diff --git a/AI-Pioneers-such-as-Yoshua-Bengio.md b/AI-Pioneers-such-as-Yoshua-Bengio.md
new file mode 100644
index 0000000..1ca8921
--- /dev/null
+++ b/AI-Pioneers-such-as-Yoshua-Bengio.md
@@ -0,0 +1,5 @@
+
Artificial intelligence algorithms require big amounts of data. The strategies utilized to obtain this information have raised issues about personal privacy, surveillance and copyright.
+
[AI](https://wegoemploi.com)-powered gadgets and services, such as virtual assistants and IoT products, continuously gather individual details, raising concerns about intrusive information event and unauthorized gain access to by 3rd parties. The loss of personal privacy is more exacerbated by [AI](https://git.cnpmf.embrapa.br)'s capability to process and combine large amounts of data, potentially causing a surveillance society where individual activities are constantly kept an eye on and examined without appropriate safeguards or transparency.
+
Sensitive user data collected may consist of online activity records, geolocation information, video, or audio. [204] For instance, in order to develop speech acknowledgment algorithms, Amazon has actually recorded millions of personal discussions and allowed momentary workers to listen to and transcribe a few of them. [205] Opinions about this widespread security variety from those who see it as a needed evil to those for whom it is plainly unethical and a violation of the right to privacy. [206]
+
AI developers argue that this is the only method to provide important applications and have actually developed several methods that try to maintain privacy while still obtaining the data, such as data aggregation, de-identification and differential privacy. [207] Since 2016, some privacy professionals, such as Cynthia Dwork, have actually begun to view personal privacy in regards to fairness. Brian Christian wrote that experts have actually rotated "from the question of 'what they understand' to the question of 'what they're making with it'." [208]
+
Generative [AI](https://equipifieds.com) is typically trained on unlicensed copyrighted works, including in domains such as images or computer system code
\ No newline at end of file