AI in Cybersecurity: The Paradox

被引:3
|
作者
Michael, Katina [1 ,2 ]
Abbas, Roba [3 ]
Roussos, George [4 ]
机构
[1] Arizona State University, School for the Future of Innovation in Society, Tempe,AZ,85281, United States
[2] Arizona State University, School of Computing and Augmented Intelligence, Tempe,AZ,85281, United States
[3] University of Wollongong, School of Business, Wollongong,NSW,2522, Australia
[4] University of London, Birbeck College, Department of Computer Science and Information Systems, London,WC1E 7HX, United Kingdom
来源
关键词
Application area - Computational system - Creative process - Creatives - Cyber security - External data sources - Job displacement - Organisational - Public goods - Support systems;
D O I
10.1109/TTS.2023.3280109
中图分类号
学科分类号
摘要
Modern artificial intelligence is inherently paradoxical in many ways. While AI aims to increase automation, it also requires more intimate human involvement to reflect on the insights generated (automation paradox). While AI results in job displacement, it also creates new jobs, some simply to provide the necessary support systems for those newly unemployed (transition paradox). And as generative AI takes away control over the creative process, it also offers new creative opportunities (creativity paradox). This article considers another paradox, that relates to the fact that computational systems created using AI can be used both for public good in civilian applications and for harm across a range of application areas and settings [A1]. This contradiction is explored within an organizational and governmental context, where modern AI relies on data which might be externally or internally-sourced [A2]. External data sources [A3] are inclusive of open-source intelligence (OS-INT), such as information available on the Internet and the dark web, and internal data sources may include proprietary data found within an organizational or a wider governmental context [A4]. A further relevant consideration is the expanding role of the Internet of Things to support smart infrastructures, which has created new vulnerabilities [A5]. © 2020 IEEE.
引用
收藏
页码:104 / 109
相关论文
共 50 条
  • [21] A Systematic Study of AI Applications in Cybersecurity Competitions
    Zhang, Fangjiao
    Cui, Xiang
    Wang, Zhi
    Chen, Shaomian
    Liu, Qixu
    Liu, Chaoge
    [J]. 2020 IEEE 14TH INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (BIGDATASE 2020), 2020, : 138 - 146
  • [22] Ethics of AI and Cybersecurity When Sovereignty is at Stake
    Timmers, Paul
    [J]. MINDS AND MACHINES, 2019, 29 (04) : 635 - 645
  • [23] Special Issue on Cybersecurity Management in the Era of AI
    Moayad Aloqaily
    Salil Kanhere
    Paolo Bellavista
    Michele Nogueira
    [J]. Journal of Network and Systems Management, 2022, 30
  • [24] Paradox in AI - AI 2.0: The Way to Machine Consciousness
    Palensky, Peter
    Bruckner, Dietmar
    Tmej, Anna
    Deutsch, Tobias
    [J]. IT REVOLUTIONS, 2009, 11 : 194 - +
  • [25] AI in Industrial IoT Cybersecurity [Industrial and Governmental Activities]
    Goebel, Kai
    Rane, Shantanu
    [J]. IEEE Computational Intelligence Magazine, 2024, 19 (01) : 14 - 15
  • [26] Ai and Automation in Cybersecurity: future Skilling for Efficient Defense
    Manikanta, Singirikonda
    [J]. ISACA Journal, 2024, 3 : 32 - 38
  • [27] Effect of AI: The Future Landscape of National Cybersecurity Strategies
    Kim, Geunhye
    Park, Kyudong
    [J]. TEHNICKI GLASNIK-TECHNICAL JOURNAL, 2024, 18 (01): : 29 - 36
  • [28] Reference-Based AI Decision Support for Cybersecurity
    Lee, Hyun-Woo
    Han, Tae-Hyun
    Lee, Tae-Jin
    [J]. IEEE ACCESS, 2023, 11 : 143324 - 143339
  • [29] Towards Next-Generation Cybersecurity with Graph AI
    Bowman, Benjamin
    Howie Huang, H.
    [J]. Operating Systems Review (ACM), 2021, 55 (01): : 61 - 67
  • [30] An Ethical Trio-AI, Cybersecurity, and Coding at Scale
    Hurlburt, George
    [J]. IT PROFESSIONAL, 2024, 26 (02) : 4 - 9