Skip to main content

Understanding Bots


Kwami Ahiabenu

Bots are in most technologies we make use of.

They are not easily discernable but they are running in the background either doing something good like making your online experience better or something as covert as distributing unwanted messages in huge volumes; spamming.

Although technologies which simulate human dialogue with a computer or other devices are not new, they are over 50 years. This is increasingly becoming popular and trendy.

Computing is more and more turning to the automation of tasks which are structurally repetitive and time-consuming, or impossible for humans to undertake.

A common tool used in this way are bots, also known web robots, web crawlers, spiders or chatbots.

What can bots do?

Bots can be used for good and bad applications.

When you send a message to order a product or service and process variety of customer service requests without the intervention of a human being, you are making use of a good bot without realising it.

These bots index search engines to enable searching online, setting an alarm, adding an appointment to your calendar, finding restaurants and checking out weather conditions.

Some bots can even help you save money by providing you with bank balances and bills which are due for payments while providing pointers to how to save money.

Also a popular application of bots is automatic interaction with instant messaging, instant relay chat, dynamic interaction with website, in this situation, when you visit a website and you have a question to ask, a bot is set to handle such queries, sometimes answering up to 100,000 requests at a time.

Apple's product called Siri and Microsoft's Cortana are examples of Intelligent Personal Digital Assistants using Voice Command Technology which are made possible by bots.

In programming these bots, they are designed to act like humans so that in talking to them, one finds that the experience is no different from asking a person for help.

You can find a variation of bots, called chatbots, on numerous messaging apps such as Facebook Message, Telegram, WhatsApp and Kik. Twitter also comes with in-built bots which provide rudimentary replies to your messages.

Newsrooms such as CNN make use of bots in showing top news headlines to their audiences.

Amazon bots are designed to help users search for products on Amazon when they are shopping online.

We now have bots which engage humans in a virtual relationship through sites such as Invisible Boyfriend (https://invisibleboyfriend.com) and Invisible Girlfriend (https://invisiblegirlfriend.com).

These bot-run sites enable you to fake a relationship with a bot without the "baggage" of dealing with a human since you are dealing with a digital replica of a man or a woman with full-fledged conversational capacity and a distinct persona.

On the other hand, bots can be used for numerous negative applications such as malware bots which are used to gain unauthorised access and control over a computer system.

Such malicious bots are designed as self-propagating malware that infect a system or central server and other devices, gather passwords from users, obtain financial information such as credit credentials, launch Denial of Service (DoS) attacks, infect systems with viruses and worms and capture and analyse network packets.

Bots are also used to distribute racist and offensive messages as a way of controlling online narratives during elections in some countries with the intention of manipulating electoral outcomes.

What is bots attack?

When computer systems and devices are infected by bots, you can tell by observing some of these changes: relatively slow Internet connection with no explanation, computers may take longer time to shut down or crash for no apparent reason, pop-up windows and advertisements appear on your computer or device even if you are not browsing, persons complain about mails from you although you did not send any and setting changes which were not done by you.

Although there is no 100 per cent way of protecting yourself fully from malicious bots, you can take the following steps to minimise or eliminate some attacks by installing firewalls, never clicking on anything suspicious, using complicated passwords which contain numbers, words and symbols, regularly changing your password and ensuring your software, especially anti-malware, is up to date.

Although you can clean your computer system or devices infected by bots, the best defence is prevention through good security practices.

Bots are relatively not smart today but as artificial intelligence keeps improving, their features are expected to improve in order to make their use less frustrating, especially when they do not understand some questions you pose to them.

In the long run, we are going to experience smarter bots with practical application for our homes, offices and cars as they increase their capacity to automate our lives.

The writer is the Director of Innovations at Penplusbytes.org

source : https://www.graphic.com.gh/features/features/ghana-news-understanding-bots.html

Comments

Popular posts from this blog

Vincent Chukwuemeka Ike's The Potter's Wheel

Currently reading Chukwuemeka Ike's The Potter's Wheel very interesting paper pack written by a prolific Nigeria writer the story set during the second World War and the only means of modern entertainment was the The Mobile Cinema Van. the book is very rich is proverbs and a lot of wise words The main character is Obuechina Maduabuchi ( mouthful) who happened to be the only boy born to his parents Mama Obu( short form of Obuechina) and Papa Lazarus Maduabuchi among six older sisters. Due to the "value" placed on the male child, he become a totaly spoilt brat, though academically brilliam Obu was growing into a hopelessly spoilt child to reverse this trend, Papa Lazarus decided to send him away as a servant to a schoolmasster with a dragon of a wife Of course, Obu goes and comes back very different published by University Press PLC Ibadan Nigeria 1993 email address is unipress AT skannet.com.gh though first published by Harvill Press 1973 ISBN 9780302832 WORDS FROM TH

How Generative AI Can Improve Aid Outcomes

Our first in-person Technology Salon DC in three years convened on January 25, 2023, to pose the question:  Can Generative Artificial Intelligence Technology Improve Aid Outcomes?  Thought leaders and decision makers across the international development space shared their optimism, skepticism, and uncertainty regarding generative AI and its consequences as we move closer to the  uncanny valley . The moderated and free-flowing discussion was informed by four experts in artificial intelligence uses for humanitarian aid: Craig Jolley , Data Scientist, USAID Kwami Ahiabenu II , Co-founder, Penplusbytes Prasanna Lal Das , Digital Policy Consultant, DIAL ChatGPT , Generative AI Chatbot, OpenAI What is Generative AI and Why Does It Matter? Generative artificial intelligence  uses AI and machine learning algorithms in order to generate new content such as text, images, audio, video, simulations, and code. ChatGPT—short for Generative Pre-trained Transformer—is one of the most well-known exampl

Unpacking Central Bank Digital Currency (CBDC) Implementation Challenges and Risks

Kwami Ahiabenu, Global Centre for FinTech Innovations, Canada abstract  This chapter outlines the risks and challenges involved in implementing central bank digital currency (CBDC). Interest in CBDC is currently growing, with a number of central banks paying it serious consideration, and a number of countries are implementing or piloting CBDC. Although CBDC holds a great deal of promise, its implementation is not without difficulty. This chapter highlights the major implementation issues, such as CBDC contributing to financial exclusion, technology risks, CBDC’s inability to work in an offline environment, lack of privacy, and confidential consideration, since anonymity is difficult to achieve. The chapter concludes by highlighting the need to deploy CBDC with greater attention paid to societal, economic, and political factors instead of a purely technocratic approach. Read more at  https://www.igi-global.com/gateway/chapter/full-text-html/319798 To cite :  MLA Ahiabenu, Kwami. "U