Results for 'cybersecurity'

92 found
Order:
  1. Cybersecurity, Trustworthiness and Resilient Systems: Guiding Values for Policy.Adam Henschke & Shannon Ford - 2017 - Journal of Cyber Policy 1 (2).
    Cyberspace relies on information technologies to mediate relations between different people, across different communication networks and is reliant on the supporting technology. These interactions typically occur without physical proximity and those working depending on cybersystems must be able to trust the overall human–technical systems that support cyberspace. As such, detailed discussion of cybersecurity policy would be improved by including trust as a key value to help guide policy discussions. Moreover, effective cybersystems must have resilience designed into them. This paper (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. A principlist framework for cybersecurity ethics.Paul Formosa, Michael Wilson & Deborah Richards - 2021 - Computers and Security 109.
    The ethical issues raised by cybersecurity practices and technologies are of critical importance. However, there is disagreement about what is the best ethical framework for understanding those issues. In this paper we seek to address this shortcoming through the introduction of a principlist ethical framework for cybersecurity that builds on existing work in adjacent fields of applied ethics, bioethics, and AI ethics. By redeploying the AI4People framework, we develop a domain-relevant specification of five ethical principles in cybersecurity: (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Cybersecurity in health – disentangling value tensions.Michele Loi, Markus Christen, Nadine Kleine & Karsten Weber - 2019 - Journal of Information, Communication and Ethics in Society 17 (2):229-245.
    Purpose Cybersecurity in healthcare has become an urgent matter in recent years due to various malicious attacks on hospitals and other parts of the healthcare infrastructure. The purpose of this paper is to provide an outline of how core values of the health systems, such as the principles of biomedical ethics, are in a supportive or conflicting relation to cybersecurity. Design/methodology/approach This paper claims that it is possible to map the desiderata relevant to cybersecurity onto the four (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  4. Trusting artificial intelligence in cybersecurity is a double-edged sword.Mariarosaria Taddeo, Tom McCutcheon & Luciano Floridi - 2019 - Philosophy and Technology 32 (1):1-15.
    Applications of artificial intelligence (AI) for cybersecurity tasks are attracting greater attention from the private and the public sectors. Estimates indicate that the market for AI in cybersecurity will grow from US$1 billion in 2016 to a US$34.8 billion net worth by 2025. The latest national cybersecurity and defence strategies of several governments explicitly mention AI capabilities. At the same time, initiatives to define new standards and certification procedures to elicit users’ trust in AI are emerging on (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  5.  18
    Is Cybersecurity Risk Factor Disclosure Informative? Evidence from Disclosures Following a Data Breach.Jing Chen, Elaine Henry & Xi Jiang - 2023 - Journal of Business Ethics 187 (1):199-224.
    By examining managers’ decisions about disclosing updated assessments of firms’ risks, we present evidence that the risk factor disclosures are informative. We use the setting of cybersecurity risk factor disclosures after a data breach because data breaches, especially severe breaches, serve as a natural experiment where an exogenous shock to managers’ assessment of their firm’s cybersecurity risks occurs. We analyze the topic from the perspective of two different theoretical lenses: the economic lens of optimal risk exposure and the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  6.  9
    Cybersecurity and Authentication: The Marketplace Role in Rethinking Anonymity – Before Regulators Intervene.Clyde Wayne Crews - 2007 - Knowledge, Technology & Policy 20 (2):97-105.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7.  24
    Cybersecurity, Bureaucratic Vitalism and European Emergency.Stephanie Simon & Marieke de Goede - 2015 - Theory, Culture and Society 32 (2):79-106.
    Securing the internet has arguably become paradigmatic for modern security practice, not only because modern life is considered to be impossible or valueless if disconnected, but also because emergent cyber-relations and their complex interconnections are refashioning traditional security logics. This paper analyses European modes of governing geared toward securing vital, emergent cyber-systems in the face of the interconnected emergency. It develops the concept of ‘bureaucratic vitalism’ to get at the tension between the hierarchical organization and reductive knowledge frames of security (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  21
    Is Cybersecurity a Public Good?Mariarosaria Taddeo - 2019 - Minds and Machines 29 (3):349-354.
  9.  14
    Making Digital Territory: Cybersecurity, Techno-nationalism, and the Moral Boundaries of the State.Norma Möllers - 2021 - Science, Technology, and Human Values 46 (1):112-138.
    Drawing on an analysis of German national cybersecurity policy, this paper argues that cybersecurity has become a key site in which states mobilize science and technology to produce state power. Contributing to science and technology studies work on technoscience and statecraft, I develop the concepts of “territorialization projects” and “digital territory” to capture how the production of state power in the digital age increasingly relies on technoscientific expertise about information infrastructure, shifting tasks of government into the domain of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  10.  41
    Ethics of AI and Cybersecurity When Sovereignty is at Stake.Paul Timmers - 2019 - Minds and Machines 29 (4):635-645.
    Sovereignty and strategic autonomy are felt to be at risk today, being threatened by the forces of rising international tensions, disruptive digital transformations and explosive growth of cybersecurity incidents. The combination of AI and cybersecurity is at the sharp edge of this development and raises many ethical questions and dilemmas. In this commentary, I analyse how we can understand the ethics of AI and cybersecurity in relation to sovereignty and strategic autonomy. The analysis is followed by policy (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  11.  19
    Ethics of AI and Cybersecurity When Sovereignty is at Stake.Paul Timmers - 2019 - Minds and Machines 29 (4):635-645.
    Sovereignty and strategic autonomy are felt to be at risk today, being threatened by the forces of rising international tensions, disruptive digital transformations and explosive growth of cybersecurity incidents. The combination of AI and cybersecurity is at the sharp edge of this development and raises many ethical questions and dilemmas. In this commentary, I analyse how we can understand the ethics of AI and cybersecurity in relation to sovereignty and strategic autonomy. The analysis is followed by policy (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  12.  32
    Ethics of AI and Cybersecurity When Sovereignty is at Stake.Paul Timmers - 2019 - Minds and Machines 29 (4):635-645.
    Sovereignty and strategic autonomy are felt to be at risk today, being threatened by the forces of rising international tensions, disruptive digital transformations and explosive growth of cybersecurity incidents. The combination of AI and cybersecurity is at the sharp edge of this development and raises many ethical questions and dilemmas. In this commentary, I analyse how we can understand the ethics of AI and cybersecurity in relation to sovereignty and strategic autonomy. The analysis is followed by policy (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  13.  30
    The Cyberethics, Cybersafety, and Cybersecurity at Schools.Irene L. Chen & Libi Shen - 2016 - International Journal of Cyber Ethics in Education 4 (1):1-15.
    The 2006 Megan Meier case, where a teenage girl who was bullied on the Internet through e-mail and Myspace which was said to ultimately lead to her suicide, shed light on the cyber bullying issue in schools. This article uses a case study approach to describe how a number of school institutes were grappling with the loss of confidential information and protecting students on the WWW, each through a unique set of circumstances. It will reveal potential reactions of the institutions (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14.  18
    Ethical Value-Centric Cybersecurity: A Methodology Based on a Value Graph.Josep Domingo-Ferrer & Alberto Blanco-Justicia - 2020 - Science and Engineering Ethics 26 (3):1267-1285.
    Our society is being shaped in a non-negligible way by the technological advances of recent years, especially in information and communications technologies. The pervasiveness and democratization of ICTs have allowed people from all backgrounds to access and use them, which has resulted in new information-based assets. At the same time, this phenomenon has brought a new class of problems, in the form of activists, criminals and state actors that target the new assets to achieve their goals, legitimate or not. (...) includes the research, tools and techniques to protect information assets. However, some cybersecurity measures may clash with the ethical values of citizens. We analyze the synergies and tensions between some of these values, namely security, privacy, fairness and autonomy. From this analysis, we derive a value graph, and then we set out to identify those paths in the graph that lead to satisfying all four aforementioned values in the cybersecurity setting, by taking advantage of their synergies and avoiding their tensions. We illustrate our conceptual discussion with examples of enabling technologies. We also sketch how our methodology can be generalized to any setting where several potentially conflicting values have to be satisfied. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  8
    Human risk factors in cybersecurity.Tom Cuchta, Brian Blackwood, Thomas R. Devine & Robert J. Niichel - 2023 - Interaction Studies 24 (3):437-463.
    This article presents an experimental analysis of several cybersecurity risks affecting the human attack surface of Fairmont State University, a mid-size state university. We consider two social engineering experiments: a phishing email barrage and a targeted spearphishing campaign. In the phishing experiment, a total of 4,769 students, faculty, and staff on campus were targeted by 90,000 phishing emails. Throughout these experiments, we explored the effectiveness of three types of phishing awareness training. Our results show that phishing emails that make (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  16.  13
    The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance.Jessica Dawson & Robert Thomson - 2018 - Frontiers in Psychology 9.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  17.  15
    Cognitive Models in Cybersecurity: Learning From Expert Analysts and Predicting Attacker Behavior.Vladislav D. Veksler, Norbou Buchler, Claire G. LaFleur, Michael S. Yu, Christian Lebiere & Cleotilde Gonzalez - 2020 - Frontiers in Psychology 11.
  18.  21
    Do Different Mental Models Influence Cybersecurity Behavior? Evaluations via Statistical Reasoning Performance.Gary L. Brase, Eugene Y. Vasserman & William Hsu - 2017 - Frontiers in Psychology 8:306785.
    Cybersecurity research often describes people as understanding internet security in terms of metaphorical mental models (e.g., disease risk, physical security risk, or criminal behavior risk). However, little research has directly evaluated if this is an accurate or productive framework. To assess this question, two experiments asked participants to respond to a statistical reasoning task framed in one of four different contexts (cybersecurity, plus the above alternative models). Each context was also presented using either percentages or natural frequencies, and (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  44
    Digital Medicine, Cybersecurity, and Ethics: An Uneasy Relationship.Karsten Weber, Michele Loi, Markus Christen & Nadine Kleine - 2018 - American Journal of Bioethics 18 (9):52-53.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  8
    Taking Risks With Cybersecurity: Using Knowledge and Personal Characteristics to Predict Self-Reported Cybersecurity Behaviors.Shelia M. Kennison & Eric Chan-Tin - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21. Generative AI in EU Law: Liability, Privacy, Intellectual Property, and Cybersecurity.Claudio Novelli, Federico Casolari, Philipp Hacker, Giorgio Spedicato & Luciano Floridi - manuscript
    The advent of Generative AI, particularly through Large Language Models (LLMs) like ChatGPT and its successors, marks a paradigm shift in the AI landscape. Advanced LLMs exhibit multimodality, handling diverse data formats, thereby broadening their application scope. However, the complexity and emergent autonomy of these models introduce challenges in predictability and legal compliance. This paper analyses the legal and regulatory implications of Generative AI and LLMs in the European Union context, focusing on liability, privacy, intellectual property, and cybersecurity. It (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  21
    On directional accuracy of some methods to forecast time series of cybersecurity aggregates.Miguel V. Carriegos, Ramón Ángel Fernández Díaz, M. T. Trobajo & Diego Asterio De Zaballa - 2022 - Logic Journal of the IGPL 30 (6):954-964.
    Cybersecurity aggregates are numerical data obtained by aggregation on features along a database of cybersecurity reports. These aggregates are obtained by integration of time-stamped tables using some recent results of non-standard calculus. Time-series of aggregates are shown to contain relevant information about the concrete system dealt with. Trend time series is also forecasted using known data-driven methods. Although absolute forecasting of trend time series is not obtained, a directional forecasting of trend time series is achieved thence validated by (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  31
    Human Factors in the Cybersecurity of Autonomous Vehicles: Trends in Current Research.Václav Linkov, Petr Zámečník, Darina Havlíčková & Chih-Wei Pai - 2019 - Frontiers in Psychology 10.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  9
    What small businesses in developing country think of cybersecurity risks in the digital age: Indonesian case.Ratna Yudhiyati, Afrida Putritama & Diana Rahmawati - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):446-462.
    Purpose This study aims to identify and analyse the issues faced by internet-based small businesses in developing countries regarding cybersecurity and document how these businesses address the risks. Design/methodology/approach This study used the qualitative method. Respondents were internet-based small businesses selected by using theoretical sampling. Data were collected by using interviews and observations. The validity of the analysis was ensured by using triangulation and member checking. Findings This study reveals that small businesses managed to identify the loss of physical (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  34
    Board Gender Diversity and Corporate Response to Cyber Risk: Evidence from Cybersecurity Related Disclosure.Camélia Radu & Nadia Smaili - 2022 - Journal of Business Ethics 177 (2):351-374.
    Cyber risk has become one of the greatest threats to firms in recent years. Accordingly, boards of directors must be continually vigilant about this danger. They have a duty to ensure that the companies adopt appropriate cybersecurity measures to manage the risk of cyber fraud. Boards should also ensure that the firm disclose material cyber risk and breaches. We examine how the board’s gender composition can influence the extent of such disclosure, based on a sample of the companies listed (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  26.  7
    On the Risks of Trusting Artificial Intelligence: The Case of Cybersecurity.Mariarosaria Taddeo - 2021 - In Josh Cowls & Jessica Morley (eds.), The 2020 Yearbook of the Digital Ethics Lab. Springer Verlag. pp. 97-108.
    In this chapter, I draw on my previous work on trust and cybersecurity to offer a definition of trust and trustworthiness to understand to what extent trusting AI for cybersecurity tasks is justified and what measures can be put in place to rely on AI in cases where trust is not justified, but the use of AI is still beneficial.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  27.  12
    Hacking Humans? Social Engineering and the Construction of the “Deficient User” in Cybersecurity Discourses.Alexander Wentland & Nina Klimburg-Witjes - 2021 - Science, Technology, and Human Values 46 (6):1316-1339.
    Today, social engineering techniques are the most common way of committing cybercrimes through the intrusion and infection of computer systems. Cybersecurity experts use the term “social engineering” to highlight the “human factor” in digitized systems, as social engineering attacks aim at manipulating people to reveal sensitive information. In this paper, we explore how discursive framings of individual versus collective security by cybersecurity experts redefine roles and responsibilities at the digitalized workplace. We will first show how the rhetorical figure (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  43
    Toward a Human-Centric Approach to Cybersecurity.Ronald J. Deibert - 2018 - Ethics and International Affairs 32 (4):411-424.
    A “national security–centric” approach currently dominates cybersecurity policies and practices. Derived from a realist theory of world politics in which states compete with each other for survival and relative advantage, the principal cybersecurity threats are conceived as those affecting sovereign states, such as damage to critical infrastructure within their territorial jurisdictions. As part of a roundtable on “Competing Visions for Cyberspace,” this essay presents an alternative approach to cybersecurity that is derived from the tradition of “human security.” (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  12
    Cyberattacks as “state of exception” reconceptualizing cybersecurity from prevention to surviving and accommodating.Sebastian Knebel, Mario D. Schultz & Peter Seele - 2022 - Journal of Information, Communication and Ethics in Society 20 (1):91-109.
    Purpose This paper aims to outline how destructive communication exemplified by ransomware cyberattacks destroys the process of organization, causes a “state of exception,” and thus constitutes organization. The authors build on Agamben's state of exception and translate it into communicative constitution of organization theory. Design/methodology/approach A significant increase of cyberattacks have impacted organizations in recent times and laid organizations under siege. This conceptual research builds on illustrative cases chosen by positive deviance case selection of ransomware attacks. Findings CCO theory focuses (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  17
    It takes a pirate to know one: ethical hackers for healthcare cybersecurity.Bernice Simone Elger, David Martin Shaw & Giorgia Lorenzini - 2022 - BMC Medical Ethics 23 (1):1-8.
    Healthcare cybersecurity is increasingly targeted by malicious hackers. This sector has many vulnerabilities and health data is very sensitive and valuable. Consequently, any damage caused by malicious intrusions is particularly alarming. The consequences of these attacks can be enormous and endanger patient care. Amongst the already-implemented cybersecurity measures and the ones that need to be further improved, this paper aims to demonstrate how penetration tests can greatly benefit healthcare cybersecurity. It is already proven that this approach has (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  31. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.Zoe M. King, Diane S. Henshel, Liberty Flora, Mariana G. Cains, Blaine Hoffman & Char Sample - 2018 - Frontiers in Psychology 9.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  32.  42
    The Influence of Ethical Beliefs and Attitudes, Norms, and Prior Outcomes on Cybersecurity Investment Decisions.Partha S. Mohapatra, Mary B. Curtis, Sean R. Valentine & Gary M. Fleischman - 2023 - Business and Society 62 (3):488-529.
    Recent data breaches underscore the importance of organizational cybersecurity. However, the high costs of such security can force chief financial officers (CFOs) to make difficult financial and ethical trade-offs that have both business and societal implications. We employ a 2 × 2 randomized experiment that varies both an observed scenario CFO’s investment decision (invest/not invest in security) and organizational outcomes (positive/negative) to investigate these trade-offs. Participant managers assess the observed CFO’s investment behavior and indicate their own intentions to invest. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  11
    War, Health and Ecosystem: Generative Metaphors in Cybersecurity Governance.Julia Slupska - 2020 - Philosophy and Technology 34 (3):463-482.
    Policy-makers involved in cybersecurity governance should pay close attention to the ‘generative metaphors’ they use to describe and understand new technologies. Generative metaphors structure our understanding of policy problems by imposing mental models of both the problem and possible solutions. As a result, they can also constrain ethical reasoning about new technologies, by uncritically carrying over assumptions about moral roles and obligations from an existing domain. The discussion of global governance of cybersecurity problems has to date been dominated (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  34.  6
    Friction, snake oil, and weird countries: Cybersecurity systems could deepen global inequality through regional blocking.Jenna Burrell & Anne Jonas - 2019 - Big Data and Society 6 (1).
    In this moment of rising nationalism worldwide, governments, civil society groups, transnational companies, and web users all complain of increasing regional fragmentation online. While prior work in this area has primarily focused on issues of government censorship and regulatory compliance, we use an inductive and qualitative approach to examine targeted blocking by corporate entities of entire regions motivated by concerns about fraud, abuse, and theft. Through participant-observation at relevant events and intensive interviews with experts, we document the quest by professionals (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  35.  5
    International Conference on Cyberlaw, Cybercrime & Cybersecurity.Pavan Duggal - 2016 - International Review of Information Ethics 25.
    This article reports from the International Conference on Cyberlaw, Cybercrime & Cybersecurity. The Conference was addressed by more than 150 speakers backed by more than 80 supporters. It was a wonderful opportunity to network with international thought leaders under one roof.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  26
    Scoping the ethical principles of cybersecurity fear appeals.Marc Dupuis & Karen Renaud - 2020 - Ethics and Information Technology 23 (3):265-284.
    Fear appeals are used in many domains. Cybersecurity researchers are also starting to experiment with fear appeals, many reporting positive outcomes. Yet there are ethical concerns related to the use of fear to motivate action. In this paper, we explore this aspect from the perspectives of cybersecurity fear appealdeployersandrecipients. We commenced our investigation by considering fear appeals from three foundational ethical perspectives. We then consulted the two stakeholder groups to gain insights into the ethical concerns they consider to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  37.  77
    Three Ethical Challenges of Applications of Artificial Intelligence in Cybersecurity.Mariarosaria Taddeo - 2019 - Minds and Machines 29 (2):187-191.
  38.  22
    Opportunities and prospects for the promotion of Russian IT-technologies, artificial intelligence and cybersecurity in the ASEAN countries.Elena Aleksandrovna Shkirmontova & Vitaly Dmitrievich Shulman - 2022 - Kant 42 (2):83-90.
    The purpose of the study is to determine the prospects for the export of Russian information technologies and cooperation in the fields of artificial intelligence and cybersecurity with the countries of the Association of Southeast Asian Nations. The article discusses the request of the ASEAN countries in the field of AI and cybersecurity, the level of development of the digital economy in this region and its impact on the prospects for Russian IT-exports; in addition, the structure and dynamics (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  10
    Sticks and stones may break my bones, but words will never hurt me!—Navigating the cybersecurity risks of generative AI.Abdur Rahman Bin Shahid & Ahmed Imteaj - forthcoming - AI and Society:1-2.
  40.  20
    Correction to: Board Gender Diversity and Corporate Response to Cyber Risk: Evidence from Cybersecurity Related Disclosure.Camélia Radu & Nadia Smaili - 2022 - Journal of Business Ethics 177 (2):375-375.
    The initial online publication incorrectly contained Supplementary Information.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  41.  21
    Advances in Complex Systems and Their Applications to Cybersecurity.Fernando Sánchez Lasheras, Danilo Comminiello & Alicja Krzemień - 2019 - Complexity 2019:1-2.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  5
    Corrigendum: Technological Change in the Retirement Transition and the Implications for Cybersecurity Vulnerability in Older Adults.Benjamin A. Morrison, Lynne Coventry & Pam Briggs - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  9
    Technological Change in the Retirement Transition and the Implications for Cybersecurity Vulnerability in Older Adults.Benjamin A. Morrison, Lynne Coventry & Pam Briggs - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  14
    Innovation dynamics and capability in open collaborative cyber communities: implications for cybersecurity.George Tovstiga, Ekaterina Tulugurova & Alexander Kozlov - 2010 - International Journal of Business Governance and Ethics 5 (1/2):76-86.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45. Privacy and Digital Ethics After the Pandemic.Carissa Véliz - 2021 - Nature Electronics 4:10-11.
    The increasingly prominent role of digital technologies during the coronavirus pandemic has been accompanied by concerning trends in privacy and digital ethics. But more robust protection of our rights in the digital realm is possible in the future. -/- After surveying some of the challenges we face, I argue for the importance of diplomacy. Democratic countries must try to come together and reach agreements on minimum standards and rules regarding cybersecurity, privacy and the governance of AI.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  13
    Towards a Cognitive Theory of Cyber Deception.Edward A. Cranford, Cleotilde Gonzalez, Palvi Aggarwal, Milind Tambe, Sarah Cooney & Christian Lebiere - 2021 - Cognitive Science 45 (7):e13013.
    This work is an initial step toward developing a cognitive theory of cyber deception. While widely studied, the psychology of deception has largely focused on physical cues of deception. Given that present‐day communication among humans is largely electronic, we focus on the cyber domain where physical cues are unavailable and for which there is less psychological research. To improve cyber defense, researchers have used signaling theory to extended algorithms developed for the optimal allocation of limited defense resources by using deceptive (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  18
    On the application of compression-based metrics to identifying anomalous behaviour in web traffic.Gonzalo de la Torre-Abaitua, Luis F. Lago-Fernández & David Arroyo - 2020 - Logic Journal of the IGPL 28 (4):546-557.
    In cybersecurity, there is a call for adaptive, accurate and efficient procedures to identifying performance shortcomings and security breaches. The increasing complexity of both Internet services and traffic determines a scenario that in many cases impedes the proper deployment of intrusion detection and prevention systems. Although it is a common practice to monitor network and applications activity, there is not a general methodology to codify and interpret the recorded events. Moreover, this lack of methodology somehow erodes the possibility of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  5
    Detection of extremist messages in web resources in the Kazakh language.Shynar Mussiraliyeva & Milana Bolatbek - 2023 - Lodz Papers in Pragmatics 19 (2):415-425.
    Currently, the Internet information and communication network has become an integral part of human life. People use social networks such as Twitter, VKontakte, Facebook, etc., to establish global contacts, exchange opinions, gain knowledge, etc. The active participation of not only individual users, but also information organizations in the entire world space makes it necessary to develop measures that correspond to modern trends in the development of information and communication technologies to ensure national security, in particular, the organization of events related (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  71
    Out of the laboratory and into the classroom: the future of artificial intelligence in education.Daniel Schiff - 2021 - AI and Society 36 (1):331-348.
    Like previous educational technologies, artificial intelligence in education threatens to disrupt the status quo, with proponents highlighting the potential for efficiency and democratization, and skeptics warning of industrialization and alienation. However, unlike frequently discussed applications of AI in autonomous vehicles, military and cybersecurity concerns, and healthcare, AI’s impacts on education policy and practice have not yet captured the public’s attention. This paper, therefore, evaluates the status of AIEd, with special attention to intelligent tutoring systems and anthropomorphized artificial educational agents. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  50.  27
    Formal Ontology in Information Systems.Nathalie Aussenac-Gilles, Antony P. Galton, Torsten Hahmann & Maria M. Hedblom - unknown
    FOIS is the flagship conference of the International Association for Ontology and its Applications, a non-profit organization which promotes interdisciplinary research and international collaboration at the intersection of philosophical ontology, linguistics, logic, cognitive science, and computer science. This book presents the papers delivered at FOIS 2023, the 13th edition of the Formal Ontology in Information Systems conference. The event was held as a sequentially-hybrid event, face-to-face in Sherbrooke, Canada, from 17 to 20 July 2023, and online from 18 to 20 (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 92