Abstract

This study discusses corruption and moral hazard arising from the use of artificial intelligence(AI) and Chat GPT and presents implications. In this study, 1. The daily use of AI and Chat GPT is 1) Lack of situational awareness and thinking, 2) Absence of appropriate ethical norms and social codes, 3) Problems with shifting consciousness, 4) Concentration of economic and technological utility, 5) Deepening dependence on AI. 2. Problems in the information processing process of AI and Chat GPT were 1) lack of transparency and autonomy of AI, 2) value judgment and bias of Chat GPT algorithm, 3) intervention and distortion of decision-making, 4) possibility of copyright infringement, and 5) safety of use and services. 3. Problems in the information distribution process of AI and Chat GPT are 1) limitations of the Chat GPT algorithm and information distortion, 2) information asymmetry and centralization, 3) inaccuracy and uncertainty of information, 4) misuse of information or data, 5) Information security and information leakage occurred. The implications of this study are as follows. First, education and promotion of AI and Chat GPT include 1) Composition of public and private cooperation governance, 2) Development of national campaigns, 3) Found and service of AI and Chat GPT, 4) establishment of ethical norms and manners for AI and Chat GPT, 5) Social coding of AI ethics and manners. Second, the institutional devices for AI and Chat GPT are 1) Setting the regulatory scope and level to secure transparency and autonomy, 2) Monitoring of bias in information by public and private sectors, 3) Management and supervision of the information collection process, 4) Establishment of an institutional device to prevent AI from intervening in decision-making and preventing distortion, 5) Establishment of standards and systems to ensure the safety of information processing. Third, normative device for AI and Chat GPT as follows. The contents are: 1) Discussion and search for normative standards, 2) Exploring ways to resolve the centralization of information, 3) securing the clarity and reliability of information, 4) designing information security and leakage prevention programs, 5) Monitoring to prevent misuse and abuse of information.data.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call