{"id":626,"date":"2023-06-04T11:05:19","date_gmt":"2023-06-04T09:05:19","guid":{"rendered":"https:\/\/kroener-online.de\/?p=626"},"modified":"2023-06-04T11:05:19","modified_gmt":"2023-06-04T09:05:19","slug":"die-gefahr-ist-nicht-die-kuenstliche-intelligenz","status":"publish","type":"post","link":"https:\/\/kroener-online.de\/?p=626","title":{"rendered":"Die Gefahr ist nicht die k\u00fcnstliche Intelligenz"},"content":{"rendered":"<p>Der Bericht des ZDF spricht mir aus der Seele: nicht die KI ist gef\u00e4hrlich sondern der Mensch, der diese f\u00fcr schlimme Dinge einsetzt.<\/p>\n<p>Hier geht es zum Bericht:<\/p>\n<p><a href=\"https:\/\/www.zdf.de\/nachrichten\/digitales\/ki-mensch-entwicklung-terrax-mercedes-bunz-kolumne-100.html#xtor=CS5-281\">www.zdf.de\/nachrichten\/digitales\/ki-mensch-entwicklung-terrax-mercedes-bunz-kolumne-100.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Der Bericht des ZDF spricht mir aus der Seele: nicht die KI ist gef\u00e4hrlich sondern der Mensch, der diese f\u00fcr schlimme Dinge einsetzt. Hier geht es zum Bericht: www.zdf.de\/nachrichten\/digitales\/ki-mensch-entwicklung-terrax-mercedes-bunz-kolumne-100.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[12],"tags":[27],"class_list":["post-626","post","type-post","status-publish","format-standard","hentry","category-technikkram","tag-kuenstliche-intelligenz-ki"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pac17Y-a6","jetpack-related-posts":[{"id":711,"url":"https:\/\/kroener-online.de\/?p=711","url_meta":{"origin":626,"position":0},"title":"KI-Betr\u00fcger nutzen Tagesschau-Sprecher f\u00fcr dubiose Onlineabzocke","author":"volker.kroener","date":"11. August 2023","format":false,"excerpt":"Tagesschau-Sprecher Andr\u00e9 Sch\u00fcnke wurde Opfer von Betr\u00fcgern, die mithilfe k\u00fcnstlicher Intelligenz seine Stimme und sein Gesicht f\u00fcr Werbevideos missbrauchten. \u2014 Weiterlesen www.golem.de\/news\/andre-schuenke-tagesschau-sprecher-fuer-deepfake-betrug-missbraucht-2308-176665.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":672,"url":"https:\/\/kroener-online.de\/?p=672","url_meta":{"origin":626,"position":1},"title":"Cyber-Sicherheitsbericht: Steigende Bedrohungslage im Gesundheitswesen | heise online","author":"volker.kroener","date":"17. Juli 2023","format":false,"excerpt":"Im Gesundheitswesen steigt die Bedrohungslage bei Cyberangriffen. Das geht aus einem Bericht der europ\u00e4ischen Cybersicherheitsagentur ENISA vor. \u2014 Weiterlesen www.heise.de\/news\/ENISA-Bericht-zu-Cyber-Sicherheit-Bedrohungslage-im-Gesundheitswesen-steigt-9217465.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":765,"url":"https:\/\/kroener-online.de\/?p=765","url_meta":{"origin":626,"position":2},"title":"Adversarial Machine Learning: Globale Leitlinien f\u00fcr KI-Sicherheit ver\u00f6ffentlicht &#8211; Golem.de","author":"volker.kroener","date":"27. November 2023","format":false,"excerpt":"Nicht nur normale Computerprogramme, auch KI-Systeme lassen sich hacken. Das soll k\u00fcnftig schon bei der Entwicklung ber\u00fccksichtigt werden. \u2014 Weiterlesen www.golem.de\/news\/adversarial-machine-learning-globale-leitlinien-fuer-ki-sicherheit-veroeffentlicht-2311-179792.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":777,"url":"https:\/\/kroener-online.de\/?p=777","url_meta":{"origin":626,"position":3},"title":"Datenschutz, Copyright, Arbeitszeitbetrug: Was das Arbeitsrecht von KI als Programmierhilfe h\u00e4lt","author":"volker.kroener","date":"4. Januar 2024","format":false,"excerpt":"Viele Devs nutzen KI als Hilfsmittel. Doch arbeitsrechtlich muss diese Hilfe Grenzen haben. Man l\u00e4sst ja auch nicht seinen Bruder den eigenen Job machen. \u2014 Weiterlesen www.golem.de\/news\/arbeitsrecht-das-kann-doch-die-ki-erledigen-oder-2401-180726.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":631,"url":"https:\/\/kroener-online.de\/?p=631","url_meta":{"origin":626,"position":4},"title":"Wir wurden gehackt\u2026","author":"volker.kroener","date":"7. Juni 2023","format":false,"excerpt":"\u2026immer \u00f6fter erreicht uns eine solche Nachricht von einem Gesch\u00e4ftspartner, und wir beginnen umgehend mit der Bewertung der nun auch f\u00fcr uns entstandenen Situation. Zuerst haben wir ein Sicherheitsereignis, das im Laufe der Untersuchungen zu einem Sicherheitsvorfall werden kann. Welche Systeme sind mit diesem Gesch\u00e4ftspartner verbunden? Kann es zu einer\u2026","rel":"","context":"In &quot;Diverses&quot;","block_context":{"text":"Diverses","link":"https:\/\/kroener-online.de\/?cat=1"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kroener-online.de\/wp-content\/uploads\/2023\/06\/augustinus_cybercrossattack_between_two_companys_network_4k_b4bd6a82-e9c0-43a5-a228-9c5702343732.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kroener-online.de\/wp-content\/uploads\/2023\/06\/augustinus_cybercrossattack_between_two_companys_network_4k_b4bd6a82-e9c0-43a5-a228-9c5702343732.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kroener-online.de\/wp-content\/uploads\/2023\/06\/augustinus_cybercrossattack_between_two_companys_network_4k_b4bd6a82-e9c0-43a5-a228-9c5702343732.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kroener-online.de\/wp-content\/uploads\/2023\/06\/augustinus_cybercrossattack_between_two_companys_network_4k_b4bd6a82-e9c0-43a5-a228-9c5702343732.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":699,"url":"https:\/\/kroener-online.de\/?p=699","url_meta":{"origin":626,"position":5},"title":"Auch per Zoom: KI ermittelt Passworteingaben anhand von Tippger\u00e4uschen &#8211; Golem.de","author":"volker.kroener","date":"7. August 2023","format":false,"excerpt":"Forscher haben unter Einsatz einer KI Tastatureingaben anhand der Tippger\u00e4usche aus der Ferne mit einer Genauigkeit von 95 Prozent erfasst. \u2014 Weiterlesen www.golem.de\/news\/auch-per-zoom-ki-ermittelt-passworteingaben-anhand-von-tippgeraeuschen-2308-176500.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts\/626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=626"}],"version-history":[{"count":0,"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts\/626\/revisions"}],"wp:attachment":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}