{"id":2399,"date":"2025-10-01T09:17:35","date_gmt":"2025-10-01T09:17:35","guid":{"rendered":"https:\/\/nuno.digital\/ia-confiavel-em-escala-licoes-de-governanca-da-era-da-internet\/"},"modified":"2025-10-31T23:36:35","modified_gmt":"2025-10-31T23:36:35","slug":"ia-confiavel-em-escala-licoes-de-governanca-da-era-da-internet","status":"publish","type":"post","link":"https:\/\/nuno.digital\/pt-pt\/ia-confiavel-em-escala-licoes-de-governanca-da-era-da-internet\/","title":{"rendered":"IA confi\u00e1vel em escala: li\u00e7\u00f5es de governan\u00e7a da era da internet"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2399\" class=\"elementor elementor-2399 elementor-1774\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b2be314 e-flex e-con-boxed e-con e-parent\" data-id=\"3b2be314\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-66f1fdfd elementor-widget elementor-widget-heading\" data-id=\"66f1fdfd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Introdu\u00e7\u00e3o<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61f0325c elementor-widget elementor-widget-text-editor\" data-id=\"61f0325c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Na era da IA, garantir que os sistemas permane\u00e7am confi\u00e1veis <strong data-start=\"4912\" data-end=\"4924\">em escala<\/strong> n\u00e3o \u00e9 tarefa f\u00e1cil. Mas a &#8220;<strong data-start=\"4948\" data-end=\"4975\">IA confi\u00e1vel em escala<\/strong>&#8221; n\u00e3o pode simplesmente emergir por decreto \u2014 deve ser constru\u00edda com camadas, prote\u00e7\u00f5es e arquiteturas de confian\u00e7a que espelhem as li\u00e7\u00f5es aprendidas durante a era da internet. Neste artigo, argumentaremos que as pr\u00e1ticas de governan\u00e7a, confian\u00e7a modular e supervis\u00e3o em camadas forjadas durante o crescimento da web fornecem orienta\u00e7\u00e3o cr\u00edtica sobre como as organiza\u00e7\u00f5es podem escalar a IA de forma respons\u00e1vel. Ao estabelecer analogias com a forma como a internet amadureceu (e por vezes falhou), descobriremos estrat\u00e9gias pr\u00e1ticas que ajudam as empresas a construir sistemas de IA em que as pessoas podem verdadeiramente confiar.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7459de6a e-flex e-con-boxed e-con e-parent\" data-id=\"7459de6a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a749c7c elementor-widget elementor-widget-heading\" data-id=\"1a749c7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sec\u00e7\u00e3o 1: Arquiteturas de confian\u00e7a da era da internet e analogias<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab0f114 elementor-widget elementor-widget-text-editor\" data-id=\"ab0f114\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>A hist\u00f3ria da internet oferece analogias instrutivas sobre como escalar a confian\u00e7a, muitas das quais se aplicam aos sistemas de IA:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c1e3ef elementor-widget elementor-widget-heading\" data-id=\"0c1e3ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Confian\u00e7a em camadas e arquitetura modular<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1726e363 elementor-widget elementor-widget-text-editor\" data-id=\"1726e363\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"5799\" data-end=\"5863\">Na web, a confian\u00e7a n\u00e3o \u00e9 monol\u00edtica \u2014 \u00e9 em camadas. Por exemplo: <\/p><ul data-start=\"5865\" data-end=\"6109\"><li data-start=\"5865\" data-end=\"5935\"><p data-start=\"5867\" data-end=\"5935\">TLS \/ HTTPS garante integridade e confidencialidade ao n\u00edvel do transporte.<\/p><\/li><li data-start=\"5936\" data-end=\"6029\"><p data-start=\"5938\" data-end=\"6029\">Autoridades de Certifica\u00e7\u00e3o (CAs) e Infraestrutura de Chave P\u00fablica (PKI) fornecem uma \u00e2ncora de confian\u00e7a.<\/p><\/li><li data-start=\"6030\" data-end=\"6109\"><p data-start=\"6032\" data-end=\"6109\">Sistemas de reputa\u00e7\u00e3o (avalia\u00e7\u00f5es de utilizadores, reputa\u00e7\u00e3o de dom\u00ednio) adicionam valida\u00e7\u00e3o social.<\/p><\/li><\/ul><p data-start=\"6111\" data-end=\"6254\">Para a IA, uma abordagem em camadas semelhante pode ajudar: valida\u00e7\u00e3o de dados, valida\u00e7\u00e3o de modelos, valida\u00e7\u00e3o de implementa\u00e7\u00e3o, monitoriza\u00e7\u00e3o em tempo real e auditorias externas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e213a3 elementor-widget elementor-widget-heading\" data-id=\"9e213a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Governan\u00e7a distribu\u00edda e confian\u00e7a descentralizada<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b1c155f elementor-widget elementor-widget-text-editor\" data-id=\"7b1c155f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"6312\" data-end=\"6536\">A internet n\u00e3o \u00e9 controlada centralmente; em vez disso, a confian\u00e7a \u00e9 distribu\u00edda. Registadores de dom\u00ednio, CAs, fornecedores de navegadores, registos de transpar\u00eancia de certificados \u2014 cada um tem um papel. Este modelo distribu\u00eddo ajudou a evitar pontos \u00fanicos de falha.  <\/p><p data-start=\"6538\" data-end=\"6711\">Aplicado \u00e0 IA, pode imaginar um ecossistema de governan\u00e7a onde equipas internas, organismos de auditoria independentes, grupos de supervis\u00e3o externos e registos de transpar\u00eancia abertos desempenham cada um um papel.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2075374 elementor-widget elementor-widget-heading\" data-id=\"2075374\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Evolu\u00e7\u00e3o atrav\u00e9s de falhas, corre\u00e7\u00f5es e ciclos de seguran\u00e7a<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ed5814 elementor-widget elementor-widget-text-editor\" data-id=\"5ed5814\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"6779\" data-end=\"6946\">A web evoluiu atrav\u00e9s de ciclos de vulnerabilidade, ataque, corre\u00e7\u00e3o e normaliza\u00e7\u00e3o (por exemplo, vulnerabilidades SSL, atualiza\u00e7\u00f5es de navegadores, WAFs, etc.). A confian\u00e7a teve de ser resiliente. <\/p><p data-start=\"6948\" data-end=\"7153\">Da mesma forma, os sistemas de IA sofrer\u00e3o ataques advers\u00e1rios, deriva de modelos, falhas de equidade e muito mais. Um modelo de &#8220;confian\u00e7a em escala&#8221; deve antecipar falhas, apoiar corre\u00e7\u00f5es r\u00e1pidas e incorporar monitoriza\u00e7\u00e3o cont\u00ednua. <\/p><p data-start=\"7155\" data-end=\"7319\">Ao estudar como a infraestrutura de confian\u00e7a amadureceu na era da internet, as organiza\u00e7\u00f5es podem evitar reinventar a roda e, em vez disso, adaptar padr\u00f5es comprovados para a governan\u00e7a de IA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-48883ee e-flex e-con-boxed e-con e-parent\" data-id=\"48883ee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4bc9832 elementor-widget elementor-widget-heading\" data-id=\"4bc9832\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sec\u00e7\u00e3o 2: Escalar a governan\u00e7a de IA com estruturas e prote\u00e7\u00f5es modulares<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ac978b elementor-widget elementor-widget-text-editor\" data-id=\"5ac978b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Se construir <strong data-start=\"7493\" data-end=\"7520\">IA confi\u00e1vel em escala<\/strong> \u00e9 o objetivo, ent\u00e3o a quest\u00e3o torna-se: como escalar a governan\u00e7a sem sufocar a inova\u00e7\u00e3o?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bbcec95 elementor-widget elementor-widget-heading\" data-id=\"bbcec95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2.1 Estruturas e andaimes<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8ddb41 elementor-widget elementor-widget-text-editor\" data-id=\"e8ddb41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"7654\" data-end=\"7736\">Surgiram m\u00faltiplas estruturas de governan\u00e7a que as organiza\u00e7\u00f5es podem adotar ou adaptar:<\/p><ul><li data-start=\"7740\" data-end=\"7779\"><strong data-start=\"7740\" data-end=\"7777\">Estrutura de gest\u00e3o de risco da IA do NIST<\/strong><\/li><li data-start=\"7782\" data-end=\"7823\"><strong data-start=\"7782\" data-end=\"7821\">Lei de IA da UE \/ propostas regulamentares da UE<\/strong><\/li><li data-start=\"7826\" data-end=\"7911\"><strong data-start=\"7826\" data-end=\"7859\">Estruturas internas de prote\u00e7\u00e3o<\/strong>, como verifica\u00e7\u00f5es em camadas (dados, modelo, implementa\u00e7\u00e3o)<\/li><li data-start=\"7914\" data-end=\"7959\"><strong data-start=\"7914\" data-end=\"7957\">Conselhos de \u00e9tica \/ comit\u00e9s de supervis\u00e3o de IA<\/strong><\/li><\/ul><p data-start=\"7961\" data-end=\"8060\">Estas estruturas ajudam a formalizar pap\u00e9is, responsabilidades, caminhos de escalada e m\u00e9tricas de desempenho.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5db3101 elementor-widget elementor-widget-heading\" data-id=\"5db3101\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2.2 Prote\u00e7\u00f5es modulares e aplica\u00e7\u00e3o de pol\u00edticas<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e75886a elementor-widget elementor-widget-text-editor\" data-id=\"e75886a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"8112\" data-end=\"8209\">Em vez de uma camada de governan\u00e7a monol\u00edtica, uma abordagem modular funciona melhor em escala. Por exemplo: <\/p><ul><li data-start=\"8213\" data-end=\"8269\"><strong>Restri\u00e7\u00f5es ao n\u00edvel dos dados<\/strong> (verifica\u00e7\u00f5es de enviesamento, m\u00e9tricas de equidade)<\/li><li data-start=\"8272\" data-end=\"8338\"><strong>Restri\u00e7\u00f5es ao n\u00edvel do modelo<\/strong> (explicabilidade, robustez advers\u00e1ria)<\/li><li data-start=\"8341\" data-end=\"8403\"><strong>Restri\u00e7\u00f5es ao n\u00edvel da implementa\u00e7\u00e3o<\/strong> (monitoriza\u00e7\u00e3o, dete\u00e7\u00e3o de anomalias)<\/li><li data-start=\"8406\" data-end=\"8479\"><strong>Prote\u00e7\u00f5es ao n\u00edvel do tempo real \/ feedback<\/strong> (dete\u00e7\u00e3o de valores at\u00edpicos, substitui\u00e7\u00e3o humana)<\/li><\/ul><p>Cada m\u00f3dulo aplica um subconjunto de requisitos de confian\u00e7a.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8e99a8 elementor-widget elementor-widget-heading\" data-id=\"f8e99a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2.3 Curvas de ado\u00e7\u00e3o e maturidade de governan\u00e7a (com dados)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-322e785 elementor-widget elementor-widget-text-editor\" data-id=\"322e785\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"8597\" data-end=\"8688\">Para justificar o investimento, precisa de dados. Algumas estat\u00edsticas relevantes (para ilustra\u00e7\u00e3o) podem incluir: <\/p><ul><li data-start=\"8692\" data-end=\"8881\"><a href=\"https:\/\/hai.stanford.edu\/assets\/files\/hai_ai-index-report-2024_chapter3.pdf?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\">Segundo o <strong data-start=\"8709\" data-end=\"8730\">Stanford AI Index<\/strong><\/a>, mais organiza\u00e7\u00f5es relatam agora ter &#8220;governan\u00e7a ou supervis\u00e3o \u00e9tica&#8221; em vigor (embora a maturidade permane\u00e7a baixa).<\/li><li data-start=\"8884\" data-end=\"8992\">Em inqu\u00e9ritos, muitos adotantes de IA citam &#8220;preocupa\u00e7\u00f5es de governan\u00e7a e confian\u00e7a&#8221; como uma barreira principal para escalar a IA internamente.<\/li><li data-start=\"8995\" data-end=\"9160\"><a href=\"https:\/\/arxiv.org\/html\/2502.13294v2?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\">Uma revis\u00e3o recente da literatura sobre governan\u00e7a respons\u00e1vel de IA conclui que, embora existam muitas estruturas<\/a>, a ado\u00e7\u00e3o fica aqu\u00e9m em todos os setores.<\/li><\/ul><p data-start=\"9162\" data-end=\"9290\">Estes pontos de dados ajudam a validar que <strong>a governan\u00e7a n\u00e3o \u00e9 apenas te\u00f3rica \u2014 \u00e9 um estrangulamento pr\u00e1tico para escalar IA confi\u00e1vel<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-99c0188 e-flex e-con-boxed e-con e-parent\" data-id=\"99c0188\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1cd018d elementor-widget elementor-widget-heading\" data-id=\"1cd018d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sec\u00e7\u00e3o 3: Desafios comuns, obje\u00e7\u00f5es e respostas<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ea8401 elementor-widget elementor-widget-text-editor\" data-id=\"8ea8401\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"9415\" data-end=\"9513\">Ao promover <strong data-start=\"9431\" data-end=\"9458\">IA confi\u00e1vel em escala<\/strong>, certas resist\u00eancias tendem a surgir. Vamos abordar algumas: <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29e2097 elementor-widget elementor-widget-heading\" data-id=\"29e2097\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Preocupa\u00e7\u00e3o A: \"J\u00e1 lidamos com confian\u00e7a \/ seguran\u00e7a atrav\u00e9s da nossa pilha web \/ TI\"<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86c0724 elementor-widget elementor-widget-text-editor\" data-id=\"86c0724\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Sim \u2014 a pilha web d\u00e1-lhe confian\u00e7a ao n\u00edvel do transporte e da rede (por exemplo, TLS, firewalls), mas a IA traz novas dimens\u00f5es: enviesamento de modelos, opacidade algor\u00edtmica, ciclos de feedback, robustez advers\u00e1ria. Os controlos de seguran\u00e7a existentes n\u00e3o s\u00e3o suficientes. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a0233c elementor-widget elementor-widget-heading\" data-id=\"4a0233c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Preocupa\u00e7\u00e3o B: \"A governan\u00e7a em escala matar\u00e1 a inova\u00e7\u00e3o ou atrasar\u00e1 a entrega\"<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b487e8f elementor-widget elementor-widget-text-editor\" data-id=\"b487e8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Esta \u00e9 uma tens\u00e3o v\u00e1lida. A solu\u00e7\u00e3o reside em conceber <strong data-start=\"9973\" data-end=\"9997\">automa\u00e7\u00e3o de prote\u00e7\u00f5es<\/strong> (verifica\u00e7\u00f5es automatizadas, monitoriza\u00e7\u00e3o cont\u00ednua) e incorporar a governan\u00e7a em pipelines CI\/CD, para que a governan\u00e7a se torne parte do desenvolvimento em vez de uma barreira. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de5a5c4 elementor-widget elementor-widget-heading\" data-id=\"de5a5c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Preocupa\u00e7\u00e3o C: \"Como auditamos modelos de IA opacos ou modelos de caixa negra?\"<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9d3076 elementor-widget elementor-widget-text-editor\" data-id=\"d9d3076\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Estrat\u00e9gias h\u00edbridas ajudam: t\u00e9cnicas de explicabilidade local (LIME, SHAP), registos de auditoria post-hoc, testes advers\u00e1rios de equipa vermelha e documenta\u00e7\u00e3o de modelos (cart\u00f5es de modelo). Com o tempo, promover modelos inerentemente interpret\u00e1veis em dom\u00ednios de alto risco. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02a9104 elementor-widget elementor-widget-heading\" data-id=\"02a9104\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Preocupa\u00e7\u00e3o D: \"A confian\u00e7a \u00e9 subjetiva \u2014 como a medimos?\"<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2798f82 elementor-widget elementor-widget-text-editor\" data-id=\"2798f82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>N\u00e3o pode medir a confian\u00e7a diretamente, mas pode aproximar usando m\u00e9tricas proxy:<\/p><ul><li data-start=\"10603\" data-end=\"10638\"><p data-start=\"10605\" data-end=\"10638\">M\u00e9tricas de equidade e enviesamento de modelos<\/p><\/li><li data-start=\"10639\" data-end=\"10670\"><p data-start=\"10641\" data-end=\"10670\">Taxa de substitui\u00e7\u00f5es de exce\u00e7\u00e3o<\/p><\/li><li data-start=\"10671\" data-end=\"10718\"><p data-start=\"10673\" data-end=\"10718\">Inqu\u00e9ritos \/ feedback de partes interessadas (confian\u00e7a do utilizador)<\/p><\/li><li data-start=\"10719\" data-end=\"10742\"><p data-start=\"10721\" data-end=\"10742\">Taxas de falha de auditoria<\/p><\/li><li data-start=\"10743\" data-end=\"10781\"><p data-start=\"10745\" data-end=\"10781\">Pontua\u00e7\u00f5es de transpar\u00eancia \/ auditabilidade<\/p><\/li><\/ul><p>Combinar m\u00e9tricas d\u00e1-lhe um cart\u00e3o de pontua\u00e7\u00e3o de confian\u00e7a.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8aead2c e-flex e-con-boxed e-con e-parent\" data-id=\"8aead2c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ddebfb6 elementor-widget elementor-widget-heading\" data-id=\"ddebfb6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conclus\u00e3o<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5f6ed6 elementor-widget elementor-widget-text-editor\" data-id=\"e5f6ed6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"11708\" data-end=\"11959\">Escalar <strong data-start=\"11716\" data-end=\"11743\">IA confi\u00e1vel em escala<\/strong> n\u00e3o se trata de aplicar uma \u00fanica pol\u00edtica ou lista de verifica\u00e7\u00e3o; trata-se de evoluir arquiteturas de confian\u00e7a em camadas, adaptar li\u00e7\u00f5es da era da internet e incorporar governan\u00e7a no desenvolvimento e opera\u00e7\u00f5es. Principais conclus\u00f5es: <\/p><ul data-start=\"11961\" data-end=\"12326\"><li data-start=\"11961\" data-end=\"12033\"><p data-start=\"11963\" data-end=\"12033\">A evolu\u00e7\u00e3o da internet oferece analogias para confian\u00e7a modular e em camadas<\/p><\/li><li data-start=\"12034\" data-end=\"12114\"><p data-start=\"12036\" data-end=\"12114\">Precisa de estruturas de governan\u00e7a, prote\u00e7\u00f5es modulares e maturidade na ado\u00e7\u00e3o<\/p><\/li><li data-start=\"12115\" data-end=\"12232\"><p data-start=\"12117\" data-end=\"12232\">Obje\u00e7\u00f5es comuns (atrito de inova\u00e7\u00e3o, opacidade de modelos, confian\u00e7a subjetiva) podem ser geridas com padr\u00f5es e m\u00e9tricas<\/p><\/li><li data-start=\"12233\" data-end=\"12326\"><p data-start=\"12235\" data-end=\"12326\">A implementa\u00e7\u00e3o deve ser pragm\u00e1tica \u2014 construindo trilhos de auditoria, supervis\u00e3o humana e resili\u00eancia<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ffbe9d elementor-widget elementor-widget-heading\" data-id=\"8ffbe9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Perguntas frequentes sobre IA confi\u00e1vel em escala<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3340e444 elementor-widget elementor-widget-n-accordion\" data-id=\"3340e444\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-8590\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-8590\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><h3 class=\"e-n-accordion-item-title-text\"> P1: o que significa \"IA confi\u00e1vel em escala\"? <\/h3><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-up\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8590\" class=\"elementor-element elementor-element-8095952 e-con-full e-flex e-con e-child\" data-id=\"8095952\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8590\" class=\"elementor-element elementor-element-b99c54d e-flex e-con-boxed e-con e-child\" data-id=\"b99c54d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33932933 elementor-widget elementor-widget-text-editor\" data-id=\"33932933\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Refere-se \u00e0 constru\u00e7\u00e3o e implementa\u00e7\u00e3o de sistemas de IA que permanecem justos, transparentes, seguros e fi\u00e1veis mesmo quando crescem em complexidade e ado\u00e7\u00e3o numa organiza\u00e7\u00e3o ou sociedade.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-8591\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-8591\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><h3 class=\"e-n-accordion-item-title-text\"> P2: como \u00e9 que a IA confi\u00e1vel difere da governan\u00e7a geral de IA? <\/h3><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-up\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8591\" class=\"elementor-element elementor-element-32562a2a e-con-full e-flex e-con e-child\" data-id=\"32562a2a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8591\" class=\"elementor-element elementor-element-4e2bfe34 e-flex e-con-boxed e-con e-child\" data-id=\"4e2bfe34\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-71f43643 elementor-widget elementor-widget-text-editor\" data-id=\"71f43643\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>A governan\u00e7a de IA \u00e9 o conjunto geral de pol\u00edticas e processos para gerir a IA. A IA confi\u00e1vel foca-se especificamente em tornar os sistemas fi\u00e1veis, \u00e9ticos e seguros na pr\u00e1tica \u2014 a governan\u00e7a \u00e9 o &#8220;como&#8221;, enquanto a confiabilidade \u00e9 o &#8220;resultado&#8221;. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-8592\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-8592\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><h3 class=\"e-n-accordion-item-title-text\"> P3: As li\u00e7\u00f5es da internet podem realmente aplicar-se \u00e0 IA? <\/h3><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-up\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8592\" class=\"elementor-element elementor-element-1575a992 e-con-full e-flex e-con e-child\" data-id=\"1575a992\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8592\" class=\"elementor-element elementor-element-d204696 e-flex e-con-boxed e-con e-child\" data-id=\"d204696\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-51242c9e elementor-widget elementor-widget-text-editor\" data-id=\"51242c9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Sim. A evolu\u00e7\u00e3o da internet mostra como modelos de confian\u00e7a em camadas (como HTTPS, certificados e sistemas de reputa\u00e7\u00e3o) permitiram escala global. Padr\u00f5es semelhantes podem orientar estruturas de governan\u00e7a de IA escal\u00e1veis.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-8593\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-8593\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><h3 class=\"e-n-accordion-item-title-text\"> P4: quais s\u00e3o os principais desafios em escalar IA confi\u00e1vel? <\/h3><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-up\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8593\" class=\"elementor-element elementor-element-2ac894b e-con-full e-flex e-con e-child\" data-id=\"2ac894b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8593\" class=\"elementor-element elementor-element-6186eeec e-flex e-con-boxed e-con e-child\" data-id=\"6186eeec\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2f10a2aa elementor-widget elementor-widget-text-editor\" data-id=\"2f10a2aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Os principais obst\u00e1culos incluem opacidade de modelos, enviesamento, falta de estruturas normalizadas e equilibrar a velocidade de inova\u00e7\u00e3o com a conformidade regulamentar.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-8594\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-8594\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><h3 class=\"e-n-accordion-item-title-text\"> P5: como podem as organiza\u00e7\u00f5es medir se a sua IA \u00e9 confi\u00e1vel? <\/h3><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-up\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8594\" class=\"elementor-element elementor-element-72cabe7 e-con-full e-flex e-con e-child\" data-id=\"72cabe7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8594\" class=\"elementor-element elementor-element-2904c25b e-flex e-con-boxed e-con e-child\" data-id=\"2904c25b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33fdc8a4 elementor-widget elementor-widget-text-editor\" data-id=\"33fdc8a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>As m\u00e9tricas incluem verifica\u00e7\u00f5es de enviesamento e equidade, pontua\u00e7\u00f5es de transpar\u00eancia, registos de auditoria, taxas de tratamento de exce\u00e7\u00f5es e inqu\u00e9ritos diretos de confian\u00e7a das partes interessadas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-8595\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-8595\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><h3 class=\"e-n-accordion-item-title-text\"> P6: quem \u00e9 respons\u00e1vel por garantir que a IA permanece confi\u00e1vel? <\/h3><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-up\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8595\" class=\"elementor-element elementor-element-3f26a41f e-con-full e-flex e-con e-child\" data-id=\"3f26a41f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8595\" class=\"elementor-element elementor-element-317f57f2 e-flex e-con-boxed e-con e-child\" data-id=\"317f57f2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-42f20632 elementor-widget elementor-widget-text-editor\" data-id=\"42f20632\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>A responsabilidade estende-se por m\u00faltiplos pap\u00e9is: equipas de produto, cientistas de dados, respons\u00e1veis de conformidade e, cada vez mais, respons\u00e1veis de governan\u00e7a de IA ou conselhos de \u00e9tica.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b6e768 elementor-widget elementor-widget-heading\" data-id=\"7b6e768\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Apelo \u00e0 a\u00e7\u00e3o<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7adc25c elementor-widget elementor-widget-text-editor\" data-id=\"7adc25c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Se est\u00e1 a construir ou escalar IA na sua organiza\u00e7\u00e3o, encorajo-o a <strong data-start=\"12422\" data-end=\"12460\">auditar as suas pr\u00e1ticas atuais de confian\u00e7a<\/strong>, esbo\u00e7ar uma estrutura de governan\u00e7a em camadas e pilotar uma &#8220;auditoria de confian\u00e7a&#8221; interna de um sistema de IA. Pode tamb\u00e9m descarregar uma <strong data-start=\"12589\" data-end=\"12628\">lista de verifica\u00e7\u00e3o de governan\u00e7a de IA confi\u00e1vel<\/strong> inicial (posso fornecer uma) e mapear o seu roteiro a partir da\u00ed. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d66b681 elementor-widget elementor-widget-heading\" data-id=\"d66b681\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Leitura Adicional<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a0e977 elementor-widget elementor-widget-text-editor\" data-id=\"5a0e977\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0963868724000672?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\">Governan\u00e7a respons\u00e1vel de intelig\u00eancia artificial: Uma revis\u00e3o e estrutura de investiga\u00e7\u00e3o<\/a><\/li><li><a href=\"https:\/\/www.lseg.com\/en\/insights\/trustworthy-ai-needs-trustworthy-data?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\">A IA confi\u00e1vel precisa de dados confi\u00e1veis<\/a><\/li><li><a href=\"https:\/\/research.ibm.com\/topics\/trustworthy-ai?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\">IA confi\u00e1vel<\/a><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>A IA confi\u00e1vel em escala exige li\u00e7\u00f5es da era da internet. Descubra estruturas de governan\u00e7a e estrat\u00e9gias pr\u00e1ticas para IA escal\u00e1vel e \u00e9tica.<\/p>","protected":false},"author":1,"featured_media":2755,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"googlesitekit_rrm_CAow74HBDA:productID":"","footnotes":""},"categories":[338],"tags":[529,530,331,506,531,343],"class_list":["post-2399","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ia-responsavel-governacao","tag-arquiteturas-de-ia","tag-confianca-em-ia","tag-governacao-da-ia","tag-ia-confiavel","tag-ia-escalavel","tag-ia-etica"],"_links":{"self":[{"href":"https:\/\/nuno.digital\/pt-pt\/wp-json\/wp\/v2\/posts\/2399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuno.digital\/pt-pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuno.digital\/pt-pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuno.digital\/pt-pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuno.digital\/pt-pt\/wp-json\/wp\/v2\/comments?post=2399"}],"version-history":[{"count":1,"href":"https:\/\/nuno.digital\/pt-pt\/wp-json\/wp\/v2\/posts\/2399\/revisions"}],"predecessor-version":[{"id":2401,"href":"https:\/\/nuno.digital\/pt-pt\/wp-json\/wp\/v2\/posts\/2399\/revisions\/2401"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nuno.digital\/pt-pt\/wp-json\/wp\/v2\/media\/2755"}],"wp:attachment":[{"href":"https:\/\/nuno.digital\/pt-pt\/wp-json\/wp\/v2\/media?parent=2399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuno.digital\/pt-pt\/wp-json\/wp\/v2\/categories?post=2399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuno.digital\/pt-pt\/wp-json\/wp\/v2\/tags?post=2399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}