Mechanical Turk Workers Utilize AI to Mimic Human Behavior

Date:

Mechanical Turk, a service by Amazon that allows users to divide simple tasks into small sub-tasks and pay a few pennies for each completed task, is now being used by nearly half of its workers who are using artificial intelligence (AI) to do tasks that were intended for humans. Researchers from the Swiss Federal Institute of Technology in Lausanne found that 33-46% of crowd workers used large language models (LLMs) to complete tasks on Mechanical Turk. Tasks such as identifying the sentiment of a sentence, drawing a circle around a cat on an image, and abstract summarization are particularly suited to surreptitious automation. While the use of AI in Mechanical Turk does not come as a surprise — some level of automation has likely existed since the platform’s early days — this new development raises the concern that there is a crisis of AI training on AI-generated data. Researchers caution that platforms, researchers, and crowd workers should find new ways to ensure that human data remains human.

See also  Windows 11 Copilot: Previewing the AI Assistant in Action

Frequently Asked Questions (FAQs) Related to the Above News

What is Mechanical Turk?

Mechanical Turk is a service by Amazon that allows users to divide simple tasks into small sub-tasks and pay a few pennies for each completed task.

How are workers on Mechanical Turk utilizing artificial intelligence (AI)?

Nearly half of Mechanical Turk workers are using AI to complete tasks that were intended for humans. Specifically, 33-46% of crowd workers are using large language models (LLMs) to complete tasks.

What types of tasks are particularly suited for surreptitious automation on Mechanical Turk?

Tasks such as identifying the sentiment of a sentence, drawing a circle around a cat on an image, and abstract summarization are particularly suited for surreptitious automation.

Has the use of AI in Mechanical Turk been a recent development?

While the use of AI in Mechanical Turk does not come as a surprise -- some level of automation has likely existed since the platform's early days -- this new development raises concerns about AI training on AI-generated data.

What is the concern raised by researchers regarding the use of AI on Mechanical Turk?

Researchers caution that platforms, researchers, and crowd workers should find new ways to ensure that human data remains human to avoid a crisis of AI training on AI-generated data.

Please note that the FAQs provided on this page are based on the news article published. While we strive to provide accurate and up-to-date information, it is always recommended to consult relevant authorities or professionals before making any decisions or taking action based on the FAQs or the news article.

Advait Gupta
Advait Gupta
Advait is our expert writer and manager for the Artificial Intelligence category. His passion for AI research and its advancements drives him to deliver in-depth articles that explore the frontiers of this rapidly evolving field. Advait's articles delve into the latest breakthroughs, trends, and ethical considerations, keeping readers at the forefront of AI knowledge.

Share post:

Subscribe

Popular

More like this
Related

WhatsApp Unveils New AI Feature: Generate Images of Yourself Easily

WhatsApp introduces a new AI feature, allowing users to easily generate images of themselves. Revolutionizing the way images are interacted with on the platform.

India to Host 5G/6G Hackathon & WTSA24 Sessions

Join India's cutting-edge 5G/6G Hackathon & WTSA24 Sessions to explore the future of telecom technology. Exciting opportunities await! #IndiaTech #5GHackathon

Wimbledon Introduces AI Technology to Protect Players from Online Abuse

Wimbledon introduces AI technology to protect players from online abuse. Learn how Threat Matrix enhances player protection at the tournament.

Hacker Breaches OpenAI, Exposes AI Secrets – Security Concerns Rise

Hacker breaches OpenAI, exposing AI secrets and raising security concerns. Learn about the breach and its implications for data security.