Ethical Risk Analysis Fundamentals-Overview
Detect and Mitigate Ethical Risks Course Introduction
()
CEET Specialization Introduction
()
Course Welcome & Success Tips
()
The Importance of Managing Risks
()
Overview
Get help and meet other learners. Join your Community!
Ethical Risk Analysis Fundamentals-Risk and Ethics
Risk Management Process
()
Risk Identification
()
Risk Analysis
()
Risk Mitigation
()
Risk Management Frameworks
Types of Ethical Risk
()
Ethical Risk Analysis Fundamentals-Basic Statistics
Distributions
()
Central Tendency
()
Variance and Standard Deviation
()
Skewness and Kurtosis
()
Correlation
()
Probability
()
Ethical Risk Analysis Fundamentals-Evaluation Metrics
Machine Learning Outcomes
()
Classification Metrics
Cost Functions
()
Reliability
()
Goodhart's Law
()
Manage Privacy Risks-Overview
The Importance of Managing Privacy Risks
()
Overview
Manage Privacy Risks-Sources of Privacy Risks
Private Data
()
First-Party vs. Third-Party Data
()
Secondary Use of Data
()
Combined Data Sources
()
Manage Privacy Risks-Identifying Privacy Risks
Identify Personally Identifiable Information (PII)
()
Model Personas
()
Track Customer Data
()
Meet Compliance Requirements
()
Data Protection Policies
Manage Privacy Risks-Mitigation Strategies for Privacy Risks
Intent and Consent
()
Minimize Private Data Sharing
()
Give the User Choices
()
Minimize Private Data Collection
()
Manage Privacy Risks-Toolkit for Managing Privacy Risks
Privacy Legislation Sources
Reinforce Trust
()
Anonymization and Pseudonymization
()
Homomorphic Encryption
()
Zero-Knowledge Protocols
()
Manage Privacy Risks-Evaluate What You've Learned
Incorporate Privacy Risk Management in the Lifecycle
()
Manage Accountability Risks-Overview
The Importance of Managing Accountability Risks
()
Overview
Manage Accountability Risks-Sources of Accountability Risks
Use of Third-Party Components
()
Automation Bias
()
Extrajudicial Judgment
()
Lack of Guiding Principles
()
Manage Accountability Risks-Identifying Accountability Risks
Recognize Black Box Algorithms
()
Assess the Organization's Governance Structure
()
Manage Accountability Risks-Mitigation Strategies for Accountability Risks
Document and Distribute Company Policies
()
Document Design Processes
()
Document Auditing Processes
()
Responsibility Assignment Matrix (RAM/RACI)
()
Pilot Testing
()
Collaboration with Data Sharing Partners
()
Manage Accountability Risks-Toolkit for Managing Accountability Risks
Algorithmic Impact Assessment (AIA)
()
Data Visualization
()
Dashboard Reporting
()
Manage Accountability Risks-Evaluate What You've Learned
Incorporate Accountability Risk Management in the Lifecycle
()
Manage Transparency and Explainability Risks-Overview
The Importance of Managing Transparency and Explainability Risks
()
Overview
Manage Transparency and Explainability Risks-Sources of Transparency and Explainability Risks
Black Box Systems
()
Self-Learning Models
()
Third-Party Integration
()
Intellectual Property Rights
()
Shadow Banning
()
Manage Transparency and Explainability Risks-Identifying Transparency and Explainability Risks
Explainable AI
()
Identify Algorithmic Decisions
()
Deconstruct Specific Decisions
()
Manage Transparency and Explainability Risks-Mitigation Strategies for Transparency and Explainability Risks
Explain How Systems Work
()
Help Users Seeking Explanations
()
Keep Humans in the Loop
()
Ensure Proper Data Disclosure
()
Be Upfront About Training Data Inadequacies
()
Manage Transparency and Explainability Risks-Toolkit for Managing Transparency and Explainability Risks
SHAP and Alibi
()
ELI5, LIME, and What-If
()
Manage Transparency and Explainability Risks-Evaluate What You've Learned
Incorporate Transparency and Explainability Risk Management in the Lifecycle
Manage Fairness and Non-Discrimination Risks-Overview
The Importance of Managing Fairness and Non-Discrimination Risks
()
Overview
Manage Fairness and Non-Discrimination Risks-Sources of Fairness and Non-Discrimination Risks
Implicit Bias
()
Sampling Bias
()
Reinforcement Bias
()
Temporal Bias
()
Overfitting to Training Data
()
Edge Cases and Outliers
()
Manage Fairness and Non-Discrimination Risks-Identifying Fairness and Non-Discrimination Risks
Analytical Techniques
()
Analyze Models in Different Environments
()
Persona Modeling
()
Manage Fairness and Non-Discrimination Risks-Mitigation Strategies for Fairness and Non-Discrimination Risks
Pattern Matching vs. Bias
Inclusive Design and Foreseeability
()
STEEPV Analysis
()
Perform User Testing
()
Gather Input from External Stakeholders
()
Manage Fairness and Non-Discrimination Risks-Toolkit for Managing Fairness and Non-Discrimination Risks
Bias and Safety Bounties
()
AI Fairness 360
()
AI Fairness 360 Demo
Radioactive Data Tracing
()
Manage Fairness and Non-Discrimination Risks-Evaluate What You've Learned
Incorporate Fairness and Non-Discrimination Risk Management in the Lifecycle
()
Manage Safety and Security Risks-Overview
The Importance of Managing Safety and Security Risks
()
Overview
Manage Safety and Security Risks-Sources of Safety and Security Risks
Abnormal System Behavior
()
Adversarial Machine Learning
()
Bad Actors
()
Groupthink and Biases
()
Cyber Attacks
()
Manage Safety and Security Risks-Identifying Safety and Security Risks
Quantitative Risk Analysis
()
Evaluate Training Data and Models
()
Threat Intelligence
()
Threat Modeling
()
Penetration Testing
()
Forensic Analysis
()
Manage Safety and Security Risks-Mitigation Strategies for Safety and Security Risks
Ensure Critical AI Systems Follow Rigorous Standards
()
Establish Baseline System Behavior
()
Designate Rapid Response Teams
()
Protect the Security of Data in Storage
()
Protect the Security of Data in Transit
()
Manage Safety and Security Risks-Toolkit for Managing Safety and Security Risks
Threat and Risk Libraries
()
Threat Modeling and Analysis Tools
()
Attack Simulation Tools
()
Vulnerability Scoring Tools
()
Security Information and Event Management (SIEM)
()
Manage Safety and Security Risks-Evaluate What You've Learned
Incorporate Safety and Security Risk Management in the Lifecycle
()