Page 73 - Risk Report 2024
P. 73

IRMSA
           73
                   RISK REPORT 2024/25







                Longer-term response to address risk

                                              sustainably



     Risk drivers                         Response strategies                                        Impact


      Unrestrained technology development,   Regulations for search and engagement criteria, audits on
      discriminative selection and         outcomes, consequences for abuse of technology platforms
      engagement models (recruitment,      and market dominance.
      marketing, memberships).


      Unauthorised harvesting of data:     Regulations for all public behaviour monitoring (location,
      behavioural, location, purchasing,   visual and sound), monitoring and testing of public data
      socialising; State security and      gathering.
      intelligence / police abuse of
      monitoring.


      Intended and unintended logic loops,   Technical validation of automated systems, global pools of
      no moral choice in AI logic parameters   tests and situational responses.                      Moderate,
      (self-driving car misses large object &                                                        unless
      hits people).                                                                                  constantly
                                                                                                     monitored

      Elimination of transactional services   Substantially increase IT / coding / maths training, create
      and related work opportunities;      transaction support portals where humans support self-
      automate basic production tasks;     service transactions and response needs; commit to update
      switch to self-service eliminates many   skills for increasingly IT use.
      sales functions incl. big ticket items
      (cars, houses, equipment).


      Cyber extortion, ransomware, denial of   Ongoing / enhanced technical resilience & testing; protection
      service, data theft, international hack   of data and best available system access controls.
      attacks, utility operational shutdowns.



      Malicious and technical failure      Security and lifestyle audits on IT service providers; ongoing
      at major IT platforms; deliberate    validation of back up data and systems.
      corruption of data.









    Sources:
    •   Kerushan Govender. Age of Agency: Rise with AI. Productivity Press 2023
   68   69   70   71   72   73   74   75   76   77   78