AI in Cybersecurity: The Paradox

被引:3
|
作者
Michael, Katina [1 ,2 ]
Abbas, Roba [3 ]
Roussos, George [4 ]
机构
[1] Arizona State University, School for the Future of Innovation in Society, Tempe,AZ,85281, United States
[2] Arizona State University, School of Computing and Augmented Intelligence, Tempe,AZ,85281, United States
[3] University of Wollongong, School of Business, Wollongong,NSW,2522, Australia
[4] University of London, Birbeck College, Department of Computer Science and Information Systems, London,WC1E 7HX, United Kingdom
来源
关键词
Application area - Computational system - Creative process - Creatives - Cyber security - External data sources - Job displacement - Organisational - Public goods - Support systems;
D O I
10.1109/TTS.2023.3280109
中图分类号
学科分类号
摘要
Modern artificial intelligence is inherently paradoxical in many ways. While AI aims to increase automation, it also requires more intimate human involvement to reflect on the insights generated (automation paradox). While AI results in job displacement, it also creates new jobs, some simply to provide the necessary support systems for those newly unemployed (transition paradox). And as generative AI takes away control over the creative process, it also offers new creative opportunities (creativity paradox). This article considers another paradox, that relates to the fact that computational systems created using AI can be used both for public good in civilian applications and for harm across a range of application areas and settings [A1]. This contradiction is explored within an organizational and governmental context, where modern AI relies on data which might be externally or internally-sourced [A2]. External data sources [A3] are inclusive of open-source intelligence (OS-INT), such as information available on the Internet and the dark web, and internal data sources may include proprietary data found within an organizational or a wider governmental context [A4]. A further relevant consideration is the expanding role of the Internet of Things to support smart infrastructures, which has created new vulnerabilities [A5]. © 2020 IEEE.
引用
收藏
页码:104 / 109
相关论文
共 50 条
  • [31] AI-Driven Cybersecurity Threats to Future Networks
    Senouci, Sidi-Mohammed
    Sedjelmaci, Hichem
    Liu, Jiajia
    Rehmani, Mubashir Husain
    Bou-Harb, Elias
    [J]. IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2020, 15 (03): : 5 - 6
  • [32] AI Assistants and the Paradox of Internal Automaticity
    William A. Bauer
    Veljko Dubljević
    [J]. Neuroethics, 2020, 13 : 303 - 310
  • [33] AI Assistants and the Paradox of Internal Automaticity
    Bauer, William A.
    Dubljevic, Veljko
    [J]. NEUROETHICS, 2020, 13 (03) : 303 - 310
  • [34] Exploring Approaches for Teaching Cybersecurity and AI for K-12
    Cai, Yu
    Youngstrom, Drew
    Zhang, Wenbin
    [J]. 2023 23RD IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW 2023, 2023, : 1559 - 1564
  • [35] From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy
    Gupta, Maanak
    Akiri, Charankumar
    Aryal, Kshitiz
    Parker, Eli
    Praharaj, Lopamudra
    [J]. IEEE ACCESS, 2023, 11 : 80218 - 80245
  • [36] From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy
    Gupta, Maanak
    Akiri, Charankumar
    Aryal, Kshitiz
    Parker, Eli
    Praharaj, Lopamudra
    [J]. IEEE Access, 2023, 11 : 80218 - 80245
  • [37] Computing Specializations: Perceptions of AI and Cybersecurity Among CS Students
    Ojha, Vidushi
    Perdriau, Christopher
    Lagesse, Brent
    Lewis, Colleen M.
    [J]. PROCEEDINGS OF THE 54TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, VOL 1, SIGCSE 2023, 2023, : 966 - 972
  • [38] AI-Assisted Controls Change Management for Cybersecurity in the Cloud
    Tupsamudre, Harshal
    Kumar, Arun
    Agarwal, Vikas
    Gupta, Nisha
    Mondal, Sneha
    [J]. THIRTY-SIXTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FOURTH CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE / TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, : 12629 - 12635
  • [39] AI and Game Theory based Autonomous UAV Swarm for Cybersecurity
    Kusyk, Janusz
    Uyar, M. Umit
    Ma, Kelvin
    Plishka, Joseph
    Bertoli, Giorgio
    Boksiner, Jeffrey
    [J]. MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [40] AICyber-Chain: Combining AI and Blockchain for Improved Cybersecurity
    Ullah, Zia
    Waheed, Abdul
    Ismail Mohmand, Muhammad
    Basar, Sadia
    Zareei, Mahdi
    Granda, Fausto
    [J]. IEEE Access, 2024, 12 : 142194 - 142214