7a": "Why is it important to have safeguards against human bias in fallback mechanisms?", "046fd2c8-285c-4ea1-b2dc-0acdba7f5f1b": "What are some examples of high-stakes decisions that might require greater human oversight in automated systems?", "7f889e3b-de8e-4bc4-895f-af886478d21f": "How can organizations ensure that their fallback mechanisms are accessible to all users?", "c66a77c5-9ed9-48c7-b414-54d06b37b5c4": "What types of training are necessary for staff involved in human consideration and fallback systems?", "14df2313-e73b-4475-9175-b15e327a4691": "How can the availability of human consideration be increased for automated systems with significant impacts?", "7442ff35-391c-4c27-821d-8246d671bdd3": "What are the potential consequences of not having an effective fallback and escalation system in place?", "6da33505-e013-4410-87b2-c06a8f9a986c": "How can the effectiveness of fallback mechanisms be tested?", "0c6a74d4-9976-4dac-82a0-85562c58e9fa": "What are some common challenges in implementing accessible fallback mechanisms for automated systems?", "90cdaeaa-2d23-47cc-9c62-a678caaff1fe": "What is the role of NIST in advancing AI technology?", "c94bb207-795e-4949-afb5-51060a4c898a": "How does NIST ensure AI is safe and trustworthy?", "aed91732-c782-4c41-b30d-74b4bb0bccdb": "What is the US AI Safety Institute established by NIST?", "9df72cbc-5cee-4e8b-a0f6-a71f2453c828": "How does NIST contribute to the 2023 Executive Order on AI?", "5fb78f30-b8ee-4a7c-9d4b-49a3d7203935": "What are the main goals of the AI Safety Institute Consortium?", "76bff3c9-e07b-42a2-a053-f2b1aaa03c51": "How long has NIST been working on AI research?", "aeb7622a-78ad-4d23-add9-376a60612c11": "What kind of standards does NIST develop for AI?", "11b4686b-199b-42c0-87ea-4cfdf61fc1a0": "How does NIST address privacy concerns in AI development?", "b80438a1-1067-4a5a-820c-4133f009d448": "What contributions did the NIST Generative AI Public Working Group make to the report?", "50466b56-2814-489e-a27c-db75ad0859de": "How does NIST ensure AI is fair and transparent?", "720b9aed-8f99-4d96-9c31-c592612cad56": "What constitutes sensitive data under the AI Bill of Rights?", "52379352-3058-4c02-8a14-bf94e6ff2793": "How is sensitive data defined in the context of AI technologies?", "a6730cb7-c308-49ef-976d-2cd8dae8fea7": "What types of data are considered sensitive for individuals who are not yet legal adults?", "eb718d42-c1f0-4bc4-b821-2f51d3d1c876": "How can sensitive data lead to meaningful harm such as identity theft?", "9d567b63-4cdc-4526-bc7c-9227afac30df": "What are some examples of sensitive domains mentioned in the AI Bill of Rights?", "c673db12-f99b-450f-b738-61159c6ee5c3": "How does the AI Bill of Rights address data related to criminal justice interactions?", "7d8746aa-a1a7-4dbc-bf5e-40f65e995b9f": "Why is biometric data considered sensitive under the AI Bill of Rights?", "449278d1-b673-4878-8c11-d1d5ab0d6db5": "What measures can be taken to protect sensitive data in AI applications?", "5969e8c6-02b2-4c2a-b739-bdc23cad38f9": "How does the AI Bill of Rights define the potential for data to cause financial harm?", "205446ad-e139-481b-81fb-2548db84a0e0": "What are the implications of handling sensitive data in AI systems for privacy protection?", "928e6923-bcf0-4580-ad02-7769964afe49": "What are the implications of digital surveillance in a post-Roe world?", "a1b627aa-a1ff-4a68-a3ac-2a726f36747d": "Why did the FTC sue Kochava for selling data that tracks people at sensitive locations?", "70fa19b9-7985-4eb6-9cc2-7bf86776c53a": "How does digital surveillance impact reproductive health clinics and places of worship?", "16562b7c-6b93-483f-a689-d28eab8e4aea": "What companies are being acquired by private equity firms that collect data on children?", "b86ef95b-cdcf-455f-bdc0-474aac5b35eb": "What are the concerns surrounding private equity firms collecting data on America's children?", "9aa09b13-c9c6-4729-8029-8b893a1772a7": "How does the collection of data on children by private equity firms affect privacy?", "c971ec0d-ff6d-4adc-8ce4-f31428e4b284": "What are the potential risks of data tracking at reproductive health clinics?", "85942b84-5c76-435a-b971-83296f24e8fc": "How does the FTC's lawsuit against Kochava highlight issues of data privacy?", "7a683ec1-c238-48c5-bf76-00845333806c": "What are the ethical considerations of collecting data at places of worship?", "aa558c0c-2ab3-40c8-bdd9-3daf1f4f43a0": "How does the job database classification of former Apple employees as 'associates' affect their career prospects?", "19703e97-9d93-49e6-864a-23847656346f": "What are the best practices for ensuring data privacy in AI systems?", "52e88558-d8cc-413e-80e0-9f094bf4270b": "How do you manage intellectual property when using AI models?", "6ad81596-3e02-481b-b7ac-73940d631df3": "What are the key components of AI governance and oversight?", "dd2e0e56-2211-4a81-9712-aecf2fda1a6b": "How can you ensure information integrity in AI applications?", "bcd77494-a31b-4fe9-b2c7-3876f1f5306e": "What are the different access modes for underlying AI models?", "83631b6a-fd3c-4582-973c-c108cbc54c76": "How do you handle sensitive data in AI projects?", "fa5423e6-cb1e-4043-af5e-e939741381e2": "What is the importance of value chain and component integration in AI?", "45fc2c2b-6bc0-4a8d-8731-dfa83c3ba355": "How do you configure AI systems to align with human-AI interaction guidelines?", "94cf27b3-d287-4e48-b4f0-1acdf891f42f": "What are the challenges in managing proprietary data in AI?", "47124446-7ae2-4444-8f9e-e86adddd76bc": "How do you oversee the tasks performed by AI actors?", "af389dfd-cca2-4851-9450-166e9fbd38d2": "What are the key technical and governance interventions needed to protect against the harms of new technologies?", "9bc603e1-c26c-4926-b91a-c8d4e1a57fbf": "How important is community input in the design and use of new technologies?", "be75402c-f043-4191-9c8b-7d5af25bef31": "Why is public reporting on crucial elements of technological systems necessary?", "0dc744a1-6026-46d6-aeb0-8af84f722ae7": "What are better notice and consent procedures, and why are they important for privacy?", "66f03050-aedc-47b1-aa15-51450e4329a2": "How can users opt-out of using certain technological systems and revert to a human process?", "9c5cf2e4-1467-4a23-8857-28214677eca8": "Why is it important to provide explanations of decisions made by technological systems?", "710fdf52-6834-4b9d-9ce6-a653d5cece1b": "What kind of training is necessary for the proper governance of new technologies?", "c505559b-8a65-4f47-80ef-b510d054137a": "How can we ensure that technological use cases are genuinely related to their goal tasks?", "b0c53b5c-f74e-4529-a8d6-a123ed691081": "Why is local validation important for the effectiveness of technological systems?", "86fad521-a1f8-4c03-9313-ef0a9cee5091": "What is the role of third-party audits in maintaining the accountability and validity of technological systems?", "55bec949-76bc-49c1-a3ae-5f874eedfddc": "What are the risks associated with the synthesis of CBRN materials?", "9cd11b1f-87d1-484b-aba4-b76a5cb30945": "How can confabulation in AI systems mislead users?", "9ee178ca-364a-4792-8ee5-68de0f17f7cc": "What measures can be taken to control the spread of dangerous, violent, or hateful content online?", "616332c3-0795-4741-9e22-e94ffa2fcb13": "How does the unauthorized use of personal data impact data privacy?", "d00c3c3b-c827-4205-bc58-f5520ba6e148": "What are the potential consequences of de-anonymization of biometric data?", "bf6e3576-bc85-4045-a9ec-7701f2ba852c": "How can access to CBRN information be restricted to prevent misuse?", "3a2a0084-eefa-406c-b6a6-ae09a47d2c23": "What are the challenges in detecting and preventing confabulation in AI-generated content?", "3139865a-00dd-4da3-9038-84cb5a1b8b12": "How can online platforms mitigate the risks of inciting or radicalizing content?", "ef18f0e4-616a-4bde-9199-8407daad074d": "What are the best practices for protecting sensitive health information from unauthorized disclosure?", "65c26694-76cc-42b2-9982-8baf476bbaed": "How can individuals protect their location data from being leaked or misused?", "ca38f0f2-707f-4776-8565-5a88ac901073": "What is confabulation in the context of GAI systems?", "dc4c667a-b953-456e-a31d-8b4221f41335": "How do confabulations differ from hallucinations or fabrications in GAI systems?", "c90a6481-11b9-4db8-b24d-cbb9f232a4a5": "Why do generative models like LLMs produce confabulations?", "f989e408-3f17-4129-8bd2-87ae2ceecc72": "Can confabulations occur in all types of GAI outputs and contexts?", "dac82b9b-8e84-414d-aafc-7f3764ca2b23": "How do statistical predictions in generative models lead to factually inaccurate outputs?", "df4dfdd7-6c4c-4dde-b6dd-5123571b1254": "What are some examples of confabulations in GAI systems?", "5a88e70b-4815-451a-bc8f-e1606c9f23e7": "How can confabulations affect the reliability of GAI-generated content?", "9882e344-3c67-494a-b083-c0b2ae59a9df": "What measures can be taken to reduce confabulations in GAI systems?", "26c3c033-6002-4d01-8f46-96bad11d3572": "How do confabulations impact the consistency of GAI-generated statements?", "6536996f-b790-440e-afc7-66774db4a2e3": "Why is it important to understand the phenomenon of confabulation in GAI systems?", "f9e8bebc-884c-4775-95e1-78d70dc642b2": "What are the best practices for verifying information sharing and feedback mechanisms in AI systems?", "6a36fd5d-98db-42d5-b0d4-493641747d7b": "How can organizations ensure data privacy while sharing information about AI system impacts?", "d4f86701-19bc-43eb-9713-57eb57e073f6": "What steps should be taken to conduct an AI impact assessment effectively?", "ff6fe932-7482-44fc-bd67-812520e17bcf": "How can feedback from affected individuals and communities be integrated into AI governance?", "830c3554-63ea-4a61-a4f9-95e5c8297675": "What are the key components of an effective AI governance and oversight framework?", "621c0613-588a-4422-951a-45a7ed78fca5": "How can organizations prioritize feedback from external stakeholders regarding AI risks?", "df860556-2e58-4780-972c-1293c0231372": "What resources are necessary for effective outreach and feedback processes in AI system development?", "9c78e9c5-3af3-4520-a602-f9a45cebb1a3": "How should interactions with GAI systems be documented to ensure transparency?", "359d8ba9-c8b2-4d18-b5c2-9c0369390b86": "What are the potential risks of harmful bias and homogenization in AI systems?", "e1de377f-ddbf-4599-99e2-116dc45fac8e": "How can organizations address the issue of confabulation in human-AI configurations?", "e5df3265-2f97-4196-b75a-ab39e66e7b97": "What are some examples of time-critical systems where immediate human intervention is necessary?", "ae852f4b-1551-4734-b962-337bb0060682": "How do automated systems impact the criminal justice system?", "5ce6cbf8-e3c8-414e-8e92-59e44f212a1f": "What safeguards are necessary to prevent unfair outcomes in automated systems used in sensitive domains?", "9a8e63e5-0caa-4533-b223-17d6c3c56133": "Why is human oversight important in systems that use automation for pre-trial risk assessments and parole decisions?", "fee74500-d0b9-468f-a6c0-cbb66d324f73": "How can automated systems in healthcare lead to dangerous outcomes without proper safeguards?", "7e4ebd6f-c29f-4c5b-a9e6-c00489ace11f": "What are the potential risks of using automated systems in employment and education?", "cf2fab83-75d6-4fea-a72d-449833ab78e8": "How do existing human processes complement automated systems in providing public access to government benefits?", "bcb8ba55-d026-4851-a522-40e9b1e175af": "What are the benefits of having a building manager available when an automated card access system fails?", "f89691af-5a2e-4c6b-8894-fd6d9cd424b7": "In what ways can automated systems in sensitive domains be made more accurate and fair?", "6c7e2aa2-558c-4280-93b7-bf73de34e57b": "Why is it important to have fallback options when using automated systems in critical areas?", "9f5142e7-fda2-481b-a08d-fddf4197454e": "What are the main findings of Northcutt et al (2021) regarding label errors in test sets and their impact on machine learning benchmarks?", "0cdcb840-24f9-49b7-b4b6-bd409bb4d50a": "How does the OECD (2023) suggest advancing accountability in AI to manage risks throughout the AI lifecycle?", "4dfa9162-0bd0-4926-a27a-2fe9231160ed": "What are the key points discussed in the OECD (2024) paper on defining AI incidents and related terms?", "49ca8dea-a08f-410a-a643-8e37fc896455": "What information is provided in the GPT-4 System Card released by OpenAI in 2023?", "4636292e-8f3e-4711-a175-b28428d0eaa9": "What technical details are covered in the GPT-4 Technical Report by OpenAI (2024)?", "69456d83-d8c3-4d1c-bd31-704d2c934902": "According to Padmakumar et al (2024), how does writing with language models affect content diversity?", "d62ca080-832e-4f4d-960d-bf8bb0d1b97e": "What examples, risks, and potential solutions are surveyed in Park et al (2024) regarding AI deception?", "fb2ddd6a-239b-4b2f-a336-f921a876390c": "How do pervasive label errors destabilize machine learning benchmarks, as discussed by Northcutt et al (2021)?", "9208081d-3da9-46db-b27d-f25ed1c64ad2": "What governance strategies does the OECD (2023) recommend for ensuring trustworthy AI?", "edb639b7-e492-4442-a339-62b5e921ceb2": "What are the implications of AI deception as explored by Park et al (2024) in their survey?", "572c1b8f-43fc-46ab-ac02-ef9756b67234": "What is the importance of proof history in AI content management?", "5e70d1eb-366b-403f-b833-9bb92e6a6cc5": "How does version control contribute to transparency in AI systems?", "f9e5f377-fe4c-43e8-8cc5-f004e49964e9": "What methods can be used to ensure traceability in AI lifecycle management?", "be867fe3-bca3-4b2b-9a5e-471f230b333d": "Why is user testing crucial for verifying the adequacy of GAI system user instructions?", "4b9a0a17-252c-4972-9be3-1b4156f5b5ce": "What are the key components of Human-AI configuration in AI systems?", "0f22a8c0-7a87-4416-a640-3c2187b8aa3b": "What tasks are involved in AI deployment?", "338a84b7-78f1-442a-8e90-093c313eceb1": "How is AI impact assessment conducted?", "bd811679-d8f6-4568-8799-aa826cd0ca8d": "What roles do domain experts play in AI operation and monitoring?", "6015d9b2-454a-4af5-9a8e-ac87189a84e1": "What does TEVV stand for in the context of AI systems?", "dc4d23d4-5c52-47f4-b5b8-01c23fc3bff9": "How can robust version control systems improve information integrity in AI?", "a6399ec7-f330-4390-8da1-35f4821069f7": "What are the safety and efficacy purposes of notice and explanations in automated systems?", "ec418640-346c-4981-a095-cbed724bdd60": "Why is it important for the American public to know if an automated system is being used?", "7feb0289-a3ca-4a4b-9809-7ff2b8a6518f": "How can clear, brief, and understandable notice help achieve protections in the framework of automated systems?", "c7d1871b-b9ea-4a5f-9ab2-e5b06fe26a8c": "Why are the decision-making processes of automated systems often opaque and complex?", "1f235bf9-1d62-49c3-9f64-b74ff53e1c0c": "What challenges do explanations of automated system decisions present?", "f370e6a8-32c6-4260-8fa8-013612614ab1": "Why should explanations not be avoided in the context of automated systems?", "ee9515a6-b640-4034-98fb-4a5837748cf7": "What is the importance of clear and valid explanations in automated systems?", "745e45f4-bba9-45ec-a7de-e6ad0e0e47e1": "How can experts verify the reasonableness of a recommendation made by an automated system?", "a02fa5da-7bd9-48d0-ade1-35bcb7529e09": "What are the potential harms of not informing the public about the use of automated systems?", "4a54ea01-870a-4fe8-aa51-bbdd95af1a67": "Why should clear and valid explanations be considered a baseline requirement for automated systems?", "d9589a42-1bfd-4e7f-b849-f21901e4405c": "What are the key expectations for automated systems regarding data privacy?", "a2cf57d9-906a-4fa1-83ca-9bcc8e64edbd": "How can individuals access and correct their data collected by automated systems?", "6bb0aeee-f203-4ae1-bdb1-ef25d1fcd53a": "What steps should entities take before sharing data with other entities?", "168e18c4-5764-40f7-83a7-4648c98b69c9": "How can users know who has access to their data in automated systems?", "251640f5-543a-41f8-9cf2-21a40ea67aa2": "What is the process for withdrawing consent for data access in automated systems?", "c1e447ca-42dc-4355-a5b2-c55e9ace2bbf": "How should entities handle the deletion of user data upon consent withdrawal?", "2fd28c08-3fd3-41b6-927b-527d88dc0694": "What records should entities keep regarding shared data and its recipients?", "756d6e43-205c-48de-84fb-df3fe1ff1fd8": "How can users ensure their data is removed from machine learning models after consent withdrawal?", "fb40f206-d170-40e2-8c0d-6fed13736a04": "What legal limitations might affect the withdrawal of data access consent?", "ffc49df6-1959-4e1b-983e-d5d6e8ee184b": "What are the best practices for entities to follow when developing technical standards for data privacy in automated systems?", "4570505c-0e36-451c-a22f-787893a90d09": "How can patients ensure their medical data from CPAP machines is not shared with insurance companies without their consent?", "6218a6ac-9d82-4ee1-92b9-bcd6637a0981": "What are the ethical implications of using predictive analytics to target advertisements based on sensitive personal data?", "5a330f85-885f-4b40-85e8-c3a6dca75ffc": "How can schools balance the need for safety with students' privacy when using audio surveillance systems?", "129f0f97-98ba-42e8-9d21-f3d2c6917470": "What measures can be taken to protect students' privacy during online proctoring exams?", "0b4f9884-918b-4031-a687-d99338d8456c": "Are there any regulations in place to prevent insurance companies from using medical device data to deny coverage?", "6e60a744-5a8f-4a68-97f1-ddbd13855330": "How can consumers protect their personal data from being used for targeted advertising without their knowledge?", "d4c7738c-fc98-4fc6-b879-f6dc0a273084": "What are the potential risks of using predictive analytics in retail for both consumers and businesses?", "3ed724ad-1946-407a-990c-be9a281312fc": "How effective are current data privacy laws in protecting sensitive information in educational settings?", "76c3b003-88f0-4704-84f6-839b2a2119c4": "What are the best practices for companies to follow when collecting and using sensitive consumer data?", "587362e8-2dd6-4f47-98cb-003f14dac0ab": "How can individuals be more aware of how their data is being used by various devices and services they interact with?", "b3192f95-ad30-4882-b2d8-fa1e9be2394a": "How does the curing process help voters with disabilities ensure their votes are counted?", "22645ff1-03b4-424e-a146-2bbf328e966b": "What steps are involved in the curing process for voters who have changed their names?", "e87363bb-640a-4feb-9d9f-9d2e0f866665": "Why is the curing process important for voters with shorter or hyphenated names?", "149c1365-2c5a-4e3c-9c87-1105b2746f03": "How can voters confirm their signatures during the curing process?", "13982a84-3a75-4f82-a35a-e52df15dc29c": "What are common voting mistakes that can be corrected through the curing process?", "e7d71aac-05de-4e78-b73e-39d585314e96": "Is the curing process a standard practice in all states across the country?", "77de8575-cb53-451b-8b8f-7da0b09fd6ec": "How do election officials assist voters in the curing process?", "b624cd05-c166-4243-91a7-4a3f693f185f": "What happens if a voter does not correct their voting mistakes during the curing process?", "68a8f208-c093-4f42-afcc-c1e71dc344bf": "Are there any specific challenges faced by voters with disabilities during the curing process?", "a001c1a3-207f-458e-8638-0dbbd1a23b20": "How can voters ensure their votes are counted if they have made a mistake on their ballot?", "be2fad5e-2033-4a8a-9741-2b83774c1ac9": "What are the risks associated with identity theft for minors?", "93c0ee03-f986-4d51-b9b3-8367e10d9256": "Why is data about minors considered sensitive even if it's not related to a sensitive domain?", "9e6f708d-f474-42bc-8052-4762c8d80510": "What types of data are considered sensitive for minors?", "ba8b12ee-5d56-421f-ace2-208edb8cb51b": "How can identity theft impact a minor's future?", "3f587118-82b2-499c-ae3a-e1ec3142c71a": "What are some examples of sensitive domains that require enhanced data protections?", "b29a4d65-c495-480a-89f0-fc4e91aa0c70": "How do sensitive domains affect human rights such as autonomy and dignity?", "4e5b85e2-a644-40e2-8abe-4c376884d3eb": "Why is public expectation important in determining sensitive domains?", "27cee14e-d18d-48ea-a59d-8e81fb9daa11": "What are the potential harms of not protecting data in sensitive domains?", "b3dd37e2-835e-4821-94fb-6bf7178aa938": "How does the framework define sensitive domains in relation to existing laws?", "1d89baef-c455-48c0-8ef3-307b96c366e3": "What measures can be taken to protect data in sensitive domains?", "aa7473ee-3668-4669-ae62-9f1a1516a53d": "What are the potential impacts of surveillance technologies on individual rights and opportunities?", "fac36b7d-de59-49ac-bb84-23feb28373e8": "How can one ensure that their data decisions are respected in the context of surveillance technologies?", "4e0354ea-fffe-4a01-a4f1-d51ae008059a": "Why should surveillance technologies be avoided in education and housing?", "0fc325e8-7e09-4ea1-9db6-258a0ae665f4": "What kind of reporting should be available to confirm data decisions in surveillance contexts?", "7d295303-fcad-4c6b-8c7b-f3d3081439ac": "How can surveillance technologies limit access to opportunities?", "96eff3ab-89f0-4b9d-a269-f0357278d6bd": "What measures can be taken to assess the impact of surveillance technologies on personal rights?", "2d48e1ac-0686-4e2e-bd95-e2db7f8c5339": "Are there any guidelines for the ethical use of surveillance technologies in the workplace?", "0b0edbb6-e73f-4cef-a8d2-76c2d7e8176c": "How does data privacy relate to the use of surveillance technologies in various contexts?", "d3db021a-8f8a-4113-b5cb-0ef5de176095": "What are the risks associated with the use of surveillance technologies in education?", "6c3c2809-c142-4336-94b6-0cf80dba8956": "How can individuals protect their data privacy against surveillance technologies?", "ed5fe850-efcd-40d3-a5d3-0cdc40a8a5d6": "How can equity assessments help improve the safety and efficacy of systems for LGBTQI+ persons?", "1aa205a1-c8ec-44b5-99e2-66b9acede8d5": "What are the best practices for collecting representative and robust data for persons with disabilities?", "107537bf-1e76-4d1e-ba37-84a3eb8872c7": "How can qualitative evaluations be integrated into the assessment of systems for older adults?", "ed6516af-d770-452e-88cb-cb49fe224a96": "What methods can be used to ensure data is free from bias when assessing systems for persons living in rural areas?", "aaec1c72-545e-420c-83dd-44ee03eb5ac9": "How can persistent poverty and inequality be factored into the development of automated systems?", "4b3d37df-b2be-4662-b131-e87a2cfbd191": "What are the potential harms of using biased data in system development for marginalized communities?", "404568f3-40d8-42a1-a031-1c920e94bdb4": "How can we guard against the use of demographic proxies in automated systems?", "b41f2aca-4395-4b37-bfec-fdbe04578292": "What role does historical and societal context play in reviewing data for bias?", "14ac205f-14d8-45f2-b537-5aafa71096fe": "How can we ensure that data used in system assessments is sufficiently robust to identify biases?", "86ffb580-7422-420e-8dcc-d891924d573c": "What are the challenges in conducting equity assessments for diverse populations?", "7d0b283d-f144-4a82-b19e-c2112a913ed5": "How does data harvesting impact mental health?", "0fe16b30-1cf2-4712-a01d-4f6ebe321037": "What are data brokers and how do they profile communities?", "30bc10d0-919a-4251-8d8d-b540b171b181": "How can data harvesting affect democratic processes?", "86589cc8-2f3e-4292-a99e-3a491d7a3790": "What measures are companies taking to protect consumer privacy?", "7bf74331-98cb-4cc6-a850-92ab97ea0e1c": "How does data collection chill speech and protest?", "6a18c1c1-6ac2-497c-a1fe-11422ba30b35": "What legal protections govern federal government surveillance?", "0af459fc-739a-4dd4-8b24-8e56ff57fd4f": "Why is it important to minimize data collection?", "8d37a2d1-6bd5-4294-8e51-2cadcc1361ac": "How can improving security practices protect consumer privacy?", "d141a6e7-cd0a-4576-a702-58134cba4442": "What are the risks associated with data aggregation by data brokers?", "940504a7-7a40-4be4-be3c-175d09bb3ccb": "How does data harvesting breed distrust and anxiety?", "2c185373-e28c-400c-a25c-f72dfe3eaa57": "What are general fairness metrics in machine learning pipelines?", "35d3df9b-ca04-45d6-ba61-910781efea5a": "How can demographic parity be applied to business outcomes?", "9dc2b214-8912-4afb-9003-08f83e541c16": "What is the significance of equalized odds in ML fairness?", "a5eacbd0-3001-4167-8925-1156e278be54": "How do you measure the prevalence of denigration in generated content?", "fbb7532d-4e3e-41f8-8fa9-f7b5a02d5cf0": "What are some methods to identify harmful bias in GAI systems?", "a9a83f45-168b-4db5-ace9-45e7fc8c91b9": "How can custom, context-specific metrics be developed for ML fairness?", "3d684fd5-d832-42dc-b175-14f788a2e83f": "What is the role of domain experts in creating fairness metrics?", "fd5250fe-6121-425e-b4d1-c8e0bb203d19": "How can potentially impacted communities be engaged in assessing GAI systems?", "08d9cafd-06aa-44de-ba02-3e37b37a6b17": "What are the implications of harmful bias and homogenization in AI?", "98218ea7-de37-4779-8228-a2bbdb9ff990": "How can environmental ecosystems be affected by GAI systems?", "3a930566-71ec-465c-b726-c04b4278a904": "What are the key characteristics of trustworthy AI?", "f5324885-70fb-44aa-abcc-bacc277ed26a": "How does information integrity impact the trustworthiness of AI systems?", "48616ea8-c86b-4f86-aa5b-e94d1bf34068": "What does it mean for AI to be accountable and transparent?", "db5d6aab-79c3-433c-9530-afa6fd56678c": "Why is it important for AI to be explainable and interpretable?", "adb92956-0666-4e9c-83d6-139c568fedf1": "How can harmful bias in AI be managed to ensure fairness?", "00d0dc92-3f12-4a6f-97a5-9bfb57bdd801": "What measures can be taken to enhance privacy in AI systems?", "1391f61d-1d2c-486f-88ab-108403d31a1c": "What defines high-integrity information according to the 2022 White House Roadmap for Researchers?", "1b6fc2b6-eb9c-4f80-9435-aed7e4c8c00b": "How can the accuracy and reliability of information be verified and authenticated?", "b79e8099-38c5-4a4f-b636-f1054ae0ca4f": "What is the significance of having a clear chain of custody for information?", "3fdc8d07-1b55-425f-93f6-e66f1429df36": "How does acknowledging uncertainties contribute to information integrity?", "a9dc1f08-5014-4341-8489-8745d5cc3daa": "What are the best practices for logging and recording AI incidents?", "1b659988-353f-4357-8611-7249beebc92b": "How can change management records help in managing AI incidents?", "ddbf64e7-c5b6-434d-8d6e-31d1e5d33d28": "Why is version history important in AI incident management?", "4a4cbdcc-49b2-4fb2-8c24-812bca763c37": "What role does metadata play in the analysis of AI incidents?", "1c1c0ea6-3ed1-421c-a55f-e58d82db9618": "How can inconsistent access control affect the distribution of content through plugins?", "62ddbc5e-ccb4-4713-b294-20cbbd2eb010": "What are the benefits of regular information sharing among AI Actors?", "ffd63cbd-ea55-4aad-aeaa-0dbe6fa096c0": "How can insufficient access control be mitigated in plugin distribution?", "483b6c63-303b-4f23-8f34-5b22a4ec2765": "What documentation practices are essential for smoother information sharing in AI?", "ac189b5e-6349-44af-bf0f-702798289347": "How can AI Actors use change management records to respond to incidents?", "8a3d3981-24a8-498a-b509-25543fd6afeb": "What are the challenges of maintaining consistent access control in distributed plugin systems?", "638b3c99-e6cb-49bb-95c2-f267b2d1ec00": "What are the risks associated with the validity and reliability of GAI systems?", "f0977b5a-0de8-435b-bfee-e6a457db0442": "How do measurement gaps between laboratory and real-world settings affect GAI systems?", "d2628c21-64b0-4b61-a595-7097a4f233c5": "Why do current testing approaches for GAI systems often fail to assess real-world impacts?", "17c050f3-312d-46b8-b066-2bf66ab0142f": "What are the challenges in estimating the ecosystem-level risks of GAI?", "1116721c-2698-4938-a6bb-f96c2698380d": "How can prompt sensitivity and context heterogeneity exacerbate measurement gaps in GAI systems?", "68367977-e97f-4f35-a78a-63620dbd4fb8": "What is the role of structured public feedback in evaluating GAI systems?", "4770227b-6fd3-4a08-93e2-eac625aa3e2f": "How can structured public feedback help calibrate traditional measurement methods for GAI?", "a50d0a5a-b180-4209-b057-8a3ce7ca5c8a": "What are some examples of structured public feedback for GAI systems?", "e538cb20-92e5-427f-b9ac-cbe7f61c3654": "Why is it difficult to estimate the political, social, and economic impacts of GAI?", "108fa021-85ba-4c80-b094-bc316a5210da": "How can real-world conditions be better integrated into the testing of GAI systems?", "25bfeba9-9dba-40e4-ad97-8c839ca8c51a": "What methodologies can be used to evaluate biases in AI-generated content?", "67f472ad-fa27-4999-b17b-c75cccb0ef3b": "How can computational testing methods help identify stereotypes in AI outputs?", "f40897d1-e74b-4ae9-bed5-132e9360c38f": "What are some common biases that might emerge from AI-generated content?", "07c1cc8e-f86c-4899-82ed-bf9b470ddf20": "How can structured feedback input be used to assess AI content for harmful biases?", "e43daa73-3e5d-4c9e-a3ca-075dec799ed3": "What is the impact of homogenization in AI-generated content?", "ac6364d5-5041-446d-b5d7-e6d6fc9fa97b": "How can we mitigate harmful biases in AI systems?", "eae909c9-9200-428d-9d2d-0cf8ae39ea48": "What role does user feedback play in identifying stereotypes in AI content?", "e04d6574-6d9f-42a2-bf82-086109b4bfec": "Can computational testing methods alone ensure the integrity of AI-generated content?", "43545e6a-0aa6-4c7c-89f0-464c8c0cb1f9": "What are the challenges in evaluating potential biases in AI-generated content?", "9ad47d0f-1d88-4ffb-b427-4f8ecaeaee01": "How can we ensure that AI-generated content does not perpetuate harmful stereotypes?", "5612aea9-1a55-450a-830f-c05c88a34e6e": "What is AI red-teaming and how is it conducted?", "69417cf7-74ea-4fe6-bb4e-c4424621c4e4": "How can organizations collect feedback on AI model outcomes and user experience?", "85b1f1c5-fb0a-43ae-ab3f-703b8aa0663b": "What are the best practices for implementing feedback activities in AI systems?", "1d2c36f2-6923-4498-8504-c5c93c6eec30": "Why is informed consent important in AI research involving human subjects?", "4d3e7bb9-45c2-4918-ad20-9225ef78885c": "How does AI red-teaming help in identifying potential adverse behaviors in AI models?", "886bdf88-e7ed-48b2-8616-3b50743a28b8": "What are the human subject standards that organizations should follow in AI research?", "f6f13394-12e4-41df-8d73-8f8a59b625c8": "How can stress testing safeguards benefit AI models?", "7b479921-3a77-4f29-8406-2f7b03ab8878": "What is the role of subject compensation in AI research?", "c60ab7a5-60a1-49f6-b20a-5707d699cb8e": "How can AI red-teaming be performed in a controlled environment?", "32fe7223-3f84-4ef2-a178-0fba0a0e178f": "What are the potential risks and impacts of AI models in real-world interactions?", "19b3ef87-4631-4218-ba95-80b2c105535a": "What are the privacy concerns associated with social media monitoring?", "005c7c98-75a6-4242-878e-530c529e641f": "How do ankle monitoring devices impact individual privacy?", "1ba49c65-ac05-43c5-806b-21171820c4da": "What are the potential risks of using signature matching tools in voting systems?", "deebad53-75a3-40d9-83f0-b09ff89b0b35": "How do smart home systems collect and use personal data?", "04ad04d2-396e-4701-a6e9-2422c69accc7": "What are the privacy implications of systems that collect health-related data?", "d70da12d-584e-4e52-9eae-1f9e2f62e745": "How do education-related data systems impact student privacy?", "56387c3a-2259-48da-88f8-d5890f89f39d": "What are the concerns with using criminal justice system data for big data analytics?", "857b6f51-d048-46ae-85a7-5495bb30553f": "How do ad-targeting systems use personal information to build profiles?", "8ae7d54f-19dc-4a4f-9065-c5993f18db14": "What is algorithmic discrimination and how can it be prevented?", "fe8e6119-c018-4ce9-9b76-272740890ecc": "How do algorithms that detect student cheating or plagiarism work?", "b1a35db2-e2c3-411a-9942-84f2ce3db112": "What is the AI Risk Management Framework by NIST?", "985b4d2d-1090-4510-b623-7cd70b25fb56": "How does the NIST AI Risk Management Framework address AI risks and trustworthiness?", "a0eb8337-f777-4726-a13b-d7ec625951a6": "What are the key characteristics of AI risks according to NIST's AI Risk Management Framework?", "6c03ed54-6ab0-4045-a251-0dce83ca395f": "What are AI RMF Profiles as described by NIST?", "402b5f7a-b09f-487b-b5a9-72eced264252": "How can organizations use the AI RMF Profiles to manage AI risks?", "18dc0b62-513e-4205-8429-d0f22c15a613": "What tasks are described for AI actors in Appendix A of the NIST AI Risk Management Framework?", "8ce49ea6-adba-418b-a59c-9007b6ae81da": "How does NIST categorize different AI actors in their Risk Management Framework?", "f8ab2a45-69cd-4dc5-a52f-d340a7e463c6": "What are some common AI attacks and their mitigations according to NIST?", "5e9092a5-7669-45cc-af06-639af0388ab2": "How does the NIST AI Risk Management Framework help in improving AI system trustworthiness?", "d829fb79-fb10-4f92-b38b-e155bb3fcee3": "Where can I find detailed descriptions of AI actor tasks in the NIST AI Risk Management Framework?", "a023b48b-2c54-40ef-8767-5d3f03fe2914": "What are the key policies needed to oversee AI systems effectively?", "33fa9547-975a-4352-8f53-81d66f44c49f": "How can independent evaluations improve the oversight of GAI systems?", "a6fa8d04-3c9b-457d-88fd-dfa23ce40ff3": "What types of risks are associated with GAI systems that require robust evaluations?", "8f6d5636-40eb-47a8-ad69-b87dfebea48d": "How should organizational roles be adjusted across the lifecycle stages of large GAI systems?", "a71268a9-4141-4a0e-b1fa-0076d05cd42e": "What is the importance of test and evaluation in the development of GAI systems?", "691fbe00-89ad-498d-8d41-323cf1e97661": "How can harmful bias and homogenization be mitigated in GAI systems?", "e6e14601-db3d-4f7d-8676-d4eab8ecb25a": "What are the best practices for GAI content moderation?", "7068ff06-d301-4011-b487-7cfba94a4861": "How can increased accessibility of GAI tools and interfaces impact their oversight?", "e8dab0e4-d104-4378-a736-39d0227294b1": "What are the critical components of incident response and containment for GAI systems?", "aca5d4a8-7b84-4056-b0e6-e04d36ece68b": "How can information security be maintained in human-AI configurations?", "6897739c-d427-406f-ad1d-d7c4c77294d3": "What are the ethical concerns associated with text-to-image models?", "e0dacf35-3db5-49c4-9766-2c3dad84baab": "How can text-to-image models be misused to promote dangerous or violent messages?", "226859d7-3332-4379-8494-f26272702d7d": "What are the risks of GAI systems producing content that recommends self-harm or illegal activities?", "b791d661-0b16-4057-b391-7d89660c8a6d": "How do current systems attempt to restrict harmful outputs from GAI models?", "18041e17-7026-4c7d-9458-03b95bed2260": "What is \"jailbreaking\" in the context of GAI systems?", "efafd5fa-5e44-473a-89e5-972ae57c28f2": "How can \"jailbreaking\" be used to circumvent output controls in GAI models?", "f6f5b288-0e56-4759-a22e-70b60f145993": "What are the limitations of GAI systems in terms of data privacy and information security?", "06185446-c806-4fde-a2bc-435e67f172e3": "How can GAI systems be harmful in the context of CBRN information or capabilities?", "e23e338c-f249-4c47-9177-bde54d129a27": "What measures can be taken to prevent GAI systems from producing obscene or abusive content?", "20366931-36fc-4932-be26-4a2236da5849": "Why is it important to study the potential harmful effects of GAI systems on mental health disclosures?", "c02e5bf5-5f98-4e9a-9951-b476de779a36": "What are the best practices for applying organizational risk tolerances to third-party GAI resources?", "67fb8dc5-8f12-4f4c-b3dc-891c8219e312": "How can organizations effectively assess personnel credentials and qualifications for GAI projects?", "6df4dda4-63e2-45ab-82e3-2ad196f97ad3": "What are the key steps in performing background checks for individuals involved in GAI development?", "1626e1c6-eaaf-458a-9d62-6539ba4af917": "How can organizations filter GAI input and outputs to mitigate risks?", "ade6ed4e-ae4a-4354-9696-9be41db683dc": "What is retrieval-augmented generation, and how does it apply to GAI risk management?", "c37cf334-7c3f-4151-88b8-baf4569164a2": "How should organizations reassess risk measurements after fine-tuning third-party GAI models?", "8ccf5159-8cbc-4786-9c65-58c3df77213f": "What are the common risks associated with the GAI system value chain?", "91601426-b8bf-4362-b7fe-360c419ef972": "How can data poisoning affect GAI systems, and what measures can be taken to prevent it?", "822d55ee-6b63-4714-a957-a43dc8d843c9": "What are the implications of data privacy and localization compliance in GAI systems?", "284bee81-fb81-49a5-bbe0-49ef74483c20": "How can organizations ensure geopolitical alignment when integrating third-party GAI resources?", "bfa377f7-0ab2-4134-b646-98d6866d752d": "What are the main priorities in information integrity research and development?", "bd0492b6-4b03-4c9c-af31-313a235c4c93": "How does information integrity impact cybersecurity measures?", "8eebfbca-8240-4861-bd05-6a53ad7ccd8f": "What are the latest advancements in information integrity research?", "3ceb3870-78e8-4ec0-9491-241fccb93ec5": "Why is information integrity crucial for data security?", "7d63dee3-6d48-4393-8be6-8480ce6ced6d": "What role does artificial intelligence play in information integrity?", "e027c23e-9be3-40d9-a43f-99b9cc85df42": "How can organizations improve their information integrity practices?", "eaf96d9f-b112-43f1-ac2a-15c56c9e2ed8": "What are the challenges faced in information integrity research?", "4752b74b-3b45-4293-84a6-9129151862be": "How does blockchain technology contribute to information integrity?", "c98a9050-6d52-4601-8554-821c0659bcb8": "What are the best practices for maintaining information integrity in databases?", "015b7ed6-dfc9-419c-b332-8d22138cadfb": "How do regulatory standards influence information integrity research and development?", "b4881d3d-9b06-4fa0-94ca-6df2782ac2fd": "What are the minimum thresholds for performance or assurance criteria in deployment approval processes?", "c187cc72-ec40-4262-a0a8-dd0a7d8236a5": "How often should the reviewed processes and approval thresholds be updated to reflect GAI capabilities and risks?", "ad51c1b1-347d-4f10-b264-363ddcdfa938": "What is the significance of establishing a test plan and response policy before developing highly capable models?", "a7fc40f7-d119-4980-b911-ad106e77b51e": "How can one evaluate if a model may misuse CBRN information or capabilities?", "102600d4-12bd-4196-b867-7b5b9f746130": "What are the key components of a \"go/no-go\" policy in deployment approval?", "307c1ef5-e97b-48be-a89d-57c5db8c3e6b": "What procedures should be followed to ensure information security when dealing with CBRN information?", "761bbb97-b978-43a2-8f4c-50adc790fd0b": "How can confabulation in models be detected and mitigated during the deployment approval process?", "9e565cf7-9f25-43f9-9c04-55f723fcfde1": "What are the risks associated with dangerous, violent, or hateful content in highly capable models?", "b14dae2d-32f4-43d6-80c9-6f7752b5ddba": "What steps should be taken to periodically evaluate offensive cyber capabilities in models?", "b976da61-57a7-4e5f-a8f0-1328f4cd25f4": "How can one ensure that the test plan and response policy are effective in preventing misuse of CBRN information?", "a21ab356-0089-4dbf-b788-2b90e85ee801": "How do remote proctoring AI systems impact students with disabilities?", "b444448c-39c6-4825-a428-c35b6541fd7a": "What are the concerns of the National Disabled Law Students Association regarding AI in remote proctoring?", "af11b4d9-49c2-4c1e-a752-6ee9983d2405": "How do healthcare algorithms contribute to racial disparities in patient care?", "667c8aaf-0338-4557-83a6-11d3be7ef5b8": "Why do AI systems in healthcare assign lower scores to Black patients compared to white patients with similar conditions?", "51f1057f-cd68-4ea1-bf25-3d2e6c150aad": "What are the implications of using sociodemographic variables in clinical algorithms?", "efd5daa3-ad2f-403d-9faa-cfc0f273c6bc": "How can AI in healthcare be improved to avoid race-based health inequities?", "cb42a96f-6b88-4a1d-933c-4b66bf56803e": "What specific disability-specific access needs might cause AI proctoring systems to flag students as suspicious?", "54e478ee-901e-4bfd-b77b-ae6dbf060187": "How do clinical decision-making algorithms affect healthcare outcomes for different racial groups?", "0c29d394-6d79-42ea-ac56-98ef3e0c1ddd": "What steps can be taken to ensure AI systems do not discriminate against individuals with disabilities?", "334d816c-6309-49be-8b84-552c577f1ecc": "How do sociodemographic adjustments in healthcare algorithms impact patient treatment and outcomes?", "ef292182-a80e-4c2e-8112-92ec138b322a": "What mechanisms are typically used to supersede or deactivate AI systems that are not performing as intended?", "9a613a68-8a96-44f3-924a-fd86cb2bd642": "How can responsibilities be effectively assigned and understood for managing AI system deactivation?", "21861de8-59d7-4dbe-a656-594afc0c20c0": "What are the key components of a communication plan for informing stakeholders about AI system deactivation?", "1744f37c-51db-4c5a-b1a0-80edb5bd1d47": "Why is it important to inform AI stakeholders about the reasons for deactivating a specific GAI system?", "4bc70be6-98e2-4044-81b3-a337497b444d": "What are some common workarounds provided to users when an AI system is deactivated?", "73b8b746-f1dc-41ac-8aec-5465b68d6593": "How should user access be managed during the deactivation or disengagement of an AI system?", "55b0124a-dcc6-42f6-b033-337a237adf54": "What alternative processes can be implemented when an AI system is deactivated?", "96eddcb3-606d-4fcf-8ecb-1aabb6410965": "What contact information should be included in communication plans for AI system deactivation?", "7c0b2c60-6f69-4f22-bb40-b69c5ea6020d": "How can organizations ensure that open-source AI models are properly deactivated or disengaged?", "fc8a6a87-f230-4bb1-bcbc-b84d5e624924": "What are the risks associated with not having a proper deactivation plan for AI systems?", "586aeb54-40fd-4a75-a7c0-246e11eb3ae8": "What are the common causes of sensitive data leaks in organizations?", "aa626c2d-93f9-4ce6-a685-92c1a419dc4e": "How can companies ensure that their data sharing practices do not present a sensitive data risk?", "3e4a7bfc-a423-403b-aecb-603a13cbe16b": "What are the best practices for conducting ethical pre-reviews of data?", "dccc7390-abc6-409c-835a-9ebe4f7d0b1d": "How should organizations report the outcomes of their ethical pre-reviews?", "731906bd-9376-465c-885b-47262c0ac060": "What types of data are most commonly sold, shared, or made public by companies?", "a869d0fb-d027-4edc-be16-ca89dad5107d": "How can organizations assess whether their data sharing practices are ethical and safe?", "05fba6f9-2740-4b27-beb4-8b707e3fa913": "What ongoing risk identification and management procedures should companies implement?", "14a3553d-b4f0-4a82-82fd-f4ded8de7679": "How can companies mitigate risks associated with data sharing and public disclosure?", "53598710-70e3-4180-bfa6-20045b17b328": "What are the key components of a clear and machine-readable data reporting format?", "d156ee61-a192-4285-85eb-3e0f4cd4eb13": "How often should organizations update their risk management procedures to address new threats?", "6aceb768-3368-49cb-90f3-790b8d4131a3": "What are the main techniques used for provenance data tracking in digital content?", "13caf8a9-5882-4525-8431-f068b49ab01c": "How does digital watermarking help in tracking the authenticity of digital content?", "0a4c99ed-0f3b-4ec0-b9c8-91d7a35b593c": "What role does metadata recording play in provenance data tracking?", "7a7a8144-8fa6-4ca8-a505-9a5781f7850e": "Can digital fingerprinting be used to verify the integrity of synthetic content?", "cb3616bd-f4d8-4795-866d-04c8fe1a8b49": "How does human authentication contribute to provenance data tracking?", "77e9d110-209d-445e-8b11-16e0f2209022": "What is the importance of tracking the origin and history of data inputs in GAI systems?", "ad18f30e-051e-4a17-aa6a-1192c3cac7a8": "How can provenance data tracking assist AI actors who lack full visibility across the lifecycle?", "4d0345e3-6423-4930-96b7-564bf85f7af2": "What are the differences between overt and covert digital watermarks?", "af6f7cb4-a265-408b-a84b-4b3fee1fde06": "How does provenance data tracking help in protecting intellectual property rights?", "0718d3de-69b5-45f0-942f-79426b4d5ad4": "What are some potential manipulations that provenance data tracking can detect in digital content?", "3e3a23a7-0b1f-4b74-85bd-a73370b108e6": "What are the main findings of Zhang et al (2023) regarding human favoritism and AI aversion in persuasive content generation?", "c4cf1592-0435-4ae4-8a4c-c5ecb9257eae": "How do people perceive generative AI compared to human experts according to the study by Zhang et al (2023)?", "d6c51c91-05a7-402e-893e-5fc29584968b": "What is the significance of human-GAI collaboration in persuasive content generation as discussed by Zhang et al (2023)?", "e0587b4e-ddbf-4754-8557-bd12c8e644da": "Can you explain the concept of \"hallucination\" in large language models as surveyed by Zhang et al (2023)?", "2544321b-4f79-413c-9a51-2b0b5346a1b3": "What are the key points from the survey on hallucination in large language models by Zhang et al (2023)?", "9011cc3e-7c14-4371-99d2-06a06ec529e7": "How does the study by Zhao et al (2023) propose to implement robust watermarking for AI-generated text?", "0048257b-c29b-4594-829c-28fc43d6a999": "What are the benefits of provable robust watermarking in AI-generated text according to Zhao et al (2023)?", "99ba8f01-a9f5-4945-bc6b-2c290ee16f8f": "How does the research by Zhao et al (2023) contribute to the field of AI-generated content security?", "78f31d73-92bf-4caf-ade9-8bed953bdfa5": "What methods are suggested by Zhao et al (2023) for ensuring the robustness of watermarks in AI-generated text?", "33b17f33-82da-409e-8c46-2ba705142a99": "How do the findings of Zhang et al (2023) and Zhao et al (2023) complement each other in the context of AI-generated content?", "8d45f0a9-2470-406e-845a-42ae6faefaaf": "What is the NIST AI 600-1 publication about?", "e1b36541-9713-4537-8ae0-68c508ee31cb": "How does the NIST Trustworthy and Responsible AI framework address AI risks?", "9761ef9d-05ad-4eb6-84fe-a3e40e15721f": "Where can I access the NIST AI 600-1 document for free?", "6f912bc7-a00d-4201-a5ed-67ad675fb196": "What are the key components of the NIST Artificial Intelligence Risk Management Framework?", "d653daf1-bc71-4825-b8c2-d7a2bbbad861": "How does the Generative Artificial Intelligence Profile fit into the NIST AI 600-1 framework?", "c65c29ab-b699-4074-98c3-1d194961096b": "What are the main objectives of the NIST Trustworthy and Responsible AI guidelines?", "2a5dd66d-4d91-48e5-b4d1-0e97ead849bc": "How can organizations implement the NIST AI 600-1 framework in their AI projects?", "7ce28472-4d89-4da8-9e89-4fc46c2a13c5": "What are the benefits of using the NIST AI 600-1 framework for AI risk management?", "afa13ecd-3449-42b8-90ba-ea5b76fb4649": "Are there any case studies or examples included in the NIST AI 600-1 publication?", "83bfcfa0-0f58-42c0-b0fe-8d24efe51b48": "How does the NIST AI 600-1 framework ensure the ethical use of AI technologies?", "efd3986d-bd53-4b00-8759-234ee59b5935": "What is the new initiative announced by the Justice Department to combat redlining in 2021?", "b9552078-c814-4194-ad10-5170b3d76f76": "What are the key objectives of the PAVE Interagency Task Force on Property Appraisal and Valuation Equity?", "24d775f9-adea-4036-a91b-2b8dbdf09f8d": "How does the PAVE Action Plan aim to close the racial wealth gap?", "dbef7a7c-d59a-44a9-85d0-0922c437187c": "What are the main concerns addressed by the EEOC regarding the use of software, algorithms, and AI in assessing job applicants and employees?", "06d81d53-f1b8-45b1-9d99-aad6159cf2f1": "How does the Americans with Disabilities Act relate to the use of AI in hiring processes?", "3e1a2639-ad92-41c2-b64f-74852b3978d5": "What guidance has the US Department of Justice provided on algorithms, artificial intelligence, and disability discrimination in hiring?", "137541ed-d9cd-4d7e-b4eb-09e87ee778a6": "What are the potential risks of using AI and algorithms in employment decisions according to the EEOC?", "f54b5a57-e54a-4eb4-b5ea-3861f01c7a4a": "How does the PAVE Action Plan propose to address mis-valuations for families and communities of color?", "dc89246f-d70d-485b-a723-08770bd02f19": "What steps are being taken by the Justice Department to address redlining practices?", "9a719c6a-76c4-4af6-ae8c-1028bbe8568e": "How can employers ensure compliance with the ADA when using AI and algorithms in their hiring processes?", "2f7c682f-8e96-43da-8397-67ce42d16885": "What are the main concerns regarding the use of biometric technologies in the public sector?", "fdb90e56-c634-47ef-8f82-cf244064da4f": "How does the private sector utilize biometric technologies differently from the public sector?", "03bc26cf-d584-4f6c-952f-6da051e2ec27": "What were the key findings of the OSTP\u2019s Request for Information on biometric technologies?", "b36444b8-7e2e-4cc0-923b-d70acd084d36": "How does the National Artificial Intelligence Initiative Office contribute to the governance of biometric technologies?", "a8d11191-6908-46c0-9ccd-5526ac9ac777": "What are the potential privacy issues associated with biometric technologies?", "4e4d21bb-0a0d-49fd-948f-d1510ecdda24": "How can biometric technologies improve security in public and private sectors?", "4ba397c0-1b13-4613-9e30-01238dcdb761": "What are the ethical considerations in the deployment of biometric technologies?", "c38be416-9682-4d97-8adc-600dfa5d5218": "How do public opinions vary on the use of biometric technologies in different sectors?", "d8c53a02-255b-4261-813a-b50fa08cd969": "What are the recommendations from the Science and Technology Policy Institute regarding biometric technologies?", "7568d3e5-b407-4b82-a31a-2d7048871862": "How is the governance of biometric technologies evolving in response to public input?", "fe6be310-abb6-4d17-b332-42b573870741": "What are the key expectations for automated systems in terms of accessibility?", "4da20bc3-35b4-40d8-8699-3a01d413ac86": "How can organizations ensure that their automated systems are accessible to people with disabilities?", "e3b5fbce-4994-4bee-bfde-419e661a8a25": "What types of disabilities should be considered when designing automated systems?", "e6f6d4ff-5bc4-4809-aa55-4639adf8fbe5": "What are some relevant accessibility standards that should be adhered to during the development of automated systems?", "f4c81b62-7898-4380-bbe0-2e9ef2568424": "Why is user experience research important before and after deploying automated systems?", "1270cceb-5232-47d9-b785-280f19ce1fb4": "How can organizations identify and address accessibility barriers in automated systems?", "77d31311-acc9-4a0a-9ff7-8cff6cda43c8": "What is the importance of disparity assessment in automated systems?", "6409d026-b4de-4585-b70c-a6aa6203ecdb": "How should automated systems be tested to ensure they do not produce disparities?", "e6682ed3-e17b-47ae-9d07-f50e8f6c2df3": "What measures can be taken during pre-deployment testing to assess disparities in automated systems?", "13d62abf-9a46-4079-9a23-4ed18c3d22a9": "How can in-context deployment testing help in identifying disparities in automated systems?", "e4777246-3922-49ed-a2cb-5205495a2534": "What is the definition of equity in the context of fair treatment?", "0f7bdfbc-7ab6-4861-8efd-a3729e4128ad": "How does equity address the needs of underserved communities?", "3fbd4df7-eb9c-4760-afb0-2f341544e453": "Which groups are considered underserved communities in the context of equity?", "9861991b-cae5-4ecc-952d-0c2a6be10285": "How does equity ensure fair treatment for LGBTQI+ persons?", "4219fb8a-0ac8-4ecb-9d80-7ff321f4cd59": "What role does equity play in addressing systemic inequality?", "74b3d860-da7f-439b-8e61-5c69ac15c28b": "How are rural residents included in the concept of equity?", "bf920e1a-ff07-4d59-b892-8609aa91fdce": "What is meant by \"rights, opportunities, or access\" in this framework?", "19f1343a-292b-4bb5-8567-c39e272ec0ae": "How does equity relate to civil rights and civil liberties?", "8e6fc90c-607d-4e5f-8946-0f2b984a4975": "In what ways does equity impact older adults?", "e2f0625f-8931-45c4-b593-bb284f09ddd2": "How does the concept of equity address persistent poverty?", "7a5e1a08-397a-440e-8f6c-1af66ee702d0": "What are the key characteristics of trustworthy AI that should be integrated into organizational policies?", "75e53249-b463-44d5-83be-bdd902fc92ce": "How can organizations establish transparency policies for documenting the origin and history of training data in AI applications?", "aa76d60e-073a-408e-bf7f-44ee6a8d0a9b": "What are the risks associated with data privacy and information integrity in AI governance?", "66ee0108-3649-4abc-95cd-c102ba9c3451": "How can organizations balance the proprietary nature of training approaches with the need for digital content transparency?", "67c464c5-77f9-4875-8e31-8402a617f457": "What policies should be in place to evaluate the risk-relevant capabilities of AI before deployment?", "2b18ac77-f66e-449f-bb8c-641d6d6e522c": "How can organizations ensure the robustness of safety measures in AI applications through internal and external evaluations?", "a8055010-820e-4e2a-acbd-4363d93ffeef": "What are the specific risks related to CBRN information or capabilities in AI governance?", "b1c0e6a1-f07d-4e7e-a97c-2264522b8bcc": "How can organizations determine the needed level of risk management activities based on their risk tolerance?", "421c1f70-89d3-45a7-92c0-6b6fd7393f78": "What are the best practices for integrating trustworthy AI characteristics into organizational processes and procedures?", "41710f51-0c31-4835-a239-bba06e0b5003": "How can organizations manage intellectual property risks in the context of AI governance?", "e9ef61d9-acfb-4295-8166-81d2d8e29cd1": "What is the Department of Defense Responsible Artificial Intelligence Strategy and Implementation Pathway?", "63251280-da3b-4d49-9e3b-8b79726b8e55": "Where can I find the Department of Defense's AI strategy document released in June 2022?", "c739a52b-1410-4168-82eb-52163e1c9cc2": "What are the key principles of Artificial Intelligence ethics for the Intelligence Community according to the Director of National Intelligence?", "7da3dff9-04d3-4cea-814c-cd1c71e8f2fa": "How does the Department of Defense plan to implement responsible AI practices?", "70a71142-ccc1-46c3-85cb-f7e5573d1ea0": "What ethical guidelines has the Director of National Intelligence set for AI in the Intelligence Community?", "b1801b81-b269-4946-9f2f-f3bd71107763": "Can you provide a summary of the Department of Defense's AI strategy and implementation pathway?", "22b9c165-4460-449c-a296-6369c392e632": "What are the main objectives of the Department of Defense's AI strategy released in June 2022?", "f40a3247-588b-4f4a-8c27-0234b1af2a95": "How does the Intelligence Community ensure ethical use of AI according to the DNI's principles?", "55315bb2-f065-44ae-bc39-ffa0fe34eb65": "What are the challenges mentioned in the Department of Defense's AI strategy document?", "f2e63c22-7347-47c9-b0a7-ff7f363ad3c1": "How can I access the full text of the Department of Defense Responsible Artificial Intelligence Strategy and Implementation Pathway?", "9128749a-0d1d-42e5-94c3-9b820c40125b": "How does automated test proctoring software discriminate against disabled students?", "aab3924b-582c-4dc6-9118-49c1c8b51b5a": "What are the main findings of Ziad Obermeyer's study on racial bias in health management algorithms?", "aa7f061b-c839-40ea-ba44-f24f4ab55467": "What are some examples of discrimination faced by disabled students using automated test proctoring software?", "bd8aaa1f-1382-47e3-9ce1-09f9e7164ebc": "How can automated test proctoring software be improved to be more inclusive for disabled students?", "048678e4-9c45-4540-a0c6-72c404e2106b": "What impact does racial bias in health management algorithms have on patient care?", "51ba72f1-b32c-479c-820e-2d02252ecc21": "Are there any legal protections for disabled students against discrimination by automated test proctoring software?", "4ec83564-814d-4175-8f0f-704d3e58d2f7": "What methods were used in the study by Ziad Obermeyer to identify racial bias in health algorithms?", "3569ca2c-24e6-4785-ba6e-317a3d302202": "How prevalent is the issue of discrimination in automated test proctoring software?", "2869107a-ce0c-41b3-8508-c60d12c31fe7": "What are the ethical implications of using biased algorithms in healthcare management?", "cc253ba2-15d7-47dc-a233-8bc4a26cdedc": "What steps can educational institutions take to ensure fair testing conditions for disabled students using automated proctoring software?", "153cebaa-730a-43c5-99b7-10c18bec1538": "What are the best practices for managing risks associated with Generative AI (GAI)?", "dba1f4e2-98a6-4d42-b384-1a54e1d6ad1c": "How can organizations govern risks across various stages of the AI lifecycle?", "becc940f-e73e-4aa7-8581-f1ba6def41f0": "What are the common risks associated with the use of large language models (LLMs)?", "7a90fb5d-f437-4b59-9931-c0af0ec35339": "How can cross-sectoral profiles help in managing AI risks?", "43e9e772-adf1-40b7-9b1a-9fc44772e900": "What are some suggested actions for organizations to manage risks in AI?", "c2a5af10-b86f-4924-8010-b80c2782b006": "How does the AI RMF profile help in mapping and measuring AI risks?", "6e36882c-0b7c-4f22-a9d0-560ddc1859f5": "What are the novel risks introduced by Generative AI?", "7e0b3a69-208b-4140-8f56-b1041396d409": "How can cloud-based services impact AI risk management?", "7968a9ac-bfaf-4a59-bb35-1125136d6a96": "What are the risk management priorities for Generative AI?", "c942dcb0-ebf6-4dc8-aef1-d3b7642ef3c5": "How can organizations use AI RMF profiles to manage risks in business processes?", "aab11cf2-1200-420c-a291-040945c00aad": "What are the best techniques for managing statistical biases in GAI content provenance?", "96ade2c4-dc96-4d8d-ab36-a0860916d265": "How can re-sampling and re-weighting help in reducing biases in AI evaluations?", "1b1d4db6-e59f-4967-9a3b-17ad799ac4b4": "What is adversarial training and how does it mitigate biases in AI systems?", "ca0cdce9-6039-460a-8ebc-0d2da442b1a8": "How should content provenance data be documented to ensure privacy and security?", "0df51587-f84b-43eb-9c03-341d92892edd": "What are effective methods for anonymizing data to protect the privacy of human subjects in AI evaluations?", "add464c4-0e7d-4348-91dc-15a25c5a309d": "How can privacy output filters be leveraged to enhance data privacy in AI systems?", "36e32c02-9ee0-485c-8d4c-110273810e28": "What steps should be taken to remove personally identifiable information (PII) from AI datasets?", "877d24bb-418d-4075-b1e9-a626881ec675": "What are the risks associated with not managing statistical biases in AI content provenance?", "3da8d02e-d37f-4c4d-a06c-1f61edd78d4b": "How can human subjects withdraw their participation or revoke their consent in AI evaluations?", "841e4207-02f3-4f15-b3cc-0574eccf296b": "What are the potential harms of not protecting human subjects' privacy in AI evaluations?", "b4cfa32e-3647-4808-9718-9b77c8956ff5": "What is the importance of assessing notice clarity and timeliness in user notifications?", "34a1099f-5eb1-4cdb-bd14-0904a0d6883c": "How can the validity and accessibility of explanations be evaluated effectively?", "baf6bb09-9e41-48d9-b4c6-1d06d90b9bb2": "Why is it crucial to assess the level of risk in system impacts and inferences?", "fd7da839-a0e8-4f92-a7fd-2e894b6e5c04": "What are the best practices for tailoring explanations to different recipients and purposes?", "a81b08ef-f745-43dc-8405-02f77e2ebee0": "How can individualized profile information be made readily available to users?", "a3e89095-24b0-4e5b-957d-ac24b193a418": "What methods can be used to ensure that reporting is clear, plain, and machine-readable?", "bf278d53-8d4e-44d1-a215-6464076e0e89": "How does the assessment of notice clarity impact user trust and understanding?", "52b91d4f-d324-4333-8d00-e513e1af51b5": "What factors should be considered when evaluating the timeliness of notifications?", "e8955df1-dc4d-47af-b782-993b5b795595": "Why is it important to provide explanations for system impacts or inferences to users?", "5cbad06d-9274-443a-8465-7a7347fd1bb8": "How can organizations ensure that their explanations are tailored to the appropriate level of risk?", "098c6a18-502f-48ec-999e-13d995b28661": "What is the Blueprint for an AI Bill of Rights?", "699f9227-0a04-4b34-9fbb-bcdabe65806c": "How does the Blueprint for an AI Bill of Rights inform policy decisions?", "da24d51e-024a-422a-976c-cbe53754d0ff": "What is the role of the White House Office of Science and Technology Policy in the context of AI?", "d984a686-20d3-4998-bddb-d15ef2a55d67": "How does the national values statement and toolkit guide the responsible use of automated systems?", "7769d886-01e5-43d6-8808-a34ed6787c48": "What are the key principles and frameworks published by consortia for automated systems?", "3f2e20af-2d2f-40e2-9c9d-5f447f5fd470": "How does the framework address sector-specific privacy laws and oversight requirements?", "8cc369e6-5dbf-4195-bdc7-59d477935e01": "What kind of input has the White House Office of Science and Technology Policy sought from the public?", "2a846355-ce0a-4a42-bf39-c58e28255baf": "How are impacted communities and industry stakeholders involved in the process of addressing algorithmic harms?", "97341ca2-a8ed-46fd-8b73-27cf49a776db": "What are the potential remedies for algorithmic and data-driven harms discussed by the White House Office of Science and Technology Policy?", "ed70d285-bd85-4086-a63a-22c25a560082": "How can policymakers use the national values statement and toolkit in the technological design process?", "8c7fb32c-c935-4651-8283-e8c472a0b365": "What are the key civil rights and liberties protected under the Blueprint for an AI Bill of Rights?", "78c6ff01-8630-4cd4-a808-4a934eacb25f": "How does the Blueprint for an AI Bill of Rights address issues of unlawful surveillance?", "cd574726-80a1-47a9-b260-413ed3f52311": "What measures are suggested to ensure equitable access to education through automated systems?", "85722140-1b7b-46da-9ec6-432923b12175": "How does the Blueprint propose to protect individuals from discrimination in employment using AI?", "eded288b-f225-4e3b-be1d-6732eeceebb3": "What guidelines are provided for ensuring privacy in both public and private sector contexts?", "d91e1537-de8d-491c-b125-765de2f2afe8": "How does the Blueprint for an AI Bill of Rights ensure access to critical healthcare services?", "c91b6fc5-1d16-48e6-b88c-8dd1e3af6559": "What are the recommended practices for providing non-deceptive information about goods and services?", "3cd4fd6f-9208-4ceb-a69d-dc920993a98d": "How does the Blueprint address the issue of excessive punishment in the context of automated systems?", "e138b6b8-2968-4bab-8d4a-edca29460bcd": "What protections are in place for voting rights within the Blueprint for an AI Bill of Rights?", "1c59e241-7137-41cc-946d-c1cb0d30a4b1": "How does the Blueprint ensure fair access to financial services through automated systems?", "a4b6ef42-b7bd-444a-970f-c4708415a0ea": "What is NIST Dioptra and how is it used to evaluate GAI trustworthy characteristics?", "6b536f29-aa04-4434-b133-bb4e20ecd6f1": "How can data privacy be ensured when using AI systems in CBRN information or capabilities?", "bde91ad8-b00a-4c6b-ab35-cbc33641a8a4": "What are the risks associated with confabulation in AI systems?", "6fdb5ca1-7096-4613-ad70-ef413dcf51b2": "How can information integrity be maintained in AI deployments?", "5d29075f-46e0-4828-b712-657535007fca": "What measures can be taken to prevent harmful bias and homogenization in AI systems?", "3b68fd1d-60d7-4479-bc67-e72dc34b2baf": "What are the key tasks involved in AI deployment and TEVV (Test, Evaluation, Validation, and Verification)?", "b8bcfc18-dfb7-45f2-94fb-686ffb671400": "How can the limitations of generalizability of AI systems be documented effectively?", "448bc715-abc3-4d6f-a386-a2e6c48b434f": "Why is it important to avoid extrapolating GAI system performance from narrow assessments?", "35077bce-fc70-4f73-9e85-bd50ea0b4421": "How can human domain knowledge improve GAI system performance?", "b299ae9b-dd09-4132-a8d7-685ac966b912": "What are some methods to document the use of human domain knowledge in enhancing AI systems?", "26969f38-1ae0-4596-8d89-e2796ab42cc5": "What are the trade-offs involved in early-stage model decisions for AI systems?", "4fcf7347-858d-4761-95f8-19fb1af11339": "How does selecting a watermarking model for robustness impact computational complexity?", "589055f4-8d10-4b06-b68f-9cfd4048cefe": "What is the importance of tracking the provenance of training data in GAI systems?", "40defdf1-6880-44b7-a1ac-b88f466b074a": "How can documenting provenance data limitations benefit GAI systems?", "8f3e8e77-90af-4d0d-8dd3-5d5f2e614d74": "What are the cascading impacts of early-stage model decisions on downstream performance?", "ca4886da-af0a-420f-b881-1207c2a9181b": "Why is it important to manage organizational risk in enhancing content provenance?", "c13ec0d2-6f92-4b7d-8743-62c761213c6e": "How does prioritizing robustness in watermarking models affect other aspects of AI performance?", "b1ec710f-242e-4b53-a427-76970b24a311": "What methods can be used to track the provenance of metadata in GAI systems?", "edc582fd-2c53-4a88-ac44-3c229de7085a": "What are the potential risks of not documenting provenance data limitations in GAI systems?", "f9e0f746-0407-4024-882b-ca132aac8938": "How can organizations balance the trade-offs between robustness and computational complexity in AI models?", "547e953c-3c15-4ee0-b243-3c2761a19028": "What are the main civil rights concerns discussed in the Shared Statement Of Civil Rights Concerns document from July 30, 2018?", "8787fe19-eb36-4f63-8355-085d09e9c966": "What is the focus of Idaho Legislature's House Bill 118 passed on July 1, 2019?", "4558a005-edd2-4a8a-a3a1-96e8a91bdc99": "What are the key findings of the Executive Office of the President's report on Big Data and algorithmic systems from May 2016?", "905133de-f72a-42a8-9a2f-e194bee80d01": "What are the main arguments presented in Cathy O\u2019Neil's book \"Weapons of Math Destruction\"?", "0093d7ea-7e1a-4cad-a33f-26434d5e9417": "What is the central theme of Ruha Benjamin's book \"Race After Technology: Abolitionist Tools for the New Jim Code\"?", "d802150d-0458-44ad-94e6-d48a2bafddc7": "How has facial recognition technology led to wrongful arrests, as discussed by Kashmir Hill?", "3dec342d-89f1-48ea-b474-124dabac2778": "What are the potential civil rights implications of pretrial risk assessments?", "26e9fdf4-b265-44ac-aab5-a4811434f00b": "How does the use of big data in criminal justice impact civil rights, according to the 2016 report by the Executive Office of the President?", "e9a896b0-946f-4635-90a0-2abae8017e85": "What are some examples of algorithmic discrimination mentioned in the provided context?", "2a1a746c-d31f-4062-9339-f652ee1cd0fc": "How do the books \"Weapons of Math Destruction\" and \"Race After Technology\" address the issue of racial bias in technology?", "4adc70dc-e01b-4a8d-bd8c-adef4690717c": "What are the benefits of having a human fallback system in automated processes?", "81c46268-ad7f-45a4-ab44-b39eec645df2": "How can users with disabilities request reasonable accommodations in automated systems?", "6c21060a-4d83-46b3-a846-697b9a09c91b": "Why is it important to test automated systems for accessibility for users with disabilities?", "7753fc6c-a2dd-4e2f-9694-1ad7f0d6c64f": "What mechanisms can be implemented to ensure human fallback is not burdensome?", "ed7e713d-1382-464c-aaa9-eb64bdc88fbc": "How can companies ensure that their automated systems are accessible to all users?", "26951caa-8dbb-4149-81de-40d042c190ba": "What are some common issues users face with automated systems that require human assistance?", "19fd9fc0-5705-4c8f-9471-301741097255": "How can human consideration improve the user experience in automated systems?", "1d8d1efe-bee3-41c4-a9a1-549978df9821": "What steps can be taken to make human fallback mechanisms more convenient?", "c886eb12-d921-44b8-8452-f1f5bc1225f4": "How do automated systems typically handle requests for reasonable accommodations?", "0a84141f-d8b5-468a-a16b-93a9a0a47587": "What are the challenges in balancing automated systems with human fallback options?", "42804d52-5b54-4e4a-aa0b-0f295b8b73bb": "How can systems be tested to ensure they handle inappropriate or malicious queries effectively?", "beed6021-c77f-4dd5-b636-dddc90934522": "What are the best practices for evaluating AI system vulnerabilities regularly?", "7f734e3f-9eb5-4d60-99e6-c12b8c79fe06": "How can AI systems be protected from being used for extortion or targeted impersonation?", "b5c02363-613b-4083-a3a5-ae724917ecbb": "What methods can be used to prevent AI systems from facilitating cyber-attacks?", "84e252fa-dec3-4ec1-9b3d-a0e88f6a8b55": "How often should safety measures in AI systems be reviewed and updated?", "fd9556ae-448f-4d3d-af10-8089d6b043b8": "What role do domain experts play in the operation and monitoring of AI systems?", "e580a445-024f-4b81-a591-c79fa6f7fb0a": "How can AI deployment be managed to minimize the risk of illegal usage?", "ee7f5729-19f1-41d3-ba40-12390626207d": "What are the key components of an AI impact assessment?", "0b0819ad-858f-4cc2-9a1c-41f9c77d93d6": "How can TEVV (Test, Evaluation, Validation, and Verification) be applied to ensure AI system security?", "3850de5f-db60-43a0-94d4-63536424c707": "What strategies can be implemented to prevent the circumvention of safety measures in AI systems?", "dcec4fe7-764a-4c8a-b07f-90fcbb7708ba": "What are examples of time-critical systems in various industries?", "e9fb9f53-24c3-4408-8e9d-508409b7f92e": "How can organizations ensure that new decisions are effectively enacted in automated systems?", "1c6c655d-fa19-4fa2-8143-ea52a0a44611": "What safeguards can be put in place to prevent future errors in automated decision-making systems?", "97179ce5-9493-4f29-90be-01818f234c9c": "How do automated systems in healthcare impact patient safety and care?", "10be3d49-59a6-4675-8216-5d2a7bb76336": "What are the consequences of errors in automated systems that control financial penalties?", "1b29da2d-0fb6-41d6-8e7a-38493f5b169f": "How can voting-related systems be protected from errors and ensure accurate results?", "43d4dced-d40b-4a55-9481-6f383f7be02f": "What processes should be in place for human decision-makers to reassess and overrule automated decisions?", "5f442e2b-07cc-469f-ac6d-9e468c48364d": "How can automated building access systems be made more secure and reliable?", "ed225928-3594-4648-8270-ea357b99ac8f": "What are the best practices for maintaining human consideration and fallback processes in automated systems?", "2ac2ed73-c6e1-4af9-8a79-5c62a839798c": "How can organizations overturn previous repercussions from incorrect automated decisions?", "fb32bc70-21c5-4841-beea-62de5c884172": "What are the key components to include in a service level agreement (SLA) for GAI systems?", "a012d748-c92a-4b5c-ba2d-b54a3914756e": "How do you ensure content ownership and usage rights are clearly defined in contracts for GAI systems?", "37d2418c-90ce-43c2-809f-d6c0c96ef7c3": "What quality standards should be specified in SLAs for GAI systems?", "8af40417-015a-48e0-965b-fc636209e614": "How can security requirements be effectively integrated into contracts for GAI systems?", "805a7e12-3609-48b5-8320-157d4b583f8e": "What are the best practices for maintaining information integrity in GAI systems?", "baa6b25d-2b92-4536-9b88-465f65d6d2fe": "How do you address content provenance expectations in SLAs for GAI systems?", "4e4d7968-ecd4-4428-9b66-54567b3811a3": "What are the common challenges in drafting contracts for GAI systems?", "7e5eef6e-1818-4a3c-941b-7cbfd29ab0a4": "How can intellectual property rights be protected in GAI system agreements?", "4ed36e1b-43e7-48b4-a4cc-ef3087d2246b": "What role does information security play in the value chain of GAI systems?", "5d208543-8d35-4012-8c41-f13b2978eae6": "How do you ensure compliance with information integrity standards in GAI systems?", "a8dacfd0-ba17-40c9-b350-208d2e297cd2": "What are the best practices for conducting diligence on training data to assess intellectual property risks?", "32da3eaf-6181-4aab-a4f0-41e9f8e2c415": "How can AI actors ensure that the use of proprietary training data complies with applicable laws?", "f713140e-cb77-498a-b734-2e3226c38cfa": "What are the key considerations for assessing privacy risks in AI training data?", "5aa920d1-a55e-40d6-99a9-e31c968672cf": "How can organizations document the likelihood and magnitude of AI system impacts?", "3ebe14d9-c0f7-44b2-afb8-cd0da676e8be": "What methods can be used to gather feedback from external sources about AI system impacts?", "32b1ece3-14d1-4487-853e-c72b7d522734": "What are TEVV practices, and how do they apply to content provenance in AI systems?", "5dd34d24-f3ea-4aa7-b42b-0f26e197f095": "How can AI systems be probed for potential misuse or vulnerabilities in synthetic data generation?", "3f3496fe-0f67-405f-9bec-0181454b415d": "What are the governance and oversight tasks for AI actors in relation to training data use?", "98b6ca14-c6f1-4733-90a9-e8fcaac3e450": "How can past uses of AI systems inform the assessment of current AI system impacts?", "dd5071c9-0180-4916-b959-c6a07c56db03": "What are the risks associated with information integrity and security in AI systems?", "aa2070d5-b6bc-4073-a4cb-b2a83531da3c": "What is the role of the Office of Science and Technology Policy (OSTP) in coordinating science and technology policies?", "ca96d7d3-1320-4416-8cdd-7963833fa563": "How does the OSTP assist the Office of Management and Budget (OMB) with Federal research and development budgets?", "ab6fdd15-c2c9-4c64-9836-5410506b43a7": "What are the main topics covered by the OSTP in their policy coordination efforts?", "cc9ce0e0-cd3b-452e-97cd-67a557ba37e0": "What is the purpose of the Blueprint for an AI Bill of Rights published by the OSTP?", "31087be7-62d7-4c98-a630-dd1d81d1181b": "How does the Blueprint for an AI Bill of Rights aim to protect civil rights in the context of automated systems?", "8afd8443-7a29-410c-96b7-f41aea383947": "Is the Blueprint for an AI Bill of Rights considered US government policy?", "4a65f47c-1889-45a4-9ff3-a8bf32191dba": "What are the democratic values promoted by the Blueprint for an AI Bill of Rights in the governance of automated systems?", "8cda0b73-a4d4-4d29-9816-3f0cf0bbc8b4": "How does the OSTP provide scientific and technological analysis for the President?", "b25eb9c4-f4bf-4134-b0d3-e134b79ace2d": "What is the significance of the Blueprint for an AI Bill of Rights being non-binding?", "27b484ed-f229-4b08-be96-75c3abc5f8a3": "In what ways does the OSTP influence major policies, plans, and programs of the Federal Government?", "b3f70511-7f40-4e59-81c3-ea17760970fe": "What are the key characteristics of trustworthy AI?", "6541a0ad-b207-4b2d-a359-3650fafa8943": "How do energy and carbon emissions vary in GAI systems?", "669d0023-9a92-4a21-b449-8fa1a6af2b88": "What is the environmental impact of training a single transformer LLM?", "a31427f5-6815-40aa-9f6e-73e09d22a931": "How do generative tasks compare to discriminative tasks in terms of energy consumption and carbon emissions?", "7084c993-fcea-49d4-b9d7-2a857b9f45df": "What methods can be used to create smaller versions of trained AI models?", "e6cc306a-b275-43af-a0a7-799fe2f76eb9": "Why are generative tasks more energy- and carbon-intensive than non-generative tasks?", "f593dd60-a1e1-4ced-b812-c96907870b2a": "How does the hardware used affect the energy and carbon footprint of GAI systems?", "c8be6a16-64b0-4b54-98c7-079cb7ec7717": "What are the potential environmental impacts of maintaining and operating GAI systems?", "b5e8f4bf-d285-47ed-945d-af92d42d30ff": "How does the modality of content influence the energy consumption of GAI models?", "8e4c0306-cc08-4518-83d4-6f690dd17d67": "What is model distillation and how does it help in reducing the size of trained AI models?", "a380299e-40fa-430f-992f-328134b228ce": "What role do advisory boards play in ensuring the accountability of new technologies?", "7cfa0b20-7c5f-4732-bbfb-bb227472a8c9": "Why is transparency alone not sufficient to achieve accountability in technology development?", "fd5786c9-4268-4527-8e19-6afd150f1710": "How can compensated community input influence the design process of new technologies?", "2ce45131-027f-4fee-8260-1dc2b57ba04e": "What are some additional system needs for validity in technology development, according to panelists?", "8c04225d-b7a3-4ebc-825e-8b08770983d5": "Why is it important to include community input early in the design process of technology?", "e0ebe468-8026-4719-8e3c-8f244e4b01e9": "What types of regulations are necessary to limit the type and cost of new technologies?", "75212bde-5e1c-41e8-98c8-52a538a82b6a": "How can early community involvement impact the success of new technologies?", "e1c0318c-d858-4aed-b2c0-ef0e1203fda2": "What are the benefits of having advisory boards in the technology development process?", "a96ba846-68e3-499f-be1d-9a65c95f7103": "How can regulation help in achieving accountability in the use of new technologies?", "0ad0778a-9494-4e3e-af88-c4694c4eddcc": "What are the potential consequences of not including community input in the design process of technology?", "f974b90c-f825-4ac8-b640-a6316a1d595e": "What are the best practices for post-deployment AI system monitoring?", "1fbd890e-3037-4f08-8ca6-d2ccc5b997e6": "How can organizations effectively capture and evaluate input from AI system users?", "77cb5cc4-479c-46ed-b80f-f461753002f9": "What mechanisms are recommended for handling appeals and overrides in AI systems?", "6dba3c3f-8828-4ed8-a5aa-eacdf7a2c278": "What are the key considerations for decommissioning AI systems?", "d9669bfc-ca24-4606-a9da-8cdef4498029": "How should organizations prepare for incident response and recovery in AI systems?", "decf6dd1-9ab9-49ac-b195-232ac4b5b5fb": "What is the role of external researchers and industry experts in managing AI risks?", "e7207f21-6721-4ef3-9f8b-fcd88334e364": "How can harmful bias and homogenization be mitigated in AI systems?", "8db3af9c-f69b-43a8-8614-e16adacd3ea1": "What processes should be established for monitoring potential confabulation in AI systems?", "30fbacfb-b9b9-4404-99ca-aa7dd91fb39f": "How can sentiment analysis be used to gauge user sentiment regarding AI systems?", "491c9db9-eec0-45a7-8d35-3b865c6cf096": "What are the challenges in maintaining information security in post-deployment AI systems?", "d5096416-f388-46a8-ba7c-efe00591a79f": "What are some practical ways to reduce bias against Black patients in medical care?", "047f16f9-4bbb-46e2-bc04-02caae32fad3": "How does focusing on active chronic health conditions help reduce healthcare bias?", "cc1bd459-a505-4eb3-bb21-c7ab7b777125": "What are avoidable future costs related to emergency visits and hospitalization?", "6a4f1ce1-50e2-4a89-94f5-90f724c34e60": "What best practices have large employers developed to scrutinize hiring data and models?", "c758fef6-ab25-497e-8fcf-971551bff0b3": "What is the purpose of the Algorithmic Bias Safeguards for the Workforce initiative?", "a39fde86-c926-4df1-9cf1-2c15908c1429": "What specific technical questions are covered by the Algorithmic Bias Safeguards questionnaire?", "9c9c9015-c691-44e8-9284-f62ef5306243": "How can businesses proactively use the Algorithmic Bias Safeguards when procuring software?", "417326fd-a953-4bf5-a161-0e5892bb974e": "What are some biases that can be identified in the model training process?", "d89c4058-3ac5-421d-b581-879d16d5de44": "What mitigation steps can be employed to address biases in hiring algorithms?", "8e1c792b-4ced-4778-8949-6daa22e033fc": "How do standards organizations incorporate accessibility criteria into their guidelines?", "2ea244fd-8aca-4018-b8b0-223714fba699": "What are the key methods discussed in the Partnership on AI's glossary for synthetic media transparency?", "2fb245a9-6b49-454b-9ab8-d94912761aeb": "How does the paper \"Unsafe Diffusion\" address the generation of unsafe images and hateful memes from text-to-image models?", "dd48491b-a737-4616-be6a-745b00f5915b": "What strategies are proposed by Rafat et al (2023) to mitigate the carbon footprint in deep learning model compression?", "f027880e-a213-48a4-9139-9393e699642e": "What legal attitudes are explored in Said et al (2022) regarding the nonconsensual distribution of intimate images?", "c704d4cf-6b24-44ed-9113-aa42008d5f83": "How does the study by Sandbrink (2023) differentiate the risks of language models in the context of biological misuse?", "366bacdd-bb77-47f2-a39c-c7bf6169f8b7": "What are the main findings of Qu et al (2023) on the generation of unsafe images from text-to-image models?", "25533810-cb28-4c5b-9792-7183df9cc659": "How does the Partnership on AI suggest implementing indirect disclosure for synthetic media transparency?", "26e99d87-0a41-4952-ae1b-35a9302a5920": "What are the environmental implications of knowledge distillation in deep learning, according to Rafat et al (2023)?", "907ab49a-3d4c-4679-8038-f781b13ee780": "What role do legal attitudes play in the victimization and perpetration of nonconsensual distribution of intimate images, as discussed by Said et al (2022)?", "aaa30f81-e6c7-4103-8a63-152c74a2b091": "What are the potential risks associated with artificial intelligence in biological misuse, as highlighted by Sandbrink (2023)?", "b0182517-507f-402c-9d72-7b621f64e5b4": "What are the additional expectations for automated systems that handle sensitive data?", "1c9c675b-2d74-4673-9aa9-cb84ac14fa32": "How is sensitive data defined in the context of automated systems?", "6d42e83b-e788-4ab9-a002-cd545c1513d7": "What types of data are considered sensitive according to the provided context?", "b6530c27-37b3-4728-bac0-f9d4473dbdbf": "Why is it important for automated systems to meet additional expectations when dealing with sensitive data?", "9179505b-25f1-43ea-8329-1f120ce64c61": "How can sensitive data expose individuals to meaningful harm?", "d7d542fb-ce5a-4048-8f5f-b650b4c35bb2": "What are some examples of sensitive data mentioned in the context?", "e1052cc7-4c2d-41cb-92c3-998f3211584f": "How can automated systems infer sensitive data about an individual?", "f0f3d3f7-c4a4-4fb7-acfc-b992f475242a": "What are the potential risks associated with the misuse of sensitive data?", "235fe3e8-a203-480d-b7b7-9f411ea2d613": "How does the context define sensitive domains?", "46d01f66-a474-4e8e-ac51-c8d522ef006c": "What measures can be taken to protect sensitive data in automated systems?", "874107ea-6ed8-441f-968f-3704b981bf64": "What are the key capabilities and limitations of GAI systems in terms of digital content transparency?", "2cdd6080-bdc8-4e6c-b474-90b02b47b693": "How can training materials be developed to educate AI Actors and the public about the societal impacts of AI?", "a0fb147c-38c0-4fef-9b75-18e76cf8a420": "What role does diverse and inclusive content generation play in the context of AI systems?", "df1759f8-c9a0-4abf-9108-e0f81494dbaf": "How can feedback from operators, users, and impacted communities be effectively recorded and integrated?", "1cfd9941-237a-46a0-be9f-b60e2511126e": "What methods can be used to gather structured feedback about content provenance?", "4d85eb98-cd48-4fdc-80d4-2923f78551af": "How can user research studies, focus groups, or community forums be utilized to assess content quality and biases?", "3e96a9b6-2c8d-490f-906a-bf61de6087dd": "What are the best practices for seeking feedback on generated content quality and potential biases?", "55df2562-e98c-4baf-a911-341e5304f4a6": "How can the general awareness among end users and impacted communities about feedback channels be assessed?", "364d50e7-0d67-4aee-b2a4-4e278b9be1a9": "What are the implications of harmful bias and homogenization in AI-generated content?", "759c5df7-8c61-4805-b255-184f63b68e04": "How can AI deployment and monitoring be improved to address issues related to information integrity and harmful bias?", "cf41653e-3c18-45ed-a00a-19afbd790804": "What are the potential risks of insurers collecting data from social media for determining life insurance rates?", "8ae367c1-1ed9-4fe1-b0c5-25212e409675": "How can data breaches by data brokers lead to identity theft?", "624e6325-9549-4672-912d-2863775ecf64": "What are the privacy concerns associated with facial recognition systems in public housing authorities?", "c0e48c62-1775-4503-bc52-2b14d98033f4": "How does surveillance software used by companies to track employee discussions about union activity impact data privacy?", "8c95bd57-9819-4866-946c-34d2b7751cb5": "What measures can be taken to protect personal data from being harvested and exposed by data brokers?", "9134a063-6c7d-43f6-b9f4-d7e0712c9e59": "How does the use of facial recognition software by law enforcement affect community trust and privacy?", "afa24cd5-0d80-4e11-bb7f-28b1ef159c0d": "What are the ethical implications of insurers using social media data to determine insurance rates?", "07d3959c-fd15-441f-a064-d94b454936be": "How can individuals protect their personal data from being collected and misused by companies?", "accc5413-f9c8-492e-954c-db2935a83a8d": "What are the legal protections in place to prevent misuse of surveillance software in the workplace?", "154a4887-57d4-48b2-a0e2-f01ef4a05f25": "How can public housing authorities balance security needs with residents' privacy rights when using facial recognition technology?", "51d26025-f397-4282-ab4c-e614b1909136": "What are the key considerations when integrating third-party GAI models into an organization?", "e8ca0409-014b-43ca-aa66-18baf30c5856": "How can organizations manage the risks associated with using third-party GAI tools?", "618930f7-ea49-4631-8ec5-748399ab123e": "What are the implications of using third-party GAI systems for data privacy?", "0e830dc5-978e-40ef-b148-0701cdbac3f2": "How should organizations address intellectual property concerns with third-party GAI integrations?", "82ab0ec3-0073-41f1-a863-66c4ff3d8b4b": "What guidelines should be established for transparency in third-party GAI data usage?", "e774a66c-375b-45ad-8d72-28706054193e": "What risk controls are necessary for foundation models versus fine-tuned models in third-party GAI?", "babb4c10-950c-47c0-8a65-383a64edc068": "How can enhanced processes improve the management of third-party GAI tools?", "30032779-8c22-4bdf-9a98-a280bd457baa": "What are the legal implications of incorporating third-party GAI systems in an enterprise?", "490002ec-c8f2-49a0-aca4-451a75374463": "How can organizations ensure compliance when using third-party GAI-generated data?", "b9f8fe8e-7ff3-4431-89f5-73948788cb99": "What role does IT services play in managing third-party GAI integrations?", "787f8222-d352-49ea-b919-7db70989aa72": "What are the consequences of not providing explanations for errors?", "4172ceb7-f347-40ad-8c68-0fe2cc0a23e7": "How does the lack of explanation affect error correction?", "f4bfb069-4ab5-4b30-81a1-2ec30f5ec8ac": "Why is it important to explain errors when they occur?", "b419532f-ec57-4460-bf35-fcdb757ee380": "What are some methods to ensure timely error correction?", "a3239f78-3895-4866-83da-fa3a4f26ff43": "How can the absence of explanations impact overall productivity?", "a349e851-d625-49e2-a919-8040f988ec05": "What strategies can be implemented to improve error correction processes?", "055cba72-28db-40d2-99ce-d761f2ee85b1": "How does the lack of explanation for errors affect team communication?", "2bc860b5-65ed-47ff-800d-bace4aa01b70": "What are the best practices for documenting errors and their corrections?", "4b57ffb5-80b3-461f-a283-70e5cf3971bd": "How can organizations ensure that errors are corrected promptly?", "cbad517a-de7d-4da6-9786-47e6dd684d94": "What role does transparency play in error correction and prevention?", "2d9f919a-f792-4b1b-a10e-a0f578dfc7cf": "What are the main findings of Epstein et al (2023) in \"Art and the science of generative AI\"?", "476325e4-24b4-429b-9788-e84684fab8a1": "How does Feffer et al (2024) evaluate the effectiveness of red-teaming in generative AI?", "6d1dbac6-21e1-487b-b666-a788c3d485db": "What offensive security capabilities of large language models are discussed in Glazunov et al (2024) \"Project Naptime\"?", "58543296-0157-4a5a-9ddc-522f60ee6867": "What are the potential risks of indirect prompt injection in LLM-integrated applications according to Greshake et al (2023)?", "e9b7254b-b94e-4e18-a453-c58d8436079a": "How does Hagan (2024) propose to establish quality standards for AI legal help?", "6a69d169-7541-4d51-93a8-35fb4587ee8e": "What strategies does Haran (2023) suggest for securing LLM systems against prompt injection?", "ccca527c-b69c-4c41-b2ea-9aff9b44255f": "How does the study by Feffer et al (2024) contribute to the debate on whether red-teaming is a silver bullet or security theater?", "c66d08da-f096-41ae-8483-61507f48f6c0": "What are the implications of the findings in \"Not what you've signed up for\" by Greshake et al (2023) for real-world applications?", "a2e8cb0d-b35c-4690-bb95-38babd0775ce": "What methodologies were used in Glazunov et al (2024) to evaluate the offensive security capabilities of large language models?", "087fbc2e-973a-4823-936b-0d0243f5c688": "How does the research by Hagan (2024) differentiate between good and bad AI legal help?", "3bcb7050-a5e3-4025-86e9-b9c7a3eb2196": "What are the key responsibilities of AI Actors in monitoring reported issues in GAI systems?", "0bc4535d-2b67-4804-be77-c8734789e122": "How can AI Actors effectively evaluate GAI system performance using content provenance data tracking techniques?", "c73bd3d7-f752-4f5f-9676-e8acebd65d4c": "What steps should be taken to ensure prompt escalation of issues by AI Actors?", "fdd55fcd-d79b-4a87-ae51-09c717172f37": "What are the measurable activities for continual improvements in AI system updates?", "3102119a-0e38-44ee-bcfc-a58a411db0ef": "How often should regular engagement with interested parties, including relevant AI Actors, be conducted?", "7b74d871-b727-476b-99de-f23821860093": "What are the suggested actions for managing GAI risks related to harmful bias and homogenization?", "5ef4015c-16b3-4fc4-983b-5266130165bd": "How should regular monitoring of GAI systems be conducted and what should be included in the published reports?", "e587f1fa-cbd2-454a-85bb-44b757a0046f": "What are the best practices for following incident response plans for inappropriate or harmful content generation?", "48910454-45b0-4445-9366-f056ee60b60b": "How can processes be adapted based on findings from incident response plans in GAI systems?", "7c2d9a6a-5497-4fdd-a880-598d0303db6e": "What roles do human factors play in the operation and monitoring of AI systems?", "b252c530-ffef-4684-adb9-1fadc10df9a1": "What is a use-case based supplier risk assessment framework?", "0c235183-3b08-4ff7-9116-62f623af1175": "How can organizations monitor third-party entities' adherence to content provenance standards?", "3d779012-1e50-47b9-a393-b2536d277ca6": "What are the key components of value chain risk management?", "bb8eff08-42f2-4110-a840-121f230e4c81": "Why is it important to include clauses in contracts for evaluating third-party GAI processes?", "7dd59eab-597e-4402-bbde-5219259f1663": "How can organizations ensure information integrity when dealing with third-party entities?", "8a1a0e9b-c1d6-43a4-b808-6de57e66e46e": "What steps should be taken to inventory all third-party entities with access to organizational content?", "044efb34-2fe0-49fe-8893-7ccb84e34d86": "What are the benefits of establishing approved GAI technology and service provider lists?", "a3484e6b-9afe-4e3d-9b40-45c9b71a39f0": "How can maintaining records of changes to content by third parties promote content provenance?", "8fdd2306-5671-47b8-a6a4-613dcd55f9fd": "What types of metadata should be recorded to ensure content provenance?", "319e4f98-b5a8-4b4e-968d-98c42d92e7b2": "How does intellectual property relate to third-party content changes and provenance?", "76e21c77-5abd-4e59-8638-acbbb4e196f2": "What are the best practices for obtaining consent for the use of data in GAI applications?", "e92011ba-08e3-4f27-8a90-097f25c195ee": "How can anonymization help in protecting data privacy in AI applications?", "a127a266-08a2-4440-ad55-820b622a4116": "What is differential privacy and how does it enhance data security in AI systems?", "036f4f23-f219-4b3c-a996-f38ce4a3735b": "What are some privacy-enhancing technologies that can minimize risks in AI-generated content?", "b59f0589-8212-4bea-bd66-233cd0e150df": "How can AI developers ensure information integrity when using human data?", "4e38d0ae-2d12-48c0-b6ef-a1288551e7f3": "What are the key factors to consider in human-AI configuration for data privacy?", "b035b709-5421-4c16-9588-36f6df6dd376": "How should AI system performance be measured to ensure it meets deployment conditions?", "3e8e3d35-e9b4-4d82-8549-e0076fb93944": "What are the risks associated with linking AI-generated content back to individual human subjects?", "ac6ecaeb-d774-42e9-a706-23571e9ca244": "How can baseline model performance be used to improve AI systems with retrieval-augmented generation?", "642dbeb3-b3f9-425b-adf3-f3fd7101c7f2": "What methods can be used to empirically validate claims of AI model capabilities?", "41b113fc-3f56-4b6a-b606-bacc03b2a8b9": "What are the key differences between data privacy and intellectual property?", "95092336-d112-46e6-822a-88f81d722e72": "How can companies ensure data privacy while protecting their intellectual property?", "4b019b57-09a1-4397-af47-7cf29ee23a69": "What are the legal implications of data privacy breaches on intellectual property?", "1411f491-e75f-4111-a9e7-b927c26b8c3b": "How does GDPR impact intellectual property rights?", "7caa53ec-adf7-4bd5-b0d6-16e1ec9de7af": "What are some best practices for maintaining data privacy in intellectual property management?", "724b5a82-32f3-49fd-8271-505c3b2a5866": "Can intellectual property be compromised through data privacy violations?", "1bba92c8-2cf6-481c-a916-e2b90863ada9": "How do data privacy laws affect the sharing of intellectual property across borders?", "b57dc1d4-b29e-4d1f-81d7-93ab353d2990": "What role does encryption play in protecting both data privacy and intellectual property?", "241527a6-6383-42f6-80ad-d47448a4e5de": "How can businesses balance the need for data privacy with the need to share intellectual property for collaboration?", "03c92229-db55-4afa-8ac5-34de6b0a3b79": "What are the consequences of failing to protect data privacy in the context of intellectual property?", "abaa83aa-555a-4d21-acf1-7c73b0d057ff": "What is the risk-based pricing rule in lending?", "073ea355-2455-462d-8d7b-c26913cb9ef8": "How does the risk-based pricing rule affect borrowers?", "17d41936-ead2-475b-b785-6dd826930ae7": "What rights do consumers have if their credit application is denied?", "f99de0df-3a30-4c03-be26-e66bce9f385a": "What information must lenders provide to borrowers under the risk-based pricing rule?", "7b39da4e-33ab-41c7-826b-5d251d01cc39": "How does the CFPB protect consumers' rights regarding credit applications?", "4c661a4d-46b0-4361-881d-a2e3bfffc226": "What are the requirements for warehousing employers in California regarding quotas?", "f95da55e-afa4-49de-aabe-bcc697b0c48a": "How do algorithmic monitoring systems impact warehouse employees in California?", "7654615f-4130-42ba-ab22-d08da8a0d3b5": "What must California warehousing employers include in the written description of quotas?", "154ad3bc-8ed0-45e4-9156-62d7e04da73f": "Why is it important for certain decisions to be explained to consumers?", "c8c67888-5617-4df8-aa80-597113c355ee": "How does California law ensure transparency in quota systems for warehouse employees?", "e593b5e5-80a5-4368-8044-4401253e2242": "What are the unique risks associated with General Artificial Intelligence (GAI)?", "58567b4a-dad8-4564-bb4b-78ed4e066585": "How can organizations manage the risks posed by GAI?", "980286b9-57b1-41cb-be5b-1c92d2cade95": "What actions are suggested to mitigate GAI risks?", "c4dd04c4-3824-49be-bbb2-28e519e680e2": "What are the primary considerations for GAI mentioned in the appendix?", "710a2983-1bea-4763-b367-819eea4ef3bc": "Where can I find references related to GAI risks and management?", "91a4617d-ae27-46d6-967d-0120e9f36b4d": "What is covered in the introduction of the document on GAI risks?", "33034f48-184c-4594-80d2-8996aa2b9d20": "How does the document suggest handling risks that are exacerbated by GAI?", "fa471afa-5001-4d53-b1fc-23f57e65bb99": "What are some examples of risks unique to GAI?", "71a166e6-1296-4706-9677-80a0a0a51341": "What page contains the suggested actions to manage GAI risks?", "70bebbf1-bde6-4150-b4ef-a9a63f9f8a4c": "How comprehensive is the overview of GAI risks in the document?", "d01efaa2-b7e6-48c4-9117-00d808d80d03": "How can organizations ensure that notices and explanations are accessible to users with disabilities?", "c50f5c77-e898-4823-a5d9-6ead49445ebe": "What are the best practices for making notices available in multiple forms, such as on paper, physical signs, or online?", "7216a1fd-492e-4455-9b1c-87127423efe4": "Why is it important for notices and explanations to be available in multiple languages and reading levels?", "c4b916ed-6f69-42b4-a36d-b4b84b300ab8": "How should explanations be tailored to the specific purpose for which they are intended?", "e7b46646-126f-461b-8c4a-db9cd8cff6c2": "What are the key differences between an informational explanation and one provided for recourse or appeal?", "d67307ed-cd5b-4202-b68c-269b3cb7e195": "How can automated systems provide clear explanations for their decisions or actions?", "8185582a-dc07-4b2e-b832-9e3abf2e271b": "What steps can be taken to ensure that explanations are understandable and actionable by the intended audience?", "655c7548-ad98-400b-a65a-0d9b4aebe77d": "Why is it necessary to provide explanations in the context of a dispute or contestation process?", "8024511f-e7d3-4a95-83f6-e77cedb7f0f5": "How can organizations balance the need for detailed explanations with the need for simplicity and clarity?", "a6cf7580-b17b-496c-a7cf-7bdb4ad5cec8": "What are the challenges in making notices and explanations accessible to the American public, and how can they be addressed?", "1b8b06c4-65a8-4291-8125-da58b1a2fcf2": "What are the main flaws identified in the tool meant to help low-risk federal prisoners win early release?", "86c6a713-18f3-4788-94d7-798e37572f76": "How is the Justice Department working to curb racial bias in deciding who gets released from prison?", "3b3ac587-1908-4993-ad69-1d204707f0ba": "What were the key findings of the 2021 Review and Revalidation of the First Step Act Risk Assessment Tool by the National Institute of Justice?", "161b4640-9926-4d54-b332-3ae24fe928a1": "How does Google's Sentiment Analyzer exhibit bias against the LGBTQ+ community?", "5ef48cd2-e223-4cc4-935f-7b59b03953aa": "What are the implications of Google's Sentiment Analyzer thinking that being gay is bad?", "36ac78ac-c399-4cc2-bba8-b4c88049ba0b": "What is the Jigsaw Unintended Bias in Toxicity Classification project on Kaggle about?", "5e6dc05e-c94a-440c-badd-059d28a98ecf": "How does the First Step Act Risk Assessment Tool impact federal prisoners?", "b801b3ed-2645-4ab7-8eab-5f44c53f7cbf": "What steps are being taken to address the flaws in the tool for early release of low-risk federal prisoners?", "953c7a65-0054-4509-b437-2ee2f041e51e": "How significant is the issue of racial bias in the context of prison releases according to the NPR articles?", "48e496f1-8380-4006-9052-8e63ea4fdc38": "What are the potential consequences of bias in artificial intelligence tools like Google's Sentiment Analyzer?", "2bd65018-80f1-4a1e-8ff0-c03d11d2f9ac": "How can I opt-out of an automated system and what are the steps involved?", "4eafde78-6428-426b-85a5-fd83ddfc8a8e": "What are the criteria for assessing the clarity and accessibility of opt-out instructions?", "123f10a6-afad-4ad0-990c-17f252217093": "Are there any user experience research studies on the effectiveness of opt-out notices?", "f3cfe9a7-ea97-4243-a8c0-5cb436fb9198": "What are some examples of human alternatives provided when opting out of automated systems?", "3b9d6877-d127-4076-bbd6-390afed34038": "How quickly should a human alternative be provided after opting out of an automated system?", "f239aa99-3443-48c5-8df4-e7d753f4d1f7": "What makes an opt-out process unreasonably burdensome?", "b7ddcdb9-2b6d-4546-a92a-711d76916a7f": "How can organizations ensure that their opt-out instructions are easily findable?", "7baa6242-7aa9-410d-998c-d8d113ee3ed9": "What are the common challenges faced by users when opting out of automated systems?", "5bcd97f0-208e-48bf-b9c3-85ecfdd844d9": "How can the brevity of opt-out notices impact user decisions?", "ffaea519-7960-4f2b-ade8-290a2a8dfeee": "What are the best practices for providing timely human-driven alternatives in automated systems?", "7f2aa8e1-d759-4d16-835a-7d25726466be": "What is the main argument presented by Angela Chen in her article on The Verge about life insurance and online presence?", "5f1f09e0-afde-4833-8819-12492a28f526": "How might social media activity impact life insurance policies according to the 2019 article by Angela Chen?", "7e7ae934-b104-42e1-a4ec-88b2b1c55cd0": "What are the potential risks of using big data and algorithms in life insurance as discussed by Angela Chen?", "4c2801a4-a960-4bb9-bb30-91106cebe0b1": "How does Angela Chen suggest life insurance companies might use online records in the future?", "2bc6c92b-c94f-406c-97c3-94ff5221a4a7": "What are some concerns about discrimination in life insurance based on online presence mentioned in the article?", "f15e8ee8-6df9-4c38-a7a7-724b35d7266e": "How could life insurance companies benefit from analyzing social media data, according to Angela Chen?", "1a097e10-917a-47d2-bbd0-f888b755d76e": "What examples does Angela Chen provide to illustrate the impact of online presence on life insurance?", "83ce9f99-21b4-47f0-bf69-a1bdc6c6943f": "How does the use of big data in life insurance raise ethical questions, as per Angela Chen's article?", "c0058a46-7dfe-4578-a952-21be6f9e70dc": "What are the implications of Angela Chen's findings for consumers of life insurance?", "6d0329dc-668d-490c-8c24-42c4b1e1311b": "How might regulatory bodies respond to the use of online data in life insurance, based on Angela Chen's insights?", "2f8589f2-71e9-45f2-ae32-f28ec7bf2c4b": "What is the purpose of the technical companion in relation to automated systems?", "8cbfa2ab-0832-4346-ac20-86d72deba93e": "Who can benefit from using the technical companion as a reference?", "0424821d-48cd-42b3-a821-45f2d9a02ee4": "What are the three supplemental sections that accompany each principle in the technical companion?", "fc1f5d65-4b48-44ba-bbc9-d567cad9bf4e": "Why is the \"WHY THIS PRINCIPLE IS IMPORTANT\" section included in the technical companion?", "2bac89ba-56e9-4237-bbb9-2b5879e79287": "What kind of problems does the \"WHY THIS PRINCIPLE IS IMPORTANT\" section aim to address?", "dbd6b39e-eb46-4dcc-ae55-b3268513bb63": "What is the goal of the \"WHAT SHOULD BE EXPECTED OF AUTOMATED SYSTEMS\" section?", "2a6d8358-e27e-4c93-986f-95adb301ee63": "How can the expectations for automated systems serve as a blueprint for development?", "8cdabbb1-82d4-4201-914a-3a873fbcf68b": "What practical steps are outlined in the \"WHAT SHOULD BE EXPECTED OF AUTOMATED SYSTEMS\" section?", "95cd7988-3d70-4b9a-9079-383a78c28a45": "How do the expectations for automated systems mirror existing technology development practices?", "679bc28a-263c-454f-b2f4-3c5ccf1ae00f": "What is the vision of the Blueprint for an AI Bill of Rights?", "e4229b12-3425-4bac-9532-22a0fd43652e": "What are the key capabilities and competencies required for effective risk measurement and management in an enterprise?", "03a02bfa-6e55-4dd0-a51f-edce76b48834": "How can diverse demographic groups contribute to better risk management functions?", "825dd8bf-7c6c-4446-8011-c25d6f557389": "Why is it important to consider educational backgrounds in risk measurement and management?", "e2909c32-1244-4a0a-a3fd-cf8797be04ac": "How do lived experiences influence risk management practices?", "af541196-0d8c-497e-a398-c3c9253cfec4": "What role do different professions play in the risk management process?", "2855bf3c-9555-42a9-9e98-d7eda34003a7": "How can domain expertise enhance the effectiveness of risk measurement and management?", "5ac3f009-0665-4ce4-bcca-3c6faa028116": "What are the potential risks of harmful bias and homogenization in AI configurations?", "ba3a4a1d-711b-402c-bc07-9ec87c5389cb": "How can enterprises ensure that their data and benchmarks are representative of diverse user populations?", "a75d2170-8371-41de-9317-9b80e2823d28": "What are the best practices for involving diverse participants in structured GAI public feedback exercises?", "eefc16a2-a6f8-499e-a2f7-12e4df65614d": "What tasks are involved in AI deployment to mitigate harmful bias and ensure diverse representation?", "f5398e05-e48c-4721-b625-1d00761faddf": "What are the best practices for ensuring information integrity in data systems?", "7683e79a-d55d-446d-b33d-e51f78b017da": "How does human oversight contribute to the evaluation of information integrity?", "ed4ea430-7625-4ff5-96fb-d43600713d35": "What are some proven cryptographic techniques used to maintain information integrity?", "77d696c3-d291-4500-99d5-f940800f82f6": "How can automated evaluation methods help in maintaining information integrity?", "a3938f64-6ba3-4182-ad9a-f0a734f44349": "What role does the review of content inputs play in ensuring information integrity?", "65e0271e-8df4-4d79-b667-eb66dbe7884a": "Can you provide examples of automated tools used for evaluating information integrity?", "64ee0887-641a-423f-b769-1ceb31077cfc": "How effective is human oversight compared to automated evaluation in maintaining information integrity?", "8ca7525d-cf25-49cf-b7f2-3c8e0c68c8fd": "What are the challenges associated with using cryptographic techniques for information integrity?", "fbce740c-e2f8-4a6a-b5cb-b8e609d9628b": "How do organizations balance between human oversight and automated evaluation for information integrity?", "a19e1eab-0f2e-4afa-8fe7-df69b9bee656": "What are the key components of a robust information integrity evaluation framework?", "95c335f7-1eae-4090-bbd3-d200657a199b": "What are the implications of the data leak involving 235 million social media profiles exposed by a major data broker?", "d4722ec4-cde6-4b3f-a742-a10c5e340440": "How did the exposure of 12 billion records online occur, and what were the consequences?", "f313296f-4197-4b95-a34f-da79b135a5ab": "What are the main concerns surrounding the use of facial recognition technology in public housing?", "8a1416c4-b1bc-4eec-84af-787a472e11f5": "How have Amazon and Walmart used surveillance technology in their efforts to prevent unionization?", "c1dddd25-fdcc-449b-8e21-263bfadff302": "What enforcement actions has the FTC taken against the photo storage app Everalbaum?", "0ddce7bb-a5c7-4fa6-bea6-da3737420a35": "What measures can social media users take to protect their profiles from being scraped without permission?", "7acd2768-ac2c-4dbe-9c92-a27dcf7be867": "How has the public responded to the use of facial recognition technology in public housing?", "0c799549-781b-482b-9074-635d45590cea": "What are the potential privacy risks associated with large-scale data leaks like the one involving 12 billion records?", "24353569-a8b5-4fbb-b2d8-0e04fd061aa6": "In what ways have companies like Amazon and Walmart been accused of spying on their employees?", "cbda8aeb-bccf-46df-ba9f-12a9fc01b0b8": "What are the legal and ethical considerations of using surveillance technology to monitor union activities?", "1e6a21b9-e745-404b-be65-8c7b9e4b0bd7": "What are the key performance expectations for the system?", "a0c122d2-8188-4702-8b56-6d423c5f74d3": "How are human-run procedures integrated into the system?", "a2d4766b-5e37-4f46-adac-a62b1c427c78": "What types of data were used to train the machine learning models?", "1e2f5c68-7e0e-479e-a952-e3d1c6caf4f7": "How were the data sources processed and interpreted for the system?", "63d84cc6-9adb-40a1-896f-b2e6034c339b": "What steps are taken to identify and manage risks in the system?", "b66070c1-0ec6-46ae-9fab-b4445a76fc1c": "How does the organization address missing, incomplete, or erroneous data?", "fbe83be2-10ab-40ca-806f-d957f742ed90": "What concerns were raised during public consultation, and how were they addressed?", "24efaac2-edc5-4a7e-a8a9-2786e4c966e4": "What are the results of the performance testing in terms of accuracy and error rates?", "e9460513-d9f4-4ee8-a89e-9acdf8fdf716": "How does the system's performance compare to previously deployed systems?", "6fff7468-40e8-4590-9f72-615e77d43bc3": "What are the ongoing monitoring procedures and how frequently is performance tested?", "deabd138-adc2-44f5-98ee-322a39c17a98": "What are the best practices for re-evaluating risks when adapting GAI models to new domains?", "ee75ad83-a0d7-4713-99c1-7720e8e912b6": "How can warning systems be established to detect the use of GAI systems in new domains?", "39d5c426-28b0-44e6-9fff-8fb668122c5c": "What are the key risks to consider when adapting GAI models to new domains?", "70c28c2d-9d3b-4641-974e-a1804938ca0c": "How can one ensure that previous assumptions about security and safety hold in new domains for GAI systems?", "adf119f1-b069-4a65-87cd-ad53e5c43a5a": "What methods can be used to detect the presence of PII in generated output text?", "dd282118-49ce-47dd-87c2-d4156e944523": "How can sensitive data be identified in generated images, videos, or audio?", "d771683d-c686-4a52-81ee-292ea31f22d4": "What are the potential risks of harmful bias and homogenization in GAI models?", "f49bb512-05ef-4e2c-b6a6-091cbb905329": "How can GAI systems be protected from generating dangerous, violent, or hateful content?", "f863d5ef-78f1-4960-a14d-66a66caa16f6": "What strategies can be employed to ensure data privacy in GAI-generated outputs?", "828a7539-87cf-49c4-a17e-7be3ed25bfea": "How can intellectual property be safeguarded when using GAI models?", "56a2f1d9-fc30-46e6-9705-569c76ebb6c7": "What are the main ethical and social risks of harm from language models as discussed by Weidinger et al (2021)?", "ae85135f-051c-4806-95a0-2cfaeb1b3924": "How do trolls use AI to create fake images of celebrities like Taylor Swift, according to Weatherbed (2024)?", "6ee2f972-193a-4bfb-bd19-604bde142dc1": "What is the focus of the paper \"Long Form Factuality in Large Language Models\" by Wei et al (2024)?", "941d29d9-1e5b-4e48-add3-1024903e747a": "Can you explain the concept of \"Information Disorder\" as outlined by Wardle et al (2017)?", "cd19f434-9802-45cd-9417-bf530750bf85": "What are the key points in the \"Sociotechnical Safety Evaluation of Generative AI Systems\" by Weidinger et al (2023)?", "17234b23-05e3-4796-9357-c3255713355b": "How does the \"Taxonomy of Risks posed by Language Models\" by Weidinger et al (2022) categorize different risks?", "2d3d1d60-0258-4016-b2e7-21895ee3da0d": "What interdisciplinary framework for research and policy making is proposed by Wardle et al (2017) in their study on information disorder?", "b95decfd-0e22-427d-9a93-294412eab257": "What are the implications of the findings in \"Ethical and social risks of harm from Language Models\" by Weidinger et al (2021)?", "858d0487-9ef0-41bd-beb3-28e4bf4dbd52": "How does the paper by Wei et al (2024) address the issue of factuality in large language models?", "58dd02ef-48f3-4312-83e5-1fb54e25c2cc": "What are the recommendations for mitigating the risks posed by language models as discussed in Weidinger et al (2022)?", "2d3012f3-7feb-48d4-b54c-5107353c03d0": "What are the best practices for documenting AI model details, including data provenance and quality?", "93acef7c-f3cf-4bda-848d-c79f08fefdcb": "How can counterfactual prompts be used to explain machine learning models?", "efa2b789-a244-4680-af19-b891e4c72987": "What are gradient-based attributions, and how do they help in interpreting AI models?", "7173f456-fedc-440d-b22f-efa9cf4e85f1": "Why is it important to document the assumptions and limitations of an AI model?", "5d764367-0f8d-4efd-976f-e89b2c8f684c": "How does model compression or surrogate models contribute to AI model explanation?", "95643527-800b-404a-a62c-a3f7390fbdf9": "What are the ethical considerations to keep in mind when documenting AI models?", "694a90b5-31cd-4f46-b221-2bbccbf2ea0d": "How can occlusion or term reduction techniques be applied to explain AI models?", "0697ed1f-3d26-439c-9818-2971e3df5158": "What role do RLHF approaches play in the training of AI models?", "171d3b23-4f45-49d6-a317-a5fe6cf4016a": "How can organizations ensure the responsible use and governance of AI systems?", "dc38fdd2-c4f6-490f-a7e5-5c3751e542f2": "What are the potential risks of confabulation in AI models, and how can they be mitigated?", "13d44da0-2fef-4c2f-b4ff-19599f9b2afb": "What are the main issues that the principle of safe and effective systems aims to address?", "fe155026-d872-40e9-8736-9e9a69d08e1f": "How can reliance on unproven technology lead to problems?", "d4c4faa8-502a-4bf2-b182-7aa689ad6ae4": "What are some examples of technologies causing substantial and unjustified harm?", "46c0dbae-a959-405b-b3f9-8c2e83761656": "How can historical data negatively impact automated decision-making systems?", "116fa31d-f588-49de-8ed4-d15b3ba118e5": "What are the risks associated with using technology that has not been proven to work within an acceptable range of error?", "fc759a44-cbe0-404c-83b8-dcb5b364028c": "How can technologies be designed to violate the safety of others?", "4ee837f4-d5a5-4d90-a40a-019addf10b09": "What are some unintended harms that can result from the use of certain technologies?", "c824ae9c-741c-4730-a945-d591f13e0967": "Why is it important to ensure that technologies work as intended and as promised?", "472d7e59-379f-4fa7-9356-fe2608a2ee59": "How can irrelevant information from past decisions affect current decision-making in automated systems?", "079cadfe-b827-4d8b-8847-ce41fba6094c": "What measures can be taken to prevent technologies from causing unjustified harm?", "01e765c9-5aef-4c7c-bca4-d9b4b94e54fd": "What is the purpose of the Technical Companion in the context of developing technical standards and practices?", "33df19f9-df9a-4d75-b8cf-7b262bf4f8b3": "How does the Blueprint for an AI Bill of Rights relate to existing laws?", "c702da49-cb6a-498c-b6c2-a377e4973503": "What sectors and contexts should the technical standards and practices be tailored for?", "2f16d6ca-6f2d-4da2-8d77-9da96198f0aa": "How does the framework aim to impact rights, opportunities, or access through automated systems?", "c5ff5f27-e556-4207-8151-5519b2fe84a6": "Does the framework provide detailed analysis of existing laws?", "9ec597d8-9559-44a5-b175-db525d6f9e63": "What is the broad vision shared by the framework for automated system development and use?", "f6dcae70-8e0a-4f47-9c30-589ffa82d968": "How does the framework inform private and public involvement with automated systems?", "d6cc4e55-78e6-4d3b-9425-9f0e1ffa648c": "Does the framework take a position on legislative and regulatory proposals?", "7ac7defe-9d7c-4996-bda6-56a4fe59a5c9": "Are there examples of existing protective measures mentioned in the framework?", "bb7c4021-0d4e-4b15-b28e-1d9d6664c577": "What is the significance of not analyzing legislative and regulatory proposals in the framework?", "e1aec18d-e71a-4d28-be59-e5be3881d70e": "What are the key components of effective monitoring and governance structures for automated systems?", "b2ab71bb-0a72-4068-b1c1-505a308496ea": "How can unmet needs for change in automated systems be identified and addressed?", "eb859b33-b604-4d38-9b9c-36c1c453a82b": "What are the expectations for reporting by entities developing or using automated systems?", "057efbeb-09ad-4580-a430-acb50a9681a6": "Who should the resulting reports from automated systems be provided to?", "94f7d7a1-6947-4bd2-b4fa-6d8db3896c41": "Why is it important for reports on automated systems to be made public?", "c4bcd7fc-8a32-4295-a4f2-b6da221f7546": "What considerations might prevent the public release of reports on automated systems?", "4d3140c8-cffd-4c71-ab31-dfbc34b26f50": "How should information be handled when public reports on automated systems are not possible?", "7b4e0c55-fcda-4bcb-ab4a-e2333b46c568": "What role do oversight bodies and ethics officers play in safeguarding individuals' rights in the context of automated systems?", "fbd293d5-2f7d-46ba-8a9d-ba56d3e2690b": "Why is transparency important in the reporting of automated systems?", "82a4bddf-bde1-4da4-8597-af2b5f75319f": "How can the American people benefit from transparency in automated systems reporting?", "c8815a76-b3d3-4150-9fc2-ffeca9946282": "How do GAI systems contribute to the spread of misinformation?", "e6706517-19c4-47c4-9d33-e88aaa79be85": "What is the difference between misinformation and disinformation in the context of GAI systems?", "c1f9af22-5965-4be1-86a3-e4a301b6af2f": "How can subtle changes in text or images by GAI systems manipulate perception?", "551ffc98-e117-4c8c-aabd-84102ffaa8f7": "What are deepfakes and how are they related to GAI systems?", "5b9a4026-4170-4739-aa59-a82371bcde95": "How can GAI systems be used to target specific demographics with disinformation?", "3a57b342-f32d-4571-bf11-0fd968d2f12b": "What are the potential future threats posed by GAI models trained on new data modalities?", "bdc49d2f-f75f-409c-a019-6bd6e720673b": "How do multimodal models enhance the capabilities of GAI systems in generating disinformation?", "e354dc4e-3651-464a-85e7-a02d6e8c6fe5": "What measures can be taken to mitigate the risks of GAI systems spreading false information?", "e0faed04-d3ac-4ffd-847b-0eb7570099b0": "How do malicious actors use GAI systems to create sophisticated disinformation?", "25e2dfeb-bd2e-4183-bd34-d7a9fb889f4b": "What role do confabulations play in the production of misinformation by GAI systems?", "9d781fd4-80b1-415f-bdc0-cb99a0ad57aa": "What are the key policies and procedures to address AI risks associated with third-party entities?", "5ab4424c-a307-47e8-9524-720e346f1103": "How can organizations categorize different types of GAI content with associated third-party rights?", "3749d629-316f-4418-9f81-884d7050c768": "What are the best practices for managing GAI risks in collaboration with third parties?", "76664a25-080a-4041-947e-a87349ea3aa4": "How can joint educational activities with third parties help in managing AI risks?", "a3d40842-deb4-459e-b156-f9ef4c243572": "What approaches can be developed to measure the success of content provenance management efforts with third parties?", "9ec62f10-d33b-4bcd-a708-9a6b8f4f52b7": "How can organizations ensure data privacy and intellectual property rights when dealing with third-party AI content?", "0e343257-054b-4912-83af-419e09f10542": "What are the common risks of infringement of third-party intellectual property in AI projects?", "8d5d823e-8af6-4d8b-b8f1-c68b7d439a22": "How can value chain and component integration be managed to mitigate AI risks?", "2521694f-ca6a-4805-97d6-166beb459f2c": "What metrics can be used to validate the effectiveness of content provenance management with third parties?", "5985031f-49b1-44cb-9355-1cbdf90a9ec8": "How can incidents related to AI content provenance be detected and responded to efficiently?", "c5db5bcc-a2bf-498d-92ab-5bb0db131203": "What should be included in a report about data collected from individuals?", "46b110ea-13a4-41c5-be85-368d573b2111": "How quickly should an entity respond to a public request for data usage information?", "634c0a75-d94b-4dc9-9e9c-ecb9cfb11231": "What format should the data report be in to ensure it is understandable by most users?", "08fdf655-f40d-4a7d-8eec-5c6ca9a4754b": "What information about data collection should be included in the report?", "c63e76ef-0b53-439a-871d-3b04064a5530": "Who should have access to the data and metadata collected from individuals?", "9bdf0a7c-cc20-4518-b935-616a80516ebd": "What steps should be taken if a user login is not available for identity verification?", "3fd33ba3-95e9-4be2-87dd-1dbcf4afee88": "What is the purpose of summary reporting in the context of data usage?", "04331b6c-1532-4bcc-9a9a-f12352764d7f": "How should summary reporting be made available to the public?", "18215d4a-212f-4664-a6f7-f25e3fa46f80": "What are the legal limitations on the data and metadata that can be included in the report?", "c9685d0b-7fe3-47f6-a4b5-99d6cf0b3123": "Why is it important to include time limitations in the data report?", "313a9213-5dd4-4fd0-b6cc-5649c4da50f7": "What is algorithmic discrimination in the context of AI systems?", "36918793-5d0e-48bd-b045-f8ff83ea055d": "How does algorithmic discrimination impact different protected classes?", "664af71b-506c-4536-aa63-5a4c95942aa3": "What legal protections exist against algorithmic discrimination?", "0f5c4986-db15-4307-9880-e51f3bd60751": "Can algorithmic discrimination occur based on gender identity or sexual orientation?", "5dd96edd-ff11-42e1-8ea9-f87e9ae4b2de": "How do automated systems contribute to algorithmic discrimination?", "a14927ac-5614-423d-a8f9-5c0853bab534": "What are some examples of algorithmic discrimination in automated systems?", "67b571d8-1ebc-4a74-bc63-de217aebedd1": "How can organizations prevent algorithmic discrimination in their AI systems?", "176842e4-195d-47ea-bb47-4747e05ce154": "What role does computation play in automated systems?", "d7798ca6-fc5a-4819-813f-1d68a7715e00": "How can algorithmic discrimination affect policy implementation?", "12f7ff31-5e11-4d2c-bedc-26c5cc7322d9": "What measures can be taken to ensure automated systems do not violate legal protections?", "c21ceaec-63ff-45ce-a1c8-4c954a4d0cba": "What are the risks associated with GAI models synthesizing NCII and CSAM?", "c6cf6391-dc4d-4c46-b3b5-fb5a40f28726": "How have websites and mobile apps that generate synthetic NCII evolved over time?", "01e4a6f5-a4f4-4957-9cdc-2aaba3491a36": "What are the characteristics of trustworthy AI in managing harmful bias and ensuring safety?", "241aa1b9-216b-43a4-9f90-6610fe5c28b2": "How do third-party components in GAI value chains affect transparency and accountability?", "2a49cfa9-6bbd-43ad-bea4-28427449269d": "Why is the risk of improperly vetted components higher for GAI compared to traditional AI systems?", "72445f3e-2877-4f4b-9192-ba572bcdb530": "What challenges are associated with vetting large-scale training data for GAI models?", "422aafdb-ec57-4340-bd89-2fc20e3b0da0": "How do pre-trained models and software libraries contribute to the risks in GAI value chains?", "30ac0cae-4e18-4ad7-bb21-0e34d9b27082": "What measures can be taken to enhance privacy in GAI systems?", "d14ef51f-6a7d-4b9b-8c2c-7ba562b3d774": "How does the difficulty of training foundation models impact the development of GAI?", "d716e7c9-5860-48e4-914a-8c72625fdbbf": "What are the implications of automated and scaled online businesses generating synthetic NCII?", "407a7ba6-d65a-4a11-afa4-c6ea6e4c2736": "What are TEVV metrics and processes in the context of AI deployment?", "436567b2-4a53-418b-8002-08cb30c28f31": "How can measurement error models improve the validity of pre-deployment metrics?", "d6bd80dd-1e24-488d-a6e5-eb5aa8895943": "What is the importance of documenting biases or statistical variance in applied metrics?", "84eeb2b5-483b-4794-8d69-a1fb7ca5b57a": "How can domain expertise be leveraged when modeling complex societal constructs like hateful content?", "1149e1f0-19fe-4af1-b052-9c5b0bf7b453": "What are the risks associated with confabulation, information integrity, harmful bias, and homogenization in AI?", "3e72a6bd-6a5a-4b12-8156-069a0f9382be": "What tasks are involved in AI deployment, operation, and monitoring according to the provided context?", "1e55727a-0e04-4def-9388-239c06d052dc": "Why is it important to evaluate and document the effectiveness of TEVV metrics and processes?", "a76bd5b4-7983-42f7-98f1-6cf2180a7448": "What challenges exist in assessing AI risks using currently available measurement techniques?", "5bcfbe76-4c4e-4bf9-8a09-cd1dc9eb77c3": "How can risk tracking approaches be improved for settings where AI risks are difficult to assess?", "f8f78806-13b8-4acb-9826-c4408a3c523c": "What are some suggested actions for improving the measurement and evaluation of AI metrics?", "0e48d737-5d25-4c14-94d4-f0be919145c3": "What are the best practices for conducting post-mortem analyses of AI incidents?", "ee67a49d-fa40-4f72-bc61-a39c2144d958": "How can visualizations help non-technical stakeholders understand GAI system functionality?", "963ca3e1-2fd0-4a20-85c7-d1bfe31c0bd9": "What methods can be used to represent GAI model behavior effectively?", "133585cd-97fd-4343-9627-bfa3bdcaee9b": "Who are considered relevant AI Actors in the context of AI deployment and development?", "37f44acd-e83a-4327-9d26-ac7ce250879c": "How should incidents and errors be communicated to affected communities in AI systems?", "44946c07-c978-408b-9b84-a5fd16194ca2": "What processes should be followed for tracking and responding to AI system incidents?", "20bc157a-c8bb-4ff2-9003-6f475b0d145a": "How can after-action assessments verify the effectiveness of incident response and recovery processes in AI systems?", "bc817926-284f-402f-a8b4-8016544b7436": "What are the key components of a Human-AI configuration for managing dangerous or hateful content?", "757d49ae-2c4c-4dda-b834-35d68feba859": "How can AI deployment and development tasks be effectively managed to prevent future incidents?", "ec4a9dd4-cf97-4b49-8736-19a432697eef": "What are the suggested actions for managing GAI risks in AI systems?", "5dc1404b-b9d5-4165-bfba-5ae18b4ef0a8": "What is the Blueprint for an AI Bill of Rights?", "1b4835f2-59c4-4255-a964-61969ea8863e": "How does the Blueprint for an AI Bill of Rights address law enforcement activities?", "8f94848b-91d1-4bd4-9095-8fab3fe85de3": "Why might notice not be appropriate in certain law enforcement contexts according to the Blueprint for an AI Bill of Rights?", "be1037b8-1682-4b8b-ab5b-6bad9c9018d7": "What are some examples of automated systems that might require sector-specific guidance?", "adb12b37-a721-476a-817d-6ae9d45f34bd": "How does Executive Order 13960 relate to the use of automated systems in federal agencies?", "d9941951-34e0-4599-ba08-82c1823f7557": "What are the potential challenges of using AI systems in school building security?", "800426c1-0a93-4185-b638-fc754e6a3feb": "What safeguards are in place for federal departments and agencies using automated systems?", "6cf609a1-e1ab-4388-9eee-76603f895da4": "How does the Blueprint for an AI Bill of Rights balance the protection of sensitive law enforcement information with the principle of notice?", "03ffb16c-be24-46fd-a594-205d9e68e49f": "Why is future sector-specific guidance important for the use of automated systems?", "6ff903dc-0e95-45b1-b7ba-5147dcdd7088": "What oversight mechanisms exist for federal agencies using automated systems?", "90935253-ff29-43e9-9473-f71036e4e5f8": "What are the main security concerns associated with generative AI as discussed by Burgess in WIRED?", "a87294ca-3f18-46f9-921e-10e6fa956d49": "How does prompt injection hacking pose a threat to generative AI systems?", "16605b19-6407-427d-8ad6-0bd123fef5ef": "What are the key takeaways from the Canadian Centre for Cyber Security's guidance on generative AI?", "5cd233c2-fb54-486b-bec3-6c406a216562": "How can training data be extracted from large language models according to Carlini et al (2021)?", "799db38e-e7df-45c2-af2e-701b12bdbee5": "What methods are suggested for securing AI pipelines as per the Mandiant blog?", "7b243fdf-3ecd-4747-87fd-c6c9860cb3ae": "What is the significance of next word prediction in large language models as explained by Burtell et al?", "d623ee79-0c8b-4ee4-a9ce-edbf633b20de": "How does the memorization of data in neural language models impact their security, based on Carlini et al (2023)?", "fe664b26-b505-4d49-b30f-fe252750d38f": "What are the potential risks of generative AI highlighted by the Canadian Centre for Cyber Security?", "d5d0438c-36f6-4328-90cb-4baa96b6a1bc": "How does the Georgetown Center for Security and Emerging Technology explain the power of next word prediction in AI?", "466b29fa-ac89-4e2a-8791-cfe170592641": "What strategies are recommended to mitigate the security flaws in generative AI systems?", "39725f9a-68c2-4fe9-aa8d-9a4f08d023ae": "How are AI systems being used to limit access to equal opportunities in education?", "ca7c2204-b6f5-4781-bf3b-8d9f02540ffd": "What are the concerns related to the use of remote proctoring systems in education?", "f43c197c-7302-4f65-a850-8d1592d44eee": "How does facial recognition tracking impact students in educational settings?", "6d8e2c0e-e4cf-4ebb-a417-815a64668c79": "What are the potential issues with automated tenant background screening in housing?", "14c91abd-8d01-4cf0-8523-0812a5c1c840": "How does facial recognition-based control affect residents in housing complexes?", "68d008be-5997-4d96-96e0-731c60a6c09e": "What are the risks associated with discrimination in automated hiring screening?", "cc4bb020-b92c-4f19-adc2-06b98ff1da33": "How does workplace surveillance impact employee privacy and opportunities?", "e63cb0d8-46ce-4928-aef8-ccd1f1693044": "What limitations of existing privacy laws were discussed by the panelists?", "6f3c8f9d-9bbc-44cd-92a3-95215c3cfee5": "Why is it important for students to have the ability to reinvent themselves in terms of privacy?", "2f47fea5-c195-4bb6-889a-3d498268e761": "What are the concerns related to the use of robot teachers in education?", "b23c2ac0-3c8d-418f-9d3a-4d355510c475": "What are the key components of an incident response plan for third-party GAI technologies?", "e341d43e-c5cf-470a-9937-1a0522709924": "How often should third-party GAI incident response plans be rehearsed?", "d32de1da-1496-480e-bfcb-a256b5aa2656": "What are the best practices for aligning incident response plans with relevant breach reporting and data protection laws?", "0fc878ed-8fa8-46f3-a457-943aac86deb4": "How can organizations ensure effective communication of third-party GAI incident response plans to all relevant AI actors?", "62ea75e9-a1f9-482e-b748-93e00e24299b": "What steps should be taken to define ownership of GAI incident response functions?", "d326718b-3c54-47fe-b90b-e026762b440d": "How can retrospective learning be used to improve incident response plans for third-party GAI technologies?", "8113c5c3-1121-4595-b984-3595f621efb3": "What policies and procedures are recommended for continuous monitoring of third-party GAI systems in deployment?", "1f685537-4d22-4888-90a8-cf32f7774031": "How can organizations address data redundancy in GAI systems, including model weights and other system artifacts?", "32b71e7d-ef8b-49de-a3f8-f906cd313fe2": "What are the potential impacts of harmful bias and homogenization in GAI systems, and how can they be mitigated?", "0ee66a25-f2c4-434c-b514-7affa3493429": "How should organizations integrate value chain and component integration considerations into their GAI incident response plans?", "f150a1c8-dad3-432e-91e2-c40098a5ebd7": "How can LLMs deceive humans into believing they are speaking with another human?", "1d4e22f5-8de7-4f07-9526-61c7936f9459": "What are the potential risks of adversarial prompting in LLMs?", "7c6bd923-b691-426e-beb9-67b46c185a03": "How do researchers study the extent to which humans can be deceived by LLMs?", "04d3f9c8-515a-4f01-8cae-62fb636fd1cc": "What are the characteristics of trustworthy AI?", "b4f47764-9f91-49f1-88a2-221cc0e06715": "How can GAI systems produce inciting or radicalizing content?", "3e394353-4b52-4a52-af48-562eea9f2152": "What mechanisms allow LLMs to generate dangerous or violent recommendations?", "36aee960-dcad-4e5c-97d0-05f4fc62b815": "How can harmful bias in AI be managed to ensure fairness?", "a4b69757-7dcd-4eff-90eb-a30ced99f719": "What makes AI systems safe, valid, and reliable?", "72048f3a-c23d-42a8-8194-a14c109a5af2": "Why is it important for AI to be explainable and interpretable?", "2047cc7b-4522-4ef9-93de-8bc09531f843": "What are the potential downstream impacts of confabulations in GAI systems?", "ab3b72f8-672c-486e-bc6b-9461baa761da": "What is a pre-deployment assessment in the context of surveillance?", "8e05f5b4-738f-4015-9698-0d841d8727cf": "How is a disparity assessment conducted in real-world surveillance deployment?", "e41871e4-fd71-4858-9f31-90e4bce717ba": "What are the specific goals of data collection in surveillance systems?", "0aee33e7-9f19-42ba-9f6f-020edc4551d5": "How can one ensure that only the minimum required data is collected during surveillance?", "780e0590-0606-443d-a7e8-2891d967ee16": "What are scope limit assessments in surveillance data collection?", "85dfacbf-8094-47ad-80dc-7bbcc46712ca": "How are data retention timelines determined and justified in surveillance systems?", "6c98830e-c446-42a8-ac57-f8f46ee0a255": "What is the impact of surveillance on individual rights and opportunities?", "7abcd464-ee77-4ce1-8d41-57315a78fed9": "Why is it important to have an independent party assess the impact of surveillance?", "cc012aac-5ce3-434c-8e51-35c1e8338ce4": "How should surveillance reporting be provided to ensure clarity and machine-readability?", "51e0fc29-06be-4a85-a0ae-1fa144bff1cc": "What are the best practices for documenting the impact of surveillance on access and rights?", "b74eff6f-0348-4f4d-8455-ec94c409abc3": "What are the best practices for obtaining user consent for data collection?", "0db718f0-8251-47d3-83c0-f9a203c06084": "How can companies make consent requests more understandable for users?", "84f786f2-b45d-4028-8864-a9c521374ba4": "What are the current issues with notice-and-choice practices for data use?", "39695c7a-9723-424f-a040-717c4cadc993": "What enhanced protections should be in place for data related to health and finance?", "48492acb-3e38-45a7-bcde-061e9fcbb695": "How should data pertaining to youth be handled to ensure their protection?", "64e6cef4-2fdf-4121-b410-fc7168f68289": "What are the necessary functions for which sensitive data can be used?", "71ec2ac9-cc52-4831-a314-2f92000494e4": "What ethical reviews should be conducted before using sensitive data?", "8dd38cfb-46a6-4d54-9560-fa7036a393c5": "How can communities protect themselves from unchecked surveillance?", "40a38d86-7774-4a05-b3ec-46ee736efe3f": "What kind of oversight should surveillance technologies be subject to?", "5303236e-9b24-4300-a6eb-71fd2660ba8e": "What are the potential harms of continuous surveillance and monitoring?", "68145309-ec97-431b-a2e4-ff7c84ae2b92": "How can I opt out of an automated system in favor of a human alternative?", "bc2c2f00-164e-4fb2-b04f-0a8e11a127b2": "What are the criteria for determining the appropriateness of opting out of an automated system?", "99c78782-3873-4806-b67a-5057aee1fe94": "Are there any laws that require a human alternative to automated systems?", "f1218cc9-8cf6-492a-87b4-e7e2b34939a8": "What should I do if an automated system produces an error?", "550182c7-921f-4b50-a93a-089c2d1e4f06": "How can I appeal or contest the impacts of an automated system on me?", "38276fcb-783d-4a66-b4ab-96d3654c9707": "What is the process for accessing human consideration and remedy if an automated system fails?", "64350a23-d7dc-4a12-b082-a57617fd4d14": "What kind of training should operators of fallback and escalation processes receive?", "db717bad-ccdd-4097-a630-6459902c89c3": "How can I ensure that the fallback and escalation process is equitable and effective?", "bb183df4-5c49-4847-b777-9b605daaec7d": "What are the reasonable expectations for opting out of automated systems in different contexts?", "126df14a-0e79-4f7b-9ba1-5cb3197cef81": "How can I access timely human consideration if I encounter problems with an automated system?", "bb600a12-cf3e-430f-aeac-ffb55080bc75": "What are biological design tools?", "ab0afd54-b8f3-4255-bcea-00d7f469fa4d": "How can I access the paper on biological design tools on arXiv?", "4b17bc0d-84c9-44ce-b287-5873628bcb88": "What is the significance of the paper \"230613952\" on arXiv?", "d8711a1f-0375-405e-88fb-47084c2dd456": "How do biological design tools impact scientific research?", "4e3d1faf-aaf7-4382-bfdb-f07986da3774": "Can you explain the main findings of the paper \"230613952\" on arXiv?", "01016449-dd51-43e2-8064-6163d76960ca": "What are some examples of biological design tools mentioned in the arXiv paper?", "96010c49-fead-4764-a1cf-52f08f825c94": "How do I cite the paper \"230613952\" from arXiv in my research?", "1a7dc66f-7d3c-449a-91a8-730ae4fbf5e0": "What are the applications of biological design tools in biotechnology?", "618088f5-7d87-423c-94f7-092dad08e9de": "How do biological design tools contribute to advancements in synthetic biology?", "7a5bd3f1-0117-49f5-847a-c98c3e1ed923": "Are there any limitations discussed in the arXiv paper \"230613952\" regarding biological design tools?", "396fdf65-f8c8-44af-b354-a6a3a8080cf4": "What are some effective mitigation procedures to address algorithmic discrimination?", "53b2c06d-8db2-4193-bad2-2cabf8dd64af": "How can organizations ensure ongoing monitoring of automated systems to prevent algorithmic discrimination?", "33223652-33b9-477b-a3f2-76a8fd138783": "What are the best practices for performing disparity assessments on automated systems?", "669ee0bf-cd38-407d-a36e-b02d7efaeba6": "How often should automated systems be monitored for algorithmic discrimination?", "ba748242-63e0-4e5f-9536-5e37095f34d7": "What approaches can be used to assess whether an automated system has led to algorithmic discrimination?", "369d0faf-1db8-4137-8253-078bff29bf59": "How can changes to the context of use or associated data impact algorithmic discrimination in automated systems?", "177fe09a-b7d7-45cf-a228-70fe1d4708d3": "What role does demographic information play in monitoring and mitigating algorithmic discrimination?", "74ec3300-8c0b-4be9-9382-88a845824eef": "How can organizations identify patterns of unusual results in automated systems?", "5cf0dfa4-8cc2-49d6-a074-c9d97d87b51e": "What are the challenges in performing regular assessments of algorithmic discrimination?", "77d5bb4a-5a5b-46c2-987e-911e1f0d76e7": "How can testing with a sample of users help in identifying algorithmic discrimination in automated systems?", "269c41f4-2524-4d35-9147-09e322f2504d": "What is model collapse in the context of AI and synthetic data?", "53226a81-7a32-4f91-a589-46450a0b7283": "How can overly homogenized outputs lead to unreliable decision-making?", "0d9724ae-bfe2-47f4-a021-1296db5dd676": "What are the risks associated with foundation models acting as bottlenecks?", "db9015f0-bda2-4f91-9808-19738ae88078": "How does model collapse threaten the robustness of AI models?", "b87fc7dd-8992-4529-85cb-066cbde37dcc": "What does it mean for AI to be \"Fair with Harmful Bias Managed\"?", "eecaaa8a-3251-4874-9a51-cd62286c5095": "How can synthetic data contribute to model collapse?", "bfb13ae7-473a-4caa-968a-c783c333b1e6": "What are the potential consequences of overly homogenized content in AI systems?", "030514da-a5fd-4a1f-ac10-cf8922a6150f": "How can foundation models amplify harmful biases in downstream systems?", "43d3ae5b-1657-46fb-920d-87bbf081d086": "What are the characteristics of trustworthy AI?", "40e129bc-068b-44de-942b-641c29a2983a": "What risks are involved in human-AI configuration and interactions?", "3eda549a-f514-4a5a-8cef-68367b00516e": "What are some real-life examples of laws and policies that protect rights and opportunities in AI systems?", "4359e62b-013c-45a6-b540-f16600b3d7c0": "How does the Department of Energy's AI Advancement Council contribute to ethical AI use?", "f8696290-800f-4952-81bc-3020e6f11c09": "What are the key components of the Department of Defense's Artificial Intelligence Ethical Principles?", "38c06f0b-84d5-48fa-ab9f-4a53a84e8916": "How does the US Intelligence Community ensure ethical use of AI systems?", "b81f442e-1b5f-43da-8261-9b2c1363ea3d": "What practical technical approaches are being used to protect rights in AI systems?", "dba6ad78-0e3e-4068-a3b5-38c5ab583a94": "How do sociotechnical approaches help in the ethical development of AI systems?", "4b849fa7-2c5a-41a5-b197-62210fadaf66": "What issues does the DOE AI Advancement Council address regarding AI systems?", "6f3964c4-6694-4977-976d-770e0175af87": "How do the AI ethical principles of the Department of Defense differ from those of other agencies?", "34e35d11-aa65-49a1-92b2-ab8eb6f362e6": "What role do US government agencies play in the ethical implementation of AI systems?", "77bca3a1-9687-4e84-8144-d0e76454c55c": "How can policies ensure the responsible use of AI in national security and defense activities?", "adb044f3-b06c-4147-b270-388aa7ce28a1": "How can AI potentially enable malicious actors to access CBRN weapons?", "2cc96dd4-379c-4ea0-8aab-bf6fcb0ee94c": "What are the risks associated with LLMs in the context of CBRN information?", "6b0d4619-0b82-4e50-9d25-50215d1b4223": "How might LLMs facilitate the misuse of biological and chemical threat knowledge?", "7f729371-7c4c-40c9-9651-c84ceaf4ab59": "What did recent research find about LLM outputs related to biological threat creation?", "4bcda5c2-bc2c-4f9b-a31e-c90c1bffe24b": "Are LLMs more effective than traditional search engines in providing information on CBRN threats?", "eab83c61-d25e-47e3-bf55-cec2cf22dd7d": "What are the implications of LLMs for individuals without formal scientific training?", "80e574c2-a56c-4ade-b455-0eca52117b22": "How can transparency and accountability be maintained in the AI lifecycle concerning CBRN threats?", "7af58ef3-a1c9-420e-9eec-b2eecfc7ba18": "What measures can be taken to prevent the misuse of AI in the development of CBRN weapons?", "cb512b7c-e79e-479d-9557-8757c4fda4ed": "How does the accessibility of biological and chemical threat knowledge impact security?", "16c95e95-db9f-48d8-9c3f-fbf32e49bf92": "What are the potential dangers of AI in the context of CBRN information and capabilities?", "34bbf002-cd8d-4886-a398-74853f3697c0": "What are the regulatory safety requirements for medical devices in relation to AI?", "332c9a40-a1fb-448d-9067-d81497b47a04": "How do sector-specific privacy protections impact the implementation of the AI Bill of Rights?", "05415269-22c9-4836-aceb-97f1c11d2051": "What new laws might be needed to ensure the protections proposed in the AI Bill of Rights?", "ac4195ce-e0d5-4720-a4ce-5bcc8078b64c": "Are there any exceptions to the principles in the AI Bill of Rights for law enforcement?", "05f22b03-2ba9-4910-8467-4cb79c9a8206": "How can existing laws be balanced with the new principles in the AI Bill of Rights?", "d202eb6e-03df-49f4-88d4-b160a4626fcf": "What are the practical challenges in applying the AI Bill of Rights to specific use cases?", "02abe32e-eeca-4b60-9b32-22ae7ce787a5": "How does the AI Bill of Rights propose to protect civil rights and civil liberties?", "8afa840c-a2a0-42cb-95b1-8f1b404515e3": "What role does the private sector play in implementing the AI Bill of Rights?", "a0f7a50f-5987-4c5c-98a6-36316797bea8": "How might new policies be adopted to support the AI Bill of Rights?", "817d708c-fe29-43ce-9478-5bc616838321": "What are the competing public interests that might affect the application of the AI Bill of Rights?", "9cb6e467-ad95-44c0-841b-777832cfa4aa": "What are the safety implications of automated traffic control systems in smart cities?", "eb391602-3d68-4cb9-a04a-29b9595203c3": "How do electrical grid controls contribute to community safety?", "c3b9539e-277f-4737-9e5e-e386eeebd7a7": "What role do industrial emissions control algorithms play in environmental protection?", "73302da7-3bef-402f-9bf6-f12df15c536e": "How do smart city technologies impact the safety and efficiency of urban areas?", "58e6a606-3cd6-48fc-9dad-9c6fdc181f83": "What are the ethical considerations of using algorithms to adjudicate benefits and penalties?", "2d6ccf02-270d-43e3-9410-be3e588f9b6d": "How effective are fraud detection algorithms in preventing fraudulent activities?", "22b01cb1-5a1a-4789-8b56-4d7baa49fcc7": "What are the privacy concerns associated with biometric systems used for access control?", "dbb74eb6-3fde-40d5-8df3-bcc934e6a158": "How do access control algorithms determine eligibility for services or benefits?", "7b7be751-057b-4a7f-88ad-cfe0a6255aca": "What are the potential risks of using fully autonomous systems to make benefits-related decisions?", "0a96f62f-6fcc-42d1-a86d-2d07836fa4ad": "How do environmental impact control algorithms help in reducing industrial pollution?", "c12924b2-38c5-459b-8743-4004840152f9": "What is data memorization in the context of machine learning models?", "1ee45afd-2181-4a4b-8885-4e243fe3c9ba": "How do adversarial attacks on LLMs reveal sensitive information?", "064348ce-09cb-4cf5-9b13-efb66fb26273": "Why is it important for model developers to disclose specific data sources used for training?", "07faf7be-a125-488a-8fc9-95d2a01f7983": "What are the privacy risks associated with data memorization in AI models?", "0f2299ca-5f65-45fa-bec4-3d8a5dd6667d": "How can AI models infer sensitive information that was not part of their training data?", "082dc681-2582-47ff-9159-652af70f6d28": "What are the potential negative impacts of AI models inferring PII or sensitive data?", "8476f9de-1c46-484a-9d42-63c47d4e3ddf": "How can users be made aware of whether PII was used in training AI models?", "1930f79d-9ceb-4935-a643-c1d80c961fee": "What measures can be taken to prevent AI models from leaking sensitive information?", "d28999ed-71ad-4d55-afa6-e2d551dffcee": "How does the collection of PII for training data pose privacy risks?", "968af77b-e22e-4bd8-b951-9a663a94877d": "What are the challenges in ensuring that AI models do not generate or infer sensitive information?", "9c573068-8e35-41b2-879e-161babef96ed": "What are the capabilities and limitations of monitoring systems in deployment through TEVV processes?", "ead604ce-72c9-4dc9-a2ec-008dc710ab0e": "How do humans engage with GAI content in decision-making tasks?", "e690c10f-4933-40e7-835f-6034cc551627": "What are the benefits of using overt disclosures in GAI systems?", "ffc79ee0-1f3c-4956-b746-ac94aae246e9": "How can organizations document and delineate GAI system objectives and limitations?", "bf06a17c-7eb3-4ac4-9260-bea0f24eedfd": "Why is provenance data important for GAI systems used in content creation?", "97d2ebc4-8668-4f50-9e9d-4dec70f48766": "What are robust watermarking techniques for GAI systems?", "87372dbb-28be-4288-810b-cdec1b6c9afd": "How can metadata recording techniques help trace content origins and modifications in GAI systems?", "2423bd23-5f6b-4730-a392-af960a751c0b": "What tools and repositories are available for metadata management in GAI systems?", "fd2d6cb9-81af-4234-a95b-65534c17a395": "How can narrowing GAI task definitions to include provenance data benefit organizations?", "845cfb86-2eb6-43f6-bbc3-bfbd925cd21a": "What is the role of structured public feedback in enhancing content provenance?", "4bdb3f89-538a-40e3-9935-8e433ab9e6e2": "What is the purpose of the Generative AI Public Working Group (GAI PWG)?", "6905b587-39e3-4b09-ac42-6cded7de2b9c": "How does the GAI PWG obtain multistakeholder input on GAI risk management?", "13355254-5606-49a9-a3eb-4769a610066b": "What are the four primary considerations relevant to GAI discussed by the GAI PWG?", "e2b55aad-14c7-43c8-bdad-c0dcd2877575": "How does NIST plan to update the AI RMF subcategories and suggested actions in the future?", "ad739be8-7f90-4ee1-817e-e3f5a425b4f2": "What is the role of public feedback in the GAI PWG process?", "ea9cb785-05ef-4f79-8053-0816fff5eb8d": "How does the GAI PWG ensure transparency and collaboration in its process?", "0e7c873d-f587-4cfe-bb7e-5b4877644666": "What is the significance of governance in the context of GAI risk management?", "329c3806-ac7f-48ea-8945-74a6f91b5d0f": "Why is content provenance important in the context of generative AI?", "5a1e1ec3-fda4-453e-ab8e-ce1d9faad797": "What is the importance of pre-deployment testing for generative AI systems?", "5e8537e8-4e6c-41f2-9b53-2a9692305988": "How does incident disclosure contribute to the management of GAI risks?", "5c7e3648-de65-4b1e-b755-1e099598c19f": "What are the key strategies proposed by the Information Technology Industry Council for authenticating AI-generated content?", "d119441d-bce2-47b9-9924-dbf87e4cc817": "How does the concept of algorithmic pluralism aim to promote equal opportunity according to Jain et al (2023)?", "22519aa4-4650-4092-b1b5-e3ac5d8f725f": "What are the main findings of Ji et al (2023) regarding hallucination in natural language generation?", "48b1844d-583d-4e62-908d-889b415b5c31": "How do people typically react to AI failures, based on the study by Jones-Jang et al (2022)?", "cfb67ae3-43b1-4450-9bb3-d7f29aa0e86f": "What factors contribute to algorithm aversion as discussed by Jussupow et al (2020)?", "2c4bf45c-f7e6-46e1-9e67-30c91c0444c8": "Why do Kalai et al (2024) argue that calibrated language models must hallucinate?", "ab2fee39-2a46-49d1-8cb6-55b4167b1b63": "What are the implications of automation bias and algorithmic aversion for the adoption of AI technologies?", "dc7ea38d-faed-4f3d-a7b0-8c1ae79788dc": "How does perceived controllability influence people's reactions to AI failures?", "7ec7f6e0-8490-4dab-ad43-7031aaff916f": "What are the potential solutions to mitigate hallucination in natural language generation as surveyed by Ji et al (2023)?", "3835091e-5a77-48ed-b786-16833c6dad03": "How does the literature review by Jussupow et al (2020) explain the reasons behind people's aversion to algorithms?", "14ce14f2-5924-440f-9f82-1d9518db6f9e": "What are the best practices for documenting GAI risks associated with the system value chain?", "c102bbce-23e6-4b6e-a359-2de7b683d7f0": "How can organizations identify over-reliance on third-party data in their AI systems?", "1bd749b4-cb8c-4f68-951e-4dc05f918076": "What are the key components of a contingency process for handling failures in high-risk third-party AI systems?", "4ba5ee61-6497-4e28-86f2-603d556d088f": "How should incidents involving third-party GAI data and systems be documented?", "17f3b4d5-ed49-486d-af7c-5c8150c925ef": "What are the common risks associated with using open-data and open-source software in AI systems?", "9bf8ec79-8c71-49e3-9cf1-bfcf6e900eac": "How can companies integrate value chain and component integration to mitigate GAI risks?", "d4c8b3c6-aaa0-44ad-89d8-826c0e200e82": "What steps should be taken to ensure intellectual property is protected when using third-party AI systems?", "5724c74c-76af-4944-89d9-d6e91234c261": "How can procurement processes be optimized to reduce risks associated with third-party AI entities?", "a22ca24b-e8c8-49a3-9ddf-5f838e432323": "What are the roles of contractors and consultants in managing third-party AI risks?", "b00e06f3-0822-47bc-8d94-e046c58311d6": "How can organizations monitor and operate AI systems to ensure they are not overly reliant on third-party data?", "2f3330e7-4aca-4708-bbc6-29c775344e94": "What is an algorithmic impact assessment?", "24490295-2bcb-4b3a-b834-033104ba2420": "How can entities ensure accountability in automated systems?", "b0e2eb81-c76f-407d-87a7-bf82bdc5c994": "Why is it important for notices to be timely and up-to-date in automated systems?", "2dca1178-1147-434b-b575-69e710673993": "What should be included in notices about automated systems?", "93bf2a5e-1a9f-4aa4-a500-5dde06657e7c": "How can user testing improve the clarity of notices and explanations in automated systems?", "f79d35e1-9c4c-471c-b976-8c3dae58e572": "What are the key components of Algorithmic Discrimination Protections?", "62517b56-3063-4614-8fd7-d987ee4bf4e2": "How should entities notify users about changes in the use case or functionality of automated systems?", "c53f1315-615a-4dfa-a417-1ea3f2c92e3b": "What are the expectations for reporting in the context of automated systems?", "bd8dd202-37fc-4f0e-9788-e8deb33eabdb": "How can entities ensure that users understand the notices and explanations provided for automated systems?", "fbf6c048-26ac-4ec7-84a1-ae7cc41ebfb7": "What role does research on user experiences play in the design of notices for automated systems?", "38534eb5-4881-4f58-be97-63238c6c479b": "What are the current limitations of existing GAI tools in facilitating CBRN weapons planning?", "b27e8b4f-0fcc-41d9-a4e8-94ac31878ba1": "How can ongoing assessments improve the monitoring of AI tools' capabilities in CBRN contexts?", "991a0d40-0a1c-44ba-b955-3de8eb4bd067": "What measures can be taken to ensure GAI systems do not access sensitive data related to CBRN weapons?", "e84751a4-90f8-413b-b3b6-e91f28305dcc": "How important is it for AI systems to be explainable and interpretable in the context of CBRN risk assessments?", "89c9205b-de28-4888-8c7f-79f9900b731b": "What are the key characteristics of trustworthy AI in the context of safety and security?", "8c67ad80-5cd3-4842-88e6-fc5e71086935": "How can we enhance the safety of AI tools used in high-risk areas like CBRN weapons planning?", "8b30e5d6-0420-4224-b85d-052d8d01a5b4": "What role does explainability play in the trustworthiness of AI systems?", "766d94d6-ff7e-4281-9d69-ba577c2b2228": "How can we ensure that AI systems remain interpretable as they become more advanced?", "0d7ff6a0-f0ab-42d2-bc69-3d81e2146c1a": "What are the potential risks of GAI systems having access to CBRN-related data and tools?", "03c6100c-5fe4-4dff-9b62-da870a412d36": "How can we balance the advancement of AI capabilities with the need for safety and security in CBRN contexts?", "0f4996c3-02e1-4284-94a7-c3695bba5538": "What are the rights of the American public when it comes to opting out of automated systems?", "070d096a-c121-4062-9907-63cb49651bb5": "How can people with disabilities ensure they receive reasonable accommodations instead of automated systems?", "5b9ce146-9406-4f12-8eae-194503dd5c93": "Why is it important for the American public to have a human fallback system for automated services?", "77c334c1-312b-4323-9cf6-971bedb52b19": "What protections are in place for the American public if an automated system fails or causes harm?", "93b3a12a-1c0a-4a3d-8a80-a250055ab49f": "Are there any laws that require a human alternative to automated systems?", "0fcc07cd-f226-4132-b9bb-62b83ccc8c18": "How can the American public conveniently opt out of an automated system without being disadvantaged?", "e6ab4ce6-4166-46a9-8f52-a88ce88d15f0": "What are the potential risks of relying solely on automated systems for critical services?", "61dd4dc8-b98c-4c08-b83e-b7c8eb005bd6": "How does human review provide protection against unexpected scenarios in automated systems?", "28b5c99a-f4e0-41c7-b3c0-57d98c306d61": "What measures are in place to ensure that time-critical systems have a human fallback option?", "15bda80e-6fb3-4e9e-b3aa-343fbfc57016": "Why might an automated system fail despite rigorous testing?", "b17b2a91-c2f2-421a-9161-f577f4f49902": "What is the AI Bill of Rights released by the White House Office of Science and Technology Policy?", "1c591402-7c09-4342-9a4c-3e447029fa73": "When was the Blueprint for an AI Bill of Rights published?", "3f4d1548-89ee-4941-adf0-70889cee50a0": "What is the purpose of the AI Bill of Rights framework?", "3451f2b4-c2cf-4c53-979c-50973acbb1bd": "How can I access the Blueprint for an AI Bill of Rights online?", "d0bc240e-3df8-4e3c-91e6-826ec2f75c9a": "What is the role of the Office of Science and Technology Policy (OSTP)?", "7edebb20-1da2-49a3-b7c1-035d6f51e95c": "When was the Office of Science and Technology Policy (OSTP) established?", "8aeea347-cc31-433e-b950-82f344182a53": "What prompted the development of the AI Bill of Rights?", "e6649708-a5e7-4253-873b-745f594a79a0": "How did public engagement contribute to the AI Bill of Rights initiative?", "550ed3d0-68d5-4c20-9af9-61b217f9c8ec": "What are the main goals of the National Science and Technology Policy, Organization, and Priorities Act of 1976?", "a1df848c-b03a-406d-a467-61ee5c89957f": "Who benefits from the advice provided by the Office of Science and Technology Policy?", "50365036-5406-482d-a4f4-64f43b779b3a": "What is continuous monitoring in the context of GAI systems?", "fe6f7ccc-7cd6-4b50-8a46-8aba632ecc48": "How can feedback from affected communities improve GAI outputs?", "608884ac-731d-4bfa-b339-8c8d39749dd9": "What are some techniques used to evaluate the quality and integrity of data in AI training?", "2372552e-4f0d-4f62-8715-f7845287595c": "What is chaos engineering and how is it applied in AI systems?", "b404ae73-34eb-4434-82b9-0e2c6ab3bf2e": "Why is stakeholder feedback important in evaluating AI-generated content?", "fdc418c4-4bca-46d6-95b4-c7d346c634ca": "What are the benefits of structured human feedback exercises like GAI red-teaming?", "7e203668-296d-4740-807b-996e28110ecf": "How can GAI red-teaming help in managing risks associated with AI?", "fb5db5ae-01cb-4cf0-8c7b-9193091f22ff": "What are the potential negative impacts of GAI systems that need to be monitored?", "4f49fc89-1623-43ba-9f22-18c09e38f9ef": "How can harmful bias and homogenization be mitigated in GAI systems?", "5f86869b-e204-4551-8742-3ac0a5c93510": "What are the key components of tracking and documenting risks in GAI systems?", "92689af0-19a9-4930-8cc2-d7dcf81cda7a": "What are the common issues users face when conversing with chatbots?", "44aae3aa-24ad-4059-9e44-4c37b8d088b4": "How do users typically react to unhelpful responses from chatbots during distressing situations?", "cef22ba7-26f8-4a69-8040-adb5bf18fa6f": "What risks are associated with the creation and public exposure of offensive or hateful language by AI?", "cd099f8e-41d5-45f2-9799-b0ffd6d8b77c": "How can AI-generated denigrating or stereotypical content contribute to dangerous or violent behaviors?", "63ef9f64-d9a2-4b88-9c2f-0c99870fc0e5": "In what ways can the spread of denigrating or stereotypical content exacerbate representational harms?", "ab431b98-c209-4dcd-a050-4a14e1bdb05b": "What characteristics make AI systems trustworthy, particularly in terms of safety, security, and resilience?", "802de2ca-5fa0-4365-94c2-2f48d2551dc3": "What are the privacy risks associated with the training of GAI systems?", "a7780055-4593-4371-baf2-0854c10b4668": "How does the use of personal data in GAI training conflict with widely accepted privacy principles?", "2eb881cb-2d98-4856-b5d4-062d6a883283": "What are the key privacy principles that might be at risk due to GAI system training?", "1835f2f8-1619-4637-a8a9-fb620ed7cb26": "How important is transparency and individual participation (including consent) in the context of GAI system training?", "a5a1e993-48c9-46ea-8808-a32d93da94aa": "What are the ethical considerations for using sensitive data in automated decision-making processes?", "69dbc047-26cf-443a-83ec-63b327f9646c": "How should health insurance companies handle sensitive data provided for payment facilitation?", "1bc73bf1-7e48-46ac-a612-80196cb803e7": "What is the role of an independent ethics committee in reviewing the use of sensitive data?", "c084d257-5a73-46df-8538-5073ed7a01c4": "Why is it important to have periodic reviews of decisions based on sensitive data?", "91cd1699-977f-4d73-8327-5dc62cff847d": "How can we ensure that necessary functions remain optional and not coerced?", "2f1e2c40-8abe-446e-9ab4-5eb6690a678e": "What are the potential risks of using dynamically developing algorithms in sensitive data contexts?", "6ed87438-4cb5-4a0e-8495-7378ba140033": "How should entities handle data that might limit rights, opportunities, or access?", "7cf57cf0-ea86-4802-a27d-d8900db77529": "What are the guidelines for ethical review of sensitive data usage?", "80b69831-2305-4880-94da-f11163809d19": "Why might an ethical review determine that data should not be used even with consent?", "8d50eaaf-61f5-49ac-a319-1c3d968c61a0": "What are the challenges in monitoring the ethical use of sensitive data in automated systems?", "623d8b3e-7499-4bf1-b87b-e7a81b50ee4a": "What is GAI red-teaming and how is it used in AI evaluations?", "b45f8960-4fbb-403a-8415-36afec2cd758": "Why is it important to engage representative AI Actors in structured human feedback exercises?", "64b731e3-b3d6-480b-9718-5237e4c7595a": "How can harmful bias and homogenization be mitigated in AI systems?", "c2a47cbb-9233-4979-8506-436f11a090b3": "What are the key considerations for conducting impact assessments in AI?", "6ce7fe74-d363-4677-b304-583120b4f062": "Why should those conducting human feedback exercises not be involved in system development?", "c44d6e5d-92e9-47d4-a053-1feb8c4ea992": "What roles do AI Actors play in AI deployment and development?", "272d11b8-e3c8-4c56-8cd2-61cec900ff82": "How does data privacy factor into human-AI configuration?", "3cca6e56-8ef0-4ae7-9605-f6f461bb0b87": "What are the responsibilities of domain experts in AI impact assessment?", "b49893d8-5d05-416a-962b-90597b72602d": "How can AI systems be monitored effectively to ensure they meet evaluation standards?", "6e23f927-8119-4bf8-823e-e3ef9d26c60a": "What is the significance of TEVV in the context of AI operations and monitoring?", "723651fb-9c2d-409b-b320-816fae7dec56": "What are the Access Board\u2019s Section 508 regulations?", "75f53b59-e2b8-4540-adea-9e72c300aab8": "What are the technical standards for federal information communication technology in the United States?", "660d930f-69d6-4768-b0a1-44bb673dfacf": "What is the International Organization for Standardization's role in technology design processes?", "ca06fff7-b717-465a-91c0-f20cc32b3902": "What are the World Wide Web Consortium Web Content Accessibility Guidelines?", "0d33d01e-495f-4254-8b8e-d7393c8fa678": "What is NIST Special Publication 1270 about?", "43a76af4-542c-499e-81e3-23edeecb1692": "How does bias in artificial intelligence affect public trust?", "f2963ebd-4268-48bc-99ef-b385c395b833": "What are the three categories of bias in AI identified by NIST?", "6007e7be-7afe-475c-8f2c-d189608a35f8": "How do systemic biases contribute to harms in AI?", "873995b6-97c4-4fbf-9d84-aafae525c908": "What are some examples of statistical bias in artificial intelligence?", "6106aef5-150e-4d9f-b12d-839a1bc64d5e": "How can human bias impact artificial intelligence systems?", "5d31f548-e180-4961-b02c-1026476307a5": "What is provenance data tracking and how does it help in detecting synthetic content?", "41737fda-7f5e-4526-8ecb-d8a560682739": "How can provenance data tracking improve the trustworthiness of AI systems?", "759a70d7-6d44-4ebd-b51f-264e7fd500c6": "What types of metadata are included in provenance data tracking for GAI content?", "10bbc39b-cae2-4ff4-b61a-2c7fa87c5fd4": "How does synthetic content detection contribute to GAI risk management efforts?", "cf616e2b-26ef-43e4-9dc4-b7b9569b9f8a": "What are the benefits of combining digital content transparency with organizational accountability mechanisms?", "9b2af444-94eb-4943-808d-8a01c74a7860": "How can provenance data tracking help trace negative outcomes back to their source?", "110eb68c-1767-4f4d-ba87-2028a2a1105c": "What role does provenance metadata play in improving information integrity?", "1a06806d-fb35-4c87-8809-da5a08874714": "How can provenance data tracking be implemented for different types of content like text, images, and videos?", "5296dde2-bf5c-4f7d-b712-62c552801ef5": "What information can provenance metadata provide about GAI model developers or content creators?", "5b028681-df5b-4e75-a745-ef99535810a3": "How does digital content transparency uphold public trust in AI systems?", "273f9105-5fd9-4850-ad10-dd9a9b8cc778": "What are some potential risks unique to the development and use of GAI systems?", "f2015027-8be4-41af-9324-6b28bc14ba10": "How can organizations identify and manage risks associated with GAI?", "1c39f437-06bb-4fe4-9973-5e2bdc4a8cb2": "What does it mean for a risk to be labeled according to the outcome, object, or source of the risk in GAI?", "1e85d184-b2c1-4ff6-af08-8ea57ec19ad9": "How are the risks of GAI mapped to Trustworthy AI Characteristics in the AI RMF?", "e0add861-37cb-4915-902c-04c52bc85356": "What are some examples of risks \"to\" a subject or domain in the context of GAI?", "b2c9c8be-32f2-487a-8dcc-b0edbbaec345": "What are some examples of risks \"of\" or \"from\" an issue or theme in the context of GAI?", "553df791-945d-4f86-8985-dd794f43f520": "How can future updates help in managing the risks associated with GAI?", "39d40845-848b-4f07-ac52-444d6f6dc6e4": "What role do Trustworthy AI Characteristics play in managing GAI risks?", "d8eb671f-52dc-4612-9671-cf9c05b5beae": "How can organizations categorize risks based on their unique approaches to risk definition?", "6d2fc2bb-39a1-4e50-b2f9-1579f87f3239": "What is the significance of Appendix B in the context of GAI risk management?", "295453ca-009a-489b-9a3b-7f39d0aede8a": "What is the NIST Privacy Framework and how does it help organizations manage privacy risks?", "8a36fef4-811b-4fdd-80eb-a3d79e7b5155": "How can organizations use the NIST Privacy Framework to support ethical decision-making?", "417512e6-a1fb-48c7-b125-859ffc865ba6": "What are some benefits of adopting the NIST Privacy Framework for managing privacy risks?", "39ea0fdf-a276-42b5-911b-4ec55c6e14c9": "Why did the school board's surveillance attempt in Lockport, New York, lead to a state-wide biometrics moratorium?", "2d51294e-3f63-42ce-b8e7-80d8791bacfc": "What are the implications of the biometrics moratorium in New York schools?", "28211d1f-6063-4fe9-8a8f-56d2e0c9bd80": "How does the NIST Privacy Framework help organizations demonstrate compliance with privacy laws and regulations?", "ffd0d540-b753-4764-918d-866af54215a0": "What sectors have voluntarily adopted the NIST Privacy Framework?", "a4e0cabf-38aa-4b49-920c-c6d52520a8fa": "What measures are included in the NIST Privacy Framework to identify and communicate privacy risks?", "c63477fe-7ddc-4df4-8341-f70bcccc16f6": "What was the community's reaction to the school board's surveillance plan in Lockport, New York?", "916eda70-3efa-4870-9261-7badb6422454": "What is the significance of the July 1, 2022, deadline in the New York biometrics moratorium law?", "5928ad96-89e5-4214-a148-421437e5e16a": "What does it mean when a document does not supersede existing statutes or regulations?", "ccf1c7b4-aec1-4f63-b6b5-ee4c5681bfdd": "How does this white paper affect the interpretation of international instruments?", "3320cd92-d86b-448f-aca0-3a32e873afe7": "Are Federal agencies required to comply with the principles described in this document?", "eee8169c-4314-45e2-88bc-1d4fe146f56b": "Can the principles in this white paper influence the US government's position in international negotiations?", "8a46d200-e514-4172-a7b4-199a50cfb153": "What are the implications if the principles in this document do not meet existing regulatory requirements?", "4e95d3b7-08c9-4644-87d2-e0c03b0312ea": "How do these principles impact lawful activities of government agencies, such as law enforcement or national security?", "de79da97-0834-4ee6-b1f4-eb364ebbe1ac": "In what ways does the context of automated systems usage affect the application of these principles?", "ef810a8b-abbe-45ac-b82f-47d20dc71885": "What should be considered when applying the principles of this white paper to automated systems?", "b0f0f94e-aa95-48c9-8e54-5d27b11c1ddd": "How might the principles in this document interact with existing policies and regulations?", "a5863708-81c6-4a01-a207-62001c6f482f": "What are the limitations of the principles outlined in this white paper regarding government agency activities?", "b613cee8-31a4-4979-8cd1-7547aef01a05": "What are the benefits of using technology to push benefits to those in need?", "93e8f04f-3a3f-4daa-8c55-9a697403cf18": "How can automated decision-making systems ensure positive outcomes in benefit distribution?", "4d63f90f-ffcf-461e-b0b2-d7443e9e0e53": "Why is it important to provide clear notice and explanations about the use of technology in benefit systems?", "87ebbea1-b1c2-4928-8cc9-72bec3599f01": "What are the potential risks of using technology to take supports away from people who need them?", "383af2c3-7350-4f63-b41b-480703a2f318": "How can human-driven mechanisms ensure the timeliness of benefit payments?", "db698d0d-61cc-4055-82ba-9e9f070b90a0": "What emerging technologies are being used in the healthcare system?", "864c0429-b586-4dfb-9fd9-1122c038f71f": "How can consumer products related to health benefit from current technological advancements?", "512bfcf4-61ac-46a5-bc16-91f0073ecef3": "What role does the White House Office of Science and Technology Policy play in healthcare technology?", "cf6c1f99-aa2f-4487-bf62-4d84073869b1": "How does the Center for American Progress contribute to the discussion on healthcare technology?", "3ab8040e-18b6-4400-94bc-7f7d0d4b1b2b": "What are the responsibilities of the National Coordinator for Health Information Technology in the US Department of Health and Human Services?", "789a4e6b-1b5f-4a2e-be70-4c60b2e169ef": "What are the key expectations for automated systems in terms of technical standards and practices?", "d904c6a8-b7ae-43d7-8287-35c070601ea2": "How should derived data sources be tracked and reviewed in automated systems?", "b604912b-4408-4b2b-8eb6-c1c90a9637c8": "Why is it important to identify and track data derived from algorithms in automated systems?", "17717bc2-52ea-4d65-b273-956e440e43ef": "What are the potential risks associated with derived data in automated systems?", "26da822d-31fe-48b3-9ca8-50155d6fa977": "How can feedback loops and compounded harm be prevented in the use of derived data?", "c5d39949-dbb6-4c5e-b00a-b6fd7788ae1d": "What measures should be taken to validate derived data against collateral consequences?", "cfea209a-9830-4e58-b251-1f70f42f93f1": "Why are data reuse limits important in sensitive domains like criminal justice?", "7a516f8b-a3c1-4579-a094-1302e810e841": "How can data reuse in new contexts lead to the spreading and scaling of harms?", "acc90406-7fa4-487f-a601-6e3dc23145a9": "What are some examples of sensitive domains where data reuse should be limited?", "3a91cd21-aa78-4c15-a216-a24057643605": "What practices should be implemented to ensure the safe and effective use of automated systems?", "8363b99c-85ab-4773-86a2-f63cac3d051a": "What are the key responsibilities defined for periodic review of content provenance in GAI systems?", "f87db50c-422f-4529-a21c-78abd2d10fab": "How often should the periodic review of the risk management process be conducted for GAI systems?", "34ed1fca-1d3e-4fdc-b3a4-9281c24dd99e": "What organizational roles are involved in the incident monitoring for GAI systems?", "4d916dd9-762b-4031-b912-5fc4222557c2": "What are the suggested actions for improving information integrity in GAI systems?", "cb1a51e1-502e-4c12-b98b-10353458c6e6": "How can organizations establish effective policies for after-action reviews of GAI system incidents?", "09aabd10-bf20-4e36-a1af-b2389c95fefe": "What is the importance of maintaining a document retention policy for TEVV in GAI systems?", "16ef8d11-a13c-44d4-a88e-868f36377f22": "How do after-action reviews help in identifying gaps in GAI system incident response?", "abb1af0f-005f-408f-aa68-27d64a96a71e": "What are the procedures for updating incident response and disclosure processes in GAI systems?", "681af4b6-c008-47ac-87ac-859d9849d77d": "Why is it important to have digital content transparency methods for GAI systems?", "c32d437f-b5b4-4d28-b7f8-1a2de95eb23b": "What tasks are associated with governance and oversight in the context of GAI systems?", "2792f4ff-31f6-48c7-9b05-a903e1fa4fdf": "What is the NIST AI Risk Management Framework?", "b4374d8c-f461-4c57-8c4e-4d9975359384": "How does the NIST framework aim to manage AI risks?", "cd79ee78-f93f-4750-875f-33a59251f574": "What are the key characteristics of trustworthiness in AI according to the NIST framework?", "0135028f-ffa7-4189-92d1-0888059657c4": "How is the NIST AI Risk Management Framework being developed?", "7c54c8a4-972c-48f7-9388-9640bbc920ce": "What role does Congress play in the development of the NIST AI Risk Management Framework?", "7ab73fee-d39b-41c6-8cd8-222b44049d82": "How can organizations incorporate the NIST framework into their AI systems?", "579d7a98-c43c-4d11-b24e-6d7275e820fa": "What are the benefits of using the NIST AI Risk Management Framework?", "427a0cc8-5c14-4b43-bcd0-372317b5a8e7": "How does the NIST framework address privacy concerns in AI?", "e7555614-9fb9-4861-b164-85033e7aeace": "What opportunities are available for providing input into the NIST AI Risk Management Framework?", "5c5b27b8-e80f-4e87-80a8-dda89bca7b12": "How does the NIST framework ensure the explainability and interpretability of AI systems?", "4436c96e-b176-4846-b3be-120e574bbaae": "What are some examples of unintended harms caused by automated systems?", "53134aa2-f21c-4ea7-be6f-6b32937c51f0": "How can companies ensure that their development decisions are ethically vetted?", "89297186-beb5-4d42-b727-46821b71a4e0": "What are the benefits of pre-deployment testing and ongoing monitoring for automated systems?", "ae608ad7-1d56-4091-a89f-36c7c99c6c23": "How do public consultation processes help in the deployment of new automated systems?", "666e61ac-70db-4dc3-8657-e4c29d144123": "What existing practices protect the American public from potential harms of new technologies?", "98137aae-d585-4b93-b931-6c0f0a022772": "Why are proactive protections important for the use of automated systems?", "18d231da-3925-4aa0-8358-ad67f4ce8c1e": "How can expanded protections increase public confidence in automated systems?", "9f500df2-ad6b-42ed-8645-8a9e917bdf80": "What role do ethics reviews play in preventing harm from automated systems?", "8d4c69ae-abc4-4f4b-961e-5d0f8194de75": "How can governments improve their consultation processes for new technologies?", "4097b122-a3b3-4718-8577-48d550199b62": "What are the challenges in implementing safeguards for automated systems?", "1a442f2d-3986-4d5f-ab68-0ad589163a65": "What is AI-enabled \"nudification\" technology?", "d1108cc8-95d4-4e06-83da-0a5667e1679b": "How does AI-enabled \"nudification\" technology impact women disproportionately?", "0141b7f8-c7ab-497a-af5e-f0ad4e4ff34e": "Why is it difficult for both humans and AI to detect inauthentic images created by \"nudification\" technology?", "04c27c24-9db1-48ea-9b81-876c36344898": "What are the potential personal and professional consequences for victims of non-consensual intimate images?", "e6564ab8-5109-4a91-9546-08eef6406338": "How does the proliferation of AI-enabled \"nudification\" technology contribute to image-based abuse?", "6c438bca-254b-4856-9607-ce37450c6154": "What measures can be taken to protect individuals from AI-enabled \"nudification\" technology?", "b754ed6a-d92e-4edb-a8bc-d0eea1d29626": "How does the experience of harm from non-consensual intimate images affect victims' mental health?", "56c9eed6-f23c-499e-8bc0-52b33a7b3e1b": "What are some examples of apps that enable non-technical users to create or alter images without consent?", "6f321352-c8fc-4909-9996-33dc8382f6aa": "How can the authenticity of altered images be verified to prevent image-based abuse?", "5398f151-8b5f-42f5-b601-0b47b2d7ba49": "What steps can be taken to make AI systems safer and more effective in preventing image-based abuse?", "57eb4cf6-01d6-4cae-b638-975a2a0f2656": "What are the key findings of Virginia Doellgast and Sean O'Brady's report on call center jobs and worker stress?", "8a32a722-7f7e-40c1-967a-6c5bd05a1c88": "How do management practices impact worker stress in call centers according to the CWA report?", "e1b53808-6b10-44e0-882d-ba92d299d675": "What recommendations does the Federal Trade Commission make in their 2014 report on data brokers?", "cad08b72-46c0-40b7-bbf7-613ff0ab5f7f": "What are the main arguments presented in Cathy O'Neil's \"Weapons of Math Destruction\"?", "4da03091-d495-4661-9c76-eca9b1c37a74": "How does the US government use social media surveillance according to the Brennan Center for Justice report?", "53d8542f-d4e3-4349-bb91-b058abf20736": "What are the implications of Shoshana Zuboff's \"The Age of Surveillance Capitalism\" for privacy and human rights?", "08b49066-3db9-4bb5-97a1-46a2adb0324f": "How does the Brennan Center for Justice report describe the extent of social media surveillance by the US government?", "ded819f0-0467-4497-a257-4b727219d0dd": "What are the potential risks associated with data brokers as highlighted by the Federal Trade Commission?", "51e0e9cc-e3b9-47a7-8bf8-405f02fa04e6": "How does \"Weapons of Math Destruction\" address the issue of algorithmic bias?", "aec903ac-6dcb-450f-ad0d-c664a413a4b9": "What solutions does Shoshana Zuboff propose to combat surveillance capitalism?", "8d838d90-aa87-4ecc-9abc-0fcfa5a4d35d": "How can we protect the public from algorithmic discrimination in a proactive manner?", "a4c16234-c64d-454b-98d2-55d8906e1040": "What is a proactive equity assessment in the design phase of technology?", "33c734e9-1fa0-4bd1-b225-487ee53c2b33": "Why is it important to review potential input data and historical context during the development of automated systems?", "da018beb-b83d-4eaf-8c14-30d735aac789": "How can we ensure accessibility for people with disabilities in automated systems?", "93044246-0649-4ba3-b8b1-355b186025a1": "What societal goals should be considered to identify potential discrimination in technology?", "df01e2f4-1283-4220-9353-4573fe7a1203": "Who should be included in the equity assessments for automated systems?", "98fd7a77-ecb9-40ff-b731-37710588af27": "How can we address potential discrimination against Black, Latino, and Indigenous communities in technology?", "37017d6c-9757-463e-b5e4-7df7f5a6a2cc": "What steps can be taken to ensure equity for Asian Americans and Pacific Islanders in automated systems?", "cc45a9c2-e146-4637-ae51-762e5cf9a713": "How can we support members of religious minorities in the design of automated systems?", "a04f1bd4-fb2f-4020-a56f-07c5d12ee11c": "What measures can be implemented to protect women, girls, and non-binary people from algorithmic discrimination?", "21b9f512-20cd-4b96-a8e5-824c5d788b9e": "How can continuous surveillance systems impact civil liberties and rights?", "cbc08ff9-844c-48d2-bd2f-d965463662ff": "What are the risks of using identity-related information in surveillance systems?", "62b31c74-49b3-45d8-958c-175dffe5e8da": "Why should continuous surveillance not be used in public educational institutions?", "2eba3ccc-3d6a-46ae-bebc-6cf52aea05da": "How can algorithmic discrimination be avoided in surveillance systems?", "a81db3fd-a4bb-4dd0-a446-4b3c34313263": "What are the potential consequences of using biometrics in surveillance?", "cc016098-a84b-4347-a791-d173694b1fd8": "Why is it important to limit the use of location-based inferences in surveillance?", "61262c75-27f1-4742-a14d-7dfbb43c1f6b": "How does continuous monitoring in workplaces affect employees' rights?", "48be4dc1-8648-4ae2-b813-f08d7321d697": "What measures can be taken to prevent surveillance from limiting access to critical resources?", "d3c26eb4-5404-4906-8f26-12a930b32e4b": "How can social network data be misused in surveillance systems?", "5cd15272-af41-4e9c-aa26-42043ce6088c": "What are the ethical considerations of using surveillance in public accommodations?", "7869bc66-d4ef-4fc7-9897-351302b9eae5": "How can automated systems impact the eligibility for Medicaid-funded home health-care assistance?", "c13ee199-2840-46a1-ab92-c45e02f2f6b6": "What are the potential issues with using algorithms to determine eligibility for social services?", "d612ed72-1fb8-4bca-9b74-b5243bf640ca": "How can the lack of transparency in algorithmic decisions affect legal cases?", "bbecd72d-7534-478d-a686-94b4ed9cb7c8": "What are the challenges faced by lawyers when contesting decisions made by automated systems?", "68914712-215e-4582-8129-f1f7db119cc4": "How can individuals be informed about data collection and algorithmic assessments in child welfare cases?", "5f684140-09b8-47a2-8459-aa9c40072ce2": "What are the ethical concerns surrounding the use of algorithms in child maltreatment risk assessments?", "b0deab21-1ef7-4bb8-bb66-bd0567448753": "How can the use of algorithms in social services be made more transparent and understandable?", "e6417fe3-22a8-4536-89de-555e6a9a171f": "What steps can be taken to ensure fairness in algorithmic decision-making for vulnerable populations?", "12de6c9e-e24e-4576-9d3c-1fcbd6ccc54b": "How can parents contest decisions made by algorithms in child welfare investigations?", "522de666-2af7-4927-bf75-9d3efd25b34d": "What are the legal implications of using algorithms without notifying the affected individuals?", "fe8e6e24-ac4f-4570-bb59-e53149f51c49": "What is the purpose of the overlapping framework of rights mentioned in the context?", "07b9522e-0eac-4459-85e1-b511e6b00056": "How does the Blueprint for an AI Bill of Rights aim to protect the American public?", "55277100-414c-49c6-84ac-e6a011795719": "What are some examples of protections already required by the US Constitution mentioned in the context?", "d6a87b9f-e5f6-44ac-bc18-b4f1bc5515a9": "How should measures be taken to realize the vision of the rights framework?", "fc2524b6-ed78-43d5-b6fe-a01bdd53e031": "What is the relationship between the Blueprint for an AI Bill of Rights and existing US laws?", "fd764fa7-268d-48fb-9ec7-3be9aa2eb183": "How does the context describe the role of judicial oversight in government surveillance?", "202fc607-7128-470f-aed2-e848351cae24": "What does the context suggest about the proportionality of measures taken to protect rights?", "e5097d86-a6bc-49d4-86a4-d058c5b193a1": "How does the Blueprint for an AI Bill of Rights envision the future use of automated systems?", "e633d508-d253-4b7f-bec5-75b11962e65e": "What are the principles described in the Blueprint for an AI Bill of Rights meant to ensure?", "742f04aa-415c-4e14-98b9-5298de43c47d": "How does the context relate to the protection of opportunities and access for people?", "e1fd4aa1-c10d-4f71-bf77-b4cca9a6e0ed": "What are the best practices for regularly assessing and verifying the effectiveness of security measures in AI systems?", "9fbe4be3-06da-42bf-a241-95fc342604db": "How can organizations ensure that their AI security measures have not been compromised?", "f1082088-e78b-42d5-9285-ae15731354be": "What methods can be used to compile statistics on policy violations and intellectual property infringement in AI systems?", "e6f71c20-417c-46ac-8a42-10c97c50760f": "How should transparency reports be analyzed across different demographic and language groups?", "2f6a4b04-9c59-4bad-8823-c165db75adf3": "What are the key components to document when giving instructions to data annotators or AI red-teamers?", "a64475ac-8c2d-48af-b278-eb91c933268d": "What digital content transparency solutions are recommended for documenting instances of content generation, modification, or sharing?", "0d873b42-d24d-4da1-89ff-6ccc15e84b6b": "How can organizations address risks associated with transparency and accountability in AI systems?", "97de1dbe-9a2c-4a3a-9a0d-842bf1c1ad55": "What are the common risks related to intellectual property and harmful bias in AI systems?", "7e629132-bcc2-46fa-9815-95ccd889c845": "How can the effectiveness of AI deployment and impact assessment be monitored?", "070a1044-27d3-4b31-aa33-23e39882c9ab": "What role do domain experts play in the operation and monitoring of AI systems?", "10ecba85-50b5-466c-92fc-326759a2a5ee": "What are formal methods in the context of automated systems and machine learning?", "43072003-14fe-4f66-94c2-9ac121ef7717": "How does the Designing Accountable Software Systems program ensure legal and regulatory compliance?", "98486804-fb18-4583-ab43-67b07b08efa6": "What are the transparency and validity requirements placed by state legislatures on pretrial risk assessments?", "54358f22-1102-42f3-b0f2-7227b0a0f0c2": "Why are civil rights groups concerned about the use of algorithmic pretrial risk assessments?", "ffba1d9d-ebb6-4955-a4fa-839e180301ef": "What does Idaho Code Section 19-1910 require for pretrial risk assessments before they can be used in the state?", "99d80794-a2ea-449b-9af4-62646f316051": "How can a pretrial risk assessment be shown to be free of bias according to Idaho Code Section 19-1910?", "07f00fa3-c821-41ec-9ff1-a781bd1bd55d": "What steps must a locality take to validate a pretrial risk assessment as free of bias?", "e9dee9ec-012d-4ba0-a878-5dec4184c9a2": "What are the implications of the requirement for all documents and records related to pretrial risk assessments to be transparent?", "b922e48a-8d8e-4ae8-807f-5bb7477dd82d": "How do formal verification and analysis contribute to the reliability of automated systems?", "75050f5f-7cfc-4adf-a91a-1d7fb4185c7c": "What methodologies are considered rigorous and reproducible for developing accountable software systems?", "6b983f53-78fb-4bd3-be9a-cb6deb436d63": "What are the key components of a certification program for managing GAI risks and interpreting content provenance?", "550b57aa-5cc7-44ec-b07d-c62cd7dd4668": "How can existing training programs be adapted to include modules on digital content transparency?", "65a3901b-9b76-4dcd-b3ba-d04968302b14": "What methods can be used to evaluate whether GAI operators and end-users understand content lineage and origin?", "fe52b3aa-3245-48cc-86da-8f3f3225b4cf": "Why is it important to delineate human proficiency tests from tests of GAI capabilities?", "b3b5db46-0009-42b6-9465-4b5f30fbe624": "What systems can be implemented to monitor and track the outcomes of human-GAI configurations?", "530d41df-1d98-428a-9449-1e199472e781": "How can end-users, practitioners, and operators be effectively involved in the prototyping of GAI systems?", "68889efa-4505-424f-ae65-dc462fc55044": "What are the risks associated with human-AI configuration and information integrity in GAI systems?", "5149446a-0fef-433d-a2ae-bfa7865ae0d0": "How can proficiency in managing GAI risks be tested and certified for specific industries?", "0fba5c84-2bcf-4be8-9684-d1904eb861bc": "What are the benefits of continually refining and improving human-GAI configurations?", "5634f37b-9702-4b53-8dce-bfb21a101d03": "How can information integrity be maintained in the context of GAI systems?", "8eb9d5d5-af51-4376-9b9d-1297edd11496": "What are the potential risks of using biometric markers in school exams?", "eaf23276-45c4-465b-a0a1-c347a8fc5b76": "How might biometric systems in schools affect students with disabilities?", "451adf54-6336-4465-b4de-b6390b383b02": "Can location data from data brokers be used to track visits to sensitive places like abortion clinics?", "f2489a19-b9ce-4941-a3e9-154a0ecad928": "What kind of student data do companies collect to forecast student success?", "317d1c65-7185-452c-878a-1b16e14d3e4d": "Why are parents concerned about the collection of sensitive student data without consent?", "474c5dc3-a92f-40c7-b290-7529f751d77b": "What are the transparency issues related to the use of collected student data?", "2e297de2-2657-4560-9b39-b6316e39d5b4": "How can the collection of demographic information and other sensitive data lead to discrimination in schools?", "38c93c3c-8f95-4361-80e3-d401cdfb7a38": "What are the implications of employers transferring employee data to third-party job verification services?", "7a8d09ca-630b-49f2-921f-eb1e2dffc47c": "How do schools use data on free or reduced lunch status in their assessments?", "2b74ec7f-f8f1-40ba-b970-2b4fbc944395": "What are the ethical concerns surrounding the use of student data for predictive analytics?", "839d62aa-6521-47db-b195-5f55f3715e07": "What mechanisms can be used to sustain the value of deployed AI systems?", "8c59f600-8f81-40e2-8f76-cad08254ac3a": "How can organizations compare AI system outputs against predefined risk tolerance guidelines?", "5a461ec3-611e-43f6-af2a-7a7f88454170": "What are the risks associated with AI-generated content, such as CBRN information or capabilities?", "16e67bb6-1d80-4b1d-b60d-cda158c2d378": "Why is it important to document training data sources for AI systems?", "ddf72159-1801-49ab-a221-531088d69221": "How can feedback loops between AI content provenance and human reviewers be evaluated?", "f24bf2cd-d91c-4662-bfd9-31b03791b58e": "What are the benefits of implementing real-time monitoring systems for AI content provenance?", "c0e0ee49-2ab6-4eab-bafe-fec66c3023af": "How can organizations ensure that AI-generated content does not include obscene, degrading, or abusive material?", "c7548d81-fe0d-4316-a260-2d342818a5c6": "What steps can be taken to prevent harmful bias and homogenization in AI systems?", "91e539e0-ee4e-4e3b-bc8d-b3794ca3798a": "How can dangerous, violent, or hateful content generated by AI be managed?", "4c18144e-d6a3-4d13-a836-e55c43d2c5e2": "What is the role of information integrity in the context of AI development and deployment?", "18472313-2f95-4239-88f3-4a75df9cf246": "What are Model Cards for Model Reporting and why are they important?", "18e201b7-192f-4ea2-934b-df1184862535": "How do adverse action notice requirements under the ECOA and the FCRA impact consumers?", "07cfac24-a2ea-4bef-b577-15ed4935a4bd": "What information is provided in the FTC's guidance on using consumer reports for credit decisions?", "86d77516-8a49-4005-97e2-fef5020a40b3": "How does the CFPB act to protect the public from black-box credit models using complex algorithms?", "b2ac04a5-d89c-4fc8-8023-6bb6b8a814ab": "What are the key takeaways from the Conference on Fairness, Accountability, and Transparency (FAT* '19)?", "03bc6211-f0ad-4a75-b7aa-92f96064ce4b": "What are the adverse action notice requirements under the ECOA and the FCRA?", "75513281-57cf-4e3f-8495-cafc4e79d242": "How does risk-based pricing affect consumers according to the FTC?", "28e98921-df31-486e-a4bf-cd2a8f018ee4": "What measures has the CFPB implemented to address issues with black-box credit models?", "1942efe7-0de7-42dd-9f0b-23cdddc6969d": "Why is transparency important in credit decision algorithms?", "ba2751db-a092-4455-89ce-60ce0f2e5ff0": "How can businesses ensure compliance with adverse action notice requirements?", "43ab2e49-8484-42a0-b907-a326016b5fba": "What are the potential risks during the design stage of the AI lifecycle?", "71c80195-c590-4a6a-8455-cc14b7d76775": "How can risks during the deployment stage of AI be mitigated?", "bac1fcc0-33c2-4bd1-bcae-206282b1aebf": "What is meant by \"algorithmic monocultures\" in the context of AI risks?", "ded49efb-8ec5-43c7-90a3-414f486b61aa": "How do risks at the ecosystem level differ from those at the individual model level?", "aa5a5372-d095-4583-8dd2-04b30b8d377b": "What are some examples of risks that can arise during the operation of AI systems?", "d364a35e-d9b1-4892-aeee-562d6fe3fb16": "How can human behavior contribute to the risks associated with AI systems?", "8e058945-6592-48f2-a7c0-b29f59239765": "What are the implications of repeated use of the same AI model on labor markets?", "0586fc63-c513-4afc-a447-0f010dfa2c07": "How can the decommissioning stage of AI systems pose risks?", "5723f355-fc6d-4188-a997-6fc9df87d7e0": "What are the potential impacts of AI on access to opportunity and the creative economies?", "b1450fe5-2a1b-49c3-8181-b0908b22ec94": "How can risks from GAI system outputs be identified and managed?", "d6dc8fa5-06dd-4cb6-b9e1-3d99509fd36f": "What are the standard risk controls that can be applied to proprietary GAI technologies?", "43f41ff8-54b8-405b-97e6-387ac8c232c9": "How can organizations ensure third-party transparency when using GAI systems?", "def9231f-04c4-40b3-a87d-4a5d13f4664e": "What is the role of software bills of materials (SBOMs) in managing GAI system risks?", "0abe2ec1-662d-4cd9-8f9a-28ce9be69bbc": "How do service level agreements (SLAs) contribute to risk management in GAI systems?", "36dbeaca-841b-42b4-a5fc-2f1795f02564": "What is the importance of statement on standards for attestation engagement (SSAE) reports in GAI systems?", "e49097b7-7ffa-4581-8515-1b30cfa7d7b0": "What are the challenges in risk mapping and pre-deployment measurement for GAI systems?", "f51fa6cc-e9f9-4425-b85d-44db74827ce4": "How can robust test, evaluation, validation, and verification (TEVV) processes be applied to GAI systems?", "b85af260-3cfa-4a9c-bc21-802cd691f871": "Why is it important to document TEVV processes in the early stages of the AI lifecycle?", "7444a8c8-575f-4345-84f3-0124561379dd": "How can acquisition and procurement due diligence help in managing risks associated with GAI technologies?", "84e38c59-60d0-4319-81ad-3888d9b12506": "What are the benefits of involving representative AI Actors in the TEVV processes for GAI systems?", "80255fc3-d877-468b-97e9-7be818ed20da": "What is the AI Risk Management Framework (AI RMF) 10 for Generative AI?", "9516ed5a-2087-413e-925b-26135b0f5d06": "How does the AI RMF 10 aim to improve the trustworthiness of AI products and services?", "6fab3d01-f156-429d-831e-4ea194ff08bf": "What is the purpose of President Biden\u2019s Executive Order 14110 on AI?", "91adbba6-9d02-4f12-8ca2-25bf46b3776b": "When was the AI RMF 10 released?", "bbdcadfc-3db1-46fa-85d2-e443a126d455": "Is the use of the AI RMF 10 mandatory for organizations?", "36c3329b-2a66-4361-b5f7-7ce8ade47cec": "How can organizations benefit from using the AI RMF 10?", "aae224f2-ef20-4cd2-8f53-3e748c2dac1e": "What are the main components of an AI RMF profile?", "150d6339-723a-443d-bc9f-4b1be5ba3fb1": "How does the AI RMF 10 help in managing AI risks?", "3779173f-0285-4630-b333-78420055bd18": "What considerations are taken into account in the AI RMF 10 for Generative AI?", "2a0ab6da-3f10-4297-bb6a-887732c4d6be": "How does the AI RMF 10 align with legal and regulatory requirements?", "66823427-2ffd-4c77-909f-5289272bdb4c": "What is algorithmic discrimination and why is it a concern?", "0ab73255-60d0-4d92-ac1c-3d0c7a6949a9": "How can automated systems amplify existing inequities?", "feeecc56-069d-45a3-88eb-3f4d74890fcb": "What are some examples of algorithmic discrimination in facial recognition technology?", "88d366bd-b700-4c98-a848-aedce1be01ee": "How do hiring algorithms contribute to discriminatory decisions?", "00fc2bf2-fbad-4580-bd4a-05669d18fc7c": "In what ways can healthcare algorithms be biased against Black Americans?", "2844838c-8c42-4c48-a44f-63715f685e1d": "What are the potential consequences of data that fails to account for systemic biases?", "36ef20ee-eb6e-4f4e-9d65-e279ee7920d6": "How prevalent is algorithmic discrimination across different industries?", "3302a720-0035-40c3-a9b6-017c0952d77d": "What protections are in place to address algorithmic discrimination?", "1a75a965-db4c-48cc-a1ac-7e4bcb22e7a6": "How can we ensure that automated systems do not perpetuate existing biases?", "0e9714b8-1ef7-4875-9d9f-858297cad936": "What steps can be taken to mitigate the risks of algorithmic discrimination?", "69b6d24d-4f77-4453-bd79-e8af8137c7e1": "What are healthcare navigators and how do they assist people in obtaining health coverage?", "d3ffb77a-2b83-4c99-9923-bd42f0684d90": "How did the Biden-Harris Administration support healthcare navigators in 2022?", "575075f0-9aa1-4135-87b7-2b392d2cda2b": "What kind of training do healthcare navigators receive to help consumers with health coverage?", "c53668a5-710d-4526-98b9-af2788d4b125": "How do healthcare navigators help small businesses and their employees with health coverage options?", "84bee82d-ff9b-4d9e-8a7a-b6cbcb4db569": "What are some real-life examples of laws and policies that protect rights and access to healthcare?", "d74ae40a-97e3-4c00-bef1-b09032380ffd": "How do practical technical approaches help in protecting opportunities and access to healthcare?", "7b48a310-6aed-4f43-a279-f37e09939bba": "What is the role of sociotechnical approaches in ensuring healthcare access?", "3db05dac-a97a-4b1e-9652-d76803a23c04": "How can increased funding for healthcare navigators impact uninsured consumers?", "984009d5-34ae-416b-b936-3f783743a025": "What are the benefits of having more trained and certified healthcare navigators?", "1fcf65a3-0d6b-4145-99cc-0bf2c3235ad1": "How do healthcare navigators assist with completing eligibility and enrollment forms for health coverage?", "66fd1727-6e57-49a1-ae65-9fdb471abd5a": "What is the role of the National Science Foundation (NSF) in AI research?", "4d10f264-ec1c-496e-8dbb-69f985ae5cf1": "How does the National AI Research Institutes contribute to the development of safe and trustworthy AI?", "4f34a0ae-db65-487e-8242-a6f5458fa9de": "What are the key principles of the AI Ethics Framework for the Intelligence Community?", "4c4c9829-d71f-4438-a202-eaef5533887c": "How does the Cyber Physical Systems program support AI research?", "90a56106-7089-4755-973a-da4912ed88d1": "What kind of research is funded by the Secure and Trustworthy Cyberspace program?", "0a37c463-1465-453d-bbbe-74e8a11fe10f": "How does the AI Ethics Framework help implement ethical principles in AI development?", "bc9e1c96-6a89-4d9b-b96c-71acb36031e0": "What are the main goals of the National AI Research Institutes?", "037f5eee-4dd0-4bed-9151-ef0be3018604": "How does the NSF ensure the safety and security of AI systems?", "06f79190-3996-4bfd-86e5-6065a4dc96ee": "What is the importance of explainable AI algorithms in the context of the Intelligence Community?", "3df54901-e507-45fe-bd82-154e2d31aae0": "How do privacy-enhancing technologies contribute to the security of automated systems?", "c4da0ee6-b97a-4cac-839c-667bdb97a9d0": "What are the key expectations for automated systems to ensure they remain safe and effective?", "37843ed7-8a1c-4d60-818a-72b161e25abf": "How important is ongoing monitoring for the performance of automated systems?", "0944ea5d-dbdd-4f95-829a-6caacde3bed0": "What procedures should be in place for recalibrating automated systems?", "12d5b6aa-803b-4df4-8a6d-4fce86fdf65e": "How can automated systems be continuously evaluated for performance metrics and harm assessments?", "643c631e-a495-4f76-ac44-fc0226061601": "What steps should be taken to update and retrain machine learning models in automated systems?", "6fbfb445-cd6f-4999-b0b3-48d65d58c0e6": "Why is it necessary to have fallback mechanisms in automated systems?", "9c0537b0-0ed3-4084-aefd-70d1001d512a": "How do changing real-world conditions affect the performance of automated systems?", "379808b9-e51a-42f1-b658-7f085dd496a5": "What are the best practices for post-deployment modification of automated systems?", "f9ec3773-dc0b-474f-8e19-10f71c543467": "How can unexpected conditions be managed in the deployment of automated systems?", "caf8112e-e9f3-4acd-81fb-c3b49486c424": "What role does continuous evaluation play in maintaining the effectiveness of automated systems?", "581a5da7-213e-4a7d-9f8d-d4133dd57842": "How does harmful bias in GAI models affect different racial and gender groups?", "9d4abb67-4cfb-4342-9757-6880500e5378": "What are the potential consequences of GAI systems performing poorly for non-English languages?", "6c77fa09-63b8-42b1-ab8c-8a0878fe99b4": "How can GAI models perpetuate or exacerbate existing societal biases?", "a46e5b14-4ca5-47eb-b330-0d94b8f9f326": "Why might GAI systems be inappropriately trusted to perform equally across all subgroups?", "7fabb17d-bead-4be0-a042-a82244952276": "What are representational harms in the context of GAI models?", "b6bddb5b-9792-4d2b-8ddc-6bd3455e5a52": "How can disparities in GAI model performance lead to discriminatory decision-making?", "93e73653-3778-45ec-8b88-83ef0cee390f": "What are the risks of using GAI systems for lower-resource languages?", "0ce84b04-c919-4d13-a642-1c811d94eb54": "How can training data contribute to harmful bias in GAI models?", "8b538c35-c3ca-4876-93d6-3a9de1887248": "What steps can be taken to mitigate bias in GAI systems?", "07203f30-4f7f-4aca-8eca-7c309b4986f2": "How does the underperformance of GAI systems for certain subgroups compare to not using GAI systems at all?", "b3dc9b16-8ecb-4c62-ab68-b96bed0dfc8d": "What are the challenges faced by people without smartphones in accessing unemployment benefits?", "02ced4ba-2675-4cba-9819-e8e00d3cd558": "How does the digital divide impact the ability to claim unemployment benefits?", "98bb75ed-7a8c-4dce-86df-07d671be2a37": "What are the implications of the UIA lawsuit on the perception of unemployment in the state?", "da95bf2a-175f-49d9-b8a6-280808d008cc": "How does the state criminalize the unemployed according to the Detroit Metro-Times article?", "f6187e72-cd60-47bf-8a65-87c6ff917a35": "Why are doctors turning away patients with unbearable pain, as discussed in the Wired article?", "14dd793d-1318-45e0-bf65-ae5c770cde2a": "What role do algorithms play in the treatment of chronic pain and opioid addiction?", "d3a655b7-63e1-43d6-a477-2241c65e6d0a": "How does Amazon's use of bots for firing employees affect workers?", "777e4f21-26bb-4162-81e1-25f943df9293": "What are the consequences of being fired by a bot at Amazon?", "d4ec38ed-55a8-425e-af0d-8589faeb46ba": "How do machine managers at Amazon impact the worker experience?", "2a40a8e1-c0b7-4eac-a84a-5d63fbdb6c9a": "Where can I find the definitions of \u2018equity\u2019 and \u2018underserved communities\u2019?", "c54055bd-b859-4846-856f-3208fb311b0f": "What are the specific criteria for deactivating a GAI system according to MG-24-002?", "6f0ae6ac-c093-4863-8cf2-4ada7f9d42e7": "How should organizations escalate GAI system incidents to the risk management authority?", "b4852e25-ec60-482f-a671-b99fc5379d18": "What procedures should be established for the remediation of issues triggering incident response processes in GAI systems?", "0d20124d-250f-42b7-a215-c52597d6ff03": "How often should the criteria for deactivating GAI systems be reviewed according to MG-24-004?", "477cd099-57f2-473f-9e76-397ae38e415a": "What are the key tasks involved in AI Deployment, Governance and Oversight, Operation and Monitoring?", "dcf15838-d29f-4e4a-843a-165bf83a1bfe": "How can organizations ensure that AI risks and benefits from third-party resources are regularly monitored?", "9d4de1d9-a66b-4c82-935a-f7e97333ed5c": "What are the risk controls that should be applied and documented for third-party AI resources?", "070ee859-7379-4692-a8af-44336782308e": "What timelines should be provided to stakeholders for the remediation plan of GAI system issues?", "639643b4-60e7-474d-aee6-3ee349564306": "What is the role of the organizational risk management authority in managing GAI system incidents?", "acb51a42-9248-4132-bcd5-aa4101f783dd": "How should organizations document the risk controls applied to third-party AI resources?", "507836ec-d203-47f8-a680-09f83fa2a01f": "What is the Responsible AI Resource Center (AIRC)?", "0712927b-b14b-48bd-8873-1773a4748151": "What is the purpose of The Language of Trustworthy AI: An In-Depth Glossary of Terms?", "5a1bdd93-7277-481d-9646-c6981146f8d6": "How were public comments and consultations used in the creation of the document?", "4ce4e9f4-b9b5-4632-a08b-c5e41c2f4b8a": "What does risk refer to in the context of the AI RMF?", "d4e55ebe-4671-4b95-9b07-c9e5e246be26": "How can AI risks differ from traditional software risks?", "8b4d8ad8-933b-4290-9fb2-14ecdde49db9": "What are some examples of risks that are likely to materialize in a given context?", "04d3166e-c3f8-442a-a5a4-36726190ef49": "What are some examples of risks that are more speculative and uncertain?", "da1e7ff4-4699-42f3-b32e-97305e4b357a": "How can GAI exacerbate existing AI risks?", "81f01fdb-f899-4475-8c04-9e7fe197e698": "What are some unique risks created by GAI?", "88a166d0-e31c-43cf-8f58-baefce9d284f": "How can the magnitude or degree of the consequences of an event be measured in AI risk assessment?", "9ed882bf-45cd-4218-a475-bb18625ade4c": "What are the main ways hiring algorithms can introduce bias according to Miranda Bogen's article in the Harvard Business Review?", "56adf753-40ac-4593-bb8a-832feec13d31": "How is the TSA making flying easier for transgender people, as discussed by Arli Christian in the ACLU article?", "19cd8cd2-a1f6-479e-8713-95e8683eee7f": "What specific measures has the TSA implemented to accommodate transgender, non-binary, and gender nonconforming passengers?", "3e165023-0718-43ed-99b9-10cbcee9f4e1": "What are the concerns raised by the National Disabled Law Students Association regarding the online administration of bar exams?", "dfad7b64-3277-4f06-af37-d85af7857c4e": "How does automated test proctoring software discriminate against disabled students, according to Lydia X Z Brown?", "a41d0161-4967-4046-9c48-e87cea7d5bf8": "What are some examples of bias in hiring algorithms mentioned in the Harvard Business Review article by Miranda Bogen?", "bf872985-a9f6-4c68-ac13-c3442a951f5a": "Can you provide a summary of the four ways the TSA is improving the flying experience for transgender individuals?", "f53a3ba9-3917-4f06-a722-e4d54d8119c2": "What resources are available on the TSA website for transgender passengers?", "6fa39a37-eeaf-4520-b9bd-162fce45ab8c": "What are the key points in the NDLSA's report on online bar exam administration concerns?", "f4bf60dd-02c3-4248-bed1-4831c9772821": "How does the Center for Democracy and Technology describe the impact of automated test proctoring on disabled students?", "63eb9983-de78-4519-b2c8-f22b454ee053": "What are the legal and regulatory requirements for AI development and deployment?", "267043c7-c798-4c11-b2d1-9c33ddd4fb4e": "How can AI development be aligned with data privacy laws?", "d30f4bc2-2f5f-41a6-b0ca-38e7382ef444": "What are the implications of copyright and intellectual property laws on AI?", "fc798bdd-e26e-4ed1-8142-e17cd09368df": "How can organizations manage and document legal requirements for AI?", "1fc3dca0-6426-432e-bf6d-db436aa4dfd0": "What are the risks associated with data privacy in AI systems?", "3eb7529c-01dd-46f1-ba24-c428f4b98cbf": "How can harmful bias in AI be mitigated according to regulatory requirements?", "10147097-3b5f-4390-8fdb-61a55029b730": "What is the role of governance and oversight in AI development?", "b73e2ec4-11cf-4e83-9ef8-b0612a7df8b7": "Who are considered AI Actors according to the OECD?", "3f2795a8-623f-4759-be58-bac1f301777a": "What tasks are involved in the governance and oversight of AI systems?", "1dacc26f-f637-4f67-b91a-d11102d1bb85": "How can organizations ensure compliance with intellectual property laws in AI development?", "b5373d9d-ce4e-40bc-bcbc-4f675f59d1a8": "What are the disproportionate risks that AI poses to women according to the Brookings article by D West?", "029ed6d6-5b8c-45f2-8690-d47dc48f8232": "How do large language models (LLMs) perform in citing relevant medical references as discussed by Wu et al?", "3dd37534-24da-494e-b97b-5e3890f7f13e": "What evaluation framework did Wu et al propose for assessing the citation accuracy of LLMs in medical contexts?", "a89ead0f-a8bc-4db8-adae-b72aa1d2c3c5": "What evidence of racial bias was found in OpenAI\u2019s GPT when used as a recruitment tool, according to Yin et al?", "3babea8f-5928-47f3-962e-9b283207ab3e": "How can jailbreak prompts affect the behavior of large language models, based on the research by Yu et al?", "0af422b3-b85e-4b51-94fa-71fc9ab1d8fa": "What are some examples of digitally-disadvantaged languages mentioned in the Policy Review by Zaugg et al?", "1c9b32d4-4ae7-4a96-a889-035f67276bb2": "What are the potential implications of AI-induced racial bias in hiring practices as highlighted by Yin et al?", "9b7725c9-7b92-4fdd-a10f-8ec1530b228d": "How does the article by D West suggest mitigating the risks AI poses to women?", "649f7414-376a-4e58-8d1e-23d5e7ed9d6a": "What methods did Yu et al use to explore and understand jailbreak prompts in large language models?", "e78a0693-7005-4bea-89f2-c3ea112bce08": "What policy recommendations are made by Zaugg et al to support digitally-disadvantaged languages?", "9db21a04-c438-4476-ac0a-82338eae49b2": "What are participatory engagement methods and how are they used in AI development?", "97081408-da30-4645-9afe-f3307ed6cdc7": "How can field testing improve the usability of AI-generated information?", "289db7b2-4d79-467d-a5d9-9d5b231a0264": "What is AI red-teaming and why is it important for identifying system vulnerabilities?", "2d57ed17-a6f7-46f9-81ca-95cb462059cb": "How does feedback from civil society groups influence AI system design and implementation?", "4922c3b7-23a1-4ecb-9156-b04943f93fab": "What are the benefits of using focus groups in participatory engagement methods?", "f2e88045-e05b-41dc-8cec-46bbf532cb91": "How do structured, randomized experiments contribute to understanding AI interactions?", "8e4237f7-4dab-4b3e-872c-636b750a8551": "In what ways can AI red-teaming help in preventing discriminatory outputs?", "6a0cc42b-ef86-4bfe-8697-1dafa8d40ca3": "How can surveys be effectively used to gather feedback from affected communities regarding AI systems?", "a27db742-1147-4e73-b8f8-fb28f863182a": "What role does public feedback play in the maintenance or decommissioning of AI systems?", "1da6cbec-681b-41b5-8fdd-7e46b4b39a69": "How can insights from field testing be used to improve data quality and preprocessing in AI systems?", "dc7b408c-d2a4-440a-8bd3-382b37949adc": "How can I find out if my personal information is stored in a federal system of records?", "12c4f43b-f79c-40bf-89c5-5de9f0101a4f": "What steps do I need to take to contest the contents of a federal record about me?", "928f7047-c52c-49a0-aad2-2d36efcef6dc": "Are there any exemptions under the Privacy Act that would prevent me from accessing my records?", "8ee048c2-ac9d-46c0-8558-0d5e5e8a8743": "What legal actions can I take if a federal agency does not comply with the Privacy Act?", "7785c38a-a968-421a-b0d8-c15fe4003fa3": "How can I request a federal agency to amend or correct my personal information in their records?", "5af5e28f-c346-483e-8b52-dabdb08f98cf": "What kind of monetary damages can I seek if an inaccurate federal record affects my opportunities or benefits?", "6eec9174-86c8-46fc-84dc-0a9dadffd18c": "What are the procedures for accessing my individual information stored in a federal system of records?", "d9e3443e-a2be-4b7f-9ead-f1b68a8decec": "How does the Privacy Act protect my personal information stored by federal agencies?", "ed5ff628-1277-45a4-a100-1c1d064b76a6": "What qualifies as an adverse determination under the Privacy Act?", "29499a6f-b07f-4cba-b4bf-90e40d038c36": "Can I seek legal relief if a federal agency maintains an incomplete or untimely record about me?", "dd201fcb-d5b4-47aa-9fa7-584fdc9a91d0": "How do GAI systems impact the preservation of endangered languages?", "f95cd300-7368-4898-875c-8a16e2699308": "What challenges do GAI systems present to model adoption and inclusion?", "08be409c-62b9-4046-a4e5-41f7aef94b1e": "How can the use of GAI systems lead to undesired homogenization in outputs?", "165031b8-01ee-4b7e-a254-95b7729cbac2": "In what ways might GAI systems make it more difficult to use endangered languages in everyday processes?", "77d2f46d-9e77-41fd-8367-3d123120a90e": "What are the potential biases associated with GAI systems?", "41496cd8-8df9-4ece-9b75-799e48764e3d": "How can repetitive aesthetic styles in GAI outputs affect cultural diversity?", "8e9ba476-d233-4ed8-8772-0fbd52872bb3": "What steps can be taken to ensure GAI systems do not contribute to the loss of endangered languages?", "10c840b0-30ab-46e2-9109-d9b669bd57ac": "How does bias in GAI systems reinforce the problem of homogenization?", "6e44c18a-5777-4822-9e66-8bc1a5a2f194": "What are the implications of overly uniform outputs produced by GAI systems?", "85eab450-b260-459c-acfc-4403ea487fee": "How can we address the challenges of inclusion and accessibility in GAI systems?", "93694198-599c-4796-8cf1-d528b4f3fb10": "How can organizations ensure that automated systems are kept up-to-date?", "2c321c09-c163-4b0c-81f8-f536580d0caa": "What are the best practices for notifying people about significant changes in automated systems?", "65b87922-c4d3-45bc-b744-c2b89f7b4788": "Why is it important to understand how an outcome was determined by an automated system?", "cffd7b3d-0081-4a33-80e6-28b3fbf26823": "How can automated systems provide explanations that are technically valid and meaningful?", "20e03c70-f24d-4dba-9cb5-042b4cba722d": "What factors should be considered when calibrating explanations based on the level of risk?", "760cfb81-f3c9-4194-a7d3-602f41fab3e8": "How can summary information about automated systems be effectively communicated in plain language?", "f709685b-47a6-44a7-8f9e-3aa0df73870e": "What methods can be used to assess the clarity and quality of notices and explanations from automated systems?", "16141df8-9867-4de3-bcb0-a2b9fac32680": "Why should assessments of automated systems' notices and explanations be made public?", "a44f2530-9479-450c-9cfd-272c1f2071d6": "How can operators and others who need to understand automated systems be supported?", "38270bdb-0dd7-458c-b93a-daebec80be45": "What are the challenges in ensuring that automated systems provide useful explanations to users?", "c699565e-04ef-419e-94cb-1b796a737007": "What is the AI Bill of Rights and how does it relate to Executive Order 13985?", "547dfa62-9140-4639-82df-a9142ce5286b": "How do the Fair Information Practice Principles (FIPPs) influence data privacy laws globally?", "9af0586d-74db-446b-8e26-38be4dd9afc6": "What are the core principles of the Fair Information Practice Principles (FIPPs)?", "eccf5725-f424-4268-b727-1f1a40978434": "How does the Blueprint for an AI Bill of Rights incorporate elements of the FIPPs?", "abeee4d7-e9fd-4575-a169-f5d27f7e36bb": "What is the significance of the 1973 report by the advisory committee to the US Department of Health, Education, and Welfare?", "66addcfc-c316-415e-b410-381db4715a69": "How does the AI Bill of Rights support racial equity and underserved communities?", "a172a3a2-d810-4b13-909a-903ececb2cd1": "What are the key elements of the Fair Information Practice Principles (FIPPs) relevant to automated systems?", "a5209e31-d0db-40ff-9bb4-1750d45a7717": "How do the principles of the AI Bill of Rights align with civil rights and civil liberties?", "8ed364a4-97b6-4794-a155-78239f56aa6b": "What role does the Federal Government play in advancing racial equity through the AI Bill of Rights?", "cf81588a-da58-41b7-8f19-e0ed9fa5cd06": "How are the Fair Information Practice Principles (FIPPs) applied in different domains like privacy and civil liberties?", "20cc838f-302b-4a97-b9c0-048b821e21d7": "What is an algorithmic impact assessment?", "11441d7e-f3c5-47eb-9661-dc9501b61db8": "Who is responsible for performing an algorithmic impact assessment?", "96391b37-e002-4444-bc88-af07e80d1be7": "How are corrective actions taken in response to an algorithmic impact assessment?", "f173dfc5-537c-4934-943f-6a4a8209556a": "What should be included in an algorithmic impact assessment?", "adb72817-95df-4fe7-be09-43be351339a0": "Why is it important to make algorithmic impact assessments public?", "98945bdc-d7f5-48af-828b-72fdff9b0735": "How can algorithmic impact assessments help in addressing algorithmic discrimination?", "ce1d92ca-dd4d-4c46-a861-5f738828da2a": "What is the role of disparity testing in an algorithmic impact assessment?", "6739f71c-fbe1-4126-86a2-75deefb42217": "How should the results of an algorithmic impact assessment be reported?", "b3952c44-c80c-4aa5-b364-771c28f8d963": "What are design stage equity assessments in the context of algorithmic impact assessments?", "ab8785d8-fdea-42dd-9207-1331f4d206dd": "Why is it important for algorithmic impact assessments to be machine-readable and in plain language?", "ad91ce86-6dec-4abb-97c6-044f2e6af46d": "What are some examples of issues caused by the lack of human alternatives in automated systems?", "2a47278f-8456-435f-a92f-ad1569f822a9": "How did the unemployment benefits system in Colorado fail applicants without smartphones?", "4baeb7cc-0f63-4432-a61e-2cca08742d2c": "What problems can arise from not having a human review option in fraud detection systems?", "7229c62f-af34-49e6-a1b2-244381296eaa": "Why is it important to have human alternatives in systems that distribute unemployment insurance?", "a551e275-7aaf-4936-8b4a-335333fd8c65": "How can automated systems incorrectly flag entries as fraudulent?", "3185d577-2897-470b-b66d-2b878c1635f3": "What are the consequences of not providing a human fallback in automated systems?", "6b956523-9518-4fff-b4c4-3cb46fe34560": "How did the hospital software error affect a patient's access to pain medication?", "f829362b-3144-4e70-9964-54ff3cf5f3c8": "What are the risks of relying solely on automated systems for critical services?", "04775f45-fc8c-47ae-a74f-788e790dbb7f": "How can the lack of human intervention in automated systems impact people's lives?", "ff3d43c5-1076-4f90-9595-d7507024df5f": "What measures can be taken to ensure that automated systems have adequate human alternatives?", "7a87b77e-ba2b-4a75-85d3-eff3e7a4f1b3": "What are the potential harms of inaccurate inferences made by AI models?", "2af440c3-e3bc-417b-9229-b989c418f726": "How can wrong inferences of PII lead to secondary harmful impacts?", "f9ad7469-3e3c-4909-8679-251103726804": "What is the impact of predictive inferences based on PII or protected attributes?", "94623f99-aa39-458d-bf0c-452bdeae335c": "How can AI models contribute to representational or allocative harms?", "a18f484d-0c10-474e-b56a-fc1b92977406": "What are some examples of dignitary harm caused by information exposure?", "caabe18b-3881-404c-bba9-113c918db0f3": "How can extortion result from the exposure of sensitive information?", "6cb41015-478f-4102-8f71-ca101130bef4": "What are the risks associated with confabulations in AI inferences?", "b45acd2b-d605-4e83-8246-a99cd8d2ffff": "How can adverse decisions arise from predictive inferences made by AI models?", "4f89b591-6f2b-4813-bd57-b6ee9e7cd684": "What is the relationship between harmful bias and homogenization in AI models?", "259e3515-ab8c-4f3d-8cbe-178ee51a7ff6": "How can inappropriate inferences of PII disadvantage individuals or groups?", "f7f7c66a-12a1-4a76-88e9-6719de9f8272": "What are the main problems that the principle seeks to address regarding automated systems?", "0404c1f3-7897-4222-838e-d468ed48b862": "How do automated systems impact employment opportunities?", "da09c33c-a2d1-4eba-b8bb-9cadf83a607a": "In what ways do automated systems shape experiences in the courtroom?", "84e11e40-3503-4afa-9c0b-3bd17751dc5f": "Why is the impact of automated systems often not visible to the public?", "fb6baf2b-0c39-43c6-8a23-5a6286b57d3c": "How can an applicant determine if a hiring algorithm affected their job application?", "5ae8a14f-7af5-4fe1-ad8d-daa3b64b7412": "What are the potential consequences of a judge using an automated system to make bail decisions?", "b86dc33e-c44f-40f8-9201-6e77c52b2d3e": "How can individuals correct errors made by automated systems?", "44365a55-f06d-44c0-86f8-5e766884f298": "What steps can people take to contest decisions made by automated systems?", "cb8c33b7-5edf-4f02-827c-e51d99fe8c20": "Why is it important for people to have knowledge about the impact of automated systems on their lives?", "57d78d01-d80c-4a0d-bffe-90e8c5435146": "What are some illustrative examples of the issues caused by automated systems in various sectors?", "a7190971-83cc-4e5b-ad51-d097c2d2416f": "What is automation bias and how does it affect human interaction with GAI systems?", "31534a0f-52cf-452d-9a29-f8ac561198f7": "How can human experts overcome their aversion to GAI systems?", "2c413bc7-6f0c-41fa-ac50-d2f146083ecb": "What are the potential psychological impacts of emotional entanglement with GAI systems?", "f493ae8c-e533-406a-8fc5-5c6bdaad070b": "How can over-reliance on GAI systems be prevented?", "589fdab2-8712-4a25-9c59-8f26e281a6dc": "What are the risks associated with confabulation in GAI systems?", "3f801419-15e7-46cf-8d7a-d2709b6b5792": "How does automation bias contribute to the homogenization of information?", "2acf1a52-6ed2-4c87-9d62-518df86733d3": "What strategies can be implemented to mitigate the risks of bias in GAI systems?", "68b6149d-8a90-4b40-b32e-6e844ff70543": "How can humans balance their expertise with the use of GAI systems?", "bfe3017a-f8b1-49b4-8022-1d6c6b18b595": "What are the benefits of using GAI systems despite the potential risks?", "66d721dd-e056-41a0-9177-35ec1a02f2a3": "How can emotional entanglement with GAI systems be managed to avoid negative impacts?", "7994cad7-21e2-4e09-aca5-f56ef1ae8a5a": "What are the ethical considerations for developing automated systems that could potentially violate safety?", "47e3ea93-fd88-4971-8203-e36fc3545d64": "How can unintended safety violations in automated systems be identified and mitigated?", "de90f1a6-2df7-4240-944b-87dad8ddb4c3": "What steps should be taken if an automated system is found to have safety violations after its launch?", "b0f19328-390f-4526-9bd5-58e3217d2939": "Are there any guidelines for rolling back or modifying automated systems with safety risks?", "3a98c1d4-e98a-4339-a8d8-666a62f395d1": "How can developers ensure that automated systems do not have unintended harmful consequences?", "3e20c7ee-70ab-4ad1-b14f-32dfe44d0c85": "What are the best practices for ongoing risk mitigation in automated systems?", "a13b0ccd-e3a9-4ab3-afc9-d9c863fbeb66": "How should companies handle automated systems that have been found to violate safety standards?", "d904e7ea-ad3b-4610-ab7e-0e02f95f7b78": "What are the potential risks of using automated systems without proper safety checks?", "2fbedd50-8ea8-4da8-a425-802da3096391": "How can the safety of automated systems be continuously monitored after deployment?", "1ec42e53-7159-49a1-9293-810d7a184a7f": "What measures can be taken to prevent the development of automated systems intended to violate safety?", "a0842cf3-00a4-4746-87d9-6ac45ada3ebd": "What are built-in protections for data privacy?", "b76e72b6-358d-4943-98de-cad3c4c392ea": "How can I ensure that my data is only used in ways I approve?", "4f6747b8-9ad2-45ed-8979-f605d5765654": "What are some examples of abusive data practices?", "8effaebc-2db1-4d37-852d-5b080b55344a": "How do design choices impact data privacy?", "ba664a46-2556-466b-94a9-e6c9881f6bc5": "What does \"privacy by design\" mean in the context of data collection?", "412a6863-0745-4d66-8b48-137fc5c03a6e": "How can I verify that a system respects my data privacy decisions?", "a96cda8b-8d4a-4085-b297-fbf4fc69d244": "What are alternative privacy safeguards if consent is not possible?", "c4c103d2-5129-4be7-bf42-4971da92e49a": "Why is it important for data collection to conform to reasonable expectations?", "4a2850be-c31b-461e-9165-f82e606b10ff": "How can I identify if a system is using privacy-invasive defaults?", "398d3a34-f7cf-44c4-81ea-d314e9f92196": "What should I do if I feel my data privacy has been violated?", "9b1e7e8a-3e78-4c98-a0df-24b37ca791cf": "What techniques can be used to mitigate biases in GAI content and data?", "0a69cf57-ac9d-423f-896d-b9e4e02f762a": "How does re-sampling help in reducing representational biases in generated content?", "164c840b-8cfa-4c20-a441-123e95824ffb": "What is adversarial training, and how does it mitigate biases in GAI content?", "e20bd84c-d838-4049-a2df-fba4b9d06ea1": "Why is it important to evaluate GAI content for representational biases?", "387e47d4-c086-4a07-aee6-28a9fa60cad7": "What are the potential risks of not addressing harmful biases in GAI output?", "3700f1e4-cf35-4c27-b2c3-9101bf5d8dfd": "How can re-ranking be employed to address biases in generated content?", "8c76e76d-83c9-4a57-a7df-b1c0e035ef8b": "What steps should be taken to analyze GAI output for harmful content?", "7d2386c3-a371-45d9-965f-2c7a9c11567e": "What types of harmful content should be checked for in GAI output?", "badd4da0-e5f0-426d-ab2a-1019b483cc97": "How can due diligence help in identifying potential misinformation in GAI content?", "4da36b86-9edb-4192-abf8-385aa94c36e8": "What are CBRN-related or NCII content, and why is it important to monitor them in GAI output?", "f377e766-01de-4a90-9986-ecb3ee8d61a9": "What are the best practices for designing consent requests that are easy to understand?", "4490f651-668a-4e60-9931-3c6e393d09b8": "How can user experience research improve the readability of consent requests?", "68e419bb-fa35-4890-98c7-4c8a11d9c78e": "What methods can be used to ensure consent requests are accessible to users with disabilities?", "838be5c8-7e39-41a0-8cc2-5d54526523b5": "Why is it important to avoid \"dark patterns\" in user experience design for consent requests?", "8540243f-924a-413c-bdad-29d5f1240c58": "How can consent requests be tailored to different languages and reading levels?", "c05097c0-b8be-4d9f-94ad-f28a74c0bbf6": "What are \"dark patterns\" in user experience design, and why should they be avoided?", "ed30f33c-f72f-4ca9-a986-e78ea5a84f34": "How can we ensure that users understand the contexts, time span, and entities involved in their data consent?", "078872ce-c620-44bc-b9d9-715ca524c82e": "What are some effective ways to test the comprehension of consent requests among users?", "c9c8531a-c33d-47fb-9c20-0a74872c9cd3": "How can user experience design improve the transparency of data and metadata consent requests?", "bd0d1036-d121-46a7-a63d-633b1fe52539": "What role does user experience research play in making consent requests more accessible and understandable?", "64ded336-d26a-4bba-9264-29a782f46b17": "What are the potential risks associated with the misuse of AI systems by humans?", "a1524a0a-e5c7-4b05-9291-a9f012c2f8a7": "How can the distribution of harmful deepfake images impact physical safety?", "69cb94c7-5d81-4222-9d53-052f0edd2720": "What are the long-term effects of disinformation on societal trust in public institutions?", "10493f76-3a15-41b8-a590-28e28ca5d22f": "How do the characteristics of a GAI model influence the presence of risks?", "0aa175b1-cf6c-4db9-95ae-790c02ed0420": "What factors should organizations consider when measuring GAI risks?", "e8a86a82-58ef-4852-8a9f-46998fe000e6": "How can the architecture of a GAI system affect its risk profile?", "e0c9a867-2ae3-4d5e-b74c-b2145e48b693": "What role do training mechanisms and libraries play in the safety of GAI systems?", "f497ff9f-1f6b-49ff-92b7-b97bbf4e0d33": "How does the availability of model weights impact the security of GAI systems?", "82c14235-06d7-4a04-8d16-eefd798350a9": "What are the implications of using different data types for training GAI models?", "6e3592cd-fc1e-495d-9976-3cea02adf35a": "How can organizations tailor their risk measurement strategies for GAI systems?", "bb8fd71c-8305-452b-bcbf-823fa999f419": "What are the Department of Defense (DOD) AI Ethical Principles?", "84ddfcae-5a84-4ca2-b23f-9f2993a78864": "How does the Intelligence Community (IC) AI Ethics Principles and Framework guide AI use in national security?", "6afc1f62-ea09-46aa-a9b2-a2231efa41db": "What is the Blueprint for an AI Bill of Rights?", "50dbd6b6-2f67-425a-8549-e938e1e443c4": "How can the Blueprint for an AI Bill of Rights inform national security and defense activities?", "33c03e38-7064-41dd-8c15-2570eff220f3": "What are the special requirements for AI in national security and defense activities?", "c062971a-0cf8-4ef1-93b3-5fca436d15d4": "How does the federal government ensure the use of trustworthy AI in law enforcement?", "3664af6f-9a6b-4750-9157-5b8c10c049bf": "What safeguards are in place for AI systems handling classified information?", "57f12af2-eace-4916-bf6c-caa521375c02": "How does the Responsible AI Implementation Pathway impact defense activities?", "3421dbb5-bc3b-4a71-9aba-9794e6c02c61": "What role does the Blueprint for an AI Bill of Rights play in the implementation of AI policies?", "1ea5b81c-aa5d-4fad-851a-f32df353f699": "How are existing policies governing automated systems applied to national security activities?", "bb9c137b-e957-4d1b-b681-1150450070b8": "What are the potential harms of using AI to generate non-consensual intimate imagery (NCII)?", "b0543347-b171-470d-ad58-452023d32540": "How can AI-generated content be managed to prevent the creation of child sexual abuse material (CSAM)?", "420598ea-3a86-4086-a5a1-8ca8b6a218a1": "What are the characteristics of trustworthy AI in terms of accountability and transparency?", "b2067f9b-b092-45f0-9fef-ed8c776f2ec2": "How does AI-generated obscene content impact privacy and psychological well-being?", "9d318383-e177-487e-b4cc-8d2e8e8fcc13": "What measures can be taken to ensure AI-generated content is fair and free from harmful bias?", "78e29c0f-c807-43a5-87c1-f4c5adab2595": "How can the spread of AI-generated deepfakes be controlled to protect individuals' likeness and voice?", "1d9240a9-0d09-4243-869a-45ed6bd3e9db": "What are the legal implications of generating explicit or obscene AI content?", "0dd67cb2-1fd7-4f2a-8672-8384a5b08a73": "How can AI be used responsibly to avoid creating degrading or abusive content?", "558abc03-0ada-41ab-b040-b6a193e5b238": "What are the downstream negative consequences of AI-generated CSAM on law enforcement efforts?", "a03bd0ad-5366-46e0-b712-e2748c71adf5": "How can privacy be enhanced in the development and deployment of AI technologies?", "7d190ccc-08eb-4795-975a-b70b5b5615ec": "How does surveillance impact student expression in educational settings?", "36548052-71c8-4515-ac0b-ad22a66ff05f": "What are the potential negative effects of surveillance on tenants?", "9ac8b717-1ae9-40dd-a3f6-5d158e342089": "In what ways does surveillance blur the boundary between work and personal life for workers?", "6b5a119e-29e8-4818-8d39-1e9518975f3e": "How can surveillance exert damaging control over workers' lives?", "5a0058ad-c9e9-4177-8811-35405c083ed1": "Why is the misapplication of data from criminal justice settings problematic for housing access?", "a1134775-18f2-4e09-af57-88092617afdc": "How does surveillance technology shift the burden of oversight from employers to workers?", "1dc6b0e5-60ff-4939-b09e-5d09b8373385": "What are the concerns regarding the use of surveillance in schools?", "b0b4a730-7836-419d-9d06-8a4e167aa24e": "How does surveillance technology affect equality of opportunity for tenants?", "3e475a7b-f183-48f1-9831-ecd371bfa399": "What are the chilling effects of surveillance on student behavior?", "91cdf914-e675-47bf-93d5-c257b52a9a51": "How should the assessment of surveillance technologies be conducted to ensure fairness?", "2e1a0ef5-cf28-488d-8c12-76d6037e5541": "What is the process for a human review of criminal investigative matters?", "ea3e3a56-e8b5-4d12-9369-363db39673a1": "What are the statutory requirements for judicial review in criminal cases?", "dfaba32e-19b0-4171-9fff-cc08fe20d751": "How do civil rights laws protect against discrimination?", "399b8802-887c-4184-b0f2-1a2bb5d07543": "What role does judicial review play in protecting civil rights?", "9dd9b476-9945-476b-9194-d8c83c4f9121": "What are the key elements of civil rights laws in the United States?", "3ed61f5b-fb54-4c4c-b6e5-0883b23b939d": "How does the judicial system ensure compliance with civil rights laws?", "dc4b76d1-b12c-4871-9175-8b56b5ad43ec": "What are the common types of discrimination covered under civil rights laws?", "a2334897-6fd9-497a-98b9-6686d453c2ad": "How can individuals seek judicial review if they believe their civil rights have been violated?", "0c5ef9a5-ec71-4016-8ae6-d82d2f95a1c5": "What is the importance of human review in criminal investigations?", "7a2b2ba9-a488-4c90-b169-70168efcc780": "How do statutory requirements influence the judicial review process?", "3fd5f3df-b1eb-4d8b-ab8d-07dddcc7fb48": "What are some effective strategies for testing AI in crisis situations?", "3be1b1c1-3098-49a5-b204-34bfa97d73b3": "How can we ensure information integrity in AI systems?", "7a009e96-556c-4842-92a2-a7b32f8146b7": "What methods can be used to identify and mitigate harmful bias in AI?", "25fac591-48bb-4ed2-bded-de52900f6c77": "How do we address the issue of homogenization in AI content?", "ec3564d2-3ce8-4426-b4d7-b66f34d730e8": "What are the best practices for handling dangerous, violent, or hateful content in AI?", "8e35ecf3-062b-4a03-810e-8eae31b35e67": "What roles do domain experts play in AI design and development?", "a0f073dc-3521-48db-9264-58f3bd671c3a": "How can end-users be effectively involved in the AI development process?", "29b2f6cc-206a-4bd6-98c7-e2c851e3a8b2": "What human factors should be considered during AI operation and monitoring?", "a86dc0bf-80f8-4a7b-969d-cf58b6502c4d": "How can AI systems be configured to handle ethically sensitive contexts?", "481d542a-46dc-4b5e-8bbc-a6e1094820a1": "What are the key tasks for AI actors in ensuring safe and ethical AI deployment?", "4a6050b2-f6b6-4ac9-939c-2e1188e92e89": "What are the key principles for designing ethical automated systems?", "72d17156-9c97-4463-a90b-1619a6608c3d": "How can automated systems impact public rights and opportunities?", "85b5625a-d5ea-45b5-b7b3-e66d4556da73": "What steps should be taken to ensure automated systems are fair and unbiased?", "8b7eeeff-ae14-458b-978e-5c1fc9573219": "How do you integrate ethical principles into the technological design process?", "7b875bc5-cd9a-4069-bcfa-6de556eb6548": "What are some examples of automated systems affecting access to critical needs?", "ee228074-989d-4a9b-bb46-df0a26dfda27": "How can designers ensure that automated systems do not infringe on public rights?", "89b66459-d623-4a30-a195-8da50e72a096": "What role do ethical guidelines play in the development of automated technologies?", "9a2bb4f3-2d1a-4689-9dfd-70c1a4fcfade": "How can we measure the impact of automated systems on public opportunities?", "ea968134-16f4-4d5c-810d-6049e27309d5": "What are the challenges in implementing ethical principles in technology design?", "a62f4790-c903-4ecf-bd87-b92068d5138a": "How can automated systems be designed to enhance public access to critical needs?", "9e50e870-f706-492e-b58e-93871354422c": "What are aggression detectors and how are they being used in schools?", "56433327-6403-42b5-bf0e-0d4ac4b47722": "How effective are aggression detectors in monitoring student behavior?", "bfb3f439-fb7d-4a61-b36f-ce7e06ea95fa": "What are the privacy concerns associated with using aggression detectors in schools?", "2e31e7e4-1966-455f-9c93-2f0416756f97": "How did cheating-detection companies profit during the pandemic?", "552e3fce-d322-41d0-a8d1-3af4d9b6d239": "What are the main arguments students have against cheating-detection companies?", "9f9d57e8-6574-422f-a98d-9523410c912d": "How does virtual testing disadvantage disabled students?", "6f686792-3271-44f2-962a-d0c914f0a618": "What are some examples of ableism and disability discrimination in new surveillance technologies?", "608ada78-40e7-49ac-a75a-e38f46e3d296": "How are new surveillance technologies impacting education for disabled students?", "44ee99fa-4fa1-4199-a49e-31e3f890d5de": "What measures can be taken to ensure virtual testing is fair for disabled students?", "b9dd8dbc-8dcc-4aa5-ae17-13bc77130913": "What are the ethical implications of using invasive surveillance technology in schools?", "f49391ff-b450-458f-8e1d-f4b2b768a48b": "What role did the American Civil Liberties Union (ACLU) play in the development of the Blueprint for an AI Bill of Rights?", "3c010abe-44a4-4a61-9b06-c9c60c98d68b": "How did the Aspen Commission on Information Disorder contribute to the discussions on AI oversight possibilities?", "815c1373-abe0-4296-ac84-38501b0c77cd": "What insights did the Australian Human Rights Commission provide regarding the potential harms of AI technologies?", "9eec3afd-f85a-4f17-a4d9-2c0989096d84": "In what ways did the Brookings Institute influence the positive use cases of AI discussed in the OSTP meetings?", "b795e850-79da-4183-9560-e011ed68a0a6": "How did the Center for Democracy and Technology participate in the development of the AI Bill of Rights?", "0ed96dda-2f6e-4335-86b8-3a5d06011bbd": "What specific ideas did Deepmind offer during the OSTP meetings on AI technologies?", "2a6ac783-bbc1-4474-9864-2029c75aea04": "How did the Center on Privacy and Technology at Georgetown Law address privacy concerns related to AI?", "3e13f6fd-312b-432b-9012-933f8b0a169a": "What contributions did the Data and Society Research Institute make to the discussions on AI oversight?", "7b11f5c5-827e-4e70-85f7-d83417de66c7": "How did the Electronic Privacy Information Center (EPIC) engage in the conversations about AI harms and benefits?", "fc17d202-010f-4306-916d-724cc681a109": "What was the focus of the EdSAFE AI Alliance's participation in the OSTP meetings?", "690220f2-52f5-463a-a2bc-b46c7e1aa79c": "What are the key privacy risks to consider during the development life cycle of an automated system?", "e2b24491-dd1a-45d0-a381-86ca5ec207df": "How can privacy risks from reidentification be mitigated in machine learning models?", "56f6feff-327b-4075-ac32-9d237ff6468f": "What are some potential harms to non-users of an automated system due to inferred data?", "425a7779-bf1b-4757-8833-e612c9b1ea05": "How should data collection be communicated to individuals whose data is being collected?", "e03f414b-1fb3-4067-99fc-cd4b122f509d": "What legal considerations should be taken into account when collecting data for training machine learning models?", "0d06fec9-3c74-49df-bc13-1e3ac9679a8d": "How can user experience research help in ensuring that data collection practices align with user expectations?", "b13e829f-73e8-4b70-9adf-6ea6b7b298e8": "What are some effective technical measures to minimize privacy risks in automated systems?", "ad29fd63-96d1-4788-8c4e-794dd0d3f326": "How can policy measures help in mitigating privacy risks associated with community surveillance?", "cefe533c-58c1-4179-b1f7-9134e20f1d19": "Why is it important to minimize data collection in the development of automated systems?", "61db5427-3644-439f-9a42-012708bb8917": "What steps can be taken to ensure that data collection for machine learning is consistent with user expectations and desires?", "7d332e8c-9943-4cdf-8bb4-1a3b498766ea": "What is the importance of tailoring explanations to specific audiences?", "b8324cd6-d521-45f3-8ba9-08ce631df758": "How can user experience research help in assessing the effectiveness of tailored explanations?", "05f09f2b-477a-4dbf-aaec-b5af1923c6b1": "Why might an explanation to a decision subject differ from one given to an advocate or domain expert?", "f022ec7a-8358-48d6-824c-0c26e658b35a": "What mechanisms can be used to build understanding and intuitions for a stated purpose?", "469f8389-8d8d-4b27-a69a-f16514c85c43": "How can explanations be effectively targeted to different audiences?", "5e39df0c-36a5-4afa-a2f9-6c5e341815f9": "What are some methods to assess the tailoring of explanations?", "8d3feca0-94b3-4b4a-a785-23a3b9b9a23c": "Why is it important to clearly state the audience for an explanation?", "3a3c3db2-4132-4478-a847-b36068c56e01": "How does the role of the recipient (eg, subject, advocate, expert) influence the type of explanation provided?", "15467e60-3777-472b-bd0b-47bf9f467a78": "What are the benefits of providing tailored explanations in decision-making processes?", "9a7b141e-920a-487a-a055-e1e9f4f1b2e6": "How can plain-language statements about causality differ from other types of explanations?", "ab11ab5b-818a-4880-8e91-ed269bd1af2c": "What does it mean when a document states that mentioning commercial partners is for information only?", "df1199d7-da58-4fef-8f9f-07735134932e": "Why do some documents include a disclaimer about not implying endorsement by a US Government agency?", "5958036c-3258-4303-8b1a-1622e068421a": "How should I interpret references to academic partners in a government document?", "5a32b7cd-ddd5-4513-abdf-563e5cd76816": "What is the significance of stating that materials or equipment are not necessarily the best available?", "fee5f65d-cb22-46ee-8464-222e373ff06b": "Why might a document specify that it does not intend to imply recommendation of any products?", "4a58ee08-f3de-45fd-907f-e153459dc81e": "What is the purpose of including a disclaimer about non-profit partners in official documents?", "d42d824c-1120-43e8-9235-7572b76c40a4": "How can I determine if a product mentioned in a government document is endorsed by the agency?", "4a312aa6-5cb4-4c06-8984-88e91ac45dc4": "What should I consider when a document mentions commercial entities but includes a disclaimer?", "d04730cf-a6d4-47bc-a699-0e3df94761de": "Why do government documents often include disclaimers about the quality of mentioned entities or materials?", "14564a8a-cdac-40c0-a780-78be519b65dd": "How does a disclaimer about not implying endorsement affect the credibility of the information provided?", "569527ac-7ac6-431b-875e-d434eb402c21": "What is AI red-teaming and how does it help in assessing privacy risks in AI systems?", "8389f03a-5744-4818-89fe-c077ff7f056c": "How can AI systems output training data samples and what are the associated risks?", "1ccccd94-2c43-4041-a4bc-08e24d811d35": "What are model extraction and membership inference risks in AI systems?", "93b0c907-004d-4f32-8b53-a052b75beeff": "How can AI systems reveal biometric or confidential information, and what measures can be taken to prevent this?", "a7f6c8ab-1b04-4dfa-9f57-4235258646b6": "What is the importance of engaging with end-users to understand their concerns about content provenance in AI systems?", "526267ce-38f4-4e58-b51d-6ae5ff0cf0dd": "How can AI systems track or reveal the location information of users or members of training datasets?", "b79cbec1-977d-4eb4-83ae-3d2d9ac42e08": "What are some techniques for designing provenance data-tracking in AI systems?", "9fa37ff2-7f29-4880-94c1-06fb3c6e92d5": "How does the Human-AI Configuration impact the privacy risks of AI systems?", "93413343-a62f-4859-8ee9-a611536c2b93": "What role do domain experts play in the operation and monitoring of AI systems to ensure privacy?", "48834fa9-9abe-4fae-a27c-636139f88c50": "How can intellectual property be protected in the deployment of AI systems?", "65958d5c-13fc-4718-8038-77c445872b42": "What are the key expectations for automated systems in terms of data privacy?", "ffe21033-700d-4f6d-aace-0e85d2620745": "Why are traditional terms of service considered inadequate for protecting privacy?", "8c46db62-ddab-49e2-b983-32432a14f583": "How can built-in privacy protections enhance data privacy in automated systems?", "4a376bd0-31f5-4955-8cfe-1e0e65d8f7e0": "What is meant by \"data minimization\" in the context of automated systems?", "7e329714-1d9f-4b04-926d-a8d79ddfdd9d": "How can transparency be ensured in the use and collection of personal data by automated systems?", "7d478e4e-d640-4a81-a971-a2d88d655d78": "What mechanisms should be in place to allow users to control access to their data?", "61151ee6-a28e-4a40-97ad-d1edeee36eb6": "How does \"privacy by design and by default\" differ from traditional privacy measures?", "b3576af0-4c36-49f5-a0e8-247d2ec6f65d": "What are the benefits of having clear mechanisms for users to manage their metadata?", "b624d6cb-faa1-4468-96a8-136321416574": "How should automated systems handle the sharing and storing of personal data to meet privacy expectations?", "8ecd7751-64ef-421e-a44c-3231886cdc17": "What role do technical standards and practices play in the development of privacy protections for automated systems?", "632ebbb0-13c7-4a44-b49f-bb277513d09c": "What is the importance of verifying deduplication in GAI training data samples?", "e06e7091-ac74-4abc-bc2b-da388c1149b9": "How does synthetic data impact the deduplication process in AI training?", "64518426-3d37-4769-9d8d-826b0577f97a": "What are the potential risks of not verifying deduplication in AI training data?", "dc8b4a4c-213f-4f2e-932c-a9a6f8cdadcc": "How can harmful bias and homogenization affect AI deployment?", "1bcb29e6-07a9-43ff-a455-16802ef28195": "What roles do domain experts play in AI impact assessment?", "19e66fef-7521-471f-82e2-f6884868acaa": "Why is it crucial to involve end-users in the operation and monitoring of AI systems?", "488f2216-2ff2-4ee4-9851-37299ad2c6c7": "What are the best practices for ensuring information integrity in AI systems?", "64edf8a2-3462-4be0-976d-1fddeea48012": "How can AI actors mitigate the risks of harmful bias in AI systems?", "b841ebb5-559d-4fe8-881f-c79ff7004ee3": "What is the role of TEVV in AI deployment and monitoring?", "5a0bd7f7-a52e-418f-9ada-e1fe84848613": "How does deduplication of training data samples contribute to the overall performance of AI models?", "64a056c2-8ae4-4280-874c-4a01461cc3e4": "What are some examples of state and local governments responding to AI-related problems with legislation?", "d69e8d1e-a600-475f-9486-61b3c75a2df4": "How have courts extended longstanding statutory protections to new and emerging technologies?", "2dbbbadc-b880-41d0-bb6c-e682dacb3df7": "What companies are known for incorporating additional protections in their automated systems?", "2827fc62-14af-4e2c-b663-ba391d6d25ba": "What innovative guardrails are researchers developing for the ethical use of AI?", "7fb6fed7-6aae-4ccc-b597-ab7e62e9b21f": "What are the key principles proposed by advocates and researchers for the ethical use of AI?", "44938ddc-9358-4c82-94f2-840413742d55": "What is the OECD\u2019s 2019 Recommendation on Artificial Intelligence?", "61da46c4-d66a-4522-bc97-af4fc2456222": "How has the United States adopted the OECD\u2019s principles for trustworthy AI?", "3f063cef-02a0-408b-98c7-56446e0fc13b": "What are the main principles outlined in Executive Order 13960 on AI?", "b4c11f6f-dc78-45df-9b02-6c9e97e63441": "How does Executive Order 13960 aim to promote the use of trustworthy AI in the federal government?", "a88f3780-0edd-49b8-89f3-212ba3ce8b3a": "What role do government organizations play in proposing principles for the ethical use of AI?", "ba2105e2-73d4-4990-9944-6d240e81707f": "How can automated systems be designed to prevent discrimination in loan approvals?", "17ebc163-d3e6-449c-980f-7ed26f839df6": "What are the basic safeguards against bias in automated systems?", "aab856e9-8ff2-46d9-893b-b6d07ab393c6": "How do automated systems impact underserved communities?", "cbad6951-7c8a-46df-bb70-c92a3f311a56": "What measures can be taken to ensure fairness in automated hiring processes?", "79e16b79-9d36-4087-8659-146694974dfc": "How can we ensure that automated systems treat all people fairly in the criminal justice system?", "1b05d0a8-49d2-47be-ab48-25a75c6e77f6": "What are the potential biases in using educational attainment in loan underwriting models?", "a980423a-f92e-407d-8954-c365cd973ffd": "How can we protect against abuse in automated medical treatment and payment systems?", "70182aa9-6598-41d8-94c5-c86d69052289": "What proactive protections can support underserved communities against automated system biases?", "c0cdbc54-4086-43e2-9a8b-0e45b61ecc4e": "How can nontraditional factors in automated systems lead to discrimination?", "732b7212-2022-429b-9d2d-ea2f1ff7d3f2": "What are the implications of higher loan prices for HBCU graduates in automated loan pricing models?", "9875b4af-3367-4c2e-9a31-faf2702adfa5": "What are the best practices for reviewing and documenting the accuracy and relevance of data used in different stages of the AI lifecycle?", "6fe66997-2216-429a-9ef4-7fe53eb306b3": "How can harmful bias and homogenization be mitigated in AI systems?", "36ec6e8f-35e5-4186-b6d7-f265dcdef11f": "What techniques are effective for fact-checking information generated by GAI systems?", "7d63e0e7-2c2e-4330-bdf2-4c7e114b7805": "How can the accuracy and veracity of information from multiple or unknown sources be verified in AI systems?", "bfa45ef0-bea8-47fc-b980-0b69ed2e1008": "What methods can be used to develop and implement testing techniques to identify synthetic media produced by GAI?", "6df2f1c4-ff8a-4107-a463-f56276352018": "How can one distinguish between GAI-produced content and human-generated content?", "51560d91-654c-4d78-bfbe-98c8ec9efde0": "What are the recommended plans for regular adversarial testing of GAI systems?", "9fde8cf0-b0b2-45f7-ad80-cadc55db3835": "How can vulnerabilities and potential misuse of GAI systems be identified through adversarial testing?", "b5e1a791-bb5b-42e1-b095-4eddeb8cbe89": "What are the key tasks for AI actors in AI development, domain expertise, and TEVV?", "3d828c80-9b73-4da4-a5ca-9009d879a58e": "What processes should be in place to ensure operator and practitioner proficiency with AI system performance and trustworthiness?", "8fd42408-bbd3-4239-b478-4be231789ff6": "What are the benefits of providing limited waivers of confidentiality for automated systems?", "41478b94-524f-4cb6-a05f-d28d7bf4f9c5": "How can designers protect intellectual property while allowing meaningful oversight of automated systems?", "607f4dd7-ca7e-4ee9-b4a8-f5f9760aeb1f": "What measures can be taken to ensure trade secrets are not unwarrantedly disclosed during legal discovery?", "dc9d51d9-e01e-4c24-8bc5-f2d310dd159f": "Why is meaningful access to source code and documentation important in sensitive domains?", "d012d297-b626-462a-868b-099e4ebe5d08": "How can automated systems be designed to provide built-in explanations for high-risk scenarios?", "19032e5d-0bf0-4167-86e2-54f143702e03": "What is the principle of Notice and Explanation in the context of automated systems?", "46b67447-c9d2-4689-b32c-eb292015ef9b": "How can fully-transparent models benefit the examination of automated systems?", "bbd073b0-20ee-4d44-ba79-37e22da7f19b": "What are the challenges of balancing confidentiality and transparency in automated systems?", "9fd04f5e-f2a7-4d3d-b5fb-3c5182e8df33": "How can court orders be used to protect sensitive information during the examination of automated systems?", "4a50706f-2be3-4191-a799-d03cfb6bd582": "What role does legal discovery play in the oversight of automated systems in sensitive domains?", "ef610b4b-0ce3-4569-b444-685ef6d6f71d": "What is algorithmic discrimination and how can it violate legal protections?", "3332f97e-e957-4370-b156-5b2e74510318": "How can designers and developers protect against algorithmic discrimination?", "38324b8e-0942-49f8-88c3-e261660ac848": "What are proactive equity assessments in the context of system design?", "9676f8ec-7e8e-461d-a77e-337c20095d6e": "Why is it important to use representative data in automated systems?", "07c06943-1c60-4690-a161-f2c3d04c88b7": "How can proxies for demographic features lead to algorithmic discrimination?", "f8088e52-e35c-4f3b-8479-e530e41e83c5": "What measures can be taken to ensure accessibility for people with disabilities in automated systems?", "d218c959-31ff-4b08-8feb-b6cd5b7f9808": "What is disparity testing and why is it important before deploying automated systems?", "fcda6d4e-26ec-4b88-b9e2-33410629db75": "How can organizations provide clear oversight of automated systems to prevent discrimination?", "358806ca-03c5-4219-8f5d-7d6bd50c4a51": "What is an algorithmic impact assessment and why is it necessary?", "95dfc992-0553-4499-94a7-d42021d7a805": "How can independent evaluation and plain language reporting help in mitigating algorithmic discrimination?", "3c860073-dead-456a-9dd9-746a0c1f2cc0": "What is ballot curing and how does it work?", "6e31af36-593c-4b4b-a439-f6361f629e60": "Which states have ballot curing procedures in place?", "bcac432d-f310-4e4c-8294-803789746673": "Are ballot curing procedures constitutionally required in all states?", "59c27c92-ad44-4eec-b9a6-c79134babf4b": "How do election officials contact voters for ballot curing?", "753f8d63-ebe4-412c-8c70-4b6defdfe6bf": "What kind of information might voters need to provide during the ballot curing process?", "838c69d0-ff96-462d-a5ec-c67efa2bcca9": "Can a voter cure their ballot if they missed the initial deadline?", "c7ec0382-b12d-4075-915b-a29a72506cfc": "How does the ballot curing process ensure the validity of a ballot?", "22887c27-fdf6-433a-9832-9a9115f9683a": "What are the common reasons a ballot might need curing?", "fdad09f6-1e41-4f9c-9715-fffb065295c1": "How long do voters typically have to cure their ballots?", "e1115d17-d43b-4b36-8792-e50c67b9bb8c": "Are there any states that do not allow ballot curing?", "ebd1eb6d-41f7-4335-b070-d78501a2156e": "What is algorithmic discrimination and how can it be avoided?", "64a7ca44-9bdd-4f2f-bdb1-baed69c8d781": "How do proxies contribute to algorithmic discrimination?", "20367a8b-c64a-4864-bc1b-3d280f351a0e": "Why is it important to test for correlation between demographic information and attributes in data?", "d9858772-aa90-4a5a-be0c-fc5b5b333bd8": "What steps should be taken if a proxy is identified in a system?", "57ce6697-9b12-431e-8391-82fdd25840ee": "How can organizations ensure that a proxy feature is not given undue weight in decision-making?", "39f694c3-4c98-4d86-b3e2-28fd601599af": "What are some examples of attributes that might serve as proxies for demographic features?", "14fb21ac-2111-40ac-bda5-782d92f9b5a6": "What legal implications can arise from using proxies in algorithmic decision-making?", "fb146223-b6a8-49be-bb4d-631246b9b613": "How can alternative attributes be identified if a proxy is found in a system?", "b11ec9e4-e31c-4b32-b7d2-e9801186fd91": "What are the best practices for monitoring systems to prevent algorithmic discrimination?", "8fd37fe4-2c42-4678-bce5-922ed9d2dae5": "Why is proactive testing crucial in the design, development, and use of systems to counter discrimination?", "4457a37e-6d0e-411d-aea4-b1c32f5a127d": "What are the limitations of AI in different contexts of use?", "a7e21fa9-a576-4c9c-b7b8-cf1dc782ba81": "How can structured human feedback improve AI systems?", "bdaa7693-aa11-46bb-a39b-d7e351b3fff2": "What are some anticipated human-AI configurations in the future?", "bc7e0482-14cb-4e29-83b9-d34e973bcfb4": "How can harmful bias and homogenization in AI be mitigated?", "06906bd2-d444-4b50-86fc-e7d4b6caa7be": "What measures can be taken to prevent AI from generating dangerous, violent, or hateful content?", "e7276fb9-5e30-4e77-a07f-98fae0b0a30c": "How can organizations identify and document illegal uses of AI systems?", "416fc8f9-4237-4877-a514-88013a360abd": "What are the risks associated with AI in handling CBRN (Chemical, Biological, Radiological, and Nuclear) information?", "35cbeeef-7459-4fe7-bb33-74fc872c987a": "How can interdisciplinary teams contribute to the development of AI systems?", "e5be6c98-b642-4a1b-968b-8d3d71eb0fd3": "What competencies and skills are necessary for AI actors to establish context reflecting demographic diversity?", "f6636c23-4d93-4bb1-abf3-5ef8d69586c7": "Why is interdisciplinary collaboration important in AI development?", "6e27bf91-4131-4e12-b6fa-cc6d5997f88f": "What are the long-term performance characteristics of General Artificial Intelligence (GAI) that remain unknown?", "ff520072-afb0-4b73-9f62-29ac419bf82d": "How can we ensure information integrity in the deployment of GAI systems?", "4e3cb88c-db89-46db-bfaf-6efc6c06e573": "What are the potential dangers of GAI generating violent or hateful content?", "1ba43e0c-45c7-42b2-9dcf-0edbb0e71b32": "How can a plan be devised to halt the development or deployment of a GAI system that poses unacceptable negative risks?", "82d470a2-1e99-4a76-92f8-281573661995": "What measures can be taken to prevent GAI systems from generating content that violates the law, such as CSAM or NCII?", "2e5d1e86-46b3-4528-b9e2-cbe1e372e99b": "What are the risks associated with GAI generating obscene, degrading, or abusive content?", "c53e6933-dd22-42ec-865b-0cfc8a4a6f10": "How can harmful bias and homogenization be mitigated in GAI systems?", "60fdcce3-24cf-46ff-bd37-71e20af72d5b": "What are the best practices for establishing transparent acceptable use policies for GAI?", "35c63a1b-39bb-4e6e-87d1-597fbe552fb0": "How can governance and oversight be effectively implemented for GAI systems?", "7e800537-d1f9-48cc-b514-dc45ba1e805f": "What are the key components of a risk management process for GAI that ensures transparency and aligns with organizational risk priorities?", "8caffdb8-0e56-4747-8e14-5076b635e19f": "What are the key roles and responsibilities for managing AI risks within an organization?", "7a804990-826f-4344-923d-164698caefdd": "How should an organization document and communicate AI incidents to stakeholders?", "1fefa53a-88bb-48ff-8f41-3aeae62bce74": "What procedures should be established for engaging teams in AI system incident response?", "b4eb2632-537c-4adb-8f56-5f7392106c81": "How can an organization ensure that AI Actors have the appropriate skills and training for incident response?", "3e0d09b6-f68d-4dc8-bef2-d2295751db89": "What are some official resources for reporting AI incidents?", "b9023848-3972-4a1d-9214-477117a0d3df": "How can harmful bias and homogenization be addressed in AI incident response procedures?", "8b69e61b-4fce-477c-8e17-3871ba07c8ca": "What is the importance of having clear lines of communication for AI risk management?", "3003c533-bec8-424a-a54a-5bbe26b84144": "How can organizations verify the skills and training of AI Actors involved in incident response?", "6e59a970-f171-4ff5-a512-b3d6396bb916": "What are the benefits of having diverse teams for AI system incident response?", "30812fe9-ef65-459a-9731-9e837e6be7cb": "How should organizations integrate value chain and component integration in AI risk management?", "8abc3501-531b-42b8-9cec-6ed049ec1079": "What are some appropriate responses to identified privacy risks in data processing?", "473df226-ad88-4f10-8241-ea6b0ab61506": "Why is it not appropriate to transfer privacy risks to users via notice or consent requests?", "a74c77b8-07cd-430c-8aac-7b1585bc505d": "What are privacy-preserving security best practices for automated systems?", "c4688abb-c2c2-46c4-86b1-0261e15da71b": "How can privacy-enhancing cryptography help in maintaining data privacy?", "003673d2-5ecb-440b-80be-5cd34bbaa356": "What role do fine-grained permissions and access control mechanisms play in privacy-preserving security?", "cb249eee-5357-4ed7-99fb-8da55348c57c": "Why is it important to ensure data and metadata do not leak beyond the consented use case?", "af4ab8cd-cae8-4e7c-922b-8e193f1f5383": "What are some examples of privacy-enhancing technologies?", "8fbca3b4-2fde-4348-a2e2-1dede9fbabb2": "How can entities balance privacy risks and benefits in data processing?", "39179d19-89d2-4969-a2e9-b1c27831cd8f": "What are conventional system security protocols that can be used alongside privacy-enhancing technologies?", "4e933b6b-f6f3-45a9-aa9d-c54fc2d80ade": "How can entities ensure users understand the privacy risks associated with data processing?", "7a230dee-19b1-4409-ac9b-4fd593416a92": "What are the main challenges for consumers with the rise of AI-enabled products and services?", "e0de42d1-9769-4cec-a48a-c883f8a5c316": "How can communities benefit from the growing ecosystem of IoT devices and smart city products?", "1bbc381a-2090-45be-8cad-d9d9d862608d": "What role does the Federal Trade Commission play in protecting consumer privacy in the context of advanced platforms and services?", "93fdcd7f-ecce-4c63-80b4-7e3b65a0ec49": "How can consumers ensure their rights are protected when using AI-enabled consumer products?", "e3a6aac7-0d0f-47f2-a09a-5a902286de83": "What are some potential risks associated with the use of smart city products and services?", "9343529d-ade3-4b58-8c53-8a84ae0b6620": "How can policymakers balance innovation with consumer protection in the digital age?", "1402d638-7b8d-4525-9c64-93611b63063a": "What strategies can be employed to enhance consumer trust in AI-enabled products and services?", "2b45e986-94f6-441b-a5b6-ad7d5710929e": "How do IoT devices impact consumer privacy and what measures can be taken to mitigate these impacts?", "60e72442-44d0-4e8e-8f79-1d3e0616d45d": "What are the opportunities for improving community well-being through the use of advanced digital platforms?", "5f17138e-15e8-4f1b-9538-d62720ee1357": "How can consumers stay informed about their rights and protections in the evolving digital landscape?", "5c5c28fe-f220-4cfb-b5dd-59fa4fc0ed70": "What is the NSF Program on Fairness in Artificial Intelligence in collaboration with Amazon?", "1ecd21e2-5962-46c3-8ac6-39f368d94cb0": "How does automatic signature verification software threaten to disenfranchise US voters?", "9a291c46-0178-49d0-a45a-eb38560f5715": "What is the cure period for absentee and mail-in ballots according to Ballotpedia?", "df46e7f9-256e-4668-a774-41a48f74c576": "How can you tell if two mail ballot signatures are by the same person, as discussed by the New York Times?", "3bac4694-ad52-44b3-a9b8-bdd45f2f3526": "What are the main points discussed in the article \"The Low Down on Ballot Curing\" by Rachel Orey and Owen Bacskai?", "caf5e917-228f-452a-aa7e-5e4722643f18": "What are the potential issues with automatic signature verification software in the context of voting?", "d769a613-d040-42c5-b109-da27d5f9787e": "How does the National Science Foundation's program on AI fairness aim to address biases?", "2f8b1ef4-df6f-4ba6-9615-e1a85909f4af": "What are the steps involved in the ballot curing process?", "ace15994-5883-41c6-a269-9979b4205fbd": "Why is the cure period for absentee and mail-in ballots important for election integrity?", "e1eb277b-b995-4e63-a1eb-9180ffd6f139": "What examples of signature matching challenges are highlighted by Larry Buchanan and Alicia Parlapiano in the New York Times?", "076a1fc1-5b6b-46f0-b2b6-48cfac0d15e7": "What is the importance of sharing pre-deployment testing results with relevant GAI actors?", "64993f9a-4b76-4a8f-874c-3d273367f43f": "Who are considered relevant GAI actors in the context of system release approval?", "153b18fe-97ea-4516-a51c-8aee0b2f8f07": "How does pre-deployment testing contribute to information security?", "99dc15b6-9a6f-46c8-ac5b-2de91142fa28": "What are the key components of human-AI configuration in information security?", "ee485024-fbdf-4772-9401-42eb2a5b5603": "What steps are involved in the pre-deployment testing process for AI systems?", "94cb95a8-ec57-470d-b1e8-3959d8963369": "How can sharing pre-deployment testing results improve system release decisions?", "af4cbd1c-b744-4bab-97a4-ec1f323b9260": "What are the potential risks of not sharing pre-deployment testing results with relevant actors?", "0325a366-a9b0-45a5-87cf-7107248c17f6": "How does confabulation relate to information security in AI systems?", "a2a6f02b-4f15-4743-a2b5-3f2025414a01": "What role does system release approval authority play in the deployment of AI systems?", "835ee7d9-eea0-48db-a932-b70328a2b80f": "How can human-AI configuration impact the effectiveness of information security measures?", "2184e32c-4f19-4057-964f-48f6090c4d64": "What are the health benefits of traffic calming measures according to the US Department of Transportation?", "426c71f4-c8da-4c45-b83c-0cb9d64407ac": "How do traffic calming measures help in slowing vehicle speeds?", "4f9726e7-c892-47d5-941c-423f9a84d608": "What are some examples of traffic calming measures mentioned by the US Department of Transportation?", "89c9ee09-99a0-44e8-9140-622366b15748": "How can organizations monitor and fix their AI models using responsible AI ventures?", "02099e7a-c0f9-4fec-8ac9-5f7fe1eab08c": "What are some startups that focus on AI ethics according to Karen Hao?", "38cff01a-3e4d-4f0d-84b0-6e9383d80e02": "What is the role of responsible AI ventures in promoting ethical AI practices?", "2c7799cd-0027-4338-a539-47cd43e086c6": "Can you provide a summary of the article \"Worried about your firm\u2019s AI ethics? These startups are here to help\" by Karen Hao?", "dc59187d-f64f-4de6-af9d-5e6e93133b18": "What are some top progressive companies building ethical AI in 2021 according to Disha Sinha?", "6f52455b-2a16-4f6c-94cb-d9ba727691af": "How does the growing ecosystem of responsible AI ventures impact the development of AI ethics?", "16af67cc-0dfc-4203-815d-8b6bf5ef6277": "What are the key points discussed in the MIT Technology Review article on AI ethics startups?", "555d774d-d331-4349-951f-af19f683089a": "What are the main privacy risks associated with AI as discussed by Lee, H et al (2024)?", "91ef15f4-5185-4c16-9ef0-4bbb37697969": "How does data poisoning exploit generative AI according to Lenaerts-Bergmans, B (2024)?", "1c1560c2-164b-4de3-9972-65d5c636bd55": "Why are GPT detectors biased against non-native English writers as per Liang, W et al (2023)?", "b0939336-ece6-40eb-82f5-1ec5f0e3b997": "What are the energy costs associated with AI deployment discussed by Luccioni, A et al (2023)?", "e8beb28b-df88-4857-a896-9492bc49fe69": "What operational risks does AI pose in large-scale biological attacks according to Mouton, C et al (2024)?", "d799c0a7-a358-47d3-8fc2-0b8da05d95fa": "How does generative AI exhibit worse biases compared to humans as stated by Nicoletti, L et al (2023)?", "4f6a16c0-eb08-4d81-9e2d-968a9c7bbe5a": "What are the key findings of the National Institute of Standards and Technology (2024) on adversarial machine learning?", "8029f69a-cddb-4697-8f5f-a117433fee74": "How can deepfakes impact privacy according to the taxonomy provided by Lee, H et al (2024)?", "66f00bc6-ab1d-43e9-9153-e2c75516e556": "What measures can be taken to mitigate data poisoning in generative AI as suggested by Lenaerts-Bergmans, B (2024)?", "5d336249-8464-410f-8952-8b2a4b802ba1": "What are the implications of biased GPT detectors for non-native English writers as discussed by Liang, W et al (2023)?", "cca47a77-0520-490a-ba33-7fc205506cff": "What are tenant screening algorithms and how do they impact housing applications?", "193d2e40-1043-47cd-a7ed-4c589f9ed491": "How do automated valuation systems work in mortgage underwriting?", "1377b78c-14b8-431e-bbcf-a61ca726482b": "What role do workplace algorithms play in determining employee pay and promotions?", "b20bfb27-3464-4d36-af79-19e0efb7136b": "How are virtual or augmented reality programs used in workplace training?", "b63ce3cf-4572-4655-8f8c-f0590a07b1dd": "What are the implications of electronic workplace surveillance on employee privacy?", "518edd21-747b-416c-a5e4-eded44945fd5": "How do AI-assisted diagnostic tools support clinical decision making in healthcare?", "f29882f4-75bf-4ba7-8c1a-4908f184296a": "What are the benefits and risks of using medical AI systems and devices?", "0477b1d1-9503-4a65-9872-d4e96a8ba1b1": "How do predictive models in healthcare influence patient treatment plans?", "cb0e5e06-fc4b-4849-a9f5-cc5a5541d9c4": "What are the ethical concerns surrounding the use of algorithms in employment decisions?", "675faee1-4b6f-46f9-9004-bfea75569eee": "How do automated valuations from online aggregator websites affect home insurance rates?", "e3b5b92f-9f7b-4c54-9240-dfaff35e382f": "What information is required to build or validate a risk assessment?", "50ddae98-3e18-4f13-87df-bdf5c87c3e49": "How can the public access information used in risk assessments?", "857942ee-2e35-4394-93cc-4a1070f88dbf": "Are trade secrets protected in criminal cases?", "039a84a0-ad22-41a4-9569-a900c59cd915": "Can trade secrets be used to prevent discovery in criminal matters?", "730583a5-c594-465e-b9db-d94372af5b92": "What are the legal implications of using trade secrets in criminal cases?", "a399efb4-2fe3-4b7d-bb74-468cb88c6692": "How does public inspection of risk assessment information impact transparency?", "25b7a363-4a6f-4e92-bf19-820353d20eda": "What constitutes a trade secret in the context of criminal law?", "e89b7e4e-9d0c-49e9-ba4b-d96fb7f38d1d": "How does the law balance trade secrets and public interest in criminal cases?", "43939503-05a7-4f81-a001-b61fae0e6cf3": "What are the consequences of failing to disclose information in a risk assessment?", "741c8a8a-a15d-4b18-b19a-a167119ce939": "How can parties in a criminal case challenge the use of trade secrets to quash discovery?", "ce483416-c348-4911-9628-813050e4eeab": "What are the best practices for limiting the scope of data collection to avoid mission creep?", "2ca2c34f-c0e3-4a49-bb51-b639dcabcfe2": "How can organizations determine if data collection is strictly necessary for their identified goals?", "361b48b8-e93c-4e16-91a5-cc5e07f1fe3d": "What steps should be taken to minimize data collection as much as possible?", "ac634aac-bdc9-4b09-83c7-537d7fab01bb": "How should organizations assess new privacy risks when using data in a different context?", "7f844336-cb98-4ae3-b02c-d29460977665": "What are appropriate mitigation measures for new privacy risks, and when is express consent required?", "09a89a5d-baf9-44e7-97ce-9150f52dcddb": "How can clear timelines for data retention be established and enforced?", "145c8074-9a0f-4eeb-a364-f358745607c7": "What are the legal or policy-based limitations that affect data retention timelines?", "9f2b34d5-6f6f-477a-95d2-34caa90de98d": "How should data retention timelines be documented and justified?", "1e82f71e-654d-42ec-9c14-6dadbe1f6a21": "What methods can entities use to proactively identify potential harms related to sensitive data?", "99c21c13-0f1b-4e41-ba73-66b99a72b9f5": "What strategies can be employed to manage and mitigate risks associated with the collection, use, sharing, or storage of sensitive data?", "3be3f630-af00-421e-9293-5b36b1457f21": "What are the AI RMF functions and their corresponding tags?", "15856cf5-933b-4a51-9b87-1a41b7989c41": "How should organizations determine the applicability of suggested actions to relevant AI actors?", "f8eeb340-f824-4954-8bba-97e13a1eaaa4": "What does the Action ID GV-11-001 represent?", "41e2ede8-bed6-4392-91c8-4d6e11fd5723": "Are suggested actions for GAI developers always relevant to GAI deployers?", "8d49c1c5-f878-4154-9587-d0639e096bfe": "What information is included in each table of suggested actions?", "256b9f00-7e6f-424f-a18c-4c07a21a9c0a": "How are GAI risks linked to suggested actions?", "2fefdcdf-4aed-4bf3-a395-cca2e7e6f51f": "What does the tag \"MP\" stand for in the AI RMF functions?", "5073c0c1-051a-4a7f-8466-425db5f7c409": "How can organizations manage GAI risks according to the suggested actions?", "6a8808c6-ab61-4357-826e-0a9c216b874d": "What are AI Actor Tasks, and how are they related to subcategories?", "ac5de47b-969a-4190-8637-c26262014360": "Why might not every AI Actor Task be listed for each subcategory?", "2d85a293-4a92-4d77-a148-01e6bdb2e171": "What are the best practices for identifying and documenting how a system relies on upstream data sources?", "fa278b40-585c-4815-898c-0b82776e868b": "How can one ensure the integrity of information when a system serves as an upstream dependency for other systems?", "d2d872e7-55fe-471f-8a3c-444fd24feaeb": "What methods can be used to observe and analyze the interaction of a GAI system with external networks?", "ce2f6805-1d0b-408b-93cb-df89733e20d7": "How can potential negative externalities be identified when analyzing a GAI system's interaction with external networks?", "f0e5e018-68e2-4930-9f82-18a05118dd73": "What are the key considerations for ensuring scientific integrity in experimental design and data collection for GAI systems?", "aaf22726-5e88-48f2-9816-290e976a2c52": "How can the accuracy and reliability of GAI output be assessed effectively?", "621c3d3b-6588-4b26-817f-34cf97d21faf": "What strategies can be employed to validate the authenticity of GAI output?", "d4ebcdf7-e442-4f4e-ae79-bc5b7049698f": "How important is content provenance in maintaining the integrity of information in GAI systems?", "1ed4e09e-46b0-42fb-8f66-ad56d901feb1": "What are the risks associated with the integration of value chains and components in GAI systems?", "4ee25323-db4d-4006-941f-65f9ef0a30a2": "How can one document the trustworthiness and construct validation of a GAI system?", "c87b4890-2e5b-4bac-9ab2-38345179a167": "What are the current consumer data privacy protection regimes in the United States?", "a5cec61b-fe2c-4f0a-b43c-0bcfda0a4e61": "Why does the United States lack a comprehensive statutory or regulatory framework for personal data rights?", "cd837571-a21f-4d34-be84-a254ecaabd8e": "How do existing laws guide the collection and use of personal data in specific contexts like health and employment?", "bf81addc-77e6-4962-a28d-6a88b104c798": "What are the potential harms of not having a standardized data privacy protection regime in the US?", "0a2781a2-70af-4a14-833a-be0db30d26de": "How do state-level consumer data privacy laws differ from one another?", "70ebdeb5-d993-421c-98de-6f8c8a151dcc": "What additional protections could assure the American public about the use of automated systems?", "c3a7e646-03e3-4fcb-a49d-f6aeb95cd652": "How does the patchwork of laws affect the application of data privacy in an automated society?", "b2069dc4-e694-456f-ac4e-bc92042d8f57": "What are the challenges in applying existing data privacy laws to new technological contexts?", "eaf0aa98-7660-4a3d-9f6e-c63c68dafdbc": "How can consumers ensure their personal data is not being monitored or collected without consent?", "d8553bac-b1a1-4c02-9567-b5f42bb59bee": "What legal authority is required for automated systems to collect personal data in the US?", "6a84a0e6-451d-4969-8be6-245780aeb397": "What is prompt injection in the context of GAI systems?", "7b29eb41-5e52-429f-af23-ae265e916f3f": "How do direct prompt injections differ from indirect prompt injections?", "f9c5155b-5175-472a-bbc4-0b5013dfe6b9": "What are some potential consequences of direct prompt injection attacks on GAI systems?", "8318048b-c34f-44ee-a2ba-511717b16077": "How can indirect prompt injections exploit LLM-integrated applications?", "0eb2f6c5-07ed-4df1-b0ee-9772ba08a943": "What are some examples of vulnerabilities that can be exploited through indirect prompt injections?", "1d52cdc1-e84a-4d67-80f9-7540a2133c4c": "How can querying a closed production model reveal previously undisclosed information?", "7b697db4-b43e-445e-bdaf-c9ceb08eb05e": "What measures can be taken to protect GAI systems from prompt injection attacks?", "41daecd9-dceb-4f72-a42a-e18ea7fda937": "How do conventional cybersecurity practices need to evolve to address prompt injection threats?", "fd25cb30-3e1b-4f40-bd7a-02df040ec85c": "What are the risks associated with malicious prompts in GAI systems?", "c5b9acfc-ac53-4dbd-85d3-f28fa4f32c26": "How can security researchers demonstrate the impact of indirect prompt injections on proprietary data?", "6d74ac43-d15a-4127-8db7-cef0fdb9d105": "What is the importance of using representative data in system design?", "c71c8dd4-63a7-4818-b770-97043dc5007e": "How can organizations protect against proxies for demographic features in their systems?", "2d5bfd5e-dbdc-4c0c-818e-615f91006738": "What are some best practices for ensuring accessibility for people with disabilities in design and development?", "0029c940-ec04-411f-a02c-3d2ed811162a": "Why is pre-deployment disparity testing crucial in system development?", "a07d446c-3b58-4fde-86ea-42a39458f472": "How can ongoing disparity testing and mitigation improve system fairness?", "c3e83063-2c07-421c-8e37-a16fff3f39e8": "What role does clear organizational oversight play in maintaining system integrity?", "606bee4d-8e16-4cd6-a403-2f19c040f21c": "What is an algorithmic impact assessment and why is it important?", "553267de-5d7a-4b26-91a6-2066782e1eca": "How can independent evaluation contribute to the transparency of algorithmic systems?", "2663ee64-79f0-4c1f-8410-651d596a09cb": "What should be included in plain language reporting of algorithmic impact assessments?", "dddf4214-014b-4cae-a517-b49cd94d6dbb": "Why is it important to make disparity testing results and mitigation information public?", "791a3b0f-42da-4f1e-8230-e984b9e83a5d": "What are some examples of automated systems that can impact civil rights and civil liberties?", "2e9b844a-3516-48c7-9857-37ddb2b13880": "How do automated content moderation tools affect free speech?", "41172f4c-70e5-4cec-9baa-a1647ae750e3": "What role do predictive policing algorithms play in the criminal justice system?", "e28c299b-5a05-4d08-b18b-a133fd152cee": "How can automated license plate readers impact privacy?", "89e46e02-8e3a-48fb-aee7-332e3cb87322": "What are the potential risks of using real-time facial recognition systems?", "d4f21fa8-9d60-4e63-b735-56afa6012b7e": "Why should the Blueprint for an AI Bill of Rights cover automated systems that do not yet exist?", "6605c4f9-86eb-48ba-970b-2ec5cbda43d5": "How do surveillance algorithms affect civil liberties?", "ed41893b-1bb9-4e32-bf94-8499f5845e84": "What is the significance of including speech-related systems in the AI Bill of Rights?", "06f4e666-7e80-47d4-920c-020d8e66d063": "How can risk assessment algorithms in the criminal justice system impact individual rights?", "d8fdf8f4-8a77-4d9d-9d04-353cf7713d24": "What are the implications of using automated systems for surveillance in terms of privacy?", "94bdbb5b-6d65-480b-8601-b46cc88fc568": "What are the potential harms of AI systems in terms of political opinions, sex life, or criminal convictions?", "455d3295-e1b6-4838-9757-ee00fbf6fc3f": "How can disparities between groups lead to harm when using AI models?", "dcad9f20-5d3c-4fa0-a3da-0807a6e8e29c": "What challenges arise in establishing a baseline scenario to measure harm caused by AI?", "a9fffb40-a9a9-44a4-8bd7-139528a1ab89": "How can biased behavior in AI systems result in harm to different subgroups?", "d0babf07-9aad-4ae7-a6cd-85ecdcba8291": "What constitutes an unambiguous harm caused by an AI system?", "89597661-548a-4a06-a978-89132aba1eb0": "How can we determine if an AI system has worsened someone's situation compared to the absence of the system?", "f9670d38-896e-4fbc-8f5b-b9d0037c76ff": "What are some examples of harm caused by disparities in AI behavior?", "a0b6a03d-c670-468c-bce1-9294b6d93b53": "How do divergent views on disparities in AI behavior affect the assessment of harm?", "86dbbc9d-37e8-4fa1-87dc-808e4eb2b54e": "What mechanisms can be used to identify harm caused by AI systems?", "001c0aca-6ef2-4987-9528-4e438dccb697": "How can we address the issue of biased behavior in AI to prevent harm to subgroups?", "ff4430a8-31f2-4f0d-a6e0-5c8649634b27": "What are some effective strategies for disparity mitigation in automated systems?", "e535b78c-e479-4e22-9856-3ae2f3a944b8": "How can we identify and evaluate multiple models to select the one with the least adverse impact?", "07577988-b22e-464d-a114-5a3836a9b93e": "What steps should be taken if adequate mitigation of disparity is not possible in an automated system?", "dbb54f3d-f426-42fa-85ac-fdf51750e91c": "How do unobservable targets lead to the inappropriate use of proxies in automated systems?", "7fdfe1a9-36d4-4691-885b-a3946764874a": "What legal requirements exist for mitigating or eliminating disparities in automated systems?", "7cae1803-9318-4bf5-a8b5-7013514edc4f": "How can modifying data input choices help in reducing disparities in automated systems?", "692e4a6c-a9d5-46ca-a0d6-9a31d7f06f67": "What are the potential consequences of algorithmic discrimination in automated systems?", "9601cee0-678d-42b5-a2a6-8db03a41e877": "How can we ensure that an automated system aligns with equity goals?", "087c8f2b-0171-4cb4-81de-f085a3a439ca": "What are the best practices for conducting a disparity assessment in automated systems?", "9ed4da28-5f9b-4191-8f88-b3d3f17c019c": "How can meaningful harm caused by disparities in automated systems be identified and addressed?", "1a5f3970-e2ad-4c5a-b2f2-464b42ba6670": "What are the common sources of bias in GAI training and TEVV data?", "1f4eaffe-4d1e-4e65-927f-b30861a0c252": "How do differences in outcome distributions across groups affect GAI systems?", "7108defb-707d-4f17-be57-997ab61d8de5": "What is the impact of the digital divide on the representativeness of GAI training data?", "dbfa0169-4237-4e27-a0a2-6f6add38775e": "How can latent systemic bias in images and text be identified in GAI systems?", "786162d0-4467-47da-a17d-83e793b39e99": "What role does demographic group coverage play in the effectiveness of GAI training data?", "2dccbfb2-4d4e-4e46-bb34-553b404afd69": "How can input data features act as proxies for demographic group membership in GAI systems?", "2026e84e-f0b0-41f3-a034-e2ee060d5e42": "What methods are used to filter hate speech in GAI system training data?", "af8f1310-f89e-41d6-a386-57d253594be4": "How prevalent is GAI-generated data in GAI system training datasets?", "cc1890d2-8f2e-48d0-abcb-8f49bfb2f5b2": "What are Winogender Schemas and how are they used to study gender bias in GAI systems?", "2ee7b790-cd75-4629-a52f-8036fad31546": "How can the completeness and balance of data sources be measured in GAI training data?", "53c25f8b-f67e-480c-ab2a-951cfbd311df": "What are the technical risks associated with advanced AI models?", "8be2ee75-d646-4383-b30c-966d720b0fa8": "How can AI confabulation pose a risk to safety?", "f18be8d3-47f5-4006-83fa-afb8ce01872b": "What are the dangers of AI making violent recommendations?", "4a8b4330-7921-4bb8-becf-4ea1bb6b54e3": "How does data privacy become a risk in the context of advanced AI?", "ce71108e-36bc-49d1-a29d-19023f609a26": "What is meant by value chain and component integration in AI risk management?", "4a77b200-1ee4-4bbb-b131-970c384060be": "How can harmful bias in AI systems be mitigated?", "3aa2d071-ce40-40d5-be9e-8219f64dbef9": "What are the potential risks of AI misuse by humans?", "73bb4bbd-de45-44ae-9b2f-d51c7dc9c39c": "How can AI be misused to spread obscene or abusive content?", "e5a3d5df-7333-4465-9aef-c982135b06e1": "What are the systemic risks of AI to the ecosystem and society?", "92a08a8e-413f-431b-92b3-ab96effc5cfb": "How does AI impact intellectual property rights?", "4e3b03a7-bfc2-43b1-b05b-f1a0c38eff6c": "What is algorithmic discrimination?", "70f62e50-5170-4ad9-928d-15660d1f86b5": "How can we protect against algorithmic discrimination?", "674c4e49-a7d5-47f2-bc90-df8320d389ce": "What are some examples of algorithmic discrimination?", "c61b9e7b-0fb9-4e82-a7c4-64d87b67c0b2": "How do algorithms lead to discrimination?", "2e142a47-da67-4d69-b1f4-c340f690597a": "What laws exist to prevent algorithmic discrimination?", "4e2fb6ff-c26c-4485-adb5-69581eb0a253": "How can companies ensure their algorithms are not discriminatory?", "114af13c-f1ec-49c5-a9a2-f604e098e204": "What are the ethical implications of algorithmic discrimination?", "454c3073-ee6a-49e6-b85d-712601950be6": "How can algorithmic discrimination be detected?", "890c20df-f21b-467f-9126-136a56509c15": "What role does transparency play in preventing algorithmic discrimination?", "ff14594e-b5c4-4958-99b5-c3c354b9f502": "How can individuals protect themselves from algorithmic discrimination?", "4b585781-3f5c-4022-b77a-4d5874711f71": "What is the significance of the watch list that Chicago police fought to keep secret, as reported by Mick Dumke and Frank Main?", "c3bfc377-21d8-4ea9-aa9d-28bf11fa7174": "How does the ACLU case in Idaho highlight the pitfalls of artificial intelligence decision-making, according to Jay Stanley?", "04ce1a4c-76ce-4640-9775-83d32fb8e781": "What are the key provisions of the Illinois Biometric Information Privacy Act that became effective on October 3, 2008?", "ee94abbb-0f06-48b9-944e-c9be35cad15f": "What is the ABOUT ML Reference Document by the Partnership on AI, and what does it cover?", "d9f37ef0-5071-4f8e-9872-db98336653a5": "How does the model cards framework contribute to transparency in machine learning models, as discussed by Margaret Mitchell and her colleagues?", "66ebcef0-85e0-4e6d-afc7-bdd573d73837": "What were the main findings of the Chicago Sun Times article on the police watch list by Mick Dumke and Frank Main?", "508213e7-c376-4ead-bb89-162fc3fef0e7": "How does the ACLU blog post by Jay Stanley address privacy and technology concerns related to AI decision-making?", "67c9bee6-f621-4966-ba5b-b12a16c01f45": "What are the implications of the Illinois Biometric Information Privacy Act for businesses and individuals in Illinois?", "061e1226-744d-4d65-8114-0fbadd9b3d06": "What is the purpose of the ABOUT ML Reference Document, and how can it be accessed?", "af11a645-0690-4cf6-929f-476f6853ee58": "Who are the contributors to the model cards framework, and what are their roles in the development of this framework?", "d7605540-f9a3-4e51-9036-60f1c4df408b": "What is the Biometric Information Privacy Act in Illinois?", "379f0256-6648-4343-82bd-85d0ba551fe2": "How does the Biometric Information Privacy Act protect individual biometric data?", "097159ce-edec-42b3-8e7d-f7eaa02730ca": "What are the provisions of the Biometric Information Privacy Act regarding the use of biometric information?", "80dcda41-28de-4d4b-a5f6-d968bf53fca2": "How are people in Illinois notified about the use of their biometric information?", "ada88ac3-f4cc-4c8c-9572-1eef6b100f8c": "What are some real-life examples of laws protecting biometric information?", "a9cc0b3d-ed88-41d5-9b61-453f88b305d5": "How can technical and sociotechnical approaches protect rights and access to biometric data?", "465a72fd-3256-436b-8e18-d0a099b3fc3a": "What are major technology companies doing to communicate with the public about biometric data use?", "8ffdf82f-7776-4d09-8d87-dd3b9b2d6dce": "What are the requirements for private entities to collect biometric information in Illinois?", "81883056-15e0-4dac-a219-beb17eae9f58": "How do policies help in protecting biometric information?", "30810cb5-f31d-468a-b938-a53597ae1d54": "What practical approaches can be taken to ensure the protection of biometric data?", "e7dc392f-0994-4434-83ca-5a2b95bfb984": "How have chat-bots and AI-driven call response systems improved customer service?", "d17c2c7a-b481-4a0a-8c1f-ecce10c054d1": "What are the benefits of using partially automated customer service platforms?", "1fd47749-e6b5-4a4e-9982-0d7a4096be47": "How do integrated human-AI systems enhance the speed of customer care?", "886cbf14-7c71-4800-97a2-a3f8f91c9aef": "Why is it important to maintain human agents in customer service despite the use of AI?", "c68e9ed0-dbc2-47cb-8531-79bafa03558c": "What role do human agents play in resolving complicated customer service requests?", "009e2017-2f03-4ae5-80e7-1e266e24c0c1": "How do businesses compile common customer problems for human agents to review?", "7e569e34-0129-4adc-9ffa-13874c019581": "What are ballot curing laws and how do they function in the context of voter signature matching algorithms?", "97e257bf-87aa-4bbd-a07a-8ebb0d758152": "How many states have ballot curing laws that require a fallback system for voters?", "78b69abb-f1c6-4398-9e4e-619d89054b29": "What happens if a voter signature matching algorithm incorrectly flags a ballot as invalid?", "9ede1912-c15f-41cf-83b6-4ac0a0be6c0f": "Why is it necessary to have a review by an election official in the ballot curing process?", "1c3e63ce-81d0-49de-920c-d4c81fd0d223": "What can I do if a former employer provides false information about my job title?", "729f05ea-87c5-43a9-8190-306ccc177546": "How can false data from a previous employer affect my future job prospects?", "99785c94-c276-4ed1-8039-13f1d0943fdd": "What are my rights if a company supplies incorrect information about my employment history?", "0c4d45a4-e1e2-46e5-b8cd-59ac132cfb62": "Can a job offer be revoked based on false information from a previous employer?", "fd23ff35-ce12-4ab5-8f00-6522d5466c82": "How can I dispute false information provided by a former employer to potential employers?", "68940d08-efcc-42d0-96b0-7e26d8c550cc": "What steps should I take if I find out a former employer gave false data to a bank or landlord?", "b8ac00ac-57f4-4259-aead-6d6f608ccea9": "How can false employment data impact my ability to rent an apartment?", "fe589612-ce8a-4fec-bfb6-4a9173dff0a2": "What legal actions can I take if a former employer provides false information about me?", "ae7f2e11-db6c-470f-9093-9964aba79b39": "How can I prove that a former employer supplied false data about my job title?", "9ccf00e2-cd6a-4824-8e75-cb8c6bc51c37": "What are the consequences for a company that provides false employment information?", "d7947ff9-c5a1-430f-a50d-48369fe5d238": "What is the National Science Foundation's program on Fairness in Artificial Intelligence?", "da12cd0e-8846-4a5c-84a5-84fc2b21b168": "How does the National Science Foundation support research in explainable AI?", "aad8a5bb-bb98-4c8c-942a-60d55b2f3a3a": "What are the goals of the National Science Foundation\u2019s program on Fairness in Artificial Intelligence?", "62e9df72-50c1-414a-85e4-ec1b02cc7b3a": "Why is explainable AI important in the context of fairness in artificial intelligence?", "e688d828-a12e-4b21-a574-d41223a895e4": "What kind of research foundations are being developed for explainable AI?", "d9a5744c-7e1e-4f1c-bfe4-9ccafe96cd82": "How does the National Science Foundation define fairness in artificial intelligence?", "bc9af756-894b-4f0e-936f-fc6f94db6b7b": "What are some examples of projects funded by the National Science Foundation\u2019s program on Fairness in Artificial Intelligence?", "c24ff655-ee05-4769-96a1-1598937bb5d5": "How can explainable AI contribute to the development of fair AI systems?", "6c682518-b844-4763-a6a6-0c784122c7e9": "What challenges are associated with creating explainable AI?", "02b62987-5164-4ddb-b1ea-ea1c5ae2bfa2": "How does the National Science Foundation\u2019s program on Fairness in Artificial Intelligence impact the development of AI technologies?", "9d1e0807-b733-47c7-aab7-6db6d469a140": "What are the legal limitations on reusing sensitive data in domains like finance, employment, and housing?", "11e017f1-450d-484e-80d0-fd445c1441ff": "How can extra oversight ensure the safety and efficacy of sensitive data reuse?", "09d9a596-3e41-43ef-83c1-590975022445": "What are the benefits and risks of reusing criminal data for civil legal matters?", "1845dce6-8092-4224-b27c-4416e17dad7c": "What measures can be implemented to mitigate the risks associated with sensitive data reuse?", "aa8a4f38-7a8e-4236-a7d0-6066bfef485e": "How should sensitive data be labeled to identify contexts for limited reuse?", "31b0b161-5d09-4e06-8df0-3cd3719087e0": "In what ways can aggregated datasets replace individual-level sensitive data?", "eba60a78-3558-4289-b6c4-c260c5ddd08d": "What are the requirements for demonstrating the safety and effectiveness of automated systems?", "3e075c52-14a9-4ce8-a841-7081ebf2773f": "How can automated systems be designed to allow for independent evaluation?", "76205606-28f9-4aa8-b954-f88b34b55c55": "What are the potential benefits of private sector use of sensitive domain data?", "da56e9b1-2461-4b61-9841-d2518ab0182c": "What are the criteria for legally authorizing the reuse of sensitive data in other contexts?", "9c269a12-6410-4ffb-b5cc-7e74a8f47bd2": "What are the National Artificial Intelligence Research Institutes funded by the National Science Foundation?", "b2d39dd5-4224-4f84-9380-d8ed71a03606": "How can I apply for funding opportunities in Cyber-Physical Systems through the NSF?", "607bb0c5-d732-4661-89d2-8c8968dc8954": "What is the Secure and Trustworthy Cyberspace (SaTC) program by the NSF?", "137febbc-d1a5-48ce-ae7b-8fbe207161b9": "What are the objectives of the Formal Methods in the Field (FMiTF) program by the NSF?", "0dad671a-1be1-4246-86ac-e3a70cf4fa38": "How does the NSF's Designing Accountable Software Systems (DASS) program work?", "5e1f7127-82d6-481e-b40c-00469b2a02f1": "Where can I find more information about the National Artificial Intelligence Research Institutes?", "ff09d5ba-b0ce-431f-a9e6-6443aef1d947": "What types of projects are eligible for funding under the Cyber-Physical Systems program by the NSF?", "ab935b74-ec3e-4c32-9554-a212ec3eac3e": "What are the key focus areas of the Secure and Trustworthy Cyberspace initiative by the NSF?", "77e27420-8614-491c-870b-1f18f4bc11ea": "How does the Formal Methods in the Field program contribute to advancements in technology?", "5c9a5427-5b74-4e51-97bf-ff3fe62e0773": "What are the requirements for submitting a proposal to the Designing Accountable Software Systems program by the NSF?", "ff62ad50-d65f-41bd-aee2-94ee02783edd": "What are the potential risks of automating HR functions like performance evaluations?", "fae2091d-78df-4aeb-84f0-c4796d91062a": "How can errors in automated medical systems impact patient care?", "1174d0d9-9f4e-48c8-b445-47e1b63e081e": "What steps can be taken to ensure automated systems in healthcare do not deny necessary treatments?", "a7594475-953f-4c1b-ba9b-7e06027df340": "How do automated HR systems handle employee appeals or disputes?", "38758d4b-c5d6-4e3f-a96c-ca37a83ffa88": "What are the ethical considerations of using automated systems to make employment decisions?", "8ff16b60-4549-4d28-a5f8-d09dc421e48d": "How can companies ensure fairness when using automated systems for performance evaluations?", "1e5dacbd-129e-4493-b540-f6526c84911f": "What are some examples of automated systems causing harm in the workplace?", "23c3efca-d4e8-49c3-b686-8b432530b4f6": "How can employees protect themselves from errors in automated HR systems?", "70b624ad-4e3d-49ea-b622-028680721234": "What role should human oversight play in automated decision-making systems?", "53b65fc2-c35d-42d3-bd12-9411f43f20fe": "How can organizations balance efficiency and fairness when implementing automated systems?", "79527f3f-64a1-47c2-8080-526e87d6de07": "What are some novel methods for measuring GAI-related risks in content provenance?", "6ecf170a-bccc-40bf-a94b-cdee16acc4b6": "How can we evaluate the effectiveness of technologies in detecting offensive cyber activities?", "2a759b35-2e4f-4be9-b7cd-da0671a48a2f": "What are the challenges in maintaining information integrity while assessing GAI-related risks?", "05a5cf4b-6f21-4f0d-a726-782a1b5f0055": "How do current technologies measure the risks associated with CBRN information or capabilities?", "7464ee39-be9e-4591-9805-942ced6f3320": "What strategies can be employed to ensure AI models produce factually accurate outputs?", "623fdaff-f939-45e1-b135-53865f42ef09": "How can harmful bias and homogenization be mitigated in AI configurations?", "cec41fa7-ba2b-4f27-b233-a38c64d2be39": "What are the implications of AI-generated obscene, degrading, and/or abusive content?", "4e306b7e-b18d-408a-a7ff-ff6ef4bb5ef0": "How can we balance the need for reliable AI outputs with the prevention of harmful content?", "861cc15d-b987-4ae4-8da8-87774f1fd4a2": "What role do representative AI actors play in managing GAI-related risks?", "9e1b0b50-9c70-4f88-b9e9-1bce21f959c9": "How can we improve the reliability of AI models in the context of offensive cyber threats?", "312e6911-48ad-414d-b366-80e0cca7c405": "What are the risks associated with increased attack surfaces for targeted cyberattacks on AI systems?", "822e0d55-b6d6-4fd6-b0aa-970bda988794": "How can the availability, confidentiality, or integrity of training data be compromised in cyberattacks?", "b39af8a9-fdbb-4957-b79a-1ff8ff6bebfd": "What are the potential intellectual property issues related to the replication of copyrighted or trademarked content using AI?", "789e4c72-791b-4dea-8f9f-92ecbfb598d6": "How does AI ease the exposure of trade secrets and what are the implications?", "f4b466db-87c7-4ab8-8d5b-cf86ef2d84e5": "What are the dangers of AI in producing obscene, degrading, and/or abusive content?", "e5767722-faaf-40d4-a45c-7a1913c24ca6": "How can synthetic child sexual abuse material (CSAM) be generated using AI, and what are the risks?", "e81ed8e0-0b64-4bec-b518-b4f8140f20b6": "What are nonconsensual intimate images (NCII) and how can AI contribute to their creation and distribution?", "583946a4-f8da-4e37-9457-b91e6a6ee12b": "What challenges arise from the non-transparent integration of third-party components in AI systems?", "63097304-7442-4cef-88eb-325c2ccf4638": "How can improperly obtained data affect the integrity of AI systems?", "e17ed95d-b504-4234-b183-12b62f58b109": "What are the risks associated with improper supplier vetting in the AI value chain?", "3f995ade-9508-4868-9f0c-834fe1fedd5d": "What are the key factors considered in health insurance risk assessments?", "faaf64ee-40f7-4b25-9728-d640745e0a90": "How do wearable technologies contribute to wellness apps?", "03221c60-4936-437c-ad35-65b5cb1935c1": "What algorithms are used in determining access to financial systems?", "d909e267-78c1-4718-abc3-4c5eacc1c332": "How do credit scoring systems impact loan allocation?", "4953d062-f6dc-4435-8edf-ed0f4e8baf36": "What role do automated interest rate determinations play in financial systems?", "a1f064d0-fe0e-4009-ad4e-da914ad74ab1": "How do insurance algorithms assess drug addiction risks?", "90c10536-7c1f-4080-96dc-6558f5fb05e1": "What are the ethical concerns surrounding insurance care allocation algorithms?", "9d896814-0ecb-4f79-9aee-8558f5e95807": "How do financial algorithms apply penalties like wage garnishment?", "9fba01ca-f4ac-40a5-845e-7e7798ee3c4a": "What is the impact of underwriting algorithms on health insurance costs?", "9c45750d-00eb-4f95-b273-e109238629c4": "How do wellness apps integrate with wearable technologies to improve health outcomes?", "9dfeb337-4771-4307-8f63-5a084befadf1": "What are the key steps in ensuring automated systems are safe and effective?", "5db1d569-a143-4b95-a780-abd6a626429c": "How can diverse community consultation improve the safety of automated systems?", "36cb7b8b-ec8a-4240-932d-f4d013ec010c": "What is the importance of pre-deployment testing for automated systems?", "4e1b4a56-946d-4b57-97a8-a7e7043aafbd": "How do you identify and mitigate risks in automated systems?", "ba44fb84-6b28-4604-b4cc-4e0cb6156a75": "Why is ongoing monitoring crucial for the safety of automated systems?", "709b6157-47f9-4f13-b778-73ea7b5cd999": "What should be done if an automated system is found to be unsafe after deployment?", "b831d5ce-83d9-44cc-8451-30165592bc6a": "How can automated systems be designed to prevent unintended harm?", "48591766-4e73-4127-9689-ac3ec34938b0": "What role do domain-specific standards play in the development of automated systems?", "70259660-a0cb-4dad-9af2-f1552f5c5405": "How can stakeholders contribute to the development of safe automated systems?", "5da3d175-a205-4f12-9bc7-b0694cc97663": "What measures can be taken to ensure automated systems do not endanger community safety?", "ba9a37a2-ff2b-496c-b75a-bea68b9b4d20": "What is the main argument presented by Darshali A Vyas et al in their article on race correction in clinical algorithms?", "77397e84-ee4c-4691-9eea-95549a0f45b1": "How does the Executive Order on Advancing Racial Equity define 'equity' and 'underserved communities'?", "c4c9deb3-0d0c-4b68-a899-07733f551dce": "What are some of the proposals offered by various organizations for designing algorithmic impact assessments?", "2af51b13-b8e3-4522-b662-cbd6f11fa87c": "Can you provide a summary of the article \"Hidden in Plain Sight \u2013 Reconsidering the Use of Race Correction in Clinical Algorithms\"?", "203b4219-e580-474c-8c70-588f4c24500f": "What is the significance of the Executive Order on Advancing Racial Equity and Support for Underserved Communities?", "c20f89ba-0198-4bb6-83d4-436159a5fecb": "Who are the authors of the report \"Assembling Accountability: Algorithmic Impact Assessment for the Public Interest\"?", "beea4d1a-fc3a-4f4c-b9fa-a3c73abf6041": "How does the New England Journal of Medicine article address the issue of race correction in clinical algorithms?", "b49c589c-51d8-4cdc-93e1-6d74c67948f7": "What are the key points discussed in Section 2 of the Executive Order on Advancing Racial Equity?", "71a79413-b607-4093-91a6-cedb011b3b57": "What is the role of Data & Society in the context of algorithmic impact assessments?", "89504f33-70c7-44e7-acee-ad69679cf410": "How can one access the full text of the article \"Hidden in Plain Sight \u2013 Reconsidering the Use of Race Correction in Clinical Algorithms\"?", "abccae6f-f846-42a0-ae0c-e7553ed3bcf9": "How do automated systems threaten the rights of the American public?", "1fe6aca7-365b-48fd-840b-21cafc375daa": "In what ways have technology and data been used to limit opportunities and access to resources?", "35d9684c-2d7c-462a-888f-687e5c1743d1": "What are some documented problems with systems designed to help with patient care?", "f3af11a5-dee0-41ce-9ec8-2befaa2c4b82": "How do algorithms in hiring and credit decisions reproduce existing inequities?", "f6a36e8c-7547-40e4-ab95-7e3640f7d9b0": "What are the potential harms of unchecked social media data collection?", "fd9e9dca-1dea-4621-9bc7-a973840546ac": "How can automated systems undermine privacy and track activity without consent?", "86f7a45a-b678-4ca0-9231-2659114e545f": "What are some examples of bias and discrimination embedded in automated systems?", "2807de8e-8f7e-4f04-9938-9baaf2698edf": "How can the harmful outcomes of automated systems be prevented?", "82042ccd-7ba3-45de-be88-dd7926ed2fa7": "What are the challenges posed to democracy by the use of technology and data?", "3f49ac16-f537-46ae-ac21-b82e769969c2": "How can we ensure that automated systems are safe and effective?", "ad65e418-3028-4caf-8dda-28cfc82b6e65": "What is generative AI and how does it create synthetic content?", "8a14b547-517f-4f3e-b937-5205af638a25": "How are foundation models related to generative AI?", "e996fac3-d63c-4fec-bdd3-645e2052ce20": "What are dual-use foundation models as defined by EO 14110?", "2fff0be9-8a59-42da-9d8f-9bf01c03c3a5": "What is the significance of self-supervision in training AI models?", "ff4c692f-1cfe-467e-9925-e44da6bac8a6": "How many parameters do dual-use foundation models typically contain?", "77dc336f-61a8-4597-8e60-7d6a28b2750a": "What is the role of the National Institute of Standards and Technology (NIST) in developing resources for generative AI?", "992eb21e-18d3-431b-82ee-6c8845b57e84": "What is the AI RMF mentioned in the context of EO 14110?", "754a638c-4963-45fc-b877-baf962d095cd": "How does EO 14110 impact the development of generative AI models?", "7837880f-1aaa-4a74-a820-8b848142069f": "What types of digital content can generative AI produce?", "83e7fc2a-5676-4a2d-9b53-fe9dc216d52d": "What is the purpose of NIST AI 100\u20131 in relation to generative AI?", "da4c933d-5790-469e-8c9c-08a80e387962": "What are the best practices for obtaining informed consent in feedback activities?", "b85c7dc7-598b-4f88-a94c-845f6bfd5cec": "How can organizations ensure they are following human subjects research requirements?", "e973c5e2-042d-4219-9ab3-9357946c544f": "What are effective methods for compensating subjects in research studies?", "3750af0a-f7d0-4923-8075-a53beefd9441": "How can feedback activities improve system documentation?", "5d13e05d-ba03-4e6f-8b60-c6aba8ce6ab7": "What role does informed consent play in enhancing debugging practices?", "de4376c0-1172-4302-94d6-b2308ff91785": "What are the key components of human subjects research requirements?", "35b33780-ab39-406c-a73a-5af626b322df": "How can organizations balance subject compensation with ethical considerations?", "2da11dfc-4bf8-44c6-b11b-bb784841bfa5": "What strategies can be used to integrate feedback into decision-making processes?", "9c4e8887-02a6-46a2-855f-dd49cdc870b1": "How does subject compensation impact the quality of feedback received?", "c3b4dffe-1622-4cde-b35d-0384b5fe8b90": "What are the ethical considerations when implementing feedback activities in organizations?", "ee6a09cb-bc0e-4337-94c7-9f98ea4e5ee3": "What is the role of the Software & Information Industry Association in the tech industry?", "b23e7b4f-f930-4e25-9deb-614c17f86250": "How is Stephanie Dinkins contributing to the Future Histories Studio at Stony Brook University?", "40981bd2-f90d-4edb-a063-87981f5fad81": "What initiatives does TechNet support in the technology sector?", "dc149b68-bca5-4e5e-912d-d7be8e71e054": "How does the Alliance for Media Arts and Culture collaborate with MIT Open Documentary Lab and Co-Creation Studio?", "d5696d57-18c7-4cce-961f-32fcfcc85df9": "What are the main objectives of the International Brotherhood of Teamsters in relation to technology?", "61c0fd7b-0e62-4a0b-9328-ce82b486e261": "How does the Leadership Conference on Civil and Human Rights engage with technology policy?", "6c72d4a0-152b-4b01-afbc-bbec5f6e4b2f": "What is Thorn's mission in the context of technology and human rights?", "8478afea-bd7b-47d0-8e3b-4ade048996f5": "What is the US Chamber of Commerce\u2019s Technology Engagement Center's stance on emerging technologies?", "f855fd92-7288-4188-bcc8-9e9d6658cb4c": "How does the University of Pittsburgh Undergraduate Student Collaborative contribute to tech research?", "9363da58-a7e3-417b-8b3f-f36f8cc73b2e": "What is the focus of the XR Safety Initiative in the realm of extended reality technologies?", "c7a8a9e5-f64e-4726-a954-752b9bfa62d8": "What are the key components of establishing policies, procedures, and processes for oversight functions in the GAI lifecycle?", "d4f81aa1-536d-4926-ab69-7bf7a5842d58": "How can organizations ensure effective oversight from problem formulation to system decommission in AI projects?", "6ec865eb-0ef1-4d0f-a574-83c9bcb8e93a": "What roles do senior leadership, legal, and compliance teams play in the oversight of AI systems?", "10621bd5-3020-4fd2-8090-ee0a5a365370": "What are the main tasks involved in AI deployment, design, development, operation, and monitoring?", "8a985b69-031f-42d8-b2fe-c3c003206f80": "How should organizational teams document the risks and potential impacts of AI technology?", "d55c5fb5-723c-4f9c-b466-fbe12ec885fb": "What are the best practices for communicating the impacts of AI technology more broadly within an organization?", "87cdba18-ff3f-490d-97f4-3679a7ab585f": "Why is it important to establish terms of use and terms of service for GAI systems?", "d1a0a484-a7da-40ad-b494-d8fba48d4cc8": "How can organizations address risks related to intellectual property, dangerous content, and abusive content in AI systems?", "d95e85a2-6162-47ed-bc37-6e7bf3a90580": "What is the significance of including relevant AI actors in the GAI system risk identification process?", "c8a9e9a9-ec2d-4b97-a906-cc52fec59a02": "How can organizations verify the downstream impacts of GAI systems, especially when using third-party components?", "050deb8f-2d38-4b19-abce-8d42367a3897": "Why is data privacy considered a foundational principle in modern business models?", "e4ead17c-b324-49df-9768-46f3947244e3": "How do companies use data collection to build individual profiles?", "2e67721a-7a35-4081-a350-c289a7b797bb": "What are some examples of how data privacy can protect against surveillance?", "ffcf5bdb-0269-4d50-a0fc-e0f5cd5d6cf0": "How do government agencies utilize data collection for law enforcement purposes?", "805ffbfc-6fde-4a13-af7b-92d425ac5ff2": "What are the potential risks of companies tracking the behavior of the public?", "b7173668-8845-4ff4-a8bf-82d58d4670cf": "How does data privacy impact the use of automated systems?", "f786de70-6184-40ef-bcd4-dbc7e418ec99": "Why is data sharing and reuse a concern for data privacy?", "dd27c837-114d-4771-b470-8edadae0e05e": "What technologies are used by law enforcement to enhance surveillance capabilities?", "f986530c-70e1-4674-a4a3-d2c2fa9f3c48": "How can data privacy principles help protect individual freedoms?", "d6f7085a-3f9d-41d4-a61c-de22f689406b": "What are the implications of expanded surveillance capabilities on data privacy?", "69e6c713-aa1a-4a39-b3b8-5a9c3d192560": "What are the potential risks of using the same algorithm in employment and lending decisions?", "b9ded17f-ece6-4a9a-83db-3d1c1ce214b6": "How can correlated failures in AI systems affect the labor market?", "118c93d6-f413-43f8-9eb0-5322555c7701": "What are some examples of unexpected shocks that could impact AI decision-making systems?", "378ad341-25e9-4a99-82e3-2d3b20c79183": "How might the use of AI in employment decisions influence job security?", "3e2c5916-b757-4486-950c-91ae7c275a13": "What are the projected impacts of AI on the workforce according to recent studies?", "604a356d-af0d-4af6-ae0a-2362a5215a8e": "Why are fewer studies examining the impact of General Artificial Intelligence (GAI) on the labor market?", "70c87bb5-4afa-45a5-a192-51c40b99026a": "How are employees and employers reacting to the potential disruption caused by GAI?", "6246f0e9-a17a-44cc-99f0-30db573afe58": "What measures can be taken to mitigate the risks of correlated failures in AI systems?", "e8751b61-9fee-43e4-99ce-3c16b3f81807": "How do industry surveys reflect the concerns of employees regarding AI in the workplace?", "5e9a5f8c-765c-428a-a81c-62574fa7770e": "What are the implications of multiple actors relying on the same algorithm in lending decisions?", "8fd0cff6-85a3-4dba-abda-91cdb762349a": "What are the environmental impacts of high compute resource utilization in training AI models?", "5cd61fe8-2405-49cc-93bf-9ad9a656887b": "How does the use of non-representative training data lead to performance disparities between sub-groups or languages in AI models?", "05c34830-40b3-4fe5-9695-44a5b4ddb868": "In what ways can AI models amplify historical, societal, and systemic biases?", "a5419133-45d4-4c99-9e69-273c2f4058cb": "What are the potential adverse effects on ecosystems due to the high compute resource utilization in AI operations?", "ef754679-4152-42b3-a445-a7b434eebddd": "How can undesired homogeneity in AI model outputs lead to ill-founded decision-making?", "832fc999-15fc-4b42-9654-2177da3e8011": "What is algorithmic aversion, and how does it affect human-AI interactions?", "15f4dc2c-db75-4f81-a8cf-149786ddd579": "How can over-reliance on AI systems impact human decision-making?", "e4d93cdb-eeac-42f2-9ae7-a646b63d3e7c": "What are the risks of anthropomorphizing AI systems in human-AI configurations?", "ec919833-ed12-42e2-9839-457e42e0568f": "How does automation bias manifest in interactions between humans and AI systems?", "3dd2b1f9-4fae-4eb2-8ead-27f913346a48": "What measures can be taken to mitigate the amplification of harmful biases in AI models?", "8eb81f04-21af-4b5e-b8bc-5dd9ddf12a19": "What are the most effective metrics for measuring the effectiveness of data provenance in security?", "7c17281e-f1f1-4b05-a681-4f085c6d7b0d": "How can user feedback be analyzed to improve understanding of content authenticity?", "57455a6a-fdc6-40a8-810e-ce67e69a459c": "What are the common concerns users have regarding content provenance and authenticity?", "cf632d03-f1b6-4eac-82f3-c0eeb5c6a7b7": "How do watermarking and cryptographic signatures contribute to content authentication?", "cbedd326-5ed2-4e1e-8b52-9599a3a3ef5a": "What methods can be used to measure the reliability of content authentication techniques?", "e199ba84-6648-43a1-8075-da2bccf8135f": "How can the rate of false positives and false negatives in content provenance be evaluated?", "42cbc313-aee1-442e-9707-f8a4cda1b659": "What is the importance of model integrity verification in content provenance?", "f174193d-52c9-4008-9de8-a830c2ab8659": "How does the number of unauthorized access attempts reflect the effectiveness of security measures?", "447c315e-07a6-4f78-bbc8-b783bcbf758a": "What role do digital fingerprints play in ensuring information integrity?", "3b87a3bd-9810-4130-9a77-016a6194b4af": "How can access controls and conformity assessments support content provenance techniques?", "6d54ebc0-4ddd-48e8-ac25-0f3b41399d6e": "How can I find out if an automated system is being used to make decisions that impact me?", "6126ed1b-d1c5-4b25-8dc0-506e2f075845": "What kind of documentation should designers and developers provide for automated systems?", "4e4463eb-454a-4f19-83a0-710cb38be7ed": "Who is responsible for maintaining and updating the notice about the use of automated systems?", "0875bf4d-94e5-4bc1-b7bd-a0618b496482": "How can I understand the role of automation in the outcomes that affect me?", "c4015147-e2ab-4686-b432-838d5504d8f4": "What should I do if I notice significant changes in the functionality of an automated system that impacts me?", "8f24b9bc-1fb7-45c6-9731-cce8c51d4bd2": "How can I get a clear explanation of how an automated system determined an outcome that affects me?", "ce820b6d-3bab-4138-b21e-3c94a05b131b": "What does it mean for an explanation from an automated system to be technically valid and meaningful?", "415c6ec6-f835-405b-bbcc-1e0ed22ea3e8": "How often should the notice about the use of automated systems be updated?", "7f81c5f0-eec3-40da-88f8-3a10b20297e9": "What should be included in the plain language documentation for automated systems?", "9fa50cab-5394-4aec-916b-5e47d663a1fb": "How can I know if an automated system is not the sole input determining an outcome that impacts me?", "ca32a8ce-0352-48e1-b059-40b626805076": "What are the key expectations for automated systems to ensure they are free from algorithmic discrimination?", "c303bf4a-19e7-45a2-a17a-3a2cbb7c518b": "How can automated systems be tested to ensure they do not exhibit algorithmic discrimination?", "3248fe7a-931f-43b9-a807-be31c9cba85c": "What does it mean to design automated systems to ensure equity, broadly construed?", "2541eb4b-0325-4e71-a932-aa9c2240ff5f": "How do existing anti-discrimination laws apply to algorithmic discrimination in automated systems?", "f12e1350-6a69-48ac-9443-7bdf2fe8a551": "What proactive technical steps can be taken to reinforce legal protections against algorithmic discrimination?", "d6014c0b-7667-4f4c-8c17-3d64e472ae45": "What policy steps can be taken to ensure equity for underserved communities in the context of automated systems?", "caf9948f-d28b-4304-b2a9-7b8099401937": "How can protections against algorithmic discrimination be integrated throughout the design process of automated systems?", "aa086a0f-d233-467a-a4d1-307fd662e78e": "What are some examples of sectors or contexts where additional technical standards for automated systems might be needed?", "1ed1b3ca-848b-43f1-9413-11eb5e39d5cf": "How can the development of automated systems extend beyond legal protections to ensure equity?", "30377abc-d189-4360-8bda-75aa620ba449": "What are the potential challenges in ensuring automated systems are free from algorithmic discrimination?", "5c610b06-5ba5-458d-96b7-23660211a937": "What are the main reasons people might prefer not to use an automated system?", "f2bd0bb9-78d0-463e-9e19-206aca0bdab8": "How can automated systems lead to unintended outcomes?", "9a107472-63da-4150-b45b-9ee5a0f906d1": "In what ways can automated systems reinforce bias?", "38c99ae1-7267-4154-86cf-10c475dfab87": "Why might automated systems be considered inaccessible to some people?", "1fdcc7e8-a5a5-4068-84b8-8860d4fae85a": "What are the potential inconveniences of using automated systems?", "fabe7ff6-7665-4ee8-9e67-18e690b5c99a": "How can the replacement of paper or manual processes by automated systems affect people?", "4f7e6756-8436-4690-bb5d-8dd5e1dc19d3": "What challenges do people face when trying to reach a human decision-maker after using an automated system?", "5c5aab7b-a9cb-4e35-9853-670e020c2aff": "How does the lack of human reconsideration impact access to rights and opportunities?", "110bdd1f-0551-477c-8ad2-fe3771e46d11": "What are some examples of delayed access caused by reliance on automated systems?", "d584dcfb-bb0c-406b-813d-7ed4f0a60630": "How can the principle of human alternatives and reconsideration protect against the flaws of automated systems?", "6f2db439-4624-4bad-9cfd-f22bb387bf87": "What are the processes for identifying emergent GAI system risks?", "71f13148-d4ab-498f-ad28-d437b31d648c": "How can external AI actors be consulted to identify GAI system risks?", "915bdb26-45ca-41a4-a5c4-026de9664a4d": "What is the role of human-AI configuration in managing GAI risks?", "3f1a9bb4-4f35-4ca2-8c26-6d0fe7f70c0c": "How does confabulation impact GAI systems?", "562ffbd0-42ee-4f9d-a966-3fb61c224bdf": "What tasks are AI actors responsible for in the context of GAI risks?", "6ca39f09-5de1-4418-b8c2-8326d872cf08": "How are feedback processes for end users integrated into AI system evaluation metrics?", "47ffecb1-e88b-42b1-aff7-8feb6a9ed56a": "What are the potential impacts of AI-generated content on different social, economic, and cultural groups?", "7d104609-63ee-48d6-a2e0-efeef372ac3e": "How can harmful bias and homogenization be mitigated in AI systems?", "5d2f156d-e171-4aef-b290-48f2732097ef": "What methods can be used to study end users' perceptions of GAI content?", "4fed3fad-982b-4a59-8f81-d2bad9cb3670": "How can the integrity of information in GAI content be assessed?", "a063b509-7e7c-4889-9a12-8706969e2004": "What are the best practices for AI testing and incident identification in an organization?", "1c222789-364a-4695-8083-7136f31694e0": "How can organizations measure the effectiveness of content provenance methodologies like cryptography and watermarking?", "350eaf07-f263-4761-aa56-cb44ce3ea3d1": "What criteria should be included in an AI system incident report?", "aa8cb59a-2ee8-4000-a39f-520d7f5ab6b3": "How can AI deployment and design be integrated into the value chain and component integration process?", "55a7d693-1922-4dd6-8840-e8017fd5d458": "What organizational practices are essential for effective AI operation and monitoring?", "088e1b4b-78b3-4dca-a354-7414b72febcc": "How can information integrity be maintained through content provenance methodologies?", "4979e972-3cfb-4a75-b2e2-92fc4640b928": "What are the key components of an effective AI incident reporting system?", "826ee64d-fab2-40f1-a6c0-911a7a68785a": "How can organizations ensure information security in AI systems?", "4216a185-7dcb-478c-b3cb-1cf32485b29f": "What tasks are involved in AI development and how do they impact the overall AI governance?", "1f50cb43-e63f-46c6-8a05-c03b8d9f604c": "How can organizations establish effective policies for AI system incident reporting?"}